Publikationen

Publikationen

Converse PUF-Based Authentication
Sadeghi, Ahmad-Reza; Kocabaş, Ünal; Katzenbeisser, Stefan
International Conference on Trust & Trustworthy Computing (TRUST)
[Conference Proceedings]


Statically checking API protocol conformance with mined multi-object specifications
Pradel, Michael; Jaspan, Ciera; Aldrich, Jonathan; Gross, Thomas R.
Proceedings of the 34th International Conference on Software Engineering, p.925-935
[Conference Proceedings]


Leveraging test generation and specification mining for automated bug detection without false positives
Pradel, Michael; Gross, Thomas R.
Proceedings of the 34th International Conference on Software Engineering, p.288-298
[Conference Proceedings]


Instrumenting AUTOSAR for Dependability Assessment: A Guidance Framework
Piper, Thorsten; Winter, Stefan; Manns, Paul; Suri, Neeraj
Proceedings of the 2012 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), p.1-12
[Conference Proceedings]


Semi-automatically extracting FAQs to improve accessibility of software development knowledge
Henß, Stefan; Monperrus, Martin; Mezini, Mira
Proceedings of the 34th International Conference on Software Engineering, p.793-803
[Conference Proceedings]


SmartTokens: Delegable Access Control with NFC-enabled Smartphones
Dmitrienko, Alexandra; Sadeghi, Ahmad-Reza; Tamrakar, Sandeep; Wachsmann, Christian
International Conference on Trust & Trustworthy Computing (TRUST), p.219-238
[Conference Proceedings]


Partial Verifiability in POLYAS for the GI Elections
Olembo, Maina; Kahlert, Anna; Neumann, Stephan; Volkamer, Melanie
5th International Conference on Electronic Voting 2012 (EVOTE2012), p.95-109
[Conference Proceedings]


Practical Security in E-Mail Applications
Kiefer, Franziskus; Wiesmaier, Alexander; Fritz, Christian
The 2012 International Conference on Security and Management (SAM’12)
[Conference Proceedings]


A Grid security architecture for AliEn
Schreiner, Steffen; Grigoras, Costin; Grigoras, Alina; Betev, Latchezar; Buchmann, Johannes
Proceedings of Science (PoS), ISGC2012:027, International Symposium on Grids & Clouds (ISGC) 2012
[Conference Proceedings]


Civitas and the Real World: Problems and Solutions from a Practical Point of View
Neumann, Stephan; Volkamer, Melanie
7th International Conference on Availability, Reliability and Security (ARES), p.180-185
[Conference Proceedings]


Forward Secure Signatures on Smart Cards
Hülsing, Andreas; Busold, Christoph; Buchmann, Johannes
SAC2012 - Conference on Selected Areas in Cryptography, p.66-80
[Conference Proceedings]


Improving Helios with Everlasting Privacy Towards the Public
Demirel, Denise; Graaf, Jeroen van de; Araújo, Roberto
Electronic Voting Technology Workshop / Workshop on Trustworthy Elections - EVT/WOTE 2012
[Conference Proceedings]


XIFER: A Software Diversity Tool Against Code-Reuse Attacks
Davi, Lucas; Dmitrienko, Alexandra; Nürnberger, Stefan; Sadeghi, Ahmad-Reza
4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3 2012)
[Conference Proceedings]


The Notary Based PKI -- A Lightweight PKI for Long-term Signatures on Documents
Vigil, Martín; Moecke, Cristian Thiago; Custódio, Ricardo Felipe; Volkamer, Melanie
EuroPKI 2012, September 13-14, p.85-97
[Conference Proceedings]


PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon
Katzenbeisser, Stefan; Kocabaş, Ünal; Rožic, Vladimir; Sadeghi, Ahmad-Reza; Verbauwhede, Ingrid; Wachsmann, Christian
Workshop on Cryptographic Hardware and Embedded Systems (CHES), p.283-301
[Conference Proceedings]


On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes
Göttert, Norman; Feller, Thomas; Schneider, Michael; Huss, Sorin; Buchmann, Johannes
Workshop on Cryptographic Hardware and Embedded Systems (CHES 2012), p.512-529
[Conference Proceedings]


How to avoid the Breakdown of Public Key Infrastructures - Forward Secure Signatures for Certificate Authorities
Braun, Johannes; Hülsing, Andreas; Wiesmaier, Alexander; Vigil, Martín; Buchmann, Johannes
Public Key Infrastructures, Services and Applications - EuroPKI 2012, p.53-68
[Conference Proceedings]


Towards the Systematic Development of Contextualized Security Interventions
Bartsch, Steffen; Volkamer, Melanie
Designing Interactive Secure Systems (DISS), BCS HCI 2012
[Conference Proceedings]


Context determines content: an approach to resource recommendation in folksonomies
Rodenhausen, Thomas; Anjorin, Mojisola; Dominguez Garcia, Renato; Rensing, Christoph
Proceedings of the 4th ACM RecSys workshop on Recommender systems and the social web, p.17-24
[Conference Proceedings]


The Secure Platform Problem - Taxonomy and Analysis of Existing Proposals to Address this Problem
Schläpfer, Michael; Volkamer, Melanie
Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance, p.410-418
[Conference Proceedings]


Malacoda: towards high-level compilation of network security applications on reconfigurable hardware
Mühlbach, Sascha; Koch, Andreas
Proceedings of the eighth ACM/IEEE symposium on Architectures for networking and communications systems, p.247-258
[Conference Proceedings]


Secure Two-Party Computations in ANSI C
Holzer, Andreas; Franz, Martin; Katzenbeisser, Stefan; Veith, Helmut
Conference on Computer and Communications Security (CCS 2012), p.772-783
[Conference Proceedings]


iPIN and mTAN for secure eID applications
Braun, Johannes; Horsch, Moritz; Wiesmaier, Alexander
8th International Conference on Information Security Practice and Experience (ISPEC 2012), p.259-276
[Conference Proceedings]


Cleaning up the PKI for Long-term Signatures
Vigil, Martín; Custódio, Ricardo Felipe
12th SBSeg 2012, Brazilian Symposium on Information and Computer System Security, p.140-153
[Conference Proceedings]


Smart Home Dashboard – Das intelligente Energiemanagement
Stopczynski, Martin; Ghiglieri, Marco
VDE KONGRESS 2012 Smart Grid
[Conference Proceedings]


Privacy-Preserving Architecture for Forensic Image Recognition
Peter, Andreas; Hartmann, T.; Müller, S.; Katzenbeisser, Stefan
International Workshop on Information Forensics and Security (WIFS 2012), p.79-84
[Conference Proceedings]


Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication
Davi, Lucas; Dmitrienko, Alexandra; Liebchen, Christopher; Sadeghi, Ahmad-Reza
BlackHat Abu Dhabi
[Conference Proceedings]


An efficient mobile PACE implementation
A. Wiesmaier and M. Horsch and J. Braun and F. Kiefer and D. Hühnlein and F. Strenzke and J. Buchmann
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, p.176–185
[Conference Proceedings]


Mobile Authentisierung und Signatur
J. Braun and M. Horsch and A. Wiesmaier and D. Hühnlein
D-A-CH Security 2011: Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven, p.32–43
[Conference Proceedings]


Towards a Trust Management System for Cloud Computing
Habib, Sheikh Mahbub; Ries, Sebastian; Mühlhäuser, Max
Proceedings: The 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, p.933-939
[Conference Proceedings]