Publikationen

Publikationen

Optimal Transport Layer for Secure Computation
Brandt, Markus; Orlandi, Claudio; Shrishak, Kris; Shulman, Haya
SECRYPT 2020-The 17th International Conference on Security and Cryptography
[Conference Proceedings]


TACAI: An Intermediate Representation Based on Abstract Interpretation
Reif, Michael; Kübler, Florian; Helm, Dominik; Hermann, Ben; Eichberg, Michael; Mezini, Mira
SOAP 2020-9th ACM SIGPLAN International Workshop on the State Of the Art in Program Analysis
[Conference Proceedings]


Linear-Complexity Private Function Evaluation is Practical
Holz, Marco; Kiss, Ágnes; Rathee, Deevashwer; Schneider, Thomas
25. European Symposium on Research in Computer Security (ESORICS'20)
[Conference Proceedings]


Limiting the Power of RPKI Authorities
Shrishak, Kris; Shulman, Haya
Proceedings of the Applied Networking Research Workshop (ANRW'20)
[Conference Proceedings]


MP2ML: A mixed-protocol machine learning framework for private inference
Boemer, Fabian; Cammarota, Rosario; Demmler, Daniel; Schneider, Thomas; Yalame, Mohammad Hossein
ARES 2020: 15th International Conference on Availability, Reliability and Security
[Conference Proceedings]


ChirpOTLE: A Framework for Practical LoRaWAN Security Evaluation
Hessel, Frank; Almon, Lars; Álvarez, Flor
WiSec '20: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, p.306-316
[Conference Proceedings]


MagicPairing: Apple’s Take on Securing Bluetooth Peripherals
Heinze, Dennis; Classen, Jiska; Rohrbach, Felix
13th ACM Conference on Security and Privacy in Wireless and Mobile Networks
[Conference Proceedings]


On Lattice-Based Interactive Protocols: An Approach with Less or No Aborts
Alkeilani Alkadri, Nabil; Bansarkhani, Rachid El; Buchmann, Johannes
The 25th Australasian Conference on Information Security and Privacy (ACISP'20)
[Conference Proceedings]


The Lattice-Based Digital Signature Scheme qTESLA
Alkim, Erdem; Barreto, Paulo S. L. M.; Bindel, Nina; Krämer, Juliane; Longa, Patrick; Ricardini, Jefferson E.
18th International Conference on Applied Cryptography and Network Security (ACNS 2020)
[Conference Proceedings]


Encryption Schemes using Random Oracles: from Classical to Post-Quantum Security
Krämer, Juliane; Struck, Patrick
11th International Conference on Post-Quantum Cryptography (PQCrypto 2020)
[Conference Proceedings]


TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves
Cloosters, Tobias; Rodler, Michael; Davi, Lucas
29th USENIX Security Symposium
[Conference Proceedings]


Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions
Krämer, Juliane; Struck, Patrick
11th International Workshop on Constructive Side-Channel Analysis and Secure Design(COSADE 2020)
[Conference Proceedings]


On the Security of Strong Memristor-based Physically Unclonable Functions
Zeitouni, Shaza; Stapf, Emmanuel; Fereidooni, Hossein; Sadeghi, Ahmad-Reza
Design Automation Conference 2020
[Conference Proceedings]


SAFE: A Secure and Efficient Long-Term Distributed Storage System
Buchmann, Johannes; Dessouky, Ghada; Frassetto, Tommaso; Kiss, Ágnes; Sadeghi, Ahmad-Reza; Schneider, Thomas; Traverso, Giulia; Zeitouni, Shaza
8th International Workshop on Security in Blockchain and Cloud Computing (SBC'20)
[Conference Proceedings]


Poisoning Attacks on Federated Learning-based IoT Intrusion Detection System
Nguyen, Thien Duc; Rieger, Phillip; Miettinen, Markus; Sadeghi, Ahmad-Reza
Workshop on Decentralized IoT Systems and Security (DISS) @ NDSS Symposium 2020
[Conference Proceedings]


BLAZE: Practical Lattice-Based Blind Signatures for Privacy-Preserving Applications
Alkeilani Alkadri, Nabil; Bansarkhani, Rachid El; Buchmann, Johannes
24th International Conference on Financial Cryptography and Data Security (FC'20)
[Conference Proceedings]


