Publikationen

Publikationen

XDRI Attacks - and - How to Enhance Resilience of Residential Routers
Jeitner, Philipp; Schulmann, Haya; Teichmann, Lucas; Waidner, Michael
31st USENIX Security Symposium (USENIX Security 22), p.4473-4490
[Conference Proceedings]


Stalloris: RPKI Downgrade Attack
Hlavacek, Tomas; Jeitner, Philipp; Mirdita, Donika; Schulmann, Haya; Waidner, Michael
31st USENIX Security Symposium (USENIX Security 22), p.4455-4471
[Conference Proceedings]


Smart RPKI Validation: Avoiding Errors and Preventing Hijacks
Hlavacek, Tomas; Schulmann, Haya; Waidner, Michael
Computer Security — ESORICS 2022, p.509-530
[Conference Proceedings]


How (Not) to Deploy Cryptography on the Internet
Schulmann, Haya
Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy, p.1
[Conference Proceedings]


Poster: DNS in Routers Considered Harmful
Schulmann, Haya; Waidner, Michael
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3471-3473
[Conference Proceedings]


Poster: Insights into Global Deployment of RPKI Validation
Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3467-3469
[Conference Proceedings]


Poster: RPKI Kill Switch
Mirdita, Donika; Schulmann, Haya; Waidner, Michael
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3423-3425
[Conference Proceedings]


Poster: The Unintended Consequences of Algorithm Agility in DNSSEC
Heftrig, Elias; Schulmann, Haya; Waidner, Michael
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3363-3365
[Conference Proceedings]


Behind the Scenes of RPKI
Hlavacek, Tomas; Jeitner, Philipp; Mirdita, Donika; Schulmann, Haya; Waidner, Michael
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.1413-1426
[Conference Proceedings]


Special issue ESORICS 2021
Bertino, Elisa; Schulmann, Haya; Waidner, Michael
Journal of Computer Security, Vol.30, p.753-755
[Journal Article]


On the Challenges of Developing a Concise Questionnaire to Identify Privacy Personas
Biselli, Tom; Steinbrink, Enno; Herbert, Franziska; Schmidbauer-Wolf, Gina M.; Reuter, Christian
22nd Privacy Enhancing Technologies Symposium (PETS 2022)
[Conference Proceedings]


Dual-Use and Trustworthy? A Mixed Methods Analysis of AI Diffusion between Civilian and Defense R&D
Schmid, Stefka; Riebe, Thea; Reuter, Christian
Science and Engineering Ethics
[Journal Article]


LoRaWAN Security Issues and Mitigation Options by the Example of Agricultural IoT Scenarios
Kuntke, Franz; Romanenko, Vladimir; Linsner, Sebastian; Steinbrink, Enno; Reuter, Christian
Transactions on Emerging Telecommunications Technologies
[Journal Article]


A Design Science Artefact for Cyber Threat Detection and Actor Specific Communication
Eyilmez, Kaan; Basyurt, Ali Sercan; Stieglitz, Stefan; Fuchß, Christoph; Kaufhold, Marc-André; Reuter, Christian; Mirabaie, Milad
ACIS 2022 Proceedings
[Conference Proceedings]


Towards a Cyber Weapons Assessment Model – Assessment of the Technical Features of Malicious Software
Reinhold, Thomas; Reuter, Christian
IEEE Transactions on Technology and Society, p.226-239
[Journal Article]


Zwischen Destabilisierung und der Ermöglichung von Resilienz: Perspektiven aus den Technikwissenschaften, den Sozialwissenschaften und den Rechts­wis­sen­schaf­ten
Reuter, Christian; Göttsche, Malte; Frieß, Friederike; Thielbörger, Pierre; Vüllers, Johannes
Die Friedens-Warte : journal of inter­national peace and organization, p.241-243
[Journal Article]


