Publikationen

Publikationen

CodeMatch: Obfuscation Won’t Conceal Your Repackaged App
Glanz, Leonid; Amann, Sven; Eichberg, Michael; Reif, Michael; Hermann, Ben; Lerch, Johannes; Mezini, Mira
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, p.638-648
[Conference Proceedings]


IDEal: Efficient and Precise Alias-aware Dataflow Analysis
Späth, Johannes; Ali, Karim; Bodden, Eric
2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)
[Conference Proceedings]


The Status of Quantum-Based Long-Term Secure Communication over the Internet
Geihs, Matthias; Nikiforov, Oleg; Demirel, Denise; Sauer, Alexander; Butin, Denis; Günther, Felix; Alber, Gernot; Walther, Thomas; Buchmann, Johannes
[Report]


Compressive Millimeter-Wave Sector Selection in Off-the-Shelf IEEE 802.11ad Devices
Steinmetzer, Daniel; Wegemer, Daniel; Schulz, Matthias; Widmer, Jörg; Hollick, Matthias
CoNEXT ’17: The 13th International Conference on emerging Networking EXperiments and Technologies
[Conference Proceedings]


LARA - A Design Concept for Lattice-based Encryption
Bansarkhani, Rachid El
[Report]


LO-FAT: Low-Overhead Control Flow ATtestation in Hardware
Asokan, N.; Davi, Lucas; Dessouky, Ghada; Koeberl, Patrick; Nyman, Thomas; Paverd, Andrew; Sadeghi, Ahmad-Reza; Zeitouni, Shaza
[Conference Proceedings]


Fitness Trackers: Fit for Health but Unfit for Security and Privacy
Fereidooni, Hossein; Frassetto, Tommaso; Miettinen, Markus; Sadeghi, Ahmad-Reza; Conti, Mauro
The Second IEEE International Workshop on Safe, Energy-Aware, & Reliable Connected Health (CHASE-SEARCH)
[Conference Proceedings]


DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization
Brasser, Ferdinand; Capkun, Srdjan; Dmitrienko, Alexandra; Frassetto, Tommaso; Kostiainen, Kari; Müller, Urs; Sadeghi, Ahmad-Reza
[Report]


JITGuard: Hardening Just-in-time Compilers with SGX
Frassetto, Tommaso; Gens, David; Liebchen, Christopher; Sadeghi, Ahmad-Reza
24th ACM Conference on Computer and Communications Security (CCS)
[Conference Proceedings]


Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes
Günther, Felix; Poettering, Bertram
International Journal of Information Security, p.281-297
[Journal Article]


More Efficient Oblivious Transfer Extensions
Asharov, Gilad; Lindell, Yehuda; Schneider, Thomas; Zohner, Michael
Journal of Cryptology (JoC), p.805-858
[Journal Article]


Towards Trust-Aware Collaborative Intrusion Detection: Challenges and Solutions
Vasilomanolakis, Emmanouil; Habib, Sheikh Mahbub; Milaszewicz, Pavlos; Malik, Rabee Sohail; Mühlhäuser, Max
International Conference on Trust Management (IFIPTM), p.94-109
[Conference Proceedings]


Increasing the Resilience of Cyber Physical Systems in Smart Grid Environments using Dynamic Cells
Tundis, Andrea; Garcia Cordero, Carlos; Egert, Rolf; Garro, Alfredo; Mühlhäuser, Max
19th International Conference on Cyber-Physical Systems (ICCPS)
[Conference Proceedings]


Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors
Schulz, Steffen; Schaller, André; Kohnhäuser, Florian; Katzenbeisser, Stefan
ESORICS 2017 - European Symposium on Research in Computer Security, p.437-455
[Conference Proceedings]


Slow TCAM Exhaustion DDoS Attack
Pascoal, Tulio A.; Dantas, Yuri Gil; Fonseca, Iguatemi E.; Nigam, Vivek
Proceedings of the 32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC)
[Conference Proceedings]


Productivity vs. Security: Mitigating Conflicting Goals in Organizations
Mayer, Peter; Gerber, Nina; McDermott, Ronja; Volkamer, Melanie; Vogt, Joachim
Information and Computer Security, p.137-151
[Journal Article]


A Systematic Study of Cache Side Channels across AES Implementations
Mantel, Heiko; Weber, Alexandra; Köpf, Boris
Proceedings of the 9th International Symposium on Engineering Secure Software and Systems (ESSoS)
[Conference Proceedings]


A Systematic Study of Cache Side Channels across AES Implementations
Mantel, Heiko; Weber, Alexandra; Köpf, Boris
[Conference Proceedings]


Taming Message-passing Communication in Compositional Reasoning about Confidentiality
Li, Ximeng; Mantel, Heiko; Tasch, Markus
Proceedings of the 15th Asian Symposium on Programming Languages and Systems (APLAS)
[Conference Proceedings]


Taming Message-passing Communication in Compositional Reasoning about Confidentiality
Li, Ximeng; Mantel, Heiko; Tasch, Markus
[Conference Proceedings]


Das Privacy-Paradoxon - Ein Erklärungsversuch und Handlungsempfehlungen
Gerber, Paul; Volkamer, Melanie; Gerber, Nina
Dialogmarketing Perspektiven 2016/2017: Tagungsband 11. wissenschaftlicher interdisziplinärer Kongress für Dialogmarketing, p.139-167
[Conference Proceedings]


Towards Accelerated Usage Control based on Access Correlations
Gay, Richard; Hu, Jinwei; Mantel, Heiko; Schickel, Johannes
Proceedings of the 22nd Nordic Conference on Secure IT Systems (NordSec)
[Conference Proceedings]


Relationship-Based Access Control for Resharing in Decentralized Online Social Networks
Gay, Richard; Hu, Jinwei; Mantel, Heiko; Mazaheri, Sogol
Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS)
[Conference Proceedings]


Relationship-Based Access Control for Resharing in Decentralized Online Social Networks
Gay, Richard; Hu, Jinwei; Mantel, Heiko; Mazaheri, Sogol
[Conference Proceedings]


AVR Processors as a Platform for Language-Based Security
Dewald, Florian; Mantel, Heiko; Weber, Alexandra
Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS)
[Conference Proceedings]


AVR Processors as a Platform for Language-Based Security
Dewald, Florian; Mantel, Heiko; Weber, Alexandra
[Conference Proceedings]


Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics
Bindel, Nina; Buchmann, Johannes; Krämer, Juliane; Mantel, Heiko; Schickel, Johannes; Weber, Alexandra
Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS)
[Conference Proceedings]


Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics
Bindel, Nina; Buchmann, Johannes; Krämer, Juliane; Mantel, Heiko; Schickel, Johannes; Weber, Alexandra
[Conference Proceedings]


Sicherheit in der Kommunikation: kostenloses Maßnahmen-Angebot für KMU gegen Internetbetrug
Rehfeld, Silke; Volkamer, Melanie; Neumann, Stephan
>Mittelstand 4.0 - Agentur Kommunikation
[Journal Article]


Scalable Attestation Resilient to Physical Attacks for Embedded Devices in Mesh Networks
Kohnhäuser, Florian; Büscher, Niklas; Gabmeyer, Sebastian; Katzenbeisser, Stefan
arXiv
[Journal Article]