Publikationen

Publikationen

Negative Results of Fusing Code and Documentation for Learning to Accurately Identify Sensitive Source and Sink Methods. An Application to the Android Framework for Data Leak Detection
Samhi, Jordan; Kober, Maria; Kabore, Abdoul Kader; Arzt, Steven; Bissyande, Tegawende F.; Klein, Jacques
International Conference on Software Analysis, Evolution and Reengineering 2023
[Paper]


Downgrading DNSSEC: How to Exploit Crypto Agility for Hijacking Signed Zones
Heftrig, Elias; Shulman, Haya; Waidner, Michael
USENIX Security Symposium 2023
[Conference Paper]


Negative Results of Fusing Code and Documentation for Learning to Accurately Identify Sensitive Source and Sink Methods
Samhi, Jordan; Kober, Maria; Kaboré, Abdoul Kader; Arzt, Steven; Bissyandé, Tégawendé François; Klein, Jacques
International Conference on Software Analysis, Evolution and Reengineering 2023
[Conference Paper]


Benchmarking the Benchmarks
Miltenberger, Marc; Arzt, Steven; Holzinger, Philipp; Näumann, Julius
Asia Conference on Computer and Communications Security 2023
[Conference Paper]


An Analysis of PhotoDNA
Steinebach, Martin
International Conference on Availability, Reliability and Security 2023
[Conference Paper]


Tracing Cryptographic Agility in Android and iOS Apps
Heid, Kris; Heider, Jens; Ritscher, Matthias; Stotz, Jan-Peter
International Conference on Information Systems Security and Privacy 2023
[Conference Paper]


Users' Privacy Literacy, Motivation to use Tor and Further Privacy Protecting Behavior
Platzer, Florian; Lux, Alexandra
International Symposium on Technikpsychologie 2023
[Conference Paper]


Collaborative Security Patterns for Automotive Electrical/Electronic Architectures
Fenzl, Florian; Plappert, Christian; Rieke, Roland; Zelle, Daniel; Costantino, Gianpiero; Vincenzi, Marco De; Matteucci, Ilaria
[Book Article]


Meso-Facets for Goniochromatic 3D Printing
Abu Rmaileh, Lubna; Brunton, Alan
[Journal Article]


Asymptotically Tight Bounds on the Time Complexity of Broadcast and its Variants in Dynamic Networks
El-Hayek, Antoine; Henzinger, Monika; Schmid, Stefan
Innovations in Theoretical Computer Science Conference 2023
[Conference Paper]


The Time Complexity of Consensus Under Oblivious Message Adversaries
Winkler, Kyrill; Paz, Ami; Galeana, Hugo Rincon; Schmid, Stefan; Schmid, Ulrich
Innovations in Theoretical Computer Science Conference 2023
[Conference Paper]


On the Feasibility of Single-Trace Attacks on the Gaussian Sampler Using a CDT
Marzougui, Soundes; Kabin, Ievgen; Krämer, Juliane; Aulbach, Thomas; Seifert, Jean-Pierre
International Workshop on Constructive Side-Channel Analysis and Secure Design 2023
[Conference Paper]


Post-quantum Security for the Extended Access Control Protocol
Fischlin, Marc; Heyden, Jonas von der; Margraf, Marian; Morgner, Frank; Wallner, Andreas; Bock, Holger
Security Standardisation Research, p.22-52
[Conference Proceedings]


Towards detecting device fingerprinting on iOS with API function hooking
Heid, Kris; Andrae, Vincent; Heider, Jens
European Interdisciplinary Cybersecurity Conference 2023
[Conference Paper]


Massively Parallel Adaptive Collapsing of Edges for Unstructured Tetrahedral Meshes
Ströter, Daniel; Stork, Andre; Fellner, Dieter
Symposium "High-Performance Graphics" 2023
[Conference Paper]


Dynamic Maintenance of Monotone Dynamic Programs and Applications
Henzinger Rauch, Monika; Neumann, Stefan; Räcke, Harald; Schmid, Stefan
International Symposium on Theoretical Aspects of Computer Science 2023
[Conference Paper]


Duo: A High-Throughput Reconfigurable Datacenter Network Using Local Routing and Control
Zerwas, Johannes; Györgyi, Csaba; Blenk, Andreas; Schmid, Stefan; Avin, Chen
International Conference on Measurement and Modeling of Computer Systems 2023
[Conference Paper]


