Publikationen

Publikationen

On the Systematic Drift of Physically Unclonable Functions Due to Aging
Schaller, André; Skoric, Boris; Katzenbeisser, Stefan
TrustED, p.15-20
[Conference Proceedings]


PBMC: Symbolic Slicing for the Verification of Concurrent Programs
Saissi, Habib; Bokor, Peter; Suri, Neeraj
Proceedings of the Symposium on Automated Technology for Verification and Analysis, ATVA 2015
[Conference Proceedings]


Notions of Deniable Message Authentication
Fischlin, Marc; Mazaheri, Sogol
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, p.55-64
[Conference Proceedings]


A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates
Dowling, Benjamin; Fischlin, Marc; Günther, Felix; Stebila, Douglas
22nd ACM Conference on Computer and Communications Security (CCS 2015), p.1197-1210
[Conference Proceedings]


Automated Synthesis of Optimized Circuits for Secure Computation
Demmler, Daniel; Dessouky, Ghada; Koushanfar, Farinaz; Sadeghi, Ahmad-Reza; Schneider, Thomas; Zeitouni, Shaza
22. ACM Conference on Computer and Communications Security (CCS'15), p.1504-1517
[Conference Proceedings]


Performance problems you can fix: a dynamic analysis of memoization opportunities
Della Toffola, Luca; Pradel, Michael; Gross, Thomas R.
Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications, p.607-622
[Conference Proceedings]


It's a TRAP: Table Randomization and Protection against Function Reuse Attacks
Crane, Stephen; Volckaert, Stijn; Schuster, Felix; Liebchen, Christopher; Larsen, Per; Davi, Lucas; Sadeghi, Ahmad-Reza; Holz, Thorsten; Sutter, Bjorn De; Franz, Michael
22nd ACM Conference on Computer and Communications Security (CCS)
[Conference Proceedings]


Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks
Conti, Mauro; Crane, Stephen; Davi, Lucas; Franz, Michael; Larsen, Per; Liebchen, Christopher; Negro, Marco; Qunaibit, Mohaned; Sadeghi, Ahmad-Reza
22nd ACM Conference on Computer and Communications Security (CCS)
[Conference Proceedings]


SEDA: Scalable Embedded Device Attestation
Asokan, N.; Brasser, Ferdinand; Ibrahim, Ahmad; Sadeghi, Ahmad-Reza; Schunter, Matthias; Tsudik, Gene; Wachsmann, Christian
22nd ACM Conference on Computer and Communications Security (CCS)
[Conference Proceedings]


Rating Decomposition with Conjoint Analysis and Machine Learning
Volk, Florian; Trüschler, Nadine; Mühlhäuser, Max
CENTRIC 2015: The Eighth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, p.36-41
[Conference Proceedings]


Design Principles for HFEv- based Signature Schemes
Petzoldt, Albrecht; Cheng, Ming-Shing; Yang, Bo-Yin; Chengdong, Tao; Ding, Jintai
ASIACRYPT 2015 - Part I - 21st International Conference on the Theory and Application of Cryptology and Information Security, p.1-24
[Conference Proceedings]


On the Optimality of Differential Fault Analyses on CLEFIA
Krämer, Juliane; Kiss, Ágnes; Stüber, Anke
6. International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS'15), p.181-196
[Conference Proceedings]


Learning With Errors in the Exponent
Dagdelen, Özgür; Gajek, Sebastian; Göpfert, Florian
18th International Conference on information Security and Cryptology (ICISC) 2015
[Conference Proceedings]


jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications
Pellegrino, Giancarlo; Tschürtz, Constantin; Bodden, Eric; Rossow, Christian
Research in Attacks, Intrusions, and Defenses. 18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015. Proceedings., p.295-316
[Conference Proceedings]


Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing
Mayer, Peter; Volkamer, Melanie
Proceedings of the 31st Annual Computer Security Applications Conference, p.431-440
[Conference Proceedings]


