Publikationen
Publikationen
Microblogging in a Privacy-Preserving way
Karvelas, Nikolaos; Senftleben, Marius; Katzenbeisser, Stefan
ARES 2017 - 12th International Conference on Availability, Reliability and Security
[Conference Proceedings]
A Formal Treatment of Multi-key Channels
Günther, Felix; Mazaheri, Sogol
CRYPTO 2017 - 37th International Cryptology Conference
[Conference Proceedings]
PRF-ODH: Relations, Instantiations, and Impossibility Results
Brendel, Jacqueline; Fischlin, Marc; Günther, Felix; Janson, Christian
CRYPTO 2017 - 37th International Cryptology Conference, p.651-681
[Conference Proceedings]
Software Grand Exposure: SGX Cache Attacks Are Practical
Brasser, Ferdinand; Müller, Urs; Dmitrienko, Alexandra; Kostiainen, Kari; Capkun, Srdjan; Sadeghi, Ahmad-Reza
11th USENIX Workshop on Offensive Technologies
[Conference Proceedings]
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory
Brasser, Ferdinand; Davi, Lucas; Gens, David; Liebchen, Christopher; Sadeghi, Ahmad-Reza
26th USENIX Security Symposium
[Conference Proceedings]
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme
Bernhard, David; Kulyk, Oksana; Volkamer, Melanie
12th International Conference on Availability, Reliability and Security - ARES 2017, p.1-10
[Conference Proceedings]
MCMix: Anonymous Messaging via Secure Multiparty Computation
Alexopoulos, Nikolaos; Kiayias, Aggelos; Talviste, Riivo; Zacharias, Thomas
26th USENIX Security Symposium, p.1217-1234
[Conference Proceedings]
Beyond the Hype: On Using Blockchains in Trust Management for Authentication
Alexopoulos, Nikolaos; Daubert, Jörg; Mühlhäuser, Max; Habib, Sheikh Mahbub
IEEE Trustcom, p.546-553
[Conference Proceedings]
Promoting secure Email communication and authentication
Zimmermann, Verena; Henhapl, Birgit; Gerber, Nina; Enzmann, Matthias
Mensch und Computer 2017 - Workshopband: Spielend einfach integrieren, p.269-277
[Conference Proceedings]
Formal Analysis of V2X Revocation Protocols
Whitefield, Jorden; Chen, Liqun; Kargl, Frank; Paverd, Andrew; Schneider, Steve; Treharne, Helen; Wesemeyer, Stephan
Security and Trust Management _ 13th International Workshop, STM 2017, Proceedings
[Conference Proceedings]
Using Oblivious RAM in Genomic Studies
Karvelas, Nikolaos; Peter, Andreas; Katzenbeisser, Stefan
DPM 2017 - Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2017 International Workshops
[Conference Proceedings]
SensorBuster: On Identifying Sensor Nodes in P2P Botnets
Karuppayah, Shankar; Böck, Leon; Grube, Tim; Manickam, Selvakumar; Mühlhäuser, Max; Fischer, Mathias
International Conference on Availability, Reliability and Security (ARES), p.1-6
[Conference Proceedings]
Cover Traffic: A Trade of Anonymity and Efficiency
Grube, Tim; Thummerer, Markus; Daubert, Jörg; Mühlhäuser, Max
Security and Trust Management. STM 2017., p.213-223
[Conference Proceedings]
Security vs. privacy? User preferences regarding text passwords and biometric authentication.
