Publikationen

Publikationen

  • TU Darmstadt (83407)
Gruppiere nach: Datum | Autor(en) | Typ des Eintrags
Springe zu: 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011
Anzahl der Einträge auf dieser Ebene: 925.

2018

Büscher, Niklas ; Demmler, Daniel ; Katzenbeisser, Stefan ; Kretzmer, David ; Schneider, Thomas :
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
[Online-Edition: https://www.sigsac.org/ccs/CCS2018/]
In: 25th ACM Conference on Computer and Communications Security (CCS'18), Toronto, Canada.
[Konferenz- oder Workshop-Beitrag], (2018)

Brasser, Ferdinand ; Frassetto, Tommaso ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Weinert, Christian :
VoiceGuard: Secure and Private Speech Processing.
In: Interspeech 2018
[Konferenz- oder Workshop-Beitrag], (2018)

Anagnostopoulos, Nikolaos Athanasios ; Arul, Tolga ; Fan, Yufan ; Hatzfeld, Christian ; Schaller, André ; Xiong, Wenjie ; Jain, Manishkumar ; Saleem, Umair ; Lotichius, Jan ; Gabmeyer, Sebastian ; Szefer, Jakub ; Katzenbeisser, Stefan :
Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security.
In: Cryptography 2018
[Artikel], (2018)

Anagnostopoulos, Nikolaos Athanasios ; Arul, Tolga ; Fan, Yufan ; Hatzfeld, Christian ; Tehranipoor, Fatemeh ; Katzenbeisser, Stefan :
Addressing the Effects of Temperature Variations on Intrinsic Memory-Based Physical Unclonable Functions.
In: GI .
[Konferenz- oder Workshop-Beitrag], (2018)

Kumar, Manish ; Anagnostopoulos, Nikolaos Athanasios ; Fan, Yufan ; Katzenbeisser, Stefan :
Advanced Reconfigurable Physical Unclonable Functions(AR-PUFs) and Their Security Applications.
In: GI .
[Konferenz- oder Workshop-Beitrag], (2018)

Schaller, André ; Xiong, Wenjie ; Anagnostopoulos, Nikolaos Athanasios ; Saleem, Umair ; Gabmeyer, Sebastian ; Skoric, Boris ; Katzenbeisser, Stefan ; Szefer, Jakub :
Decay-Based DRAM PUFs in Commodity Devices.
In: IEEE Transactions on Dependable and Secure Computing (TDSC)
[Artikel], (2018)

Helm, Dominik :
A Framework for Modular Purity Analyses.
TU Darmstadt
[Masterarbeit], (2018)

Kalsen, Ali :
On the impact of quantum algorithms on lattice enumeration.
TU Darmstadt
[Masterarbeit], (2018)

Sharma, Ratika :
Testing the effects of voltage variations on PUF implementations in Commercial Off-The-Shelf (COTS) devices.
TU Darmstadt
[Masterarbeit], (2018)

Frassetto, Tommaso ; Jauernig, Patrick Thomas ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
IMIX: In-Process Memory Isolation EXtension.
In: 27th USENIX Security Symposium, 15.-17.08.2018, Baltimore, MD, USA. 27th USENIX Security Symposium
[Konferenz- oder Workshop-Beitrag], (2018)

Kiss, Ágnes ; Schick, Oliver ; Schneider, Thomas :
Web Application for Privacy-Preserving Scheduling (Poster).
In: USENIX Security Symposium USENIX Association
[Anderes], (2018)

Dodhy, Anam :
Misuses of Parameters for Cryptographic APIs.
TU Darmstadt
[Masterarbeit], (2018)

Ece, Olcay :
Security of E-Mail-Encryption.
TU Darmstadt
[Bachelorarbeit], (2018)

Guski, Florian :
Simulation of the Quantum Hybrid Attack in Q#.
TU Darmstadt
[Bachelorarbeit], (2018)

Hald, Martin :
Cryptographic Analysis of the Bitmessage Protocol.
TU Darmstadt
[Masterarbeit], (2018)

Hanreich, Matthias :
Security Analysis and Firmware Modification of Fitbit Fitness Trackers.
TU Darmstadt
[Masterarbeit], (2018)

Kumar, Manish :
Advanced Reconfigurable Physical Unclonable Functions(AR-PUFs) and their security applications.
TU Darmstadt
[Masterarbeit], (2018)

Nanjunde Gowda, Vidyashree :
Benchmarking Static Misuse or Bug Detectors Using Software Vulnerabilities.
TU Darmstadt
[Masterarbeit], (2018)

Kohnhäuser, Florian ; Büscher, Niklas ; Katzenbeisser, Stefan :
SALAD: Secure and Lightweight Attestation of Highly Dynamic and Disruptive Networks.
[Online-Edition: https://dl.acm.org/citation.cfm?id=3196544]
Proceedings of the 2018 on Asia Conference on Computer and Communications Security
[Konferenz- oder Workshop-Beitrag], (2018)

Baack, Leon :
Optimisation of parts of a set-up for quantum key distribution.
TU Darmstadt
[Bachelorarbeit], (2018)

Buescher, Niklas ; Weber, Alina ; Katzenbeisser, Stefan :
Towards Practical RAM based Secure Computation.
[Online-Edition: https://esorics2018.upc.edu/]
In: ESORICS 2018, 3.9.-7.9. 2018, Barcelona, Spain. European Symposium on Research in Computer Security (ESORICS)
[Konferenz- oder Workshop-Beitrag], (2018)

Classen, Jiska ; Wegemer, Daniel :
Fitbit Firmware Hacking.
Recon
[Anderes], (2018)

Albrecht, Martin R. ; Curtis, Benjamin R. ; Deo, Amit ; Davidson, Alex ; Player, Rachel ; Postlethwaite, Eamonn W. ; Virdia, Fernando ; Wunderer, Thomas :
Estimate all the {LWE, NTRU} schemes!
[Online-Edition: http://scn.di.unisa.it/]
In: 11th Conference on Security and Cryptography for Networks, Amalfi, Italy. In: LNCS .
[Konferenz- oder Workshop-Beitrag], (2018)

Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Mühlhäuser, Max :
Towards Secure Distributed Trust Management on a Global Scale.
[Online-Edition: https://conferences.sigcomm.org/sigcomm/2018/workshop-iotsp....]
In: ACM .
[Konferenz- oder Workshop-Beitrag], (2018)

Anagnostopoulos, Nikolaos Athanasios ; Katzenbeisser, Stefan ; Chandy, John A. ; Tehranipoor, Fatemeh :
An Overview of DRAM-Based Security Primitives.
In: Cryptography 2018, Volume 2 (7)
[Artikel], (2018)

Bindel, Nina ; Buchmann, Johannes ; Göpfert, Florian ; Schmidt, Markus :
Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples.
In: Journal of Mathematical Cryptology
[Artikel], (2018)

Demmler, Daniel ; Rindal, Peter ; Rosulek, Mike ; Trieu, Ni :
PIR-PSI: Scaling Private Contact Discovery.
[Online-Edition: https://petsymposium.org/2018/index.php]
In: Proceedings on Privacy Enhancing Technologies (PoPETs)
[Artikel], (2018)

Fischlin, Marc ; Harasser, Patrick :
Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent.
[Online-Edition: https://www.springer.com/us/book/9783319933863]
In: 16th International Conference, ACNS 2018, 2.7.-4.7. 2018, Leuven, Belgium. In: Springer International Publishing , LNCS 10892 .
[Konferenz- oder Workshop-Beitrag], (2018)

Geihs, Matthias ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Buchmann, Johannes :
PROPYLA: Privacy Preserving Long-Term Secure Storage.
In: The Sixth International Workshop on Security in Cloud Computing (SCC). In: ACM . Songdo, Incheon, Korea
[Konferenz- oder Workshop-Beitrag], (2018)

Järvinen, Kimmo ; Kiss, Ágnes ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng :
Faster privacy-preserving location proximity schemes.
[Online-Edition: http://cans2018.na.icar.cnr.it/]
In: Cryptology And Network Security (CANS 2018). CANS 2018 Naples, Italy
[Konferenz- oder Workshop-Beitrag], (2018)

Kannwischer, Matthias ; Genêt, Aymeric ; Butin, Denis ; Krämer, Juliane ; Buchmann, Johannes :
Differential Power Analysis of XMSS and SPHINCS.
In: COSADE: International Workshop on Constructive Side-Channel Analysis and Secure Design. In: LNCS , 10815 . Singapore
[Konferenz- oder Workshop-Beitrag], (2018)

Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra ; Weber, Friedrich :
How Secure is Green IT? The Case of Software-Based Energy Side Channels.
[Online-Edition: https://esorics2018.upc.edu/]
In: ESORICS 2018, 3.9.-7.9. 2018, Barcelona, Spain. In: Springer LNCS . Barcelona, Spain
[Konferenz- oder Workshop-Beitrag], (2018)

Richter, Philipp ; Yang, Zheng ; Tkachenko, Oleksandr ; Leppäkoski, Helena ; Järvinen, Kimmo ; Schneider, Thomas :
Received Signal Strength quantization for secure indoorpositioning via fingerprinting.
8. International Conference on Localization and GNSS (ICL-GNSS'18)
[Konferenz- oder Workshop-Beitrag], (2018)

Schabhüser, Lucas ; Butin, Denis ; Demirel, Denise ; Buchmann, Johannes :
Function-Dependent Commitments for Verifiable Multi-Party Computation.
[Online-Edition: http://isc2018.sccs.surrey.ac.uk/]
In: LNCS . Guildford, UK
[Konferenz- oder Workshop-Beitrag], (2018)

Wunderer, Thomas ; Wang, Yuntao :
Revisiting the Sparsification Technique in Kannan’s Embedding Attack on LWE.
In: 14th International Conference on Information Security Practice and Experience (ISPEC 2018). In: Springer LNCS . Tokyo, Japan
[Konferenz- oder Workshop-Beitrag], (2018)

Dessouky, Ghada ; Abera, Tigist ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza :
LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution.
In: 37th IEEE International Conference On Computer Aided Design 2018 (ICCAD’18), 2018.
[Konferenz- oder Workshop-Beitrag], (2018)

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias :
SCIoT: A Secure and sCalable end-to-end management framework for IoT Devices.
In: 23rd European Symposium on Research in Computer Security (ESORICS 2018), 2018, Barcelona, Spain.
[Konferenz- oder Workshop-Beitrag], (2018)

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene :
US-AID: Unattended Scalable Attestation of IoT Devices.
In: 37th IEEE International Symposium on Reliable Distributed Systems (SRDS 2018), 2018.
[Konferenz- oder Workshop-Beitrag], (2018)

Deaconescu, Razvan ; Carabas, Costin ; Manda, Iulia ; Enck, William ; Chiroiu, Mihai ; Li, Ninghui ; Sadeghi, Ahmad-Reza :
iOracle: Automated Evaluation of Access Control Policies in iOS.
In: AsiaCCS .
[Konferenz- oder Workshop-Beitrag], (2018)

Miettinen, Markus ; Nguyen, Thien Duc ; Asokan, N. ; Sadeghi, Ahmad-Reza :
Revisiting Context-Based Pairing in IoT.
In: 55th Design Automation Conference (DAC), 24.-29.06. 2018, San Francisco, CA, USA. Proceedings of the 55th Design Automation Conference (DAC) ACM
[Konferenz- oder Workshop-Beitrag], (2018)

Riazi, M. Sadegh ; Weinert, Christian ; Tkachenko, Oleksandr ; Songhori, Ebrahim M. ; Schneider, Thomas ; Koushanfar, Farinaz :
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications.
ACM Asia Conference on Computer and Communications Security (ASIACCS'18) ACM
[Konferenz- oder Workshop-Beitrag], (2018)

Steinmetzer, Daniel ; Yuan, Yimin ; Hollick, Matthias :
Beam-Stealing: Intercepting the Sector Sweep to Launch Man-in-the-Middle Attacks on Wireless IEEE 802.11ad Networks.
In: 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Jun 18, 2018 - Jun 20, 2018, Stockholm, Sweden. Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks
[Konferenz- oder Workshop-Beitrag], (2018)

Tkachenko, Oleksandr ; Weinert, Christian ; Schneider, Thomas ; Hamacher, K. :
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
ACM Asia Conference on Computer and Communications Security (ASIACCS'18) ACM
[Konferenz- oder Workshop-Beitrag], (2018)

Zeitouni, Shaza ; Gens, David ; Sadeghi, Ahmad-Reza :
It’s Hammer Time: How to Attack (Rowhammer-based) DRAM-PUFs.
In: Design Automation Conference (DAC) 2018
[Konferenz- oder Workshop-Beitrag], (2018)

Kiel, Robert :
Zero-Knowledge Contingent Payments.
TU Darmstadt
[Masterarbeit], (2018)

Ullrich, Fabian :
Analysing and Evaluating Interface, Communication, and Web Security in Productive IoT Ecosystems.
TU Darmstadt
[Masterarbeit], (2018)

Wolf, Yannic :
Eine Faserverstärkerstufe für den Quantenhub.
TU Darmstadt
[Bachelorarbeit], (2018)

Biondo, Andrea ; Conti, Mauro ; Davi, Lucas ; Frassetto, Tommaso ; Sadeghi, Ahmad-Reza :
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX.
In: 27th USENIX Security Symposium.
[Konferenz- oder Workshop-Beitrag], (2018)

Nguyen, Lisa ; Krüger, Stefan ; Hill, Patrick ; Ali, Karim ; Bodden, Eric :
VisuFlow: a Debugging Environment for Static Analyses.
ICSE ACM
[Konferenz- oder Workshop-Beitrag], (2018)

Treiber, Amos :
Access Count Leakage in Oblivious RAMs.
TU Darmstadt
[Masterarbeit], (2018)

Deligeorgopoulos, Efstathios :
Evaluation of Proactive Secret Sharing for Long-Term Secure Storage.
TU Darmstadt
[Masterarbeit], (2018)

Scheidel, Lukas :
Distributed Path ORAM.
TU Darmstadt
[Bachelorarbeit], (2018)

Bielsa, Guillermo ; Palacios, Joan ; Loch, Adrian ; Steinmetzer, Daniel ; Cesari, Paolo ; Widmer, Joerg :
Indoor Localization Using Commercial Off-The-Shelf 60 GHz Access Points.
In: IEEE International Conference on Computer Communications (INFOCOM), 15-19 April 2018, Honolulu, Hawaii, USA.
[Konferenz- oder Workshop-Beitrag], (2018)

Ghaeini, Hamid Reza ; Antonioli, Daniele ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza ; Tippenhauer, Nils Ole :
State-Aware Anomaly Detection for Industrial Control Systems.
The 33rd ACM/SIGAPP Symposium On Applied Computing (SAC)
[Konferenz- oder Workshop-Beitrag], (2018)

Tariq, Taha :
Web application for privacy-preserving assignments.
TU Darmstadt
[Masterarbeit], (2018)

Vasilomanolakis, Emmanouil ; Daubert, Jörg ; Boopalan, Dhanasekar ; Mühlhäuser, Max :
Don't Steal my Drone: Catching Attackers with an Unmanned Aerial Vehicle Honeypot.
IEEE/IFIP Network Operations and Management Symposium (NOMS) IEEE
[Konferenz- oder Workshop-Beitrag], (2018)

Brandy, Malte :
Asymptotische Eigenschaften iterierter Quantenoperationen.
TU Darmstadt
[Masterarbeit], (2018)

Neubauer, Sven :
Angriffsanalyse einer TETRA-Basisstation.
TU Darmstadt
[Bachelorarbeit], (2018)

Alhassan, Masaud Y. :
Improving scalability of universal circuits for large-scale private function evaluation.
TU Darmstadt
[Masterarbeit], (2018)

Classen, Jiska ; Wegemer, Daniel ; Patras, Paul ; Spink, Tom ; Hollick, Matthias :
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware.
PACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) ACM
[Konferenz- oder Workshop-Beitrag], (2018)

Saleem, Umair Muhammad :
Flash-based Physical Unclonable Functions (PUFs) using Commercial Off-The-Shelf (COTS) NAND Flash Memory.
TU Darmstadt
[Masterarbeit], (2018)

Gens, David ; Schmitt, Simon ; Davi, Lucas ; Sadeghi, Ahmad-Reza :
K-Miner: Uncovering Memory Corruption in Linux.
25th Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag], (2018)

Trautmann, Nils ; Hauke, Philipp :
Trapped-ion quantum simulation of excitation transport: Disordered, noisy, and long-range connected quantum networks.
In: PHYSICAL REVIEW A, 97 023606.
[Artikel], (2018)

Ahmad, Saad :
Using Physical Unclonable Functions (PUFs) for Data-Link Layer Authenticity Verification to Mitigate Attacks on IEEE 802.11ad Beam Training.
TU Darmstadt
[Masterarbeit], (2018)

Gerber, Paul ; Ghiglieri, Marco ; Henhapl, Birgit ; Kulyk, Oksana ; Marky, Karola ; Mayer, Peter ; Reinheimer, Benjamin ; Volkamer, Melanie :
Human Factors in Security.
In: Sicherheitskritische Mensch-Computer-Interaktion. Springer , pp. 83-98.
[Buchkapitel], (2018)

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael :
Scalable private set intersection based on OT extension.
In: Transactions on Privacy and Security (TOPS)
[Artikel], (2018)

Amann, Sven ; Nguyen, Hoan Anh ; Nadi, Sarah ; Nguyen, Tien ; Mezini, Mira :
A Systematic Evaluation of API-Misuse Detectors.
In: IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
[Artikel], (2018)

Asokan, N. ; Gröndahl, Tommi ; Nguyen, Hoang Long ; Nguyen, Thien Duc ; Paverd, Andrew ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Stobert, Elizabeth ; Tamrakar, Sandeep :
OmniShare: Encrypted Cloud Storage for the Multi-Device Era.
[Online-Edition: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=832...]
In: IEEE Internet Computing p. 1. ISSN 1089-7801
[Artikel], (2018)

Asokan, N. ; Miettinen, Markus :
Ad-Hoc Key Agreement: a Brief History and the Challenges Ahead.
[Online-Edition: http://www.sciencedirect.com/science/article/pii/S0140366418...]
In: Computer Communications ISSN 0140-3664
[Artikel], (2018) (Im Druck)

Dantas, Yuri Gil ; Gay, Richard ; Hamann, Tobias ; Mantel, Heiko ; Schickel, Johannes :
An Evaluation of Bucketing in Systems with Non-Deterministic Timing Behavior.
In: 33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection (IFIP SEC).
[Konferenz- oder Workshop-Beitrag], (2018)

Daubert, Jörg ; Boopalan, Dhanasekar ; Mühlhäuser, Max ; Vasilomanolakis, Emmanouil :
HoneyDrone: a medium-interaction Unmanned Aerial Vehicle Honeypot.
IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies IEEE
[Konferenz- oder Workshop-Beitrag], (2018)

Gil Dantas, Yuri ; Gay, Richard ; Hamann, Tobias ; Mantel, Heiko ; Schickel, Johannes :
An Evaluation of Bucketing in Systems with Non-Deterministic Timing Behavior.
In: 33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection (IFIP SEC).
[Konferenz- oder Workshop-Beitrag], (2018)

Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra ; Weber, Friedrich :
How Secure is Green IT? The Case of Software-Based Energy Side Channels.
In: Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS).
[Konferenz- oder Workshop-Beitrag], (2018)

Nguyen, Thien Duc ; Marchal, Samuel ; Miettinen, Markus ; Dang, Minh Hoang ; Asokan, N. ; Sadeghi, Ahmad-Reza :
DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices.
[Online-Edition: http://arxiv.org/abs/1804.07474]
In: CoRR, abs/1804.07474
[Artikel], (2018)

O.O.Lemos, Marcilio ; Gil Dantas, Yuri ; Fonseca, Iguatemi E. ; Nigam, Vivek :
On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks.
In: Proceedings of the Journal of Logical and Algebraic Methods in Programming (JLAMP) pp. 45-67.
[Artikel], (2018)

2017

Deller, Yannick :
Zweidimensionale Surface-Kodes und ihre Anwendungen.
TU Darmstadt
[Bachelorarbeit], (2017)

Fladung, Lukas :
Semiclassical Laser Cooling of Trapped Ions in a One-Dimensional Standing Wave.
TU Darmstadt
[Bachelorarbeit], (2017)

Neumann, Klara Maria :
Aufbau von Empfängerstationen für ein System zum Quantenschlüsselaustausch.
TU Darmstadt
[Bachelorarbeit], (2017)

Schürl, Stefan :
Entwicklung eines FPGA-Systems zur hochauflösenden Zeitmessung.
TU Darmstadt
[Masterarbeit], (2017)

Albrecht, Martin ; Göpfert, Florian ; Vidria, Fernando ; Wunderer, Thomas :
Revisiting the Expected Cost of Solving uSVP and Applications to LWE.
ASIACRYPT 2017 - Advances in Cryptology Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Anagnostopoulos, Nikolaos Athanasios ; Gabmeyer, Sebastian :
An extensice classication and analysis of attaks against Physical Unclonable Functions (PUFs).
27th Crypto-Day
[Konferenz- oder Workshop-Beitrag], (2017)

Ay, Serafettin :
Detecting WiFi Covert Channels.
TU Darmstadt
[Masterarbeit], (2017)

Buchmann, Johannes ; Holzer, Patrick ; Wunderer, Thomas :
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β.
INDOCRYPT 2017 - 18th International Conference on Cryptology in India Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas :
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.
13. International Conference on emerging Networking EXperiments and Technologies (CoNEXT'17) ACM
[Konferenz- oder Workshop-Beitrag], (2017)

Cordero, Carlos Garcia ; Vasilomanolakis, Emmanouil ; Mühlhäuser, Max :
ID2T - The Intrusion Detection Dataset Generation Toolkit.
[Online-Edition: https://www.blackhat.com/eu-17/]

[Anderes], (2017)

Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas :
More Efficient Universal Circuit Constructions.
ASIACRYPT 2017 - Advances in Cryptology Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Kübler, Florian :
Foundations of a refinement-based framework for escape analyses.
TU Darmstadt
[Masterarbeit], (2017)

Muneeb, Ahmed :
mproving a Linux Device Driver for Visible Light Communication.
TU Darmstadt
[Masterarbeit], (2017)

Sarangdhar, Ravi ; Fan, Yufan ; Anagnostopoulos, Nikolaos Athanasios ; Gayer, Udo ; Flederer, Frank ; Mikschl, Tobias ; Arul, Tolga ; John, Philipp R. ; Hierholz, Kirsten ; Montenegro, Sergio ; Katzenbeisser, Stefan :
An investigation of the effects of radiation on current key storage solutions and on Physical Unclonable Functions (PUFs) being.
27th Crypto-Day
[Konferenz- oder Workshop-Beitrag], (2017)

Singh, Govind :
o Static Bug Finders Identify API Misuses?
TU Darmstadt
[Masterarbeit], (2017)

Vasilomanolakis, Emmanouil ; Wolf, Jan Helge ; Böck, Leon ; Mühlhäuser, Max ; Karuppayah, Shankar :
I Trust my Zombies: a Trust-enabled Botnet.
Blackhat Europe
[Konferenz- oder Workshop-Beitrag], (2017)

Yuan, Yimin :
Investigating Practical Man-in-the-middle Network Attacks on IEEE 802.11ad.
TU Darmstadt
[Masterarbeit], (2017)

Müller, Patrick :
Reconstruction of Obfuscated Strings.
TU Darmstadt
[Masterarbeit], (2017)

Afridi, Hassaan Ali Khan :
Investigating the relation between bugs and vulnerabilities in the Debian ecosystem.
TU Darmstadt
[Masterarbeit], (2017)

Demmler, Daniel ; Hamacher, Kay ; Schneider, Thomas ; Stammler, Sebastian :
Privacy-Preserving Whole-Genome Variant Queries.
CANS'17 - 16. International Conference on Cryptology And Network Security Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Frassetto, Tommaso ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
JITGuard: Hardening Just-in-time Compilers with SGX.
24th ACM Conference on Computer and Communications Security (CCS)
[Konferenz- oder Workshop-Beitrag], (2017)

Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Schickel, Johannes :
Towards Accelerated Usage Control based on Access Correlations.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Jauernig, Patrick Thomas :
SMOV: Lighweight In-Process Memory Isolation.
TU Darmstadt
[Masterarbeit], (2017)

Krüger, Stefan ; Nadi, Sarah ; Reif, Michael ; Ali, Karim ; Mezini, Mira ; Bodden, Eric ; Göpfert, Florian ; Günther, Felix ; Weinert, Christian ; Demmler, Daniel ; Kamath, Ram :
CogniCrypt: Supporting Developers in using Cryptography.
[Online-Edition: http://dl.acm.org/citation.cfm?id=3155562.3155681]
Automated Software Engineering (ASE'17) ACM , Piscataway, NJ, USA
[Konferenz- oder Workshop-Beitrag], (2017)

Liu, Jian ; Juuti, Mika ; Lu, Yao ; Asokan, N. :
Oblivious Neural Network Predictions via MiniONN Transformations.
In: ACM CCS 2017, ACM Conference on Computer and Communications Security
[Konferenz- oder Workshop-Beitrag], (2017)

Sarangdhar, Ravi :
An investigation of the effects of radiation on current key storage solutions and on Physical Unclonable Functions (PUFs) being used as key storage.
TU Darmstadt
[Masterarbeit], (2017)

Wainakh, Aidmar :
On the Analysis & Generation of Synthetic Attack for Intrusion Detection Systems.
TU Darmstadt
[Masterarbeit], (2017)

Zeitouni, Shaza ; Dessouky, Ghada ; Arias, Orlando ; Sullivan, Dean ; Ibrahim, Ahmad ; Jin, Yier ; Sadeghi, Ahmad-Reza :
ATRIUM: Runtime Attestation Resilient Under Memory Attacks.
2017 International Conference On Computer Aided Design (ICCAD'17)
[Konferenz- oder Workshop-Beitrag], (2017)

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Mühlhäuser, Max :
Towards Blockchain-Based Collaborative Intrusion Detection Systems.
International Conference on Critical Information Infrastructures Security Springer-Verlag
[Konferenz- oder Workshop-Beitrag], (2017)

Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra :
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
The 10th International Symposium on Foundations & Practice of Security Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Bindel, Nina ; Krämer, Juliane ; Schreiber, Johannes :
Hampering fault attacks against lattice-based signature schemes - countermeasures and their efficiency.
CODES/ISSS ’17 Companion Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Buldas, Ahto ; Geihs, Matthias ; Buchmann, Johannes :
Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions.
ProvSec 2017 - The 11th International Conference on Provable Security Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Böck, Leon :
On P2P botnet monitoring in adverse conditions.
TU Darmstadt
[Masterarbeit], (2017)

Chauhan, Prankur :
Improvement and integration of software tools for the evaluation and realization of Physical Unclonable Functions (PUFs) into an open-source library of cryptographic component (CogniCrypt).
TU Darmstadt
[Masterarbeit], (2017)

Grube, Tim ; Volk, Florian ; Mühlhäuser, Max ; Bhairav, Suhas ; Sachidananda, Vinay ; Elovici, Yuval :
Complexity Reduction in Graphs: A User Centric Approach to Graph Exploration.
to appear at: 10th International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services
[Konferenz- oder Workshop-Beitrag], (2017)

Horsch, Moritz ; Braun, Johannes ; Buchmann, Johannes :
Password Assistance.
Open Identity Summit 2017
[Konferenz- oder Workshop-Beitrag], (2017)

Kornhuber, Tim :
Implementation of a physical layer for visible light communication using the OpenVLC platform.
TU Darmstadt
[Masterarbeit], (2017)

Kümpel, Michael :
Implementierung des unteren MAC-Layers für die OpenVLC-Hardware.
TU Darmstadt
[Masterarbeit], (2017)

Marchal, Samuel ; Armano, Giovanni ; Gröndahl, Tommi ; Saari, Kalle ; Singh, Nidhi ; Asokan, N. :
Off-the-Hook: An Efficient and Usable Client-Side Phishing Prevention Application.
In: IEEE Transactions on Computers , 66 (10)
[Konferenz- oder Workshop-Beitrag], (2017)

Schreiber, Johannes :
Countermeasures Against First Order Fault Attacks Using the Example of ring-TESLA.
TU Darmstadt
[Masterarbeit], (2017)

