Publikationen

Publikationen

Werkzeuge zur Messung der datenschutzkonformen Einhaltung des Verarbeitungsstandorts in der Cloud
Jaeger, Bernd; Kraft, Reiner; Selzer, Annika; Waldmann, Ulrich
Gesellschaft für Informatik (Jahrestagung) 45, 2015, Cottbus>
Sprache: German
[Conference Paper]


Welcome Message from Workshop Organizers: The First International Workshop on Agile Secure Software Development (ASSD 2015)
Röning, J.; Ben Othmane, L.
International Conference on Availability, Reliability and Security (ARES) 10, 2015, Toulouse>
Sprache: English
[Conference Paper]


Using targeted symbolic execution for reducing false-positives in dataflow analysis
Arzt, S.; Rasthofer, S.; Hahn, R.; Bodden, E.
International Workshop on State Of the Art in Program Analysis (SOAP) 4, 2015, Portland/Or.>
Sprache: English
[Conference Paper]


Using extensible metadata definitions to create a vendor-independent SIEM system
Detken, Kai-Oliver; Scheuermann, Dirk; Hellmann, Bastian
International Conference on Swarm Intelligence (ICSI) 6, 2015, Beijing>
Sprache: English
[Conference Paper]


Universal threshold calculation for fingerprinting decoders using mixture models
Schäfer, Marcel; Mair, Sebastian; Berchtold, Waldemar; Steinebach, Martin
Workshop on Information Hiding and Multimedia Security (IH&MMSec) 3, 2015, Portland/Or.>
Sprache: English
[Conference Paper]


Towards security of internet naming infrastructure
Shulman, Haya; Waidner, Michael
European Symposium on Research in Computer Security (ESORICS) 20, 2015, Vienna>
Sprache: English
[Conference Paper]


Towards secure integration of cryptographic software
Arzt, Steven; Nadi, S.; Ali, Karim; Bodden, Eric; Erdweg, S.; Mezini, Mira
International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software (Onward!) 2015, Pittsburgh/Pa.>
Sprache: English
[Conference Paper]


Time to rethink: Trust brokerage using trusted execution environments
Koeberl, Patrick; Phegada, Vinay; Rajan, Anand; Schneider, Thomas; Schulz, Steffen; Zhdanova, Maria
International Conference on Trust and Trustworthy Computing (TRUST) 8, 2015, Heraklion>
Sprache: English
[Conference Paper]


Studying the effects of SNS users' alternative privacy strategies with an activity tracking tool
Kramm, Andreas; Ilyes, Petra; Poller, Andreas; Kocksch, Laura
Workshop "The Future of Networked Privacy - Challenges and Opportunities" 2015, Vancouver>
Sprache: English
[Conference Paper, Electronic Publication]


Security vs. safety: Why do people die despite good safety?
Kuntze, N.; Rudolph, C.; Brisbois, G.B.; Boggess, M.; Endicott-Popovsky, B.; Leivesley, S.
Integrated Communications, Navigation, and Surveillance Conference (ICNS) 15, 2015, Herndon/Va.>
Sprache: English
[Conference Paper]


Security and privacy challenges in industrial internet of things
Sadeghi, Ahmad-Reza; Wachsmann, Christian; Waidner, Michael
Design Automation Conference (DAC) 52, 2015, San Francisco/Calif.>
Sprache: English
[Conference Paper]


Security and business situational awareness
Rieke, Roland; Zhdanova, Maria; Repp, Jürgen
Cyber Security and Privacy Innovation Forum (CSP) 4, 2015, Brussels>
Sprache: English
[Conference Paper]


Security analysis of software defined networking applications for monitoring and measurement. sFlow and BigTap
Dauer, Pascal; Khondoker, Rahamatullah; Marx, Ronald; Bayarou, Kpatcha
International Conference on Future Internet (CFI) 10, 2015, Seoul>
Sprache: English
[Conference Paper, Electronic Publication]


Security analysis of OpenRadio and SoftRAN with STRIDE framework: Presentation held at International Workshop on Manageability and Security of Network Function Virtualization and Software Defined Network (MASONS) at ICCCN 2015
Magin, Daniel; Khondoker, Rahamatullah; Bayarou, Kpatcha
International Conference on Computer Communications and Networks (ICCCN) 24, 2015, Las Vegas/Nev.>
Sprache: English
[Conference Paper, Electronic Publication, Presentation]


A ROI-based self-embedding method with high recovery capability
Cai, Hongliang; Liu, Huajian; Steinebach, Martin; Wang, Xiaojing
International Conference on Acoustics, Speech, and Signal Processing (ICASSP) 40, 2015, Brisbane>
Sprache: English
[Conference Paper]