Gerber, Nina; Zimmermann, Verena
Mensch und Computer 2017 - Workshopband: Spielend einfach integrieren, 10.-13. September 2017, Regensburg, p.279-287
[Conference Proceedings]
Constrained PET Composition for Measuring Enforced Privacy
Funke, Sebastian; Wiesmaier, Alexander; Daubert, Jörg
Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES), p.1-10
[Conference Proceedings]
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit
Fereidooni, Hossein; Classen, Jiska; Spink, Tom; Patras, Paul; Miettinen, Markus; Sadeghi, Ahmad-Reza; Hollick, Matthias; Conti, Mauro
Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)
[Conference Proceedings]
AVR Processors as a Platform for Language-Based Security
Dewald, Florian; Mantel, Heiko; Weber, Alexandra
ESORICS - Proceedings of the 22nd European Symposium on Research in Computer Security
[Conference Proceedings]
Zero Round-Trip Time for the Extended Access Control Protocol
Brendel, Jacqueline; Fischlin, Marc
ESORICS 2017 - 22nd European Symposium on Research in Computer Security
[Conference Proceedings]
Zero Round-Trip Time for the Extended Access Control Protocol
Brendel, Jacqueline; Fischlin, Marc
Computer Security – ESORICS 2017. 22nd European Symposium on Research in Computer Security, Proceedings, p.297-314
[Conference Proceedings]
LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization
Arias, Orlando; Gens, David; Jin, Yier; Liebchen, Christopher; Sadeghi, Ahmad-Reza; Sullivan, Dean
20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2017)
[Conference Proceedings]
Mitigating Lateral Interference: Adaptive Beam Switching for Robust Millimeter-Wave Networks
Steinmetzer, Daniel; Loch, Adrian; García-García, Amanda; Widmer, Jörg; Hollick, Matthias
1st ACM Workshop on Millimeter Wave Networks and Sensing Systems (mmNets 2017), p.6
[Conference Proceedings]
Nexmon: Build Your Own Wi-Fi Testbeds With Low-Level MAC and PHY-Access Using Firmware Patches on Off-the-Shelf Mobile Devices
Schulz, Matthias; Wegemer, Daniel; Hollick, Matthias
Proceedings of the 11th Workshop on Wireless Network Testbeds, Experimental Evaluation & CHaracterization, p.59-66
[Conference Proceedings]
Off-the-Hook: An Efficient and Usable Client-Side Phishing Prevention Application
Marchal, Samuel; Armano, Giovanni; Gröndahl, Tommi; Saari, Kalle; Singh, Nidhi; Asokan, N.
IEEE Transactions on Computers, Vol.66, p.1717 - 1733
[Conference Proceedings]
Password Assistance
Horsch, Moritz; Braun, Johannes; Buchmann, Johannes
Open Identity Summit 2017
[Conference Proceedings]
Complexity Reduction in Graphs: A User Centric Approach to Graph Exploration
Grube, Tim; Volk, Florian; Mühlhäuser, Max; Bhairav, Suhas; Sachidananda, Vinay; Elovici, Yuval
10th International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, p.24-31
[Conference Proceedings]
Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions
Buldas, Ahto; Geihs, Matthias; Buchmann, Johannes
ProvSec 2017 - The 11th International Conference on Provable Security
[Conference Proceedings]
Hampering fault attacks against lattice-based signature schemes - countermeasures and their efficiency
Bindel, Nina; Krämer, Juliane; Schreiber, Johannes
CODES/ISSS ’17 Companion
[Conference Proceedings]
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics
Bindel, Nina; Buchmann, Johannes; Krämer, Juliane; Mantel, Heiko; Schickel, Johannes; Weber, Alexandra
The 10th International Symposium on Foundations & Practice of Security
[Conference Proceedings]
Towards Blockchain-Based Collaborative Intrusion Detection Systems
Alexopoulos, Nikolaos; Vasilomanolakis, Emmanouil; Ivanko, Natalia Reka; Mühlhäuser, Max
12th International Conference on Critical Information Infrastructures Security (CRITIS 2017)
[Conference Proceedings]
ATRIUM: Runtime Attestation Resilient Under Memory Attacks
Zeitouni, Shaza; Dessouky, Ghada; Arias, Orlando; Sullivan, Dean; Ibrahim, Ahmad; Jin, Yier; Sadeghi, Ahmad-Reza
2017 International Conference On Computer Aided Design (ICCAD'17)
[Conference Proceedings]