Publications

Here you can find the latest publications of the CYSEC members.

Jump to: 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011
Number of items at this level (without sub-levels): 1333.

2021

Fischlin, Marc and Rohrbach, Felix (2021):
Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge.
24th International Conference on Practice and Theory of Public-Key Cryptography, virtual Conference, 9.-13.05.2021, [Conference or Workshop Item]

Stojanovic, Vladimir M. (2021):
Scalable W-type entanglement resource in neutral-atom arrays with Rydberg-dressed resonant dipole-dipole interaction.
In: Physical Review A, 103 (2), APS Physics, ISSN 2469-9926,
DOI: 10.1103/PhysRevA.103.022410,
[Article]

Zimmermann, Verena and Renaud, Karen (2021):
The Nudge Puzzle: Matching Nudge Interventions to Cybersecurity Decisions.
In: ACM Transactions on Computer-Human Interaction, 28 (1), pp. 7:1-7:45. ACM, DOI: 10.1145/3429888,
[Article]

Aumayr, Lukas and Ersoy, Oguzhan and Erwig, Andreas and Faust, Sebastian and Maffei, Matteo and Moreno-Sanchez, Pedro (2021):
Bitcoin-Compatible Virtual Channels.
42nd IEEE Symposium on Security and Privacy, virtual Conference, 23.-27.05.2021, [Conference or Workshop Item]

Bahmani, Raad and Brasser, Ferdinand and Dessouky, Ghada and Jauernig, Patrick and Klimmek, Matthias and Sadeghi, Ahmad-Reza and Stapf, Emmanuel (2021):
CURE: A Security Architecture with CUstomizable and Resilient Enclaves.
30th USENIX Security Symposium (USENIX Security'21), Vancouver, Canada, 11.-13.08., [Conference or Workshop Item]

Erwig, Andreas and Faust, Sebastian and Hostáková, Kristina and Maitra, Monosij and Riahi, Siavash (2021):
Two-Party Adaptor Signatures From Identification Schemes.
24th International Conference on Practice and Theory of Public-Key Cryptography, virtual Conference, 09.-13.05.2021, [Conference or Workshop Item]

Hagen, Christoph and Weinert, Christian and Sendner, Christoph and Dmitrienko, Alexandra and Schneider, Thomas (2021):
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers.
Internet Society, 28. Annual Network and Distributed System Security Symposium (NDSS'21), San Diego, California, USA, 21.-24.02. 2021, [Conference or Workshop Item]

Heinrich, Alexander and Stute, Milan and Kornhuber, Tim and Hollick, Matthias (2021):
Who Can Find My Devices? Security and Privacy of Apple’s Crowd-Sourced Bluetooth Location Tracking System.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2021 (Preprint), De Gruyter Open, e-ISSN 2299-0984,
[Article]

Niesler, Christian and Surminski, Sebastian and Davi, Lucas (2021):
HERA: Hotpatching of Embedded Real-time Applications.
Internet Society, 28th Network and Distributed System Security Symposium (NDSS) 2021, virtual Conference, 21.-25.02.2021, [Conference or Workshop Item]

Patra, Arpita and Schneider, Thomas and Suresh, Ajith and Yalame, Mohammad Hossein (2021):
ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation.
30th USENIX Security Symposium (USENIX Security'21), Vancouver, Canada, 11.-13.08., [Conference or Workshop Item]

Rodler, Michael and Li, Wenting and Karame, Ghassan O. and Davi, Lucas (2021):
EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts.
30th USENIX Security Symposium, Vancouver, Canada, 11.-13.08.2021, [Conference or Workshop Item]

2020

Meurisch, Christian and Mihale-Wilson, Cristina and Hawlitschek, Adrian and Giger, Florian and Müller, Florian and Hinz, Oliver and Mühlhäuser, Max (2020):
Exploring User Expectations of Proactive AI Systems.
In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 4 (4), ACM, e-ISSN 24749567,
DOI: 10.1145/3432193,
[Article]

