Publikationen
Publikationen
Transparency in Messengers. A Metadata Analysis Based on the Example of Telegram
Schäfer, Karla; Choi, Jeong-Eun
Conference on Hypertext and Social Media 2023
[Conference Paper]
RulEth: Genetic Programming-Driven Derivation of Security Rules for Automotive Ethernet
Gail, Felix; Rieke, Roland; Fenzl, Florian
European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases 2023
[Conference Paper]
Transferrability of Adversarial Attacks from Convolutional Neural Networks to ChatGPT4
Bunzel, Niklas
[Paper]
Superpolynomial quantum-classical separation for density modeling
Pirnay, Niklas; Sweke, Ryan; Eisert, Jens; Seifert, Jean-Pierre
[Journal Article]
Evaluating the applicability of hardware trust anchors for automotive applications
Plappert, Christian; Lorych, Dominik; Eckel, Michael; Jäger, Lukas; Fuchs, Andreas; Heddergott, Ronald
[Journal Article]
Trojan awakener: detecting dormant malicious hardware using laser logic state imaging (extended version)
Krachenfels, Thilo; Seifert, Jean-Pierre; Tajik, Shahin
[Journal Article]
Post Pandemic Follow-Up – How Data Sharing Can Be Reached in a Privacy-Friendly Way to Prepare Us for a Smart World
Selzer, Annika; Timm, Ingo J.
Fachtagung Software Engineering 2023
[Conference Paper]
Digitalisierung: Chancen nutzen, Risiken vermeiden
Selzer, Annika; Ingo J. Timm
Fachtagung Software Engineering 2023
[Conference Paper]
Umbruch im Datenschutz
Selzer, Annika
Fachtagung Software Engineering 2023
[Conference Paper]
Leben in Metaversen und im Virtual Afterlife
Geissler, Ines
Fachtagung Software Engineering 2023
[Conference Paper]
Datenschutzrechtliche Rollen in Metaversen und im virtuellen Weiterleben
Geissler, Ines
Fachtagung Software Engineering 2023
[Conference Paper]
Der geplante US Active Cyber Defense Certainty Act - Ein Vorbild für Deutschland?
Kriegel, Jessica; Boll, Alina
Fachtagung Software Engineering 2023
[Conference Paper]
Towards a Taxonomy of Cyber Defence in International Law
Gärtner, Tanya
Fachtagung Software Engineering 2023
[Conference Paper]
Legal Requirements and Technical Metrics for Controlling Privacy of Employees' Location Data
Waldmann, Ulrich; Kunz, Thomas; Schleper, Janine; Kohn, Matthias; Pesch, Paulina Jo
Konferenz "Mensch und Computer" 2023
[Conference Paper]
Securing the Future Railway System: Technology Forecast, Security Measures, and Research Demands
Unger, Simon; Heinrichs, Markus; Scheuermann, Dirk; Katzenbeisser, Stefan; Schubert, Max; Hagemann, Leon; Iffländer, Lukas
[Journal Article]
Performance Analysis of Machine Learning Centered Workload Prediction Models for Cloud
Saxena, Deepika; Kumar, Jitendra; Singh, Ashutosh Kumar; Schmid, Stefan
[Journal Article]
Duo: A High-Throughput Reconfigurable Datacenter Network Using Local Routing and Control
Zerwas, Johannes; Györgyi, Csaba; Blenk, Andreas; Schmid, Stefan; Avin, Chen
Association for Computing Machinery, Special Interest Group on Performance Evaluation (ACM SIGMETRICS Conference) 2023
[Journal Article]
A Concise Analysis of Pasting Attacks and their Impact on Image Classification
Bunzel, Niklas; Graner, Lukas
International Conference on Dependable Systems and Networks Workshops 2023
[Conference Paper]
Adversarial Patch Detection and Mitigation by Detecting High Entropy Regions
Bunzel, Niklas; Siwakoti, Ashim; Klause, Gerrit
International Conference on Dependable Systems and Networks Workshops 2023
[Conference Paper]
Multi-class Detection for Off The Shelf transfer-based Black Box Attacks
Bunzel, Niklas; Böringer, Dominik
Workshop on Secure and Trustworthy Deep Learning Systems 2023
[Conference Paper]
Towards Mission Aware Cyber-Resiliency with Autonomous Agents
Gkoktsis, Georgios; Lauer, Hagen; Jäger, Lukas
Australasian Computer Science Week 2023
[Conference Paper]
Identifizierbarkeit und Anonymität im Internet
Stummer, Sarah
[Journal Article]
Extensible and Scalable Architecture for Hybrid Analysis
Miltenberger, Marc; Arzt, Steven
International Workshop on the State Of the Art in Program Analysis 2023
[Conference Paper]
Secure Multi-User Contract Certificate Management for ISO 15118-20 Using Hardware Identities
Plappert, Christian; Jäger, Lukas; Irrgang, Alexander; Potluri, Chandrasekhar
International Conference on Availability, Reliability and Security 2023
[Conference Paper]
Datenschutz in der offensiven Cybersicherheitsforschung
Boll, Alina; Selzer, Annika; Spiecker, Indra
Begriffsverwirrung verhindern: Was Maßnahmen Aktiver Cyberabwehr sind - und was nicht
Gärtner, Tanya; Selzer, Annika
A Generic IoT Quantum-Safe Watchdog Timer Protocol
Eckel, Michael; Gutsche, Tanja; Lauer, Hagen; Rein, André
International Conference on Availability, Reliability and Security 2023
[Conference Paper]
Context Correlation for Automated Dynamic Android App Analysis to Improve Impact Rating of Privacy and Security Flaws
Heid, Kris; Heider, Jens
International Conference on Risks and Security of Internet and Systems 2022
[Conference Paper]
Negative Results of Fusing Code and Documentation for Learning to Accurately Identify Sensitive Source and Sink Methods. An Application to the Android Framework for Data Leak Detection
Samhi, Jordan; Kober, Maria; Kabore, Abdoul Kader; Arzt, Steven; Bissyande, Tegawende F.; Klein, Jacques
International Conference on Software Analysis, Evolution and Reengineering 2023
[Paper]
Downgrading DNSSEC: How to Exploit Crypto Agility for Hijacking Signed Zones
Heftrig, Elias; Shulman, Haya; Waidner, Michael
USENIX Security Symposium 2023
[Conference Paper]