Publikationen

Publikationen

MDoctor: A Mobile Malware Prognosis Application
Lagerspetz, E.; Truong, Hien Thi Thu; Tarkoma, S.; Asokan, N.
Distributed Computing Systems Workshops (ICDCSW), 2014 IEEE 34th International Conference on, p.201-206
[Conference Proceedings]


PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs
Kong, Joonho; Koushanfar, Farinaz; Pendyala, Praveen; Sadeghi, Ahmad-Reza; Wachsmann, Christian
Design Automation Conference (DAC) 2014, p.1-6
[Conference Proceedings]


Capturing Attention for Warnings about Insecure Password Fields - Systematic Development of a Passive Security Intervention
Kolb, Nina; Bartsch, Steffen; Volkamer, Melanie; Vogt, Joachim
Human Aspects of Information Security, Privacy, and Trust. HAS 2014. Lecture Notes in Computer Science
[Conference Proceedings]


Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation
Davi, Lucas; Koeberl, Patrick; Sadeghi, Ahmad-Reza
51st Design Automation Conference (DAC) - Special Session: Trusted Mobile Embedded Computing
[Conference Proceedings]


Paper Audit Trails and Voters' Privacy Concerns
Budurushi, Jurlind; Stockhardt, Simon; Woide, Marcel; Volkamer, Melanie
Human Aspects of Information Security, Privacy and Trust, p.400-409
[Conference Proceedings]


GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification
Bringer, Julien; Chabanne, Hervé; Favre, Mélanie; Patey, Alain; Schneider, Thomas; Zohner, Michael
2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14), p.187-198
[Conference Proceedings]


CA Trust Management for the Web PKI
Braun, Johannes; Volk, Florian; Classen, Jiska; Buchmann, Johannes; Mühlhäuser, Max
Journal of Computer Security, p.913-959
[Journal Article]


Long Term Confidentiality: a Survey
Braun, Johannes; Buchmann, Johannes; Mullan, Ciaran; Wiesmaier, Alexander
Designs, Codes and Cryptography, p.459-478
[Journal Article]


Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes
Arzt, Steven; Bodden, Eric
International Conference on Software Engineering(ICSE) 2014, p.288-298
[Conference Proceedings]


Why doesn't Jane protect her privacy?
Volkamer, Melanie; Renaud, Karen; Renkema-Padmos, Arne
Privacy Enhancing Technologies - 14th International Symposium, PETS, p.244-262
[Conference Proceedings]


An Empirical Study of Injected versus Actual Interface Errors
Suri, Neeraj; Lanzaro, Anna; Natella, Roberto; Winter, Stefan; Cotroneo, Domenico
Proceedings of the 2014 International Symposium on Software Testing and Analysis (ISSTA)
[Conference Proceedings]


Shake hands to bedevil: Securing email with wearable technology
Renkema-Padmos, Arne; Baum, Jerome; Renaud, Karen; Volkamer, Melanie
Proceedings of the eighth international symposium on human aspects of information security and assurance
[Conference Proceedings]


Citizen Electronic Identities using {TPM} 2.0
Nyman, Thomas; Ekberg, Jan-Erik; Asokan, N.
CoRR, p.37-48
[Journal Article, Conference Proceedings]


The Untapped Potential of Trusted Execution Environments on Mobile Devices
Ekberg, Jan-Erik; Kostiainen, Kari; Asokan, N.
Security Privacy, IEEE, p.29-37
[Journal Article]


Security Analysis of Mobile Two-Factor Authentication Schemes
Dmitrienko, Alexandra; Liebchen, Christopher; Rossow, Christian; Sadeghi, Ahmad-Reza
Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition
[Journal Article]


A Survey on Tor and I2P
Conrad, Bernd; Shirazi, Fatemeh
Ninth International Conference on Internet Monitoring and Protection (ICIMP2014)
[Conference Proceedings]


Towards a Framework for Assessing the Feasibility of Side-channel Attacks in Virtualized Environments
Suri, Neeraj; Vateva-Gurova, Tsvetoslava; Luna, Jesus; Pellegrino, Giancarlo
Proceedings of the 11th International Conference on Security and Cryptography (SECRYPT)
[Conference Proceedings]


Faster Private Set Intersection based on OT Extension
Pinkas, Benny; Schneider, Thomas; Zohner, Michael
Proceedings of the 23rd USENIX Security Symposium, p.797-812
[Conference Proceedings]


Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks
Meyer, Christopher; Somorovsky, Juraj; Weiss, Eugen; Schwenk, Jörg; Schinzel, Sebastian; Tews, Erik
Proceedings of the 23rd USENIX conference on Security Symposium, p.733-748
[Conference Proceedings]


SAX-PAC (Scalable And eXpressive PAcket Classification)
Kogan, Kirill; Nikolenko, Sergey I.; Rottenstreich, Ori; Culhane, William; Eugster, Patrick
Proceedings of the 2014 ACM conference on SIGCOMM, p.15-26
[Conference Proceedings]


ASM: A Programmable Interface for Extending Android Security
Heuser, Stephan; Nadkarni, Adwait; Enck, William; Sadeghi, Ahmad-Reza
23rd USENIX Security Symposium
[Conference Proceedings]


Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens
Demmler, Daniel; Schneider, Thomas; Zohner, Michael
Proceedings of the 23rd USENIX Security Symposium, p.893-908
[Conference Proceedings]


Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection
Davi, Lucas; Lehmann, Daniel; Sadeghi, Ahmad-Reza; Monrose, Fabian
23rd USENIX Security Symposium
[Conference Proceedings]


The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques
Davi, Lucas; Lehmann, Daniel; Sadeghi, Ahmad-Reza
BlackHat USA
[Conference Proceedings]


Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources
Brzuska, Christina; Farshim, Pooya; Mittelbach, Arno
Advances in Cryptology – CRYPTO 2014. 34th Annual Cryptology Conference. Santa Barbara, CA, USA. August 17-21, 2014. Proceedings., p.188-205
[Conference Proceedings]


Mobile Trusted Computing
Asokan, N.; Ekberg, Jan-Erik; Kostiainen, Kari; Rajan, Anand; Rozas, Carlos; Sadeghi, Ahmad-Reza; Schulz, Steffen; Wachsmann, Christian
Proceedings of the IEEE, p.1189-1206
[Journal Article]


AES-SEC: Improving software obfuscation through hardware-assistance (short paper)
Schrittwieser, Sebastian; Katzenbeisser, Stefan; Merzdovnik, Georg; Kieseberg, Peter; Weippl, Edgar
Proceedings of the 2014 Ninth International Conference on Availability, Reliability and Security Pages, p.184-191
[Conference Proceedings]


Patrolling wireless sensor networks: Randomized intrusion detection
Riecker, Michael; Yuan, Dingwen; Bansarkhani, Rachid El; Hollick, Matthias
10th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Q2SWinet ’14, p.61-69
[Conference Proceedings]


Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?
Neumann, Stephan; Olembo, Maina; Renaud, Karen; Volkamer, Melanie
3rd International Conference on Electronic Government and the Information Systems Perspective, p.246-260
[Conference Proceedings]


A Usable Android Application Implementing Distributed Cryptography For Election Authorities
Neumann, Stephan; Kulyk, Oksana; Volkamer, Melanie
9th International Workshop on Frontiers in Availability, Reliability and Security - FARES 2014, p.198-207
[Conference Proceedings]