Schulz, Matthias ; Wegemer, Daniel ; Hollick, Matthias :
Nexmon: Build Your Own Wi-Fi Testbeds With Low-Level MAC and PHY-Access Using Firmware Patches on Off-the-Shelf Mobile Devices.
Proceedings of the 11th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation & Characterization (WiNTECH 2017)
[Konferenz- oder Workshop-Beitrag], (2017)

Sitnikov, Konstantin :
A Survey on Post-Quantum Key Exchange.
TU Darmstadt
[Masterarbeit], (2017)

Steinmetzer, Daniel ; Loch, Adrian ; García-García, Amanda ; Widmer, Jörg ; Hollick, Matthias :
Mitigating Lateral Interference: Adaptive Beam Switching for Robust Millimeter-Wave Networks.
1st ACM Workshop on Millimeter Wave Networks and Sensing Systems (mmNets 2017) ACM
[Konferenz- oder Workshop-Beitrag], (2017)

Arias, Orlando ; Gens, David ; Jin, Yier ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Sullivan, Dean :
LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization.
20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2017)
[Konferenz- oder Workshop-Beitrag], (2017)

Brasser, Ferdinand ; Capkun, Srdjan ; Dmitrienko, Alexandra ; Frassetto, Tommaso ; Kostiainen, Kari ; Müller, Urs ; Sadeghi, Ahmad-Reza :
DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization.
ArXiv preprint
[Report], (2017)

Brendel, Jacqueline ; Fischlin, Marc :
Zero Round-Trip Time for the Extended Access Control Protocol.
In: Security and Cryptology , 22 (10492). Springer International Publishing
[Konferenz- oder Workshop-Beitrag], (2017)

Brendel, Jacqueline ; Fischlin, Marc :
Zero Round-Trip Time for the Extended Access Control Protocol.
ESORICS 2017 - 22nd European Symposium on Research in Computer Security
[Konferenz- oder Workshop-Beitrag], (2017)

Dewald, Florian ; Mantel, Heiko ; Weber, Alexandra :
AVR Processors as a Platform for Language-Based Security.
ESORICS - Proceedings of the 22nd European Symposium on Research in Computer Security Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Fereidooni, Hossein ; Classen, Jiska ; Spink, Tom ; Patras, Paul ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Hollick, Matthias ; Conti, Mauro :
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit.
Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)
[Konferenz- oder Workshop-Beitrag], (2017)

Fomichev, Mikhail ; Álvarez, Flor ; Steinmetzer, Daniel ; Gardner-Stephen, Paul ; Hollick, Matthias :
Survey and Systematization of Secure Device Pairing.
In: IEEE Communications Surveys & Tutorials, PP p. 1.
[Artikel], (2017)

Funke, Sebastian ; Wiesmaier, Alexander ; Daubert, Jörg :
Constrained PET Composition for Measuring Enforced Privacy.
ARES 2017
[Konferenz- oder Workshop-Beitrag], (2017)

Gerber, Nina ; Zimmermann, Verena
Burghardt, Manuel ; Wimmer, Raphael ; Wolff, Christian ; Womser-Hacker, Christa (eds.) :

Security vs. privacy? User preferences regarding text passwords and biometric authentication.
Mensch und Computer 2017 - Workshopband: Spielend einfach integrieren, 10.-13. September 2017, Regensburg Gesellschaft für Informatik
[Konferenz- oder Workshop-Beitrag], (2017)

Grube, Tim ; Thummerer, Markus ; Daubert, Jörg ; Mühlhäuser, Max :
Cover Traffic: A Trade of Anonymity and Efficiency.
to appear in: 13th International Workshop on Security and Trust Management in conjunction with the 22th European Symposium On Research in Computer Security (ESORICS 2017)
[Konferenz- oder Workshop-Beitrag], (2017)

Karuppayah, Shankar ; Böck, Leon ; Grube, Tim ; Manickam, Selvakumar ; Mühlhäuser, Max ; Fischer, Mathias :
SensorBuster: On Identifying Sensor Nodes in P2P Botnets.
International Conference on Availability, Reliability and Security (ARES)
[Konferenz- oder Workshop-Beitrag], (2017)

Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan :
Using Oblivious RAM in Genomic Studies.
DPM 2017 - Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2017 International Workshops Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Tkachenko, Oleksandr :
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
TU Darmstadt
[Masterarbeit], (2017)

Whitefield, Jorden ; Chen, Liqun ; Kargl, Frank ; Paverd, Andrew ; Schneider, Steve ; Treharne, Helen ; Wesemeyer, Stephan :
Formal Analysis of V2X Revocation Protocols.
Security and Trust Management _ 13th International Workshop, STM 2017, Proceedings
[Konferenz- oder Workshop-Beitrag], (2017)

Zimmermann, Verena ; Henhapl, Birgit ; Gerber, Nina ; Enzmann, Matthias
Burghardt, Manuel ; Wimmer, Raphael ; Wolff, Christian ; Womser-Hacker, Christa (eds.) :

Promoting secure Email communication and authentication.
Mensch und Computer 2017 - Workshopband: Spielend einfach integrieren, 10.-13. September 2017, Regensburg Gesellschaft für Informatik
[Konferenz- oder Workshop-Beitrag], (2017)

Cremer, Manuel :
Test Cases for Detecting the Lucky 13 Vulnerability with SPASCA.
TU Darmstadt
[Bachelorarbeit], (2017)

Alexopoulos, Nikolaos ; Daubert, Jörg ; Mühlhäuser, Max ; Habib, Sheikh Mahbub :
Beyond the Hype: On Using Blockchains in Trust Management for Authentication.
In: IEEE Trustcom IEEE
[Konferenz- oder Workshop-Beitrag], (2017)

Alexopoulos, Nikolaos ; Kiayias, Aggelos ; Talviste, Riivo ; Zacharias, Thomas :
MCMix: Anonymous Messaging via Secure Multiparty Computation.
26th USENIX Security Symposium
[Konferenz- oder Workshop-Beitrag], (2017)

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Frieß, Tamara ; Mühlhäuser, Max :
TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER).
USENIX Security Symposium Poster Session
[Anderes], (2017)

Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie :
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme.
12th International Conference on Availability, Reliability and Security - ARES 2017 ACM
[Konferenz- oder Workshop-Beitrag], (2017)

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
In: USENIX Security '17 .
[Konferenz- oder Workshop-Beitrag], (2017)

Brasser, Ferdinand ; Müller, Urs ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Capkun, Srdjan ; Sadeghi, Ahmad-Reza :
Software Grand Exposure: SGX Cache Attacks Are Practical.
In: WOOT .
[Konferenz- oder Workshop-Beitrag], (2017)

Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix ; Janson, Christian :
PRF-ODH: Relations, Instantiations, and Impossibility Results.
CRYPTO 2017 - 37th International Cryptology Conference Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Buchmann, Johannes ; Lauter, Kristin ; Mosca, Michele :
Postquantum Cryptography - State of the Art.
In: IEEE Security & Privacy, 15 pp. 12-13.
[Artikel], (2017)

Butin, Denis :
Hash-Based Signatures: State of Play.
In: IEEE Security & Privacy, 15 (4) pp. 37-43.
[Artikel], (2017)

Günther, Felix ; Mazaheri, Sogol :
A Formal Treatment of Multi-key Channels.
CRYPTO 2017 - 37th International Cryptology Conference Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Karvelas, Nikolaos ; Senftleben, Marius ; Katzenbeisser, Stefan :
Microblogging in a Privacy-Preserving way.
ARES 2017 - 12th International Conference on Availability, Reliability and Security ACM
[Konferenz- oder Workshop-Beitrag], (2017)

Kulyk, Oksana ; Reinheimer, Benjamin ; Gerber, Paul ; Volk, Florian ; Volkamer, Melanie ; Mühlhäuser, Max :
Advancing Trust Visualisations for Wider Applicability and User Acceptance.
16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) IEEE
[Konferenz- oder Workshop-Beitrag], (2017)

Mayer, Peter ; Kunz, Alexandra ; Volkamer, Melanie :
Reliable Behavioural Factors in the Information Security Context.
International Conference on Availability, Reliability and Security
[Konferenz- oder Workshop-Beitrag], (2017)

Mulholland, John ; Mosca, Michele ; Braun, Johannes :
The Day the Cryptography Dies.
In: IEEE Security & Privacy, 15 (4) pp. 14-21.
[Artikel], (2017)

Traverso, Giulia ; Cordero, Carlos Garcia ; Nojoumian, Mehrdad ; Azarderakhsh, Reza ; Demirel, Denise ; Habib, Sheikh Mahbub ; Buchmann, Johannes :
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems.
15th Annual Conference on Privacy, Security and Trust (PST)
[Konferenz- oder Workshop-Beitrag], (2017)

Büscher, Niklas ; Katzenbeisser, Stefan:
Compilation for Secure Multi-party Computation.
[Online-Edition: https://www.springer.com/de/book/9783319675213]
Springer Briefs in Computer Science ISBN 978-3-319-67521-3
[Buch], (2017)

Anagnostopoulos, Nikolaos Athanasios ; Schaller, André ; Fan, Yufan ; Xiong, Wenjie ; Tehranipoor, Fatemeh ; Arul, Tolga ; Gabmeyer, Sebastian ; Szefer, Jakub ; Chandy, John A. ; Katzenbeisser, Stefan :
Insights into the Potential Usage of the Initial Values of DRAM Arrays of Commercial Off-the-Shelf Devices for Security Applications.
26th Crypto-Day
[Konferenz- oder Workshop-Beitrag], (2017)

Bugge, Sebastian :
Solving Learning With Errors Instances Using Quantum Reductions.
TU Darmstadt
[Masterarbeit], (2017)

Buldas, Ahto ; Geihs, Matthias ; Buchmann, Johannes :
Long-Term Secure Commitments via Extractable-Binding Commitments.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Büscher, Niklas ; Boukoros, Spyros ; Bauregger, Stefan ; Katzenbeisser, Stefan :
Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering.
Proceedings on Privacy Enhancing Technologies De Gruyter
[Konferenz- oder Workshop-Beitrag], (2017)

Demmler, Daniel ; Holz, Marco ; Schneider, Thomas :
OnionPIR: Effective protection of sensitive metadata in online communication networks.
ACNS'17 - 15. International Conference on Applied Cryptography and Network Security Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Do, Lisa Nguyen Quang ; Ali, Karim ; Livshits, Benjamin ; Bodden, Eric ; Smith, Justin ; Murphy-Hill, Emerson :
Just-in-Time Static Analysis.
Proceedings of ISSTA ’17 ACM
[Konferenz- oder Workshop-Beitrag], (2017)

Erwig, Andreas ; Fischlin, Marc ; Hald, Martin ; Helm, Dominik ; Kiel, Robert ; Kübler, Florian ; Kümmerlin, Michael ; Laenge, Jakob ; Rohrbach, Felix :
Redactable Graph Hashing, Revisited.
ACISP 2017
[Konferenz- oder Workshop-Beitrag], (2017)

Fereidooni, Hossein ; Frassetto, Tommaso ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Conti, Mauro :
Fitness Trackers: Fit for Health but Unfit for Security and Privacy.
The Second IEEE International Workshop on Safe, Energy-Aware, & Reliable Connected Health (CHASE-SEARCH)
[Konferenz- oder Workshop-Beitrag], (2017)

Fuhry, Benny ; Bahmani, Raad ; Brasser, Ferdinand ; Hahn, Florian ; Kerschbaum, Florian ; Sadeghi, Ahmad-Reza :
HardIDX: Practical and Secure Index with SGX.
Conference on Data and Applications Security and Privacy (DBSec)
[Konferenz- oder Workshop-Beitrag], (2017)

Ghiglieri, Marco ; Volkamer, Melanie ; Renaud, Karen :
Exploring Consumers' Attitudes of Smart TV Related Privacy Risks.
In: Human Aspects of Information Security, Privacy and Trust / 5th International Conference, HAS 2017, Held as Part of HCI International 2017 , 10292 Springer, Cham
[Konferenz- oder Workshop-Beitrag], (2017)

Heuser, Stephan ; Reaves, Bradley ; Pendyala, Praveen Kumar ; Carter, Henry ; Dmitrienko, Alexandra ; Kiyavash, Negar ; Enck, William ; Sadeghi, Ahmad-Reza ; Traynor, Patrick :
Phonion: Practical Protection of Metadata in Telephony Networks.
Proceedings on Privacy Enhancing Technologies (PoPETs)
[Konferenz- oder Workshop-Beitrag], (2017)

Horsch, Moritz ; Braun, Johannes ; Metz, Dominique ; Buchmann, Johannes :
Update-tolerant and Revocable Password Backup.
ACISP 2017 - 22nd Australasian Conference on Information Security and Privacy
[Konferenz- oder Workshop-Beitrag], (2017)

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Zeitouni, Shaza :
SeED: Secure Non-Interactive Attestation for Embedded Devices.
10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017)
[Konferenz- oder Workshop-Beitrag], (2017)

Kiss, Ágnes ; Liu, Jian ; Schneider, Thomas ; Asokan, N. ; Pinkas, Benny :
Private Set Intersection for Unequal Set Sizes with Mobile Applications.
In: PoPETs - Proceedings on Privacy Enhancing Technologies
[Artikel], (2017)

Kohnhäuser, Florian ; Büscher, Niklas ; Gabmeyer, Sebastian ; Katzenbeisser, Stefan :
SCAPI: a scalable attestation protocol to detect software and physical attacks.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks ACM
[Konferenz- oder Workshop-Beitrag], (2017)

Kulyk, Oksana ; Reinheimer, Benjamin ; Volkamer, Melanie :
Sharing Information with Web Services -- A Mental Model Approach in the Context of Optional Information.
International Conference on Human-Computer Interaction (HCII) Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Langfeld, Benedikt :
Vorbereitende Arbeiten zum Feldtest eines Systems zum Quantenschlüsselaustausch.
TU Darmstadt
[Masterarbeit], (2017)

Mantel, Heiko ; Weber, Alexandra ; Köpf, Boris :
A Systematic Study of Cache Side Channels across AES Implementations.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Riazi, M. Sadegh ; Songhori, Ebrahim M. ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz :
Toward Practical Secure Stable Matching.
In: Proceedings on Privacy Enhancing Technologies (PoPETs)
[Artikel], (2017)

Schulz, Matthias ; Gringoli, Francesco ; Koch, Michael ; Steinmetzer, Daniel ; Hollick, Matthias :
Massive reactive smartphone-based jamming using arbitrary waveforms and adaptive power control.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017)
[Konferenz- oder Workshop-Beitrag], (2017)

Schulz, Matthias ; Hollick, Matthias ; Gringoli, Francesco ; Deligeorgopoulos, Efstathios :
DEMO: Demonstrating Reactive Smartphone-Based Jamming.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017) ACM
[Konferenz- oder Workshop-Beitrag], (2017)

Alkeilani Alkadri, Nabil ; Buchmann, Johannes ; El Bansarkhani, Rachid ; Krämer, Juliane :
A Framework to Select Parameters for Lattice-Based Cryptography.

[Anderes], (2017)

Alkim, Erdem ; Bindel, Nina ; Buchmann, Johannes ; Dagdelen, Özgür ; Eaton, Edward ; Gutoski, Gus ; Krämer, Juliane ; Pawlega, Filip :
Revisiting TESLA in the quantum random oracle model.
PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Asokan, N. ; Davi, Lucas ; Dessouky, Ghada ; Koeberl, Patrick ; Nyman, Thomas ; Paverd, Andrew ; Sadeghi, Ahmad-Reza ; Zeitouni, Shaza :
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware.
In: 54th Design Automation Conference (DAC'17).
[Konferenz- oder Workshop-Beitrag], (2017)

Billes, Marina ; Møller, Anders ; Pradel, Michael :
Systematic Black-Box Analysis of Collaborative Web Applications.
PLDI '17 ACM SIGPLAN Conference on Programming Language Design and Implementation ACM New York, NY, USA
[Konferenz- oder Workshop-Beitrag], (2017)

Bindel, Nina ; Herath, Udyani ; McKague, Matthew ; Stebila, Douglas :
Transitioning to a Quantum-Resistant Public Key Infrastructure.
PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Boukoros, Spyros ; Karvelas, Nikolaos ; Katzenbeisser, Stefan :
A lightweight protocol for privacy preserving division.
IWCMC 2017 - 13th International Wireless Communications and Mobile Computing Conference IEEE
[Konferenz- oder Workshop-Beitrag], (2017)

Funke, Sebastian
Daubert, Jörg (ed.) :

IoT Architektur zum Schutz von Privatsphäre Ende-zu-Ende.
Proceedings of the DACH Security 2017 DACH Security 2017
[Konferenz- oder Workshop-Beitrag], (2017)

Gagliardoni, Tommaso ; Karvelas, Nikolaos ; Katzenbeisser, S. :
ORAMs in a Quantum World.
PQCrypto 2017 - 8th International Workshop Post-Quantum Cryptography Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Göpfert, Florian ; van Vredendaal, Christine ; Wunderer, Thomas :
A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE.
PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography
[Konferenz- oder Workshop-Beitrag], (2017)

Klein, Amit ; Shulman, Haya ; Waidner, Michael :
Counting in the Dark: Caches Discovery and Enumeration in the Internet.
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
[Konferenz- oder Workshop-Beitrag], (2017)

Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie :
Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?
In: IEEE Security & Privacy, 15 (3) pp. 24-29.
[Artikel], (2017)

Miettinen, Markus ; Marchal, Samuel ; Hafeez, Ibbad ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Tarkoma, Sasu :
IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT.
Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017)
[Konferenz- oder Workshop-Beitrag], (2017)

Miettinen, Markus ; Marchal, Samuel ; Hafeez, Ibbad ; Frassetto, Tommaso ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Tarkoma, Sasu :
IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT.
Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017) IEEE
[Konferenz- oder Workshop-Beitrag], (2017)

Vasilomanolakis, Emmanouil ; Habib, Sheikh Mahbub ; Milaszewicz, Pavlos ; Malik, Rabee Sohail ; Mühlhäuser, Max
Steghöfer, Jan-Philipp ; Esfandiari, Babak (eds.) :

Towards Trust-Aware Collaborative Intrusion Detection: Challenges and Solutions.
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-319-59171-1_...]
In: 11th IFIP Trust Management Conference, 12/06/17-16/06/2017, Gothenbug, Sweden. Trust Management XI Springer International Publishing
[Konferenz- oder Workshop-Beitrag], (2017)

Bindel, Nina :
Ein deutsches digitales Signaturverfahren auf dem Weg zum internationalen kryptographischen Standard.
Digitale Gesellschaft zwischen Risikobereitschaft und Sicherheitsbedürfnis- Tagungsband zum 15. Deutschen IT-Sicherheitskongress SecuMedia Verlag
[Konferenz- oder Workshop-Beitrag], (2017)

Buchmann, Johannes ; Braun, Johannes ; Demirel, Denise ; Geihs, Matthias :
Quantum Cryptography: a view from classical cryptography.
In: Quantum Science and Technology, 2 (2)
[Artikel], (2017)

Do, Lisa Nguyen Quang ; Ali, Karim ; Livshits, Benjamin ; Bodden, Eric ; Smith, Justin ; Murphy-Hill, Emerson :
Cheetah: Just-in-Time Taint Analysis for Android Apps.
2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C) Curran Associates, Inc.
[Konferenz- oder Workshop-Beitrag], (2017)

Grosse-Puppendahl, Tobias ; Holz, Christian ; Cohn, Gabe A. ; Wimmer, Raphael ; Bechtold, Oskar ; Hodges, Steve ; Reynolds, Matthew S. ; Smith, Joshua R. :
Finding Common Ground: A Survey of Capacitive Sensing in Human-Computer Interaction.
CHI'17 CHI Conference on Human Factors in Computing Systems ACM
[Konferenz- oder Workshop-Beitrag], (2017)

Holzinger, Philipp ; Hermann, Ben ; Lerch, Johannes ; Bodden, Eric ; Mezini, Mira :
Hardening Java's Access Control by Abolishing Implicit Privilege Elevation.
2017 IEEE Symposium on Security and Privacy (SP 2017) Curran Associates, Inc
[Konferenz- oder Workshop-Beitrag], (2017)

Klein, Amit ; Shulman, Haya ; Waidner, Michael :
Internet-Wide Study of DNS Cache Injections.
IEEE International Conference on Computer Communications (INFOCOM)
[Konferenz- oder Workshop-Beitrag], (2017)

Neumann, Stephan ; Noll, Manuel ; Volkamer, Melanie :
Election-Dependent Security Evaluation of Internet Voting Schemes.
ICT Systems Security and Privacy Protection. SEC 2017. IFIP Advances in Information and Communication Technology Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Schmitz, Martin ; Steimle, Jürgen ; Huber, Jochen ; Dezfuli, Niloofar ; Mühlhäuser, Max :
Flexibles: Deformation-Aware 3D-Printed Tangibles for Capacitive Touchscreens.
[Online-Edition: https://doi.org/10.1145/3025453.3025663]
In: CHI '17 . ACM
[Konferenz- oder Workshop-Beitrag], (2017)

Alexopoulos, Nikolaos :
Student Research Abstract: On Enhancing Trust in Cryptographic Solutions.
Proceedings of the 32nd Annual ACM Symposium on Applied Computing ACM
[Konferenz- oder Workshop-Beitrag], (2017)

Braun, Johannes ; Buchmann, Johannes ; Demirel, Denise ; Fujiwara, Mikio ; Geihs, Matthias ; Moriai, Shiho ; Sasaki, Masahide ; Waseda, Atsushi :
SHORT PAPER: LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Buchmann, Johannes ; Demirel, Denise ; Schabhüser, Lucas ; Struck, Patrick :
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability.
In: LNCS (10194). Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Fischlin, Marc ; Günther, Felix :
Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates.
2nd IEEE European Symposium on Security and Privacy (EuroS&P 2017) IEEE
[Konferenz- oder Workshop-Beitrag], (2017)

Günther, Felix ; Hale, Britta ; Jager, Tibor ; Lauer, Sebastian :
0-RTT Key Exchange with Full Forward Secrecy.
Eurocrypt 2017 - 36th International Conference on the Theory and Applications of Cryptographic Techniques Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Holzer, Patrick :
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β.
TU Darmstadt
[Masterarbeit], (2017)

Kulyk, Oksana ; Neumann, Stephan ; Marky, Karola ; Volkamer, Melanie :
Enabling Vote Delegation in Boardroom Voting.
Workshop on Advances in Secure Electronic Voting Associated with Financial Crypto 2017 Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Marson, Giorgia Azzurra ; Poettering, Bertram :
Security Notions for Bidirectional Channels.
In: IACR Transactions on Symmetric Cryptology, 2017 (Volume 2017 Issue 1) pp. 405-426.
[Artikel], (2017)

Mayer, Peter ; Volkamer, Melanie :
Poster: Secure Storage of Masked Passwords.
IEEE European Symposium on Security and Privacy Posters
[Konferenz- oder Workshop-Beitrag], (2017)

Petzoldt, Albrecht ; Szepieniec, Alan ; Mohamed, Mohamed Saied Emam :
A Practical Multivariate Blind Signature Scheme.
Financial Cryptography and Data Security 2017
[Konferenz- oder Workshop-Beitrag], (2017)

Portela, Bernardo ; Barbosa, Manuel ; Scerri, Guillaume ; Warinschi, Bogdan ; Bahmani, Raad ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza :
Secure Multiparty Computation from SGX.
Financial Cryptography and Data Security
[Konferenz- oder Workshop-Beitrag], (2017)

Tamrakar, Sandeep ; Liu, Jian ; Paverd, Andrew ; Ekberg, Jan-Erik ; Pinkas, Benny ; Asokan, N. :
The Circle Game: Scalable Private Membership Test Using Trusted Hardware.
ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security
[Konferenz- oder Workshop-Beitrag], (2017)

Weinert, Christian ; Demirel, Denise ; Vigil, Martín ; Geihs, Matthias ; Buchmann, Johannes :
MoPS: A Modular Protection Scheme for Long-Term Storage.
ASIA CCS 2017 - ACM Asia Conference on Computer and Communications Security ACM
[Konferenz- oder Workshop-Beitrag], (2017)

Zimmermann, Verena ; Volkamer, Melanie ; Vogt, Joachim ; Henhapl, Birgit :
Ende-zu-Ende sichere E-Mail-Kommunikation.
In: >Datenschutz und Datensicherheit - DUD, 41 pp. 308-313.
[Artikel], (2017)

Dantas, Yuri Gil ; Hamann, Tobias ; Mantel, Heiko ; Schickel, Johannes :
An Experimental Study of a Bucketing Approach.
Quantitative Aspects of Programming Languages and Systems
[Konferenz- oder Workshop-Beitrag], (2017)

Grube, Tim ; Hauke, Sascha ; Daubert, Jörg ; Mühlhäuser, Max :
Ant Colonies for Efficient and Anonymous Group Communication Systems.
2017 International Conference on Networked Systems (NetSys) IEEE
[Konferenz- oder Workshop-Beitrag], (2017)

Günther, Daniel :
Valiant's Universal Circuit - Towards a Modular Construction and Implementation.
TU Darmstadt
[Bachelorarbeit], (2017)

Pascoal, Túlio A. ; Dantas, Yuri Gil ; Fonseca, Iguatemi E. ; Nigam, Vivek :
Slow TCAM Exhaustion DDoS Attack.
IFIP SEC 2017 - 32nd International Conference on ICT Systems Security and Privacy Protection Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Schurig, Sebastian :
Development of a user interface and implementation of specific software tools for the evaluation and realization of PUFs with respect to security applications.
TU Darmstadt
[Masterarbeit], (2017)

Shulman, Haya ; Waidner, Michael :
One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in Signed Domains.
The 14th USENIX Symposium on Networked SystemsDesign and Implementation (NSDI)
[Konferenz- oder Workshop-Beitrag], (2017)

Toteva, Iva :
Advancing Tool Support for the Detection of Side-Channel.
TU Darmstadt
[Masterarbeit], (2017)

Asharov, Gilad ; Demmler, Daniel ; Schapira, Michael ; Schneider, Thomas ; Segev, Gil ; Shenker, Scott ; Zohner, Michael :
Privacy-Preserving Interdomain Routing at Internet Scale.
In: PoPETs - Proceedings on Privacy Enhancing Technologies
[Artikel], (2017)

Cohen, Avichai ; Gilad, Yossi ; Herzberg, Amir ; Schapira, Michael ; Shulman, Haya :
Are We There Yet? On RPKIs Deployment and Security.
Network and Distributed Systems Security (NDSS)
[Konferenz- oder Workshop-Beitrag], (2017)

Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
24th Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag], (2017)

Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael :
Pushing the communication barrier in secure computation using lookup tables.
24. Annual Network and Distributed System Security Symposium (NDSS'17) The Internet society
[Konferenz- oder Workshop-Beitrag], (2017)

Garcia, Luis ; Brasser, Ferdinand ; Cintuglu, Mehmet H. ; Sadeghi, Ahmad-Reza ; Mohammed, Osama ; Zonouz, Saman A. :
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
24th Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag], (2017)

Nielsen, Jesper Buus ; Schneider, Thomas ; Trifiletti, Roberto :
Constant round maliciously secure 2PC with function-independent preprocessing using LEGO.
24. Annual Network and Distributed System Security Symposium (NDSS'17) The Internet Society
[Konferenz- oder Workshop-Beitrag], (2017)

Rudd, Robert ; Skowyra, Richard ; Bigelow, David ; Dedhia, Veer ; Hobson, Thomas ; Crane, Stephen ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Franz, Michael ; Sadeghi, Ahmad-Reza ; Okhravi, Hamed :
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
24th Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag], (2017)

Schaller, André ; Xiong, Wenjie ; Anagnostopoulos, Nikolaos Athanasios ; Saleem, Umair ; Gabmeyer, Sebastian ; Katzenbeisser, Stefan ; Szefer, Jakub :
Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security.
2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) Institute of Electrical and Electronics Engineers (IEEE)
[Konferenz- oder Workshop-Beitrag], (2017)

Schmidt, Markus :
Estimation of the Hardness of the Learning with Errors Problem with a Given Number of Samples.
TU Darmstadt
[Masterarbeit], (2017)

Trautmann, Nils ; Sonnleitner, Matthias ; Barnett, Stephen :
Will a Decaying Atom Feel a Friction Force?
In: Physical Review Letters
[Artikel], (2017)

