Publikationen

Publikationen

POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC
Das, Amitabh; Kocabaş, Ünal; Sadeghi, Ahmad-Reza; Verbauwhede, Ingrid
Conference on Digital Automation and Test Europe (DATE)
[Conference Proceedings]


Tetherway: A Framework for Tethering Camouflage
Schulz, Steffen; Sadeghi, Ahmad-Reza; Zhdanova, Maria; Xu, Wenyuan; Mustafa, Hossen; Varadharajan, Vijay
Conference on Security and Privacy in Wireless and Mobile Networks (WiSec)
[Conference Proceedings]


Unsafe Exposure Analysis of Mobile In-App Advertisements
Jiang, Xuxian; Grace, Michael; Sadeghi, Ahmad-Reza; Zhou, Wu
to appear at WiSec
[Conference Proceedings]


Educational Interfaces, Software and Technology: 3rd Workshop on UI Technologies and Educational Pedagogy
Tse, Edward; Marentette, Lynn; Ahmed, Syed Ishtiaque; Thayer, Alex; Huber, Jochen; Kim, Si Jung; Brown, Quincy; Mühlhäuser, Max
CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, p.2691-2694
[Conference Proceedings]


Massively distributed authorship of academic papers
Ständer, Marcus
CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, p.11-20
[Conference Proceedings]


EDA for Secure and Dependable Cybercars: Challenges and Opportunities
Seudié, Hervé; Koushanfar, Farinaz; Sadeghi, Ahmad-Reza
ACM/IEEE Design Automation Conference (DAC)
[Conference Proceedings]


C4PS: colors for privacy settings
Paul, Thomas; Stopczynski, Martin; Puscher, Daniel; Volkamer, Melanie; Strufe, Thorsten
Proceedings of the 21st international conference companion on World Wide Web, p.585--586
[Conference Proceedings]


Formal Treatment of Distributed Trust in Electronic Voting
Neumann, Stephan; Volkamer, Melanie
The Seventh International Conference on Internet Monitoring and Protection (ICIMP2012), Vol.ICIMP 2012, The Seventh I, p.30-39
[Conference Proceedings]


Interacting with Videos On Paper-like Displays
Lissermann, Roman; Olberding, Simon; Steimle, Jürgen; Mühlhäuser, Max
CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, p.2579-2584
[Conference Proceedings]


Occlusion-aware Interaction Techniques for Tabletop Systems
Khalilbeigi, Mohammadreza; Schmittat, Patrik; Steimle, Jürgen; Mühlhäuser, Max
CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, p.2531-2536
[Conference Proceedings]


LightBeam: Nomadic Pico Projector Interaction with Real World Objects
Huber, Jochen; Steimle, Jürgen; Liao, Chunyuan; Liu, Qiong; Mühlhäuser, Max
CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, p.2513-2518
[Conference Proceedings]


Toward a Theory of Interaction in Mobile Paper-Digital Ensembles
Heinrichs, Felix; Schreiber, Daniel; Huber, Jochen; Mühlhäuser, Max
CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, p.1897-1900
[Conference Proceedings]


Leveraging the Palm Surface as an Eyes-free TV Remote Control
Dezfuli, Niloofar; Khalilbeigi, Mohammadreza; Huber, Jochen; Müller, Florian; Mühlhäuser, Max
CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, p.2483-2488
[Conference Proceedings]


Perfect Confidentiality Network - A solution for information theoretically secure key agreement
Braun, Johannes; Buchmann, Johannes
5th IFIP International Conference on New Technologies, Mobility & Security (NTMS) 2012, p.1-5
[Conference Proceedings]


Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography
[Conference Proceedings]


Converse PUF-Based Authentication
Sadeghi, Ahmad-Reza; Kocabaş, Ünal; Katzenbeisser, Stefan
International Conference on Trust & Trustworthy Computing (TRUST)
[Conference Proceedings]


Statically checking API protocol conformance with mined multi-object specifications
Pradel, Michael; Jaspan, Ciera; Aldrich, Jonathan; Gross, Thomas R.
Proceedings of the 34th International Conference on Software Engineering, p.925-935
[Conference Proceedings]


Leveraging test generation and specification mining for automated bug detection without false positives
Pradel, Michael; Gross, Thomas R.
Proceedings of the 34th International Conference on Software Engineering, p.288-298
[Conference Proceedings]


Instrumenting AUTOSAR for Dependability Assessment: A Guidance Framework
Piper, Thorsten; Winter, Stefan; Manns, Paul; Suri, Neeraj
Proceedings of the 2012 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), p.1-12
[Conference Proceedings]


Semi-automatically extracting FAQs to improve accessibility of software development knowledge
Henß, Stefan; Monperrus, Martin; Mezini, Mira
Proceedings of the 34th International Conference on Software Engineering, p.793-803
[Conference Proceedings]


SmartTokens: Delegable Access Control with NFC-enabled Smartphones
Dmitrienko, Alexandra; Sadeghi, Ahmad-Reza; Tamrakar, Sandeep; Wachsmann, Christian
International Conference on Trust & Trustworthy Computing (TRUST), p.219-238
[Conference Proceedings]


Partial Verifiability in POLYAS for the GI Elections
Olembo, Maina; Kahlert, Anna; Neumann, Stephan; Volkamer, Melanie
5th International Conference on Electronic Voting 2012 (EVOTE2012), p.95-109
[Conference Proceedings]


Practical Security in E-Mail Applications
Kiefer, Franziskus; Wiesmaier, Alexander; Fritz, Christian
The 2012 International Conference on Security and Management (SAM’12)
[Conference Proceedings]


A Grid security architecture for AliEn
Schreiner, Steffen; Grigoras, Costin; Grigoras, Alina; Betev, Latchezar; Buchmann, Johannes
Proceedings of Science (PoS), ISGC2012:027, International Symposium on Grids & Clouds (ISGC) 2012
[Conference Proceedings]


Civitas and the Real World: Problems and Solutions from a Practical Point of View
Neumann, Stephan; Volkamer, Melanie
7th International Conference on Availability, Reliability and Security (ARES), p.180-185
[Conference Proceedings]


Forward Secure Signatures on Smart Cards
Hülsing, Andreas; Busold, Christoph; Buchmann, Johannes
SAC2012 - Conference on Selected Areas in Cryptography, p.66-80
[Conference Proceedings]


Improving Helios with Everlasting Privacy Towards the Public
Demirel, Denise; Graaf, Jeroen van de; Araújo, Roberto
Electronic Voting Technology Workshop / Workshop on Trustworthy Elections - EVT/WOTE 2012
[Conference Proceedings]


XIFER: A Software Diversity Tool Against Code-Reuse Attacks
Davi, Lucas; Dmitrienko, Alexandra; Nürnberger, Stefan; Sadeghi, Ahmad-Reza
4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3 2012)
[Conference Proceedings]


The Notary Based PKI -- A Lightweight PKI for Long-term Signatures on Documents
Vigil, Martín; Moecke, Cristian Thiago; Custódio, Ricardo Felipe; Volkamer, Melanie
EuroPKI 2012, September 13-14, p.85-97
[Conference Proceedings]


PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon
Katzenbeisser, Stefan; Kocabaş, Ünal; Rožic, Vladimir; Sadeghi, Ahmad-Reza; Verbauwhede, Ingrid; Wachsmann, Christian
Workshop on Cryptographic Hardware and Embedded Systems (CHES), p.283-301
[Conference Proceedings]