Publikationen

Publikationen

SoK: Cryptanalysis of encrypted search with LEAKER - a framework for LEakage AttacK Evaluation on Real-world data
Kamara, Seny; Kat, Abdelkarim; Moataz, Tarik; Schneider, Thomas; Treiber, Amos; Yonli, Michael
7th IEEE European Symposium on Security and Privacy (EuroS&P'22)
[Conference Proceedings]


Who Can Find My Devices? Security and Privacy of Apple’s Crowd-Sourced Bluetooth Location Tracking System
Heinrich, Alexander; Stute, Milan; Kornhuber, Tim; Hollick, Matthias
The 21st Privacy Enhancing Technologies Symposium
[Conference Proceedings]


PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop
Heinrich, Alexander; Hollick, Matthias; Schneider, Thomas; Stute, Milan; Weinert, Christian
Proceedings of the 30th USENIX Security Symposium, p.3577-3594
[Conference Proceedings]


TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter
Hartwig, Katrin; Reuter, Christian
Tagungsband WI 2019 : Human Practice. Digital Ecologies. Our Future., p.1844-1855
[Conference Proceedings]


FedCRI: Federated Mobile Cyber-Risk Intelligence
Fereidooni, Hossein; Dmitrienko, Alexandra; Rieger, Phillip; Miettinen, Markus; Sadeghi, Ahmad-Reza; Madlener, Felix
Network and Distributed Systems Security (NDSS) Symposium 2022
[Conference Proceedings]


Usability stumm geschaltet? Usable Security und Privacy in Videokonferenzsystemen
Balthasar, Mandy; Gerber, Nina; Schmitt, Hartmut
Mensch und Computer 2021 - Usability Professionals
[Conference Proceedings]


AirGuard - Protecting Android Users from Stalking Attacks by Apple Find My Devices
Heinrich, Alexander; Bittner, Niklas; Hollick, Matthias
WiSec '22: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, p.26-38
[Conference Proceedings]


WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens
Jiang, Yan; Ji, Xiaoyu; Wang, Kai; Yan, Chen; Mitev, Richard; Sadeghi, Ahmad-Reza; Xu, Wenyuan
Proceedings: 43rd IEEE Symposium on Security and Privacy (SP 2022), p.984-1001
[Conference Proceedings]


GhostTouch: Targeted Attacks on Touchscreens without Physical Touch
Wang, Kai; Mitev, Richard; Yan, Chen; Ji, Xiaoyu; Sadeghi, Ahmad-Reza; Xu, Wenyuan
Proceedings of the 31st USENIX Security Symposium
[Conference Proceedings]


The Nerd Factor: The Potential of S&P Adepts to Serve as a Social Resource in the User’s Quest for More Secure and Privacy-Preserving Behavior
Gerber, Nina; Marky, Karola
Proceedings of the Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), p.57-76
[Conference Proceedings]


Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M
Sadeghi, Ahmad-Reza; Mitev, Richard; Saß, Marvin
25th Black Hat USA
[Conference Proceedings]


Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures
Dessouky, Ghada; Gruler, Alexander; Mahmoody, Pouya; Sadeghi, Ahmad-Reza; Stapf, Emmanuel
Network and Distributed Systems Security (NDSS) Symposium 2022
[Conference Proceedings]


Sticking with Landlines? Citizens’ Use and Perception of Social Media in Emergencies and Expectations Towards Emergency Services in Germany
Haunschild, Jasmin; Kaufhold, Marc-André; Reuter, Christian
Proceedings der 15. Internationalen Tagung Wirtschaftsinformatik 2020 : Ent­wicklungen, Chancen und Herausforderungen der Digitalisierung : WI 2020 : Zentrale Tracks
[Conference Proceedings]


Financially Backed Covert Security
Faust, Sebastian; Hazay, Carmit; Kretzler, David; Schlosser, Benjamin
International Conference on Practice and Theory of Public-Key Cryptography 2022
[Conference Proceedings]


