Publikationen

Publikationen

Is your biometric system robust to morphing attacks?
Gomez-Barrero, M.; Rathgeb, C.; Scherhag, U.; Busch, C.
5th Intl. Workshop on Biometrics and Forensics IWBF, p.1-6
[Conference Proceedings]

Is Your Biometric System Robust to Morphing Attacks?
Gomez-Barrero, M.; Rathgeb, C.; Scherhag, U.; Busch, C.
Proc. 5th Intl. Workshop on Biometrics and Forensics (IWBF), p.1-6
[Conference Proceedings]

IT for Peace? Fighting Against Terrorism in Social Media – An Explorative Twitter Study
Reuter, Christian; Pätsch, Katja; Runft, Elena
i-com: Journal of Interactive Media, p.181-195
Sprache: English
[Journal Article]

IT-Rettung 2017: IT-Unterstützung in Emergency Management & Response
Pottebaum, Jens; Erfurth, Christian; Reuter, Christian
INFORMATIK 2017, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik
Sprache: German
[Conference Proceedings]

IT-Risikomanagement für Produktionssysteme - Basis zur Gestaltung sicherer Fertigungsprozesse
Kraft, Reiner; Stöwer, Mechthild
Sprache: German
[Book Article]

IT-Risikomanagement im Produktionsumfeld - He­raus­for­de­rung­en und Lösungsansätze
Kraft, Rainer; Stöwer, Mechthild
Sprache: German
[Journal Article]

IT-Sicherheitsaudits im Bereich der industriellen Produktion: Prüfkriterien und Vorgehensweise
Stöwer, Mechthild; Kraft, Reiner
Sprache: German
[Book Article]

JITGuard: Hardening Just-in-time Compilers with SGX
Frassetto, Tommaso; Gens, David; Liebchen, Christopher; Sadeghi, Ahmad-Reza
24th ACM Conference on Computer and Communications Security (CCS)
Sprache: English
[Conference Proceedings]

Just-in-Time Static Analysis
Do, Lisa Nguyen Quang; Ali, Karim; Livshits, Benjamin; Bodden, Eric; Smith, Justin; Murphy-Hill, Emerson
Proceedings of ISSTA ’17, p.447
Sprache: English
[Conference Proceedings]

Katwarn, NINA or FEMA? Multi-Method Study on Distribution, Use and Public Views on Crisis Apps
Reuter, Christian; Kaufhold, Marc-André; Leopold, Inken; Knipp, Hannah
European Conference on Information Systems (ECIS)
Sprache: English
[Conference Proceedings]

Kundenakzeptanz von Bluetooth-Beacons im Lebensmittelhandel
Leopold, Inken; Reuter, Christian
Mensch & Computer: Tagungsband
Sprache: German
[Conference Proceedings]

LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization
Arias, Orlando; Gens, David; Jin, Yier; Liebchen, Christopher; Sadeghi, Ahmad-Reza; Sullivan, Dean
20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2017)
Sprache: German
[Conference Proceedings]

Lessons Learned from Evaluating Eight Password Nudges in the Wild
Renaud, Karen; Maguire, Joseph; Zimmermann, Verena; Draper, Steve
Proceedings of LASER 2017 Learning from Authoritative Security Experiment Results, p.25-38
Sprache: English
[Conference Proceedings]

Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability
Buchmann, Johannes; Demirel, Denise; Schabhüser, Lucas; Struck, Patrick
C2SI 2017 - Codes, Cryptology and Information Security - Second International Conference in honor of Professor Claude Carlet, p.142-160
Sprache: German
[Conference Proceedings]

Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes
Günther, Felix; Poettering, Bertram
International Journal of Information Security, p.281-297
Sprache: English
[Journal Article]

LO-FAT: Low-Overhead Control Flow ATtestation in Hardware
Asokan, N.; Davi, Lucas; Dessouky, Ghada; Koeberl, Patrick; Nyman, Thomas; Paverd, Andrew; Sadeghi, Ahmad-Reza; Zeitouni, Shaza
Sprache: German
[Conference Proceedings]

LO-FAT: Low-Overhead Control Flow ATtestation in Hardware
Asokan, N.; Davi, Lucas; Dessouky, Ghada; Koeberl, Patrick; Nyman, Thomas; Paverd, Andrew; Sadeghi, Ahmad-Reza; Zeitouni, Shaza
54th Design Automation Conference (DAC'17)
Sprache: German
[Conference Proceedings]

LO-FAT: Low-Overhead Control Flow ATtestation in Hardware
Dessouky, Ghada; Zeitouni, Shaza; Nyman, Thomas; Paverd, Andrew; Davi, Lucas; Koeberl, Patrick; Asokan, N.; Sadeghi, Ahmad-Reza
54th Design Automation Conference (DAC'17)
Sprache: English
[Conference Proceedings]

Lokale partielle Verschlüsselung von Gesichtern in JPEG-Bildern
Stein, Richard; Steinebach, Martin; Waidner, Michael
Sprache: German
[Master Thesis]

Long-Term Secure Commitments via Extractable-Binding Commitments
Buldas, Ahto; Geihs, Matthias; Buchmann, Johannes
ACISP 2017 - 22nd Australasian Conference on Information Security and Privacy
Sprache: German
[Conference Proceedings]

Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions
Buldas, Ahto; Geihs, Matthias; Buchmann, Johannes
ProvSec 2017 - The 11th International Conference on Provable Security
Sprache: German
[Conference Proceedings]

Making Likelihood Ratios Digestible for Cross-Application Performance Assessment
Nautsch, A.; Meuwly, D.; Ramos, D.; Lindh, J.; Busch, C.
IEEE Signal Process. Lett., Vol.24, p.1552-1556
[Journal Article]

Making Likelihood Ratios Digestible for Cross-Application Performance Assessment
Nautsch, A.; Meuwly, D.; Ramos, D.; Lindh, J.; Busch, C.
IEEE Signal Processing Letters, Vol.24, p.1552-1556
[Journal Article]

Making malory behave maliciously: Targeted fuzzing of android execution environments
Rasthofer, Siegfried; Arzt, Steven; Triller, Stefan; Pradel, Michael
International Conference on Software Engineering (ICSE) <39, 2017, Buenos Aires>
Sprache: English
[Journal Article, Conference Paper]

Managing security work in scrum: Tensions and challenges
Türpe, Sven; Poller, Andreas
International Workshop on Secure Software Engineering in DevOps and Agile Development (SecSE) <2017, Oslo>
Sprache: English
[Conference Paper, Electronic Publication]