Selected Publications

Additional Attributes


Revisiting Context-Based Pairing in IoT

Markus Miettinen, Thien Duc Nguyen, N. Asokan, Ahmad-Reza Sadeghi
In: Proceedings of the 55th Design Automation Conference (DAC), June 2018

iOracle: Automated Evaluation of Access Control Policies in iOS

Razvan Deaconescu, Costin Carabas, Iulia Manda, William Enck, Mihai Chiroiu, Ninghui Li, Ahmad-Reza Sadeghi
In: 13th ASIA Conference on Information, Computer and Communications Security, June 2018

Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies

Oleksandr Tkachenko, Christian Weinert, Thomas Schneider, K. Hamacher
In: ACM Asia Conference on Computer and Communications Security (ASIACCS'18), June 2018

Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications

M. Sadegh Riazi, Christian Weinert, Oleksandr Tkachenko, Ebrahim Songhori, Thomas Schneider, Farinaz Koushanfar
In: ACM Asia Conference on Computer and Communications Security (ASIACCS'18), June 2018

VisuFlow: a Debugging Environment for Static Analyses

Lisa Nguyen, Stefan Krüger, Patrick Hill, Karim Ali, Eric Bodden
In: ICSE, May 2018

Don't Steal my Drone: Catching Attackers with an Unmanned Aerial Vehicle Honeypot

Emmanouil Vasilomanolakis, Jörg Daubert, Dhanasekar Boopalan, Max Mühlhäuser
In: IEEE/IFIP Network Operations and Management Symposium (NOMS), April 2018

K-Miner: Uncovering Memory Corruption in Linux

David Gens, Simon Schmitt, Lucas Davi, Ahmad-Reza Sadeghi
In: 25th Annual Network & Distributed System Security Symposium (NDSS), February 2018

Trapped-ion quantum simulation of excitation transport: Disordered, noisy, and long-range connected quantum networks

Nils Trautmann, Philipp Hauke
In: PHYSICAL REVIEW A, Vol. 97, p. 023606, February 2018

Human Factors in Security

Paul Gerber, Marco Ghiglieri, Birgit Henhapl, Oksana Kulyk, Karola Marky, Peter Mayer, Benjamin Reinheimer, Melanie Volkamer
In: Sicherheitskritische Mensch-Computer-Interaktion, p. 83-98, January 2018

A Systematic Evaluation of API-Misuse Detectors

Sven Amann, Hoan Anh Nguyen, Sarah Nadi, Tien Nguyen, Mira Mezini


1. IT-Sicherheitstag Rhein-Main
In Kooperation mit dem Profilbereich Cybersicherheit der TU Darmstadt richtet heise Events den 1....

CAST-Workshop: Sichere Software entwickeln
Der Workshop "Sichere Software entwickeln" richtet sich an Praktiker, die als...

Digital Kongress 2018
Der Digital-Kongress (früher: Future Internet Kongress) befasst sich seit 2012 mit innovativen und...

A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Kontakt Contact | Website Analysis: More Information
zum Seitenanfangzum Seitenanfang