Publikationen

Publikationen

FraunhoferSIT@EXIST2024: Leveraging Stacking Ensemble Learning for Sexism Detection
Fan, Shiying; Frick, Raphael Antonius; Steinebach, Martin
25th Working Notes of the Conference and Labs of the Evaluation Forum, CLEF 2024
[Conference Paper]


Fraunhofer SIT at CheckThat! 2024: Adapter Fusion for Check-Worthiness Detection
Vogel, Inna; Möhle, Pauline
25th Working Notes of the Conference and Labs of the Evaluation Forum, CLEF 2024
[Conference Paper]


Sovereign document verification by smartphones
Berchtold, Waldemar; Heeger, Julian; Bugert, Simon; Biermann, Lukas; Liu, Huajian
IS and T International Symposium on Electronic Imaging 2024: Media Watermarking, Security, and Forensics, MWSF 2024
[Conference Paper]


Evaluating an Open-Source Hardware Approach from HDL to GDS for a Security Chip Design - a Review of the Final Stage of Project HEP
Henkes, Tim; Reith, Steffen; Stöttinger, Marc; Herfurth, Norbert; Panić, Goran; Wälde, Julian; Buschkowski, Fabian; Sasdrich, Pascal; Lüth, Christoph; Funck, Milan; Kiyan, Tuba; Weber, Arnd; Boeck, Detlef; Rathfelder, Rene; Grawunder, Torsten
2024 Design, Automation and Test in Europe Conference and Exhibition, DATE 2024
[Conference Paper]


Fraunhofer SIT at WASSA 2024 Empathy and Personality Shared Task: Use of Sentiment Transformers and Data Augmentation With Fuzzy Labels to Predict Emotional Reactions in Conversations and Essays
Frick, Raphael Antonius; Steinebach, Martin
14th Workshop on Computational Approaches to Subjectivity, Sentiment, and Social Media Analysis, WASSA 2024
[Conference Paper]


Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks
Schröder, Robin Leander; Gast, Stefan; Guo, Qian
33rd USENIX Security Symposium, USENIX Security 2024
[Conference Paper]


LanDscAPe: Exploring LDAP Weaknesses and Data Leaks at Internet Scale
Kaspereit, Jonas; Öndarö, Gurur; Cesar, Gustavo Luvizotto; Ebbers, Simon; Ising, Fabian; Saatjohann, Christoph; Jonker, Mattijs; Holz, Ralph G.; Schinzel, Sebastian
33rd USENIX Security Symposium, USENIX Security 2024
[Conference Paper]


Attacking with Something That Does Not Exist: ‘Proof of Non-Existence’ Can Exhaust DNS Resolver CPU
Gruza, Olivia; Heftrig, Elias; Jacobsen, Oliver; Shulman, Haya; Vogel, Niklas; Waidner, Michael
18th USENIX WOOT Conference on Offensive Technologies, WOOT 2024
[Conference Paper]


What All the Phuzz Is About: A Coverage-guided Fuzzer for Finding Vulnerabilities in PHP Web Applications
Neef, Sebastian; Kleissner, Lorenz; Seifert, Jean Pierre
19th ACM Asia Conference on Computer and Communications Security, AsiaCCS 2024
[Conference Paper]


Dynamically Generating Callback Summaries for Enhancing Static Analysis
Arzt, Steven; Miltenberger, Marc; Näumann, Julius
38th European Conference on Object-Oriented Programming, ECOOP 2024
[Conference Paper]


Toward Self-Adjusting k-Ary Search Tree Networks
Feder, Evgeniy; Paramonov, Anton; Mavrin, P. A.; Salem, Iosif; Aksenov, Vitaly E.; Schmid, Stefan
32nd Annual European Symposium on Algorithms, ESA 2024
[Conference Paper]


Musketeer: Incentive-Compatible Rebalancing for Payment Channel Networks
Avarikioti, Zeta; Schmid, Stefan; Tiwari, Samarth
6th Conference on Advances in Financial Technologies, AFT 2024
[Conference Paper]


