Publikationen

Publikationen

A Unified Lattice Model and Framework for Purity Analyses
Helm, Dominik; Kübler, Florian; Eichberg, Michael; Reif, Michael; Mezini, Mira
Software Engineering und Software Management 2019
[Conference Proceedings]


A unified lattice model and framework for purity analyses
Helm, Dominik; Kübler, Florian; Eichberg, Michael; Reif, Michael; Mezini, Mira
Software Engineering and Software Management 2019
[Conference Proceedings]


DÏoT: A Federated Self-learning Anomaly Detection System for IoT
Nguyen, Thien Duc; Marchal, Samuel; Miettinen, Markus; Fereidooni, Hossein; Asokan, N.; Sadeghi, Ahmad-Reza
The 39th IEEE International Conference on Distributed Computing Systems (ICDCS 2019)
[Conference Proceedings]


A Dataset of Parametric Cryptographic Misuses
Wickert, Anna-Katharina; Reif, Michael; Eichberg, Michael; Dodhy, Anam; Mezini, Mira
2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR)
[Conference Proceedings]


HONEYSCOPE: IoT Device Protection with Deceptive Network Views,
Mohamed, Reham; O'Connor, Terrance; Miettinen, Markus; Enck, William; Sadeghi, Ahmad-Reza
Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings


HomeSnitch: Behavior Transparency and Control for Smart Home IoT Devices
O'Connor, T. J.; Mohamed, Reham; Miettinen, Markus; Enck, William; Reaves, Bradley; Sadeghi, Ahmad-Reza
Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec)
[Conference Proceedings]


Context Hiding Multi-Key Linearly Homomorphic Authenticators
Schabhüser, Lucas; Butin, Denis; Buchmann, Johannes
Topics in Cryptology - CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, p.493-513
[Conference Proceedings]


Efficient Proactive Secret Sharing for Large Data via Concise Vector Commitments
Geihs, Matthias; Schabhüser, Lucas; Buchmann, Johannes
International Conference on Codes, Cryptology, and Information Security (C2SI) 2019
[Conference Proceedings]


Multiparty Virtual State Channels
Dziembowski, Stefan; Eckey, Lisa; Faust, Sebastian; Hesse, Julia; Hostakova, Kristina
Eurocrypt 2019
[Conference Proceedings]


Perils of Zero-Interaction Security in the Internet of Things
Fomichev, Mikhail; Maass, Max; Almon, Lars; Molina, Alejandro; Hollick, Matthias
ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2019)
[Conference Proceedings]


FastKitten: Practical Smart Contracts on Bitcoin
Das, Poulami; Eckey, Lisa; Frassetto, Tommaso; Gens, David; Hostakova, Kristina; Jauernig, Patrick; Faust, Sebastian; Sadeghi, Ahmad-Reza
[Report]


AUDI: Towards Autonomous IoT Device-Type Identification
Marchal, Samuel; Miettinen, Markus; Nguyen, Thien Duc; Sadeghi, Ahmad-Reza; Asokan, N.
IEEE Journal on Selected Areas in Communications (JSAC) on Artificial Intelligence and Machine Learning for Networking and Communications
[Journal Article]


Fault Attacks on UOV and Rainbow
Krämer, Juliane; Loiero, Mirjam
10th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2019)
[Conference Proceedings]


PILOT: Practical Privacy-Preserving Indoor Localization using OuTsourcing
Järvinen, Kimmo; Leppäkoski, Helena; Lohan, Elena Simona; Richter, Philipp; Schneider, Thomas; Tkachenko, Oleksandr; Yang, Zheng
4. IEEE European Symposium on Security and Privacy (EuroS&P'19)
[Conference Proceedings]


FastKitten: Practical Smart Contracts on Bitcoin
Das, Poulami; Eckey, Lisa; Frassetto, Tommaso; Gens, David; Hostáková, Kristina; Jauernig, Patrick; Faust, Sebastian; Sadeghi, Ahmad-Reza
28th USENIX Security Symposium
[Conference Proceedings]


ARM2GC: Succinct Garbled Processor for Secure Computation
Songhori, Ebrahim; Riazi, M. Sadegh; Hussain, Siam; Sadeghi, Ahmad-Reza; Koushanfar, Farinaz
Design Automation Conference (DAC), 2019 56th ACM/EDAC/IEEE
[Conference Proceedings]


Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks
Rodler, Michael; Li, Wenting; Karame, Ghassan O.; Davi, Lucas
Proceedings of 26th Annual Network & Distributed System Security Symposium (NDSS)
[Conference Proceedings]


Efficient Circuit-based PSI with Linear Communication
Pinkas, Benny; Schneider, Thomas; Tkachenko, Oleksandr; Yanai, Avishay
38. Advances in Cryptology -- EUROCRYPT 2019
[Conference Proceedings]


HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement
Nyman, Thomas; Dessouky, Ghada; Zeitouni, Shaza; Lehikoinen, Aaro; Paverd, Andrew; Asokan, N.; Sadeghi, Ahmad-Reza
DAC 2019
[Conference Proceedings]


Fake News Perception in Germany: A Representative Study of People's Attitudes and Approaches to Counteract Disinformation
Reuter, Christian; Hartwig, Katrin; Kirchner, Jan; Schlegel, Noah
Wirtschaftsinformatik Proceedings 2019, p.1069-1083
[Conference Proceedings]


IT in Peace, Conflict, and Security Research
Reuter, Christian; Aldehoff, Larissa; Riebe, Thea; Kaufhold, Marc-André
Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, p.11-37


Vulnerability Assessment in the Smart Farming Infrastructure through Cyberattacks
Linsner, Sebastian; Varma, Rashmi; Reuter, Christian
38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?
[Conference Proceedings]


Cultural Violence and Peace in Social Media
Kaufhold, Marc-André; Reuter, Christian
Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, p.361-381


Potentiale von IKT beim Ausfall kritischer Infrastrukturen: Erwartungen, Informationsgewinnung und Mediennutzung der Zivilbevölkerung in Deutschland
Kaufhold, Marc-André; Grinko, Margarita; Reuter, Christian; Schorch, Marén; Langer, Amanda; Skudelny, Sascha; Hollick, Matthias
Proceedings of the International Conference on Wirtschaftsinformatik
[Conference Proceedings]


TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter
Hartwig, Katrin; Reuter, Christian
Proceedings of the International Conference on Wirtschaftsinformatik (WI)
[Conference Proceedings]


Hybride Dienst­leis­tun­gen in digi­tali­sierten Kooperationen in der Landwirtschaft
Bernardi, Ansgar; Reuter, Christian; Schneider, Wolfgang; Linsner, Sebastian; Kaufhold, Marc-André
38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?
[Conference Proceedings]


A Holistic View on Organizational IT Security: The Influence of Contextual Aspects During IT Security Decisions
Heidt, Margareta; Gerlach, Jin; Buxmann, Peter
Hawaii International Conference on System Sciences (HICSS)
[Conference Proceedings]


Dual Use and Dilemmas for Cybersecurity, Peace and Technology Assessment
Riebe, Thea; Reuter, Christian
Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, p.165-183


Dual-Use in der IT: Bewertung in der Softwareentwicklung
Riebe, Thea; Reuter, Christian
Wissenschaft & Frieden
[Journal Article]


Behaviour & information technology : Special Issue on Social Media in Conflicts and Crises
Reuter, Christian; Stieglitz, Stefan; Imran, Muhammad
[Book]