Disorientation Faults in CSIDH
Banegas, Gustavo; Krämer, Juliane; Lange, Tanja; Meyer, Michael; Panny, Lorenz; Reijnders, Krijn; Sotáková, Jana; Trimoska, Monika
Advances in Cryptology - EUROCRYPT 2023, p.310-342
[Conference Proceedings]


A Lightweight Identification Protocol Based on Lattices
Düzlü, Samed; Krämer, Juliane; Pöppelmann, Thomas; Struck, Patrick
Public-Key Cryptography - PKC 2023, p.95-113
[Conference Proceedings]


Visual Computing Report
[Report]


Combining seeded region growing and k-nearest neighbours for the segmentation of routinely acquired spatio-temporal image data
Zerweck, Lukas; Wesarg, Stefan; Kohlhammer, Jörn; Köhm, Michaela
International Congress and Exhibition on Computer Assisted Radiology and Surgery 2024
[Journal Article]


SAFEFL: MPC-friendly Framework for Private and Robust Federated Learning
Gehlhar, Till; Marx, Felix; Schneider, Thomas; Suresh, Ajith; Wehrle, Tobias; Yalame, Hossein
6th Deep Learning Security and Privacy Workshop (DLSP 2023)
[Conference Proceedings]


FLUTE: Fast and Secure Lookup Table Evaluations
Brüggemann, Andreas; Hundt, Robin; Schneider, Thomas; Suresh, Ajith; Yalame, Hossein
Proceedings: 44th IEEE Symposium on Security and Privacy: SP 2023, p.515-533
[Conference Proceedings]


ExTRUST: Reducing exploit stockpiles with a privacy-preserving depletion system for inter-state relationships
Reinhold, Thomas; Kühn, Philipp; Günther, Daniel; Schneider, Thomas; Reuter, Christian
IEEE Transactions on Technology and Society, p.158-170
[Journal Article]


MARIA - Innovative Maritime Serviceprodukte durch Einsatz von Augmented Reality und intelligenten Assistenzsystemen
Bauer, Kristine; Novikova, Anastasiia; Petersen, Arne; Imenkamp, Charlotte; Göbel, Davy; Möhr, Thomas; Nonnemann, Lars; Voskamp, Jörg; Aehnelt, Mario; Martius, Christoph Georg Rudolf; Müller, Joshua; Zacharias, Miriam; John, Ole; Ritter, Holger; Koch, Uwe; Nikschat, Wolfgang; Ritter, Jan; Petz, Gerhard; Ebeling, Rolf; Wörheide, Arne; Somogyi, Tom; Raupach, Anton; Meißner, Robert; Tewes, Inga; Gülenc, Mustafa; Mesbah, Ahmed; Schady, Rico; Wagner, Philipp; Wiegershaus, Uwe; Kaufmann, Wilhelm; Sassmannshausen, Jens; Schulze, Kristina; Jantzen, Andreas; Pauly, Thomas
[Book Article]


Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning
Sendner, Christoph; Chen, Huili; Fereidooni, Hossein; Petzi, Lukas; König, Jan; Stang, Jasper; Dmitrienko, Alexandra; Sadeghi, Ahmad-Reza; Koushanfar, Farinaz
Network and Distributed Systems Security (NDSS) Symposium 2023
[Conference Proceedings]


DARWIN: Survival of the Fittest Fuzzing Mutators
Jauernig, Patrick; Jakobovic, Domagoj; Picek, Stjepan; Stapf, Emmanuel; Sadeghi, Ahmad-Reza
Network and Distributed Systems Security (NDSS) Symposium 2023
[Conference Proceedings]


Angemessene technische und organisatorische Maßnahmen
Gärtner, Tanya; Selzer, Annika
[Journal Article]


Boosting the Generalizability and Fairness of Presentation Attack Detection
Fang, Meiling
[Thesis]


How to Count Bots in Longitudinal Datasets of IP Addresses
Böck, Leon; Levin, Dave; Padmanabhan, Ramakrishna; Doerr, Christian; Mühlhäuser, Max
30th Annual Network and Distributed System Security Symposium, NDSS 2023, San Diego, California, USA, February 27 - March 3, 2023
[Conference Proceedings]