Ulmer, Alex ; Kohlhammer, Jörn ; Shulman, Haya :
Towards Enhancing the Visual Analysis of Interdomain Routing.
VISIGRAPP 2017 : 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications
[Konferenz- oder Workshop-Beitrag], (2017)

Volkamer, Melanie ; Renaud, Karen ; Reinheimer, Benjamin ; Kunz, Alexandra :
User experiences of TORPEDO: TOoltip-powered phishing email DetectiOn.
In: >Computers & Security, 71 pp. 100-113.
[Artikel], (2017)

Ankele, Robin ; Kucuk, Kubilay A. ; Martin, Andrew ; Simpson, Andrew ; Paverd, Andrew :
Applying the Trustworthy Remote Entity to Privacy-Preserving Multiparty Computation: Requirements and Criteria for Large-Scale Applications.
13th IEEE International Conference on Advanced and Trusted Computing
[Konferenz- oder Workshop-Beitrag], (2017)

Dietsch, Sascha Thorsten :
Integration des gitterbasierten LARA-Verschlüsselungsverfahrens in JCA.
TU Darmstadt
[Masterarbeit], (2017)

Grube, Tim ; Hauke, Sascha ; Daubert, Jörg ; Mühlhäuser, Max :
Ant Colony Optimisation - A Solution to Efficient Anonymous Group Communication?
(to appear) Proceedings of the 14th Annual IEEE Consumer Communications & Networking Conference (CCNC) IEEE
[Konferenz- oder Workshop-Beitrag], (2017)

Kohnhäuser, Florian ; Büscher, Niklas ; Gabmeyer, Sebastian ; Katzenbeisser, Stefan :
Scalable Attestation Resilient to Physical Attacks for Embedded Devices in Mesh Networks.
In: arXiv
[Artikel], (2017)

Rehfeld, Silke ; Volkamer, Melanie ; Neumann, Stephan :
Sicherheit in der Kommunikation: kostenloses Maßnahmen-Angebot für KMU gegen Internetbetrug.
In: >Mittelstand 4.0 - Agentur Kommunikation
[Artikel], (2017)

Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra :
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
In: Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS).
[Konferenz- oder Workshop-Beitrag], (2017)

Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra :
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
In: Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS).
[Konferenz- oder Workshop-Beitrag], (2017)

Dewald, Florian ; Mantel, Heiko ; Weber, Alexandra :
AVR Processors as a Platform for Language-Based Security.
In: Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS).
[Konferenz- oder Workshop-Beitrag], (2017)

Dewald, Florian ; Mantel, Heiko ; Weber, Alexandra :
AVR Processors as a Platform for Language-Based Security.
In: Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS).
[Konferenz- oder Workshop-Beitrag], (2017)

Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Mazaheri, Sogol :
Relationship-Based Access Control for Resharing in Decentralized Online Social Networks.
In: Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS).
[Konferenz- oder Workshop-Beitrag], (2017)

Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Mazaheri, Sogol :
Relationship-Based Access Control for Resharing in Decentralized Online Social Networks.
In: Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS).
[Konferenz- oder Workshop-Beitrag], (2017)

Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Schickel, Johannes :
Towards Accelerated Usage Control based on Access Correlations.
In: Proceedings of the 22nd Nordic Conference on Secure IT Systems (NordSec).
[Konferenz- oder Workshop-Beitrag], (2017)

Gerber, Paul ; Volkamer, Melanie ; Gerber, Nina :
Das Privacy-Paradoxon - Ein Erklärungsversuch und Handlungsempfehlungen.
Dialogmarketing Perspektiven 2016/2017: Tagungsband 11. wissenschaftlicher interdisziplinärer Kongress für Dialogmarketing Springer Fachmedien Wiesbaden
[Konferenz- oder Workshop-Beitrag], (2017)

Lemos, Marcilio O. O. ; Dantas, Yuri Gil ; Fonseca, Iguatemi E. ; Nigam, Vivek :
On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks.
In: Journal of Logical and Algebraic Methods in Programming
[Artikel], (2017)

Li, Ximeng ; Mantel, Heiko ; Tasch, Markus :
Taming Message-passing Communication in Compositional Reasoning about Confidentiality.
In: Proceedings of the 15th Asian Symposium on Programming Languages and Systems (APLAS).
[Konferenz- oder Workshop-Beitrag], (2017)

Li, Ximeng ; Mantel, Heiko ; Tasch, Markus :
Taming Message-passing Communication in Compositional Reasoning about Confidentiality.
In: Proceedings of the 15th Asian Symposium on Programming Languages and Systems (APLAS).
[Konferenz- oder Workshop-Beitrag], (2017)

Mantel, Heiko ; Weber, Alexandra ; Köpf, Boris :
A Systematic Study of Cache Side Channels across AES Implementations.
In: Proceedings of the 9th International Symposium on Engineering Secure Software and Systems (ESSoS).
[Konferenz- oder Workshop-Beitrag], (2017)

Mantel, Heiko ; Weber, Alexandra ; Köpf, Boris :
A Systematic Study of Cache Side Channels across AES Implementations.
In: Proceedings of the 9th International Symposium on Engineering Secure Software and Systems (ESSoS).
[Konferenz- oder Workshop-Beitrag], (2017)

Mayer, Peter ; Gerber, Nina ; McDermott, Ronja ; Volkamer, Melanie ; Vogt, Joachim :
Productivity vs. Security: Mitigating Conflicting Goals in Organizations.
In: Information and Computer Security, 25 (2) pp. 137-151.
[Artikel], (2017)

Pascoal, Tulio A. ; Dantas, Yuri Gil ; Fonseca, Iguatemi E. ; Nigam, Vivek :
Slow TCAM Exhaustion DDoS Attack.
In: Proceedings of the 32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC).
[Konferenz- oder Workshop-Beitrag], (2017)

Schulz, Steffen ; Schaller, André ; Kohnhäuser, Florian ; Katzenbeisser, Stefan :
Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors.
In: LNCS (10493). Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Tundis, Andrea ; Cordero, Carlos Garcia ; Egert, Rolf ; Garro, Alfredo ; Mühlhäuser, Max :
Increasing the Resilience of Cyber Physical Systems in Smart Grid Environments using Dynamic Cells.
ICCPS 2017: 19th International Conference on Cyber-Physical Systems WASET
[Konferenz- oder Workshop-Beitrag], (2017)

Vasilomanolakis, Emmanouil ; Habib, Sheikh Mahbub ; Milaszewicz, Pavlos ; Malik, Rabee Sohail ; Mühlhäuser, Max :
Towards Trust-Aware Collaborative Intrusion Detection: Challenges and Solutions.
[Online-Edition: https://doi.org/10.1007/978-3-319-59171-1_8]
In: Trust Management XI. Springer , pp. 94-109. ISBN 978-3-319-59171-1 ISSN 1868-4238
[Buchkapitel], (2017)

2016

Brendel, Jacqueline ; Demirel, Denise :
Efficient Proactive Secret Sharing.
2016 Privacy, Security and Trust Conference IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Cordero, Carlos Garcia ; Hauke, Sascha ; Mühlhäuser, Max ; Fischer, Mathias :
Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks.
In: Privacy, Security and Trust Conference IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Geihs, Matthias ; Demirel, Denise ; Buchmann, Johannes :
A security analysis of techniques for long-term integrity protection.
2016 Privacy, Security and Trust Conference
[Konferenz- oder Workshop-Beitrag], (2016)

Gerber, Paul ; Renaud, Karen ; Volkamer, Melanie :
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions.
In: >Journal of Information Security and Applications, 34 (1) pp. 8-26.
[Artikel], (2016)

Mayer, Peter ; Berket, Hermann ; Volkamer, Melanie :
Enabling Automatic Password Change in Password Managers Through Crowdsourcing.
International Conference on Passwords Springer LNCS
[Konferenz- oder Workshop-Beitrag], (2016)

Sang, Bo ; Petri, Gustavo ; Ardekani, Masoud Saeida ; Ravi, Srivatsan ; Eugster, Patrick :
Programming Scalable Cloud Services with AEON.
Middleware '16 Proceedings of the 17th International Middleware Conference ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Traverso, Giulia ; Demirel, Denise ; Habib, Sheikh Mahbub ; Buchmann, Johannes :
AS³: Adaptive Social Secret Sharing for Distributed Storage Systems.
2016 Privacy, Security and Trust Conference IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Wunderer, Thomas :
Revisiting the Hybrid Attack: Improved Analysis and Refined Security Estimates.

[Anderes], (2016)

Schroth, Nils :
Demonstrator for Privacy-Preserving Face Recognition.
TU Darmstadt
[Bachelorarbeit], (2016)

Buescher, Niklas ; Kretzmer, David ; Jindal, Arnav ; Katzenbeisser, Stefan :
Scalable Secure Computation from ANSI-C.
WIFS - IEEE International Workshop on Information Forensics and Security IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Dai, Tianxiang ; Shulman, Haya ; Waidner, Michael :
DNSSEC Misconfigurations in Popular Domains.
In: vol 10052 . Springer, Cham
[Konferenz- oder Workshop-Beitrag], (2016)

El Bansarkhani, Rachid ; Sturm, Jan :
An Efficient Lattice-based Multisignature Scheme with Applications to Bitcoins.
15th International Conference on Cryptology and Network Security - CANS 2016
[Konferenz- oder Workshop-Beitrag], (2016)

Kogan, Kirill ; Nikolenko, Sergey I. ; Eugster, Patrick ; Shalimov, Alexander ; Rottenstreich, Ori :
FIB efficiency in distributed platforms.
2016 IEEE 24th International Conference on Network Protocols (ICNP) IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Lato, Ellen :
Fault Attacks on Lattice-Based Encryption Schemes.
TU Darmstadt
[Masterarbeit], (2016)

Nobach, Leonhard ; Rimac, I. ; Hilt, V. ; Hausheer, David :
SliM: Enabling Efficient, Seamless NFV State Migration (Poster Paper).
2016 IEEE 24th International Conference on Network Protocols (ICNP) IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Jin, Yier :
Towards a Policy-Agnostic Control-Flow Integrity Implementation.
Black Hat Europe
[Konferenz- oder Workshop-Beitrag], (2016)

Wang, Lin ; Jiao, Lei ; Kliazovich, Dzmitry ; Bouvry, Pascal :
Reconciling Task Assignment and Scheduling in Mobile Edge Clouds.
2016 IEEE 24th International Conference on Network Protocols (ICNP) IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Wang, Weihang ; Zheng, Yunhui ; Xing, Xinyu ; Kwon, Yonghwi ; Zhang, Xiangyu ; Eugster, Patrick :
WebRanz: web page randomization for better advertisement delivery and web-bot prevention.
FSE 2016 Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Ekberg, Jan-Erik ; Nyman, Thomas ; Paverd, Andrew ; Sadeghi, Ahmad-Reza ; Tsudik, Gene :
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
23rd ACM Conference on Computer and Communications Security (CCS)
[Konferenz- oder Workshop-Beitrag], (2016)

Baumann, Peter ; Katzenbeisser, Stefan ; Stopczynski, Martin ; Tews, Erik :
Disguised Chromium Browser: Robust browser, Flash and Canvas Fingerprinting Protection.
WPES '16 Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Bieber, Julian :
Generalizing Semi-Private Function Evaluation.
TU Darmstadt
[Bachelorarbeit], (2016)

Classen, Jiska ; Steinmetzer, Daniel ; Hollick, Matthias :
Opportunities and Pitfalls in Securing Visible Light Communication on the Physical Layer.
In: 3rd ACM Workshop on Visible Light Communication Systems
[Artikel], (2016)

Deshotels, Luke ; Deaconescu, Razvan ; Chiroiu, Mihai ; Davi, Lucas ; Enck, William ; Sadeghi, Ahmad-Reza :
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
23rd ACM Conference on Computer and Communications Security (CCS)
[Konferenz- oder Workshop-Beitrag], (2016)

Fojtik, Roman :
Salt Synchronization Service.
TU Darmstadt
[Masterarbeit], (2016)

Hauck, Markus ; Savvides, Savvas ; Eugster, Patrick ; Mezini, Mira ; Salvaneschi, Guido :
SecureScala: Scala embedding of secure computations.
Proceedings of the 2016 7th ACM SIGPLAN Symposium on Scala ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Herzberg, Amir ; Shulman, Haya ; Waidner, Michael :
Stratum Filtering: Cloud-Based Detection of Attack Sources.
ACM Cloud Computing Security Workshop (CCSW)
[Konferenz- oder Workshop-Beitrag], (2016)

Holz, Marco :
Protecting Metadata with PIR and Tor.
TU Darmstadt
[Bachelorarbeit], (2016)

Jawed, Kashif :
An Investigation and Implementation for the Effect of Row Hammering in Static Random Access Memory (SRAM) and Dynamic Random Access Memory (DRAM).
TU Darmstadt
[Masterarbeit], (2016)

Mayer, Peter ; Neumann, Stephan ; Volkamer, Melanie :
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes.
In: CCS '16 . ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Neumann, Stephan ; Volkamer, Melanie :
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Pfeiffer, Martin ; Kwiotek, Jan-Pascal ; Classen, Jiska ; Klose, Robin ; Hollick, Matthias :
Analyzing TETRA Location Privacy and Network Availability.
In: SPSM '16 . ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Renaud, Karen ; Flowerday, Stephen ; English, Rosanne ; Volkamer, Melanie :
Why don’t UK citizens protest against privacy-invading dragnet surveillance?
In: >Information and Computer Security, 24 (4) pp. 400-415.
[Artikel], (2016)

Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Ibrahim, Ahmad ; Conti, Mauro ; Neven, Gregory :
SANA: Secure and Scalable Aggregate Network Attestation.
23rd ACM Conference on Computer and Communications Security (CCS) 2016 CCS 2016
[Konferenz- oder Workshop-Beitrag], (2016)

Schabhüser, Lucas ; Demirel, Denise ; Buchmann, Johannes :
An Unconditionally Hiding Auditing Procedure for Computations over Distributed Data.
The 2nd IEEE Workshop on Security and Privacy in the Cloud (SPC 2016)
[Konferenz- oder Workshop-Beitrag], (2016)

Vasilomanolakis, Emmanouil ; Stahn, Michael ; Cordero, Carlos Garcia ; Mühlhäuser, Max :
On Probe-Response Attacks in Collaborative Intrusion Detection Systems.
IEEE Conference on Communications and Network Security IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Ali, Azmzt ; Othmane, Lotfi Ben :
Towards effective security assurance for incremental software development - the case of zen cart application,.
Proc. of the 11th International Conference on Availabil- ity, Reliability and Security (ARES)
[Konferenz- oder Workshop-Beitrag], (2016)

Appel, Michael ; Bossert, Andreas ; Cooper, Steven ; Kußmaul, Tobias ; Löffler, Johannes ; Pauer, Christof ; Wiesmaier, Alexander :
Block ciphers for the IoT – SIMON, SPECK, KATAN, LED, TEA, PRESENT, and SEA compared.

[Report], (2016)

Appel, Michael ; Pauer, Christof ; Wiesmaier, Alexander :
Security aspects and comparison of block ciphers LED and TEA.

[Report], (2016)

Bossert, Andreas ; Cooper, Steven ; Wiesmaier, Alexander :
A comparison of block ciphers SIMON, SPECK, and KATAN.

[Report], (2016)

Buescher, Niklas ; Holzer, Andreas ; Weber, Alina ; Katzenbeisser, Stefan :
Compiling Low Depth Circuits for Practical Secure Computation.
21st European Symposium on Research in Computer Security (ESORICS 2016) Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Butin, Denis ; Demirel, Denise ; Buchmann, Johannes :
Formal Policy-based Provenance Audit.
The 11th International Workshop on Security - IWSEC 2016
[Konferenz- oder Workshop-Beitrag], (2016)

Demirel, Denise ; Krenn, Stephan ; Loruenser, Thomas ; Traverso, Giulia :
Efficient Third Party Auditing for a Distributed Storage System.
International Conference on Availability, Reliability and Security - ARES 2016 IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Diedrich, Lennart ; Jattke, Patrick ; Murati, Lulzim ; Senker, Matthias ; Wiesmaier, Alexander :
Comparison of Lightweight Stream Ciphers: MICKEY 2.0, WG-8, Grain and Trivium.

[Report], (2016)

Dowling, Benjamin ; Günther, Felix ; Herath, Udyani ; Stebila, Douglas :
Secure Logging Schemes and Certificate Transparency.
21st European Symposium on Research in Computer Security (ESORICS 2016) Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Ghiglieri, Marco ; Stopczynski, Martin :
SecLab: An Innovative Approach to Learn and Understand Current Security and Privacy Issues.
ACM SIGITE
[Konferenz- oder Workshop-Beitrag], (2016)

Jattke, Patrick ; Senker, Matthias ; Wiesmaier, Alexander :
Comparison of two Lightweight Stream Ciphers: MICKEY 2.0 & WG-8.

[Report], (2016)

Kohnhäuser, Florian ; Katzenbeisser, Stefan :
Secure Code Updates for Mesh Networked Commodity Low-End Embedded Devices.
21st European Symposium on Research in Computer Security (ESORICS 2016) Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Kulyk, Oksana ; Marky, Karola ; Neumann, Stephan ; Volkamer, Melanie :
Introducing Proxy Voting to Helios.
11th International Conference on Availability, Reliability and Security - ARES 2016 IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Lieb, Patrick ; Schmidt, Markus ; Wiesmaier, Alexander :
ECDSA and QUARTZ in Comparison with RSA.

[Report], (2016)

Mohamed, Mohamed Saied Emam ; El Bansarkhani, Rachid ; Petzoldt, Albrecht :
MQSAS - A Multivariate Sequential Aggregate Signature Scheme.
ISC 2016 - The 19th Information Security Conference Springer LNCS
[Konferenz- oder Workshop-Beitrag], (2016)

Reinheimer, Benjamin ; Braun, Kristoffer ; Volkamer, Melanie :
Entwicklung eines Interfaces zur privacy-friendly Cookie-Einstellung.
MuC-Workshop „Usable Security and Privacy“ Gesellschaft für Informatik e.V.
[Konferenz- oder Workshop-Beitrag], (2016)

Roepke, Rene ; Thraem, Timo ; Wagener, Johannes ; Wiesmaier, Alexander :
A Survey on Protocols securing the Internet of Things: DTLS, IPSec and IEEE 802.11i.

[Report], (2016)

Trautmann, Nils ; Alber, Gernot ; Leuchs, Gerd :
Efficient single-photon absorption by a trapped moving atom.
In: Physical Review A p. 8.
[Artikel], (2016)

Volkamer, Melanie ; Renaud, Karen ; Gerber, Paul :
Spot the phish by checking the pruned URL.
In: Information and Computer Security, 24 (4) pp. 372-385.
[Artikel], (2016)

Anagnostopoulos, Nikolaos Athanasios ; Katzenbeisser, Stefan ; Rosenstihl, Markus ; Schaller, André ; Gabmeyer, Sebastian ; Arul, Tolga :
Low-temperature data remanence attacks against intrinsic SRAM PUFs.

[Report], (2016)

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael :
More Efficient Oblivious Transfer Extensions.
In: Journal of Cryptology
[Artikel], (2016)

Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane :
Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks.
FDTC 2016 - Fault Diagnosis and Tolerance in Cryptography IEEE Conference Publication
[Konferenz- oder Workshop-Beitrag], (2016)

Braun, Johannes ; Buchmann, Johannes ; Demirel, Denise ; Fujiwara, Mikio ; Geihs, Matthias ; Moriai, Shiho ; Sasaki, Masahide ; Waseda, Atsushi :
LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper).

[Anderes], (2016)

Demirel, Denise ; Traverso, Giulia ; Krenn, Stephan ; Loruenser, Thomas :
Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage System.
2016 11th International Conference on Availability, Reliability and Security (ARES) IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

El Bansarkhani, Rachid ; El Kaafarani, Ali :
Post-Quantum Attribute-Based Signatures from Lattice Assumptions.

[Anderes], (2016)

Fischlin, Marc ; Herzberg, Amir ; Noon, Hon Bin ; Shulman, Haya :
Obfuscation Combiners.
International Cryptology Conference (CRYPTO)
[Konferenz- oder Workshop-Beitrag], (2016)

Frömmgen, Alexander ; Stohr, Denny ; Fornoff, Jan ; Effelsberg, Wolfgang ; Buchmann, Alejandro :
Capture and Replay: Reproducible Network Experiments in Mininet.
SIGCOMM '16 Proceedings of the 2016 ACM SIGCOMM Conference ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Klir, Thomas :
Design and Implementation of an Archiving System Providing Long-Term Integrity and Long-Term Confidentiality.
TU Darmstadt
[Masterarbeit], (2016)

McGrew, David ; Kampanakis, Panos ; Fluhrer, Scott ; Gazdag, Stefan-Lukas ; Butin, Denis ; Buchmann, Johannes :
State Management for Hash-Based Signatures.
3rd International Conference on Research in Security Standardisation (SSR 2016) Springer LNCS
[Konferenz- oder Workshop-Beitrag], (2016)

Schaller, André ; Xiong, Wenjie ; Gabmeyer, Sebastian ; Anagnostopoulos, Nikolaos Athanasios ; Saleem, Umair ; Katzenbeisser, Stefan ; Szefer, Jakub
Gierlichs, Benedikt ; Poschmann, Axel (eds.) :

Run-time Accessible DRAM PUFs in Commodity Devices.
In: Lecture Notes in Computer Science (LNCS) , 9813 . Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Traverso, Giulia ; Demirel, Denise ; Buchmann, Johannes :
Dynamic and Verifiable Hierarchical Secret Sharing.
9th International Conference on Information Theoretic Security - ICITS 2016 Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Weinert, Christian :
Building a Modular Long-Term Archiving System.
TU Darmstadt
[Masterarbeit], (2016)

Habib, Sheikh Mahbub ; Vassileva, Julita ; Mauw, Sjouke ; Mühlhäuser, Max (eds.) :
Trust Management X - 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016 Proceedings.
Habib, Sheikh Mahbub ; Vassileva, Julita ; Mauw, Sjouke ; Mühlhäuser, Max (eds.), Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Neven, Gregory ; Sadeghi, Ahmad-Reza ; Schunter, Matthias :
POSTER: Toward a Secure and Scalable Attestation.
ACM WiSEC 2016
[Konferenz- oder Workshop-Beitrag], (2016)

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas :
Towards Securing Internet eXchange Points Against Curious onlooKers (Short Paper).
ACM, IRTF & ISOC Applied Networking Research Workshops (ANRW'16) ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Conti, Mauro ; Crane, Stephen ; Frassetto, Tommaso ; Homescu, Andrei ; Koppen, Georg ; Larsen, Per ; Liebchen, Christopher ; Perry, Mike ; Sadeghi, Ahmad-Reza :
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
The annual Privacy Enhancing Technologies Symposium (PETS)
[Konferenz- oder Workshop-Beitrag], (2016)

Ermuth, Markus ; Pradel, Michael :
Monkey see, monkey do: effective generation of GUI tests with inferred macro events.
ISSTA 2016 Proceedings of the 25th International Symposium on Software Testing and Analysis ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Feldmann, Anja ; Heyder, Philipp ; Kreutzer, Michael ; Schmid, Stefan ; Seifert, Jean-Pierre ; Shulman, Haya ; Thimmaraju, Kashyap ; Waidner, Michael ; Sieberg, Jens :
NetCo: Reliable Routing with Unreliable Routers.
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) Workshops
[Konferenz- oder Workshop-Beitrag], (2016)

Gagliardoni, Tommaso ; Hülsing, Andreas ; Schaffner, Christian :
Semantic Security and Indistinguishability in the Quantum World.
In: LNCS (9816). Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Gerber, Nina ; McDermott, Ronja ; Volkamer, Melanie ; Vogt, Joachim :
Understanding information security compliance - Why goal setting and rewards might be a bad idea.
International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016) University of Plymouth
[Konferenz- oder Workshop-Beitrag], (2016)

Gutmann, Andreas ; Volkamer, Melanie ; Renaud, Karen :
Memorable And Secure: How Do You Choose Your PIN?
International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016) University of Plymouth
[Konferenz- oder Workshop-Beitrag], (2016)

Horsch, Moritz ; Schlipf, Mario ; Braun, Johannes ; Buchmann, Johannes :
Password Requirements Markup Language.
ACISP 2016 - 21st Australasian Conference on Information Security and Privacy
[Konferenz- oder Workshop-Beitrag], (2016)

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene ; Zeitouni, Shaza :
DARPA: Device Attestation Resilient to Physical Attacks.
ACM WiSEC 2016
[Konferenz- oder Workshop-Beitrag], (2016)

Kunz, Alexandra ; Volkamer, Melanie ; Stockhardt, Simon ; Palberg, Sven ; Lottermann, Tessa ; Piegert, Eric :
NoPhish: Evaluation of a web application that teaches people being aware of phishing attacks.
Jahrestagung der Gesellschaft für Informatik Lecture Notes in Informatics (LNI)
[Konferenz- oder Workshop-Beitrag], (2016)

Mayer, Peter ; Neumann, Stephan ; Storck, Daniel ; Volkamer, Melanie :
Supporting Decision Makers in Choosing Suitable Authentication Schemes.
International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016) University of Plymouth
[Konferenz- oder Workshop-Beitrag], (2016)

Sadeghi, Ahmad-Reza ; Dessouky, Ghada :
POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs.
ACM WiSec 2016
[Konferenz- oder Workshop-Beitrag], (2016)

Schultes, Tobias ; Grau, Markus ; Steinmetzer, Daniel ; Hollick, Matthias :
Far Away and Yet Nearby - A Framework for Practical Distance Fraud on Proximity Services for Mobile Devices (Demo).
ACM Conference on Security and Privacy in Wireless and Mobile Networks 2016 (ACM WiSec'16)
[Konferenz- oder Workshop-Beitrag], (2016)

Schulz, Matthias ; Klapper, Patrick ; Hollick, Matthias ; Tews, Erik :
Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec 2016) ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Schulz, Matthias ; Loch, Adrian ; Hollick, Matthias :
DEMO: Demonstrating Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec 2016) ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Schulz, Matthias ; Wegemer, Daniel ; Hollick, Matthias :
DEMO: Using NexMon, the C-based WiFi firmware modification framework.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec 2016) ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Späth, Johannes ; Do, Lisa Nguyen Quang ; Ali, Karim ; Bodden, Eric :
Boomerang: Demand-Driven Flow-Sensitive, Field-Sensitive, and Context-Sensitive Pointer Analysis.
30th European Conference on Object-Oriented Programming (ECOOP 2016) Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik
[Konferenz- oder Workshop-Beitrag], (2016)

Späth, Johannes ; Nguyen, Lisa ; Ali, Karim ; Bodden, Eric :
Boomerang: Demand-Driven Flow-Sensitive, Field-Sensitive, and Context-Sensitive Pointer Analysis.
European Conference on Object-Oriented Programming Dagstuhl
[Konferenz- oder Workshop-Beitrag], (2016)

Wang, Weihang ; Zheng, Yunhui ; Liu, Peng ; Xu, Lei ; Zhang, Xiangyu ; Eugster, Patrick :
ARROW: automated repair of races on client-side web pages.
ISSTA 2016 Proceedings of the 25th International Symposium on Software Testing and Analysis ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Yu, Tingting ; Pradel, Michael :
SyncProf: detecting, localizing, and optimizing synchronization bottlenecks.
ISSTA 2016 Proceedings of the 25th International Symposium on Software Testing and Analysis ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Zheng, Yao ; Schulz, Matthias ; Lou, Wenjing ; Hou, Thomas ; Hollick, Matthias :
Profiling the Strength of Physical-Layer Security: A Study in Orthogonal Blinding.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec 2016) ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Koushanfar, Farinaz ; Praverd, Andrew ; Tsudik, Gene ; Sadeghi, Ahmad-Reza :
Things, Trouble, Trust: On Building Trust in IoT Systems.
53rd Design Automation Conference (DAC)
[Konferenz- oder Workshop-Beitrag], (2016)

Borgwart, Andreas ; Shulman, Haya ; Waidner, Michael :
Towards Automated Measurements of Internets Naming Infrastructure.
International Conference on Software Science, Technology and Engineering (SWSTE)
[Konferenz- oder Workshop-Beitrag], (2016)

Brasser, Ferdinand ; Ganapathy, Vinod ; Iftode, Liviu ; Kim, Daeyoung ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
Regulating ARM TrustZone Devices in Restricted Spaces.
14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys)
[Konferenz- oder Workshop-Beitrag], (2016)

Dix, Isabella :
Implementation of a Reputation System for CA Trust Management.
TU Darmstadt
[Masterarbeit], (2016)

Herzberg, Amir ; Shulman, Haya ; Waidner, Michael :
Survey of Software Protection with Minimal Hardware.
International Conference on Software Science, Technology and Engineering (SWSTE)
[Konferenz- oder Workshop-Beitrag], (2016)

Kulyk, Oksana ; Neumann, Stephan ; Marky, Karola ; Budurushi, Jurlind ; Volkamer, Melanie :
Coercion-resistant Proxy Voting.
31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016 Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Lettner, Julian ; Kollenda, Benjamin ; Homescu, Andrei ; Larsen, Per ; Schuster, Felix ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Franz, Michael :
Subversive-C: Abusing and Protecting Dynamic Message Dispatch.
USENIX Annual Technical Conference (ATC)
[Konferenz- oder Workshop-Beitrag], (2016)

Mariano, Artur ; Correia, Fabio ; Bischof, Christian :
A vectorized, cache efficient LLL implementation.
VECPAR 2016 - 12th International Meeting on High Performance Computing for Computational Science
[Konferenz- oder Workshop-Beitrag], (2016)

Neumann, Stephan ; Volkamer, Melanie ; Budurushi, Jurlind ; Prandini, Marco :
SecIVo: a quantitative security evaluation framework for internet voting schemes.
In: >Annals of Telecommunications pp. 1-16.
[Artikel], (2016)

Roth, Johannes :
Analyse von TLS Bibliotheken basierend auf Fuzz Testing.
TU Darmstadt
[Masterarbeit], (2016)

Schabhüser, Lucas ; Demirel, Denise ; Buchmann, Johannes :
An Unconditionally Hiding Auditing Procedure for Multi-Party Computations.
In: IACR - Cryptology ePrint Archive, 2016
[Artikel], (2016)

Songhori, Ebrahim ; Zeitouni, Shaza ; Dessouky, Ghada ; Schneider, Thomas ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz :
GarbledCPU: A MIPS Processor for Secure Computation in Hardware.
53rd Design Automation Conference (DAC'16)
[Konferenz- oder Workshop-Beitrag], (2016)

Stockhardt, Simon ; Reinheimer, Benjamin ; Volkamer, Melanie ; Mayer, Peter ; Kunz, Alexandra ; Rack, Philipp ; Lehmann, Daniel :
Teaching Phishing-Security: Which Way is Best?
31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC) Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Jin, Yier :
Strategy Without Tactics: Policy-Agnostic Hardware-Enhanced Control-Flow Integrity.
53rd Design Automation Conference (DAC)
[Konferenz- oder Workshop-Beitrag], (2016)

Traverso, Giulia ; Demirel, Denise ; Buchmann, Johannes:
Homomorphic Signature Schemes - A survey.
SpringerBriefs in Computer Science. Springer ISBN Softcover 978-3-319-32114-1 - ebook 978-3-319-32115-8
[Buch], (2016)

Volkamer, Melanie ; Renaud, Karen ; Reinheimer, Benjamin :
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn.
31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC) Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Arzt, Steven ; Bodden, Eric :
StubDroid: automatic inference of precise data-flow summaries for the android framework.
ICSE '16 Proceedings of the 38th International Conference on Software Engineering ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie :
Security Proofs for Participation Privacy and Stronger Verifiability for Helios.

