Publikationen

Publikationen

Overcoming obstacles: Encryption for everyone!
Stöwer, Mechthild; Rubinstein, Tatjana
Information Security Solutions Europe Conference (ISSE) 2015, Berlin>
Sprache: English
[Conference Paper]


On the secure distribution of vendor-specific keys in deployment scenarios
Kuntze, Nicolai; Fuchs, Anderas; Rudolph, Carsten
International Conference on ICT Systems Security and Privacy Protection (SEC) 30, 2015, Hamburg>
Sprache: English
[Conference Paper]


A novel image secret sharing scheme with meaningful shares
Cai, Hongliang; Liu, Huajian; Qizhao, Yuan; Steinebach, Martin; Xiaojing, Wang
International Conference on Acoustics, Speech, and Signal Processing (ICASSP) 40, 2015, Brisbane>
Sprache: English
[Conference Paper]


Mining apps for abnormal usage of sensitive data
Avdiienko, Vitalii; Kuznetsov, Konstantin; Gorla, Alessandra; Zeller, Andreas; Arzt, Steven; Rasthofer, Siegfried; Bodden, Eric
International Conference on Software Engineering (ICSE) 37, 2015, Florence>
Sprache: English
[Conference Paper]


The measurement of data locations in the cloud
Jaeger, Bernd; Kraft, Reiner; Luhn, Sebastian; Selzer, Annika; Waldmann, Ulrich
International Conference on Availability, Reliability and Security (ARES) 10, 2015, Toulouse>
Sprache: English
[Conference Paper]


Market-driven code provisioning to mobile secure hardware
Dmitrienko, A.; Heuser, S.; Nguyen, T.D.; Silva Ramos, M. da; Rein, A.; Sadeghi, A.-R.
International Conference on Financial Cryptography and Data Security (FC) 19, 2015, San Juan/Puerto Rico>
Sprache: English
[Conference Paper]


Literature review of the challenges of developing secure software using the agile approach
Oueslati, Hela; Rahman, Mohammad Masudur; Othmane, Lotfi ben
International Conference on Availability, Reliability and Security (ARES) 10, 2015, Toulouse>
Sprache: English
[Conference Paper]


Konsequenzen festgestellter Verstöße bei der Auftragsdatenverarbeitungskontrolle: Anwendbarkeit auf automatisierte Kontrollen im Rahmen der Erbringung von Cloud-Diensten
Kunz, Thomas; Selzer, Annika; Steiner, Simone
Sprache: German
[Journal Article]


jÄk: Using dynamic analysis to crawl and test modern web applications
Pellegrino, Giancarlo; Tschürtz, Constantin; Bodden, Eric; Rossow, Christian
International Symposium on Research in Attacks, Intrusions, and Defenses (RAID) 18, 2015, Kyoto>
Sprache: English
[Conference Paper]


IT-Sicherheit und Datenschutz im vernetzten Fahrzeug
Krauß, Christoph; Waidner, Michael
Sprache: German
[Journal Article]


An investigation of the Android/BadAccents malware which exploits a new Android tapjacking attack
Rasthofer, Siegfried; Asrar, Irfan; Huber, Stephan; Bodden, Eric
Sprache: English
[Report, Electronic Publication]


An integrated security and systems engineering process and modelling framework
Ruiz, J.F.; Mana, A.; Rudolph, C.
Sprache: English
[Journal Article]


Incremental development of RBAC-controlled E-marking system using the B method
Al-Hadhrami, Nasser; Aziz, Benjamin; Sardesai, Shantanu; Othmane, Lotfi ben
International Conference on Availability, Reliability and Security (ARES) 10, 2015, Toulouse>
Sprache: English
[Conference Paper]


Incorporating attacker capabilities in risk estimation and mitigation
Othmane, L. ben; Ranchal, R.; Fernando, R.; Bhargava, B.; Bodden, E.
Sprache: English
[Journal Article]


Impact of initial target position on performance of UAV surveillance using opportunistic resource utilization networks
Lilien, Leszek T.; Othmane, Lotfi ben; Angin, Pelin; Bhargava, Bharat; Salih, Raed M.; DeCarlo, Andrew
Symposium on Reliable Distributed Systems (SRDS) 34, 2015, Montréal>
Sprache: English
[Conference Paper]


