Publikationen

Publikationen

Downgrading DNSSEC: How to Exploit Crypto Agility for Hijacking Signed Zones
Elias Heftrig and Haya Schulmann and Michael Waidner
32nd USENIX Security Symposium (USENIX Security 23), p.7429–7444
[Conference Proceedings]


Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet
Tomas Hlavacek and Haya Schulmann and Niklas Vogel and Michael Waidner
32nd USENIX Security Symposium (USENIX Security 23), p.4841–4858
[Conference Proceedings]


Poster: Off-Path DNSSEC Downgrade Attacks
Elias Heftrig and Haya Schulmann and Michael Waidner
Proceedings of the ACM SIGCOMM 2023 Conference, p.1120–1122
[Conference Proceedings]


Poster: LeMon: Global Route Leak Monitoring Service
Haya Schulmann and Shujie Zhao
Proceedings of the ACM SIGCOMM 2023 Conference, p.1111–1113
[Conference Proceedings]


Beyond Limits: How to Disable Validators in Secure Networks
Tomas Hlavacek and Philipp Jeitner and Donika Mirdita and Haya Schulmann and Michael Waidner
Proceedings of the ACM SIGCOMM 2023 Conference, p.950–966
[Conference Proceedings]


Poster: Longitudinal Analysis of DoS Attacks
Fabian Kaiser and Haya Schulmann and Michael Waidner
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, p.3573–3575
[Conference Proceedings]


QuantumCharge: Post-Quantum Cryptography for Electric Vehicle Charging
D. Kern and C. Krauß and T. Lauser and N. Alnahawi and A. Wiesmaier and R. Niederhagen
Applied Cryptography and Network Security: 21st International Conference, ACNS 2023, p.85–111
[Conference Proceedings]


Towards a maturity model for crypto-agility assessment
J. Hohm and A. Heinemann and A. Wiesmaier
15th International Symposium on Foundations & Practice of Security, p.104–119
[Conference Proceedings]


Performance Impact of PQC KEMs on TLS 1.3 under Varying Network Characteristics
J. Henrich and A. Heinemann and A. Wiesmaier and N. Schmitt
Information Security Conference (ISC), p.267–287
[Conference Proceedings]


Detecting 5G Signal Jammers with Autoencoders Based on Loose Observations
Matteo Varotto and Stefan Valentin and Stefano Tomasin
IEEE Globecom Workshops 2023, Kuala Lumpur, Malaysia, December 4-8, 2023, p.160–165
[Conference Proceedings]


Detection of e-Mobility-based Attacks on the Power Grid
Kern, Dustin and Krauß, Christoph
53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
[Conference Proceedings]


QuantumCharge: Post-Quantum Cryptography for Electric Vehicle Charging
Kern, Dustin and Krauß, Christoph and Lauser, Timm and Alnahawi, Nouri and Wiesmaier, Alexander and Niederhagen, Ruben
21st International Conference on Applied Cryptography and Network Security (ACNS)
[Conference Proceedings]


Formal Security Analysis of Vehicle Diagnostic Protocols
Lauser, Timm and Krauß, Christoph
The 17th International Conference on Availability, Reliability and Security, ARES
[Conference Proceedings]


Remote Attestation with Constrained Disclosure
Eckel, Michael and George, Dominik Roy and Grohmann, Björn and Krauß, Christoph
Proceedings of the 39th Annual Computer Security Applications Conference, p.718–731
[Conference Proceedings]


Detection of Anomalies in Electric Vehicle Charging Sessions
Kern, Dustin and Krauß, Christoph and Hollick, Matthias
Proceedings of the 39th Annual Computer Security Applications Conference, p.298–309
[Conference Proceedings]


Crypto-Agile Design and Testbed for QKD-Networks
Henrich, Johanna and Heinemann, Andreas and Stiemerling, Martin and Seidl, Fabian
Proceedings of the 2023 European Interdisciplinary Cyber­security Conference, p.191–192
[Conference Proceedings]


Performance Impact of PQC KEMs on TLS 1.3 Under Varying Network Characteristics
Henrich, Johanna and Heinemann, Andreas and Wiesmaier, Alexander and Schmitt, Nicolai
Information Security, ISC 2023. Lecture Notes in Computer Science, vol 14411, p.267–287
[Conference Proceedings]


Fitness-for-Duty Classification using Temporal Sequences of Iris Periocular images
P. Zurita and D. Benalcazar and J. Tapia
Intl. Workshop on Biometrics and Forensics (IWBF)
[Conference Proceedings]


Iris Liveness Detection Competition (LivDet-Iris)
P. Tinsley and S. Purnapatra and M. Mitcheff and A. Boyd and C. Crum and M. Fang and N. Damer and X. Liu and C. Wang and X. Sun and Z. Chang and X. Li and G. Zhao and J. Tapia and C. Busch and C. Aravena and D. Schulz and S. Schuckers and K. Bowyer and P. Flynn and A. Czajka
Intl. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]


Simulating Print/Scan Textures for Morphing Attack Detection
J. Tapia and H. Zhang and R. Raghavendra and K. Raja and C. Busch
European Signal Processing Conf. (EUSIPCO)
[Conference Proceedings]


Impact of Synthetic Images on Morphing Attack Detection Using a Siamese Network
J.Tapia and C. Busch
Iberoamerican Congress on Pattern Recognition (CIARP), p.343–357
[Conference Proceedings]


Classify NIR Iris images Under Alcohol/Drugs/Sleepiness Conditions Using a Siamese Network
J. Tapia and C. Busch
Iberoamerican Congress on Pattern Recognition (CIARP), p.575–588
[Conference Proceedings]


AlphaNet: Single Morphing Attack Detection using Multiple Contributors
J. Tapia and C. Busch
Intl. Workshop on Information Forensics and Security (WIFS)
[Conference Proceedings]


Effect of Lossy Compression Algorithms on Face Image Quality and Recognition
T. Schlett and S. Schachner and C. Rathgeb and J. Tapia and C. Busch
Intl. Conf. on Acoustics, Speech, and Signal Processing (ICASSP)
[Conference Proceedings]


Benchmarking fixed-length Fingerprint Representations across different Embedding Sizes and Sensor Types
T. Rohwedder and D. Osorio-Roig and C. Rathgeb and C. Busch
Proc. Intl. Conf. of the Biometrics Special Interest Group (BIOSIG)
[Conference Proceedings]


Multi-Biometric Fuzzy Vault based on Face and Fingerprints
C. Rathgeb and B. Tams and J. Merkle and V. Nesterowicz and U. Korte and M. Neu
Proc. Intl. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]


Towards Contactless Fingerprint Presentation Attack Detection using Algorithms from the Contact-based Domain
J. Priesnitz and R. Casula and C. Rathgeb and G. L. Marcialis and C. Busch
Conf. of the Biometrics Special Interest Group (BIOSIG)
[Conference Proceedings]


COLFIPAD: A Presentation Attack Detection Benchmark for Contactless Fingerprint Recognition
J. Priesnitz and J. Kolberg and M. Fang and A. Madhu and C. Rathgeb and N. Damer and C. Busch
Proc. of the Intl. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]


Flickr-PAD: New Face High-Resolution Presentation Attack Detection Database
D. Pasmino and C. Aravena and J. Tapia and C. Busch
Intl. Workshop on Biometrics and Forensics (IWBF)
[Conference Proceedings]


Reversing Deep Face Embeddings with Probable Privacy Protection
D. Osorio-Roig and PA. Gerlitz and C. Rathgeb and C. Busch
Proc. Intl. Workshop on Information Forensics and Security (WIFS), p.1–6
[Conference Proceedings]