Publikationen

Publikationen

A lightweight protocol for privacy preserving division
Boukoros, Spyros; Karvelas, Nikolaos; Katzenbeisser, Stefan
IWCMC 2017 - 13th International Wireless Communications and Mobile Computing Conference
[Conference Proceedings]


Transitioning to a Quantum-Resistant Public Key Infrastructure
Bindel, Nina; Herath, Udyani; McKague, Matthew; Stebila, Douglas
PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography
[Conference Proceedings]


Systematic Black-Box Analysis of Collaborative Web Applications
Billes, Marina; Møller, Anders; Pradel, Michael
PLDI '17 ACM SIGPLAN Conference on Programming Language Design and Implementation, p.708
[Conference Proceedings]


Revisiting TESLA in the quantum random oracle model
Alkim, Erdem; Bindel, Nina; Buchmann, Johannes; Dagdelen, Özgür; Eaton, Edward; Gutoski, Gus; Krämer, Juliane; Pawlega, Filip
PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography
[Conference Proceedings]


DEMO: Demonstrating Reactive Smartphone-Based Jamming
Schulz, Matthias; Hollick, Matthias; Gringoli, Francesco; Deligeorgopoulos, Efstathios
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017), p.285-287
[Conference Proceedings]


Massive reactive smartphone-based jamming using arbitrary waveforms and adaptive power control
Schulz, Matthias; Gringoli, Francesco; Koch, Michael; Steinmetzer, Daniel; Hollick, Matthias
10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017)
[Conference Proceedings]


A Systematic Study of Cache Side Channels across AES Implementations
Mantel, Heiko; Weber, Alexandra; Köpf, Boris
ESSoS 2017 - 9th International Symposium on Engineering Secure Software and Systems
[Conference Proceedings]


Sharing Information with Web Services -- A Mental Model Approach in the Context of Optional Information
Kulyk, Oksana; Reinheimer, Benjamin; Volkamer, Melanie
International Conference on Human-Computer Interaction (HCII), p.675-690
[Conference Proceedings]


SCAPI: a scalable attestation protocol to detect software and physical attacks
Kohnhäuser, Florian; Büscher, Niklas; Gabmeyer, Sebastian; Katzenbeisser, Stefan
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, p.75-86
[Conference Proceedings]


SeED: Secure Non-Interactive Attestation for Embedded Devices
Ibrahim, Ahmad; Sadeghi, Ahmad-Reza; Zeitouni, Shaza
10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017)
[Conference Proceedings]


Update-tolerant and Revocable Password Backup
Horsch, Moritz; Braun, Johannes; Metz, Dominique; Buchmann, Johannes
ACISP 2017 - 22nd Australasian Conference on Information Security and Privacy
[Conference Proceedings]


Phonion: Practical Protection of Metadata in Telephony Networks
Heuser, Stephan; Reaves, Bradley; Pendyala, Praveen Kumar; Carter, Henry; Dmitrienko, Alexandra; Kiyavash, Negar; Enck, William; Sadeghi, Ahmad-Reza; Traynor, Patrick
Proceedings on Privacy Enhancing Technologies (PoPETs)
[Conference Proceedings]


Exploring Consumers' Attitudes of Smart TV Related Privacy Risks
Ghiglieri, Marco; Volkamer, Melanie; Renaud, Karen
Human Aspects of Information Security, Privacy and Trust / 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vol.10292, p.656-674
[Conference Proceedings]


HardIDX: Practical and Secure Index with SGX
Fuhry, Benny; Bahmani, Raad; Brasser, Ferdinand; Hahn, Florian; Kerschbaum, Florian; Sadeghi, Ahmad-Reza
Conference on Data and Applications Security and Privacy (DBSec)
[Conference Proceedings]


Redactable Graph Hashing, Revisited
Erwig, Andreas; Fischlin, Marc; Hald, Martin; Helm, Dominik; Kiel, Robert; Kübler, Florian; Kümmerlin, Michael; Laenge, Jakob; Rohrbach, Felix
ACISP 2017
[Conference Proceedings]


