Publikationen

Publikationen

An Overview of DRAM-Based Security Primitives
Anagnostopoulos, Nikolaos Athanasios; Katzenbeisser, Stefan; Chandy, John A.; Tehranipoor, Fatemeh
Cryptography
[Journal Article]


Towards Secure Distributed Trust Management on a Global Scale
Alexopoulos, Nikolaos; Habib, Sheikh Mahbub; Mühlhäuser, Max
IoT S&P’18: ACM SIGCOMM 2018 Workshop on IoT Security and Privacy
[Conference Proceedings]


Estimate all the {LWE, NTRU} schemes!
Albrecht, Martin R.; Curtis, Benjamin R.; Deo, Amit; Davidson, Alex; Player, Rachel; Postlethwaite, Eamonn W.; Virdia, Fernando; Wunderer, Thomas
SCN 2018
[Conference Proceedings]


Towards Practical RAM based Secure Computation
Buescher, Niklas; Weber, Alina; Katzenbeisser, Stefan
European Symposium on Research in Computer Security (ESORICS)
[Conference Proceedings]


IMIX: In-Process Memory Isolation EXtension
Frassetto, Tommaso; Jauernig, Patrick; Liebchen, Christopher; Sadeghi, Ahmad-Reza
Proceedings of the 27th USENIX Security Symposium, p.83-97
[Conference Proceedings]


Decay-Based DRAM PUFs in Commodity Devices
Schaller, André; Xiong, Wenjie; Anagnostopoulos, Nikolaos Athanasios; Saleem, Umair; Gabmeyer, Sebastian; Skoric, Boris; Katzenbeisser, Stefan; Szefer, Jakub
IEEE Transactions on Dependable and Secure Computing (TDSC)
[Journal Article]


Advanced Reconfigurable Physical Unclonable Functions(AR-PUFs) and Their Security Applications
Kumar, Manish; Anagnostopoulos, Nikolaos Athanasios; Fan, Yufan; Katzenbeisser, Stefan
28th Crypto-Day
[Conference Proceedings]


Addressing the Effects of Temperature Variations on Intrinsic Memory-Based Physical Unclonable Functions
Anagnostopoulos, Nikolaos Athanasios; Arul, Tolga; Fan, Yufan; Hatzfeld, Christian; Tehranipoor, Fatemeh; Katzenbeisser, Stefan
28th Crypto-Day
[Conference Proceedings]


Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security
Anagnostopoulos, Nikolaos Athanasios; Arul, Tolga; Fan, Yufan; Hatzfeld, Christian; Schaller, André; Xiong, Wenjie; Jain, Manishkumar; Saleem, Umair; Lotichius, Jan; Gabmeyer, Sebastian; Szefer, Jakub; Katzenbeisser, Stefan
Cryptography
[Journal Article]


VoiceGuard: Secure and Private Speech Processing
Brasser, Ferdinand; Frassetto, Tommaso; Riedhammer, Korbinian; Sadeghi, Ahmad-Reza; Schneider, Thomas; Weinert, Christian
Interspeech 2018
[Conference Proceedings]


HyCC: Compilation of Hybrid Protocols for Practical Secure Computation
Büscher, Niklas; Demmler, Daniel; Katzenbeisser, Stefan; Kretzmer, David; Schneider, Thomas
CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, p.847-861
[Conference Proceedings]


A Novel Design Flow for a Security-Driven Synthesis of Side-Channel Hardened Cryptographic Modules
Huss, Sorin; Stein, Oliver
Journal of Low Power Electronics and Applications
[Journal Article]


Execution Integrity with In-Place Encryption
Sullivan, Dean; Arias, Orlando; Gens, David; Davi, Lucas; Sadeghi, Ahmad-Reza; Jin, Yier
CoRR
[Journal Article]


Das Privacy-Paradoxon – Ein Erklärungsversuch und Handlungsempfehlungen
Gerber, Paul; Volkamer, Melanie; Gerber, Nina
Dialogmarketing Perspektiven 2016/2017, p.139-167