Baumgärtner, Lars and Dmitrienko, Alexandra and Freisleben, Bernd and Gruler, Alexander and Höchst, Jonas and Kühlberg, Joshua and Mezini, Mira and Mitev, Richard and Miettinen, Markus and Muhamedagic, Anel and Nguyen, Thien Duc and Penning, Alvar and Pustelnik, Frederik and Roos, Filipp and Sadeghi, Ahmad-Reza and Schwarz, Michael and Uhl, Christian (2020):
Mind the GAP: Security & Privacy Risks of Contact Tracing Apps.
In: Proceedings : 2020 IEEE 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 458-467,
IEEE, TrustCom 2020, virtual Conference, 29.12.2020-01.01.2021, ISBN 978-0-7381-4380-4,
[Conference or Workshop Item]

Lauinger, Johannes and Baumgärtner, Lars and Wickert, Anna-Katharina and Mezini, Mira (2020):
Uncovering the Hidden Dangers: Finding Unsafe Go Code in the Wild.
In: Proceedings : 2020 IEEE 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 410-417,
IEEE, TrustCom 2020, virtual Conference, 29.12.2020-01.01.2021, ISBN 978-0-7381-4380-4,
[Conference or Workshop Item]

Stute, Milan and Kohnhäuser, Florian and Baumgärtner, Lars and Almon, Lars and Hollick, Matthias and Katzenbeisser, Stefan and Freisleben, Bernd (2020):
RESCUE: A Resilient and Secure Device-to-Device Communication Framework for Emergencies.
In: Transactions on Dependable and Secure Computing, IEEE, ISSN 15455971,
DOI: 10.1109/TDSC.2020.3036224,
[Article]

Boemer, Fabian and Cammarota, Rosario and Demmler, Daniel and Schneider, Thomas and Yalame, Mohammad Hossein (2020):
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference (Extended Abstract).
ACM, Privacy Preserving Machine Learning in Practice (PPMLP'20) – CCS 2020 Workshop, Orlando, USA, 09.-13.11., [Conference or Workshop Item]

Helm, Dominik and Kübler, Florian and Reif, Michael and Eichberg, Michael (2020):
Modular Collaborative Program Analysis in OPAL.
pp. 184-196, ACM, 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2020), virtual Conference, 06.-16.11., DOI: 10.1145/3368089.3409765,
[Conference or Workshop Item]

Nguyen, Thien Duc and Miettinen, Markus and Sadeghi, Ahmad-Reza (2020):
Long Live Randomization: On Privacy-Preserving Contact Tracing in Pandemic.
In: MTD'20: Proceedings of the 7th ACM Workshop on Moving Target Defense,
ACM, CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, virtual Conference, 09.-13.11.2020, ISBN 978-1-4503-8085-0,
DOI: 10.1145/3411496.3421229,
[Conference or Workshop Item]

Renaud, Karen and Zimmermann, Verena (2020):
How to nudge in cyber security.
In: Network Security, 2020 (11), p. 20. Elsevier, DOI: 10.1016/S1353-4858(20)30132-X,
[Article]

Schneider, Thomas (2020):
Engineering Privacy-Preserving Machine Learning Protocols.
2020 Workshop on Privacy-Preserving Machine Learning in Practice (PPMLP’20), virtual Conference, 09.11., [Conference or Workshop Item]

Treiber, Amos and Molina, Alejandro and Weinert, Christian and Schneider, Thomas and Kersting, Kristian (2020):
CryptoSPN: Expanding PPML beyond Neural Networks.
ACM, Privacy Preserving Machine Learning in Practice (PPMLP'20) – CCS 2020 Workshop, virtual Conference, 09.-13.11.20202, ISBN 978-1-4503-8088-1,
[Conference or Workshop Item]

