Publikationen

Publikationen

Künstliche Intelligenz und Geldwäschecompliance
Hauler, Timo; Hahne, Michael; Battis, Verena
Gesellschaft für Informatik (GI Jahrestagung) 2024
[Conference Paper]


KI-generierte Abbildungen von Kindesmissbrauch
Steinebach, Martin; Drechsler, Julian; Schröder, Lilly
Gesellschaft für Informatik (GI Jahrestagung) 2024
[Conference Paper]


Bridging the Gap: The Role of OWASP AI Exchange in AI Standardization
Bunzel, Niklas; Göller, Nicolas
Gesellschaft für Informatik (GI Jahrestagung) 2024
[Conference Paper]


The Impact of Asynchrony on Stability of MAC
Garncarek, Pawel; Kowalski, Dariusz R.; Kutten, Shay; Murach, Lauren
International Conference on Distributed Computing Systems 2024
[Conference Paper]


Investigating Voter Perceptions of Printed Physical Audit Trails for Online Voting
Marky, Karola; Gerber, Nina; Krumb, Henry John; Khamis, Mohamed; Mühlhäuser, Max
2024 IEEE Symposium on Security and Privacy (SP), p.3458-3477
[Conference Proceedings]


Of Mothers and Managers – The Effect of Videos Depicting Gender Stereotypes on Women and Men in the Security and Privacy Field
Gerber, Nina; Stöver, Alina; Mayer, Peter
Twentieth Symposium on Usable Privacy and Security (SOUPS 2024), p.547-566
[Conference Proceedings]


Second Edition FRCSyn Challenge at CVPR 2024: Face Recognition Challenge in the Era of Synthetic Data
DeAndres-Tame, Ivan; Tolosana, Ruben; Melzi, Pietro; Vera-Rodriguez, Ruben; Kim, Minchul; Rathgeb, Christian; Liu, Xiaoming; Morales, Aythami; Fierrez, Julian; Ortega-Garcia, Javier; Zhong, Zhizhou; Huang, Yuge; Mi, Yuxi; Ding, Shouhong; Zhou, Shuigeng; He, Shuai; Fu, Lingzhi; Cong, Heng; Zhang, Rongyu; Xiao, Zhihong; Smirnov, Evgeny; Pimenov, Anton; Grigorev, Aleksei; Timoshenko, Denis; Asfaw, Kaleb Mesfin; Yaw Low, Cheng; Liu, Hao; Wang, Chuyi; Zuo, Qing; He, Zhixiang; Shahreza, Hatef Otroshi; George, Anjith; Unnervik, Alexander; Rahimi, Parsa; Marcel, Sébastien; Neto, Pedro C.; Huber, Marco; Kolf, Jan Niklas; Damer, Naser; Boutros, Fadi; Cardoso, Jaime S.; Sequeira, Ana F.; Andrea Atzori; Fenu, Gianni; Marras, Mirko; Štruc, Vitomir; Yu, Jiang; Li, Zhangjie; Li, Jichun; Zhao, Weisong; Lei, Zhen; Zhu, Xiangyu; Zhang, Xiao-Yu; Biesseck, Bernardo; Vidal, Pedro; Coelho, Luiz; Granada, Roger; Menotti, David
Conference on Computer Vision and Pattern Recognition Workshops 2024
[Conference Paper]


GraFIQs: Face Image Quality Assessment Using Gradient Magnitudes
Kolf, Jan Niklas; Damer, Naser; Boutros, Fadi
Conference on Computer Vision and Pattern Recognition Workshops 2024
[Conference Paper]


Measuring the Effects of Environmental Influences on Object Detection
Bunzel, Niklas; Geibler, Michel; Klause, Gerrit
International Conference on Dependable Systems and Networks 2024
[Conference Paper]


Adversarial Patch Detection: Leveraging Depth Contrast for Enhanced Threat Visibility
Bunzel, Niklas; Hamborg, Jannis
International Conference on Dependable Systems and Networks 2024
[Conference Paper]


Patching the Cracks: Detecting and Addressing Adversarial Examples in Real-World Applications
Bunzel, Niklas
International Conference on Dependable Systems and Networks 2024
[Conference Paper]


