Publikationen
Publikationen
Deepfakes: A New Kind of Adversarial Attacks Against Face Recognition Systems?
Frick, Raphael Antonius; Graner, Lukas
23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024
[Conference Paper]
Adapter fusion for check-worthiness detection - combining a task adapter with a NER adapter
Vogel, Inna; Möhle, Pauline; Meghana, Meghana; Steinebach, Martin
4th Workshop on Reducing Online Misinformation through Credible Information Retrieval, ROMCIR 2024
[Conference Paper]
Improved identification of check-worthiness in social media data through multimodal analyses
Frick, Raphael Antonius; Steinebach, Martin
4th Workshop on Reducing Online Misinformation through Credible Information Retrieval, ROMCIR 2024
[Conference Paper]
Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms
Frieß, Johannes L.; Gattermayer, Tobias; Gelernter, Nethanel; Shulman, Haya; Waidner, Michael
21st USENIX Symposium on Networked Systems Design and Implementation, NSDI 2024
[Conference Paper]
Profiling Side-Channel Attacks on Dilithium: A Small Bit-Fiddling Leak Breaks It All
Ulitzsch, Vincent Quentin; Marzougui, Soundes; Tibouchi, Mehdi; Seifert, Jean Pierre
29th International Conference on Selected Areas in Cryptography, SAC 2022
[Conference Paper]
Color calibration for multicolored barcodes using smartphones
Bugert, Simon; Heeger, Julian; Berchtold, Waldemar
IS and T International Symposium on Electronic Imaging 2024: Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications 2024
[Conference Paper]
FraunhoferSIT@EXIST2024: Leveraging Stacking Ensemble Learning for Sexism Detection
Fan, Shiying; Frick, Raphael Antonius; Steinebach, Martin
25th Working Notes of the Conference and Labs of the Evaluation Forum, CLEF 2024
[Conference Paper]
Fraunhofer SIT at CheckThat! 2024: Adapter Fusion for Check-Worthiness Detection
Vogel, Inna; Möhle, Pauline
25th Working Notes of the Conference and Labs of the Evaluation Forum, CLEF 2024
[Conference Paper]
Sovereign document verification by smartphones
Berchtold, Waldemar; Heeger, Julian; Bugert, Simon; Biermann, Lukas; Liu, Huajian
IS and T International Symposium on Electronic Imaging 2024: Media Watermarking, Security, and Forensics, MWSF 2024
[Conference Paper]
Evaluating an Open-Source Hardware Approach from HDL to GDS for a Security Chip Design - a Review of the Final Stage of Project HEP
Henkes, Tim; Reith, Steffen; Stöttinger, Marc; Herfurth, Norbert; Panić, Goran; Wälde, Julian; Buschkowski, Fabian; Sasdrich, Pascal; Lüth, Christoph; Funck, Milan; Kiyan, Tuba; Weber, Arnd; Boeck, Detlef; Rathfelder, Rene; Grawunder, Torsten
2024 Design, Automation and Test in Europe Conference and Exhibition, DATE 2024
[Conference Paper]
Good Gottesman-Kitaev-Preskill codes from the NTRU cryptosystem
Conrad, Jonathan; Eisert, Jens; Seifert, Jean Pierre
[Journal Article]
Fraunhofer SIT at WASSA 2024 Empathy and Personality Shared Task: Use of Sentiment Transformers and Data Augmentation With Fuzzy Labels to Predict Emotional Reactions in Conversations and Essays
Frick, Raphael Antonius; Steinebach, Martin
14th Workshop on Computational Approaches to Subjectivity, Sentiment, and Social Media Analysis, WASSA 2024
[Conference Paper]
Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks
Schröder, Robin Leander; Gast, Stefan; Guo, Qian
33rd USENIX Security Symposium, USENIX Security 2024
[Conference Paper]
LanDscAPe: Exploring LDAP Weaknesses and Data Leaks at Internet Scale
Kaspereit, Jonas; Öndarö, Gurur; Cesar, Gustavo Luvizotto; Ebbers, Simon; Ising, Fabian; Saatjohann, Christoph; Jonker, Mattijs; Holz, Ralph G.; Schinzel, Sebastian
33rd USENIX Security Symposium, USENIX Security 2024
