Publikationen

Publikationen

CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory
Brasser, Ferdinand; Davi, Lucas; Gens, David; Liebchen, Christopher; Sadeghi, Ahmad-Reza
26th USENIX Security Symposium
Sprache: German
[Conference Proceedings]

Chancen und Risiken des Einsatzes digitaler Bildforensik - Aufdeckung und Beweisbarkeit von Versicherungsbetrug aus rechtlicher, technischer und psychologischer Sicht
Marschall, Kevin; Herfurth, Constantin; Winter, Christian; Allwinn, Mirko
Sprache: German
[Journal Article]

Cheetah: Just-in-Time Taint Analysis for Android Apps
Do, Lisa Nguyen Quang; Ali, Karim; Livshits, Benjamin; Bodden, Eric; Smith, Justin; Murphy-Hill, Emerson
2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C), p.39-42
Sprache: German
[Conference Proceedings]

CodeMatch: Obfuscation Won’t Conceal Your Repackaged App
Glanz, Leonid; Amann, Sven; Eichberg, Michael; Reif, Michael; Hermann, Ben; Lerch, Johannes; Mezini, Mira
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, p.638-648
Sprache: English
[Conference Proceedings]

CogniCrypt: Supporting Developers in using Cryptography
Krüger, Stefan; Nadi, Sarah; Reif, Michael; Ali, Karim; Mezini, Mira; Bodden, Eric; Göpfert, Florian; Günther, Felix; Weinert, Christian; Demmler, Daniel; Kamath, Ram
Automated Software Engineering (ASE'17)
Sprache: English
[Conference Proceedings]

Combining multiple iris texture features for unconstrained recognition in visible wavelengths
Andersen-Hoppe, E.; Rathgeb, C.; Busch, C.
5th Intl. Workshop on Biometrics and Forensics IWBF, p.1-6
[Conference Proceedings]

Combining multiple iris texture features for unconstrained recognition in visible wavelengths
Andersen-Hoppe, E.; Rathgeb, C.; Busch, C.
5th Intl. Workshop on Biometrics and Forensics IWBF, p.1-6
[Conference Proceedings]

Compilation for Secure Multi-party Computation
Büscher, Niklas; Katzenbeisser, Stefan
Sprache: English
[Book]

Complexity Reduction in Graphs: A User Centric Approach to Graph Exploration
Grube, Tim; Volk, Florian; Mühlhäuser, Max; Bhairav, Suhas; Sachidananda, Vinay; Elovici, Yuval
10th International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, p.24-31
Sprache: German
[Conference Proceedings]

Compressive Millimeter-Wave Sector Selection in Off-the-Shelf IEEE 802.11ad Devices
Steinmetzer, Daniel; Wegemer, Daniel; Schulz, Matthias; Widmer, Jörg; Hollick, Matthias
CoNEXT ’17: The 13th International Conference on emerging Networking EXperiments and Technologies
Sprache: English
[Conference Proceedings]

Concise software identifiers
Birkholz, Henk; Fitzgerald-McKay, Jessica; Schmidt, Charles; Waltermire, David
Sprache: English
[Report, Electronic Publication]

Constant Round Maliciously Secure 2PC with Function-Independent Preprocessing using LEGO
Nielsen, Jesper Buus; Schneider, Thomas; Trifiletti, Roberto
24. Annual Network and Distributed System Security Symposium (NDSS'17)
Sprache: English
[Conference Proceedings]

Constrained PET Composition for Measuring Enforced Privacy
Funke, Sebastian; Wiesmaier, Alexander; Daubert, Jörg
Proceedings of the 12th International Conference on Availability, Reliability and Security, p.1-16
[Conference Proceedings]

Constrained PET Composition for Measuring Enforced Privacy
Funke, Sebastian; Wiesmaier, Alexander; Daubert, Jörg
Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES), p.1-10
Sprache: English
[Conference Proceedings]

Counting in the Dark: Caches Discovery and Enumeration in the Internet
Klein, Amit; Shulman, Haya; Waidner, Michael
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
Sprache: English
[Conference Proceedings]

Counting in the Dark: Caches Discovery and Enumeration in the Internet
Klein, Amit; Shulman, Haya; Waidner, Michael
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
Sprache: German
[Conference Proceedings]

Counting in the dark: DNS caches discovery and enumeration in the internet
Klein, Amit; Shulman, Haya; Waidner, Michael
International Conference on Dependable Systems and Networks (DNS) <47, 2017, Denver/Colo.>
Sprache: English
[Conference Paper]

Cover Traffic: A Trade of Anonymity and Efficiency
Grube, Tim; Thummerer, Markus; Daubert, Jörg; Mühlhäuser, Max
Security and Trust Management. STM 2017., p.213-223
Sprache: German
[Conference Proceedings]

da/sec ASVspoof2017 Submission
Nautsch, A.; Scherhag, U.; Isadskiy, S.; Rathgeb, C.; Busch, C.
Prof. of the ASVspoof evaluation
[Conference Proceedings]

Das Privacy-Paradoxon - Ein Erklärungsversuch und Handlungsempfehlungen
Gerber, Paul; Volkamer, Melanie; Gerber, Nina
Dialogmarketing Perspektiven 2016/2017: Tagungsband 11. wissen­schaft­licher interdisziplinärer Kongress für Dialogmarketing, p.139-167
Sprache: German
[Conference Proceedings]

Das richtige Maß für Informationssicherheit: Möglichkeiten und Grenzen bei der Absicherung der IT
Stöwer, Mechthild
Sicherheitswirtschaftstage <16, 2015, Frankfurt/O.>
Sprache: German
[Conference Paper]

Database anonymization: Data utility and privacy leakage in generalization and microaggregation
Pasha, Jamal; Waidner, Michael; Schäfer, Marcel
Sprache: English
[Master Thesis]

Deep Quality-Informed Score Normalization for Privacy-Friendly Speaker Recognition in Unconstrained Environments
Nautsch, A.; T. Steen, S.; Busch, C.
Intl. Conf. of the Biometrics Special Interest Group BIOSIG 2017, p.1-4
[Conference Proceedings]

Deep Quality-Informed Score Normalization for Privacy-Friendly Speaker Recognition in Unconstrained Environments
Nautsch, A.; Steen, S. T.; Busch, C.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-4
[Conference Proceedings]

DEMO: Demonstrating Reactive Smartphone-Based Jamming
Schulz, Matthias; Hollick, Matthias; Gringoli, Francesco; Deligeorgopoulos, Efstathios
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017), p.285-287
Sprache: English
[Conference Proceedings]