Publikationen

Publikationen

Phased Deployment of Distributed RPKI
Shrishak, Kris; Shulman, Haya
Kryptotag 2021
[Conference Paper]


A Systematic Hardening of Java's Information Hiding
Holzinger, Philipp; Boden, Eric
International Symposium on Advanced Security on Software and Systems (ASSS) 2021
[Conference Paper]


Wertschöpfung durch Software in Deutschland
Aichroth, Patrick; Bös, Joachim; Sladeczek, Christoph; Bodden, Eric; Liggesmeyer, Peter; Trapp, Mario; Falk Howar; Otto, Boris; Rehof, Jakob; Spiekermann, Markus; Arzt, Steven; Steffen, Barbara; Nouak, Alexander; Köhler, Henning
[Report]


Negotiating PQC for DNSSEC
Shrishak, Kris; Shulman, Haya
International Conference on Dependable Systems and Networks (DSN) 2021
[Conference Paper]


exHide: Hiding Data within the exFAT File System
Heeger, Julian; Yannikos, York; Steinebach, Martin
International Conference on Availability, Reliability and Security (ARES) 2021
[Conference Paper]


RNNIDS: Enhancing network intrusion detection systems through deep learning
Sohi, Soroush M.; Seifert, Jean-Pierre; Ganji, Fatemeh
[Journal Article]


Datenerfassung und -analyse von radikalen Online-Inhalten
Steinebach, Martin; Yannikos, York; Halvani, Oren; Vogel, Inna
[Book Article]


Remote Attestation Extended to the Analog Domain
Jäger, L.; Lorych, D.
International Conference on Availability, Reliability and Security (ARES) 2021
[Conference Paper]


ReactNet: Self-adjusting architecture for networked systems
Mostafaei, H.; Miri, S.M.; Schmid, S.
International Conference on Emerging Networking EXperiments and Technologies (CoNEXT) 2021
[Conference Paper]


Sustainable Solving: Reducing the Memory Footprint of IFDS-Based Data Flow Analyses Using Intelligent Garbage Collection
Arzt, Steven
International Conference on Software Engineering (ICSE) 2021
[Conference Paper]


Learnability of the output distributions of local quantum circuits
Hinsche, Marcel; Ioannou, Marios; Nietner, Alexander; Haferkamp, Jonas; Quek, Yihui; Hangleiter, Dominik; Seifert, Jean-Pierre; Eisert, Jens; Sweke, Ryan
[Paper]


Gestaltung eines Treuhand-Systems zum anonymen Datenaustausch in einer Smart-City-Umgebung. Gewährleistung angemessener Schutz­maß­nahmen
Selzer, Annika; Timm, Ingo J.
[Journal Article]


Brief Announcement: Sinkless Orientation is Hard also in the Supported LOCAL Model
Korhonen, Janne H.; Paz, Ami; Rybicki, Joel; Schmid, Stefan; Suomela, Jukka
International Symposium on Distributed Computing (DISC) 2021
[Conference Paper]


Privacy-Preserving IDS for In-Vehicle Networks with Local Differential Privacy
Franke, P.; Kreutzer, M.; Simo, H.
International Summer School on Privacy and Identity Management 2020
[Conference Paper]


In-vehicle detection of targeted CAN bus attacks
Fenzl, Florian; Rieke, Roland; Dominik, Andreas
International Conference on Availability, Reliability and Security (ARES) 2021
[Conference Paper]


Optimized Portable Unilateral Magnetic Resonance Sensor for Assessing the Aging Status of Silicon Rubber Insulators
Xu, Xianneng; Guo, Pan; Lu, Ming; Zhao, Shujie; Xu, Zheng
[Journal Article]


Datenschutzmetriken im Beschäftigungsverhältnis. Verifikation der datenschutzkonformen Einwilligung
Diel, Sarah; Kohn, Matthias; Schleper, Janine; Selzer, Annika
[Journal Article]


Efficient Network Monitoring Applications in the Kernel with eBPF and XDP
Abranches, Marcelo; Michel, Oliver; Keller, Eric; Schmid, Stefan
Conference on Network Functions Virtualization and Software-Defined Networking (NFV-SDN) 2021
[Conference Paper]


Machine Learning Analysis of IP ID Applications
Shulman, Haya; Zhao, Shujie
International Conference on Dependable Systems and Networks (DSN) 2021
[Conference Paper]


Critical Traffic Analysis on the Tor Network
Platzer, Florian; Schäfer, Marcel; Steinebach, Martin
International Conference on Availability, Reliability and Security (ARES) 2020
[Journal Article]


Not all Conflicts are Created Equal: Automated Error Resolution in RPKI Deployments
Hlavacek, Tomas; Shulman, Haya; Waidner, Michael
Conference on Computer Communications (INFOCOM) 2021
[Conference Paper]


On the Timing Leakage of the Deterministic Re-encryption in HQC KEM
Hlauschek, Clemens; Lahr, Norman; Schröder, Robin Leander
[Paper]


Userspace Software Integrity Measurement
Eckel, Michael; Riemann, Tim
International Conference on Availability, Reliability and Security (ARES) 2021
[Conference Paper]


DNS-over-TCP considered vulnerable
Dai, Tianxiang; Shulman, Haya; Waidner, Michael
Applied Networking Research Workshop (ANRW) 2021
[Conference Paper]


User-Centered Design of Visualizations for Software Vulnerability Reports
Reynolds, Steven Lamarr; Mertz, Tobias; Arzt, Steven; Kohlhammer, Jörn
Symposium on Visualization for Cyber Security (VizSec) 18, 2021, Online>
[Conference Paper]


PrivInferVis: Towards Enhancing Transparency over Attribute Inference in Online Social Networks
Simo, Hervais; Shulman, Haya; Schufrin, Marija; Reynolds, Steven Lamarr; Kohlhammer, Jörn
Conference on Computer Communications (INFOCOM) 2021, Online>
[Conference Paper]


MPC for securing internet infrastructure
Shrishak, K.; Shulman, H.
International Conference on Dependable Systems and Networks (DSN) 2020
[Conference Paper]


Optimal transport layer for secure computation
Brandt, M.; Orlandi, C.; Shrishak, K.; Shulman, H.
International Conference on Security and Cryptography (SECRYPT) 2020
[Conference Paper]


ASIC Accelerator in 28 nm for the Post-Quantum Digital Signature Scheme XMSS
Mohan, Prashanth; Wang, Wen; Jungk, Bernhard; Niederhagen, Ruben; Szefer, Jakub; Mai, Ken
International Conference on Computer Design (ICCD) 2020
[Conference Paper]


Sicherheit messen! Kennzahlensysteme zur Überwachung der Informationssicherheit
Stöwer, Mechthild; Kraft, Reiner
[Book Article]