Detection and Forensics of Domains Hijacking
Borgwart, Andreas; Boukoros, Spyros; Shulman, Haya; Waidner, Michael; Royeen, Carel van
IEEE Global Communications Conference
[Conference Proceedings]


IOT: Using Channel State Information for Tamper Detection in the Internet of Things
Bagci, Ibrahim Ethem; Roedig, Utz; Martinovic, Ivan; Schulz, Matthias; Hollick, Matthias
Using Channel State Information for Tamper Detection in the Internet of Things, p.131-140
[Conference Proceedings]


Poster: Password Entering and Transmission Security
Canova, Gamze; Volkamer, Melanie; Weiler, Simon
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, p.1418-1420
[Conference Proceedings]


SAX-PAC (scalable and expressive packet classification)
Kogan, Kirill; Nikolenko, Sergey I.; Rottenstreich, Ori; Culhane, William; Eugster, Patrick
Proceedings of the 2014 ACM conference on SIGCOMM, p.15-26
[Conference Proceedings]


I Know What You Watched Last Sunday - A New Survey Of Privacy In HbbTV
Ghiglieri, Marco
Workshop Web 2.0 Security & Privacy 2014 in conjunction with the IEEE Symposium on Security and Privacy
[Conference Proceedings]


Authentication Schemes - Comparison and Effective Password Spaces
Mayer, Peter; Volkamer, Melanie; Kauer, Michaela
Information Systems Security : International Conference on Information Systems Security (ICISS), p.204-225
[Conference Proceedings]


Adaptive Dynamic On-chip Memory Management for FPGA-based Reconfigurable Architectures
Dessouky, Ghada; Klaiber, Michael J.; Bailey, Donald G.; Simon, Svenja
24th International Conference on Field Programmable Logic and Applications (FPL)
[Conference Proceedings]


Swap and Play: Live Updating Hypervisors and Its Application to Xen
Sadeghi, Ahmad-Reza; Brasser, Ferdinand
CCSW 2014: The ACM Cloud Computing Security Workshop Proceedings
[Conference Proceedings]


A performance analysis of long-term archiving techniques
Vigil, Martín; Weinert, Christian; Braden, Kjell; Demirel, Denise; Buchmann, Johannes
IEEE - High Performace Computing and Communications (HPCC 2014), p.878-889
[Conference Proceedings]


AHP-Based Quantitative Approach for Assessing & Comparing Cloud Security
Suri, Neeraj; Taha, Ahmed; Trapero, Ruben; Luna, Jesus
Proceedings of the 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14)
[Conference Proceedings]


Fragmentation Considered Leaking: Port Inference for DNS Poisoning.
Shulman, Haya; Waidner, Michael
International Conference on Applied Cryptography and Network Security (ACNS 2014), p.531-548
[Conference Proceedings]


Pretty Bad Privacy: Pitfalls of DNS Encryption
Shulman, Haya
Proceedings of the 13th annual ACM workshop on Privacy in the electronic society, p.191-200 (9)
[Conference Proceedings]


Covert Computation - Hiding code in code through compile-time obfuscation
Schrittwieser, Sebastian; Katzenbeisser, Stefan; Kieseberg, Peter; Huber, Markus; Leithner, Manuel; Mulazzani, Martin; Weippl, Edgar
Computers & Security, p.13-26
[Conference Proceedings]


Lightweight Anti-counterfeiting Solution for Low-End Commodity Hardware Using Inherent PUFs
Schaller, André; Arul, Tolga; Leest, Vincent van der; Katzenbeisser, Stefan
International Conference on Trust & Trustworthy Computing ( TRUST), p.83-100
[Conference Proceedings]


Exploiting thermal reflection for interactive systems
Sahami Shirazi, Alireza; Abdelrahman, Yomna; Henze, Niels; Schneegass, Stefan; Khalilbeigi, Mohammadreza; Schmidt, Albrecht
Proceedings of the 32nd annual ACM conference on Human factors in computing systems, p.3483--3492
[Conference Proceedings]