IccTA: Detecting inter-component privacy leaks in Android apps
Li, Li; Bartel, Alexandre; Bissyande, Tegawende F.; Klein, Jacques; Le Traon, Yves; Arzt, Steven; Rasthofer, Siegfried; Bodden, Eric; Octeau, Damien; McDaniel, Patrick
International Conference on Software Engineering (ICSE) 37, 2015, Florence>
Sprache: English
[Conference Paper]


"I am because we are". Developing and nurturing an African digital security culture
Renaud, Karen; Flowerday, Stephen; Othmane, Lotfi ben; Volkamer, Melanie
African Cyber Citizenship Conference (ACCC) 2015, Port Elizabeth/South Africa>
Sprache: English
[Conference Paper]


How current android malware seeks to evade automated code analysis
Rasthofer, Siegfried; Asrar, Irfan; Huber, Stephan; Bodden, Eric
International Conference on Information Security Theory and Practice (WISTP) 9, 2015, Heraklion>
Sprache: English
[Conference Paper]


A generic authorship verification scheme based on equal error rates
Halvani, Oren; Winter, Christian
Conference and Labs of the Evaluation Forum (CLEF) 2015, Toulouse>
Sprache: English
[Conference Paper, Electronic Publication]


Generating secure service compositions
Pino, L.; Spanoudakis, G.; Fuchs, A.; Gürgens, S.
International Conference on Cloud Computing and Services Science (CLOSER) 4, 2014, Barcelona>
Sprache: English
[Conference Paper]


Future Internet Including 5G and Beyond: Presentation held at ICTP 2015, 1st IEEE International Conference on Telecommunications and Photonics, BUET, Dhaka, 26 - 28 December 2015
Khondoker, Rahamatullah
International Conference on Telecommunications and Photonics (ICTP) 1, 2015, Dhaka>
Sprache: English
[Presentation, Electronic Publication]


Forensic readiness: Emerging discipline for creating reliable and secure digital evidence
Endicott-Popovsky, B.; Kuntze, N.; Rudolph, C.
Sprache: English
[Journal Article]


Factors impacting the effort required to fix security vulnerabilities. An industrial case study
Othmane, L. ben; Chehrazi, G.; Bodden, E.; Tsalovski, P.; Brucker, A.D.; Miseldine, P.
Information Security Conference (ISC) 18, 2015, Trondheim>
Sprache: English
[Conference Paper]


EvoSE: Evolutionary symbolic execution
Baluda, Mauro
International Workshop on Automating Test Case Design, Selection and Evaluation (A-TEST) 6, 2015, Bergamo>
Sprache: English
[Conference Paper]


Dynamically provisioning isolation in hierarchical architectures
Falzon, Kevin; Bodden, Eric
Information Security Conference (ISC) 18, 2015, Trondheim>
Sprache: English
[Conference Paper]


DroidSearch: A tool for scaling Android app triage to real-world app stores
Rasthofer, Siegfried; Arzt, Steven; Kolhagen, Max; Pfretzschner, Brian; Huber, Stephan; Bodden, Eric; Richter, Philipp
Science and Information Conference (SAI) 2015, London>
Sprache: English
[Conference Paper]


Distributed security management for the IoT
Lincke, N.; Kuntze, N.; Rudolph, C.
International Symposium on Integrated Network Management (IM) 14, 2015, Ottawa>
Sprache: English
[Conference Paper]


Digital audio watermarking
Steinebach, Martin; Webster, John G.
Sprache: English
[Book Article]


Detection and forensics of domains hijacking
Borgwart, Andreas; Boukoros, Spyros; Shulman, Haya; Royeen, Carel van; Waidner, Michael
Global Communications Conference (GLOBECOM) 2015, San Diego/Calif.>
Sprache: English
[Conference Paper]


Datenschutz in Europa und den USA - Grenzüberschreitender Datenverkehr nach dem Safe Harbor Aus
Selzer, Annika
Sprache: German
[Electronic Publication, Science Communication Online, Internet Contribution]