Treiber, Amos and Molina, Alejandro and Weinert, Christian and Schneider, Thomas and Kersting, Kristian (2020):
CryptoSPN: Expanding PPML beyond Neural Networks (Contributed Talk).
The 2nd Privacy-Preserving Machine Learning Workshop, virtual Conference, 16.08.2020, [Conference or Workshop Item]

Buchmann, Johannes and Dessouky, Ghada and Frassetto, Tommaso and Kiss, Ágnes and Sadeghi, Ahmad-Reza and Schneider, Thomas and Traverso, Giulia and Zeitouni, Shaza (2020):
SAFE: A Secure and Efficient Long-Term Distributed Storage System.
8th International Workshop on Security in Blockchain and Cloud Computing (SBC'20), Taipei, Taiwan, June 1-5, 2020, [Conference or Workshop Item]

Büscher, Niklas and Demmler, Daniel and Karvelas, Nikolaos and Katzenbeisser, Stefan and Krämer, Juliane and Rathee, Deevashwer and Schneider, Thomas and Struck, Patrick (2020):
Secure Two-Party Computation in a Quantum world.
18th International Conference on Applied Cryptography and Network Security (ACNS'20), virtual Conference, 19.-22.10.2020, [Conference or Workshop Item]

Glanz, Leonid and Müller, Patrick and Baumgärtner, Lars and Reif, Michael and Anthonysamy, Pauline and Mezini, Mira (2020):
Hidden in Plain Sight:Obfuscated Strings Threatening Your Privacy.
In: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, pp. 694-707,
ACM, 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS '20), virtual Conference, 05.-09.10, ISBN 978-1-4503-6750-9,
DOI: 10.1145/3320269.3384745,
[Conference or Workshop Item]

Salvaneschi, Guido and Wirth, Johannes and Weisenburger, Pascal (2020):
A survey of multitier programming.
In: ACM Computing Surveys, 53 (4), ACM, ISSN 03600300,
DOI: 10.1145/3397495,
[Article]

Alexopoulos, Nikolaos and Habib, Sheikh Mahbub and Schulz, Steffen and Mühlhäuser, Max (2020):
The Tip of the Iceberg: On the Merits of Finding Security Bugs.
In: ACM Transactions on Privacy and Security, 24 (1), Association for Computing Machinery, ISSN 2471-2566,
DOI: 10.1145/3406112,
[Article]

Holz, Marco and Kiss, Ágnes and Rathee, Deevashwer and Schneider, Thomas (2020):
Linear-Complexity Private Function Evaluation is Practical.
25. European Symposium on Research in Computer Security (ESORICS'20), virtual Conference, 14.-18.09.2020, [Conference or Workshop Item]

Boemer, Fabian and Cammarota, Rosario and Demmler, Daniel and Schneider, Thomas and Yalame, Mohammad Hossein (2020):
MP2ML: A mixed-protocol machine learning framework for private inference.
15th International Conference on Availability, Reliability and Security (ARES'20), virtual Conference, 25.-28.08, [Conference or Workshop Item]

Boemer, Fabian and Cammarota, Rosario and Demmler, Daniel and Schneider, Thomas and Yalame, Mohammad Hossein (2020):
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference (Contributed Talk).
The 2nd Privacy-Preserving Machine Learning Workshop, virtual Conference, 16.08.2020, [Conference or Workshop Item]

Cammarota, Rosario and Schunter, Matthias and Rajan, Anand and Boemer, Fabian and Kiss, Ágnes and Treiber, Amos and Weinert, Christian and Schneider, Thomas and Stapf, Emmanuel and Sadeghi, Ahmad-Reza and Demmler, Daniel and Chen, Huili and Hussain, Siam Umar and Riazi, M. Sadegh and Koushanfar, Farinaz and Gupta, Saransh and Rosing, Simunic (2020):
Trustworthy AI Inference Systems: An Industry Research View.
In: arXiv/Computer Science/Cryptography and Security, Version 1, [Report]