[Anderes], (2016)

Buchmann, Johannes ; Büscher, Niklas ; Katzenbeisser, Stefan ; Krämer, Juliane ; Micciancio, Daniele ; Siim, Sander ; van Vredendaal, Christine ; Walter, Michael ; Göpfert, Florian :
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge.
ASIAPKC 16 - 3rd ACM International Workshop on ASIA Public-Key Cryptography ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Buchmann, Johannes ; Göpfert, Florian ; Güneysu, Tim ; Oder, Tobias ; Pöppelmann, Thomas :
High-Performance and Lightweight Lattice-Based Public-Key Encryption.
IoTPTS '16 - 2nd ACM International Workshop on IoT Privacy, Trust, and Security ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Budurushi, Jurlind ; Hilt, Annika ; Volkamer, Melanie :
"E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern.
In: Datenschutz und Datensicherheit - DuD, 40 (5) pp. 300-304.
[Artikel], (2016)

Fischlin, Marc ; Günther, Felix ; Schmidt, Benedikt ; Warinschi, Bogdan :
Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3.
37th IEEE Symposium on Security and Privacy (S&P 2016) IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Ghiglieri, Marco ; Waidner, Michael :
HbbTV Security and Privacy: Issues and Challenges.
In: >IEEE Security & Privacy, vol. 14, no. (IEEE 14/3) pp. 61-67.
[Artikel], (2016)

Karuppayah, Shankar ; Vasilomanolakis, Emmanouil ; Haas, Steffen ; Fischer, Mathias ; Mühlhäuser, Max :
BoobyTrap: On Autonomously Detecting and Characterizing Crawlers in P2P Botnets.
IEEE ICC Communication and Information Systems Security Symposium IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Kiss, Ágnes ; Schneider, Thomas :
Valiant's universal circuit is practical.
35. Advances in Cryptology - EUROCRYPT 2016 Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Liu, Hui ; Liu, Qiurong ; Staicu, Cristian-Alexandru ; Pradel, Michael ; Luo, Yue :
Nomen est Omen: Exploring and Exploiting Similarities between Argument and Parameter Names.
ICSE '16 Proceedings of the 38th International Conference on Software Engineering ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Nadi, Sarah ; Krüger, Stefan ; Mezini, Mira ; Bodden, Eric :
"Jumping Through Hoops" Why do Java Developers Struggle With Cryptography APIs?
International Conference on Software Engineering ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Nadi, Sarah ; Krüger, Stefan ; Mezini, Mira ; Bodden, Eric :
Jumping through hoops: why do Java developers struggle with cryptography APIs?
ICSE '16 Proceedings of the 38th International Conference on Software Engineering ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Salvaneschi, Guido ; Mezini, Mira :
Debugging for reactive programming.
ICSE '16 Proceedings of the 38th International Conference on Software Engineering ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Schmitz, Martin ; Leister, Andreas ; Dezfuli, Niloofar ; Riemann, Jan ; Müller, Florian ; Mühlhäuser, Max :
Liquido: Embedding Liquids into 3D Printed Objects to Sense Tilting and Motion.
[Online-Edition: https://doi.org/10.1145/2851581.2892275]
In: CHI EA'16 . ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Schochlow, Verena ; Neumann, Stephan ; Braun, Kristoffer ; Volkamer, Melanie :
Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung.
Datenschutz und Datensicherheit
[Konferenz- oder Workshop-Beitrag], (2016)

Selakovic, Marija ; Pradel, Michael :
Performance issues and optimizations in JavaScript: an empirical study.
ICSE '16 Proceedings of the 38th International Conference on Software Engineering ACM Association for Computing Machinery
[Konferenz- oder Workshop-Beitrag], (2016)

Taha, Ahmed ; Metzler, Patrick ; Trapero, Ruben ; Luna, Jesus ; Suri, Neeraj :
Identifying and Utilizing Dependencies Across Cloud Security Services.
ASIA CCS '16 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Akleylek, Sedat ; Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Marson, Giorgia Azzurra :
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation.
International Conference on Cryptology AFRICACRYPT 2016 Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Alber, Gernot ; Trautmann, Nils :
Cooperative quantum electrodynamical processes in an ellipsoidal cavity.
In: Journal of Physics: Conference Series
[Artikel], (2016)

Buchmann, Johannes ; Demirel, Denise ; Schabhüser, Lucas:
Privately and Publicly Verifiable Computing Techniques.
ISBN 978-3-319-53797-9
[Buch], (2016)

Buchmann, Johannes ; Göpfert, Florian ; Player, Rachel ; Wunderer, Thomas :
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack.
International Conference on Cryptology AFRICACRYPT 2016 Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Budurushi, Jurlind ; Reanaud, Karen ; Volkamer, Melanie ; Woide, Marcel :
An Investigation into the Usability of Electronic Voting Systems for Complex Elections.
In: Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, 71 (7) 309–322.
[Artikel], (2016)

Classen, Jiska :
Software Defined Radio – Open Source Wireless Hacking.

[Anderes], (2016)

Marky, Karola ; Gutmann, Andreas ; Rack, Philipp ; Volkamer, Melanie :
Privacy Friendly Apps-Making Developers Aware of Privacy Violations.
1st International Workshop on Innovations in Mobile Privacy and Security CEUR Workshop Proceedings
[Konferenz- oder Workshop-Beitrag], (2016)

Mayer, Christoph :
Implementing a Toolkit for Ring-LWE Cryptography.
TU Darmstadt
[Masterarbeit], (2016)

Rauzy, Pablo ; Kiss, Ágnes ; Krämer, Juliane ; Seifert, Jean-Pierre :
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT.
COSADE 2016 Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Shulman, Haya ; Waidner, Michael :
Is the Internet Ready for DNSSEC: Evaluating Pitfalls in the Naming Infrastructure.
In Traffic Monitoring and Analysis (TMA)
[Konferenz- oder Workshop-Beitrag], (2016)

Steinmetzer, Daniel ; Classen, Jiska ; Hollick, Matthias :
Exploring Millimeter-Wave Network Scenarios with Ray-tracing based Simulations in mmTrace.
IEEE Infocom 2016 Poster Presentation (Infocom'16 Posters)
[Konferenz- oder Workshop-Beitrag], (2016)

Steinmetzer, Daniel ; Classen, Jiska ; Hollick, Matthias :
mmTrace: Modeling Millimeter-wave Indoor Propagation with Image-based Ray-tracing.
In: Millimeter-wave Networking Workshop (mmNet 2016)
[Artikel], (2016)

Strenzke, Falko :
An Analysis of OpenSSL's Random Number Generator.
In: Lecture Notes in Computer Science 9665 (35). Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Trautmann, Nils ; Hauke, Philipp :
Quantum simulation of the dynamical Casimir effect with trapped ions.
In: New Journal of Physics (18) 043029.
[Artikel], (2016)

Bernhard, David ; Fischlin, Marc ; Warinschi, Bogdan :
On the Hardness of Proving CCA-Security of Signed ElGamal.
In: LNCS (9614). Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Gutmann, Andreas ; Renaud, Karen ; Maguire, Joseph ; Mayer, Peter ; Volkamer, Melanie ; Matsuura, Kanta ; Müller-Quade, Jörn :
ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology.
2016 IEEE European Symposium on Security and Privacy (EuroS&P) IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Günther, Felix ; Poettering, Bertram :
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes.
In: International Journal of Information Security (IJIS)
[Artikel], (2016)

Kogan, Kirill ; Menikkumbura, Danushka ; Petri, Gustavo ; Noh, Youngtae ; Nikolenko, Sergey I. ; Eugster, Patrick :
BASEL (Buffer mAnagement SpEcification Language).
ANCS '16 Proceedings of the 2016 Symposium on Architectures for Networking and Communications Systems ACM
[Konferenz- oder Workshop-Beitrag], (2016)

McLaughlin, Stephen ; Konstantinou, Charalambos ; Wang, Xueyang ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Maniatakos, Michail ; Karri, Ramesh :
The Cybersecurity Landscape in Industrial Control Systems.
In: Proceedings of the IEEE, PP (99)
[Artikel], (2016)

Waidner, Michael ; Kasper, Michael :
Security in Industrie 4.0 - Challenges and Solutions for the Fourth Industrial Revolution.
DATE 2016 (Design, Automation and Test in Europe)
[Konferenz- oder Workshop-Beitrag], (2016)

Zeitouni, Shaza ; Oren, Yossef ; Wachsmann, Christian ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza :
Remanence Decay Side-Channel: The PUF Case.
In: IEEE Transactions on Information Forensics and Security, 99
[Artikel], (2016)

Braden, Kjell ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
Leakage-Resilient Layout Randomization for Mobile Devices.
23rd Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag], (2016)

Correia, Fabio ; Mariano, Artur ; Proença, Alberto ; Bischof, Christian ; Agrell, Erik :
Parallel Improved Schnorr-Euchner Enumeration SE++ for the CVP and SVP.
PDP 2016 - 24th Euromicro International Conference on Parallel, Distributed and Network-Based Processing
[Konferenz- oder Workshop-Beitrag], (2016)

Degabriele, Jean Paul ; Fehr, Victoria ; Fischlin, Marc ; Gagliardoni, Tommaso ; Günther, Felix ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Paterson, Kenneth G. :
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol.
In: International Journal of Information Security (IJIS)
[Artikel], (2016)

Dowling, Benjamin ; Fischlin, Marc ; Günther, Felix ; Stebila, Douglas :
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol.

[Anderes], (2016)

Erbenich, Vanessa :
On the Efficiency of Lattice-Based Encryption.
TU Darmstadt
[Masterarbeit], (2016)

Ghiglieri, Marco ; Hansen, Marit ; Nebel, Maxi ; Pörschke, Julia Victoria ; Fhom, Hervais Simo :
Smart-TV und Privatheit - Bedrohungspotenziale und Handlungsmöglichkeiten.

[Report], (2016)

Kulyk, Oksana ; Gerber, Paul ; Reinheimer, Benjamin ; Renaud, Karen ; Volkamer, Melanie :
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do.
NDSS Workshop on Usable Security (USEC) Internet Society.
[Konferenz- oder Workshop-Beitrag], (2016)

Kulyk, Oksana ; Volkamer, Melanie :
Efficiency Comparison of Various Approaches in E-Voting Protocols.
Financial Cryptography and Data Security. FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Revised Selected Papers Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Mariano, Artur ; Bischof, Christian :
Enhancing the scalability, tractability and memory usage of HashSieve on multi-core CPUs.
PDP2016 Conference Publishing Services (CPS)
[Konferenz- oder Workshop-Beitrag], (2016)

Rasthofer, Siegfried ; Arzt, Steven ; Miltenberger, Marc ; Bodden, Eric :
Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques.
Network and Distributed System Security Symposium 2016 Internet Society
[Konferenz- oder Workshop-Beitrag], (2016)

Rieß, Susanne :
An Analysis of Lattice-Based Key Exchange Protocols.
TU Darmstadt
[Masterarbeit], (2016)

Appel, Michael ; Pauer, Christof ; Wiesmaier, Alexander :
Sicherheitsaspekte und Vergleich der Blockchifren LED und TEA.

[Report], (2016)

Brendel, Jacqueline :
Efficient Proactive Secret Sharing.
TU Darmstadt
[Masterarbeit], (2016)

Daubert, Jörg ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max :
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks.
Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC) IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza :
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
Financial Crypto 2016
[Konferenz- oder Workshop-Beitrag], (2016)

Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza :
Technical Report: DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.

[Report], (2016)

Strohbach, Martin ; Daubert, Jörg ; Ravkin, Herman ; Lischka, Mario :
New Horizons for a Data-Driven Economy.
In: Keine Angabe Springer , pp. 119-141. ISBN 978-3-319-21568-6
[Buchkapitel], (2016)

Alagic, Gorjan ; Broadbent, Anne ; Fefferman, Bill ; Gagliardoni, Tommaso ; Schaffner, Christian ; Jules, Michael St. :
Computational Security of Quantum Encryption.
In: Lecture Notes in Computer Science - ICITS . Springer
[Anderes], (2016)

Asokan, N. ; Huang, Jialin ; Miettinen, Markus ; Nguyen, Thien Duc ; Sadeghi, Ahmad-Reza :
Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments.
In: Proc. 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'16).
[Konferenz- oder Workshop-Beitrag], (2016)

Brasser, Ferdinand ; Rasmussen, Kasper ; Sadeghi, Ahmad-Reza ; Tsudik, Gene :
Remote Attestation for Low-End Embedded Devices: the Prover's Perspective.
In: DAC '16 . ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Cam-Winget, Nancy ; Sadeghi, Ahmad-Reza ; Jin, Yier :
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected.
53rd Design Automation Conference (DAC)
[Konferenz- oder Workshop-Beitrag], (2016)

Fleisch, Gilbert :
Towards policy checks on passwords via fully homomorphic encryption.
TU Darmstadt
[Masterarbeit], (2016)

Müller, Florian ; Günther, Sebastian ; Dezfuli, Niloofar ; Khalilbeigi, Mohammadreza ; Mühlhäuser, Max :
ProxiWatch: Enhancing Smartwatch Interaction through Proximity-based Hand Input.
CHI EA '16: Proceedings of the 34rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems ACM New York, NY, USA
[Konferenz- oder Workshop-Beitrag], (2016)

Sadeghi, Ahmad-Reza ; Armknecht, Frederik :
Towards a Unified Security Model for Physically Unclonable Functions.
CT-RSA - Cryptographers' Track at the RSA Conference
[Konferenz- oder Workshop-Beitrag], (2016)

Trautmann, Nils ; Alber, Gernot :
Dissipation-enabled efficient excitation transfer from a single photon to a single quantum emitter.
In: Physical Review A p. 9.
[Artikel], (2016)

Vigil, Martín ; Demirel, Denise ; Habib, Sheikh Mahbub ; Hauke, Sascha ; Buchmann, Johannes ; Mühlhäuser, Max :
LoT: a Reputation-based Trust System for Long-term Archiving.
SECURWARE 2016 Thinkmind Digital Library
[Konferenz- oder Workshop-Beitrag], (2016)

2015

Bagci, Ibrahim Ethem ; Roedig, Utz ; Martinovic, Ivan ; Schulz, Matthias ; Hollick, Matthias :
IOT: Using Channel State Information for Tamper Detection in the Internet of Things.
In: ACSAC 2015 . ACM
[Konferenz- oder Workshop-Beitrag], (2015)

Borgwart, Andreas ; Boukoros, Spyros ; Shulman, Haya ; Waidner, Michael ; van Royeen, Carel :
Detection and Forensics of Domains Hijacking.
IEEE Global Communications Conference IEEE
[Konferenz- oder Workshop-Beitrag], (2015)

Classen, Jiska :
Building and Breaking Wireless Security.

[Anderes], (2015)

Davi, Lucas ; Sadeghi, Ahmad-Reza:
Building Secure Defenses Against Code-Reuse Attacks.
Springer International Publishing ISBN 978-3-319-25544-6
[Buch], (2015)

Frydrych, Holger ; Marthaler, Michael ; Alber, Gernot :
Pulse-controlled quantum gate sequences on a strongly coupled qubit chain.
In: Phys. Rev. A, American Physical Society (92) p. 10.
[Artikel], (2015)

Larsen, Per ; Brunthaler, Stefan ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Franz, Michael:
Automated Software Diversity.
Synthesis Lectures on Information Security, Privacy, and Trust. Morgan & Claypool
[Buch], (2015)

Mayer, Peter ; Volkamer, Melanie :
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing.
In: ACSAC 2015 . ACM
[Konferenz- oder Workshop-Beitrag], (2015)

Pellegrino, Giancarlo ; Tschürtz, Constantin ; Bodden, Eric ; Rossow, Christian
Bos, Herbert ; Monrose, Fabian ; Blanc, Gregory (eds.) :

jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications.
In: Lecture Notes in Computer Science 9404 . Springer Cham
[Konferenz- oder Workshop-Beitrag], (2015)

Schlipf, Mario :
Password Policy Crawler.
TU Darmstadt
[Masterarbeit], (2015)

Wolf, Peter ; Barrat, Jordi ; Bolo, Eden ; Bravo, Alejandro ; Krimmer, Robert ; Neumann, Stephan ; Parreño, Al ; Schürmann, Carsten ; Volkamer, Melanie:
Certification of ICTs in Elections.
nternational Institute for Democracy and Electoral Assistance
[Buch], (2015)

Coudert, Fanny ; Butin, Denis ; Métayer, Daniel Le :
Body-worn Cameras for Police Accountability: Opportunities and Risks.
In: Computer Law & Security Review (CLSR), 31 (6) pp. 749-762.
[Artikel], (2015)

Dagdelen, Özgür ; Gajek, Sebastian ; Göpfert, Florian :
Learning With Errors in the Exponent.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Krämer, Juliane ; Kiss, Ágnes ; Stüber, Anke :
On the Optimality of Differential Fault Analyses on CLEFIA.
MACIS 2015 - Sixth International Conference on Mathematical Aspects of Computer and Information Sciences Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Petzoldt, Albrecht ; Cheng, Ming-Shing ; Yang, Bo-Yin ; Chengdong, Tao ; Ding, Jintai :
Design Principles for HFEv- based Signature Schemes.
In: LNCS (9452). Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Volk, Florian ; Trüschler, Nadine ; Mühlhäuser, Max :
Rating Decomposition with Conjoint Analysis and Machine Learning.
CENTRIC 2015: The Eighth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services IARIA
[Konferenz- oder Workshop-Beitrag], (2015)

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian :
SEDA: Scalable Embedded Device Attestation.
22nd ACM Conference on Computer and Communications Security (CCS)
[Konferenz- oder Workshop-Beitrag], (2015)

Conti, Mauro ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Negro, Marco ; Qunaibit, Mohaned ; Sadeghi, Ahmad-Reza :
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
22nd ACM Conference on Computer and Communications Security (CCS)
[Konferenz- oder Workshop-Beitrag], (2015)

Crane, Stephen ; Volckaert, Stijn ; Schuster, Felix ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Sutter, Bjorn De ; Franz, Michael :
It's a TRAP: Table Randomization and Protection against Function Reuse Attacks.
22nd ACM Conference on Computer and Communications Security (CCS)
[Konferenz- oder Workshop-Beitrag], (2015)

Della Toffola, Luca ; Pradel, Michael ; Gross, Thomas R.
Andy, Gill (ed.) :

Performance problems you can fix: a dynamic analysis of memoization opportunities.
In: OOPSLA 2015 , 50 (10). ACM
[Konferenz- oder Workshop-Beitrag], (2015)

Demmler, Daniel ; Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza :
Automated Synthesis of Optimized Circuits for Secure Computation.
22nd ACM Conference on Computer and Communications Security (CCS'15)
[Konferenz- oder Workshop-Beitrag], (2015)

Dowling, Benjamin ; Fischlin, Marc ; Günther, Felix ; Stebila, Douglas :
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates.
22nd ACM Conference on Computer and Communications Security (CCS 2015) ACM
[Konferenz- oder Workshop-Beitrag], (2015)

Fischlin, Marc ; Mazaheri, Sogol :
Notions of Deniable Message Authentication.
In: WPES '15 . ACM
[Konferenz- oder Workshop-Beitrag], (2015)

Neumann, Stephan ; Volkamer, Melanie ; Strube, Moritz ; Jung, Wolfgang ; Brelle, Achim :
Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem.
In: Datenschutz und Datensicherheit, 11/2015 pp. 747-752.
[Artikel], (2015)

Saissi, Habib ; Bokor, Peter ; Suri, Neeraj :
PBMC: Symbolic Slicing for the Verification of Concurrent Programs.
Proceedings of the Symposium on Automated Technology for Verification and Analysis, ATVA 2015
[Konferenz- oder Workshop-Beitrag], (2015)

Schaller, André ; Skoric, Boris ; Katzenbeisser, Stefan :
On the Systematic Drift of Physically Unclonable Functions Due to Aging.
In: TrustED
[Konferenz- oder Workshop-Beitrag], (2015)

Shulman, Haya ; Waidner, Michael :
DNSSEC for Cyber Forensics.
In: EURASIP J. Information Security (16) p. 14.
[Artikel], (2015)

Ta, Vinh-Thong ; Butin, Denis ; Métayer, Daniel Le :
Formal Accountability for Biometric Surveillance: A Case Study.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Böck, Leon ; Karuppayah, Shankar ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max :
Hide And Seek: Detecting Sensors in P2P Botnets.
Communications and Network Security (CNS), 2015 IEEE Conference on IEEE
[Konferenz- oder Workshop-Beitrag], (2015)

Classen, Jiska ; Chen, Joe ; Steinmetzer, Daniel ; Hollick, Matthias ; Knightly, Edward :
The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications.
2nd ACM Workshop on Visible Light Communication Systems
[Konferenz- oder Workshop-Beitrag], (2015)

Classen, Jiska ; Schulz, Matthias ; Hollick, Matthias :
Practical Covert Channels for WiFi Systems.
IEEE Conference on Communications and Network Security (CNS)
[Konferenz- oder Workshop-Beitrag], (2015)

Germanus, Daniel ; Ismail, Hatem ; Suri, Neeraj :
PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation.
InProceedings of the 34th International Symposium on Reliable Distributed Systems, 28.09.2015-01.10.2015, Montreal
[Konferenz- oder Workshop-Beitrag], (2015)

Kulyk, Oksana ; Teague, Vanessa ; Volkamer, Melanie
Haenni, Rolf ; Koenig, Reto ; Wikström, Douglas (eds.) :

Extending Helios Towards Private Eligibility Verifiability.
E-Voting and Identity: 5th International Conference - VoteID 2015 Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Mantel, Heiko ; Starostin, Artem :
Transforming Out Timing Leaks, More or Less.
In: LNCS (9326). Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Mariano, Artur ; Laarhoven, Thijs ; Bischof, Christian :
Parallel (probable) lock-free HashSieve: a practical sieving algorithm for the SVP.
ICPP 2015 - The 44th Annual Conference 2015 International Conference on Parallel Processing in press
[Konferenz- oder Workshop-Beitrag], (2015)

Piper, Thorsten ; Suri, Neeraj ; Fuhrman, Thomas :
On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety Mechanisms.
InProceedings of the 11th European Dependable Computing Conference ,07.09.2015-11.09.2015, Paris
[Konferenz- oder Workshop-Beitrag], (2015)

Shulman, Haya ; Waidner, Michael :
Towards Security of Internet's Naming Infrastructure.
Computer Security ESORICS
[Konferenz- oder Workshop-Beitrag], (2015)

Shulman, Haya ; Waidner, Michael
Pernul, Günther ; Ryan, Michael Y. A. ; Weippl, Edgar (eds.) :

DNS-Scopy: Towards Security of Internet Naming Infrastructure.
In: Lecture Notes in Computer Science 9326 , 1 . Springer-Verlag New York, Inc.
[Konferenz- oder Workshop-Beitrag], (2015)

Steinmetzer, Daniel ; Chen, Joe ; Classen, Jiska ; Knightly, Edward ; Hollick, Matthias :
Eavesdropping with Periscopes: Experimental Security Analysis of Highly Directional Millimeter Waves.
IEEE Conference on Communications and Network Security 2015 (CNS)
[Konferenz- oder Workshop-Beitrag], (2015)

Tao, Chengdong ; Xiang, Hong ; Petzoldt, Albrecht ; Ding, Jintai :
Simple Matrix - A Multivariate Public Key Cryptosystem (MPKC) for Encryption.
In: Finite Fields and Their Applications (35) pp. 352-368.
[Artikel], (2015)

Volkamer, Melanie ; Renaud, Karen ; Kulyk, Oksana ; Emeröz, Sinem
Foresti, Sara (ed.) :

A Socio-Technical Investigation into Smartphone Security.
Security and Trust Management: 11th International Workshop - STM 2015 Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian :
SEDA - Technical Report.

[Report], (2015)

Buescher, Niklas ; Katzenbeisser, Stefan :
Faster Secure Computation through Automatic Parallelization.
24th USENIX Security Symposium (USENIX Security'15) USENIX Association
[Konferenz- oder Workshop-Beitrag], (2015)

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael :
Return to Where? You Can't Exploit What You Can't Find.
Blackhat USA
[Konferenz- oder Workshop-Beitrag], (2015)

Fischlin, Marc ; Günther, Felix ; Marson, Giorgia Azzurra ; Paterson, Kenneth G. :
Data Is a Stream: Security of Stream-Based Channels.
Advances in Cryptology - CRYPTO 2015 Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Gong, Liang ; Pradel, Michael ; Sen, Koushik :
JITProf: pinpointing JIT-unfriendly JavaScript code.
In: ESEC/FSE 2015 . ACM
[Konferenz- oder Workshop-Beitrag], (2015)

Horsch, Moritz ; Hülsing, Andreas ; Buchmann, Johannes :
PALPAS - PAsswordLess PAssword Synchronization.
International Conference on Availability, Reliability and Security (ARES)
[Konferenz- oder Workshop-Beitrag], (2015)

Huang, Jialin ; Vaudenay, Serge ; Lai, Xuejia ; Nyberg, Kaisa :
Capacity and Data Complexity in Multidimensional Linear Attack.
CRYPTO
[Konferenz- oder Workshop-Beitrag], (2015)

Kohnhäuser, Florian ; Schaller, André ; Katzenbeisser, Stefan :
PUF-based Software Protection for Low-end Embedded Devices.
8th International Conference on Trust and Trustworthy Computing (TRUST 2015) Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie ; Haenni, Rolf ; Koenig, Reto ; von Bergen, Philemon :
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.

