Publikationen

Publikationen

Deep­fakes: A New Kind of Adversarial Attacks Against Face Recognition Systems?
Frick, Raphael Antonius; Graner, Lukas
23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024
[Conference Paper]


Adapter fusion for check-worthiness detection - combining a task adapter with a NER adapter
Vogel, Inna; Möhle, Pauline; Meghana, Meghana; Steinebach, Martin
4th Workshop on Reducing Online Misinformation through Credible Information Retrieval, ROMCIR 2024
[Conference Paper]


Improved identification of check-worthiness in social media data through multimodal analyses
Frick, Raphael Antonius; Steinebach, Martin
4th Workshop on Reducing Online Misinformation through Credible Information Retrieval, ROMCIR 2024
[Conference Paper]


Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms
Frieß, Johannes L.; Gattermayer, Tobias; Gelernter, Nethanel; Shulman, Haya; Waidner, Michael
21st USENIX Symposium on Networked Systems Design and Implementation, NSDI 2024
[Conference Paper]


Profiling Side-Channel Attacks on Dilithium: A Small Bit-Fiddling Leak Breaks It All
Ulitzsch, Vincent Quentin; Marzougui, Soundes; Tibouchi, Mehdi; Seifert, Jean Pierre
29th International Conference on Selected Areas in Cryptography, SAC 2022
[Conference Paper]


Color calibration for multicolored barcodes using smartphones
Bugert, Simon; Heeger, Julian; Berchtold, Waldemar
IS and T International Symposium on Electronic Imaging 2024: Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications 2024
[Conference Paper]


FraunhoferSIT@EXIST2024: Leveraging Stacking Ensemble Learning for Sexism Detection
Fan, Shiying; Frick, Raphael Antonius; Steinebach, Martin
25th Working Notes of the Conference and Labs of the Evaluation Forum, CLEF 2024
[Conference Paper]


Fraunhofer SIT at CheckThat! 2024: Adapter Fusion for Check-Worthiness Detection
Vogel, Inna; Möhle, Pauline
25th Working Notes of the Conference and Labs of the Evaluation Forum, CLEF 2024
[Conference Paper]


Sovereign document verification by smartphones
Berchtold, Waldemar; Heeger, Julian; Bugert, Simon; Biermann, Lukas; Liu, Huajian
IS and T International Symposium on Electronic Imaging 2024: Media Watermarking, Security, and Forensics, MWSF 2024
[Conference Paper]


Evaluating an Open-Source Hardware Approach from HDL to GDS for a Security Chip Design - a Review of the Final Stage of Project HEP
Henkes, Tim; Reith, Steffen; Stöttinger, Marc; Herfurth, Norbert; Panić, Goran; Wälde, Julian; Buschkowski, Fabian; Sasdrich, Pascal; Lüth, Christoph; Funck, Milan; Kiyan, Tuba; Weber, Arnd; Boeck, Detlef; Rathfelder, Rene; Grawunder, Torsten
2024 Design, Automation and Test in Europe Conference and Exhibition, DATE 2024
[Conference Paper]


Fraunhofer SIT at WASSA 2024 Empathy and Personality Shared Task: Use of Sentiment Transformers and Data Augmentation With Fuzzy Labels to Predict Emotional Reactions in Conversations and Essays
Frick, Raphael Antonius; Steinebach, Martin
14th Workshop on Computational Approaches to Subjectivity, Sentiment, and Social Media Analysis, WASSA 2024
[Conference Paper]


Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks
Schröder, Robin Leander; Gast, Stefan; Guo, Qian
33rd USENIX Security Symposium, USENIX Security 2024
[Conference Paper]


LanDscAPe: Exploring LDAP Weaknesses and Data Leaks at Internet Scale
Kaspereit, Jonas; Öndarö, Gurur; Cesar, Gustavo Luvizotto; Ebbers, Simon; Ising, Fabian; Saatjohann, Christoph; Jonker, Mattijs; Holz, Ralph G.; Schinzel, Sebastian
33rd USENIX Security Symposium, USENIX Security 2024
[Conference Paper]