[Conference Paper]
Attacking with Something That Does Not Exist: ‘Proof of Non-Existence’ Can Exhaust DNS Resolver CPU
Gruza, Olivia; Heftrig, Elias; Jacobsen, Oliver; Shulman, Haya; Vogel, Niklas; Waidner, Michael
18th USENIX WOOT Conference on Offensive Technologies, WOOT 2024
[Conference Paper]
What All the Phuzz Is About: A Coverage-guided Fuzzer for Finding Vulnerabilities in PHP Web Applications
Neef, Sebastian; Kleissner, Lorenz; Seifert, Jean Pierre
19th ACM Asia Conference on Computer and Communications Security, AsiaCCS 2024
[Conference Paper]
Dynamically Generating Callback Summaries for Enhancing Static Analysis
Arzt, Steven; Miltenberger, Marc; Näumann, Julius
38th European Conference on Object-Oriented Programming, ECOOP 2024
[Conference Paper]
Toward Self-Adjusting k-Ary Search Tree Networks
Feder, Evgeniy; Paramonov, Anton; Mavrin, P. A.; Salem, Iosif; Aksenov, Vitaly E.; Schmid, Stefan
32nd Annual European Symposium on Algorithms, ESA 2024
[Conference Paper]
Musketeer: Incentive-Compatible Rebalancing for Payment Channel Networks
Avarikioti, Zeta; Schmid, Stefan; Tiwari, Samarth
6th Conference on Advances in Financial Technologies, AFT 2024
[Conference Paper]
Advanced Persistent Threat Attack Detection Systems: A Review of Approaches, Challenges, and Trends
Buchta, Robin; Gkoktsis, Georgios; Heine, Felix; Kleiner, Carsten
[Journal Article]
Analyzing the Effectiveness of Image Preprocessing Defenses Under Runtime Constraints
Bunzel, Niklas; Klause, Gerrit
International Conference on Trust, Security and Privacy in Computing and Communications 2024
[Conference Paper]
The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC
Heftrig, Elias; Shulman, Haya; Vogel, Niklas; Waidner, Michael
Conference on Computer and Communications Security 2024
[Conference Paper]
WAPITI - A Weighted Bayesian Method for Private Information Inference on Social Ego Networks
Simo Fhom, Hervais-Clemence; Kreutzer, Michael
International Conference on Trust, Security and Privacy in Computing and Communications 2024
[Conference Paper]
Broadcast and Consensus in Stochastic Dynamic Networks with Byzantine Nodes and Adversarial Edges
El-Hayek, Antoine; Henzinger, Monika; Schmid, Stefan
International Symposium on Distributed Computing 2024
[Conference Paper]
Poster: From Fort to Foe: The Threat of RCE in RPKI
Jacobsen, Oliver; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Conference on Computer and Communications Security 2024
[Conference Paper]
Reliability Assurance in RIS-Assisted 6G Campus Networks
Tohidi, Ehsan; Franke, Max; Phung, Cao Vien; Khan, Naveed; Drummond, André; Schmid, Stefan; Jukan, Admela; Stanczak, Slawomir
International Conference on the Design of Reliable Communication Networks 2024
[Conference Paper]
RIS as a Network Resource: User Multiplexing and Pricing Algorithms
Papadopoulos, Alexandros; Lalas, Antonios; Votis, Konstantinos; Schmid, Stefan; Katsalis, Kostas; Liaskos, Christos
International Conference on 6G Networking 2024
[Conference Paper]
Baiji: Domain Planning for CDNs under the 95th Percentile Billing Model
Vanerio, Juan; Liu, Huiran; Zhang, Qi; Schmid, Stefan
Networking Conference 2024
[Conference Paper]
L3: Latency-aware Load Balancing in Multi-Cluster Service Mesh
Michaelis, Olivier; Schmid, Stefan; Mostafaei, Habib
International Middleware Conference 2024
[Conference Paper]
HaMAYO: A Fault-Tolerant Reconfigurable Hardware Implementation of the MAYO Signature Scheme
Sayari, Oussama; Marzougui, Soundes; Aulbach, Thomas; Krämer, Juliane; Seifert, Jean-Pierre
International Workshop on Constructive Side-Channel Analysis and Secure Design 2024
[Conference Paper]


