FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks
Castillo, Jorge; Rieger, Phillip; Fereidooni, Hossein; Chen, Qian; Sadeghi, Ahmad-Reza
ACSAC '23: Proceedings of the 39th Annual Computer Security Applications Conference
[Conference Proceedings]

Verifiable Verification in Cryptographic Protocols
Fischlin, Marc; Günther, Felix
CCS'23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, p.3239-3253
[Conference Proceedings]

Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3
Fischlin, Marc
CCS'23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, p.2901-2914
[Conference Proceedings]

Searching for ELFs in the Cryptographic Forest
Fischlin, Marc; Rohrbach, Felix
TCC 2023: Theory of Cryptography, p.207-236
[Conference Proceedings]

Hardware-Based Isolation for Advanced Safety and Security in Spacecraft
Koisser, David; Brasser, Ferdinand; Jauernig, Patrick; Stapf, Emmanuel; Wallum, Marcus; Fischer, Daniel; Sadeghi, Ahmad-Reza
17th International Conference on Space Operations (SpaceOps 2023)
[Conference Proceedings]

Populating the Zoo of Rugged Pseudorandom Permutations
Degabriele, Jean Paul; Karadžić, Vukašin
Advances in Cryptology - ASIACRYPT 2023, p.270-300
[Conference Proceedings]

The Indifferentiability of the Duplex and Its Practical Applications
Degabriele, Jean Paul; Fischlin, Marc; Govinden, Jérôme
Advances in Cryptology - ASIACRYPT 2023, p.237-269
[Conference Proceedings]

ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks
Rieger, Phillip; Chilese, Marco; Mohamed, Reham; Miettinen, Markus; Fereidooni, Hossein; Sadeghi, Ahmad-Reza
Proceedings of the 32nd USENIX Security Symposium, p.4301-4318
[Conference Proceedings]

FLAIRS: FPGA-Accelerated Inference-Resistant & Secure Federated Learning
Li, Huimin; Rieger, Phillip; Zeitouni, Shaza; Picek, Stjepan; Sadeghi, Ahmad-Reza
Proceedings of the 2023 33rd International Conference on Field-Programmable Logic and Applications (FPL)
[Conference Proceedings]

Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M
Saß, Marvin; Mitev, Richard; Sadeghi, Ahmad-Reza
32nd USENIX Security Symposium (USENIX Security 23), p.6239-6256
[Conference Proceedings]

Unleashing IoT Security: Assessing the Effectiveness of Best Practices in Protecting Against Threats
Pütz, Philipp; Mitev, Richard; Sadeghi, Ahmad-Reza
Annual Computer Security Applications Conference (ACSAC 2023)
[Conference Proceedings]

Griffin: Towards mixed multi-key homomorphic encryption
Schneider, Thomas; Yalame, Hossein; Yonli, Michael
Proceedings of the 20th International Conference on Security and Cryptography - SECRYPT, p.147-158
[Conference Proceedings]

Breaking and Fixing Garbled Circuits When a Gate has Duplicate Input Wires
Nieminen, Raine; Schneider, Thomas
Journal of Cryptology
[Journal Article]

Investigating how Users Imagine their Personal Privacy Assistant
Stöver, Alina; Hahn, Sara; Kretschmer, Felix; Gerber, Nina
Proceedings on Privacy Enhancing Technologies (PoPETs), p.384-402
[Journal Article]

How Website Owners Face Privacy Issues: Thematic Analysis of Responses from a Covert Notification Study Reveals Diverse Circumstances and Challenges
Stöver, Alina; Gerber, Nina; Pridöhl, Henning; Maass, Max; Bretthauer, Sebastian; Spiecker gen. Döhmann, Indra; Hollick, Matthias; Herrmann, Dominik
Proceedings on Privacy Enhancing Technologies (PoPETs), p.251-264
[Journal Article]

Human Factors in Privacy Research
Marky, Karola; Gerber, Nina; Stöver, Alina; et al., /