Attacking with Something That Does Not Exist: ‘Proof of Non-Existence’ Can Exhaust DNS Resolver CPU
Gruza, Olivia; Heftrig, Elias; Jacobsen, Oliver; Shulman, Haya; Vogel, Niklas; Waidner, Michael
18th USENIX WOOT Conference on Offensive Technologies, WOOT 2024
[Conference Paper]


What All the Phuzz Is About: A Coverage-guided Fuzzer for Finding Vulnerabilities in PHP Web Applications
Neef, Sebastian; Kleissner, Lorenz; Seifert, Jean Pierre
19th ACM Asia Conference on Computer and Communications Security, AsiaCCS 2024
[Conference Paper]


Dynamically Generating Callback Summaries for Enhancing Static Analysis
Arzt, Steven; Miltenberger, Marc; Näumann, Julius
38th European Conference on Object-Oriented Programming, ECOOP 2024
[Conference Paper]


Toward Self-Adjusting k-Ary Search Tree Networks
Feder, Evgeniy; Paramonov, Anton; Mavrin, P. A.; Salem, Iosif; Aksenov, Vitaly E.; Schmid, Stefan
32nd Annual European Symposium on Algorithms, ESA 2024
[Conference Paper]


Musketeer: Incentive-Compatible Rebalancing for Payment Channel Networks
Avarikioti, Zeta; Schmid, Stefan; Tiwari, Samarth
6th Conference on Advances in Financial Technologies, AFT 2024
[Conference Paper]


Attacking with Something That Does Not Exist: ’Proof of Non-Existence’ Can Exhaust DNS Resolver CPU
Olivia Gruza and Elias Heftrig and Oliver Jacobsen and Haya Schulmann and Niklas Vogel and Michael Waidner
18th USENIX WOOT Conference on Offensive Technologies (WOOT 24), p.45–57
[Conference Proceedings]


Insights into SAV Implementations in the Internet
Haya Schulmann and Shujie Zhao
Passive and Active Measurement, p.69–87
[Conference Proceedings]


Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms
Jens Frieß and Tobias Gattermayer and Nethanel Gelernter and Haya Schulmann and Michael Waidner
21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24), p.1977–1994
[Conference Proceedings]


The CURE to Vulnerabilities in RPKI Validation
Donika Mirdita and Haya Schulmann and Niklas Vogel and Michael Waidner
31st Annual Network and Distributed System Security Symposium
[Conference Proceedings]


Crowdsourced Distributed Domain Validation
Jens Frieß and Haya Schulmann and Michael Waidner
Proceedings of the 23rd ACM Workshop on Hot Topics in Networks, p.318–325
[Conference Proceedings]


Poster: From Fort to Foe: The Threat of RCE in RPKI
Oliver Jacobsen and Haya Schulmann and Niklas Vogel and Michael Waidner
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.5015–5017
[Conference Proceedings]


Poster: Patching NSEC3-Encloser: The Good, the Bad, and the Ugly
Oliver Jacobsen and Haya Schulmann
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4937–4939
[Conference Proceedings]


Poster: Security of Login Interfaces in Modern Organizations
Kevin Nsieyanji Tchokodeu and Haya Schulmann and Gil Sobol and Michael Waidner
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4925–4927
[Conference Proceedings]


Poster: Kill Krill or Proxy RPKI
Louis Cattepoel and Donika Mirdita and Haya Schulmann and Michael Waidner
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4922–4924
[Conference Proceedings]


The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC
Elias Heftrig and Haya Schulmann and Niklas Vogel and Michael Waidner
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.497–510
[Conference Proceedings]


Byzantine-Secure Relying Party for Resilient RPKI
Jens Frieß and Donika Mirdita and Haya Schulmann and Michael Waidner
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.49–63
[Conference Proceedings]


External Attack-Surface of Modern Organizations
Nethanel Gelernter and Haya Schulmann and Michael Waidner
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, p.589–604
[Conference Proceedings]