A Framework to Select Parameters for Lattice-Based Cryptography
Alkeilani Alkadri, Nabil; Buchmann, Johannes; Bansarkhani, Rachid El; Krämer, Juliane
Cryptology ePrint Archive, p.1-37
[Journal Article]


TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER)
Alexopoulos, Nikolaos; Vasilomanolakis, Emmanouil; Ivanko, Natalia Reka; Frieß, Tamara; Mühlhäuser, Max
26th USENIX Security Symposium
[Conference Proceedings]


ID2T - The Intrusion Detection Dataset Generation Toolkit
Garcia Cordero, Carlos; Vasilomanolakis, Emmanouil; Mühlhäuser, Max
Black Hat Europe 2017
[Conference Proceedings]


Measuring privacy in high dimensional microdata collections
Boukoros, Spyros; Katzenbeisser, Stefan
Proceedings of the 12th International Conference on Availability, Reliability and Security
[Conference Proceedings]


Secure Two-Party Computation Using an Efficient Garbled Circuit by Reducing Data Transfer
Yalame, Mohammad Hossein; Farzam, Mohammad Hossein; Sarmadi, Siavash Bayat
8. International Conference on Applications and Techniques in Information Security (ATIS'17)
[Conference Proceedings]


Enriched Nudges Lead to Stronger Password Replacements … but Implement Mindfully
Renaud, Karen; Zimmermann, Verena
Proceedings of the 2017 Information Security for South Africa (ISSA) Conference, p.1-9
[Conference Proceedings]


“If It Wasn’t Secure, They Would Not Use It in the Movies” – Security Perceptions and User Acceptance of Authentication Technologies
Zimmermann, Verena; Gerber, Nina
Human Aspects of Information Security, Privacy and Trust, p.265-283
[Conference Proceedings]


Lessons Learned from Evaluating Eight Password Nudges in the Wild
Renaud, Karen; Maguire, Joseph; Zimmermann, Verena; Draper, Steve
Proceedings of LASER 2017 Learning from Authoritative Security Experiment Results, p.25-38
[Conference Proceedings]


HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement
Nyman, Thomas; Dessouky, Ghada; Zeitouni, Shaza; Lehikoinen, Aaro; Paverd, Andrew; Asokan, N.; Sadeghi, Ahmad-Reza
Cryptography and Security
[Journal Article]


Erwartungen der älteren Bevölkerung an IKT für Krisenkommunikation
Wiegärtner, Daniel; Reuter, Christian; Müller, Claudia
Mensch & Computer 2017 - Workshopband, p.609-614
[Conference Proceedings]


DIVOA – Unterstützung der älteren Bevölkerung bei Schadenslagen
Reuter, Christian; Wiegärtner, Daniel; Müller, Claudia
Mensch & Computer 2017: Tagungsband, p.295-298
[Conference Proceedings]


Towards Social Resilience: A Quantitative and Qualitative Survey on Citizens' Perception of Social Media in Emergencies in Europe
Reuter, Christian; Spielhofer, Thomas
Technological Forecasting and Social Change (TFSC), p.168-180
[Journal Article]


Terrorbekämpfung mithilfe sozialer Medien – ein explorativer Einblick am Beispiel von Twitter
Reuter, Christian; Pätsch, Katja; Runft, Elena
Proceedings der 13. Internationalen Tagung Wirtschaftsinformatik (WI 2017), p.649-663
[Conference Proceedings]


IT for Peace? Fighting Against Terrorism in Social Media - An Explorative Twitter Study
Reuter, Christian; Pätsch, Katja; Runft, Elena
i-com: Journal of Interactive Media, p.181-195
[Journal Article]


4. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen
Reuter, Christian; Mentler, Tilo; Geisler, Stefan; Herczeg, Michael; Ludwig, Thomas; Pipek, Volkmar; Nestler, Simon
Mensch und Computer 2017 - Workshopband, p.5-8
[Conference Proceedings]


Social Media Resilience during Infrastructure Breakdowns using Mobile Ad-Hoc Networks
Reuter, Christian; Ludwig, Thomas; Kaufhold, Marc-André; Hupertz, Julian
Advances and New Trends in Environmental Informatics : Stability, Continuity, Innovation, p.75-88