Publikationen

Publikationen

Secure automotive on-board protocols: A case of over-the-air (OTA) firmware updates

Idrees, S.; Schweppe, H.; Roudier, Y.; Wolf, M.; Henniger, O.; Scheuermann, D.
International Workshop on Communication Technologies for Vehicles (Nets4Cars/Nets4Trains) <3, 2011, Oberpfaffenhofen>
Sprache: English
[Conference Paper, Electronic Publication]

Search-based application security testing: Towards a structured search space

Türpe, S.
International Conference on Software Testing, Verification, and Validation Workshop (ICSTW) <4, 2011, Berlin>
Sprache: English
[Conference Paper]

Rihamark: Perceptual image hash benchmarking

Zauner, C.; Steinebach, M.; Hermann, E.
Media Watermarking, Security, and Forensics Conference <2011, San Francisco/Calif.>
Sprache: English
[Conference Paper]

Recyclable PUFs: Logically reconfigurable PUFs

Katzenbeisser, S.; Koçabas, Ü.; Leest, V. van der; Sadeghi, A.-R.; Schrijen, G.-J.; Schröder, H.; Wachsmann, C.
International Workshop on Cryptographic Hardware and Embedded Systems (CHES) <13, 2011, Nara>
Sprache: English
[Journal Article, Conference Paper]

Recyclable PUFs: Logically reconfigurable PUFs

Katzenbeisser, S.; Koçabas, Ü.; Leest, V. van der; Sadeghi, A.-R.; Schrijen, G.-J.; Schröder, H.; Wachsmann, C.
International Workshop on Cryptographic Hardware and Embedded Systems (CHES) <13, 2011, Nara>
Sprache: English
[Conference Paper]

Re-synchronizing audio watermarking after non-linear time stretching

Steinebach, M.; Zmudzinski, S.; Nürnberger, S.
Media Watermarking, Security, and Forensics Conference <2011, San Francisco/Calif.>
Sprache: English
[Conference Paper]

A property based security risk analysis through weighted simulation

Winkelvos, T.; Rudolph, C.; Repp, J.
Annual Information Security South Africa Conference ( ISSA) <10, 2011, Johannesburg>
Sprache: English
[Conference Paper]

Privilege escalation attacks on android

Davi, L.; Dmitrienko, A.; Sadeghi, A.-R.; Winandy, M.
International Information Security Conference (ISC) <13, 2010, Boca Raton/Fla.>
Sprache: English
[Conference Paper]

Privacy-preserving ECG classification with branching programs and neural networks

Barni, M.; Failla, P.; Lazzeretti, R.; Sadeghi, A.R.; Schneider, T.
Sprache: English
[Journal Article]

Preface

Beres, Y.; Perrig, A.; Sadeghi, A.-R.; Sasse, A.
International Conference on Trust and Trustworthy Computing (TRUST) <4, 2011, Pittsburgh/Pa.>
Sprache: English
[Conference Paper]

Practical and lightweight domain isolation on android

Bugiel, S.; Davi, L.; Dmitrienko, A.; Heuser, S.; Sadeghi, A.-R.; Shastry, B.
Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM) <1, 2011, Chicago/Ill.>
Sprache: English
[Conference Paper]

Performance evaluation in trust enhanced decentralised content distribution networks

Korn, R.; Kuntze, N.; Repp, J.
International Communications Quality and Reliability Workshop (CQR) <2011, Naples/Fla.>
Sprache: English
[Conference Paper]

On constructing homomorphic encryption schemes from coding theory

Armknecht, F.; Augot, D.; Perret, L.; Sadeghi, A.-R.
IMA International Conference on Cryptography and Coding (IMACC) <13, 2011, Oxford>
Sprache: English
[Conference Paper]

On biometric key generation from handwritten signatures

Scheuermann, D.; Wolfgruber, B.; Henniger, O.
Gesellschaft für Informatik, Special Interest Group on Biometrics and Electronic Signatures (BIOSIG Annual Conference) <9, 2011, Darmstadt>
Sprache: English
[Conference Paper, Electronic Publication]