Brief Announcement: Minimizing the Weighted Average Shortest Path Length in Demand-Aware Networks via Matching Augmentation
Figiel, Aleksander; Melnyk, Darya; Nichterlein, André; Pourdamghani, Arash; Schmid, Stefan
Symposium on Parallelism in Algorithms and Architectures 2024
[Conference Paper]


Identifying and Generating Edge Cases
Bunzel, Niklas; Göller, Nicolas; Frick, Raphael
Workshop on Secure and Trustworthy Deep Learning Systems 2024
[Conference Paper]


Signals Are All You Need: Detecting and Mitigating Digital and Real-World Adversarial Patches Using Signal-Based Features
Bunzel, Niklas; Frick, Raphael Antonius; Klause, Gerrit; Schwarte, Aino; Honermann, Jonas
Workshop on Secure and Trustworthy Deep Learning Systems 2024
[Conference Paper]


The Cyber Safe Position: An STPA for Safety, Security, and Resilience Co-Engineering Approach
Gkoktsis, Georgios; Peters, Ludger
International Conference on Availability, Reliability and Security 2024
[Conference Paper]


Tero: Offloading CDN Traffic to Massively Distributed Devices
Vanerio, Juan Martín; Hugerich, Lily; Schmid, Stefan
International Conference on Distributed Computing and Networking 2024
[Conference Paper]


Insights into SAV Implementations in the Internet
Schulmann, Haya; Zhao, Shujie
International Conference on Passive and Active Measurement 2024
[Conference Paper]


Scientific Appearance in Telegram
Choi, Jeong-Eun; Schäfer, Karla; Yannikos, York
International Conference on Web and Social Media 2024
[Conference Paper]


Haven't we met before? - Detecting Device Fingerprinting Activity on Android Apps
Heid, Kris; Heider, Jens
European Interdisciplinary Cybersecurity Conference 2024
[Conference Paper]


LanDscAPe: Exploring LDAP weaknesses and data leaks at Internet scale
Kaspereit, Jonas; Öndarö, Gurur; Luvizotto Cesar, Gustavo; Ebbers, Simon; Ising, Fabian; Saatjohann, Christoph; Jonker, Mattijs; Holz, Ralph; Schinzel, Sebastian
USENIX Security Symposium 2024
[Conference Paper]


Position: How Regulation Will Change Software Security Research
Arzt, Steven; Schreiber, Linda; Appelt, Dominik
International Workshop on Software Engineering in 2030 2024
[Paper]


Attacking with Something That Does Not Exist: 'Proof of Non-Existence' Can Exhaust DNS Resolver CPU
Gruza, Olivia; Heftrig, Elias; Jacobsen, Oliver; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Conference on Offensive Technologies 2024
[Paper]


External Attack-Surface of Modern Organizations
Gelernter, Nethanel; Schulmann, Haya; Waidner, Michael
Asia Conference on Computer and Communications Security 2024
[Conference Paper]


The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC
Heftrig, Elias; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Conference on Computer and Communications Security 2024
[Paper]


Byzantine-Secure Relying Party for Resilient RPKI
Frieß, Jens; Mirdita, Donika; Schulmann, Haya; Waidner, Michael
[Paper]


Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms
Frieß, Jens; Gattermayer, Tobias; Gelernter, Nethanel; Schulmann, Haya; Waidner, Michael
Symposium on Networked Systems Design and Implementation 2024
[Paper]


Protocol Fixes for KeyTrap Vulnerabilities
Heftrig, Elias; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Applied Networking Research Workshop 2024
[Conference Paper]


The CURE to Vulnerabilities in RPKI Validation
Mirdita, Donika; Schulmann, Haya; Vogel, Niklas; Waidner, Michael
Network and Distributed System Security Symposium 2024
[Conference Paper]


Hardware Trust Anchor Authentication for Updatable IoT Devices
Lorych, Dominik; Plappert, Christian
International Conference on Availability, Reliability and Security 2024
[Conference Paper]


A Photo and a Few Spoken Words Is All It Needs?! On the Challenges of Targeted Deepfake Attacks and their Detection
Frick, Raphael; Steinebach, Martin
Workshop on the Security Implications of Deepfakes and Cheapfakes 2024
[Conference Paper]