Just-in-Time Static Analysis
Nguyen Quang Do, Lisa; Ali, Karim; Livshits, Benjamin; Bodden, Eric; Smith, Justin; Murphy-Hill, Emerson
Proceedings of ISSTA ’17, p.447
[Conference Proceedings]


OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks
Demmler, Daniel; Holz, Marco; Schneider, Thomas
15. International Conference on Applied Cryptography and Network Security (ACNS'17), p.599-619
[Conference Proceedings]


Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering
Büscher, Niklas; Boukoros, Spyros; Bauregger, Stefan; Katzenbeisser, Stefan
Proceedings on Privacy Enhancing Technologies, p.118-134
[Conference Proceedings]


Long-Term Secure Commitments via Extractable-Binding Commitments
Buldas, Ahto; Geihs, Matthias; Buchmann, Johannes
ACISP 2017 - 22nd Australasian Conference on Information Security and Privacy
[Conference Proceedings]


Insights into the Potential Usage of the Initial Values of DRAM Arrays of Commercial Off-the-Shelf Devices for Security Applications
Anagnostopoulos, Nikolaos Athanasios; Schaller, André; Fan, Yufan; Xiong, Wenjie; Tehranipoor, Fatemeh; Arul, Tolga; Gabmeyer, Sebastian; Szefer, Jakub; Chandy, John A.; Katzenbeisser, Stefan
26th Crypto-Day
[Conference Proceedings]


Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems
Traverso, Giulia; Garcia Cordero, Carlos; Nojoumian, Mehrdad; Azarderakhsh, Reza; Demirel, Denise; Habib, Sheikh Mahbub; Buchmann, Johannes
15th Annual Conference on Privacy, Security and Trust (PST)
[Conference Proceedings]


Reliable Behavioural Factors in the Information Security Context
Mayer, Peter; Kunz, Alexandra; Volkamer, Melanie
International Conference on Availability, Reliability and Security
[Conference Proceedings]


Advancing Trust Visualisations for Wider Applicability and User Acceptance
Kulyk, Oksana; Reinheimer, Benjamin; Gerber, Paul; Volk, Florian; Volkamer, Melanie; Mühlhäuser, Max
16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), p.562-569
[Conference Proceedings]


Microblogging in a Privacy-Preserving way
Karvelas, Nikolaos; Senftleben, Marius; Katzenbeisser, Stefan
ARES 2017 - 12th International Conference on Availability, Reliability and Security
[Conference Proceedings]


A Formal Treatment of Multi-key Channels
Günther, Felix; Mazaheri, Sogol
CRYPTO 2017 - 37th International Cryptology Conference
[Conference Proceedings]


PRF-ODH: Relations, Instantiations, and Impossibility Results
Brendel, Jacqueline; Fischlin, Marc; Günther, Felix; Janson, Christian
CRYPTO 2017 - 37th International Cryptology Conference, p.651-681
[Conference Proceedings]


Software Grand Exposure: SGX Cache Attacks Are Practical
Brasser, Ferdinand; Müller, Urs; Dmitrienko, Alexandra; Kostiainen, Kari; Capkun, Srdjan; Sadeghi, Ahmad-Reza
11th USENIX Workshop on Offensive Technologies
[Conference Proceedings]


CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory
Brasser, Ferdinand; Davi, Lucas; Gens, David; Liebchen, Christopher; Sadeghi, Ahmad-Reza
26th USENIX Security Symposium
[Conference Proceedings]


Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme
Bernhard, David; Kulyk, Oksana; Volkamer, Melanie
12th International Conference on Availability, Reliability and Security - ARES 2017, p.1-10
[Conference Proceedings]


MCMix: Anonymous Messaging via Secure Multiparty Computation
Alexopoulos, Nikolaos; Kiayias, Aggelos; Talviste, Riivo; Zacharias, Thomas
26th USENIX Security Symposium, p.1217-1234
[Conference Proceedings]