Publikationen
Publikationen
SwitchAR: Enabling Perceptual Manipulations in Augmented
Reality Leveraging Change Blindness and Inattentional Blindness
Wombacher, Jonas; Li, Zhipeng; Gugenheimer, Jan
CHI EA '25: Proceedings of the Extended Abstracts of the CHI Conference on Human Factors in Computing Systems
[Conference Proceedings]
SwitchAR: Perceptual Manipulations in Augmented Reality
Wombacher, Jonas; Li, Zhipeng; Gugenheimer, Jan
UIST '25: Proceedings of the 38th Annual ACM Symposium on User Interface Software and Technology
[Conference Proceedings]
LightShed: Defeating Perturbation-based Image Copyright Protections
Foerster, Hanna; Behrouzi, Sasha; Rieger, Phillip; Jadliwala, Murtuza; Sadeghi, Ahmad-Reza
Proceedings of the 34th USENIX Security Symposium, p.7271-7290
[Conference Proceedings]
ZORRO: Zero-Knowledge Robustness and Privacy for Split Learning
Sheybani, Nojan; Pegoraro, Alessandro; Knauer, Jonathan; Rieger, Phillip; Mollakuqe, Elissa; Koushanfar, Farinaz; Sadeghi, Ahmad-Reza
CCS '25: Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.321-334
[Conference Proceedings]
Learning to Identify Conflicts in RPKI
Haya Schulmann and Shujie Zhao
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, p.1490–1505
[Conference Proceedings]
ValidaTor: Domain Validation over Tor
Jens Frieß and Haya Schulmann and Michael Waidner
22nd USENIX Symposium on Networked Systems Design and Implementation (NSDI 25), p.1367–1380
[Conference Proceedings]
Stealth BGP Hijacks with uRPF Filtering
Haya Schulmann and Shujie Zhao
19th USENIX WOOT Conference on Offensive Technologies (WOOT 25), p.129–138
[Conference Proceedings]
Poster: Exploring the Landscape of RPKI Relying Parties
Donika Mirdita and Haya Schulmann and Michael Waidner
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4773–4775
[Conference Proceedings]
Poster: We must talk about RPKI Repositories
Haya Schulmann and Niklas Vogel
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4755–4757
[Conference Proceedings]
Poster: The Rocky Road Towards RPKI Algorithm Agility
Katharina Miesch and Haya Schulmann and Niklas Vogel
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4767–4769
[Conference Proceedings]
Demo: Stopping Production Testing: A Graphical RPKI Test-Suite
Tobias Kirsch and Haya Schulmann and Niklas Vogel
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, p.4722–4723
[Conference Proceedings]
Post-Quantum Cryptography in eMRTDs – Evaluating PAKE and PKI for Travel Documents
N. Alnahawi and M. Azouaoui and J. Bos and G. Davies and S. Moon and C. van Vredendaal and A. Wiesmaier
Security Standardisation Research Conference (SSR'25)
[Conference Proceedings]
Improving Anomaly Detection for Electric Vehicle Charging with Generative Adversarial Networks
Ha The, Viet and Kern, Dustin and Nguyen Tan, Phat and Krauß, Christoph
Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing SAC, p.1800–1809
[Conference Proceedings]
Anomaly Detection and Mitigation for Electric Vehicle Charging-Based Attacks on the Power Grid
Kern, Dustin and Krauß, Christoph and Hollick, Matthias
Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing SAC, p.1790–1799
[Conference Proceedings]
Data Distribution and Redistribution - A formal and practical Analysis of the DDS Security Standard
Lauser, Timm and Müller, Maximilian and Baumgart, Ingmar and Krauß, Christoph
Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing SAC, p.1839–1848
[Conference Proceedings]
RollCAN – CAN-bus based RollJam-Attack
Hamborg, Jannis and Lauser, Timm and Krauß, Christoph
Proceedings of the 2nd Cyber Security in CarS Workshop
[Conference Proceedings]
Towards a Holistic and Multi-Modal Vehicle Security Monitoring
Yekta, Ali Recai and Spychalski, Dominik and Yekta, Cenk and Heinrich, Markus and Krauß, Christoph and Katzenbeisser, Stefan
Proceedings of the 20th International Conference on Critical Information Infrastructures Security (CRITIS)
[Conference Proceedings]
CarDS - Controller Area Network and Automotive Ethernet Realistic Data Set
Hellemans, Wouter and Hamborg, Jannis and Lauser, Timm and Rabbani, Md Masoom and Preneel, Bart and Krauß, Christoph and Mentens, Nele
Proceedings of the 41st Annual Computer Security Applications Conference (ACSAC)
[Conference Proceedings]
A Lot of Data and Added Complexity. How Does PQC Affect the Performance of My TLS Connection?
Henrich, Johanna
and Schmitt, Nicolai
and Alnahawi, Nouri
and Heinemann, Andreas
Information Security, p.107–128
[Conference Proceedings]
Simulation-Based Software Leakage Evaluation for the RISC-V Platform
Schmitt, Nicolai
and Zeitschner, Jannik
and Heinemann, Andreas
Information Security, p.175–195
[Conference Proceedings]
Syn-IDPass: Passport Synthetic Dataset for Presentation Attack Detection?
J. E. Tapia and F. Stockhardt and L. J. Gonzalez-Soler and C. Busch
Proc. IEEE Intl. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]
Single-morphing attack detection using few-shot learning and triplet-loss
J. E. Tapia and D. Schulz and C. Busch
Neurocomputing
[Conference Proceedings]
Generating Automatically Print/Scan Textures for Morphing Attack Detection Applications
J. E. Tapia and M. Russo and C. Busch
IEEE Access
[Conference Proceedings]
Towards Iris Presentation Attack Detection with Foundation Models
J. E. Tapia and L. J. Gonzalez-Soler and C. Busch
The 19th IEEE International Conference on Automatic Face and Gesture
[Conference Proceedings]
Can Foundation Models Predict Fitness for Duty?
J. E. Tapia and C. Busch
The IEEE International Joint Conference on Biometrics (IJCB)
[Conference Proceedings]
Enhanced Deep Learning DeepFake Detection Integrating Handcrafted Features
A. Hinke-Navarro and M. Nieto-Hidalgo and J. M. Espin and J. E. Tapia
21st International Conference in Computer Analysis of Images and Patterns (CAIP) September 22-25
[Conference Proceedings]
Second Competition on Presentation Attack Detection on ID Card
J. E. Tapia and M. Nieto and J. M. Espin and A. S. Rocamora and J. Barrachina and N. Damer and C. Busch
International Joint Conference in Biometrics (IJCB) 2025
[Conference Proceedings]
Impact and Mitigation of Quality Degradation for Differential Morphing Attack Detection
T. Schlett and C. Rathgeb and J. E. Tapia and C. Busch
Intl. Workshop on Biometrics and Forensics (IWBF)
[Conference Proceedings]
Secure Multi-Party Homomorphic Encryption for Post-Quantum Biometric Recognition
H. Paaske and F. Bayer and C. Rathgeb
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG)
[Conference Proceedings]
LivDet 2025: Toward Robust and Generalizable Fingerprint Presentation Attack Detection
G. Orru and M. Micheletto and R. Casula and S. Zedda and D. Fenu and L. Igene and J. Priesnitz and C. Busch and C. Rathgeb and S. C. Schuckers and G. L. Marcialis
Intl. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]


