Publikationen

Publikationen

SoK: Secure FPGA Multi-Tenancy in the Cloud: Challenges and Opportunities
Zeitouni, Shaza; Dessouky, Ghada; Sadeghi, Ahmad-Reza
6th IEEE European Symposium on Security and Privacy (Euro S&P 2021)
[Conference Proceedings]


EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts
Rodler, Michael; Li, Wenting; Karame, Ghassan O.; Davi, Lucas
30th USENIX Security Symposium
[Conference Proceedings]


SoK: Efficient Privacy-preserving Clustering
Hedge, Aditya; Möllering, Helen; Schneider, Thomas; Yalame, Mohammad Hossein
21st Privacy Enhancing Technologies Symposium (PETS 2021)
[Conference Proceedings]


FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants
Chen, Yanjiao; Bai, Yijie; Wang, Kaibo; Mitev, Richard; Xu, Wenyuan; Sadeghi, Ahmad-Reza
ACM Conference on Computer and Communications Security (CCS)
[Conference Proceedings]


CURE: A Security Architecture with CUstomizable and Resilient Enclaves
Bahmani, Raad; Brasser, Ferdinand; Dessouky, Ghada; Jauernig, Patrick; Klimmek, Matthias; Sadeghi, Ahmad-Reza; Stapf, Emmanuel
30th USENIX Security Symposium (USENIX Security'21)
[Conference Proceedings]


BlindOR: An Efficient Lattice-Based Blind Signature Scheme from OR-Proofs
Alkeilani Alkadri, Nabil; Harasser, Patrick; Janson, Christian
20th International Conference on Cryptology and Network Security (CANS 2021)
[Conference Proceedings]


The Cost of Path Information: Routing in Anonymous Communication
Grube, Tim; Egert, Rolf; Daubert, Jörg; Mühlhäuser, Max
Consumer Communications & Networking Conference (CCNC 2021)
[Conference Proceedings]


SAFELearn: Secure Aggregation for private FEderated Learning
Fereidooni, Hossein; Marchal, Samuel; Miettinen, Markus; Mirhoseini, Azalia; Möllering, Helen; Nguyen, Thien Duc; Rieger, Phillip; Sadeghi, Ahmad-Reza; Schneider, Thomas; Yalame, Mohammad Hossein; Zeitouni, Shaza
4th Deep Learning and Security Workshop (DLS'21)
[Conference Proceedings]


Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation
Demmler, Daniel; Katzenbeisser, Stefan; Schneider, Thomas; Schuster, Tom; Weinert, Christian
18th International Conference on Security and Cryptography (SECRYPT'21)
[Conference Proceedings]


Who are Vulnerability Reporters? A Large-scale Empirical Study on FLOSS
Alexopoulos, Nikolaos; Meneely, Andy; Arnouts, Dorian; Mühlhäuser, Max
15th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM '21)
[Conference Proceedings]


The Security of ChaCha20-Poly1305 in the Multi-User Setting
Degabriele, Jean Paul; Govinden, Jérôme; Günther, Felix; Paterson, Kenneth G.
CCS´21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, p.1981-2003
[Conference Proceedings]


An uneven game of hide and seek: Hiding botnet CnC by encrypting IPs in DNS records
Fejrskov, Martin; Pedersen, Jens Myrup; Böck, Leon; Vasilomanolakis, Emmanouil
IEEE Conference on Communications and Network Security
[Conference Proceedings]


LOKI: Development of an interface for task-based, privacy-friendly smart home control through LOCal Information Processing
Gerber, Paul; Heidinger, Marvin; Stiegelmayer, Julia; Gerber, Nina
Mensch und Computer 2021, p.578-581
[Conference Proceedings]


Evaluating a Smart Car Interface in Terms of Usability, User Experience and User Acceptance
Avramidis, Mario; Kellner, Christiane; Staudt, Josefine; Zimmermann, Verena; Gerber, Nina
Mensch und Computer 2021 - Workshopband
[Conference Proceedings]


PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop
Heinrich, Alexander; Hollick, Matthias; Schneider, Thomas; Stute, Milan; Weinert, Christian
30th USENIX Security Symposium
[Conference Proceedings]


BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures
Cremers, Cas; Düzlü, Samed; Fiedler, Rune; Fischlin, Marc; Janson, Christian
Proceedings: 2021 IEEE Symposium on Security and Privacy (SP 2021), p.1696-1714
[Conference Proceedings]


Multipath TLS 1.3
Fischlin, Marc; Müller, Sven-Andre; Münch, Jean-Pierre; Porth, Lars
Computer Security - ESORICS 2021, p.86-105
[Conference Proceedings]


Revisiting Hybrid Private Information Retrieval
Günther, Daniel; Schneider, Thomas; Wiegand, Felix
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, p.2408-2410
[Conference Proceedings]


A Generic Hybrid 2PC Framework with Application to Private Inference of Unmodified Neural Networks (Extended Abstract)
Braun, Lennart; Cammarota, Rosario; Schneider, Thomas
Privacy in Machine Learning Workshop at 35th Conference on Neural Information Processing Systems
[Conference Proceedings]


Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite
Fischlin, Marc; Sanina, Olga
Advances in Cryptology - ASIACRYPT 2021, p.696-725
[Conference Proceedings]


The Exact Security of BIP32 Wallets
Das, Poulami; Erwig, Andreas; Faust, Sebastian; Loss, Julian; Riahi, Siavash
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, p.1020-1042
[Conference Proceedings]


Evaluating a Smart Car Interface in Terms of Usability, User Experience and User Acceptance
Avramidis, Mario; Kellner, Christiane; Staudt, Josephine; Zimmermann, Verena; Gerber, Nina
i-com, p.161-175
[Conference Proceedings]


Taking on driving tasks yourself? That was yesterday! How drivers would like to be supported by assistance systems
Zankel, Lisa Marie; Gerber, Paul; Zimmermann, Verena; Gerber, Nina
Adjunct Proceedings: 13th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, p.71-76
[Conference Proceedings]


On Derandomizing Yao’s Weak-to-Strong OWF Construction
Brzuska, Christina; Couteau, Geoffrey; Karanko, Phila; Rohrbach, Felix
Theory of Cryptography, p.429-456
[Conference Proceedings]


RealSWATT: Remote Software-Based Attestation for Embedded Devices under Realtime Constraints
Surminski, Sebastian; Niesler, Christian; Brasser, Ferdinand; Davi, Lucas; Sadeghi, Ahmad-Reza
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, p.2890-2905
[Conference Proceedings]


IT-Rettung 2017: IT-Unterstützung in Emergency Management & Response
Pottebaum, Jens; Erfurth, Christian; Reuter, Christian
Informatik 2017 : 25.- 29. September 2017 Chemnitz, p.1281-1282
[Conference Proceedings]


Social Media Analytics: Eine Marktstudie im Krisenmanagement
Kaufhold, Marc-André; Reuter, Christian; Ludwig, Thomas; Scholl, Simon
Informatik 2017 : 25.- 29. September 2017 Chemnitz, p.1325-1338
[Conference Proceedings]


Resilience in Security and Crises through Adaptions and Transitions
Kalle, Timo; Kaufhold, Marc-André; Kuntke, Franz; Reuter, Christian; Rizk, Amr; Steinmetz, Ralf
50 Jahre Gesellschaft für Informatik - Informatik für Gesellschaft : Workshopbeiträge der 49. Jahrestagung der Gesellschaft für Informatik, p.571-584
[Conference Proceedings]


Python Crypto Misuses in the Wild
Wickert, Anna-Katharina; Baumgärtner, Lars; Breitfelder, Florian; Mezini, Mira
15th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM ’21)
[Conference Proceedings]


On Security Guidelines and Policy Compliance: Considering Users’ Need for Autonomy
Olt, Christian M.; große Deters, Fenne
[Conference Proceedings]