Attacking with Something That Does Not Exist: ’Proof of Non-Existence’ Can Exhaust DNS Resolver CPU
Olivia Gruza and Elias Heftrig and Oliver Jacobsen and Haya Schulmann and Niklas Vogel and Michael Waidner
18th USENIX WOOT Conference on Offensive Technologies (WOOT 24), p.45–57
[Conference Proceedings]


Insights into SAV Implementations in the Internet
Haya Schulmann and Shujie Zhao
Passive and Active Measurement, p.69–87
[Conference Proceedings]


Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms
Jens Frieß and Tobias Gattermayer and Nethanel Gelernter and Haya Schulmann and Michael Waidner
21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24), p.1977–1994
[Conference Proceedings]


The CURE to Vulnerabilities in RPKI Validation
Donika Mirdita and Haya Schulmann and Niklas Vogel and Michael Waidner
31st Annual Network and Distributed System Security Symposium
[Conference Proceedings]


Crowdsourced Distributed Domain Validation
Jens Frieß and Haya Schulmann and Michael Waidner
Proceedings of the 23rd ACM Workshop on Hot Topics in Networks, p.318–325
[Conference Proceedings]


Poster: From Fort to Foe: The Threat of RCE in RPKI
Oliver Jacobsen and Haya Schulmann and Niklas Vogel and Michael Waidner
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.5015–5017
[Conference Proceedings]


Poster: Patching NSEC3-Encloser: The Good, the Bad, and the Ugly
Oliver Jacobsen and Haya Schulmann
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4937–4939
[Conference Proceedings]


Poster: Security of Login Interfaces in Modern Organizations
Kevin Nsieyanji Tchokodeu and Haya Schulmann and Gil Sobol and Michael Waidner
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4925–4927
[Conference Proceedings]


Poster: Kill Krill or Proxy RPKI
Louis Cattepoel and Donika Mirdita and Haya Schulmann and Michael Waidner
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.4922–4924
[Conference Proceedings]


The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC
Elias Heftrig and Haya Schulmann and Niklas Vogel and Michael Waidner
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.497–510
[Conference Proceedings]


Byzantine-Secure Relying Party for Resilient RPKI
Jens Frieß and Donika Mirdita and Haya Schulmann and Michael Waidner
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p.49–63
[Conference Proceedings]


External Attack-Surface of Modern Organizations
Nethanel Gelernter and Haya Schulmann and Michael Waidner
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, p.589–604
[Conference Proceedings]


Protocol Fixes for KeyTrap Vulnerabilities
Elias Heftrig and Haya Schulmann and Niklas Vogel and Michael Waidner
Proceedings of the 2024 Applied Networking Research Workshop, p.74–80
[Conference Proceedings]


On Criteria and Tooling for Cryptographic Inventories
N. Schmitt and J. Henrich and D. Heinz and N. Alnahawi and A. Wiesmaier
LNI Tagungsband GI Sicherheit 2024, p.49–63
[Conference Proceedings]


PMMP - PQC Migration Management Process
N. von Nethen and A. Wiesmaier and N. Alnahawi and J. Henrich
European Interdisciplinary Cyber­security Conference (EICC'24), p.144–154
[Conference Proceedings]


Detecting 5G Narrowband Jammers with CNN, k-nearest Neighbors, and Support Vector Machines
Matteo Varotto and Florian Heinrichs and Timo Schuerg and Stefano Tomasin and Stefan Valentin
IEEE International Workshop on Information Forensics and Security, WIFS 2024, Rome, Italy, December 2-5, 2024, p.1–6
[Conference Proceedings]


One-Class Classification as GLRT for Jamming Detection in Private 5G Networks
Matteo Varotto and Stefan Valentin and Francesco Ardizzon and Samuele Marzotto and Stefano Tomasin
25th IEEE International Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2024, Lucca, Italy, September 10-13, 2024, p.201–205
[Conference Proceedings]


Detecting 5G Signal Jammers Using Spectrograms with Supervised and Unsupervised Learning
Matteo Varotto and Stefan Valentin and Stefano Tomasin
IEEE International Conference on Communications Workshops, ICC 2024 Workshops, Denver, CO, USA, June 9-13, 2024, p.767–772
[Conference Proceedings]