Cloosters, Tobias and Rodler, Michael and Davi, Lucas (2020):
TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves.
29th USENIX Security Symposium, virtual Conference, August 12.–14.2020, [Conference or Workshop Item]

Stute, Milan and Agarwal, Pranay and Kumar, Abhinav and Asadi, Arash and Hollick, Matthias (2020):
LIDOR: A Lightweight DoS-Resilient Communication Protocol for Safety-Critical IoT Systems.
In: IEEE Internet of Things Journal, 7 (8), pp. 6802-6816. IEEE, e-ISSN 2327-4662,
DOI: 10.1109/JIOT.2020.2985044,
[Article]

Tillmanns, Jörn and Classen, Jiska and Rohrbach, Felix and Hollick, Matthias (2020):
Firmware Insider: Bluetooth Randomness is Mostly Random.
14th USENIX Workshop on Offensive Technologies (WOOT 2020), virtual Conference, 11.08., [Conference or Workshop Item]

Putz, Florentin and Álvarez, Flor and Classen, Jiska (2020):
Acoustic Integrity Codes: Secure Device Pairing Using Short-Range Acoustic Communication.
pp. 31-41, WiSec 2020: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, virtual Conference, July 08.-10., ISBN 978-1-4503-8006-5,
DOI: 10.1145/3395351.3399420,
[Conference or Workshop Item]

Heinrich, Alexander and Stute, Milan and Hollick, Matthias (2020):
DEMO: BTLEmap: Nmap for Bluetooth Low Energy.
pp. 331-333, WiSec 2020: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, virtual Conference, July 08.-10., [Conference or Workshop Item]

Heinze, Dennis and Classen, Jiska and Rohrbach, Felix (2020):
MagicPairing: Apple’s Take on Securing Bluetooth Peripherals.
13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, VIRTUAL, July 08.-10., 2020, DOI: 10.1145/3395351.3399343,
[Conference or Workshop Item]

Helm, Dominik and Kübler, Florian and Kölzer, Jan Thomas and Haller, Philipp and Eichberg, Michael and Salvaneschi, Guido and Mezini, Mira (2020):
A Programming Model for Semi-implicit Parallelization of Static Analyses.
pp. 428-439, ACM, ISSTA '20: 29th SIGSOFT International Symposium on Software Testing and Analysis, virtual Conference, 18.-22.07., ISBN 978-1-4503-8008-9,
DOI: 10.1145/3395363.3397367,
[Conference or Workshop Item]

Hessel, Frank and Almon, Lars and Álvarez, Flor (2020):
ChirpOTLE: A Framework for Practical LoRaWAN Security Evaluation.
pp. 306-316, WiSec 2020: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, virtual Conference, July 08.-10., 2020, ISBN 978-1-4503-8006,
DOI: 10.1145/3395351.3399423,
[Conference or Workshop Item]

Shrishak, Kris and Shulman, Haya (2020):
Limiting the Power of RPKI Authorities.
ACM, Proceedings of the Applied Networking Research Workshop (ANRW'20), Online Workshop, 30.-31.07., [Conference or Workshop Item]

Dessouky, Ghada and Frassetto, Tommaso and Jauernig, Patrick and Sadeghi, Ahmad-Reza (2020):
With Great Complexity Comes Great Vulnerability: Challenges of Secure Processor Design.
In: IEEE Security & Privacy, IEEE, ISSN 1540-7993,
DOI: 10.1109/MSEC.2020.2994978,
[Article]

Reuter, Christian and Kaufhold, Marc-André and Spahr, Fabian and Spielhofer, Thomas and Hahne, Anna Sophie (2020):
Emergency Service Staff and Social Media – A Comparative Empirical Study of the Perception by Emergency Services Members in Europe in 2014 and 2017.
In: International Journal of Disaster Risk Reduction (IJDRR), 46, Elsevier ScienceDirect, ISSN 2212-4209,
DOI: 10.1016/j.ijdrr.2020.101516,
[Article]

