Are thermal attacks a realistic threat? Investigating the preconditions of thermal attacks in users’ daily lives
Bekaert, Paul; Alotaibi, Norah; Mathis, Florian; Gerber, Nina; Rafferty, Aidan Christopher; Khamis, Mohamed; Marky, Karola
Proceedings of the 12th Nordic Conference on Human-Computer Interaction, p.1-9
[Conference Proceedings]

Website operators are not the enemy either - Analyzing options for creating cookie consent notices without dark patterns
Stöver, Alina; Gerber, Nina; Cornel, Christin; Henz, Mona; Marky, Karola; Zimmermann, Verena; Vogt, Joachim
Mensch und Computer 2022 - Workshopband
[Conference Proceedings]

Autonomous Driving - Analysing the Impact of Resilience Engineering Features in Smart Car Interfaces
Pasnicu, Otilia; Zmmermann, Verena; Gerber, Nina; Cardoso, Sarah
Mensch und Computer 2022: Facing Realities - Tagungsband, p.545-549
[Conference Proceedings]

Nostradamus Goes Quantum
Benedikt, Barbara Jiabao; Fischlin, Marc; Huppert, Moritz
Advances in Cryptology - ASIACRYPT 2022, p.583-613
[Conference Proceedings]

Overloading the Nonce: Rugged PRPs, Nonce-Set AEAD, and Order-Resilient Channels
Degabriele, Jean Paul; Karadžić, Vukašin
Advances in Cryptology - CRYPTO 2022, p.264-295
[Conference Proceedings]

On Quantum Ciphertext Indistinguishability, Recoverability, and OAEP
Krämer, Juliane; Struck, Patrick
Post-Quantum Cryptography, p.286-306
[Conference Proceedings]

A Random Oracle for All of Us
Fischlin, Marc; Rohrbach, Felix; Schmalz, Tobias
Progress in Cryptology - AFRICACRYPT 2022, p.469-489
[Conference Proceedings]

VirTEE: a full backward-compatible TEE with native live migration and secure I/O
Wang, Jianqiang; Mahmoody, Pouya; Brasser, Ferdinand; Jauernig, Patrick; Sadeghi, Ahmad-Reza; Yu, Donghui; Pan, Dahan; Zhang, Yuanyuan
DAC'22: Proceedings of the 59th ACM/IEEE Design Automation Conference, p.241-246
[Conference Proceedings]

Trusting the trust anchor: towards detecting cross-layer vulnerabilities with hardware fuzzing
Chen, Chen; Kande, Rahul; Mahmoody, Pouya; Sadeghi, Ahmad-Reza; Rajendran, JV
DAC'22: Proceedings of the 59th ACM/IEEE Design Automation Conference, p.1379-1383
[Conference Proceedings]

PEA: Practical private epistasis analysis using MPC
Hamacher, Kay; Kussel, Tobias; Schneider, Thomas; Tkachenko, Oleksandr
Computer Security - ESORICS 2022, p.320-339
[Conference Proceedings]

POSTER: MPClan: Protocol suite for privacy-conscious computations
Kotila, Nishat; Patil, Shravani; Patra, Arpita; Suresh, Ajith
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3379-3381
[Conference Proceedings]

POSTER: Privacy-preserving epidemiological modeling on mobile graph
Günther, Daniel; Holz, Marco; Judkewitz, Benjamin; Möllering, Helen; Pinkas, Benny; Schneider, Thomas; Suresh, Ajith
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3351-3353
[Conference Proceedings]

POSTER: Efficient three-party shuffling using precomputation
Brüggemann, Andreas; Schneider, Thomas; Suresh, Ajith; Yalame, Mohammad Hossein
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3331-3333
[Conference Proceedings]

Terrorbekämpfung mithilfe sozialer Medien – ein explorativer Einblick am Beispiel von Twitter
Reuter, Christian; Pätsch, Katja; Runft, Elena
Proceedings der 13. Internationalen Tagung Wirtschaftsinformatik (WI 2017), p.649-663
[Conference Proceedings]

How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical Measurement Study on FOSS Vulnerability Lifetimes
Alexopoulos, Nikolaos; Brack, Manuel; Wagner, Jan Philipp; Grube, Tim; Mühlhäuser, Max
Proceedings of the 31st USENIX Security Symposium, p.359-376
[Conference Proceedings]

Disrupting Continuity of Apple’s Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi
Stute, Milan; Heinrich, Alexander; Lorenz, Jannik; Hollick, Matthias
Proceedings of the 30th USENIX Security Symposium, p.3917-3934
[Conference Proceedings]

DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection
Rieger, Phillip; Nguyen, Thien Duc; Miettinen, Markus; Sadeghi, Ahmad-Reza
Network and Distributed Systems Security (NDSS) Symposium 2022
[Conference Proceedings]

Katwarn, NINA or FEMA? Multi-Method Study on Distribution, Use and Public Views on Crisis Apps
Reuter, Christian; Kaufhold, Marc-André; Leopold, Inken; Knipp, Hannah
Proceedings of the 25th European Conference on Information Systems (ECIS), p.2187-2201
[Conference Proceedings]

Fake News Perception in Germany: A Representative Study of People's Attitudes and Approaches to Counteract Disinformation
Reuter, Christian; Hartwig, Katrin; Kirchner, Jan; Schlegel, Noah
Tagungsband WI 2019 : Human Practice. Digital Ecologies. Our Future., p.1069-1083
[Conference Proceedings]

FLAME: Taming Backdoors in Federated Learning
Nguyen, Thien Duc; Rieger, Phillip; Chen, Huili; Yalame, Mohammad Hossein; Möllering, Helen; Fereidooni, Hossein; Marchal, Samuel; Miettinen, Markus; Mirhoseini, Azalia; Zeitouni, Shaza; Koushanfar, Farinaz; Sadeghi, Ahmad-Reza; Schneider, Thomas
Proceedings of the 31st USENIX Security Symposium, p.1415-1432
[Conference Proceedings]

112.SOCIAL: Design and Evaluation of a Mobile Crisis App for Bidirectional Communication between Emergency Services and Citizen
Kaufhold, Marc-André; Rupp, Nicola; Reuter, Christian; Amelunxen, Christoph; Cristaldi, Massimo
Proceedings of the European Conference on Information Systems (ECIS) 2018
[Conference Proceedings]

Potentiale von IKT beim Ausfall kritischer Infrastrukturen: Erwartungen, Informationsgewinnung und Mediennutzung der Zivilbevölkerung in Deutschland
Kaufhold, Marc-André; Grinko, Margarita; Reuter, Christian; Schorch, Marén; Langer, Amanda; Skudelny, Sascha; Hollick, Matthias
Tagungsband WI 2019 : Human Practice. Digital Ecologies. Our Future., p.1054-1068
[Conference Proceedings]

SoK: Cryptanalysis of encrypted search with LEAKER - a framework for LEakage AttacK Evaluation on Real-world data
Kamara, Seny; Kat, Abdelkarim; Moataz, Tarik; Schneider, Thomas; Treiber, Amos; Yonli, Michael
7th IEEE European Symposium on Security and Privacy (EuroS&P'22)
[Conference Proceedings]

Who Can Find My Devices? Security and Privacy of Apple’s Crowd-Sourced Bluetooth Location Tracking System
Heinrich, Alexander; Stute, Milan; Kornhuber, Tim; Hollick, Matthias
The 21st Privacy Enhancing Technologies Symposium
[Conference Proceedings]

PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop
Heinrich, Alexander; Hollick, Matthias; Schneider, Thomas; Stute, Milan; Weinert, Christian
Proceedings of the 30th USENIX Security Symposium, p.3577-3594
[Conference Proceedings]

TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter
Hartwig, Katrin; Reuter, Christian
Tagungsband WI 2019 : Human Practice. Digital Ecologies. Our Future., p.1844-1855
[Conference Proceedings]

FedCRI: Federated Mobile Cyber-Risk Intelligence
Fereidooni, Hossein; Dmitrienko, Alexandra; Rieger, Phillip; Miettinen, Markus; Sadeghi, Ahmad-Reza; Madlener, Felix
Network and Distributed Systems Security (NDSS) Symposium 2022
[Conference Proceedings]

Usability stumm geschaltet? Usable Security und Privacy in Videokonferenzsystemen
Balthasar, Mandy; Gerber, Nina; Schmitt, Hartmut
Mensch und Computer 2021 - Usability Professionals
[Conference Proceedings]

AirGuard - Protecting Android Users from Stalking Attacks by Apple Find My Devices
Heinrich, Alexander; Bittner, Niklas; Hollick, Matthias
WiSec '22: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, p.26-38
[Conference Proceedings]

WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens
Jiang, Yan; Ji, Xiaoyu; Wang, Kai; Yan, Chen; Mitev, Richard; Sadeghi, Ahmad-Reza; Xu, Wenyuan
Proceedings: 43rd IEEE Symposium on Security and Privacy (SP 2022), p.984-1001
[Conference Proceedings]