Publikationen
Publikationen
Investigating PKI and Routing Security
Frieß, Jens
[Thesis]
Distributed Construction of Demand-Aware Datacenter Networks
Figiel, Aleksander; Melnyk, Darya; Milentijevic, Tijana; Schmid, Stefan
39th IEEE International Parallel and Distributed Processing Symposium, IPDPS 2025
[Conference Paper]
Fraunhofer SIT at GenAI Detection Task 1: Adapter Fusion for AI-generated Text Detection
Schäfer, Karla; Steinebach, Martin
1st Workshop on GenAI Content Detection, GenAIDetect 2025
[Conference Paper]
Security Assessment of Mobile Banking Apps in West African Economic and Monetary Union
Diallo, Alioune; War, Aicha; Diouf, Moustapha Awwalou; Samhi, Jordan; Arzt, Steven; Bissyandé, Tégawendé François; Klein, Jacques
2nd Cybersecurity for Development, C4D 2025
[Conference Paper]
Learning to Identify Conflicts in RPKI
Shulman, Haya; Zhao, Shujie
20th ACM ASIA Conference on Computer and Communications Security, ASIA CCS 2025
[Conference Paper]
Enhancing Transparency and Trust in Remote Attestation for Secure IT and OT Systems
Eckel, Michael
[Thesis]
Secure Management of Connected Vehicles using Trusted Computing-enabled Central Security Provider
Plappert, Christian
[Thesis]
Recht und Technik - Datenschutz im Diskurs Vorwort zu den Workshopbeiträgen
Grimm, Rüdiger; Hornung, Gerrit; Sorge, Christoph; Döhmann genannt Spiecker, Indra
Gesellschaft für Informatik (Jahrestagung) 2025
[Conference Paper]
Automatisierung offensiver Cybersicherheitsmaßnahmen
Esser, Julia; Plötz, Caroline
Gesellschaft für Informatik (Jahrestagung) 2025
[Conference Paper]
Characterizing Hosting and Security Practices for Public-Facing LDAP Servers
Cesar, Gustavo Luvizotto; Öndarö, Gurur; Kaspereit, Jonas; Ising, Fabian; Schinzel, Sebastian; Jonker, Mattijs; Holz, Ralph G.
International Conference on Network and Service Management 2025
[Conference Paper]
Terminator: Enabling Efficient Fuzzing of Closed-Source GUI Programs by Automatic Coverage-Guided Termination
Zabel, Jonas; Kolvenbach, Philip; Arzt, Steven
International Conference on Automated Software Engineering 2025
[Conference Paper]
Photonic Side-Channel Analyzer: Enabling Security-Aware Physical Design Methodology
Wang, Meizhi; Chen, Yi-Ru; Nibhanupudi, S.S. Teja; Amini, Elham; Saavedra, Antonio; Wang, Yinan; Wasserman, Daniel; Seifert, Jean-Pierre; Kulkarni, Jaydeep P.
International Symposium on Physical Design 2025
[Conference Paper]
Disinformation Analysis on Telegram: A Metadata-Centered, Privacy-Aware Dataset
Choi, Jeong-Eun; Schäfer, Karla; Yannikos, York; Steinebach, Martin
International Conference on Big Data 2025
[Conference Paper]
Towards Interpretable Suicide Risk Prediction: A Hybrid Approach with Feature Extraction and Sequential Binary Classification
Choi, Jeong-Eun; Fan, Shiying
International Conference on Big Data 2025
[Conference Paper]
Exploring the Relationship Between Network Similarity and Transferability of Adversarial Attacks
Klause, Gerrit; Bunzel, Niklas
International Conference on Trust, Security and Privacy in Computing and Communications 2025
[Conference Paper]
Können KI-Chatbots zum Datenschutz schulen?
Forina, Alina; Stummer, Sarah
[Study]
LENI: Lightweight and Efficient Network-Optimized Remote Attestation for IoT Devices
Eckel, Michael
International Conference on Trust, Security and Privacy in Computing and Communications 2025
[Conference Paper]
Who Appraises the Appraiser? Decentralized Attestation with Partial Appraisal and Aggregated Results
Eckel, Michael; Gkoktsis, George; Horn, Markus
International Conference on Trust, Security and Privacy in Computing and Communications 2025
[Conference Paper]
Towards Stateless Post-Quantum Remote Attestation for IoT Using TPM and DICE
Eckel, Michael; Gorbracht, Janik; Gkoktsis, George; Kaupat, Tobias
International Conference on Trust, Security and Privacy in Computing and Communications 2025
[Conference Paper]
Meldung von Sicherheitsvorfällen
Hardt, Mark Joshua; Stummer, Sarah
[Journal Article]
De-Anonymisierungsstrategien: Empirische Analyse und normative Implikationen
Stummer, Sarah; Hähle, Phillip
Gesellschaft für Informatik (Jahrestagung) 2025
[Conference Paper]
Weiterbildung zur Cybersicherheit
Schneider, Markus; Heftrig, Elias; Dukanovic, Sinisa; Dexheimer, Thomas
[Journal Article]
When Voices Deceive: Evaluating and Improving the Robustness of Audio Deepfake Detectors Under Adversarial Attacks
Schäfer, Karla; Ludwig, Leon
International Conference on Trust, Security and Privacy in Computing and Communications 2025
[Conference Paper]
Real-World Audio Deepfake Detection Using SSL-Based Speech Models and Diverse Training Data
Schäfer, Karla; Neu, Matthias
International Conference on Tools with Artificial Intelligence 2025
[Conference Paper]
Machine Learning-Based Detection of AI-Generated Text via Stylistic and Statistical Feature Modeling
Schäfer, Karla; Steinebach, Martin
International Conference on Trust, Security and Privacy in Computing and Communications 2025
[Conference Paper]
Comparative Analysis of Threat Assumptions in Field Level Protocol Security
Peters, Ludger; Gkoktsis, George; Cäsar, Matthias; Eckel, Michael
Standardization Workshop on Industrial Automation and Control Systems 2025
A Close Look at RMP Entry Caching and Its Security Implications in SEV-SNP
Bagia, Alexis; Ulitzsch, Vincent Quentin; Trujillo, Daniël; Li, Mengyuan; Yan, Mengjia; Seifert, Jean-Pierre
International Workshop on Hardware and Architectural Support for Security and Privacy 2025
[Conference Paper]
Demand-aware multi-source IP-multicast: Minimal congestion via link weight optimization
Bentert, Matthias; Franke, Max; Melnyk, Darya; Pourdamghani, Arash; Schmid, Stefan
Networking Conference 2025
[Conference Paper]
Uncovering linux desktop espionage
Schmidt, Lukas; Strasda, Sebastian; Schinzel, Sebastian
Annual Digital Forensics Research Conference 2025
[Journal Article]
DamFlow: Preventing a Flood of Irrelevant Data Flows in Android Apps
Alecci, Marco; Samhi, Jordan; Miltenberger, Marc; Arzt, Steven; Bissyandé, Tegawendé F.; Klein, Jacques
[Journal Article]