Reif, Michael and Kübler, Florian and Helm, Dominik and Hermann, Ben and Eichberg, Michael and Mezini, Mira (2020):
TACAI: An Intermediate Representation Based on Abstract Interpretation.
pp. 2-7, SOAP 2020-9th ACM SIGPLAN International Workshop on the State Of the Art in Program Analysis, London, UK, June 2020, ISBN 9781450379977,
DOI: 10.1145/3394451.3397204,
[Conference or Workshop Item]

Stojanovic, Vladimir M. (2020):
Bare-Excitation Ground State of a Spinless-Fermion–Boson Model and W-State Engineering in an Array of Superconducting Qubits and Resonators.
In: Physical Review Letters, 124 (19), p. 190504. ISSN 0031-9007,
DOI: 10.1103/PhysRevLett.124.190504,
[Article]

Nieminen, Raine and Järvinen, Kimmo (2020):
Practical Privacy-Preserving Indoor Localization based on Secure Two-Party Computation.
In: IEEE Transactions on Mobile Computing, IEEE, ISSN 1536-1233,
DOI: 10.1109/TMC.2020.2990871,
[Article]

Stute, Milan and Maass, Max and Schons, Tom and Kaufhold, Marc-André and Reuter, Christian and Hollick, Matthias (2020):
Empirical Insights for Designing Information and Communication Technology for International Disaster Response.
In: International Journal of Disaster Risk Reduction (IJDRR), 47 (Art.101598), Elsevier ScienceDirect, ISSN 2212-4209,
DOI: 10.1016/j.ijdrr.2020.101598,
[Article]

Alhassan, Masaud Y. and Günther, Daniel and Kiss, Ágnes and Schneider, Thomas (2020):
Efficient and Scalable Universal Circuits.
In: Journal of Cryptology (JoC), Springer, DOI: 10.1007/s00145-020-09346-z,
[Article]

Haunschild, Jasmin and Kaufhold, Marc-André and Reuter, Christian (2020):
Sticking with Landlines? Citizens’ Use and Perception of Social Media in Emergencies and Expectations Towards Emergency Services in Germany.
AIS Electronic Library (AISel), 15th International Conference on Wirtschaftsinformatik (WI2020), Potsdam, Germany, 08.-11.03., DOI: 10.30844/wi_2020_o2-haunschild,
[Conference or Workshop Item]

Stojanovic, Vladimir M. (2020):
Entanglement-spectrum characterization of ground-state nonanalyticities in coupled excitation-phonon models.
In: Physical Review B, 101 (13), American Physical Society, ISSN 2469-9950,
DOI: 10.1103/PhysRevB.101.134301,
[Article]

Dessouky, Ghada and Sadeghi, Ahmad-Reza and Stapf, Emmanuel (2020):
Enclave Computing on RISC-V: A Brighter Future for Security?
1st International Workshop on Secure RISC-V Architecture Design Exploration (SECRISC-V), co-located with ISPASS-2020, Boston, USA, 5.-7. April, 2020, [Conference or Workshop Item]

Krämer, Juliane and Struck, Patrick (2020):
Encryption Schemes using Random Oracles: from Classical to Post-Quantum Security.
11th International Conference on Post-Quantum Cryptography (PQCrypto 2020), virtual Conference, 21.-23.09.2020, [Conference or Workshop Item]

Krämer, Juliane and Struck, Patrick (2020):
Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions.
11th International Workshop on Constructive Side-Channel Analysis and Secure Design(COSADE 2020), Lugano, Switzerland, 05.-07.10.2020, [Conference or Workshop Item]

Alexopoulos, Nikolaos and Vasilomanolakis, Emmanouil and Le Roux, Stephane and Rowe, Steven and Mühlhäuser, Max (2020):
TRIDEnT: Towards a Decentralized Threat Indicator Marketplace.
pp. 332-341, ACM, 35th ACM/SIGAPP Symposium on Applied Computing (SAC'20), virtual Conference, 30.03.-03.04., ISBN 978-1-4503-6866-7,
DOI: 10.1145/3341105.3374020,
[Conference or Workshop Item]

