Publikationen

Publikationen

Fault Attacks on UOV and Rainbow
Krämer, Juliane; Loiero, Mirjam
10th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2019)
[Conference Proceedings]


PILOT: Practical Privacy-Preserving Indoor Localization using OuTsourcing
Järvinen, Kimmo; Leppäkoski, Helena; Lohan, Elena Simona; Richter, Philipp; Schneider, Thomas; Tkachenko, Oleksandr; Yang, Zheng
4. IEEE European Symposium on Security and Privacy (EuroS&P'19)
[Conference Proceedings]


FastKitten: Practical Smart Contracts on Bitcoin
Das, Poulami; Eckey, Lisa; Frassetto, Tommaso; Gens, David; Hostáková, Kristina; Jauernig, Patrick; Faust, Sebastian; Sadeghi, Ahmad-Reza
28th USENIX Security Symposium
[Conference Proceedings]


ARM2GC: Succinct Garbled Processor for Secure Computation
Songhori, Ebrahim; Riazi, M. Sadegh; Hussain, Siam; Sadeghi, Ahmad-Reza; Koushanfar, Farinaz
Design Automation Conference (DAC), 2019 56th ACM/EDAC/IEEE
[Conference Proceedings]


Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks
Rodler, Michael; Li, Wenting; Karame, Ghassan O.; Davi, Lucas
Proceedings of 26th Annual Network & Distributed System Security Symposium (NDSS)
[Conference Proceedings]


Efficient Circuit-based PSI with Linear Communication
Pinkas, Benny; Schneider, Thomas; Tkachenko, Oleksandr; Yanai, Avishay
38. Advances in Cryptology -- EUROCRYPT 2019
[Conference Proceedings]


HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement
Nyman, Thomas; Dessouky, Ghada; Zeitouni, Shaza; Lehikoinen, Aaro; Paverd, Andrew; Asokan, N.; Sadeghi, Ahmad-Reza
DAC 2019
[Conference Proceedings]


Fake News Perception in Germany: A Representative Study of People's Attitudes and Approaches to Counteract Disinformation
Reuter, Christian; Hartwig, Katrin; Kirchner, Jan; Schlegel, Noah
Wirtschaftsinformatik Proceedings 2019, p.1069-1083
[Conference Proceedings]


IT in Peace, Conflict, and Security Research
Reuter, Christian; Aldehoff, Larissa; Riebe, Thea; Kaufhold, Marc-André
Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, p.11-37


Vulnerability Assessment in the Smart Farming Infrastructure through Cyberattacks
Linsner, Sebastian; Varma, Rashmi; Reuter, Christian
38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?
[Conference Proceedings]


Cultural Violence and Peace in Social Media
Kaufhold, Marc-André; Reuter, Christian
Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, p.361-381


Potentiale von IKT beim Ausfall kritischer Infrastrukturen: Erwartungen, Informationsgewinnung und Mediennutzung der Zivilbevölkerung in Deutschland
Kaufhold, Marc-André; Grinko, Margarita; Reuter, Christian; Schorch, Marén; Langer, Amanda; Skudelny, Sascha; Hollick, Matthias
Proceedings of the International Conference on Wirtschaftsinformatik
[Conference Proceedings]


TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter
Hartwig, Katrin; Reuter, Christian
Proceedings of the International Conference on Wirtschaftsinformatik (WI)
[Conference Proceedings]


Hybride Dienst­leis­tun­gen in digi­tali­sierten Kooperationen in der Landwirtschaft
Bernardi, Ansgar; Reuter, Christian; Schneider, Wolfgang; Linsner, Sebastian; Kaufhold, Marc-André
38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?
[Conference Proceedings]


A Holistic View on Organizational IT Security: The Influence of Contextual Aspects During IT Security Decisions
Heidt, Margareta; Gerlach, Jin; Buxmann, Peter
Hawaii International Conference on System Sciences (HICSS)
[Conference Proceedings]


Dual Use and Dilemmas for Cybersecurity, Peace and Technology Assessment
Riebe, Thea; Reuter, Christian
Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, p.165-183


Dual-Use in der IT: Bewertung in der Softwareentwicklung
Riebe, Thea; Reuter, Christian
Wissenschaft & Frieden
[Journal Article]


Behaviour & information technology : Special Issue on Social Media in Conflicts and Crises
Reuter, Christian; Stieglitz, Stefan; Imran, Muhammad
[Book]


The Future of Information Technology for Peace and Security
Reuter, Christian; Altmann, Jürgen; Aal, Konstantin; Aldehoff, Larissa; Buchmann, Johannes; Bernhardt, Ute; Denker, Kai; Herrmann, Dominik; Hollick, Matthias; Katzenbeisser, Stefan; Kaufhold, Marc-André; Nordmann, Alfred; Reinhold, Thomas; Riebe, Thea; Ripper, Annette; Ruhmann, Ingo; Saalbach, Klaus-Peter; Schörnig, Niklas; Sunyaev, Ali; Wulf, Volker
Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace


Information Technology for Peace and Security - Introduction and Overview
Reuter, Christian
Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, p.3-9


Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace
[Book]


Verification in Cyberspace
Reinhold, Thomas; Reuter, Christian
Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, p.257-275


From Cyber War to Cyber Peace
Reinhold, Thomas; Reuter, Christian
Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, p.139-164


Resilient Smart Farming (RSF) – Nutzung digitaler Tech­no­logien in krisensicherer Infrastruktur
Reuter, Christian; Schneider, Wolfgang; Eberz, Daniel
Informatik in der Land-, Forst- und Ernährungswirtschaft : Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen – ein Widerspruch in sich? Referate der 39. GIL-Jahrestagung, p.177-182
[Conference Proceedings]


SANCTUARY: ARMing TrustZone with User-space Enclaves
Brasser, Ferdinand; Gens, David; Jauernig, Patrick; Sadeghi, Ahmad-Reza; Stapf, Emmanuel
26th Annual Network & Distributed System Security Symposium (NDSS)
[Conference Proceedings]


TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V
Weiser, Samuel; Werner, Mario; Brasser, Ferdinand; Malenko, Maja; Mangard, Stefan; Sadeghi, Ahmad-Reza
26th Annual Network & Distributed System Security Symposium (NDSS)
[Conference Proceedings]


Nautilus: Fishing for Deep Bugs with Grammars
Aschermann, Cornelius; Frassetto, Tommaso; Holz, Thorsten; Jauernig, Patrick; Sadeghi, Ahmad-Reza; Teuchert, Daniel
26th Annual Network & Distributed System Security Symposium (NDSS)
[Conference Proceedings]


SoK: Modular and Efficient Private Decision Tree Evaluation
Kiss, Ágnes; Naderpour, Masoud; Liu, Jian; Asokan, N.; Schneider, Thomas
Proceedings on Privacy Enhancing Technologies (PoPETs)
[Journal Article]


RescueGlass: Collaborative Applications involving Head-Mounted Displays for Red Cross Rescue Dog Units
Reuter, Christian; Ludwig, Thomas; Mischur, Patrick
Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW), p.209-246
[Journal Article]


Perun: Virtual Payment Hubs over Cryptocurrencies
Dziembowski, Stefan; Eckey, Lisa; Faust, Sebastian; Malinowski, Daniel
39th IEEE Symposium on Security and Privacy
[Conference Proceedings]