Trustworthy and Explainable: A European Vision of (Weaponised) Artificial Intelligence
Schmid, Stefka
Die Friedens-Warte : journal of inter­national peace and organization, p.290-315
[Journal Article]


A quarter century of usable security and privacy research: transparency, tailorability, and the road ahead
Reuter, Christian; Lo Iacono, Luigi; Benlian, Alexander
Behaviour & Information Technology, p.2035-2048
[Journal Article]


U.S. Security Policy: The Dual-Use Regulation of Cryptography and its Effects on Surveillance
Riebe, Thea; Kuehn, Philipp; Imperatori, Philipp; Reuter, Christian
European Journal for Security Research, p.39-65
[Journal Article]


Zur Schnittmenge von Informatik mit Friedens- und Sicherheitsforschung: Erfahrungen aus der inter­dis­zi­pli­nären Lehre in der Friedensinformatik
Reuter, Christian; Riebe, Thea; Haunschild, Jasmin; Reinhold, Thomas; Schmid, Stefka
Zeitschrift für Friedens- und Konfliktforschung, p.129-140
[Journal Article]


Using Digitally Mediated Methods in Sensitive Contexts: A Threat Analysis and Critical Reflection on Security, Privacy, and Ethical Concerns in the Case of Afghanistan
Guntrum, Laura Gianna; Güldenring, Benjamin; Kuntke, Franz; Reuter, Christian
Zeitschrift für Friedens- und Konfliktforschung, p.95-128
[Journal Article]


Nudging Users Towards Better Security Decisions in Password Creation Using Whitebox-based Multidimensional Visualizations
Hartwig, Katrin; Reuter, Christian
Behaviour & Information Technology, p.1357-1380
[Journal Article]


Resilience in Agriculture: Communication and Energy Infrastructure Dependencies of German Farmers
Kuntke, Franz; Linsner, Sebastian; Steinbrink, Enno; Franken, Jonas; Reuter, Christian
International Journal of Disaster Risk Science, p.214-229
[Journal Article]


Remotely Accessing the Field and Building Trust with Distant Sources. Perspectives from Journalism Practice for Ethnographic Research
Guntrum, Laura Gianna; Keßler, Mira; Patel, Jignesh; Varfolomeeva, Anna
Global Media Journal - German Edition
[Journal Article]


Book Review: Artificial Intelligence and The Future of Warfare: The USA China and Strategic Stability. Johnson,J. Manchester: University Press. (2021)
Reinhold, Thomas; Reuter, Christian
Zeitschrift für Außen- und Sicherheitspolitik, p.353-355
[Journal Article]


Mensch und Computer 2022: Facing Realities - Tagungsband
[Conference Proceedings]


A European Perspective on Crisis Informatics: Citizens‘ and Authorities‘ Attitudes Towards Social Media for Public Safety and Security
Reuter, Christian
[Book]


Für eine umfassende, globale und aktive Abrüstungs- und Rüstungskontrollpolitik
Meier, Oliver; Brzoska, Michael; Ferl, Anna-Katharina; Hach, Sascha; Bayer, Markus; Mutschler, Max; Prem, Berenike; Reinhold, Thomas; Schmid, Stefka; Schwarz, Matthias
[Report]


Conference Proceedings : Science, Peace, Security '21 : The Impact of new Technologies: Destabilizing or Enabling Resilience? : 8-10 September 2021
Göttsche, Malte; Bauer, Sibylle; Dahlmann, Anja; Frieß, Friederike; Lentzos, Filippa; Neuneck, Götz; Niemeyer, Irmgard; Riebe, Thea; Silomon, Jantje; Reuter, Christian; Brochhaus, Jakob; Rademacher, Lukas
[Conference Proceedings]


The Digital Divide in State Vulnerability to Submarine Communications Cable Failure
Franken, Jonas; Reinhold, Thomas; Reichert, Lilian; Reuter, Christian
International Journal of Critical Infrastructure Protection
[Journal Article]