Offline Model Guard: Secure and Private ML on Mobile Devices
Bayerl, Sebastian P.; Frassetto, Tommaso; Jauernig, Patrick; Riedhammer, Korbinian; Sadeghi, Ahmad-Reza; Schneider, Thomas; Stapf, Emmanuel; Weinert, Christian
23. Design, Automation and Test in Europe Conference (DATE '20)
[Conference Proceedings]


HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments
Dessouky, Ghada; Frassetto, Tommaso; Sadeghi, Ahmad-Reza
USENIX Security
[Conference Proceedings]


API Usability of Stateful Signature Schemes
A. Zeier and A. Wiesmaier and A. Heinemann
The 14th International Workshop on Security (IWSEC), LNCS 11689, p.1–20
[Conference Proceedings]


Dynamic DASH Aware Scheduling in Cellular Networks
Rachid El Azouzi and Albert Sunny and Liang Zhao and Eitan Altman and Dimitrios Tsilimantos and Francesco De Pellegrini and Stefan Valentin
2019 IEEE Wireless Communications and Networking Conference, WCNC 2019, Marrakesh, Morocco, April 15-18, 2019, p.1–8
[Conference Proceedings]


Analysis of QoE for Adaptive Video Streaming over Wireless Networks with User Abandonment Behavior
Rachid El Azouzi and Krishna V. Acharya and Sudheer Poojary and Albert Sunny and Majed Haddad and Eitan Altman and Dimitrios Tsilimantos and Stefan Valentin
2019 IEEE Wireless Communications and Networking Conference, WCNC 2019, Marrakesh, Morocco, April 15-18, 2019, p.1–8
[Conference Proceedings]


From click to playback: a dataset to study the response time of mobile YouTube
Frank Loh and Florian Wamser and Christian Moldovan and Bernd Zeidler and Tobias Hoßfeld and Dimitrios Tsilimantos and Stefan Valentin
Proceedings of the 10th ACM Multimedia Systems Conference, MMSys 2019, Amherst, MA, USA, June 18-21, 2019, p.267–272
[Conference Proceedings]


Gateway for Industrial Cyber-Physical Systems with Hardware-Based Trust Anchors
Diethelm Bienhaus and Lukas Jäger and Roland Rieke and Christoph Krauß
Intelligent Distributed Computing XIII, 13th International Symposium on Intelligent Distributed Computing, IDC 2019, St. Petersburg, Russia, 7-9 October, 2019., p.521–528
[Conference Proceedings]


Eigenschaften optimierter API-Dokumentationen im Entwicklungsprozess sicherer Software
Rolf Huesmann and Alexander Zeier and Andreas Heinemann
Mensch & Computer Workshopband
[Conference Proceedings]


API Usability of Stateful Signature Schemes
Alexander Zeier and Alexander Wiesmaier and Andreas Heinemann
IWSEC, p.221–240
[Conference Proceedings]


Phishing Attack Recognition by End-Users: Concepts for URL Visualization and Implementation
Vivian Ives Philipp Erbenich and Daniel Träder and Andreas Heinemann and Meltem Nural
HAISA, p.179–188
[Conference Proceedings]


Obtaining Stable Iris Codes Exploiting Low-Rank Tensor Space and Spatial Structure Aware Refinement for Better Iris Recognition
K. Raja, R. Raghavendra and C. Busch
Proc. of the 12th IAPR Intl. Conf. on Biometrics (ICB)
[Conference Proceedings]


Empirical Evaluation of Texture-Based Print and Contact Lens Iris Presentation Attack Detection Methods
H. Mandalapu and R. Raghavendra and C. Busch
Proc. of the 3rd Intl. Conf. on Biometric Engineering and Applications (ICBEA)
[Conference Proceedings]


On the Impact of Different Fabrication Materials on Fingerprint Presentation Attack Detection
L. J. González-Soler and M. Gomez-Barrero and L. Chang and A. Perez-Suarez and C. Busch
Proc. Int. Conf. on Biometrics (ICB)
[Conference Proceedings]


Multi-Modal Fingerprint Presentation Attack Detection: Looking at the Surface and the Inside
M. Gomez-Barrero and J. Kolberg and C. Busch
Proc. Int. Conf. on Biometrics (ICB), p.1–8
[Conference Proceedings]