Attack Surface Assessment for Cybersecurity Engineering in the Automotive Domain
Plappert, Christian; Zelle, Daniel; Gadacz, Henry; Rieke, Roland; Scheuermann, Dirk; Krauß, Christoph
29th Euromicro International Conference on Parallel, Distributed and Network-based Processing, PDP
[Conference Proceedings]

Zur Integration von Post-Quantum Verfahren in bestehende Softwarepodukte
Zeier, A.; Wiesmaier, A.; Heinemann, A.
Tagungsband zum 17. Deutschen IT-Sicherheitskongress, p.381-391
[Conference Proceedings]

Software Development Processes for ADs, SMCs and OSCs supporting Usability, Security, and Privacy Goals - an Overview
Bender, Tim; Huesmann, Rolf; Heinemann, Andreas
ARES 2021, SSC Workshop: The 16th International Conference on Availability, Reliability and Security, Virtual Event, August 17-20, 2021
[Conference Proceedings]

Makeup Presentation Attack Potential Revisited: Skills Pay the Bills
Drozdowski, P.; Grobarek, S.; Schurse, J.; Rathgeb, C.; Stockhardt, F.; Busch, C.
Intl. Workshop on Biometrics and Forensics (IWBF), p.1-6
[Conference Proceedings]

Face Morphing Attacks: A Threat to eLearning?
Rathgeb, C.; Pöppelmann, K.; Busch, C.
IEEE Global Engineering Education Conf. (EDUCON 2021), p.1-6
[Conference Proceedings]

Deep Learning-Based Semantic Segmentation for Touchless Fingerprint Recognition
Priesnitz, J.; Rathgeb, C.; Buchmann, N.; Busch, C.
Proc. Intl. Conf. Pattern Recognition (ICPR) (Workshops)
[Conference Proceedings]

Language Support for Secure Software Development with Enclaves
Oak, Aditya; Ahmadian, Amir M.; Balliu, Musard; Salvaneschi, Guido
34th IEEE Computer Security Foundations Symposium (CSF 2021)
[Conference Proceedings]

Privacy - Preserving Clustering
Keller, Hannah; Möllering, Helen; Schneider, Thomas; Yalame, Mohammad Hossein
crypto day matters : Beiträge vom 32. Kryptotag
[Conference Proceedings]

Disrupting Continuity of Apple's Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi
Stute, Milan; Heinrich, Alexander; Lorenz, Jannik; Hollick, Matthias
30th USENIX Security Symposium
[Conference Proceedings]

DEMO: BTLEmap: Nmap for Bluetooth Low Energy
Heinrich, Alexander; Stute, Milan; Hollick, Matthias
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '20)
[Conference Proceedings]

BUFFing signature schemes beyond unforgeability and the case of post-quantum signature
Cremers, Cas; Düzlü, Samed; Fiedler, Rune; Fischlin, Marc; Janson, Christian
42nd IEEE Symposium on Security and Privacy
[Conference Proceedings]

Generic Compiler for Publicly Verifiable Covert Multi-Party Computation
Faust, Sebastian; Hazay, Carmit; Kretzler, David; Schlosser, Benjamin
40th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt 2021)
[Conference Proceedings]

Trusted Configuration in Cloud FPGAs
Zeitouni, Shaza; Vliegen, Jo; Frassetto, Tommaso; Koch, Dirk; Sadeghi, Ahmad-Reza; Mentens, Nele
29th IEEE International Symposium on Field-Programmable Custom Computing Machines
[Conference Proceedings]

Two-Party Adaptor Signatures From Identification Schemes
Erwig, Andreas; Faust, Sebastian; Hostáková, Kristina; Maitra, Monosij; Riahi, Siavash
24th International Conference on Practice and Theory of Public-Key Cryptography
[Conference Proceedings]

Bitcoin-Compatible Virtual Channels
Aumayr, Lukas; Ersoy, Oguzhan; Erwig, Andreas; Faust, Sebastian; Hostáková, Kristina; Maffei, Matteo; Moreno-Sanchez, Pedro; Riahi, Siavash
42nd IEEE Symposium on Security and Privacy
[Conference Proceedings]

Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge
Fischlin, Marc; Rohrbach, Felix
Public-Key Cryptography - PKC 2021, p.205-234
[Conference Proceedings]

HERA: Hotpatching of Embedded Real-time Applications
Niesler, Christian; Surminski, Sebastian; Davi, Lucas
Proc. of 28th Network and Distributed System Security Symposium (NDSS 2021)
[Conference Proceedings]

ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation
Patra, Arpita; Schneider, Thomas; Suresh, Ajith; Yalame, Mohammad Hossein
30th USENIX Security Symposium (USENIX Security'21)
[Conference Proceedings]

All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers
Hagen, Christoph; Weinert, Christian; Sendner, Christoph; Dmitrienko, Alexandra; Schneider, Thomas
28. Annual Network and Distributed System Security Symposium (NDSS'21)
[Conference Proceedings]