Publikationen

Publikationen

Function-Dependent Commitments from Homomorphic Authenticators
Schabhüser, Lucas; Butin, Denis; Buchmann, Johannes
24th Australasian Conference, ACISP 2019
[Conference Proceedings]


Language Support for Multiple Privacy Enhancing Technologies
Oak, Aditya; Mezini, Mira; Salvaneschi, Guido
Conference Companion of the 3rd International Conference on Art, Science, and Engineering of Programming
[Conference Proceedings]


p3Enum: A new Parameterizable and Shared-Memory Parallelized Shortest Vector Problem Solver
Burger, Michael; Bischof, Christian; Krämer, Juliane
19th INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE, p.535-542
[Conference Proceedings]


EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs
Schneider, Thomas; Tkachenko, Oleksandr
14. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'19)
[Conference Proceedings]


Towards Systematic Design of Collective Remote Attestation Protocols
Oliveira Nunes, Ivan de; Dessouky, Ghada; Ibrahim, Ahmad; Rattanavipanon, Norrathep; Sadeghi, Ahmad-Reza; Tsudik, Gene
The 39th International Conference on Distributed Computing Systems (ICDCS) 2019
[Conference Proceedings]


A Unified Lattice Model and Framework for Purity Analyses
Helm, Dominik; Kübler, Florian; Eichberg, Michael; Reif, Michael; Mezini, Mira
Software Engineering und Software Management 2019
[Conference Proceedings]


A unified lattice model and framework for purity analyses
Helm, Dominik; Kübler, Florian; Eichberg, Michael; Reif, Michael; Mezini, Mira
Software Engineering and Software Management 2019
[Conference Proceedings]


DÏoT: A Federated Self-learning Anomaly Detection System for IoT
Nguyen, Thien Duc; Marchal, Samuel; Miettinen, Markus; Fereidooni, Hossein; Asokan, N.; Sadeghi, Ahmad-Reza
The 39th IEEE International Conference on Distributed Computing Systems (ICDCS 2019)
[Conference Proceedings]


A Dataset of Parametric Cryptographic Misuses
Wickert, Anna-Katharina; Reif, Michael; Eichberg, Michael; Dodhy, Anam; Mezini, Mira
2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR)
[Conference Proceedings]


HomeSnitch: Behavior Transparency and Control for Smart Home IoT Devices
O'Connor, T. J.; Mohamed, Reham; Miettinen, Markus; Enck, William; Reaves, Bradley; Sadeghi, Ahmad-Reza
Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec)
[Conference Proceedings]


Context Hiding Multi-Key Linearly Homomorphic Authenticators
Schabhüser, Lucas; Butin, Denis; Buchmann, Johannes
Topics in Cryptology - CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, p.493-513
[Conference Proceedings]


Efficient Proactive Secret Sharing for Large Data via Concise Vector Commitments
Geihs, Matthias; Schabhüser, Lucas; Buchmann, Johannes
International Conference on Codes, Cryptology, and Information Security (C2SI) 2019
[Conference Proceedings]


Multiparty Virtual State Channels
Dziembowski, Stefan; Eckey, Lisa; Faust, Sebastian; Hesse, Julia; Hostakova, Kristina
Eurocrypt 2019
[Conference Proceedings]


Perils of Zero-Interaction Security in the Internet of Things
Fomichev, Mikhail; Maass, Max; Almon, Lars; Molina, Alejandro; Hollick, Matthias
ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2019)
[Conference Proceedings]


Fault Attacks on UOV and Rainbow
Krämer, Juliane; Loiero, Mirjam
10th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2019)
[Conference Proceedings]


PILOT: Practical Privacy-Preserving Indoor Localization using OuTsourcing
Järvinen, Kimmo; Leppäkoski, Helena; Lohan, Elena Simona; Richter, Philipp; Schneider, Thomas; Tkachenko, Oleksandr; Yang, Zheng
4. IEEE European Symposium on Security and Privacy (EuroS&P'19)
[Conference Proceedings]