A new metric for measuring the visual quality of video watermarks

Trick, D.; Thiemert, S.
Media Watermarking, Security, and Forensics Conference <2011, San Francisco/Calif.>
Sprache: English
[Conference Paper]

Modellgetriebener IT-Grundschutz: Erstellung und Analyse von IT-Sicherheitskonzeptionen in offenen Werkzeugketten

Eichler, J.
Deutscher IT-Sicherheitskongress <12, 2011, Bonn>
Sprache: German
[Conference Paper]

Model-based situational security analysis

Eichler, J.; Rieke, R.
Workshop on Models@run.time <6, 2011, Wellington>
Sprache: English
[Conference Paper]

Lost iPhone? Lost Passwords!: Practical consideration of iOS device encryption security

Heider, Jens; Boll, Matthias
Sprache: English
[Report, Electronic Publication]

Lightweight modeling and analysis of security concepts

Eichler, J.
International Symposium on Engineering Secure Software and Systems (ESSoS) <3, 2011, Madrid>
Sprache: English
[Conference Paper, Electronic Publication]

Interoperable device Identification in Smart-Grid Environments

Kuntze, N.; Rudolph, C.; Bente, I.; Vieweg, J.; Helden, J. von
IEEE Power and Energy Society (PES General Meeting) <2011, Detroit/Mich.>
Sprache: English
[Conference Paper]

How a symmetry metric assists side-channel evaluation: A novel model verification method for power analysis

Heuser, A.; Kasper, M.; Schindler, W.; Stöttinger, M.
Euromicro Conference on Digital System Design (DSD) <14, 2011, Oulu>
Sprache: English
[Conference Paper]

A generic public key infrastructure for securing Car-to-X communication

Bißmeyer, Norbert; Stübing, Hagen; Schoch, Elmar; Götz, Stefan; Stotz, Jan Peter; Lonc, Brigitte
World Congress on Intelligent Transport Systems (ITS) <18, 2011, Orlando/Fla.>
Sprache: English
[Conference Paper, Electronic Publication]

FPGA implementation of an improved attack against the DECT standard cipher

Weiner, M.; Tews, E.; Heinz, B.; Heyszl, J.
International Conference on Information Security and Cryptology (ICISC) <13, 2010, Soul>
Sprache: English
[Conference Paper]

Forschungsansätze zur Effizienzsteigerung heutiger IT-Frühwarnsysteme

Brunner, M.; Schoo, P.; Hofinger, H.; Roblee, C.; Todt, S.
Sprache: German
[Journal Article]

Formal Notions of Trust and Confidentiality - Enabling Reasoning about System Security

Fuchs, Andreas; Gürgens, Sigrid; Rudolph, Carsten
Sprache: English
[Journal Article, Electronic Publication]

A formal foundation for the security features of physical functions

Armknecht, F.; Maes, R.; Sadeghi, A.-R.; Standaert, F.-X.; Wachsmann, C.
Symposium on Security and Privacy (SP) <32, 2011, Berkeley/ Calif.>
Sprache: English
[Conference Paper]

A formal approach to distance-bounding RFID protocols

Dürholz, U.; Fischlin, M.; Kasper, M.; Onete, C.
Information Security Conference (ISC) <14, 2011, Xi'an>
Sprache: English
[Conference Paper]

Fast and adaptive tracing strategies for 3-secure fingerprint watermarking codes

Schäfer, Marcel; Berchtold, Waldemar; Steinebach, Martin
Workshop on Digital Rights Management (DRM) <11, 2011, Chicago/Ill.>
Sprache: English
[Conference Paper]

Enforcing S&D pattern design in RCES with modeling and formal approaches

Hamid, B.; Gürgens, S.; Jouvray, C.; Desnos, N.
International Conference on Model Driven Engineering Languages and Systems (MODELS) <14, 2011, Wellington>
Sprache: English
[Conference Paper]

Elektronische Patientenakte gemäß §291a SGB V - Die Patientenakte in der Versorgung: Kernkonzepte und technische Umsetzung

Caumanns, J.; Eckstein, L.; Kuhlisch, R.; Kunz, T.; Rode, O.; Viebeg, U.
Deutsche Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie (Jahrestagung) <56, 2011, Mainz>
Sprache: German
[Conference Paper]