Publikationen

Publikationen

DaVinci: Android App Analysis beyond Frida via Dynamic System Call Instrumentation
Druffel, Alexander; Heid, Kris
International Conference on Applied Cryptography and Network Security (ACNS) 2020
[Conference Paper]


The Impact of DNS Insecurity on Time
Jeitner, P.; Shulman, H.; Waidner, M.
International Conference on Dependable Systems and Networks (DSN) 2020
[Conference Paper]


Critical traffic analysis on the tor network
Platzer, Florian; Schäfer, Marcel; Steinebach, Martin
International Conference on Availability, Reliability and Security (ARES) 2020
[Conference Paper]


Detecting double compression and splicing using benfords first digit law
Frick, Raphael Antonius; Liu, Huajian; Steinebach, Martin
International Conference on Availability, Reliability and Security (ARES) 2020
[Conference Paper]


Post-Quantum TLS on Embedded Systems: Integrating and Evaluating Kyber and SPHINCS+ with mbed TLS
Bürstinghaus-Steinbach, Kevin; Krauß, Christoph; Niederhagen, Ruben; Schneider, Michael
ASIA Conference on Computer and Communications Security (ASIACCS) 2020
[Conference Paper]


A novel approach for generating synthetic datasets for digital forensics
Göbel, T.; Schäfer, T.; Hachenberger, J.; Türr, J.; Baier, H.
International Conference on Digital Forensics 2020
[Conference Paper]


Securing DNSSEC Keys via Threshold ECDSA from Generic MPC
Dalskov, Anders; Orlandi, Claudio; Keller, Marcel; Shrishak, Kris; Shulman, Haya
European Symposium on Research in Computer Security (ESORICS) 2020
[Conference Paper]


Analyzing Linguistic Features of German Fake News: Characterization, Detection, and Discussion
Vogel, Inna
Sommerakademie der Zivilen Sicherheitsforschung 2020
[Conference Paper]


Securing Electric Vehicle Charging Systems through Component Binding
Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria
International Conference on Computer Safety, Reliability, and Security (SAFECOMP) 2020
[Conference Paper]


Non-blind steganalysis
Bunzel, Niklas; Steinebach, Martin; Liu, Huajian
International Conference on Availability, Reliability and Security (ARES) 2020
[Conference Paper]


HIP-20: Integration of Vehicle-HSM-Generated Credentials into Plug-and-Charge Infrastructure
Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria; Heddergott, Ronald
Computer Science in Cars Symposium (CSCS) 2020
[Conference Paper]


HIP: HSM-Based Identities for Plug-and-Charge
Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria
International Conference on Availability, Reliability and Security (ARES) 2020
[Conference Paper]


Raising Security Awareness on Mobile Systems through Gamification
Heid, Kris; Heider, Jens; Qasempour, Kasra
European Interdisciplinary Cybersecurity Conference (EICC) 2020
[Conference Paper]


ECU-Secure: Characteristic Functions for In-Vehicle Intrusion Detection
Chevalier, Yannick; Rieke, Roland; Fenzl, Florian; Chechulin, Andrey; Kotenko, Igor
International Symposium on Intelligent Distributed Computing (IDC) 2019
[Conference Paper]


Cross-Domain Authorship Verification Based on Topic Agnostic Features
Halvani, Oren; Graner, Lukas; Regev, Roey
Conference and Labs of the Evaluation Forum (CLEF) 2020
[Conference Paper]


Performance penalties of resilient SDN infrastructures
Senf, Daniel; Shulman, Haya; Waidner, Michael
International Conference on emerging Networking EXperiments and Technologies (CoNEXT) 2020
[Conference Paper]


Privacy-enhanced robust image hashing with bloom filters
Breidenbach, Uwe; Steinebach, Martin; Liu, Huajian
International Conference on Availability, Reliability and Security (ARES) 2020
[Conference Paper]


DISCO: Sidestepping RPKI's Deployment Barriers
Hlavacek, Tomas; Cunha, Italo; Gilad, Yossi; Herzberg, Amir; Katz-Bassett, Ethan; Schapira, Michael; Shulman, Haya
Network and Distributed Systems Security Symposium (NDSS) 2020
[Conference Paper]


Diving into Email Bomb Attack
Schneider, M.; Shulman, H.; Sidis, A.; Sidis, R.; Waidner, M.
International Conference on Dependable Systems and Networks (DSN) 2020
[Conference Paper]


Blocking Email Bombs with EmailGlass
Schneider, Markus; Shulman, Haya; Waidner, Michael
Global Communications Conference (GLOBECOM) 2020
[Conference Paper]


Decision support for mobile app selection via automated privacy assessment
Wettlaufer, J.; Simo, H.
Summer School on Privacy and Identity Management "Data for Better Living - Artificial Intelligence and Privacy" 2019
[Conference Paper]


Limiting the Power of RPKI Authorities
Shrishak, Kris; Shulman, Haya
Applied Networking Research Workshop (ANRW) 2020
[Conference Paper]


SEPAD - Security Evaluation Platform for Autonomous Driving
Zelle, Daniel; Rieke, Roland; Plappert, Christian; Krauß, Christoph; Levshun, Dmitry; Chechulin, Andrey
International Conference on Parallel, Distributed and Network-Based Processing (PDP) 2020
[Conference Paper]


The Lattice-Based Digital Signature Scheme qTESLA
Alkim, E.; Barreto, P.S.L.M.; Bindel, N.; Krämer, J.; Longa, P.; Ricardini, J.E.
International Conference on Applied Cryptography and Network Security (ACNS) 2020
[Conference Paper]


Side Channel Information Set Decoding Using Iterative Chunking
Lahr, Norman; Niederhagen, Ruben; Petri, Richard; Samardjiska, Simona
International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT) 2020
[Conference Paper]


Cryptanalysis of FNV-Based cookies
Klein, A.; Shulman, H.; Waidner, M.
Global Communications Conference (GLOBECOM) 2020
[Conference Paper]


DFarm: Massive-Scaling Dynamic Android App Analysis on Real Hardware
Miltenberger, Marc; Gerding, Julien; Guthmann, Jens; Arzt, Steven
International Conference on Mobile Software Engineering and Systems (MOBILESoft) 2020
[Conference Paper]


Pitfalls of provably secure systems in internet the case of chronos-NTP
Jeitner, P.; Shulman, H.; Waidner, M.
International Conference on Dependable Systems and Networks (DSN) 2020
[Conference Paper]


Secure consensus generation with distributed DoH
Jeitner, P.; Shulman, H.; Waidner, M.
International Conference on Dependable Systems and Networks (DSN) 2020
[Conference Paper]


Towards Secure Urban Infrastructures: Cyber Security Challenges for Information and Communication Technology in Smart Cities
Reuter, Christian; Haunschild, Jasmin; Hollick, Matthias; Mühlhäuser, Max; Vogt, Joachim; Kreutzer, Michael
Konferenz "Mensch und Computer" (MuC) 2020
[Conference Paper]