[Anderes], (2015)

Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie ; Haenni, Rolf ; Koenig, Reto ; von Bergen, Philemon :
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
10th International Conference on Availability, Reliability and Security - ARES 2015 IEEE
[Konferenz- oder Workshop-Beitrag], (2015)

Meskanen, Tommi ; Ramezanian, Sara ; Liu, Jian ; Niemi, Valtteri :
Private Membership Test for Bloom Filters.
The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15)
[Konferenz- oder Workshop-Beitrag], (2015)

Mineraud, Julien ; Lancerin, Federico ; Balasubramaniam, Sasitharan ; Conti, Mauro ; Tarkoma, Sasu :
You are AIRing too much: Assessing the privacy of users in crowdsourcing environmental data.
The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15)
[Konferenz- oder Workshop-Beitrag], (2015)

Nyman, Thomas ; McGillion, Brian ; Asokan, N. :
On Making Emerging Trusted Execution Environments Accessible to Developers.
In: Lecture Notes in Computer Science , 9229 . Springer International Publishing
[Konferenz- oder Workshop-Beitrag], (2015)

Pellegrino, Giancarlo ; Balzarotti, Davide ; Winter, Stefan ; Suri, Neeraj :
In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services.
Proceedings of USENIX Security Symposium, 12.-14. August 2015, Washington D.C
[Konferenz- oder Workshop-Beitrag], (2015)

Rasthofer, Siegfried ; Asrar, Irfan ; Huber, Stephan ; Bodden, Eric :
How Current Android Malware Seeks to Evade Automated Code Analysis.
9th International Conference on Information Security Theory and Practice (WISTP'2015)
[Konferenz- oder Workshop-Beitrag], (2015)

Tamrakar, Sandeep ; Ekberg, Jan-Erik ; Laitinen, Pekka :
On Rehoming the Electronic Id to TEEs.
The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15)
[Konferenz- oder Workshop-Beitrag], (2015)

Volkamer, Melanie ; Renaud, Karen ; Braun, Kristoffer ; Canova, Gamze ; Reinheimer, Benjamin
Conti, Mauro ; Schunter, Matthias ; Askoxylakis, Ioannis (eds.) :

Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness.
In: Trust and Trustworthy Computing . Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Volkamer, Melanie ; Renaud, Karen ; Kulyk, Oksana ; Emeröz, Sinem :
An Investigation into the "Other" Barriers to Adoption of Smartphone Security Precautions (Poor Usability being a Given).

[Report], (2015)

Alkim, Erdem ; Bindel, Nina ; Buchmann, Johannes ; Dagdelen, Özgür ; Schwabe, Peter :
TESLA: Tightly-Secure Efficient Signatures from Standard Lattices.

[Anderes], (2015)

Askarov, Aslan ; Chong, Stephen ; Mantel, Heiko :
Hybrid Monitors for Concurrent Noninterference.
Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF) IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2015)

Diedrich, Lennart ; Murati, Lulzim ; Wiesmaier, Alexander :
Stream ciphers in the IoT: Grain and Trivium.

[Report], (2015)

Do, Lisa Nguyen Quang ; Ali, Karim ; Bodden, Eric ; Livshits, Benjamin :
Toward a Just-in-Time Static Analysis.
In:
[Artikel], (2015)

Ghiglieri, Marco ; Lange, Benjamin ; Simo, Hervais ; Waidner, Michael :
Security und Privacy bei Smart TVs – Bedrohungspotential und technische Lösungsansätze.
In: Weiterdenken .
[Konferenz- oder Workshop-Beitrag], (2015)

Gong, Liang ; Pradel, Michael ; Sridharan, Manu ; Sen, Koushik :
DLint: Dynamically Checking Bad Coding Practices in JavaScript.
In: ISSTA 2015 . ACM
[Konferenz- oder Workshop-Beitrag], (2015)

Kußmaul, Tobias ; Löffler, Johannes ; Wiesmaier, Alexander :
Block ciphers PRESENT and SEA in comparison.

[Report], (2015)

Letzkus, Fabian :
NotaryCache: Preventing man-in-the-middle attacks through ubiquitous multi-path probing.
TU Darmstadt
[Masterarbeit], (2015)

Loruenser, Thomas ; Rodriguez, Charles Bastos ; Demirel, Denise ; Fischer-Hübner, Simone ; Gross, Thomas R. ; Langer, Thomas ; des Noes, Mathieu ; Poehls, Henrich ; Rozenberg, Boris ; Slamanig, Daniel :
Towards a New Paradigm for Privacy and Security in Cloud Services.
In: CoRR abs/1506.05980 (2015)
[Artikel], (2015)

Luna, Jesus ; Suri, Neeraj ; Iorga, Michaela ; Karmel, Anil :
Leveraging the Potential of Cloud Security Service Level Agreements through Standards.
Proceedings of IEEE Cloud Computing, 27.06.- 02.07. 2015, New York
[Konferenz- oder Workshop-Beitrag], (2015)

Medeiros, Flávio ; Kästner, Christian ; Ribeiro, Márcio ; Nadi, Sarah ; Gheyi, Rohit :
The Love/Hate Relationship with the C Preprocessor: An Interview Study.
European Conference on Object-Oriented Programming
[Konferenz- oder Workshop-Beitrag], (2015)

Meuser, Tobias ; Schmidt, Larissa ; Wiesmaier, Alexander :
Comparing Lightweight Hash Functions – PHOTON & Quark.

[Report], (2015)

Arias, Orlando ; Davi, Lucas ; Hanreich, Matthias ; Jin, Yier ; Koeberl, Patrick ; Paul, Debayan ; Sadeghi, Ahmad-Reza ; Sullivan, Dean :
HAFIX: Hardware-Assisted Flow Integrity Extension.
52nd Design Automation Conference (DAC)
[Konferenz- oder Workshop-Beitrag], (2015)

Brasser, Ferdinand ; Koeberl, Patrick ; Mahjoub, Brahim El ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian :
TyTAN: Tiny Trust Anchor for Tiny Devices.
52nd Design Automation Conference (DAC) 2015
[Konferenz- oder Workshop-Beitrag], (2015)

Cabarcas, Daniel ; Demirel, Denise ; Göpfert, Florian ; Lancrenon, Jean ; Wunderer, Thomas :
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme.

[Report], (2015)

Demirel, Denise ; Lancrenon, Jean :
How to Securely Prolong the Computational Bindingness of Pedersen Commitments.

[Report], (2015)

Gutmann, Andreas ; Renaud, Karen ; Volkamer, Melanie :
Nudging Bank Account Holders Towards More Secure PIN Management.
Journal of Internet Technology and Secured Transaction (JITST) Infonomics Society
[Konferenz- oder Workshop-Beitrag], (2015)

Günther, Felix ; Poettering, Bertram :
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes.
20th Australasian Conference on Information Security and Privacy (ACISP 2015) Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Habib, Sheikh Mahbub ; Volk, Florian ; Hauke, Sascha ; Mühlhäuser, Max :
Computational trust methods for security quantification in the cloud ecosystem.
In: The Cloud Security Ecosystem, Syngress/Elsevier pp. 463-493.
[Artikel], (2015)

Nagy, Marcin ; Bui, Thanh Phong ; Cristofaro, Emiliano De ; Asokan, N. ; Ott, Jörg ; Sadeghi, Ahmad-Reza :
How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL.
ACM WiSEC 2015
[Konferenz- oder Workshop-Beitrag], (2015)

Pinkas, Benny ; Schneider, Thomas ; Segev, Gil ; Zohner, Michael :
Phasing: Private set intersection using permutation-based hashing.
24th USENIX Security Symposium (USENIX Security'15)
[Konferenz- oder Workshop-Beitrag], (2015)

Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Waidner, Michael :
Security and Privacy Challenges in Industrial Internet of Things.
52nd Design Automation Conference (DAC) Research
[Konferenz- oder Workshop-Beitrag], (2015)

Schäfer, Marcel ; Mair, Sebastian ; Berchtold, Waldemar ; Steinebach, Martin :
Universal Threshold Calculation for Fingerprinting Decoders using Mixture Models.
IH&MMSec '15 Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security ACM
[Konferenz- oder Workshop-Beitrag], (2015)

Songhori, Ebrahim ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz :
Compacting Privacy-Preserving k-Nearest Neighbor Search using Logic Synthesis.
52nd Design Automation Conference (DAC)
[Konferenz- oder Workshop-Beitrag], (2015)

Steinmetzer, Daniel ; Schulz, Matthias ; Hollick, Matthias :
Lockpicking Physical Layer Key Exchange: Weak Adversary Models Invite the Thief.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec)
[Konferenz- oder Workshop-Beitrag], (2015)

Struck, Patrick :
On the difference between hardness and security: a comparison of lattice-based signature schemes.
TU Darmstadt
[Masterarbeit], (2015)

Wilk, Stefan ; Schönherr, Sophie ; Stohr, Denny ; Effelsberg, Wolfgang :
EnvDASH: An Environment-Aware Dynamic Adaptive Streaming over HTTP System.
In: TVX '15 . ACM
[Konferenz- oder Workshop-Beitrag], (2015)

Alkeilani Alkadri, Nabil :
Post-Quantum Commitment Schemes.
TU Darmstadt
[Masterarbeit], (2015)

Arabadzhieva, Vladislava :
Privacy Taxonomy for Verifiable Poll-site Voting Schemes.
TU Darmstadt
[Masterarbeit], (2015)

Braun, Kristoffer ; Rack, Philipp :
Shoulder-surfing resistente Authentisierung an mobilen Endgeräten.
SecuMedia Verlag
[Masterarbeit], (2015)

Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Borza, Roland ; Reinheimer, Benjamin ; Stockhardt, Simon ; Tenberg, Ralf :
Learn To Spot Phishing URLs with the Android NoPhish App.
In: IFIP Advances in Information and Communication Technology . Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael :
Readactor: Practical Code Randomization Resilient to Memory Disclosure.
36th IEEE Symposium on Security and Privacy (Oakland)
[Konferenz- oder Workshop-Beitrag], (2015)

Ghiglieri, Marco ; Müller, Jan :
Datenschutzfreundliche Erfassung von Nutzungsdaten bei Smart Entertainment Geräten.
14. Deutscher IT-Sicherheitskongress
[Konferenz- oder Workshop-Beitrag], (2015)

Ghiglieri, Marco ; Oswald, Florian :
SSP – Ansatz zur garantierten Durchsetzung von Web Sicherheitsmaßnahmen auf dem Client.
14. Deutscher IT-Sicherheitskongress
[Konferenz- oder Workshop-Beitrag], (2015)

Pradel, Michael ; Schuh, Parker ; Sen, Koushik :
TypeDevil: dynamic type inconsistency analysis for JavaScript.
Proceedings of the 37th International Conference on Software Engineering IEEE Press
[Konferenz- oder Workshop-Beitrag], (2015)

Schuster, Felix ; Tendyck, Thomas ; Liebchen, Christopher ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten :
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications.
36th IEEE Symposium on Security and Privacy (Oakland)
[Konferenz- oder Workshop-Beitrag], (2015)

Shirazi, Fatemeh ; Goehring, Matthias ; Diaz, Claudia :
Tor Experimentation Tools.
International Workshop on Privacy Engineering – IWPE'15, co-located with 36th IEEE symposium on Security and Privacy IEEE
[Konferenz- oder Workshop-Beitrag], (2015)

Songhori, Ebrahim ; Hussain, Siam ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz :
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits.
36th IEEE Symposium on Security and Privacy (Oakland)
[Konferenz- oder Workshop-Beitrag], (2015)

Vigil, Martín ; Buchmann, Johannes ; Cabarcas, Daniel ; Weinert, Christian ; Wiesmaier, Alexander :
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey.
In: Computers & Security, 50 pp. 16-32.
[Artikel], (2015)

Winter, Stefan ; Piper, Thorsten ; Schwahn, Oliver ; Natella, Roberto ; Suri, Neeraj ; Cotroneo, Domenico :
GRINDER: On Reusability of Fault Injection Tools.
Proceedings of the ICSE/AST, 23.05.-24.05.2015, Florenz
[Konferenz- oder Workshop-Beitrag], (2015)

Zhou, Shurui ; Al-Kofahi, Jafar ; Nguyen, Tien ; Kaestner, Christian ; Nadi, Sarah :
Extracting Configuration Knowledge from Build Files with Symbolic Analysis.
3rd International Workshop on Release Engineering
[Konferenz- oder Workshop-Beitrag], (2015)

Albrecht, Martin ; Rechberger, Christian ; Schneider, Thomas ; Tiessen, Tyge ; Zohner, Michael :
Ciphers for MPC and FHE.
34th Advances in Cryptology - EUROCRYPT 2015 Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael :
More efficient oblivious transfer extensions with security for malicious adversaries.
34th Advances in Cryptology - EUROCRYPT 2015
[Konferenz- oder Workshop-Beitrag], (2015)

Bucicoiu, Mihai ; Davi, Lucas ; Deaconescu, Razvan ; Sadeghi, Ahmad-Reza :
XiOS: Extended Application Sandboxing on iOS.
10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)
[Konferenz- oder Workshop-Beitrag], (2015)

Frydrych, H. ; Hoskovec, A. ; Jex, I. ; Alber, G. :
Selective dynamical decoupling for quantum state transfer.
In: Journal of Physics B: Atomic, Molecular and Optical Physics, IOP Publishing 025501.
[Artikel], (2015)

Rasthofer, Siegfried ; Asrar, Irfan ; Huber, Stephan ; Bodden, Eric :
An Investigation of the Android/BadAccents Malware which Exploits a new Android Tapjacking Attack.

[Report], (2015)

Tancreti, Matthew ; Sundaram, Vinaitheerthan ; Bagchi, Saurabh ; Eugster, Patrick :
TARDIS: Software-Only System-Level Record and Replay in Wireless Sensor Networks.
In: IPSN '15 . ACM
[Konferenz- oder Workshop-Beitrag], (2015)

Trautmann, N. ; Alber, G. ; Agarwal, G. S. ; Leuchs, G. :
Time-Reversal-Symmetric Single-Photon Wave Packets for Free-Space Quantum Communication.
In: PHYSICAL REVIEW LETTERS, APS p. 173601.
[Artikel], (2015)

Alhamoud, Alaa ; Xu, Pei ; Englert, Frank ; Scholl, Philipp ; Nguyen, The An Binh ; Böhnstedt, Doreen ; Steinmetz, Ralf :
Evaluation of User Feedback in Smart Home for Situational Context Identification.
2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops) IEEE
[Konferenz- oder Workshop-Beitrag], (2015)

Brzuska, Christina ; Farshim, Pooya ; Mittelbach, Arno
Dodis, Yevgeniy ; Nielsen, Arno Buus (eds.) :

Random-Oracle Uninstantiability from Indistinguishability Obfuscation.
In: Lecture Notes in Computer Science 9015 . Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Burgstahler, D. ; Pelzer, Matthias ; Lotz, Andreas ; Knapp, Fabian ; Pu, Hongjun ; Rueckelt, Tobias ; Steinmetz, Ralf :
A Concept for a C2X-based Crossroad Assistant.
2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops) IEEE
[Konferenz- oder Workshop-Beitrag], (2015)

Dogan, Ferit :
Design and Implementation of Plug-ins for JCrypTool.
TU Darmstadt
[Masterarbeit], (2015)

Nguyen, The An Binh ; Englert, Frank ; Farr, Simon ; Gottron, Christian ; Böhnstedt, Doreen ; Steinmetz, Ralf :
Hybrid Communication Architecture for Emergency Response - An Implementation in Firefighter’s Use Case.
2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops) IEEE
[Konferenz- oder Workshop-Beitrag], (2015)

Shannon, Greg ; Waidner, Michael ; Sonalker, Anuja :
Ask The Experts: Cybersecurity.

[Report], (2015)

Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Reinheimer, Benjamin :
NoPhish App Evaluation: Lab and Retention Study.
NDSS Workshop on Usable Security 2015 Internet Society
[Konferenz- oder Workshop-Beitrag], (2015)

Davi, Lucas ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Snow, Kevin ; Monrose, Fabian :
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
22nd Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag], (2015)

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael :
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
Network and Distributed System Security Symposium (NDSS'15)
[Konferenz- oder Workshop-Beitrag], (2015)

Gerber, Paul ; Volkamer, Melanie :
Usability und Privacy im Android Ökosystem.
In: Datenschutz und Datensicherheit, 2/2015 108 - 113.
[Artikel], (2015)

Gerber, Paul ; Volkamer, Melanie ; Renaud, Karen :
Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy.
In: ACM SIGCAS Computers and Society, 45 (1) pp. 16-21.
[Artikel], (2015)

Herzberg, Amir ; Shulman, Haya :
Cipher-Suite Negotiation for DNSSEC: Hop-by-Hop or End-to-End?
In: Internet Computing, IEEE (19) pp. 80-84.
[Artikel], (2015)

Waidner, Michael :
Wir müssen die Airbus-Idee für die europäische IT-Sicherheit wiederbeleben.

[Report], (2015)

Biedermann, Sebastian ; Katzenbeisser, Stefan ; Szefer, Jakub :
Hard Drive Side-Channel Attacks using Smartphone Magnetic Field Sensors.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015 pp. 5-13.
[Artikel], (2015)

Dmitrienko, Alexandra ; Heuser, Stephan ; Nguyen, Thien Duc ; da Silva Ramos, Marcos ; Rein, Andre ; Sadeghi, Ahmad-Reza :
Market-driven Code Provisioning to Mobile Secure Hardware.
Financial Cryptography and Data Security
[Konferenz- oder Workshop-Beitrag], (2015)

El Bansarkhani, Rachid ; Buchmann, Johannes :
High Performance Lattice-based CCA-secure Encryption.
In: Cryptology ePrint Archive p. 20.
[Artikel], (2015)

El Bansarkhani, Rachid ; Dagdelen, Özgür ; Buchmann, Johannes :
Augmented Learning with Errors: The Untapped Potential of the Error Term.
Financial Cryptography and Data Security - 19th International Conference, FC 2015, Puerto Rico, January 26 - 30, 2015 Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Ghiglieri, Marco :
PriMSED - Privacy-Friendly Measurement of Smart Entertainment Devices.
IEEE CCNC
[Konferenz- oder Workshop-Beitrag], (2015)

Maseberg, Sönke ; Bodden, Eric ; Kus, Mehmet ; Brucker, Achim ; Rasthofer, Siegfried ; Berger, Bernhard ; Huber, Stephan ; Sohr, Karsten ; Gerber, Paul ; Volkamer, Melanie :
Zertifizierte Apps.
Risiken kennen, Herausforderungen annehmen, Lösungen gestalten, Tagungsband zum 14. Deutscher IT-Sicherheitskongress des BSI 2015 SecuMedia
[Konferenz- oder Workshop-Beitrag], (2015)

Butin, Denis ; Gazdag, Stefan-Lukas ; Buchmann, Johannes :
Real-World Post-Quantum Digital Signatures.
Cybersecurity & Privacy Innovation Forum (CSP Forum 2015) Springer CCIS
[Konferenz- oder Workshop-Beitrag], (2015)

Butin, Denis ; Métayer, Daniel Le :
A Guide to End-to-End Privacy Accountability.
1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity (TELERISE 2015) IEEE
[Konferenz- oder Workshop-Beitrag], (2015)

Classen, Jiska ; Braun, Johannes ; Volk, Florian ; Hollick, Matthias ; Buchmann, Johannes ; Mühlhäuser, Max :
A Distributed Reputation System for Certification Authority Trust Management.
14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE UbiSafe Symposium)
[Konferenz- oder Workshop-Beitrag], (2015)

Ganji, Fatemeh ; Krämer, Juliane ; Seifert, Jean-Pierre ; Tajik, Shahin :
Lattice Basis Reduction Attack against Physically Unclonable Functions.
22nd ACM Conference on Computer and Communications Security (CCS 2015)
[Konferenz- oder Workshop-Beitrag], (2015)

Geihs, Matthias ; Demirel, Denise ; Buchmann, Johannes :
On the Security of Long-lived Archiving Systems based on the Evidence Record Syntax.
Codes, Cryptology and Information Security Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Koeberl, Patrick ; Phegade, Vinay ; Rajan, Anand ; Schneider, Thomas ; Schulz, Steffen ; Zhdanova, Maria :
Time to rethink: Trust brokerage using trusted execution environments.
8th International Conference on Trust & Trustworthy Computing (TRUST'15) Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Krauß, Christoph ; Waidner, Michael :
IT-Sicherheit und Datenschutz im vernetzten Fahrzeug.
In: >Datenschutz und Datensicherheit DuD, 39(6) pp. 383-387.
[Artikel], (2015)

Miettinen, Markus ; Asokan, N. ; Koushanfar, Farinaz ; Nguyen, Thien Duc ; Rios, Jon ; Sadeghi, Ahmad-Reza ; Sobhani, Majid ; Yellapantula, Sudha :
I know where you are: Proofs of Presence resilient to malicious provers.
10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)
[Konferenz- oder Workshop-Beitrag], (2015)

Sadeghi, Ahmad-Reza ; Davi, Lucas ; Larsen, Per :
Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future? - Keynote -.
10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)
[Konferenz- oder Workshop-Beitrag], (2015)

Stockhardt, Simon ; Reinheimer, Benjamin ; Volkamer, Melanie :
Über die Wirksamkeit von Anti-Phishing-Training.
Usable Security and Privacy Workshop in conjunction with Mensch und Computer 2015 A. Weisbecker, M. Burmester & A. Schmidt
[Konferenz- oder Workshop-Beitrag], (2015)

Zhang, Jiang ; Zhang, Zhenfeng ; Ding, Jintai ; Snook, Michael ; Dagdelen, Özgür :
Authenticated Key Exchange from Ideal Lattices.
EUROCRYPT 2015
[Konferenz- oder Workshop-Beitrag], (2015)

2014

Biedermann, Sebastian ; Katzenbeisser, Stefan ; Szefer, Jakub :
Hot-Hardening: Getting More Out of Your Security Settings.
In: ACSAC '14 . ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Brzuska, Christina ; Mittelbach, Arno
Sarkar, Palash ; Iwata, Tetsu (eds.) :

Indistinguishability Obfuscation versus Multi-Bit Point Obfuscation with Auxiliary Input.
In: Lecture Notes in Computer Science 8874 , 2 . Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Charfi, Ahmed :
SAT-solving in Algebraic cryptanalysis.
TU Darmstadt
[Masterarbeit], (2014)

Culhane, William ; Jayaram, K. R. ; Eugster, Patrick :
Fast, Expressive Top-k Matching.
In: Middleware '14 . ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Faraon, Montathar ; Stenberg, Georg J H ; Budurushi, Jurlind ; Kaipainen, Mauri
Parycek, Peter ; Sachs, Michael ; Skoric, Marko (eds.) :

Positive but skeptical - A study of attitudes towards Internet voting in Sweden.
CeDEM Asia 2014: Proceedings of the International Conference for E-Democracy and Open Government Münster: Edition Donau-Universität Krems
[Konferenz- oder Workshop-Beitrag], (2014)

Fischlin, Marc ; Günther, Felix :
Multi-Stage Key Exchange and the Case of Google's QUIC Protocol.
CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Günther, Felix ; Manulis, Mark ; Peter, Andreas
Gritzalis, Dimitris ; Kiayias, Aggelos ; Askoxylakis, Ioannis (eds.) :

Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation.
In: LNCS (8813). Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Herzberg, Amir ; Shulman, Haya :
DNS Authentication as a Service: Preventing Amplifikation Attacks.
In: ACSAC .
[Konferenz- oder Workshop-Beitrag], (2014)

Herzberg, Amir ; Shulman, Haya ; Crispo, Bruno :
Less is More: Cipher-Suite Negotiation for DNSSEC.
Computer Security Applications Conference (ACM ACSAC) ACSAC, IEEE
[Konferenz- oder Workshop-Beitrag], (2014)

Mayer, Peter ; Volkamer, Melanie ; Kauer, Michaela
Prakash, Atul ; Shyamasundar, Rudrapatna (eds.) :

Authentication Schemes - Comparison and Effective Password Spaces.
Information Systems Security Springer International Publishing
[Konferenz- oder Workshop-Beitrag], (2014)

Müller, Jan :
PriSEMD - A Privacy-Friendly Approach to Analyze and Measure Smart Entertainment Devices.
TU Darmstadt
[Masterarbeit], (2014)

Schreiner, Steffen :
A Security Architecture for e-Science Grid Computing.
TU Darmstadt
[Dissertation]

Trautmann, N. ; Bernad, J. Z. ; Sondermann, M. ; Alber, G. ; Sanchez-Soto, L. L. ; Leuchs, G. :
Generation of entangled matter qubits in two opposing parabolic mirrors.
In: PHYSICAL REVIEW A 90 063814.
[Artikel], (2014)

Vigil, Martín ; Weinert, Christian ; Demirel, Denise ; Buchmann, Johannes :
An efficient time-stamping solution for long-term digital archiving.
IEEE 33rd International Performance Computing and Communications Conference (IPCCC)
[Konferenz- oder Workshop-Beitrag], (2014)

Wachsmann, Christian ; Sadeghi, Ahmad-Reza:
Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions.
Synthesis Lectures on Information Security, Privacy, and Trust. Morgan & Claypool Publishers ISBN 9781627055093
[Buch], (2014)

Araujo, Frederico ; Hamlen, Kevin ; Biedermann, Sebastian ; Katzenbeisser, Stefan :
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation.
In: ACM .
[Konferenz- oder Workshop-Beitrag], (2014)

Canova, Gamze ; Volkamer, Melanie ; Weiler, Simon :
Poster: Password Entering and Transmission Security.