Alkim, Erdem and Barreto, Paulo S. L. M. and Bindel, Nina and Krämer, Juliane and Longa, Patrick and Ricardini, Jefferson E. (2020):
The Lattice-Based Digital Signature Scheme qTESLA.
18th International Conference on Applied Cryptography and Network Security (ACNS 2020), virtual Conference, 19-22.10.2020, [Conference or Workshop Item]

Bayerl, Sebastian P. and Frassetto, Tommaso and Jauernig, Patrick and Riedhammer, Korbinian and Sadeghi, Ahmad-Reza and Schneider, Thomas and Stapf, Emmanuel and Weinert, Christian (2020):
Offline Model Guard: Secure and Private ML on Mobile Devices.
23. Design, Automation and Test in Europe Conference (DATE '20), Grenoble, France, 09. – 13. March 2020, [Conference or Workshop Item]

Jauernig, Patrick and Sadeghi, Ahmad-Reza and Stapf, Emmanuel (2020):
Trusted Execution Environments: Properties, Applications, and Challenges.
In: IEEE Security & Privacy, 18 (2), pp. 56-60. IEEE, e-ISSN 1558-4046,
DOI: 10.1109/MSEC.2019.2947124,
[Article]

Schneider, Thomas and Treiber, Amos (2020):
A Comment on Privacy-Preserving Scalar Product Protocols as proposed in "SPOC".
In: IEEE Transactions on Parallel and Distributed Systems, IEEE, DOI: 10.1109/TPDS.2019.2939313,
[Article]

Weisenburger, Pascal and Salvaneschi, Guido (2020):
Implementing a Language for Distributed Systems: Choices and Experiences with Type Level and Macro Programming in Scala.
In: The Art, Science, and Engineering of Programming, 4 (3), pp. 17:1-17:29. AOSA, Inc, ISSN 2473-7321,
DOI: 10.22152/programming-journal.org/2020/4/17,
[Article]

Stute, Milan (2020):
Availability by Design: Practical Denial-of-Service-Resilient Distributed Wireless Networks.
Darmstadt, Technische Universität,
DOI: 10.25534/tuprints-00011457,
[Ph.D. Thesis]

Javadi, Mohammad and Yalame, Mohammad Hossein and Mahdiani, Hamid Reza (2020):
Small Constant Mean-Error Imprecise Adder/Multiplier for Efficient VLSI Implementation of MAC-based Applications.
In: Transactions on Computers, 2020, IEEE, ISSN 0018-9340, e-ISSN 1557-9956,
DOI: 10.1109/TC.2020.2972549,
[Article]

Sauer, Alexander and Alber, Gernot (2020):
Quantum Bounds on Detector Efficiencies for Violating Bell Inequalities Using Semidefinite Programming.
4, In: Cryptography, 2020 (1), MDPI, DOI: 10.3390/cryptography4010002,
[Article]

Kaufhold, Marc-André and Bayer, Markus and Reuter, Christian (2020):
Rapid relevance classification of social media posts in disasters and emergencies: A system and evaluation featuring active, incremental and online learning.
In: Information Processing & Management, 57 (1), Elsevier ScienceDirect, ISSN 0306-4573,
DOI: 10.1016/j.ipm.2019.102132,
[Article]

Treiber, Amos and Molina, Alejandro and Weinert, Christian and Schneider, Thomas and Kersting, Kristian (2020):
CryptoSPN: Privacy-preserving Sum-Product Network Inference.
24th European Conference on Artificial Intelligence (ECAI'20), Santiago de Compostela, 8.-12. June 2020, [Conference or Workshop Item]