Response to emergency situations in a traffic management system
Othmane, Lotfi ben; Cerqueus, Thomas; Thiery, Adrien; Salehie, Mazeiar; Noel, Nicolas; Labaere, Anthony; Domingues, Remi; Cordier, Arnaud; Ventresque, Anthony; Pasquale, Liliana; Perry, Philip; Nuseibeh, Bashar
World Congress on Computer Applications and Information Systems (WCCAIS) 2, 2015, Hammamet>
Sprache: English
[Conference Paper, Electronic Publication]


Pairs of languages closed under shuffle projection: Published on arXiv
Ochsenschläger, Peter; Rieke, Roland
Sprache: English
[Report, Electronic Publication, Preprint, Paper]


Overcoming obstacles: Encryption for everyone!
Stöwer, Mechthild; Rubinstein, Tatjana
Information Security Solutions Europe Conference (ISSE) 2015, Berlin>
Sprache: English
[Conference Paper]


On the secure distribution of vendor-specific keys in deployment scenarios
Kuntze, Nicolai; Fuchs, Anderas; Rudolph, Carsten
International Conference on ICT Systems Security and Privacy Protection (SEC) 30, 2015, Hamburg>
Sprache: English
[Conference Paper]


A novel image secret sharing scheme with meaningful shares
Cai, Hongliang; Liu, Huajian; Qizhao, Yuan; Steinebach, Martin; Xiaojing, Wang
International Conference on Acoustics, Speech, and Signal Processing (ICASSP) 40, 2015, Brisbane>
Sprache: English
[Conference Paper]


Mining apps for abnormal usage of sensitive data
Avdiienko, Vitalii; Kuznetsov, Konstantin; Gorla, Alessandra; Zeller, Andreas; Arzt, Steven; Rasthofer, Siegfried; Bodden, Eric
International Conference on Software Engineering (ICSE) 37, 2015, Florence>
Sprache: English
[Conference Paper]


The measurement of data locations in the cloud
Jaeger, Bernd; Kraft, Reiner; Luhn, Sebastian; Selzer, Annika; Waldmann, Ulrich
International Conference on Availability, Reliability and Security (ARES) 10, 2015, Toulouse>
Sprache: English
[Conference Paper]


Market-driven code provisioning to mobile secure hardware
Dmitrienko, A.; Heuser, S.; Nguyen, T.D.; Silva Ramos, M. da; Rein, A.; Sadeghi, A.-R.
International Conference on Financial Cryptography and Data Security (FC) 19, 2015, San Juan/Puerto Rico>
Sprache: English
[Conference Paper]


Literature review of the challenges of developing secure software using the agile approach
Oueslati, Hela; Rahman, Mohammad Masudur; Othmane, Lotfi ben
International Conference on Availability, Reliability and Security (ARES) 10, 2015, Toulouse>
Sprache: English
[Conference Paper]


jÄk: Using dynamic analysis to crawl and test modern web applications
Pellegrino, Giancarlo; Tschürtz, Constantin; Bodden, Eric; Rossow, Christian
International Symposium on Research in Attacks, Intrusions, and Defenses (RAID) 18, 2015, Kyoto>
Sprache: English
[Conference Paper]


Incremental development of RBAC-controlled E-marking system using the B method
Al-Hadhrami, Nasser; Aziz, Benjamin; Sardesai, Shantanu; Othmane, Lotfi ben
International Conference on Availability, Reliability and Security (ARES) 10, 2015, Toulouse>
Sprache: English
[Conference Paper]


Impact of initial target position on performance of UAV surveillance using opportunistic resource utilization networks
Lilien, Leszek T.; Othmane, Lotfi ben; Angin, Pelin; Bhargava, Bharat; Salih, Raed M.; DeCarlo, Andrew
Symposium on Reliable Distributed Systems (SRDS) 34, 2015, Montréal>
Sprache: English
[Conference Paper]


IccTA: Detecting inter-component privacy leaks in Android apps
Li, Li; Bartel, Alexandre; Bissyande, Tegawende F.; Klein, Jacques; Le Traon, Yves; Arzt, Steven; Rasthofer, Siegfried; Bodden, Eric; Octeau, Damien; McDaniel, Patrick
International Conference on Software Engineering (ICSE) 37, 2015, Florence>
Sprache: English
[Conference Paper]


"I am because we are". Developing and nurturing an African digital security culture
Renaud, Karen; Flowerday, Stephen; Othmane, Lotfi ben; Volkamer, Melanie
African Cyber Citizenship Conference (ACCC) 2015, Port Elizabeth/South Africa>
Sprache: English
[Conference Paper]


How current android malware seeks to evade automated code analysis
Rasthofer, Siegfried; Asrar, Irfan; Huber, Stephan; Bodden, Eric
International Conference on Information Security Theory and Practice (WISTP) 9, 2015, Heraklion>
Sprache: English
[Conference Paper]