Publikationen

Publikationen

You are AIRing too much: Assessing the privacy of users in crowdsourcing environmental data
Mineraud, Julien; Lancerin, Federico; Balasubramaniam, Sasitharan; Conti, Mauro; Tarkoma, Sasu
The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15)
[Conference Proceedings]


Private Membership Test for Bloom Filters
Meskanen, Tommi; Ramezanian, Sara; Liu, Jian; Niemi, Valtteri
The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15)
[Conference Proceedings]


Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
Kulyk, Oksana; Neumann, Stephan; Budurushi, Jurlind; Volkamer, Melanie; Haenni, Rolf; Koenig, Reto; Bergen, Philemon von
10th International Conference on Availability, Reliability and Security - ARES 2015, p.224-229
[Conference Proceedings]


PUF-based Software Protection for Low-end Embedded Devices
Kohnhäuser, Florian; Schaller, André; Katzenbeisser, Stefan
8th International Conference on Trust and Trustworthy Computing (TRUST 2015), p.3-21
[Conference Proceedings]


Capacity and Data Complexity in Multidimensional Linear Attack
Huang, Jialin; Vaudenay, Serge; Lai, Xuejia; Nyberg, Kaisa
CRYPTO
[Conference Proceedings]


PALPAS - PAsswordLess PAssword Synchronization
Horsch, Moritz; Hülsing, Andreas; Buchmann, Johannes
International Conference on Availability, Reliability and Security (ARES)
[Conference Proceedings]


JITProf: pinpointing JIT-unfriendly JavaScript code
Gong, Liang; Pradel, Michael; Sen, Koushik
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, p.357-368
[Conference Proceedings]


Data Is a Stream: Security of Stream-Based Channels
Fischlin, Marc; Günther, Felix; Marson, Giorgia Azzurra; Paterson, Kenneth G.
Advances in Cryptology - CRYPTO 2015, p.545-564
[Conference Proceedings]


Return to Where? You Can't Exploit What You Can't Find
Crane, Stephen; Liebchen, Christopher; Homescu, Andrei; Davi, Lucas; Larsen, Per; Sadeghi, Ahmad-Reza; Brunthaler, Stefan; Franz, Michael
Blackhat USA
[Conference Proceedings]


Faster Secure Computation through Automatic Parallelization
Buescher, Niklas; Katzenbeisser, Stefan
24th USENIX Security Symposium (USENIX Security'15)
[Conference Proceedings]


SEDA - Technical Report
Asokan, N.; Brasser, Ferdinand; Ibrahim, Ahmad; Sadeghi, Ahmad-Reza; Schunter, Matthias; Tsudik, Gene; Wachsmann, Christian
[Report]


A Socio-Technical Investigation into Smartphone Security
Volkamer, Melanie; Renaud, Karen; Kulyk, Oksana; Emeröz, Sinem
Security and Trust Management: 11th International Workshop - STM 2015, p.265-273
[Conference Proceedings]


Simple Matrix - A Multivariate Public Key Cryptosystem (MPKC) for Encryption
Tao, Chengdong; Xiang, Hong; Petzoldt, Albrecht; Ding, Jintai
Finite Fields and Their Applications, p.352-368
[Journal Article]


Eavesdropping with Periscopes: Experimental Security Analysis of Highly Directional Millimeter Waves
Steinmetzer, Daniel; Chen, Joe; Classen, Jiska; Knightly, Edward; Hollick, Matthias
IEEE Conference on Communications and Network Security 2015 (CNS)
[Conference Proceedings]


Towards Security of Internet's Naming Infrastructure
Shulman, Haya; Waidner, Michael
Computer Security ESORICS
[Conference Proceedings]


DNS-Scopy: Towards Security of Internet Naming Infrastructure
Shulman, Haya; Waidner, Michael
20th European Symposium on Research in Computer Security Vienna, Austria, September 21 – 25, 2015 Proceedings, p.3-22
[Conference Proceedings]


On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety Mechanisms
Piper, Thorsten; Suri, Neeraj; Fuhrman, Thomas
InProceedings of the 11th European Dependable Computing Conference ,07.09.2015-11.09.2015, Paris
[Conference Proceedings]


Parallel (Probable) Lock-Free Hash Sieve: A Practical Sieving Algorithm for the SVP
Mariano, Artur; Laarhoven, Thijs; Bischof, Christian
ICPP 2015 - The 44th Annual Conference 2015 International Conference on Parallel Processing
[Conference Proceedings]


Transforming Out Timing Leaks, More or Less
Mantel, Heiko; Starostin, Artem
Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS 2015) - Part I, p.20
[Conference Proceedings]


Extending Helios Towards Private Eligibility Verifiability
Kulyk, Oksana; Teague, Vanessa; Volkamer, Melanie
E-Voting and Identity: 5th International Conference - VoteID 2015, p.57-73
[Conference Proceedings]


PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation
Germanus, Daniel; Ismail, Hatem; Suri, Neeraj
InProceedings of the 34th International Symposium on Reliable Distributed Systems, 28.09.2015-01.10.2015, Montreal
[Conference Proceedings]


Practical Covert Channels for WiFi Systems
Classen, Jiska; Schulz, Matthias; Hollick, Matthias
IEEE Conference on Communications and Network Security (CNS), p.8
[Conference Proceedings]


The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications
Classen, Jiska; Chen, Joe; Steinmetzer, Daniel; Hollick, Matthias; Knightly, Edward
2nd ACM Workshop on Visible Light Communication Systems, p.6
[Conference Proceedings]


Hide And Seek: Detecting Sensors in P2P Botnets
Böck, Leon; Karuppayah, Shankar; Grube, Tim; Fischer, Mathias; Mühlhäuser, Max
Communications and Network Security (CNS), 2015 IEEE Conference on, p.731-732
[Conference Proceedings]


Formal Accountability for Biometric Surveillance: A Case Study
Ta, Vinh-Thong; Butin, Denis; Métayer, Daniel Le
Annual Privacy Forum (APF2015)
[Conference Proceedings]


DNSSEC for Cyber Forensics
Shulman, Haya; Waidner, Michael
EURASIP J. Information Security, p.14
[Journal Article]


On the Systematic Drift of Physically Unclonable Functions Due to Aging
Schaller, André; Skoric, Boris; Katzenbeisser, Stefan
TrustED, p.15-20
[Conference Proceedings]


PBMC: Symbolic Slicing for the Verification of Concurrent Programs
Saissi, Habib; Bokor, Peter; Suri, Neeraj
Proceedings of the Symposium on Automated Technology for Verification and Analysis, ATVA 2015
[Conference Proceedings]


Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem
Neumann, Stephan; Volkamer, Melanie; Strube, Moritz; Jung, Wolfgang; Brelle, Achim
Datenschutz und Datensicherheit, p.747-752
[Journal Article]


Notions of Deniable Message Authentication
Fischlin, Marc; Mazaheri, Sogol
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, p.55-64
[Conference Proceedings]