Publikationen

Publikationen

High Performance Lattice-based CCA-secure Encryption
Bansarkhani, Rachid El; Buchmann, Johannes
Cryptology ePrint Archive, p.20
[Journal Article]


Market-driven Code Provisioning to Mobile Secure Hardware
Dmitrienko, Alexandra; Heuser, Stephan; Nguyen, Thien Duc; Ramos, Marcos da Silva; Rein, Andre; Sadeghi, Ahmad-Reza
Financial Cryptography and Data Security
[Conference Proceedings]


Hard Drive Side-Channel Attacks using Smartphone Magnetic Field Sensors
Biedermann, Sebastian; Katzenbeisser, Stefan; Szefer, Jakub
Financial Cryptography and Data Security - 19th International Conference, FC 2015, p.5-13
[Journal Article]


Wir müssen die Airbus-Idee für die europäische IT-Sicherheit wiederbeleben
Waidner, Michael
[Report]


Cipher-Suite Negotiation for DNSSEC: Hop-by-Hop or End-to-End?
Herzberg, Amir; Shulman, Haya
Internet Computing, IEEE, p.80-84
[Journal Article]


Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy
Gerber, Paul; Volkamer, Melanie; Renaud, Karen
ACM SIGCAS Computers and Society, p.16-21
[Journal Article]


Usability und Privacy im Android Ökosystem
Gerber, Paul; Volkamer, Melanie
Datenschutz und Datensicherheit, p.108 - 113
[Journal Article]


ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation
Demmler, Daniel; Schneider, Thomas; Zohner, Michael
22. Annual Network and Distributed System Security Symposium (NDSS'15)
[Conference Proceedings]


Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming
Davi, Lucas; Liebchen, Christopher; Sadeghi, Ahmad-Reza; Snow, Kevin; Monrose, Fabian
22nd Annual Network & Distributed System Security Symposium (NDSS)
[Conference Proceedings]


NoPhish App Evaluation: Lab and Retention Study
Canova, Gamze; Volkamer, Melanie; Bergmann, Clemens; Reinheimer, Benjamin
NDSS Workshop on Usable Security 2015
[Conference Proceedings]


Ask The Experts: Cybersecurity
Shannon, Greg; Waidner, Michael; Sonalker, Anuja
[Report]


Hybrid Communication Architecture for Emergency Response - An Implementation in Firefighter’s Use Case
Nguyen, The An Binh; Englert, Frank; Farr, Simon; Gottron, Christian; Böhnstedt, Doreen; Steinmetz, Ralf
2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), p.524-529
[Conference Proceedings]


A Concept for a C2X-based Crossroad Assistant
Burgstahler, D.; Pelzer, Matthias; Lotz, Andreas; Knapp, Fabian; Pu, Hongjun; Rueckelt, Tobias; Steinmetz, Ralf
2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), p.360-364
[Conference Proceedings]


Random-Oracle Uninstantiability from Indistinguishability Obfuscation
Brzuska, Christina; Farshim, Pooya; Mittelbach, Arno
Theory of Cryptography. TCC 2015., p.428-455
[Conference Proceedings]


Evaluation of User Feedback in Smart Home for Situational Context Identification
Alhamoud, Alaa; Xu, Pei; Englert, Frank; Scholl, Philipp; Nguyen, The An Binh; Böhnstedt, Doreen; Steinmetz, Ralf
2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), p.20-25
[Conference Proceedings]


Time-Reversal-Symmetric Single-Photon Wave Packets for Free-Space Quantum Communication
Trautmann, N.; Alber, G.; Agarwal, G. S.; Leuchs, G.
Physical Review Letters
[Journal Article]


TARDIS: Software-Only System-Level Record and Replay in Wireless Sensor Networks
Tancreti, Matthew; Sundaram, Vinaitheerthan; Bagchi, Saurabh; Eugster, Patrick
Proceedings of the 14th International Conference on Information Processing in Sensor Networks, p.286-297
[Conference Proceedings]


An Investigation of the Android/BadAccents Malware which Exploits a new Android Tapjacking Attack
Rasthofer, Siegfried; Asrar, Irfan; Huber, Stephan; Bodden, Eric
[Report]


Selective dynamical decoupling for quantum state transfer
Frydrych, H.; Hoskovec, A.; Jex, I.; Alber, G.
Journal of Physics B: Atomic, Molecular and Optical Physics
[Journal Article]


XiOS: Extended Application Sandboxing on iOS
Bucicoiu, Mihai; Davi, Lucas; Deaconescu, Razvan; Sadeghi, Ahmad-Reza
10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)
[Conference Proceedings]


More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries
Asharov, Gilad; Lindell, Yehuda; Schneider, Thomas; Zohner, Michael
34. Advances in Cryptology -- EUROCRYPT 2015, p.673-701
[Conference Proceedings]


Ciphers for MPC and FHE
Albrecht, Martin; Rechberger, Christian; Schneider, Thomas; Tiessen, Tyge; Zohner, Michael
34. Advances in Cryptology -- EUROCRYPT 2015, p.430-454
[Conference Proceedings]


Extracting Configuration Knowledge from Build Files with Symbolic Analysis
Zhou, Shurui; Al-Kofahi, Jafar; Nguyen, Tien; Kaestner, Christian; Nadi, Sarah
3rd International Workshop on Release Engineering, p.4
[Conference Proceedings]


GRINDER: On Reusability of Fault Injection Tools
Winter, Stefan; Piper, Thorsten; Schwahn, Oliver; Natella, Roberto; Suri, Neeraj; Cotroneo, Domenico
Proceedings of the ICSE/AST, 23.05.-24.05.2015, Florenz
[Conference Proceedings]


Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey
Vigil, Martín; Buchmann, Johannes; Cabarcas, Daniel; Weinert, Christian; Wiesmaier, Alexander
Computers & Security, p.16-32
[Journal Article]


TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits
Songhori, Ebrahim; Hussain, Siam; Sadeghi, Ahmad-Reza; Schneider, Thomas; Koushanfar, Farinaz
36. IEEE Symposium on Security and Privacy (IEEE S&P'15), p.411-428
[Conference Proceedings]


Tor Experimentation Tools
Shirazi, Fatemeh; Goehring, Matthias; Diaz, Claudia
International Workshop on Privacy Engineering – IWPE'15, co-located with 36th IEEE symposium on Security and Privacy
[Conference Proceedings]


Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications
Schuster, Felix; Tendyck, Thomas; Liebchen, Christopher; Davi, Lucas; Sadeghi, Ahmad-Reza; Holz, Thorsten
36th IEEE Symposium on Security and Privacy (Oakland)
[Conference Proceedings]


TypeDevil: dynamic type inconsistency analysis for JavaScript
Pradel, Michael; Schuh, Parker; Sen, Koushik
Proceedings of the 37th International Conference on Software Engineering, p.314-324
[Conference Proceedings]


SSP – Ansatz zur garantierten Durchsetzung von Web Sicherheitsmaßnahmen auf dem Client
Ghiglieri, Marco; Oswald, Florian
14. Deutscher IT-Sicherheitskongress
[Conference Proceedings]