EnvDASH: An Environment-Aware Dynamic Adaptive Streaming over HTTP System
Wilk, Stefan; Schönherr, Sophie; Stohr, Denny; Effelsberg, Wolfgang
Proceedings of the ACM International Conference on Interactive Experiences for TV and Online Video, p.113-118
[Conference Proceedings]

Lockpicking Physical Layer Key Exchange: Weak Adversary Models Invite the Thief
Steinmetzer, Daniel; Schulz, Matthias; Hollick, Matthias
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec)
[Conference Proceedings]

Compacting Privacy-Preserving k-Nearest Neighbor Search using Logic Synthesis
Songhori, Ebrahim; Sadeghi, Ahmad-Reza; Koushanfar, Farinaz
52nd Design Automation Conference (DAC)
[Conference Proceedings]

Universal Threshold Calculation for Fingerprinting Decoders using Mixture Models
Schäfer, Marcel; Mair, Sebastian; Berchtold, Waldemar; Steinebach, Martin
IH&MMSec '15 Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, p.109-114
[Conference Proceedings]

Security and Privacy Challenges in Industrial Internet of Things
Sadeghi, Ahmad-Reza; Wachsmann, Christian; Waidner, Michael
52nd Design Automation Conference (DAC) Research
[Conference Proceedings]

Phasing: Private Set Intersection using Permutation-based Hashing
Pinkas, Benny; Schneider, Thomas; Segev, Gil; Zohner, Michael
24. USENIX Security Symposium (USENIX Security'15), p.515-530
[Conference Proceedings]

How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL
Nagy, Marcin; Bui, Thanh Phong; Cristofaro, Emiliano De; Asokan, N.; Ott, Jörg; Sadeghi, Ahmad-Reza
ACM WiSEC 2015
[Conference Proceedings]

Computational trust methods for security quantification in the cloud ecosystem
Habib, Sheikh Mahbub; Volk, Florian; Hauke, Sascha; Mühlhäuser, Max
The Cloud Security Ecosystem, p.463-493
[Journal Article]

Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes
Günther, Felix; Poettering, Bertram
20th Australasian Conference on Information Security and Privacy (ACISP 2015), p.195-212
[Conference Proceedings]

Nudging Bank Account Holders Towards More Secure PIN Management
Gutmann, Andreas; Renaud, Karen; Volkamer, Melanie
Journal of Internet Technology and Secured Transaction (JITST), p.380 - 386
[Conference Proceedings]

How to Securely Prolong the Computational Bindingness of Pedersen Commitments
Demirel, Denise; Lancrenon, Jean

An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme
Cabarcas, Daniel; Demirel, Denise; Göpfert, Florian; Lancrenon, Jean; Wunderer, Thomas

TyTAN: Tiny Trust Anchor for Tiny Devices
Brasser, Ferdinand; Koeberl, Patrick; Mahjoub, Brahim El; Sadeghi, Ahmad-Reza; Wachsmann, Christian
52nd Design Automation Conference (DAC) 2015
[Conference Proceedings]

HAFIX: Hardware-Assisted Flow Integrity Extension
Arias, Orlando; Davi, Lucas; Hanreich, Matthias; Jin, Yier; Koeberl, Patrick; Paul, Debayan; Sadeghi, Ahmad-Reza; Sullivan, Dean
52nd Design Automation Conference (DAC)
[Conference Proceedings]

Comparing Lightweight Hash Functions – PHOTON & Quark
Meuser, Tobias; Schmidt, Larissa; Wiesmaier, Alexander

The Love/Hate Relationship with the C Preprocessor: An Interview Study
Medeiros, Flávio; Kästner, Christian; Ribeiro, Márcio; Nadi, Sarah; Gheyi, Rohit
European Conference on Object-Oriented Programming, p.999-1022
[Conference Proceedings]

Leveraging the Potential of Cloud Security Service Level Agreements through Standards
Luna, Jesus; Suri, Neeraj; Iorga, Michaela; Karmel, Anil
Proceedings of IEEE Cloud Computing, 27.06.- 02.07. 2015, New York
[Conference Proceedings]

Towards a New Paradigm for Privacy and Security in Cloud Services
Loruenser, Thomas; Rodriguez, Charles Bastos; Demirel, Denise; Fischer-Hübner, Simone; Gross, Thomas R.; Langer, Thomas; des Noes, Mathieu; Poehls, Henrich; Rozenberg, Boris; Slamanig, Daniel
CoRR abs/1506.05980 (2015)
[Journal Article]

Block ciphers PRESENT and SEA in comparison
Kußmaul, Tobias; Löffler, Johannes; Wiesmaier, Alexander

DLint: Dynamically Checking Bad Coding Practices in JavaScript
Gong, Liang; Pradel, Michael; Sridharan, Manu; Sen, Koushik
Proceedings of the 2015 International Symposium on Software Testing and Analysis, p.94-105
[Conference Proceedings]

Security und Privacy bei Smart TVs – Bedrohungspotential und technische Lösungsansätze
Ghiglieri, Marco; Lange, Benjamin; Simo, Hervais; Waidner, Michael
Digitale Schwellen - Freiheit und Privatheit in der digi­tali­sierten Welt, p.67-84
[Conference Proceedings]

Toward a Just-in-Time Static Analysis
Nguyen Quang Do, Lisa; Ali, Karim; Bodden, Eric; Livshits, Benjamin
[Journal Article]

Stream ciphers in the IoT: Grain and Trivium
Diedrich, Lennart; Murati, Lulzim; Wiesmaier, Alexander

Hybrid Monitors for Concurrent Noninterference
Askarov, Aslan; Chong, Stephen; Mantel, Heiko
Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF), p.137-151
[Conference Proceedings]

An Investigation into the "Other" Barriers to Adoption of Smartphone Security Precautions (Poor Usability being a Given)
Volkamer, Melanie; Renaud, Karen; Kulyk, Oksana; Emeröz, Sinem

Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness
Volkamer, Melanie; Renaud, Karen; Braun, Kristoffer; Canova, Gamze; Reinheimer, Benjamin
International Conference on Trust and Trustworthy Computing (TRUST), p.104-121
[Conference Proceedings]

On Rehoming the Electronic Id to TEEs
Tamrakar, Sandeep; Ekberg, Jan-Erik; Laitinen, Pekka
The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15)
[Conference Proceedings]

How Current Android Malware Seeks to Evade Automated Code Analysis
Rasthofer, Siegfried; Asrar, Irfan; Huber, Stephan; Bodden, Eric
9th International Conference on Information Security Theory and Practice (WISTP'2015)
[Conference Proceedings]

In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services
Pellegrino, Giancarlo; Balzarotti, Davide; Winter, Stefan; Suri, Neeraj
Proceedings of USENIX Security Symposium, 12.-14. August 2015, Washington D.C
[Conference Proceedings]

On Making Emerging Trusted Execution Environments Accessible to Developers
Nyman, Thomas; McGillion, Brian; Asokan, N.
8th International Conference on Trust & Trustworthy Computing, p.58-67
[Conference Proceedings]