[Anderes], (2014)

Demmler, Daniel ; Herzberg, Amir ; Schneider, Thomas :
RAID-PIR: Practical multi-server PIR.
6th ACM Cloud Computing Security Workshop (ACM CCSW'14) ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Ghiglieri, Marco
Schiele, Otto ; Schön, Willi (eds.) :

HbbTV – aktueller Stand 2014.
FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien
[Konferenz- oder Workshop-Beitrag], (2014)

Horsch, Moritz ; Tuengerthal, Max ; Wich, Tobias :
SAML Privacy-Enhancing Profile.
In: LNI , P-237 . GI
[Konferenz- oder Workshop-Beitrag], (2014)

Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan ; Tews, Erik ; Hamacher, Kay :
Privacy-Preserving Whole Genome Sequence Processing through Proxy-Aided ORAM.
In: ACM .
[Konferenz- oder Workshop-Beitrag], (2014)

Mahbub, Habib Sheikh ; Sebastian, Ries ; Max, Mühlhäuser ; Prabhu, Varikkattu :
Towards a trust management system for cloud computing marketplaces: using CAIQ as a trust information source.
[Online-Edition: https://onlinelibrary.wiley.com/doi/abs/10.1002/sec.748]
In: Security and Communication Networks, 7 (11) pp. 2185-2200.
[Artikel], (2014)

Miettinen, Markus ; Asokan, N. ; Nguyen, Thien Duc ; Sadeghi, Ahmad-Reza ; Sobhani, Majid :
Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices.
Proc. ACM Conference on Computer and Communications Security ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Shirazi, Fatemeh ; Volkamer, Melanie :
What Deters Jane from Preventing Identification and Tracking on the Web?
13th ACM Workshop on Privacy in the Electronic Society (WPES 2014) ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Shulman, Haya ; Ezra, Shiran :
Poster: On the Resilience of DNS Infrastructure.
ACM Conference on Computer and Communications Security (ACM CCS) ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Vieten, Jannik :
Evaluierung des U-LP Verschlüsselungsverfahrens in der Praxis.
TU Darmstadt
[Masterarbeit], (2014)

Braun, Johannes :
Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication.
IEEE Conference on Communications and Network Security (IEEE CNS 2014 Poster Session)
[Konferenz- oder Workshop-Beitrag], (2014)

Buchmann, Johannes ; Bischof, Christian ; Dagdelen, Özgür ; Fitzpatrick, Robert ; Göpfert, Florian ; Mariano, Artur :
Nearest Planes in Practice.
International Conference on Cryptography and Information security -BalkanCryptSec 2014
[Konferenz- oder Workshop-Beitrag], (2014)

Budurushi, Jurlind ; Renaud, Karen ; Volkamer, Melanie ; Woide, Marcel
Krimmer, Robert ; Volkamer, Melanie (eds.) :

Implementation and Evaluation of the EasyVote Tallying Component and Ballot.
6th International Conference on Electronic Voting (EVOTE) IEEE
[Konferenz- oder Workshop-Beitrag], (2014)

Dagdelen, Özgür ; Venturi, Daniele :
A Multi-Party Protocol for Privacy-Preserving Cooperative Linear System of Equations.
In: LNCS (9024). Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Ding, Jintai ; Petzoldt, Albrecht ; Wang, Lih-Chung :
The Cubic Simple Matrix Encryption Scheme.
In: LNCS (8772). Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Kulyk, Oksana ; Feier, Christian ; Köster, Thorben :
Electronic Voting with Fully Distributed Trust and Maximized Flexibility Regarding Ballot Design.
6th International Conference on Electronic Voting - EVOTE 2014 IEEE
[Konferenz- oder Workshop-Beitrag], (2014)

Mitschke, Ralf ; Erdweg, Sebastian ; Köhler, Mirko ; Mezini, Mira ; Salvaneschi, Guido :
i3QL: Language-Integrated Live Data Views.
In: OOPSLA '14 . ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Neumann, Stephan ; Feier, Christian ; Sahin, Perihan ; Fach, Sebastian :
Pretty Understandable Democracy 2.0.
6th International Conference on Electronic Voting (EVOTE) TUT Press
[Konferenz- oder Workshop-Beitrag], (2014)

Pradel, Michael ; Schuh, Parker ; Necula, George ; Sen, Koushik :
EventBreak: Analyzing the Responsiveness of User Interfaces through Performance-Guided Test Generation.
In: OOPSLA '14 , 49 (10). ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Schlipf, Mario :
Passwort-Richtlinien.
TU Darmstadt
[Masterarbeit], (2014)

Stopczynski, Martin ; Zugelder, Michael :
Reducing User Tracking through Automatic Web Site State Isolations.
In: Lecture Notes in Computer Science , 8783 . Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Suri, Neeraj ; Germanus, Daniel ; Roos, Stefanie ; Strufe, Thorsten :
Mitigating Eclipse Attacks in Peer-to-Peer Networks.
In Proceedings of IEEE Conference on Communications and Network Security (CNS)
[Konferenz- oder Workshop-Beitrag], (2014)

Ambrosin, Moreno ; Busold, Christoph ; Conti, Mauro ; Sadeghi, Ahmad-Reza ; Schunter, Matthias
Kutylowski, Miroslaw ; Vaidya, Jaideep (eds.) :

Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In: Computer Security - ESORICS 2014. Lecture Notes in Computer Science, 8712. Springer International Publishing , pp. 76-93. ISBN 978-3-319-11202-2
[Buchkapitel], (2014)

Bartsch, Steffen ; Boos, Carina ; Canova, Gamze ; Dyck, Dominic ; Henhapl, Birgit ; Schultheis, Michael ; Volkamer, Melanie
Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (eds.) :

Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten.
Workshop RiskKom der GI-FGn SECMGT & ECOM auf der Informatik 2014 Gesellschaft für Informatik
[Konferenz- oder Workshop-Beitrag], (2014)

Buchmann, Johannes ; El Bansarkhani, Rachid ; Hauke, Sascha
Brunetti, Gino ; Feld, Thomas ; Heuser, Lutz ; Schnittner, Joachim ; Webel, Christian (eds.) :

Towards Security Solutions for Emergent Business Software.
Future Business Software Conference 2012 Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Budurushi, Jurlind ; Neumann, Stephan ; Shala, Genc ; Volkamer, Melanie
Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (eds.) :

Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
In: Lecture Notes in Informatics (LNI) , 232 . Köllen Druck+Verlag GmbH, Bonn
[Konferenz- oder Workshop-Beitrag], (2014)

Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Borza, Roland
Mauw, Sjouke ; Jensen, Christian Damsgaard (eds.) :

NoPhish: An Anti-Phishing Education App.
In: Lecture Notes in Computer Science , 8743 . Springer International Publishing
[Konferenz- oder Workshop-Beitrag], (2014)

Conrad, Bernd ; Shirazi, Fatemeh :
Analyzing the Effectiveness of DoS Attacks on Tor.
7th International Conference on Security of Information and Networks (SIN 2014)
[Konferenz- oder Workshop-Beitrag], (2014)

Dagdelen, Özgür ; El Bansarkhani, Rachid ; Göpfert, Florian ; Güneysu, Tim ; Oder, Tobias ; Pöppelmann, Thomas ; Sanchez, Ana Helena ; Schwabe, Peter :
High-speed signatures from standard lattices.
Latincrypt 2014
[Konferenz- oder Workshop-Beitrag], (2014)

Feier, Christian ; Neumann, Stephan ; Volkamer, Melanie
Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (eds.) :

Coercion-Resistant Internet Voting in Practice.
In: Lecture Notes in Informatics (LNI) , 232 . Köllen Druck+Verlag GmbH, Bonn
[Konferenz- oder Workshop-Beitrag], (2014)

Geihs, Matthias ; Cabarcas, Daniel
Aranha, Diego F. ; Menezes, Alfred (eds.) :

Efficient Integer Encoding for Homomorphic Encryption via Ring Isomorphisms.
In: LNCS (8895). Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Herzberg, Amir ; Shulman, Haya :
DNS Security: Past, Present and Future.
Future Security Conference 2014
[Konferenz- oder Workshop-Beitrag], (2014)

Lillack, Max ; Kästner, Christian ; Bodden, Eric :
Tracking Load-time Configuration Option.
In: ASE '14 . ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Neumann, Stephan ; Kulyk, Oksana ; Volkamer, Melanie :
A Usable Android Application Implementing Distributed Cryptography For Election Authorities.
9th International Workshop on Frontiers in Availability, Reliability and Security - FARES 2014 IEEE
[Konferenz- oder Workshop-Beitrag], (2014)

Neumann, Stephan ; Olembo, Maina ; Renaud, Karen ; Volkamer, Melanie
Kö, Andrea ; Francesconi, Enrico (eds.) :

Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?
In: Lecture Notes in Computer Science , 8650 . Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Riecker, Michael ; Yuan, Dingwen ; El Bansarkhani, Rachid ; Hollick, Matthias :
Patrolling wireless sensor networks: Randomized intrusion detection.
10th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Q2SWinet ’14
[Konferenz- oder Workshop-Beitrag], (2014)

Schrittwieser, Sebastian ; Katzenbeisser, Stefan ; Merzdovnik, Georg ; Kieseberg, Peter ; Weippl, Edgar :
AES-SEC: Improving software obfuscation through hardware-assistance (short paper).
In: ARES '14 . IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2014)

Wiesmaier, Alexander ; Braun, Johannes ; Horsch, Moritz :
EP 2639997 - Method and system for secure access of a first computer to a second computer.

[Norm, Patent, Standard], (2014)

Asokan, N. ; Ekberg, Jan-Erik ; Kostiainen, Kari ; Rajan, Anand ; Rozas, Carlos ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian :
Mobile Trusted Computing.
In: Proceedings of the IEEE, 102 (8) pp. 1189-1206.
[Artikel], (2014)

Brzuska, Christina ; Farshim, Pooya ; Mittelbach, Arno
Garay, Arno A. ; Gennaro, Rosario (eds.) :

Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources.
In: Lecture Notes in Computer Science 8616 , 1 . Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza :
The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques.
BlackHat USA
[Konferenz- oder Workshop-Beitrag], (2014)

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian :
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
23rd USENIX Security Symposium
[Konferenz- oder Workshop-Beitrag], (2014)

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael :
Ad-hoc secure two-party computation on mobile devices using hardware tokens.
23rd USENIX Security Symposium (USENIX Security'14)
[Konferenz- oder Workshop-Beitrag], (2014)

Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza :
ASM: A Programmable Interface for Extending Android Security.
23rd USENIX Security Symposium
[Konferenz- oder Workshop-Beitrag], (2014)

Kogan, Kirill ; Nikolenko, Sergey I. ; Rottenstreich, Ori ; Culhane, William ; Eugster, Patrick :
SAX-PAC (Scalable And eXpressive PAcket Classification).
In: SIGCOMM '14 . ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Meyer, Christopher ; Somorovsky, Juraj ; Weiss, Eugen ; Schwenk, Jörg ; Schinzel, Sebastian ; Tews, Erik :
Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks.
In: SEC'14 . USENIX Association
[Konferenz- oder Workshop-Beitrag], (2014)

Oswald, Florian :
Secure Session Protocol - Concept and Implementation of a Protocol to Securely Operate Web Applications.
TU Darmstadt
[Masterarbeit], (2014)

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael :
Faster private set intersection based on OT extension.
23rd USENIX Security Symposium (USENIX Security'14)
[Konferenz- oder Workshop-Beitrag], (2014)

Suri, Neeraj ; Vateva-Gurova, Tsvetoslava ; Luna, Jesus ; Pellegrino, Giancarlo :
Towards a Framework for Assessing the Feasibility of Side-channel Attacks in Virtualized Environments.
Proceedings of the 11th International Conference on Security and Cryptography (SECRYPT)
[Konferenz- oder Workshop-Beitrag], (2014)

Conrad, Bernd ; Shirazi, Fatemeh :
A Survey on Tor and I2P.
Ninth International Conference on Internet Monitoring and Protection (ICIMP2014)
[Konferenz- oder Workshop-Beitrag], (2014)

Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza :
Security Analysis of Mobile Two-Factor Authentication Schemes.
In: Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, 18 (4)
[Artikel], (2014)

Ekberg, Jan-Erik ; Kostiainen, Kari ; Asokan, N. :
The Untapped Potential of Trusted Execution Environments on Mobile Devices.
In: Security Privacy, IEEE, 12 (4) pp. 29-37.
[Artikel], (2014)

Nyman, Thomas ; Ekberg, Jan-Erik ; Asokan, N. :
Citizen Electronic Identities using {TPM} 2.0.
In: CoRR, abs/1409.1023
[Artikel], (2014)

Renkema-Padmos, Arne ; Baum, Jerome ; Renaud, Karen ; Volkamer, Melanie :
Shake hands to bedevil: Securing email with wearable technology.
Proceedings of the eighth international symposium on human aspects of information security and assurance Lulu Press
[Konferenz- oder Workshop-Beitrag], (2014)

Suri, Neeraj ; Lanzaro, Anna ; Natella, Roberto ; Winter, Stefan ; Cotroneo, Domenico :
An Empirical Study of Injected versus Actual Interface Errors.
Proceedings of the 2014 International Symposium on Software Testing and Analysis (ISSTA)
[Konferenz- oder Workshop-Beitrag], (2014)

Volkamer, Melanie ; Renaud, Karen ; Renkema-Padmos, Arne :
Why doesn't Jane protect her privacy?
In: Lecture Notes in Computer Science . Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Arzt, Steven ; Bodden, Eric :
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes.
International Conference on Software Engineering(ICSE) 2014
[Konferenz- oder Workshop-Beitrag], (2014)

Braun, Johannes ; Buchmann, Johannes ; Mullan, Ciaran ; Wiesmaier, Alexander :
Long Term Confidentiality: a Survey.
In: Designs, Codes and Cryptography, 71 (3) pp. 459-478.
[Artikel], (2014)

Braun, Johannes ; Volk, Florian ; Classen, Jiska ; Buchmann, Johannes ; Mühlhäuser, Max :
CA Trust Management for the Web PKI.
In: IOS Press: Journal of Computer Security, 22(6), 2014 913-959 (2014).
[Artikel], (2014)

Bringer, Julien ; Chabanne, Hervé ; Favre, Mélanie ; Patey, Alain ; Schneider, Thomas ; Zohner, Michael :
GSHADE: Faster privacy-preserving distance computation and biometric identification.
2nd ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14) ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Budurushi, Jurlind ; Stockhardt, Simon ; Woide, Marcel ; Volkamer, Melanie
Tryfonas, Theo ; Askoxylakis, Ioannis (eds.) :

Paper Audit Trails and Voters' Privacy Concerns.
In: LNCS , 8533 . Springer International Publishing Switzerland
[Konferenz- oder Workshop-Beitrag], (2014)

Davi, Lucas ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza :
Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation.
51st Design Automation Conference (DAC) - Special Session: Trusted Mobile Embedded Computing
[Konferenz- oder Workshop-Beitrag], (2014)

Kolb, Nina ; Bartsch, Steffen ; Volkamer, Melanie ; Vogt, Joachim :
Capturing Attention for Warnings about Insecure Password Fields - Systematic Development of a Passive Security Intervention.
Human Aspects of Information Security, Privacy, and Trust. HAS 2014. Lecture Notes in Computer Science Springer, Cham
[Konferenz- oder Workshop-Beitrag], (2014)

Kong, Joonho ; Koushanfar, Farinaz ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian :
PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs.
Design Automation Conference (DAC) 2014 ACM Press
[Konferenz- oder Workshop-Beitrag], (2014)

Lagerspetz, E. ; Truong, Hien Thi Thu ; Tarkoma, S. ; Asokan, N. :
MDoctor: A Mobile Malware Prognosis Application.
Distributed Computing Systems Workshops (ICDCSW), 2014 IEEE 34th International Conference on
[Konferenz- oder Workshop-Beitrag], (2014)

Miettinen, Markus ; Heuser, Stephan ; Kronz, Wiebke ; Sadeghi, Ahmad-Reza ; Asokan, N. :
ConXsense – Context Profiling and Classification for Context-Aware Access Control (Best Paper Award).
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014)
[Konferenz- oder Workshop-Beitrag], (2014)

Mustafa, Hossen ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Xu, Wenyuan :
You Can Call But You Can't Hide: Detecting Caller ID Spoofing Attacks.
44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
[Konferenz- oder Workshop-Beitrag], (2014)

Renaud, Karen ; Volkamer, Melanie ; Maguire, Joseph :
ACCESS: Describing and Contrasting Authentication Mechanisms.
In: 8533 . Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Schmachtenberg, Max ; Strufe, Thorsten ; Paulheim, Heiko :
Enhancing a Location-based Recommendation System by Enrichment with Structured Data from the Web.
Proceedings of the 4th International Conference on Web Intelligence, Mining and Semantics (WIMS14)
[Konferenz- oder Workshop-Beitrag], (2014)

Schneider, Matthias ; Schneider, Thomas :
Notes on non-interactive secure comparison in “image feature extraction in the encrypted domain with privacy-preserving SIFT”.
2nd ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14) ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Bartsch, Steffen ; Volkamer, Melanie :
Expert Knowledge for Contextualized Warnings.

[Report], (2014)

Brzuska, Christina ; Mittelbach, Arno :
Using Indistinguishability Obfuscation via UCEs.
In: LNCS 8874 , 2 . Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Budurushi, Jurlind ; Volkamer, Melanie
Parycek, Peter ; Edelmann, Noella (eds.) :

Feasibility Analysis of Various Electronic Voting Systems for Complex Elections.
International Conference for E-Democracy and Open Government 2014 Edition Donau-Universität Krems
[Konferenz- oder Workshop-Beitrag], (2014)

Ghiglieri, Marco :
I Know What You Watched Last Sunday - A New Survey Of Privacy In HbbTV.

[Anderes], (2014)

Ghiglieri, Marco :
Incorrect HTTPS Certificate Validation in Samsung Smart TVs.

[Report], (2014)

Kremer, Steve ; Künnemann, Robert :
Automated analysis of security protocols with global state.
In: SP '14 . IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2014)

Mittelbach, Arno
Oswald, Elisabeth ; Nguyen, Arno Q. (eds.) :

Salvaging Indifferentiability in a Multi-stage Setting.
In: LNCS 8441 . Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Budurushi, Jurlind ; Jöris, Roman ; Volkamer, Melanie :
Implementing and evaluating a software-independent voting system for polling station elections.
In: Journal of Information Security and Applications, 19 (2) pp. 1-10.
[Artikel], (2014)

Christin, Delphine ; Pons-Sorolla, Daniel Rodriguez ; Hollick, Matthias ; Kanhere, Salil :
TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications.
In: International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) pp. 1-6.
[Artikel], (2014)

Classen, Jiska :
Reputation Systems for Trust Management in the Web PKI.
TU Darmstadt
[Masterarbeit], (2014)

Conrad, Bernd :
Analyzing the Effectiveness of DoS Attacks on Tor.
TU Darmstadt
[Masterarbeit], (2014)

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian :
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.

[Report], (2014)

Franke, Daniel :
Risk Simulations for the Web PKI.
TU Darmstadt
[Masterarbeit], (2014)

Koeberl, Patrick ; Schulz, Steffen ; Sadeghi, Ahmad-Reza ; Varadharajan, Vijay :
TrustLite: A Security Architecture for Tiny Embedded Devices.
European Conference on Computer Systems (EuroSys) ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Renkema-Padmos, Arne ; Volkamer, Melanie ; Renaud, Karen :
Building Castles in Quicksand: Blueprints of a Crowdsourced Study.
In: CHI 2014 ACM Digital Library
[Konferenz- oder Workshop-Beitrag], (2014)

Diaconita, Irina ; Reinhardt, Andreas ; Englert, Frank ; Christin, Delphine ; Steinmetz, Ralf :
Do You Hear What I Hear? Using Acoustic Probing to Detect Smartphone Locations.
In: PerCom Workshops 2014 . IEEE
[Konferenz- oder Workshop-Beitrag], (2014)

Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza :
On the (In)Security of Mobile Two-Factor Authentication.
Financial Cryptography and Data Security (FC'14) Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Dmitrienko, Alexandra ; Noack, David ; Sadeghi, Ahmad-Reza ; Yung, Moti :
POSTER: On Offline Payments with Bitcoin.
FC'2014: Financial Cryptography and Data Security Conference
[Konferenz- oder Workshop-Beitrag], (2014)

Ghiglieri, Marco ; Stopczynski, Martin ; Waidner, Michael :
Personal DLP for Facebook.
In: 6 . IEEE
[Konferenz- oder Workshop-Beitrag], (2014)

Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza :
ASM: A Programmable Interface for Extending Android Security.

[Report], (2014)

Senftleben, Marius ; Bucicoiu, Mihai ; Tews, Erik ; Armknecht, Frederik ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza :
MoP-2-MoP - Mobile private microblogging.
Financial Cryptography and Data Security (FC'14) Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Sohr, Karsten ; Bartsch, Steffen ; Volkamer, Melanie ; Berger, Bernhard ; Bodden, Eric ; Brucker, Achim ; Maseberg, Sönke ; Kus, Mehmet ; Heider, Jens :
Zertifizierte Datensicherheit für mobile Anwendungen.
In: Lecture Notes in Informatics , 228 . Gesellschaft für Informatik e.V.
[Konferenz- oder Workshop-Beitrag], (2014)

Bartsch, Steffen ; Boos, Carina ; Dyck, Dominic ; Schwarz, Christopher ; Theuerling, Heike ; Henhapl, Birgit ; Volkamer, Melanie :
Unterstützung für ein risikobewusstes Verhalten im Internet.
Vielfalt der Informatik
[Konferenz- oder Workshop-Beitrag], (2014)

Boos, Carina ; Bartsch, Steffen ; Volkamer, Melanie :
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung.
In: Computer und Recht (2) pp. 119-127.
[Artikel], (2014)

Budurushi, Jurlind ; Woide, Marcel ; Volkamer, Melanie :
Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote.
Workshop on Usable Security (USEC) Internet Society
[Konferenz- oder Workshop-Beitrag], (2014)

Busold, Christoph ; Dmitrienko, Alexandra ; Wachsmann, Christian :
Key2Share for Authentication Services.
SmartCard Workshop
[Konferenz- oder Workshop-Beitrag], (2014)

Inel, Miray :
Entwurf und Implementierung von Plug-ins für JCrypTool.
TU Darmstadt
[Masterarbeit], (2014)

Olembo, Maina ; Renaud, Karen ; Bartsch, Steffen ; Volkamer, Melanie :
Voter, What Message Will Motivate You to Verify Your Vote?
Workshop on Usable Security (USEC) Internet Society
[Konferenz- oder Workshop-Beitrag], (2014)

Schneider, Markus ; Enzmann, Matthias ; Stopczynski, Martin :
Web-Tracking-Report 2014.

[Report], (2014)

Ghiglieri, Marco ; Tews, Erik :
A Privacy Protection System for HbbTV in Smart TVs.
2014 IEEE 11th Consumer Communications and Networking Conference (CCNC) IEEE
[Konferenz- oder Workshop-Beitrag], (2014)

Henning, Maria ; Budurushi, Jurlind ; Volkamer, Melanie :
Öffentlichkeitsgrundsatz und Stimmzettelbelege.

[Report], (2014)

Armknecht, Frederik ; Gagliardoni, Tommaso ; Katzenbeisser, Stefan ; Peter, Andreas :
General Impossibility of Group Homomorphic Encryption in the Quantum World.
In: Lecture Notes in Computer Science , 8383 .
[Konferenz- oder Workshop-Beitrag], (2014)

Basin, David ; Caronni, Germano ; Ereth, Sarah ; Harvan, Matus ; Klaedtke, Felix ; Mantel, Heiko :
Scalable Offline Monitoring.
In: Proceedings of the 14th International Conference on Runtime Verification (RV), Heidelberg, Germany. Springer , Heidelberg, Germany
[Konferenz- oder Workshop-Beitrag], (2014)

Biedermann, Sebastian ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Strufe, Thorsten ; Peter, Andreas :
ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.
In: SOFSEM 2014: Theory and Practice of Computer Science, 8327 pp. 114-125.
[Artikel], (2014)

Biedermann, Sebastian ; Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan :
Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM.
IACR Cryptology ePrint Archive 2014
[Konferenz- oder Workshop-Beitrag], (2014)

Buchner, Karolina ; Lissermann, Roman ; Holmquist, Lars Erik :
Interaction Techniques for Co-located Collaborative TV.
CHI 2014 ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Catuogno, Luigi ; Löhr, Hans ; Winandy, Marcel ; Sadeghi, Ahmad-Reza :
A trusted versioning file system for passive mobile storage devices.
J. Network and Computer Applications
[Konferenz- oder Workshop-Beitrag], (2014)

Christin, Delphine ; Engelmann, Franziska ; Hollick, Matthias :
Usable Privacy for Mobile Sensing Applications.
In: Proceedings of the 8th Workshop on Information Security Theory and Practice (WISTP) pp. 92-107.
[Artikel], (2014)

Dagdelen, Özgür ; Fischlin, Marc :
Intercepting Tokens in Cryptographic Protocols: The Empire Strikes Back in the Clone Wars.
ISIT 2014 - IEEE International Symposium on Information Theory
[Konferenz- oder Workshop-Beitrag], (2014)

Dagdelen, Özgür ; Venturi, Daniele :
A Second Look at Fischlin’s Transformation.
Africacrypt 2014
[Konferenz- oder Workshop-Beitrag], (2014)

Degabriele, Jean Paul ; Fehr, Victoria ; Fischlin, Marc ; Gagliardoni, Tommaso ; Günther, Felix ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Paterson, Kenneth G.
Chen, Liqun ; Mitchell, Chris (eds.) :

Unpicking PLAID: A Cryptographic Analysis of an ISO-standards-track Authentication Protocol.
In: LNCS (8893). Springer
[Konferenz- oder Workshop-Beitrag], (2014)

El Bansarkhani, Rachid ; Buchmann, Johannes :
LCPR: High Performance Compression Algorithm for Lattice-Based Signatures and Schnorr-like Constructions.
IACR Cryptology ePrint Archive 2014: 334
[Konferenz- oder Workshop-Beitrag], (2014)

El Bansarkhani, Rachid ; Buchmann, Johannes
Pointcheval, David ; Vergnaud, Damien (eds.) :

Towards Lattice Based Sequential Aggregate Signatures.
In: LNCS (8469). Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Fischlin, Marc ; Lehmann, Anja ; Pietrzak, Krzysztof :
Robust Multi-Property Combiners for Hash Functions.
J. Cryptology
[Konferenz- oder Workshop-Beitrag], (2014)

Franz, Martin ; Holzer, Andreas ; Katzenbeisser, Stefan ; Schallhart, Christian ; Veith, Helmut :
CBMC-GC: An ANSI C Compiler for Secure Two-Party Computations.
Compiler Construction (CC)2014, Lecture Notes in Computer Science
[Konferenz- oder Workshop-Beitrag], (2014)

Günther, Felix ; Manulis, Mark ; Peter, Andreas :
Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation.
IACR Cryptology ePrint Archive 2014
[Konferenz- oder Workshop-Beitrag], (2014)

Henning, Maria ; Budurushi, Jurlind ; Volkamer, Melanie :
Elektronsiche Wahlen durch Stimmzettelbelege? Untersuchung möglicher Umsetzungen des Öffentlichkeitsgrundsatzes bei elektronischen Wahlen.
In: MultiMedia und Recht (MMR) pp. 154-158.
[Artikel], (2014)

Horsch, Moritz ; Derler, David ; Rath, Christof ; Haase, Hans-Martin ; Wich, Tobias :
Open Source für europäische Signaturen.
In: >Datenschutz und Datensicherheit, 38 (4) pp. 237-241.
[Artikel], (2014)

Mohamed, Mohamed Saied Emam ; Buchmann, Johannes :
Mutant Differential Fault Analysis of Trivium MDFA.
the 17th Annual International Conference on Information Security and Cryptology, ICISC2014, Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie
Zissis, Dimitrios ; Lekkas, Dimitrios (eds.) :

Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting.
In: Keine Angabe Design, Development, and Use of Secure Electronic Voting Systems. IGI Global , pp. 27-61.
[Buchkapitel], (2014)

Neumann, Stephan ; Volkamer, Melanie
Zissis, Dimitrios ; Lekkas, Dimitrios (eds.) :

A Holistic Framework for the Evaluation of Internet Voting Systems.
In: Keine Angabe Design, Development, and Use of Secure Electronic Voting Systems. IGI Global , pp. 76-91.
[Buchkapitel], (2014)

Riecker, Michael ; Biedermann, Sebastian ; El Bansarkhani, Rachid ; Hollick, Matthias :
Lightweight Energy Consumption Based Intrusion Detection System for Wireless Sensor Networks.
In: International Journal of Information Security 2014 pp. 61-69.
[Artikel], (2014)

Roos, Stefanie ; Strufe, Thorsten :
NextBestOnce: Achieving Polylog Routing despite Non-greedy Embeddings.
In: CoRR, abs/1401.2165
[Artikel], (2014)

Sahami Shirazi, Alireza ; Abdelrahman, Yomna ; Henze, Niels ; Schneegass, Stefan ; Khalilbeigi, Mohammadreza ; Schmidt, Albrecht :
Exploiting thermal reflection for interactive systems.
Proceedings of the 32nd annual ACM conference on Human factors in computing systems
[Konferenz- oder Workshop-Beitrag], (2014)

Schaller, André ; Arul, Tolga ; van der Leest, Vincent ; Katzenbeisser, Stefan :
Lightweight Anti-counterfeiting Solution for Low-End Commodity Hardware Using Inherent PUFs.
International Conference on Trust & Trustworthy Computing ( TRUST)
[Konferenz- oder Workshop-Beitrag], (2014)

Schrittwieser, Sebastian ; Katzenbeisser, Stefan ; Kieseberg, Peter ; Huber, Markus ; Leithner, Manuel ; Mulazzani, Martin ; Weippl, Edgar :
Covert Computation - Hiding code in code through compile-time obfuscation.
Computers & Security
[Konferenz- oder Workshop-Beitrag], (2014)

Shulman, Haya :
Pretty Bad Privacy: Pitfalls of DNS Encryption.
Proceedings of the 13th annual ACM workshop on Privacy in the electronic society
[Konferenz- oder Workshop-Beitrag], (2014)

