Publikationen
Publikationen
The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques
Davi, Lucas; Lehmann, Daniel; Sadeghi, Ahmad-Reza
BlackHat USA
[Conference Proceedings]
Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources
Brzuska, Christina; Farshim, Pooya; Mittelbach, Arno
Advances in Cryptology – CRYPTO 2014. 34th Annual Cryptology Conference. Santa Barbara, CA, USA. August 17-21, 2014. Proceedings., p.188-205
[Conference Proceedings]
Mobile Trusted Computing
Asokan, N.; Ekberg, Jan-Erik; Kostiainen, Kari; Rajan, Anand; Rozas, Carlos; Sadeghi, Ahmad-Reza; Schulz, Steffen; Wachsmann, Christian
Proceedings of the IEEE, p.1189-1206
[Journal Article]
AES-SEC: Improving software obfuscation through hardware-assistance (short paper)
Schrittwieser, Sebastian; Katzenbeisser, Stefan; Merzdovnik, Georg; Kieseberg, Peter; Weippl, Edgar
Proceedings of the 2014 Ninth International Conference on Availability, Reliability and Security Pages, p.184-191
[Conference Proceedings]
Patrolling wireless sensor networks: Randomized intrusion detection
Riecker, Michael; Yuan, Dingwen; Bansarkhani, Rachid El; Hollick, Matthias
10th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Q2SWinet ’14, p.61-69
[Conference Proceedings]
Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?
Neumann, Stephan; Olembo, Maina; Renaud, Karen; Volkamer, Melanie
3rd International Conference on Electronic Government and the Information Systems Perspective, p.246-260
[Conference Proceedings]
A Usable Android Application Implementing Distributed Cryptography For Election Authorities
Neumann, Stephan; Kulyk, Oksana; Volkamer, Melanie
9th International Workshop on Frontiers in Availability, Reliability and Security - FARES 2014, p.198-207
[Conference Proceedings]
Tracking Load-time Configuration Option
Lillack, Max; Kästner, Christian; Bodden, Eric
Proceedings of the 29th ACM/IEEE international conference on Automated software engineering, p.445-456
[Conference Proceedings]
DNS Security: Past, Present and Future
Herzberg, Amir; Shulman, Haya
Future Security Conference 2014
[Conference Proceedings]
Efficient Integer Encoding for Homomorphic Encryption via Ring Isomorphisms
Geihs, Matthias; Cabarcas, Daniel
3rd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2014, p.48-63
[Conference Proceedings]
Coercion-Resistant Internet Voting in Practice
Feier, Christian; Neumann, Stephan; Volkamer, Melanie
INFORMATIK 2014: Big Data - Komplexität meistern, p.1401-1414
[Conference Proceedings]
High-speed signatures from standard lattices
Dagdelen, Özgür; Bansarkhani, Rachid El; Göpfert, Florian; Güneysu, Tim; Oder, Tobias; Pöppelmann, Thomas; Sanchez, Ana Helena; Schwabe, Peter
Latincrypt 2014
[Conference Proceedings]
Analyzing the Effectiveness of DoS Attacks on Tor
Conrad, Bernd; Shirazi, Fatemeh
7th International Conference on Security of Information and Networks (SIN 2014)
[Conference Proceedings]
NoPhish: An Anti-Phishing Education App
Canova, Gamze; Volkamer, Melanie; Bergmann, Clemens; Borza, Roland
10th International Workshop on Security and Trust Management in conjunction with ESORICS 2014, p.188-192
[Conference Proceedings]
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail
Budurushi, Jurlind; Neumann, Stephan; Shala, Genc; Volkamer, Melanie
INFORMATIK 2014: Big Data - Komplexität meistern, p.1415-1426
[Conference Proceedings]
Towards Security Solutions for Emergent Business Software
Buchmann, Johannes; Bansarkhani, Rachid El; Hauke, Sascha
Future Business Software Conference 2012, p.67-80
[Conference Proceedings]
Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten
Bartsch, Steffen; Boos, Carina; Canova, Gamze; Dyck, Dominic; Henhapl, Birgit; Schultheis, Michael; Volkamer, Melanie
Workshop RiskKom der GI-FGn SECMGT & ECOM auf der Informatik 2014, p.2069-2078
[Conference Proceedings]
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks
Ambrosin, Moreno; Busold, Christoph; Conti, Mauro; Sadeghi, Ahmad-Reza; Schunter, Matthias
Computer Security - ESORICS 2014, p.76-93
Mitigating Eclipse Attacks in Peer-to-Peer Networks
Suri, Neeraj; Germanus, Daniel; Roos, Stefanie; Strufe, Thorsten
In Proceedings of IEEE Conference on Communications and Network Security (CNS)
[Conference Proceedings]
Reducing User Tracking through Automatic Web Site State Isolations
Stopczynski, Martin; Zugelder, Michael
Information Security, p.309-327
[Conference Proceedings]
EventBreak: Analyzing the Responsiveness of User Interfaces through Performance-Guided Test Generation
Pradel, Michael; Schuh, Parker; Necula, George; Sen, Koushik
Proceedings of the 2014 ACM International Conference on Object Oriented Programming Systems Languages & Applications, p.33-47
[Conference Proceedings]
Pretty Understandable Democracy 2.0
Neumann, Stephan; Feier, Christian; Sahin, Perihan; Fach, Sebastian
6th International Conference on Electronic Voting (EVOTE), p.69 - 72
[Conference Proceedings]
i3QL: Language-Integrated Live Data Views
Mitschke, Ralf; Erdweg, Sebastian; Köhler, Mirko; Mezini, Mira; Salvaneschi, Guido
Proceedings of the 2014 ACM International Conference on Object Oriented Programming Systems Languages & Applications, p.417-432
[Conference Proceedings]
Electronic Voting with Fully Distributed Trust and Maximized Flexibility Regarding Ballot Design
Kulyk, Oksana; Feier, Christian; Köster, Thorben
6th International Conference on Electronic Voting - EVOTE 2014, p.1-10
[Conference Proceedings]
The Cubic Simple Matrix Encryption Scheme
Ding, Jintai; Petzoldt, Albrecht; Wang, Lih-Chung
PQCrypto 2014, p.76-87
[Conference Proceedings]
A Multi-Party Protocol for Privacy-Preserving Cooperative Linear System of Equations
Dagdelen, Özgür; Venturi, Daniele
BalkancryptSec 2014 - International Conference on Cryptography and Information security, p.161-172
[Conference Proceedings]
Implementation and Evaluation of the EasyVote Tallying Component and Ballot
Budurushi, Jurlind; Renaud, Karen; Volkamer, Melanie; Woide, Marcel
6th International Conference on Electronic Voting (EVOTE), p.1 - 8
[Conference Proceedings]
Nearest Planes in Practice
Buchmann, Johannes; Bischof, Christian; Dagdelen, Özgür; Fitzpatrick, Robert; Göpfert, Florian; Mariano, Artur
International Conference on Cryptography and Information security -BalkanCryptSec 2014
[Conference Proceedings]
Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication
Braun, Johannes
IEEE Conference on Communications and Network Security (IEEE CNS 2014 Poster Session)
[Conference Proceedings]
Poster: On the Resilience of DNS Infrastructure
Shulman, Haya; Ezra, Shiran
ACM Conference on Computer and Communications Security (ACM CCS)
[Conference Proceedings]