Publikationen

Publikationen

Static analysis on native android libraries for detecting implementation flaws and reflective API calls
Roskosch, Philipp; Waidner, Michael
Sprache: English
[Master Thesis]

Strategy Without Tactics: Policy-Agnostic Hardware-Enhanced Control-Flow Integrity
Sullivan, Dean; Arias, Orlando; Davi, Lucas; Larsen, Per; Sadeghi, Ahmad-Reza; Jin, Yier
53rd Design Automation Conference (DAC)
Sprache: German
[Conference Proceedings]

Stratum Filtering: Cloud-Based Detection of Attack Sources
Herzberg, Amir; Shulman, Haya; Waidner, Michael
ACM Cloud Computing Security Workshop (CCSW)
Sprache: German
[Conference Proceedings]

Stratum filtering: Cloud-based detection of attack sources
Herzberg, Amir; Shulman, Haya; Waidner, Michael
Cloud Computing Security Workshop (CCSW) <2016, Vienna>
Sprache: English
[Conference Paper]

StubDroid: automatic inference of precise data-flow summaries for the android framework
Arzt, Steven; Bodden, Eric
ICSE '16 Proceedings of the 38th International Conference on Software Engineering, p.725-735
Sprache: German
[Conference Proceedings]

Subversive-C: Abusing and Protecting Dynamic Message Dispatch
Lettner, Julian; Kollenda, Benjamin; Homescu, Andrei; Larsen, Per; Schuster, Felix; Davi, Lucas; Sadeghi, Ahmad-Reza; Holz, Thorsten; Franz, Michael
USENIX Annual Technical Conference (ATC)
Sprache: German
[Conference Proceedings]

Supporting Decision Makers in Choosing Suitable Authentication Schemes
Mayer, Peter; Neumann, Stephan; Storck, Daniel; Volkamer, Melanie
International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), p.67-77
Sprache: English
[Conference Proceedings]

Survey of Software Protection with Minimal Hardware
Herzberg, Amir; Shulman, Haya; Waidner, Michael
International Conference on Software Science, Technology and Engineering (SWSTE)
Sprache: German
[Conference Proceedings]

SyncProf: detecting, localizing, and optimizing synchronization bottlenecks
Yu, Tingting; Pradel, Michael
ISSTA 2016 Proceedings of the 25th International Symposium on Software Testing and Analysis, p.389-400
Sprache: German
[Conference Proceedings]

Teaching Phishing-Security: Which Way is Best?
Stockhardt, Simon; Reinheimer, Benjamin; Volkamer, Melanie; Mayer, Peter; Kunz, Alexandra; Rack, Philipp; Lehmann, Daniel
31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), p.135-149
Sprache: German
[Conference Proceedings]

Technical Report: DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android
Heuser, Stephan; Negro, Marco; Pendyala, Praveen Kumar; Sadeghi, Ahmad-Reza
Sprache: German
[Report]

The Cybersecurity Landscape in Industrial Control Systems
McLaughlin, Stephen; Konstantinou, Charalambos; Wang, Xueyang; Davi, Lucas; Sadeghi, Ahmad-Reza; Maniatakos, Michail; Karri, Ramesh
Proceedings of the IEEE, p.1039-1057
Sprache: German
[Journal Article]

The I4U Submission to the 2016 NIST Speaker Recognition Evaluation
Lee, K.A.; Sun, H.; Sizov, A.; Wang, G.; Nguyen, T.H.; others
Proc. of the NIST SRE workshop
[Conference Proceedings]

The impact of security by design on the success of open source software: Paper presented at 24th European Conference on Information Systems, ECIS 2016, 12 - 15 June 2016, Istanbul, Turkey
Chehrazi, Golriz; Heimbach, Irina; Hinz, Oliver
European Conference on Information Systems (ECIS) <24, 2016, Istanbul>
Sprache: English
[Conference Paper, Electronic Publication]

The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions
Gerber, Paul; Renaud, Karen; Volkamer, Melanie
>Journal of Information Security and Applications, p.8-26
Sprache: English
[Journal Article]

Things, Trouble, Trust: On Building Trust in IoT Systems
Abera, Tigist; Asokan, N.; Davi, Lucas; Koushanfar, Farinaz; Praverd, Andrew; Tsudik, Gene; Sadeghi, Ahmad-Reza
53rd Design Automation Conference (DAC)
Sprache: German
[Conference Proceedings]

TORPEDO: TOoltip-poweRed Phishing Email DetectiOn
Volkamer, Melanie; Renaud, Karen; Reinheimer, Benjamin
31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), p.161-175
Sprache: English
[Conference Proceedings]

Towards a Policy-Agnostic Control-Flow Integrity Implementation
Sullivan, Dean; Arias, Orlando; Davi, Lucas; Sadeghi, Ahmad-Reza; Jin, Yier
Black Hat Europe
Sprache: German
[Conference Proceedings]

Towards a Unified Security Model for Physically Unclonable Functions
Sadeghi, Ahmad-Reza; Armknecht, Frederik
CT-RSA - Cryptographers' Track at the RSA Conference
Sprache: German
[Conference Proceedings]

Towards automated aim determination of a social media group: A survey as baseline
Wogatzke, Christian; Khondoker, Rahamatullah
Sprache: English
[Term paper, Electronic Publication]

Towards automated measurements of internet's naming infrastructure
Borgwart, Andreas; Shulman, Haya; Waidner, Michael
International Conference on Software Science, Technology and Engineering (SwSTE) <2016, Be'er Sheva>
Sprache: English
[Conference Paper]

Towards Automated Measurements of Internets Naming Infrastructure
Borgwart, Andreas; Shulman, Haya; Waidner, Michael
International Conference on Software Science, Technology and Engineering (SWSTE)
Sprache: German
[Conference Proceedings]

Towards cross-platform cross-language analysis with soot
Arzt, S.; Kussmaul, T.; Bodden, E.
International Workshop on State Of the Art in Program Analysis (SOAP) <5, 2016, Santa Barbara/Calif.>
Sprache: English
[Conference Paper]

Towards effective security assurance for incremental software development - the case of zen cart application,
Ali, Azmzt; Othmane, Lotfi Ben
Proc. of the 11th International Conference on Availabil- ity, Reliability and Security (ARES)
Sprache: German
[Conference Proceedings]

Towards efficient security assurance for incremental software development the case of zen cart application
Ali, A.; Othmane, L. ben
International Conference on Availability, Reliability and Security (ARES) <11, 2016, Salzburg>
Sprache: English
[Conference Paper]