Shulman, Haya ; Waidner, Michael :
Fragmentation Considered Leaking: Port Inference for DNS Poisoning.
International Conference on Applied Cryptography and Network Security (ACNS 2014)
[Konferenz- oder Workshop-Beitrag], (2014)

Suri, Neeraj ; Taha, Ahmed ; Trapero, Ruben ; Luna, Jesus :
AHP-Based Quantitative Approach for Assessing & Comparing Cloud Security.
Proceedings of the 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14)
[Konferenz- oder Workshop-Beitrag], (2014)

Vigil, Martín ; Weinert, Christian ; Braden, Kjell ; Demirel, Denise ; Buchmann, Johannes :
A performance analysis of long-term archiving techniques.
IEEE - High Performace Computing and Communications (HPCC 2014)
[Konferenz- oder Workshop-Beitrag], (2014)

2013

Asokan, N. ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Kostiainen, Kari ; Reshetova, Elena ; Sadeghi, Ahmad-Reza:
Mobile Platform Security.
Synthesis Lectures on Information Security, Privacy, and Trust, 4 (3). Morgan & Claypool
[Buch], (2013)

Buchmann, Johannes ; Karatsiolis, Evangelos ; Wiesmaier, Alexander:
Introduction to Public Key Infrastructures.
Springer-Verlag Berlin Heidelberg ISBN 978-3-642-40656-0
[Buch], (2013)

Jayalath, Chamikara ; Stephen, Julian James ; Eugster, Patrick :
Atmosphere: A Universal Cross-Cloud Communication Infrastructure.
In: Lecture Notes in Computer Science (8275). Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Klos, Christian :
Design and deployment of a public key infrastructure.
TU Darmstadt
[Masterarbeit], (2013)

Nagy, Marcin ; Cristofaro, Emiliano De ; Dmitrienko, Alexandra ; Asokan, N. ; Sadeghi, Ahmad-Reza :
Do I know you? – Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications.
Annual Computer Security Applications Conference (ACSAC 2013)
[Konferenz- oder Workshop-Beitrag], (2013)

Neumann, Stephan ; Feier, Christian ; Volkamer, Melanie ; Koenig, Reto :
Towards A Practical JCJ / Civitas Implementation.
In: Cryptology ePrint Archive: Report 2013/464, 2013.
[Konferenz- oder Workshop-Beitrag], (2013)

Neumann, Stephan ; Feier, Christian ; Volkamer, Melanie ; Koenig, Reto
Horbach, Matthias (ed.) :

Towards A Practical JCJ / Civitas Implementation.
INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl
[Konferenz- oder Workshop-Beitrag], (2013)

Stephen, Julian James ; Eugster, Patrick
Eyers, David ; Schwan, Karsten (eds.) :

Assured Cloud-Based Data Analysis with ClusterBFT.
In: Lecture Notes in Computer Science (8275). Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Albrecht, Martin ; Fitzpatrick, Robert ; Göpfert, Florian :
On the Efficacy of Solving LWE by Reduction to Unique-SVP.
ICISC 2013
[Konferenz- oder Workshop-Beitrag], (2013)

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian :
A Security Framework for Analysis and Design of Software Attestation.
ACM Conference on Computer and Communications Security (CCS) ACM Press
[Konferenz- oder Workshop-Beitrag], (2013)

Bodden, Eric ; Rasthofer, Siegfried ; Richter, Philipp ; Roßnagel, Alexander :
Schutzmaßnahmen gegen datenschutzunfreundliche Smartphone-Apps – Technische Möglichkeiten und rechtliche Zulässigkeit des Selbstdatenschutzes bei Apps.
In: Datenschutz und Datensicherheit, 11/2013 720 - 725.
[Artikel], (2013)

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael :
Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones.
19. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag) Fachgruppe Kryptographie in der Gesellschaft für Informatik
[Konferenz- oder Workshop-Beitrag], (2013)

Dobre, Dan ; Karame, Ghassan O. ; Li, Wenting ; Majuntke, Matthias ; Suri, Neeraj ; Vukolic, Marko :
PoWerStore: Proofs of Writing for Efficient and Robust Storage.
In: CCS '13 . ACM
[Konferenz- oder Workshop-Beitrag], (2013)

Tasharofi, Samira ; Pradel, Michael ; Lin, Yu ; Johnson, Ralph :
Bita: Coverage-Guided, Automatic Testing of Actor Programs.
2013 28th IEEE/ACM International Conference on Automated Software Engineering (ASE) IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2013)

Tews, Erik ; Weiner, M. ; Massar, M. ; Giese, D. ; Wieser, W. :
Security analysis of a widely deployed locking system.
In:
[Artikel], (2013)

Volkamer, Melanie ; Renaud, Karen
Fischlin, Marc ; Katzenbeisser, Stefan (eds.) :

Mental Models – General Introduction and Review of Their Application to Human-Centred Security.
In: Number Theory and Cryptography. Lecture Notes in Computer Science, 8260. Springer Berlin Heidelberg Berlin-Heidelberg , pp. 255-280. ISBN 978-3-642-42000-9
[Buchkapitel], (2013)

Ghiglieri, Marco ; Oswald, Florian ; Tews, Erik
Schiele, Otto ; Schön, Willi (eds.) :

HbbTV: Neue Funktionen mit möglichen Nebenwirkungen.
FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien
[Konferenz- oder Workshop-Beitrag], (2013)

Gutmann, Andreas ; Matsuura, Kanta :
The use of linguistics in cryptography and its application to improve the HB protocol.

[Anderes], (2013)

Stancill, Blaine ; Snow, Kevin ; Otterness, Nathan ; Monrose, Fabian ; Davi, Lucas ; Sadeghi, Ahmad-Reza :
Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets.
16th Research in Attacks, Intrusions and Defenses (RAID) Symposium
[Konferenz- oder Workshop-Beitrag], (2013)

Weinert, Christian :
Content Integrity System and Notarisation for Long-Term Protection of Data Objects.
TU Darmstadt
[Bachelorarbeit], (2013)

Alaoui, Sidi Mohamed El Yousfi ; El Bansarkhani, Rachid ; Cayrel, Pierre-Louis ; Hoffmann, Gerhard :
Code based Identification and Signature Schemes in Software.
Second International Workshop on Modern Cryptography and Security Engineering - MoCrySen 2013
[Konferenz- oder Workshop-Beitrag], (2013)

Bartsch, Steffen ; Volkamer, Melanie :
Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions.
RiskKom-Workshop, INFORMATIK 2013 Gesellschaft für Informatik
[Konferenz- oder Workshop-Beitrag], (2013)

Baumann, Paul ; Kleiminger, Wilhelm ; Santini, Silvia :
How Long Are You Staying? Predicting Residence Time from Human Mobility Traces.
In: MobiCom'13 . ACM
[Konferenz- oder Workshop-Beitrag], (2013)

Braun, Johannes ; Kiefer, Franziskus ; Hülsing, Andreas
Katsikas, Sokratis ; Agudo, Isaac (eds.) :

Revocation & Non-Repudiation: When the first destroys the latter.
In: LNCS (8341). Springer Berlin Heidelberg
[Konferenz- oder Workshop-Beitrag], (2013)

Buchmann, Johannes ; Nebel, Maxi ; Roßnagel, Alexander ; Shirazi, Fatemeh ; Simo, Hervais ; Waidner, Michael:
Personal Information Dashboard: Putting the Individual Back in Control.
Iso Press Amsterdam , pp. 139-164. ISBN 978-1-61499-294-3 (print) | 978-1-61499-295-0 (online)
[Buch], (2013)

Herzberg, Amir ; Shulman, Haya :
Limiting MitM to MitE Covert-Channels.
In: ARES 2013 . IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2013)

Neumann, Stephan ; Kahlert, Anna ; Henning, Maria ; Richter, Philipp ; Jonker, Hugo ; Volkamer, Melanie
Wimmer, Maria ; Tambouris, Efthimios ; Macintosh, Ann (eds.) :

Modeling the German Legal Latitude Principles.
In: Lecture Notes in Computer Science , 8075 . Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Renaud, Karen ; Mayer, Peter ; Volkamer, Melanie ; Maguire, Joseph :
Are Graphical Authentication Mechanisms As Strong As Passwords?
Federated Conference on Computer Science and Information Systems 2013
[Konferenz- oder Workshop-Beitrag], (2013)

Wachsmann, Christian :
Trusted and Privacy-Preserving Embedded Systems.
Technische Universität Darmstadt
[Dissertation]

Braden, Kjell :
XML Advanced Electronic Signatures and XML Evidence Record Syntax for Long-Term Protection of Data objects.
TU Darmstadt
[Masterarbeit], (2013)

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza :
Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
22nd USENIX Security Symposium (USENIX Security '13) USENIX
[Konferenz- oder Workshop-Beitrag], (2013)

El Bansarkhani, Rachid ; Buchmann, Johannes
Lange, Tanja ; Lauter, Kristin ; Lisonek, Petr (eds.) :

Improvement and Efficient Implementation of a Lattice-based Signature Scheme.
In: LNCS (8282).
[Konferenz- oder Workshop-Beitrag], (2013)

Gleser, Michael :
Policy-basierter Vergleich von Zertifizierungspraktiken innerhalb der Web-PKI.
TU Darmstadt
[Masterarbeit], (2013)

Kalabis, Lukas ; Wolf, Ruben ; Kunz, Thomas :
Sichere Nutzung von Cloud-Speicherdiensten.
In: Datenschutz und Datensicherheit, 37 (8) pp. 512-516.
[Artikel], (2013)

Miettinen, Markus ; Heuser, Stephan ; Kronz, Wiebke ; Sadeghi, Ahmad-Reza ; Asokan, N. :
ConXsense – Context Sensing for Adaptive Usable Access Control.

[Report], (2013)

Octeau, Damien ; McDaniel, Patrick ; Jha, Somesh ; Bartel, Alexandre ; Bodden, Eric ; Klein, Jacques ; Le Traon, Yves :
Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis.
In: SEC'13 . USENIX Association
[Konferenz- oder Workshop-Beitrag], (2013)

Oren, Yossef ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian :
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs.
In: Lecture Notes on Computer Science (LNCS) , 8068 . Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Rynkowski, Gregor :
Individuell angepasstes Vertrauen in die Web-PKI: Eine Analyse des Einsparungspotentials an vertrauenswürdigen CAs.
TU Darmstadt
[Masterarbeit], (2013)

Snow, Kevin ; Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Monrose, Fabian ; Sadeghi, Ahmad-Reza :
Just-In-Time Code Reuse: the More Things Change, the More They Stay the Same.
BlackHat USA
[Konferenz- oder Workshop-Beitrag], (2013)

Tews, Erik :
How to enable Live Cloning of Virtual Machines using the Xen Hypervisor.

[Report], (2013)

Bartsch, Steffen ; Berger, Bernhard ; Bunke, Michaela ; Sohr, Karsten
Pernul, Günther ; Sandhu, Ravi (eds.) :

The Transitivity-of-Trust Problem in Android Application Interaction.
8th International Conference on Availability, Reliability and Security (ARES 2013) IEEE
[Konferenz- oder Workshop-Beitrag], (2013)

Bernhard, David ; Neumann, Stephan ; Volkamer, Melanie
Schneider, Steve ; Heather, James ; Teague, Vanessa (eds.) :

Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
In: Lecture Notes in Computer Science , 7985 . Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Braun, Kristoffer ; Budurushi, Jurlind ; Volkamer, Melanie
Horbach, Matthias (ed.) :

Machbarkeitsanalyse der UniWahl4 Software für Wahlen an der TU Darmstadt.
INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl
[Konferenz- oder Workshop-Beitrag], (2013)

Budurushi, Jurlind ; Henning, Maria ; Volkamer, Melanie
Schneider, Steve ; Heather, James ; Teague, Vanessa (eds.) :

Vote Casting in Any Preferred Constituency: A New Voting Channel.
In: Lecture Notes in Computer Science , 7985 . Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Budurushi, Jurlind ; Neumann, Stephan ; Olembo, Maina ; Volkamer, Melanie
Pernul, Günther ; Sandhu, Ravi (eds.) :

Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
8th International Conference on Availability, Reliability and Security (AReS 2013) IEEE
[Konferenz- oder Workshop-Beitrag], (2013)

Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Mühlhäuser, Max :
A Trust-aware Framework for Evaluating Security Controls of Service Providers in Cloud Marketplaces.
Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on IEEE
[Konferenz- oder Workshop-Beitrag], (2013)

Hamann, Tobias :
The BKZ Simulation Algorithm.
Tu Darmstadt
[Masterarbeit], (2013)

Nas, Aysegül ; Filyanov, Atanas ; Volkamer, Melanie ; Winandy, Marcel :
Poster: On the Usability of Secure GUIs.

[Anderes], (2013)

Neumann, Stephan ; Kulyk, Oksana ; Murati, Lulzim ; Volkamer, Melanie :
Towards a Practical Mobile Application for Election Authorities (Demo).
4th International Conference on e-Voting and Identity (VoteID13)
[Konferenz- oder Workshop-Beitrag], (2013)

Northrop, Erik ; Lipford, Heather Richter ; Bartsch, Steffen ; Volkamer, Melanie :
Poster: Content and Context for Browser Warnings - Achieving Security using Cartoons and Humor.

[Anderes], (2013)

Olembo, Maina ; Bartsch, Steffen ; Volkamer, Melanie
Schneider, Steve ; Heather, James ; Teague, Vanessa (eds.) :

Mental Models of Verifiability in Voting.
In: Lecture Notes in Computer Science , 7985 . Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Vigil, Martín ; Cabarcas, Daniel ; Huang, Jingwei ; Buchmann, Johannes :
Assessing Trust in the Long-Term Protection of Documents.
18th IEEE Symposium on Computers and Communications (IEEE ISCC 2013)
[Konferenz- oder Workshop-Beitrag], (2013)

Buchmann, Johannes (ed.), :
Internet Privacy: Options for adequate realization.
Springer Vieweg; 2013 edition ISBN 978-3642379123
[Buch], (2013)

Bleikertz, Sören ; Bugiel, Sven ; Ideler, Hugo ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza :
Client-controlled Cryptography-as-a-Service in the Cloud.
11th International Conference on Applied Cryptography and Network Security (ACNS 2013)
[Konferenz- oder Workshop-Beitrag], (2013)

Geihs, Matthias :
Evaluation of homomorphic encryption for machine learning.
TU Darmstadt
[Masterarbeit], (2013)

Simo-Fhom, Hervais :
Internet Privacy. Taking opportunities, assessing risks, building trust.
In: >Springer Vieweg; 2013
[Artikel], (2013)

Strenzke, Falko :
Timing Attacks against the Syndrome Inversion in Code-Based Cryptosystems.
In: LNCS (7932). Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Volkamer, Melanie ; Stockhardt, Simon ; Bartsch, Steffen ; Kauer, Michaela :
Adopting the CMU/APWG Anti-Phishing Landing Page idea for Germany.
3rd Workshop on Socio-Technical Aspects in Security and Trust (STAST), 2013 IEEE Digital Library
[Konferenz- oder Workshop-Beitrag], (2013)

Winter, Stefan ; Tretter, Michael ; Sattler, Benjamin ; Suri, Neeraj :
simFI: From Single to Simultaneous Software Fault Injections.
2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2013)

Armknecht, F. ; Katzenbeisser, S. ; Peter, A. :
Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications.
In: Designs, Codes and Cryptography, 67 (2) pp. 209-232.
[Artikel], (2013)

Baumöller, Claas ; Schaaf, Joachim ; Horsch, Moritz ; Wiesmaier, Alexander ; Braun, Johannes :
EP 2600270 Identification element-based authentication and identification with decentralised service use.

[Norm, Patent, Standard], (2013)

Braun, Johannes ; Horsch, Moritz ; Hülsing, Andreas :
Effiziente Umsetzung des Kettenmodells unter Verwendung vorwärtssicherer Signaturverfahren.
Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress SecuMedia Verlag
[Konferenz- oder Workshop-Beitrag], (2013)

Buchmann, Johannes ; Demirel, Denise ; van de Graaf, Jeroen
Sadeghi, Ahmad-Reza (ed.) :

Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy.
In: LNCS (7859). Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza :
Gadge Me If You Can - Secure and Efficient Ad-hoc Instruction-Level Randomization for x86 and ARM.
8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013)
[Konferenz- oder Workshop-Beitrag], (2013)

Fleischhacker, N. ; Günther, F. ; Kiefer, F. ; Poettering, B. :
Pseudorandom Signatures.
In: >8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), 7-10 May, Hangzhou, China
[Artikel], (2013)

Ghiglieri, Marco ; Oswald, Florian ; Tews, Erik :
HbbTV - I Know What You Are Watching.
13. Deutschen IT-Sicherheitskongresses SecuMedia Verlags-GmbH
[Konferenz- oder Workshop-Beitrag], (2013)

Horsch, Moritz ; Hühnlein, Detlef ; Breitenstrom, Christian ; Wieland, Thomas ; Wiesmaier, Alexander ; Biallowons, Benedikt ; Petrautzki, Dirk ; Potzernheim, Simon ; Schmölz, Johannes ; Wesner, Alexander ; Wich, Tobias :
Die Open eCard App für mehr Transparenz, Vertrauen und Benutzerfreundlichkeit beim elektronischen Identitätsnachweis.
Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress SecuMedia Verlag
[Konferenz- oder Workshop-Beitrag], (2013)

Hülsing, Andreas ; Braun, Johannes :
Langzeitsichere Signaturen durch den Einsatz hashbasierter Signaturverfahren.
Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress SecuMedia Verlag
[Konferenz- oder Workshop-Beitrag], (2013)

Kieseberg, Peter ; Huber, Markus ; Leithner, Manuel ; Mulazzani, Martin ; Weippl, Edgar :
Covert Computation: Hiding Code in Code for Obfuscation Purposes.
In: ASIA CCS '13 . ACM
[Konferenz- oder Workshop-Beitrag], (2013)

Lissermann, Roman ; Huber, Jochen ; Hadjakos, Aristotelis ; Mühlhäuser, Max :
EarPut: Augmenting Behind-the-Ear Devices for Ear-based Interaction.
CHI EA '13: Proceedings of the 2013 ACM annual conference extended abstracts on Human Factors in Computing Systems Extended Abstracts ACM
[Konferenz- oder Workshop-Beitrag], (2013)

Lissermann, Roman ; Huber, Jochen ; Steimle, Jürgen ; Mühlhäuser, Max :
Permulin: Personal In- and Output on Interactive Surfaces.
CHI '13 Interactivity ACM
[Konferenz- oder Workshop-Beitrag], (2013)

Pradel, Michael ; Gross, Thomas R. :
Automatic testing of sequential and concurrent substitutability.
In: ICSE '13 . IEEE Press
[Konferenz- oder Workshop-Beitrag], (2013)

Snow, Kevin ; Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Monrose, Fabian ; Sadeghi, Ahmad-Reza :
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization (Best Student Paper Award).
34th IEEE Symposium on Security and Privacy (Oakland 2013)
[Konferenz- oder Workshop-Beitrag], (2013)

Volkamer, Melanie ; Bartsch, Steffen ; Kauer, Michaela
University, Plymouth (ed.) :

Contextualized Security Interventions in Password Transmission Scenarios.
European Information Security Multi-Conference (EISMC 2013)
[Konferenz- oder Workshop-Beitrag], (2013)

Felzer, Torsten ; Rinderknecht, Stephan :
Mouse mode of OnScreenDualScribe: three types of keyboard-driven mouse replacement.
In: CHI EA '13 . ACM
[Konferenz- oder Workshop-Beitrag], (2013)

Funke, Sebastian :
Benutzerstudie zur Visualisierung von privatsphärenkritischen Nachrichten in sozialen Netzwerken.
TU Darmstadt
[Masterarbeit], (2013)

Bauer, Gerald ; Blanke, Ulf ; Lukowicz, Paul ; Schiele, Bernt :
User Independent, Multi-Modal Spotting of Subtle Arm Actions with Minimal Training Data.
2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops) IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2013)

Kauer, Michaela ; Günther, Sebastian ; Storck, Daniel ; Volkamer, Melanie :
A Comparison of American and German Folk Models of Home Computer Security.
Human Aspects of Information Security, Privacy, and Trust - First International Conference, HAS 2013, Held as Part of HCI International 2013 Springer LNCS
[Konferenz- oder Workshop-Beitrag], (2013)

Kocabas, Unal ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza :
Memristor PUFs: A New Generation of Memory-based Physically Unclonable Functions.
Conference on Digital Automation and Test Europe (DATE) Interactive Presentation
[Konferenz- oder Workshop-Beitrag], (2013)

Sepehrdad, Pouyan ; Susil, Petr ; Vaudenay, Serge ; Vuagnoux, Martin :
Smashing WEP in a Passive Attack.
20th International Workshop on Fast Software Encryption (FSE)
[Konferenz- oder Workshop-Beitrag], (2013)

Zöller, Sebastian ; Reinhardt, Andreas ; Wachtel, Markus ; Steinmetz, Ralf :
Integrating Wireless Sensor Nodes and Smartphones for Energy - Efficient Data Exchange in Smart Environments.
In: PERCOM Workshops . IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2013)

Busold, Christoph ; Dmitrienko, Alexandra ; Seudié, Hervé ; Taha, Ahmed ; Sobhani, Majid ; Wachsmann, Christian ; Sadeghi, Ahmad-Reza :
Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer.
In: CODASPY '13 . ACM Press
[Konferenz- oder Workshop-Beitrag], (2013)

Franz, M. ; Deiseroth, B. ; Hamacher, K. ; Jha, Somesh ; Katzenbeisser, S. ; Schröder, H. :
Secure computations on non-integer values with applications to privacy-preserving sequence analysis.
In: Information Security Technical Report, 17 (3) pp. 117-128.
[Artikel], (2013)

Kerschbaum, Florian ; Schneider, Thomas ; Schröpfer, Axel :
Short Talk: Automatic Protocol Selection in Secure Two-Party Computations.
In: 20. Network and Distributed System Security Symposium (NDSS'13)
[Anderes], (2013)

Neumann, Stephan ; Kahlert, Anna ; Henning, Maria ; Jonker, Hugo ; Volkamer, Melanie :
Informatische Modellierung der Prinzipien des gesetzlichen Gestaltungsspielraums im Hinblick auf Wahlsysteme.
Abstraction and Application: Proceedings of the 16th International Legal Informatics Symposium (IRIS 2013)
[Konferenz- oder Workshop-Beitrag], (2013)

Olembo, Maina ; Volkamer, Melanie
Saeed, Saqib ; Reddick, Christopher (eds.) :

E-Voting System Usability: Lessons for Interface Design, User Studies, and Usability Criteria.
In: Keine Angabe IGI Global , 172 - 201. ISBN 978-1-4666-3640-8
[Buchkapitel], (2013)

Braun, Johannes ; Wiesmaier, Alexander ; Buchmann, Johannes
Sprague, Ralph H. (ed.) :

On the Security of Encrypted Secret Sharing.
46th Hawaii International Conference on Systems Science (HICSS-46) IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2013)

Moecke, Cristian Thiago ; Volkamer, Melanie :
Usable secure email communications: criteria and evaluation of existing approaches.
In: Information Management & Computer Security, 21 pp. 41-52.
[Artikel], (2013)

Peter, Andreas ; Tews, Erik ; Katzenbeisser, Stefan :
Efficiently Outsourcing Multiparty Computation under Multiple Keys.
In: >IACR Cryptology ePrint Archive, Report 2013/013
[Artikel], (2013)

Wälde, Julian :
Algebraic Cryptanalysis of Round Reduced Versions of CSA and the LED Family of Block Ciphers.
TU Darmstadt
[Masterarbeit], (2013)

Bartsch, Steffen ; Volkamer, Melanie ; Theuerling, Heike ; Karayumak, Fatih :
Contextualized Web warnings, and how they cause distrust.
Trust and Trustworthy Computing (TRUST 2013) Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Braun, Johannes ; Rynkowski, Gregor :
The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI.
Social Computing (SocialCom) - PASSAT2013
[Konferenz- oder Workshop-Beitrag], (2013)

Buchmann, Johannes ; Cabarcas, Daniel ; Göpfert, Florian ; Hülsing, Andreas ; Weiden, Patrick
Lange, Tanja ; Lauter, Kristin ; Lisonek, Petr (eds.) :

Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers.
In: LNCS (8282). Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Buchmann, Johannes ; Dahmen, Erik ; Ereth, Sarah ; Hülsing, Andreas ; Rückert, Markus :
On the security of the Winternitz one-time signature scheme.
In: International Journal of Applied Cryptography, 3 (1) pp. 84-96.
[Artikel], (2013)

Cabarcas, Daniel ; Göpfert, Florian ; Weiden, Patrick :
Provably Secure LWE-Encryption with Uniform Secret.

[Anderes], (2013)

Clauß, Sebastian ; Schiffner, Stefan ; Kerschbaum, Florian :
k-anonymous reputation.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13 ACM
[Konferenz- oder Workshop-Beitrag], (2013)

Dagdelen, Özgür ; Fischlin, Marc ; Gagliardoni, Tommaso :
The Fiat-Shamir Transformation in the Quantum World.
ASIACRYPT 2013
[Konferenz- oder Workshop-Beitrag], (2013)

Demirel, Denise :
Universally Veriable Poll-Site Voting Schemes Providing Everlasting Privacy.
TU Darmstadt
[Dissertation]

Demirel, Denise ; Henning, Maria ; van de Graaf, Jeroen ; Ryan, Peter Y. A. ; Buchmann, Johannes
Heather, James ; Schneider, Steve ; Teague, Vanessa (eds.) :

Prêt à Voter Providing Everlasting Privacy.
In: LNCS (7985). Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Egert, Rolf :
Lattice-based Signatures.
TU Darmstadt
[Masterarbeit], (2013)

Fontein, Felix ; Schneider, Michael ; Wagner, Urs :
A Polynomial Time Version of LLL With Deep Insertions.
International Workshop on Coding and Cryptography - WCC 2013
[Konferenz- oder Workshop-Beitrag], (2013)

Ghiglieri, Marco ; Kalabis, Lukas ; Kelm, David :
Events Around Me - Ein datenschutzfreundlicher Veranstaltungskompass.
13. Deutschen IT-Sicherheitskongress SecuMedia Verlags-GmbH
[Konferenz- oder Workshop-Beitrag], (2013)

Guo, Sheng :
Integration von vorwärtssicheren Signaturverfahren in die CA Infrastruktur.

[Report], (2013)

Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Mühlhäuser, Max :
A Framework for Evaluating Trust of Service Providers in Cloud Marketplaces.
[Online-Edition: http://doi.acm.org/10.1145/2480362.2480727]
In: Proceedings of the 28th Annual ACM Symposium on Applied Computing, New York, NY, USA. In: SAC '13 . ACM , New York, NY, USA
[Konferenz- oder Workshop-Beitrag], (2013)

Hülsing, Andreas :
WOTS+ - Shorter Signatures for Hash-Based Signature Schemes.
Africa Crypt 2013
[Konferenz- oder Workshop-Beitrag], (2013)

Hülsing, Andreas ; Rausch, Lea ; Buchmann, Johannes :
Optimal Parameters for XMSS^MT.
In: MoCrySEn 2013. LNCS (8128). Springer Regensburg, Germany , pp. 194-208.
[Buchkapitel], (2013)

Jeutter, Bennet :
Implementierung einer Browser-Erweiterung zur Visualisierung und Erkennung von privatsphärenkritischen Nachrichten in sozialen Netzwerken.
TU Darmstadt
[Masterarbeit], (2013)

Nie, Xuyun ; Petzoldt, Albrecht ; Buchmann, Johannes :
Cryptanalysis of 2-layer Nonlinear Piece In Hand Method.
In: LNCS (8128).
[Konferenz- oder Workshop-Beitrag], (2013)

Nie, Xuyun ; Xu, Zhaohu ; Buchmann, Johannes
Gaborit, Philippe (ed.) :

Cryptanalysis of Hash-based Tamed Transformation and Minus Signature Scheme.
In: LNCS (7932). Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Olembo, Maina ; Stockhardt, Simon ; Hülsing, Andreas ; Volkamer, Melanie
University, Plymouth (ed.) :

Developing and Testing a Visual Hash Scheme.
European Information Security Multi-Conference (EISMC 2013)
[Konferenz- oder Workshop-Beitrag], (2013)

Schneider, Michael :
Sieving for Shortest Vectors in Ideal Lattices.
Africa Crypt 2013
[Konferenz- oder Workshop-Beitrag], (2013)

Shirazi, Fatemeh ; Diaz, Claudia ; Mullan, Ciaran ; Wright, Joss ; Buchmann, Johannes :
Towards Measuring Resilience in Anonymous Communication Networks.
In: HotPETs 2013
[Artikel], (2013)

Simić-Draws, Daniela ; Neumann, Stephan ; Kahlert, Anna ; Richter, Philipp ; Grimm, Rüdiger ; Volkamer, Melanie ; Roßnagel, Alexander :
Holistic and Law compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA.
In: International Journal of Information Security and Privacy (IJISP), 7 (3) pp. 16-35.
[Artikel], (2013)

Strenzke, Falko :
Efficiency and Implementation Security of Code-based Cryptosystems.
TU Darmstadt
[Dissertation]

Tschofenig, Hannes ; Volkamer, Melanie ; Jentzsch, Nicola ; Fischer-Hübner, Simone ; Schiffner, Stefan ; Tirtea, Rodica :
On the security, privacy and usability of online seals.