FastKitten: Practical Smart Contracts on Bitcoin
Das, Poulami; Eckey, Lisa; Frassetto, Tommaso; Gens, David; Hostáková, Kristina; Jauernig, Patrick; Faust, Sebastian; Sadeghi, Ahmad-Reza
28th USENIX Security Symposium
[Conference Proceedings]


ARM2GC: Succinct Garbled Processor for Secure Computation
Songhori, Ebrahim; Riazi, M. Sadegh; Hussain, Siam; Sadeghi, Ahmad-Reza; Koushanfar, Farinaz
Design Automation Conference (DAC), 2019 56th ACM/EDAC/IEEE
[Conference Proceedings]


Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks
Rodler, Michael; Li, Wenting; Karame, Ghassan O.; Davi, Lucas
Proceedings of 26th Annual Network & Distributed System Security Symposium (NDSS)
[Conference Proceedings]


Efficient Circuit-based PSI with Linear Communication
Pinkas, Benny; Schneider, Thomas; Tkachenko, Oleksandr; Yanai, Avishay
38. Advances in Cryptology -- EUROCRYPT 2019
[Conference Proceedings]


HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement
Nyman, Thomas; Dessouky, Ghada; Zeitouni, Shaza; Lehikoinen, Aaro; Paverd, Andrew; Asokan, N.; Sadeghi, Ahmad-Reza
DAC 2019
[Conference Proceedings]


Fake News Perception in Germany: A Representative Study of People's Attitudes and Approaches to Counteract Disinformation
Reuter, Christian; Hartwig, Katrin; Kirchner, Jan; Schlegel, Noah
Wirtschaftsinformatik Proceedings 2019, p.1069-1083
[Conference Proceedings]


Vulnerability Assessment in the Smart Farming Infrastructure through Cyberattacks
Linsner, Sebastian; Varma, Rashmi; Reuter, Christian
38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?
[Conference Proceedings]


Potentiale von IKT beim Ausfall kritischer Infrastrukturen: Erwartungen, Informationsgewinnung und Mediennutzung der Zivilbevölkerung in Deutschland
Kaufhold, Marc-André; Grinko, Margarita; Reuter, Christian; Schorch, Marén; Langer, Amanda; Skudelny, Sascha; Hollick, Matthias
Proceedings of the International Conference on Wirtschaftsinformatik
[Conference Proceedings]


TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter
Hartwig, Katrin; Reuter, Christian
Proceedings of the International Conference on Wirtschaftsinformatik (WI)
[Conference Proceedings]


Hybride Dienst­leis­tun­gen in digi­tali­sierten Kooperationen in der Landwirtschaft
Bernardi, Ansgar; Reuter, Christian; Schneider, Wolfgang; Linsner, Sebastian; Kaufhold, Marc-André
38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?
[Conference Proceedings]


A Holistic View on Organizational IT Security: The Influence of Contextual Aspects During IT Security Decisions
Heidt, Margareta; Gerlach, Jin; Buxmann, Peter
Hawaii International Conference on System Sciences (HICSS)
[Conference Proceedings]


Resilient Smart Farming (RSF) – Nutzung digitaler Tech­no­logien in krisensicherer Infrastruktur
Reuter, Christian; Schneider, Wolfgang; Eberz, Daniel
Informatik in der Land-, Forst- und Ernährungswirtschaft : Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen – ein Widerspruch in sich? Referate der 39. GIL-Jahrestagung, p.177-182
[Conference Proceedings]


SANCTUARY: ARMing TrustZone with User-space Enclaves
Brasser, Ferdinand; Gens, David; Jauernig, Patrick; Sadeghi, Ahmad-Reza; Stapf, Emmanuel
26th Annual Network & Distributed System Security Symposium (NDSS)
[Conference Proceedings]


TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V
Weiser, Samuel; Werner, Mario; Brasser, Ferdinand; Malenko, Maja; Mangard, Stefan; Sadeghi, Ahmad-Reza
26th Annual Network & Distributed System Security Symposium (NDSS)
[Conference Proceedings]