Publikationen

Publikationen

AVR Processors as a Platform for Language-Based Security
Dewald, Florian; Mantel, Heiko; Weber, Alexandra
ESORICS - Proceedings of the 22nd European Symposium on Research in Computer Security
Sprache: German
[Conference Proceedings]


Zero Round-Trip Time for the Extended Access Control Protocol
Brendel, Jacqueline; Fischlin, Marc
ESORICS 2017 - 22nd European Symposium on Research in Computer Security
Sprache: German
[Conference Proceedings]


Zero Round-Trip Time for the Extended Access Control Protocol
Brendel, Jacqueline; Fischlin, Marc
Computer Security – ESORICS 2017. 22nd European Symposium on Research in Computer Security, Proceedings, p.297-314
Sprache: English
[Conference Proceedings]


LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization
Arias, Orlando; Gens, David; Jin, Yier; Liebchen, Christopher; Sadeghi, Ahmad-Reza; Sullivan, Dean
20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2017)
Sprache: German
[Conference Proceedings]


Mitigating Lateral Interference: Adaptive Beam Switching for Robust Millimeter-Wave Networks
Steinmetzer, Daniel; Loch, Adrian; García-García, Amanda; Widmer, Jörg; Hollick, Matthias
1st ACM Workshop on Millimeter Wave Networks and Sensing Systems (mmNets 2017), p.6
Sprache: English
[Conference Proceedings]


Nexmon: Build Your Own Wi-Fi Testbeds With Low-Level MAC and PHY-Access Using Firmware Patches on Off-the-Shelf Mobile Devices
Schulz, Matthias; Wegemer, Daniel; Hollick, Matthias
Proceedings of the 11th Workshop on Wireless Network Testbeds, Experimental Evaluation & CHaracterization, p.59-66
Sprache: English
[Conference Proceedings]


Off-the-Hook: An Efficient and Usable Client-Side Phishing Prevention Application
Marchal, Samuel; Armano, Giovanni; Gröndahl, Tommi; Saari, Kalle; Singh, Nidhi; Asokan, N.
IEEE Transactions on Computers, Vol.66, p.1717 - 1733
Sprache: English
[Conference Proceedings]


Password Assistance
Horsch, Moritz; Braun, Johannes; Buchmann, Johannes
Open Identity Summit 2017
Sprache: German
[Conference Proceedings]


Complexity Reduction in Graphs: A User Centric Approach to Graph Exploration
Grube, Tim; Volk, Florian; Mühlhäuser, Max; Bhairav, Suhas; Sachidananda, Vinay; Elovici, Yuval
10th International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, p.24-31
Sprache: German
[Conference Proceedings]


Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions
Buldas, Ahto; Geihs, Matthias; Buchmann, Johannes
ProvSec 2017 - The 11th International Conference on Provable Security
Sprache: German
[Conference Proceedings]


Hampering fault attacks against lattice-based signature schemes - countermeasures and their efficiency
Bindel, Nina; Krämer, Juliane; Schreiber, Johannes
CODES/ISSS ’17 Companion
Sprache: German
[Conference Proceedings]


Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics
Bindel, Nina; Buchmann, Johannes; Krämer, Juliane; Mantel, Heiko; Schickel, Johannes; Weber, Alexandra
The 10th International Symposium on Foundations & Practice of Security
Sprache: German
[Conference Proceedings]


Towards Blockchain-Based Collaborative Intrusion Detection Systems
Alexopoulos, Nikolaos; Vasilomanolakis, Emmanouil; Ivanko, Natalia Reka; Mühlhäuser, Max
12th International Conference on Critical Information Infrastructures Security (CRITIS 2017)
Sprache: English
[Conference Proceedings]


ATRIUM: Runtime Attestation Resilient Under Memory Attacks
Zeitouni, Shaza; Dessouky, Ghada; Arias, Orlando; Sullivan, Dean; Ibrahim, Ahmad; Jin, Yier; Sadeghi, Ahmad-Reza
2017 International Conference On Computer Aided Design (ICCAD'17)
Sprache: German
[Conference Proceedings]


Oblivious Neural Network Predictions via MiniONN Transformations
Liu, Jian; Juuti, Mika; Lu, Yao; Asokan, N.
ACM CCS 2017, ACM Conference on Computer and Communications Security
Sprache: German
[Conference Proceedings]