[Report], (2013)

Weiden, Patrick ; Hülsing, Andreas ; Cabarcas, Daniel ; Buchmann, Johannes :
Instantiating Treeless Signature Schemes.

[Anderes], (2013)

Werlang, Felipe ; Vigil, Martín ; Custódio, Ricardo Felipe :
A User-Centric Digital Signature Scheme.
EuroPKI 2013
[Konferenz- oder Workshop-Beitrag], (2013)

Werthmann, Tim ; Hund, Ralf ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten :
PSiOS: Bring Your Own Privacy & Security to iOS Devices (Distinguished Paper Award).
8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013)
[Konferenz- oder Workshop-Beitrag], (2013)

2012

Braun, Johannes ; Hülsing, Andreas ; Wiesmaier, Alexander :
Schlanke Infrastrukturen für den digitalen Rechtsverkehr - Vorwärtssichere Verfahren für qualifizierte elektronische Signaturen.

[Report], (2012)

Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication.
BlackHat Abu Dhabi
[Konferenz- oder Workshop-Beitrag], (2012)

El Bansarkhani, Rachid ; Cabarcas, Daniel ; Kuo, Po-Chun ; Schmidt, Patrick ; Schneider, Michael :
A Selection of Recent lattice-Based Signature and Encryption Schemes.
In: Tatra Mountains Mathematical Publications, 53 pp. 81-102.
[Artikel], (2012)

Katzenbeisser, Stefan ; Schaller, André :
Physical Unclonable Functions: Sicherheitseigenschaften und Anwendungen.
In: Datenschutz und Datensicherheit pp. 881-885.
[Artikel], (2012)

Oswald, Florian :
SmartTV - Eine Sicherheitsund Datenschutzanalyse von internetfähigen TVs.
Technische Universität Darmstadt
[Masterarbeit], (2012)

Peter, Andreas ; Hartmann, T. ; Müller, S. ; Katzenbeisser, Stefan :
Privacy-Preserving Architecture for Forensic Image Recognition.
In: International Workshop on Information Forensics and Security (WIFS 2012) IEEE
[Konferenz- oder Workshop-Beitrag], (2012)

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza :
Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware.

[Report], (2012)

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza :
myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android.

[Report], (2012)

Kreutzer, Michael ; Waidner, Michael ; Buchmann, Johannes :
IT-Sicherheitsforschung in Darmstadt - von den Grundlagen bis zur Anwendung.
In: Praxis der Informationsverarbeitung und Kommunikation, 35 (4) pp. 305-308.
[Artikel], (2012)

Stopczynski, Martin ; Ghiglieri, Marco :
Smart Home Dashboard – Das intelligente Energiemanagement.
VDE KONGRESS 2012 Smart Grid VDE Verlag GmbH
[Konferenz- oder Workshop-Beitrag], (2012)

Vigil, Martín ; Custódio, Ricardo Felipe :
Cleaning up the PKI for Long-term Signatures.
12th SBSeg 2012, Brazilian Symposium on Information and Computer System Security Brazilian Computer Society
[Konferenz- oder Workshop-Beitrag], (2012)

Braun, Johannes ; Horsch, Moritz ; Wiesmaier, Alexander
Ryan, Mark ; Smyth, Ben ; Wang, Guilin (eds.) :

iPIN and mTAN for secure eID applications.
In: LNCS (7232). Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Heinrich, Markus :
Security Analysis of HTML5 Features.
Technische Universität Darmstadt
[Bachelorarbeit], (2012)

Holzer, Andreas ; Franz, Martin ; Katzenbeisser, Stefan ; Veith, Helmut :
Secure Two-Party Computations in ANSI C.
Conference on Computer and Communications Security (CCS 2012) ACM Press
[Konferenz- oder Workshop-Beitrag], (2012)

Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander :
Decoupling Authentication from the Usage of Services.

[Report], (2012)

Mühlbach, Sascha ; Koch, Andreas :
Malacoda: towards high-level compilation of network security applications on reconfigurable hardware.
In: ANCS '12 . ACM
[Konferenz- oder Workshop-Beitrag], (2012)

Olembo, Maina ; Volkamer, Melanie :
Recommendations For E-Voting System Usability: Lessons From Literature For Interface Design, User Studies, and Usability Criteria.

[Report], (2012)

Schläpfer, Michael ; Volkamer, Melanie :
The Secure Platform Problem - Taxonomy and Analysis of Existing Proposals to Address this Problem.
In: ACM .
[Konferenz- oder Workshop-Beitrag], (2012)

Anjorin, Mojisola ; Domínguez García, Renato ; Rensing, Christoph :
Context determines content: an approach to resource recommendation in folksonomies.
In: RSWeb '12 . ACM
[Konferenz- oder Workshop-Beitrag], (2012)

Bartsch, Steffen ; Volkamer, Melanie :
Towards the Systematic Development of Contextualized Security Interventions.
Designing Interactive Secure Systems (DISS), BCS HCI 2012
[Konferenz- oder Workshop-Beitrag], (2012)

Braun, Johannes ; Hülsing, Andreas ; Wiesmaier, Alexander ; Vigil, Martín ; Buchmann, Johannes
De Capitani di Vimercati, Sabrina ; Mitchell, Chris (eds.) :

How to avoid the Breakdown of Public Key Infrastructures - Forward Secure Signatures for Certificate Authorities.
In: LNCS (7868). Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Demirel, Denise ; Henning, Maria
Weblaw, Editions (ed.) :

Legal Analysis of Privacy Weaknesses in Poll-Site eVoting Systems.
In: Jusletter IT - Die Zeitschrift für IT und Recht
[Artikel], (2012)

Göttert, Norman ; Feller, Thomas ; Schneider, Michael ; Huss, Sorin ; Buchmann, Johannes
Prouff, Emmanuel ; Schaumont, Patrick (eds.) :

On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes.
In: LNCS (7428). Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Katzenbeisser, Stefan ; Kocabaş, Ünal ; Rožic, Vladimir ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian :
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon.
In: Lecture Notes in Computer Science (LNCS) , 7428 . Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Kelbert, Florian ; Shirazi, Fatemeh ; Simo, Hervais ; Wüchner, Tobias ; Buchmann, Johannes ; Pretschner, Alexander ; Waidner, Michael
Buchmann, Johannes (ed.) :

State of Online Privacy: A Technical Perspective.
In: Internet Privacy. Eine multidisziplinäre Bestandsaufnahme/ A multidisciplinary analysis (acatech STUDIE). Springer Verlag Heidelberg , pp. 189-279. ISBN 978-3-642-31942-6
[Buchkapitel], (2012)

Kirchbuchner, Florian :
Detection of Category Breaches in E-Mail Threads Using RSS Data Feeds.
Technische Universität Darmstadt
[Masterarbeit], (2012)

Vigil, Martín ; Moecke, Cristian Thiago ; Custódio, Ricardo Felipe ; Volkamer, Melanie
De Capitani di Vimercati, Sabrina ; Mitchell, Chris (eds.) :

The Notary Based PKI -- A Lightweight PKI for Long-term Signatures on Documents.
In: LNCS (7868). Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza :
XIFER: A Software Diversity Tool Against Code-Reuse Attacks.
4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3 2012)
[Konferenz- oder Workshop-Beitrag], (2012)

Demirel, Denise ; van de Graaf, Jeroen ; Araújo, Roberto :
Improving Helios with Everlasting Privacy Towards the Public.
Electronic Voting Technology Workshop / Workshop on Trustworthy Elections - EVT/WOTE 2012
[Konferenz- oder Workshop-Beitrag], (2012)

Hülsing, Andreas ; Busold, Christoph ; Buchmann, Johannes
Knudsen, Lars ; Wu, Huapeng (eds.) :

Forward Secure Signatures on Smart Cards.
In: LNCS (7707). Springer Berlin Heidelberg
[Konferenz- oder Workshop-Beitrag], (2012)

Neumann, Stephan ; Volkamer, Melanie :
Civitas and the Real World: Problems and Solutions from a Practical Point of View.
7th International Conference on Availability, Reliability and Security (ARES) IEEE
[Konferenz- oder Workshop-Beitrag], (2012)

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Varadharajan, Vijay :
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs (full version).

[Report], (2012)

Schreiner, Steffen ; Grigoras, Costin ; Grigoras, Alina ; Betev, Latchezar ; Buchmann, Johannes :
A Grid security architecture for AliEn.
Proceedings of Science (PoS), ISGC2012:027, International Symposium on Grids & Clouds (ISGC) 2012
[Konferenz- oder Workshop-Beitrag], (2012)

Wilhelmi, Klaus :
CloudRaid - Ein sicherer Raid-Manager für freie Cloud Storages.
TU Darmstadt
[Masterarbeit], (2012)

Engels, Heinrich-Alexander :
Detection, Visualization and Prevention of Social Engineering Attacks on E-Mails by Using Machine Learning Techniques.
TU Darmstadt
[Masterarbeit], (2012)

Kelm, David :
Events Around Me - Ein Mobiler Datenschutzfreundlicher Veranstaltungskompass.
TU Darmstadt
[Masterarbeit], (2012)

Kiefer, Franziskus ; Wiesmaier, Alexander ; Fritz, Christian :
Practical Security in E-Mail Applications.
The 2012 International Conference on Security and Management (SAM’12)
[Konferenz- oder Workshop-Beitrag], (2012)

Olembo, Maina ; Kahlert, Anna ; Neumann, Stephan ; Volkamer, Melanie
Kripp, Melanie J ; Volkamer, Melanie ; Grimm, Rüdiger (eds.) :

Partial Verifiability in POLYAS for the GI Elections.
In: LNI - Lecture Notes in Informatics , 205 . Gesellschaft für Informatik
[Konferenz- oder Workshop-Beitrag], (2012)

Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Tamrakar, Sandeep ; Wachsmann, Christian :
SmartTokens: Delegable Access Control with NFC-enabled Smartphones.
In: Lecture Notes in Computer Science (LNCS) , 7344 . Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Henß, Stefan ; Monperrus, Martin ; Mezini, Mira :
Semi-automatically extracting FAQs to improve accessibility of software development knowledge.
In: ICSE '12 . IEEE Press
[Konferenz- oder Workshop-Beitrag], (2012)

Katzenbeisser, Stefan ; Weippl, Edgar ; Camp, Jean ; Volkamer, Melanie ; Reiter, Mike ; Zhang, Xinwen:
Trust and Trustworthy Computing.
Springer Wien ISBN 978-3-642-30921-2
[Buch], (2012)

Moecke, Cristian Thiago ; Volkamer, Melanie :
Usable Secure Email Communications - Criteria and evaluation of existing approaches.
In: Information and Computer Security pp. 75-85.
[Artikel], (2012)

Piper, Thorsten ; Winter, Stefan ; Manns, Paul ; Suri, Neeraj :
Instrumenting AUTOSAR for Dependability Assessment: A Guidance Framework.
In: DSN '12 . IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2012)

Pradel, Michael ; Gross, Thomas R. :
Leveraging test generation and specification mining for automated bug detection without false positives.
In: ICSE '12 . IEEE Press
[Konferenz- oder Workshop-Beitrag], (2012)

Pradel, Michael ; Jaspan, Ciera ; Aldrich, Jonathan ; Gross, Thomas R. :
Statically checking API protocol conformance with mined multi-object specifications.
In: ICSE '12 . IEEE Press
[Konferenz- oder Workshop-Beitrag], (2012)

Sadeghi, Ahmad-Reza ; Kocabaş, Ünal ; Katzenbeisser, Stefan :
Converse PUF-Based Authentication.
International Conference on Trust & Trustworthy Computing (TRUST) Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Fischlin, Marc ; Buchmann, Johannes ; Manulis, Mark (eds.) :
Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography.
Fischlin, Marc ; Buchmann, Johannes ; Manulis, Mark (eds.), Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Bartsch, Steffen :
Policy Override in Practice: Model, Evaluation, and Decision Support.
In: Security and Communication Networks
[Artikel], (2012)

Bartsch, Steffen ; Sasse, Angela :
How Users Bypass Access Control and Why: The Impact of Authorization Problems on Individuals and the Organization.

[Report], (2012)

Braun, Johannes ; Buchmann, Johannes
Levi, Albert ; Badra, Mohamad ; Cesana, Matteo ; Ghassemian, Mona ; Jabeur, Nafaa ; Klonowski, Marek ; Mana, Antonio ; Sargento, Susana ; Zeadally, Sherali (eds.) :

Perfect Confidentiality Network - A solution for information theoretically secure key agreement.
5th IFIP International Conference on New Technologies, Mobility & Security (NTMS) 2012 IEEE
[Konferenz- oder Workshop-Beitrag], (2012)

Dezfuli, Niloofar ; Khalilbeigi, Mohammadreza ; Huber, Jochen ; Müller, Florian ; Mühlhäuser, Max :
Leveraging the Palm Surface as an Eyes-free TV Remote Control.
CHI EA '12: Proceedings of the 2012 ACM annual conference extended abstracts on Human Factors in Computing Systems Extended Abstracts ACM
[Konferenz- oder Workshop-Beitrag], (2012)

Heinrichs, Felix ; Schreiber, Daniel ; Huber, Jochen ; Mühlhäuser, Max :
Toward a Theory of Interaction in Mobile Paper-Digital Ensembles.
In: CHI'12 . ACM
[Konferenz- oder Workshop-Beitrag], (2012)

Huber, Jochen ; Steimle, Jürgen ; Liao, Chunyuan ; Liu, Qiong ; Mühlhäuser, Max :
LightBeam: Nomadic Pico Projector Interaction with Real World Objects.
CHI EA '12: Proceedings of the 2012 ACM annual conference extended abstracts on Human Factors in Computing Systems Extended Abstracts ACM
[Konferenz- oder Workshop-Beitrag], (2012)

Khalilbeigi, Mohammadreza ; Schmittat, Patrik ; Steimle, Jürgen ; Mühlhäuser, Max :
Occlusion-aware Interaction Techniques for Tabletop Systems.
CHI EA '12: Proceedings of the 2012 ACM annual conference extended abstracts on Human Factors in Computing Systems Extended Abstracts ACM
[Konferenz- oder Workshop-Beitrag], (2012)

Lissermann, Roman ; Olberding, Simon ; Steimle, Jürgen ; Mühlhäuser, Max :
Interacting with Videos On Paper-like Displays.
CHI EA '12: Proceedings of the 2012 ACM annual conference extended abstracts on Human Factors in Computing Systems Extended Abstracts ACM
[Konferenz- oder Workshop-Beitrag], (2012)

Neumann, Stephan ; Volkamer, Melanie :
Formal Treatment of Distributed Trust in Electronic Voting.
In: The Seventh International Conference on Internet Monitoring and Protection (ICIMP2012) , ICIMP 2012, The Seventh I ThinkMind Digital Library
[Konferenz- oder Workshop-Beitrag], (2012)

Paul, Thomas ; Stopczynski, Martin ; Puscher, Daniel ; Volkamer, Melanie ; Strufe, Thorsten :
C4PS: colors for privacy settings.
Proceedings of the 21st international conference companion on World Wide Web ACM
[Konferenz- oder Workshop-Beitrag], (2012)

Seudié, Hervé ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza :
EDA for Secure and Dependable Cybercars: Challenges and Opportunities.
ACM/IEEE Design Automation Conference (DAC)
[Konferenz- oder Workshop-Beitrag], (2012)

Ständer, Marcus :
Massively distributed authorship of academic papers.
In: CHI EA '12 . ACM
[Konferenz- oder Workshop-Beitrag], (2012)

Tse, Edward ; Marentette, Lynn ; Ahmed, Syed Ishtiaque ; Thayer, Alex ; Huber, Jochen ; Kim, Si Jung ; Brown, Quincy ; Mühlhäuser, Max :
Educational Interfaces, Software and Technology: 3rd Workshop on UI Technologies and Educational Pedagogy.
CHI ’12: Proceedings of the 30th International Conference on Human Factors in Computing Systems ACM
[Konferenz- oder Workshop-Beitrag], (2012)

Busold, Christoph :
Hash-based Signatures on Smart Cards.
TU Darmstadt
[Masterarbeit], (2012)

Faber, Natalie :
Entwicklung und Evaluierung eines grafischen Passwortsystems basierend auf Google Maps.
TU Darmstadt
[Masterarbeit], (2012)

Jiang, Xuxian ; Grace, Michael ; Sadeghi, Ahmad-Reza ; Zhou, Wu :
Unsafe Exposure Analysis of Mobile In-App Advertisements.
to appear at WiSec ACM
[Konferenz- oder Workshop-Beitrag], (2012)

Schulz, Steffen ; Sadeghi, Ahmad-Reza ; Zhdanova, Maria ; Xu, Wenyuan ; Mustafa, Hossen ; Varadharajan, Vijay :
Tetherway: A Framework for Tethering Camouflage.
Conference on Security and Privacy in Wireless and Mobile Networks (WiSec) ACM Press
[Konferenz- oder Workshop-Beitrag], (2012)

Wachsmann, Christian ; Sadeghi, Ahmad-Reza ; Schulz, Steffen :
Physical Security Primitives: A Survey on Physically Unclonable Functions (PUFs) and PUF-based Security Solutions.
In: Secure Smart Embedded Devices, Platforms and Applications. Springer , pp. 429-449.
[Buchkapitel], (2012)

Walter, Michael :
Algebraic methods in analyzing lightweight cryptographic symmetric primitives.
TU Darmstadt
[Masterarbeit], (2012)

Alkassar, Ammar ; Schulz, Steffen ; Stüble, Christian :
Sicherheitskern(e) für Smartphones: Ansätze und Lösungen.
In: Datenschutz und Datensicherheit (DuD), 2012 (3) pp. 175-179.
[Artikel], (2012)

Bessani, Alysson ; Abbadi, Imad M. ; Bugiel, Sven ; Cesena, Emanuele ; Deng, Mina ; Gröne, Michael ; Marnau, Ninja ; Nürnberger, Stefan ; Pasin, Marcelo ; Schirmer, Norbert:
TClouds: Privacy and Resilience for Internet-scale Critical Infrastructures.
Cambridge Scholars Publishing , pp. 160-186.
[Buch], (2012)

Das, Amitabh ; Kocabaş, Ünal ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid :
POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC.
Conference on Digital Automation and Test Europe (DATE)
[Konferenz- oder Workshop-Beitrag], (2012)

Kauer, Michaela ; Pfeiffer, Thomas ; Volkamer, Melanie ; Theuerling, Heike ; Bruder, Ralph
Suri, Neeraj ; Waidner, Michael (eds.) :

It is not about the design – it is about the content! Making warnings more efficient by communicating risks appropriately.
In: LNI , 195 . GI
[Konferenz- oder Workshop-Beitrag], (2012)

Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava :
Towards Taming Privilege-Escalation Attacks on Android.
19th Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag], (2012)

Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza :
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
19th Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag], (2012)

Fuhrmann, Tino :
Ansatz zur Erkennung von HTTPS Stripping Attacken.
TU Darmstadt
[Masterarbeit], (2012)

Ghiglieri, Marco ; Simo, Hervais ; Waidner, Michael :
Technical Aspects of Online Privacy.

[Report], (2012)

Hülsing, Andreas ; Petzoldt, Albrecht ; Schneider, Michael ; Alaoui, Sidi Mohamed El Yousfi
Waldmann, Ulrich (ed.) :

Post-Quantum Signaturverfahren Heute.
22. SIT-Smartcard Workshop 2012 Fraunhofer Verlag Stuttgart
[Konferenz- oder Workshop-Beitrag], (2012)

Schulz, Steffen ; Brasser, Ferdinand ; Filyanov, Atanas :
Softer Smartcards: Usable Cryptographic Tokens with Secure Execution.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Van Herrewege, Anthony ; Katzenbeisser, Stefan ; Maes, Roel ; Peeters, Roel ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian :
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-enabled RFIDs.
In: Lecture Notes in Computer Science (LNCS) , 7397 . Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Buchmann, Johannes (ed.), :
Internet Privacy - Eine multidisziplinäre Bestandsaufnahme/ A multidisciplinary analysis.
Springer Verlag , p. 328. ISBN 978-3-642-31942-6
[Buch], (2012)

Suri, Neeraj ; Waidner, Michael (eds.) :
Sicherheit 2012: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 7.-9. März 2012 in Darmstadt.
Suri, Neeraj ; Waidner, Michael (eds.), In: LNI , 195 . GI
[Konferenz- oder Workshop-Beitrag], (2012)

Armknecht, F. ; Katzenbeisser, S. ; Peter, A. :
Shift-Type Homomorphic Encryption and its Application to Fully Homomorphic Encryption.
International Conference on Cryptology in Africa (AFRICACRYPT 2012) Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Bartsch, Steffen :
Broadening the Scope of Security Usability from the Individual to the Organizational: Participation and Interaction for Effective, Efficient, and Agile Authorization.
Universität Bremen
[Dissertation]

Bartsch, Steffen ; Sasse, Angela :
How Users Bypass Access Control – and Why: The Impact of Authorization Problems on Individuals and the Organization.
Proceedings of the 21st European Conference on Information Systems (ECIS 2013)
[Konferenz- oder Workshop-Beitrag], (2012)

Bartsch, Steffen ; Sasse, Angela
Ossowski, Sascha ; Lecca, Paola (eds.) :

Guiding Decisions on Authorization Policies: A Participatory Approach to Decision Support.
In: SAC '12 . ACM
[Konferenz- oder Workshop-Beitrag], (2012)

Bartsch, Steffen ; Sohr, Karsten ; Bunke, Michaela ; Hofrichter, Oliver ; Berger, Bernhard :
The Transitivity of Trust Problem in the Interaction of Android Applications.

[Report], (2012)

Cuong, N. ; Katzenbeisser, Stefan :
Robust Resampling Detection in Digital Images.
Conference on Communications and Multimedia Security (CMS 2012) Springer
[Konferenz- oder Workshop-Beitrag], (2012)

El Bansarkhani, Rachid ; Meziani, Mohammed :
An Efficient Lattice-based Secret Sharing Construction.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Fehr, Victoria :
Sophisticated Public-Key Encryption.
Tu Darmstadt
[Masterarbeit], (2012)

Filtschew, Konstantin :
Sicherheitsanalyse der Client-Server-Architektur für die Authetifizierung mit dem nPA und eine prototypische Entwicklung einer eID-kompatiblen Client-Server-basierten Software.
TU Darmstadt
[Masterarbeit], (2012)

Göttert, Norman :
Hardware and Software Implementation of an LWE-Based Encryption Scheme.
TU Darmstadt
[Masterarbeit], (2012)

Halvani, Oren Avni :
Autorenschaftsanalyse im Kontext der Attributation, Verifikation und intrinsischen Explorationen.
TU Darmstadt
[Masterarbeit], (2012)

Hauke, Sascha ; Volk, Florian ; Habib, Sheikh Mahbub ; Mühlhäuser, Max
Dimitrakos, Theo ; Moona, Rajat ; Patel, Dhiren ; McKnight, D. Harrison (eds.) :

Integrating Indicators of Trustworthiness into Reputation-Based Trust Models.
In: Trust Management VI, Berlin, Heidelberg. Springer Berlin Heidelberg , Berlin, Heidelberg
[Konferenz- oder Workshop-Beitrag], (2012)

Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander ; Schaaf, Joachim ; Baumöller, Claas :
Verteilte Dienstnutzung mit dem neuen Personalausweis.
D-A-CH Security 2012, 25. - 26. September
[Konferenz- oder Workshop-Beitrag], (2012)

Hühnlein, Detlef ; Petrautzki, Dirk ; Schmölz, Johannes ; Wich, Tobias ; Horsch, Moritz ; Wieland, Thomas ; Eichholz, Jan ; Wiesmaier, Alexander ; Braun, Johannes ; Feldmann, Florian ; Potzernheim, Simon ; Schwenk, Jörg ; Kahlo, Christian ; Kühne, Andreas ; Veit, Heiko :
On the design and implementation of the Open eCard App.
GI SICHERHEIT 2012 Sicherheit - Schutz und Zuverlässigkeit
[Konferenz- oder Workshop-Beitrag], (2012)

Kalabis, Lukas ; Selzer, Annika :
Das Recht auf Vergessenwerden nach der geplanten EU-Verordnung - Umsetzungsmöglichkeiten im Internet.
In: Datenschutz und Datensicherheit, 36 (9) 670--675.
[Artikel], (2012)

Kauer, Michaela ; Kiesel, Florian ; Ueberschaer, Felix ; Volkamer, Melanie ; Bruder, Ralph :
The Influence of trustworthiness of website layout on security perception of websites.
Current Issues in IT Security 2012 Duncker & Humblot
[Konferenz- oder Workshop-Beitrag], (2012)

Meziani, Mohammed :
SBS: A Fast and Secure Syndrome Based Stream Cipher.

[Anderes], (2012)

Meziani, Mohammed ; El Bansarkhani, Rachid :
An Efficient and Secure Coding-based Authenticated Encryption.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Meziani, Mohammed ; Hoffmann, Gerhard ; Cayrel, Pierre-Louis :
Improving the Performance of the SYND Stream Cipher.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Paul, Thomas ; Stopczynski, Martin ; Puscher, Daniel ; Volkamer, Melanie ; Strufe, Thorsten :
C4PS - Helping Facebookers Manage Their Privacy Settings.
In: Lecture Notes in Computer Science (7710). Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Peter, Andreas ; Kronberg, M. ; Trei, W. ; Katzenbeisser, Stefan :
Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited.
International Conference on Information Security (ISC 2012) Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Varadharajan, Vijay
Foresti, Sara ; Yung, Moti (eds.) :

The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.
In: LNCS . Springer Verlag
[Konferenz- oder Workshop-Beitrag], (2012)

Schmidt, Axel :
Enabling Secure Online Elections with the Voting Service Provider.
TU Darmstadt
[Dissertation]

Schreiner, Steffen ; Grigoras, Costin ; Litmaath, Maarten ; Betev, Latchezar ; Buchmann, Johannes :
Certified Grid Job Submission in the ALICE Grid Services.
In: Open Access Journal of Physics: Conference Series (JPCS), International Conference on Computing in High Energy and Nuclear Physics (CHEP) 2012
[Artikel], (2012)

Vigil, Martín Gagliotti ; Cabarcas, Daniel ; Wiesmaier, Alexander ; Buchmann, Johannes :
Authenticity, Integrity and Proof-of-Existence for Long-Term Archiving: a Survey.
In: IACR Cryptology ePrint Archive
[Artikel], (2012)

Volkamer, Melanie ; Karayumak, Fatih ; Kauer, Michaela ; Halim, Dhanish ; Bruder, Ralph :
Security versus Trust Indicators in 2011 in Germany.
Current Issues in IT Security 2012 Duncker & Humblot
[Konferenz- oder Workshop-Beitrag], (2012)

2011

Habib, Sheikh Mahbub ; Ries, Sebastian ; Mühlhäuser, Max :
Towards a Trust Management System for Cloud Computing.
In: IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[Konferenz- oder Workshop-Beitrag], (2011)

Diese Liste wurde am Fri Aug 17 02:04:16 2018 CEST generiert.