CiFi: Versatile Analysis of Class and Field Immutability
Roth, Tobias; Helm, Dominik; Reif, Michael; Mezini, Mira
Software Engineering 2022: Fachtagung des GI-Fachbereichs Softwaretechnik, p.81-82
[Conference Proceedings]


Proceedings of the 2nd Workshop on Mobile Resilience: Designing Interactive Systems for Crisis Response
2nd Workshop on Mobile Resilience: Designing Interactive Systems for Crisis Response
[Conference Proceedings]


On the State of Post-Quantum Cryptography Migration
N. Alnahawi and A. Wiesmaier and T. Graßmeyer and J. Geißler and A. Zeier and P. Bauspieß and A. Heinemann
INFORMATIK'21 — PQKP-Workshop, p.907–941
[Conference Proceedings]


On Message-based Consensus and Network Coding
M. Braun and A. Wiesmaier and N. Alnahawi and J. Geißler
NoF 2021 — 12th International Conference on Network of the Future
[Conference Proceedings]


Attack Surface Assessment for Cyber­security Engineering in the Automotive Domain
Christian Plappert and Daniel Zelle and Henry Gadacz and Roland Rieke and Dirk Scheuermann and Christoph Krauß
29th Euromicro International Conference on Parallel, Distributed and Network-based Processing, PDP
[Conference Proceedings]


Analyzing and Securing SOME/IP Automotive Services with Formal and Practical Methods
Zelle, Daniel and Lauser, Timm and Kern, Dustin and Krauß, Christoph
The 16th International Conference on Availability, Reliability and Security, ARES
[Conference Proceedings]


Implementing a Security Architecture for Safety-Critical Railway Infrastructure
Eckel, Michael and Kuzhiyelil, Don and Krauß, Christoph and Zhdanova, Maria and Katzenbeisser, Stefan and Cosic, Jasmin and Drodt, Matthias and Pitrolle, Jean-Jacques
International Symposium on Secure and Private Execution Environment Design (SEED), p.215-226
[Conference Proceedings]


Analysis of E-Mobility-Based Threats to Power Grid Resilience
Kern, Dustin and Krauß, Christoph
Computer Science in Cars Symposium
[Conference Proceedings]


Zur Integration von Post-Quantum Verfahren in bestehende Softwarepodukte
A. Zeier and A. Wiesmaier and A. Heinemann
Tagungsband zum 17. Deutschen IT-Sicherheitskongress, p.381 – 391
[Conference Proceedings]


On the State of Post-Quantum Cryptography Migration
Nouri Alnahawi and Alexander WiesmaierAND Tobias Grasmeyer and Julian Geißler and Alexander Zeier and Pia Bauspieß and Andreas Heinemann
INFORMATIK 2021 — PQKP-Workshop, p.907-941
[Conference Proceedings]


Software Development Processes for ADs, SMCs and OSCs supporting Usability, Security, and Privacy Goals - an Overview
Tim Bender and Rolf Huesmann and Andreas Heinemann
ARES 2021, SSC Workshop: The 16th International Conference on Availability, Reliability and Security, Virtual Event, August 17-20, 2021
[Conference Proceedings]


It is not as simple as that: Playing out password security trainings in order to nudge password changes
Fabian Sterk and Andreas Heinemann
EICC '21: European Interdisciplinary Cyber­security Conference, Virtual Event, Romania, November 10-11, 2021, p.20–25
[Conference Proceedings]


On the Applicability of Synthetic Data for Face Recognition
H. Zhang and M. Grimmer and R. Raghavendra and K. Raja and C. Busch
Intl. Workshop on Biometrics and Forensics (IWBF)
[Conference Proceedings]


NIR Iris Challenge Evaluation in Non-cooperative Environments: Segmentation and Localization
C. Wang and J. Tapia
Proc. of the 2021 Intl. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]


Image Quality Assessment on Identity Documents
C. Yanez and J. Tapia
Proc. Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–5
[Conference Proceedings]


Impact of Doppelgängers on Face Recognition: Database and Evaluation
C. Rathgeb and P. Drozdowski and M. Obel and A. Dörsch and F. Stockhardt and N. E. Haryanto and K. Bernardo and C. Busch
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1–4
[Conference Proceedings]