Safe AND Secure Infrastructures? - Studying Human Aspects of Safety and Security Incidents with Experts from both Domains
Zimmermann, Verena; Haunschild, Jasmin; Stöver, Alina; Gerber, Nina
Mensch und Computer 2023 - Workshopband
[Conference Proceedings]

Don’t accept all and continue: Exploring nudges for more deliberate interaction with tracking consent notices
Gerber, Nina; Stöver, Alina; Peschke, Justin; Zimmermann, Verena
ACM Transactions on Computer-Human Interaction
[Journal Article]

Psychotechnik, human factors, engineering psychology, Technikpsychologie—100 years of interdisciplinary cooperation between engineering and human sciences
Vogt, Joachim; Keil, Udo; Cornel, Christin; Gerber, Nina; Ferreira, Yvonne
Zeitschrift für Arbeitswissenschaft, p.1-6
[Journal Article]

Post-quantum Security for the Extended Access Control Protocol
Fischlin, Marc; Heyden, Jonas von der; Margraf, Marian; Morgner, Frank; Wallner, Andreas; Bock, Holger
Security Standardisation Research, p.22-52
[Conference Proceedings]

Disorientation Faults in CSIDH
Banegas, Gustavo; Krämer, Juliane; Lange, Tanja; Meyer, Michael; Panny, Lorenz; Reijnders, Krijn; Sotáková, Jana; Trimoska, Monika
Advances in Cryptology - EUROCRYPT 2023, p.310-342
[Conference Proceedings]

A Lightweight Identification Protocol Based on Lattices
Düzlü, Samed; Krämer, Juliane; Pöppelmann, Thomas; Struck, Patrick
Public-Key Cryptography - PKC 2023, p.95-113
[Conference Proceedings]

SAFEFL: MPC-friendly Framework for Private and Robust Federated Learning
Gehlhar, Till; Marx, Felix; Schneider, Thomas; Suresh, Ajith; Wehrle, Tobias; Yalame, Hossein
6th Deep Learning Security and Privacy Workshop (DLSP 2023)
[Conference Proceedings]

FLUTE: Fast and Secure Lookup Table Evaluations
Brüggemann, Andreas; Hundt, Robin; Schneider, Thomas; Suresh, Ajith; Yalame, Hossein
Proceedings: 44th IEEE Symposium on Security and Privacy: SP 2023, p.515-533
[Conference Proceedings]

ExTRUST: Reducing exploit stockpiles with a privacy-preserving depletion system for inter-state relationships
Reinhold, Thomas; Kühn, Philipp; Günther, Daniel; Schneider, Thomas; Reuter, Christian
IEEE Transactions on Technology and Society, p.158-170
[Journal Article]

Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning
Sendner, Christoph; Chen, Huili; Fereidooni, Hossein; Petzi, Lukas; König, Jan; Stang, Jasper; Dmitrienko, Alexandra; Sadeghi, Ahmad-Reza; Koushanfar, Farinaz
Network and Distributed Systems Security (NDSS) Symposium 2023
[Conference Proceedings]

DARWIN: Survival of the Fittest Fuzzing Mutators
Jauernig, Patrick; Jakobovic, Domagoj; Picek, Stjepan; Stapf, Emmanuel; Sadeghi, Ahmad-Reza
Network and Distributed Systems Security (NDSS) Symposium 2023
[Conference Proceedings]

How to Count Bots in Longitudinal Datasets of IP Addresses
Böck, Leon; Levin, Dave; Padmanabhan, Ramakrishna; Doerr, Christian; Mühlhäuser, Max
30th Annual Network and Distributed System Security Symposium, NDSS 2023, San Diego, California, USA, February 27 - March 3, 2023
[Conference Proceedings]

Responsible Research and Innovation: Interdisziplinärer Workshop von IANUS und Schader-Stiftung
Riebe, Thea; Nordmann, Alfred; Reuter, Christian
Wissenschaft & Frieden, p.60-61
[Journal Article]

Comments on “Privacy-Enhanced Federated Learning Against Poisoning Adversaries”
Schneider, Thomas; Suresh, Ajith; Yalame, Hossein
IEEE Transactions on Information Forensics and Security, p.1407-1409
[Journal Article]