Publikationen
Publikationen
Identifying Microcontroller Architecture Through Static Analysis of Firmware Binaries
Malaschonok, David
Workshop on Security and Privacy in Standardized IoT 2026
[Conference Paper]
IT and more: Kennzeichnungspflicht für KI-generierte Inhalte
Wache, Magdalena; Steinebach, Martin; Berchtold, Waldemar
[Journal Article]
Sicherheitsrisiken beim Client-Side-Scanning
Steinebach, Martin
[Journal Article]
Grammar as a behavioral biometric: using cognitively motivated grammar models for authorship verification
Nini, Andrea; Halvani, Oren; Graner, Lukas; Titze, Sophie; Gherardi, Valerio; Ishihara, Shunichi
[Journal Article]
Im Cybersicherheits- und Datenschutzgeflecht: Besser konsolidieren für mehr Innovation
Selzer, Annika; Kreutzer, Michael; Stummer, Sarah
Statistical Feature-Based Detection of Adversarial Noise and Patch Attacks in Image and Deepfake Analysis
Bunzel, Niklas; Frick, Raphael; Graner, Lukas; Göller, Nicolas; Steinebach, Martin
[Book Article]
Secure Medical Digital Twins: A Use-Case Driven Approach
Ahmad, Salmah; Bartelt, Bianca; Enzmann, Matthias; Kohlhammer, Jörn; Wesarg, Stefan; Wolf, Ruben
International Workshop on Digital Twin for Healthcare 2025
[Conference Paper]
Photonic Side-Channel Analyzer: Enabling Security-Aware Physical Design Methodology
Wang, Meizhi; Chen, Yi-Ru; Nibhanupudi, S.S. Teja; Amini, Elham; Saavedra, Antonio; Wang, Yinan; Wasserman, Daniel; Seifert, Jean-Pierre; Kulkarni, Jaydeep P.
International Symposium on Physical Design 2025
[Conference Paper]
Disinformation Analysis on Telegram: A Metadata-Centered, Privacy-Aware Dataset
Choi, Jeong-Eun; Schäfer, Karla; Yannikos, York; Steinebach, Martin
International Conference on Big Data 2025
[Conference Paper]
Towards Interpretable Suicide Risk Prediction: A Hybrid Approach with Feature Extraction and Sequential Binary Classification
Choi, Jeong-Eun; Fan, Shiying
International Conference on Big Data 2025
[Conference Paper]
Exploring the Relationship Between Network Similarity and Transferability of Adversarial Attacks
Klause, Gerrit; Bunzel, Niklas
International Conference on Trust, Security and Privacy in Computing and Communications 2025
[Conference Paper]
Können KI-Chatbots zum Datenschutz schulen?
Forina, Alina; Stummer, Sarah
[Study]
LENI: Lightweight and Efficient Network-Optimized Remote Attestation for IoT Devices
Eckel, Michael
International Conference on Trust, Security and Privacy in Computing and Communications 2025
[Conference Paper]
Who Appraises the Appraiser? Decentralized Attestation with Partial Appraisal and Aggregated Results
Eckel, Michael; Gkoktsis, George; Horn, Markus
International Conference on Trust, Security and Privacy in Computing and Communications 2025
[Conference Paper]
Towards Stateless Post-Quantum Remote Attestation for IoT Using TPM and DICE
Eckel, Michael; Gorbracht, Janik; Gkoktsis, George; Kaupat, Tobias
International Conference on Trust, Security and Privacy in Computing and Communications 2025
[Conference Paper]
Meldung von Sicherheitsvorfällen
Hardt, Mark Joshua; Stummer, Sarah
[Journal Article]
De-Anonymisierungsstrategien: Empirische Analyse und normative Implikationen
Stummer, Sarah; Hähle, Phillip
Gesellschaft für Informatik (Jahrestagung) 2025
[Conference Paper]
Weiterbildung zur Cybersicherheit
Schneider, Markus; Heftrig, Elias; Dukanovic, Sinisa; Dexheimer, Thomas
[Journal Article]
When Voices Deceive: Evaluating and Improving the Robustness of Audio Deepfake Detectors Under Adversarial Attacks
Schäfer, Karla; Ludwig, Leon
International Conference on Trust, Security and Privacy in Computing and Communications 2025
[Conference Paper]
Real-World Audio Deepfake Detection Using SSL-Based Speech Models and Diverse Training Data
Schäfer, Karla; Neu, Matthias
International Conference on Tools with Artificial Intelligence 2025
[Conference Paper]
Machine Learning-Based Detection of AI-Generated Text via Stylistic and Statistical Feature Modeling
Schäfer, Karla; Steinebach, Martin
International Conference on Trust, Security and Privacy in Computing and Communications 2025
[Conference Paper]
Comparative Analysis of Threat Assumptions in Field Level Protocol Security
Peters, Ludger; Gkoktsis, George; Cäsar, Matthias; Eckel, Michael
Standardization Workshop on Industrial Automation and Control Systems 2025
A Close Look at RMP Entry Caching and Its Security Implications in SEV-SNP
Bagia, Alexis; Ulitzsch, Vincent Quentin; Trujillo, Daniël; Li, Mengyuan; Yan, Mengjia; Seifert, Jean-Pierre
International Workshop on Hardware and Architectural Support for Security and Privacy 2025
[Conference Paper]
Demand-aware multi-source IP-multicast: Minimal congestion via link weight optimization
Bentert, Matthias; Franke, Max; Melnyk, Darya; Pourdamghani, Arash; Schmid, Stefan
Networking Conference 2025
[Conference Paper]
Uncovering linux desktop espionage
Schmidt, Lukas; Strasda, Sebastian; Schinzel, Sebastian
Annual Digital Forensics Research Conference 2025
[Journal Article]
DamFlow: Preventing a Flood of Irrelevant Data Flows in Android Apps
Alecci, Marco; Samhi, Jordan; Miltenberger, Marc; Arzt, Steven; Bissyandé, Tegawendé F.; Klein, Jacques
[Journal Article]
Securing Product Identity With Digital Fingerprinting
Berchtold, Waldemar; Steinebach, Martin
[Journal Article]
CounterSEVeillance: Performance-Counter Attacks on AMD SEV-SNP
Gast, Stefan; Weissteiner, Hannes; Schröder, Leander; Gruss, Daniel
Network and Distributed System Security Symposium 2025
[Conference Paper]
S/MINE: collecting and analyzing S/MIME certificates at scale
Öndarö, Gurur; Kaspereit, Jonas; Umezulike, Samson; Saatjohann, Christoph; Ising, Fabian; Schinzel, Sebastian
USENIX Security Symposium 2025
[Conference Paper]
Globale Tendenzen in nationalen Cybersicherheitsstrategien: Ein Leitfaden für die Strategieentwicklung
Gärtner, Tanya
Nationales Forschungszentrum für Angewandte Cybersicherheit (ATHENE-Konferenz) 2025
[Conference Paper]