CogniCrypt: Supporting Developers in using Cryptography
Krüger, Stefan; Nadi, Sarah; Reif, Michael; Ali, Karim; Mezini, Mira; Bodden, Eric; Göpfert, Florian; Günther, Felix; Weinert, Christian; Demmler, Daniel; Kamath, Ram
Automated Software Engineering (ASE'17)
Sprache: English
[Conference Proceedings]


Towards Accelerated Usage Control based on Access Correlations
Gay, Richard; Hu, Jinwei; Mantel, Heiko; Schickel, Johannes
NordSec2017 - Nordic Conference on Secure IT Systems
Sprache: German
[Conference Proceedings]


Privacy-Preserving Whole-Genome Variant Queries
Demmler, Daniel; Hamacher, Kay; Schneider, Thomas; Stammler, Sebastian
16. International Conference on Cryptology And Network Security (CANS'17)
Sprache: English
[Conference Proceedings]


I Trust my Zombies: a Trust-enabled Botnet
Vasilomanolakis, Emmanouil; Wolf, Jan Helge; Böck, Leon; Mühlhäuser, Max; Karuppayah, Shankar
Blackhat Europe
Sprache: English
[Conference Proceedings]


An investigation of the effects of radiation on current key storage solutions and on Physical Unclonable Functions (PUFs) being used as key storage
Sarangdhar, Ravi; Fan, Yufan; Anagnostopoulos, Nikolaos Athanasios; Gayer, Udo; Flederer, Frank; Mikschl, Tobias; Arul, Tolga; John, Philipp R.; Hierholz, Kirsten; Montenegro, Sergio; Katzenbeisser, Stefan
27th Crypto-Day
Sprache: English
[Conference Proceedings]


More Efficient Universal Circuit Constructions
Günther, Daniel; Kiss, Ágnes; Schneider, Thomas
23. Advances in Cryptology -- ASIACRYPT 2017, p.443-470
Sprache: English
[Conference Proceedings]


SIXPACK: Securing Internet eXchange Points Against Curious onlooKers
Chiesa, Marco; Demmler, Daniel; Canini, Marco; Schapira, Michael; Schneider, Thomas
13. International Conference on emerging Networking EXperiments and Technologies (CoNEXT'17), p.120-133
Sprache: English
[Conference Proceedings]


Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β
Buchmann, Johannes; Holzer, Patrick; Wunderer, Thomas
INDOCRYPT 2017 - 18th International Conference on Cryptology in India
Sprache: English
[Conference Proceedings]


An extensive classification and analysis of attacks against Physical Unclonable Functions (PUFs)
Anagnostopoulos, Nikolaos Athanasios; Gabmeyer, Sebastian; Arul, Tolga; Katzenbeisser, Stefan
27th Crypto-Day
Sprache: English
[Conference Proceedings]


Revisiting the Expected Cost of Solving uSVP and Applications to LWE
Albrecht, Martin; Göpfert, Florian; Vidria, Fernando; Wunderer, Thomas
ASIACRYPT 2017 - Advances in Cryptology
Sprache: German
[Conference Proceedings]


Author clustering using compression-based dissimilarity scores: Notebook for PAN at CLEF 2017
Halvani, O.; Graner, L.
Conference and Labs of the Evaluation Forum (CLEF) 2017, Dublin>
Sprache: English
[Conference Paper, Electronic Publication]


Poster: X-ray your DNS
Klein, Amit; Kravtsov, Vladimir; Perlmuter, Alon; Shulman, Haya; Waidner, Michael
Conference on Computer and Communications Security (CCS) 2017, Dallas/Tex.>
Sprache: English
[Conference Paper]


Security Automation and Continuous Monitoring (SACM) Terminology
Birkholz, Henk; Lu, Jarrett; Strassner, John; Cam-Winget, Nancy; Monville, Adam
Sprache: English
[Report, Electronic Publication]


Guide for building an ECC pki
Moskowitz, Robert; Birkholz, Henk; Xia, Liang
Sprache: English
[Report, Electronic Publication]


Concise software identifiers
Birkholz, Henk; Fitzgerald-McKay, Jessica; Schmidt, Charles; Waltermire, David
Sprache: English
[Report, Electronic Publication]