Zimmermann, Verena and Gerber, Nina (2020):
The password is dead, long live the password – A laboratory study on user perceptions of authentication schemes.
In: International Journal of Human-Computer Studies, 133, pp. 26-44. Elsevier, DOI: 10.1016/j.ijhcs.2019.08.006,
[Article]

Acar, Abbas and Fereidooni, Hossein and Abera, Tigist and Sikder, Amit Kumsr and Miettinen, Markus and Aksu, Hidayet and Conti, Mauro and Sadeghi, Ahmad-Reza (2020):
Peek-a-Boo: I see your smart home activities, even encrypted!
pp. 207-218, WiSec 2020: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, virtual Conference, July 08.-10., 2020, [Conference or Workshop Item]

Alkeilani Alkadri, Nabil and Das, Poulami and Erwig, Andreas and Faust, Sebastian and Krämer, Juliane and Riahi, Siavash and Struck, Patrick (2020):
Deterministic Wallets in a Quantum World.
ACM, The 27th ACM Conference on Computer and Communications Security (CCS 2020), virtual Conference, 09.-13.11., [Conference or Workshop Item]

Alkeilani Alkadri, Nabil and El Bansarkhani, Rachid and Buchmann, Johannes (2020):
BLAZE: Practical Lattice-Based Blind Signatures for Privacy-Preserving Applications.
pp. 484-502, Springer, 24th International Conference on Financial Cryptography and Data Security (FC'20), Kota Kinabalu, Malaysia, 10.-14.02., ISBN 978-3-030-51279-8,
[Conference or Workshop Item]

Alkeilani Alkadri, Nabil and El Bansarkhani, Rachid and Buchmann, Johannes (2020):
On Lattice-Based Interactive Protocols: An Approach with Less or No Aborts.
pp. 41-61, Springer, The 25th Australasian Conference on Information Security and Privacy (ACISP'20), Perth, Australia, 30.11.-02.12., ISBN 978-3-030-55303-6,
[Conference or Workshop Item]

Bauspieß, Pia and Kolberg, Jascha and Demmler, Daniel and Krämer, Juliane and Busch, Christoph (2020):
Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection.
IEEE, 12th IEEE International Workshop on Information Forensics and Security (WIFS 2020), virtual Conference, 06.-11.12., [Conference or Workshop Item]

Bock, Estuardo Alpirez and Brzuska, Chris and Fischlin, Marc and Janson, Christian and Michiels, Wil (2020):
Security Reductions for White-Box Key-Storage in Mobile Payments.
Asiacrypt 2020 - 26th Annual International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, Korea, 06.-10.12., [Conference or Workshop Item]

Brandt, Markus and Orlandi, Claudio and Shrishak, Kris and Shulman, Haya (2020):
Optimal Transport Layer for Secure Computation.
SECRYPT 2020-The 17th International Conference on Security and Cryptography, virtual Conference, 08.-10.07., [Conference or Workshop Item]

Brendel, Jacqueline and Fischlin, Marc and Günther, Felix and Janson, Christian and Stebila, Douglas (2020):
Towards Post-Quantum Security for Signal's X3DH Handshake.
27th Selected Areas in Cryptography (SAC 2020), virtual Conference, 19.-23.10., [Conference or Workshop Item]

Dalskov, Anders and Keller, Marcel and Orlandi, Claudio and Shrishak, Kris and Shulman, Haya (2020):
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC.
ESORICS 2020-The 25th European Symposium on Research in Computer Security, virtual Conference, 14.-18.09, [Conference or Workshop Item]

Davies, Gareth T. and Janson, Christian and Martin, Daniel P. (2020):
Client-oblivious OPRAM.
The 22nd International Conference on Information and Communications Security (ICICS 2020), virtual Conference, 24.-27.08., [Conference or Workshop Item]

Dessouky, Ghada and Frassetto, Tommaso and Sadeghi, Ahmad-Reza (2020):
HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments.
In: USENIX Security,
k.A., USENIX Association, 29th USENIX Security Syposium, Boston, MA, USA, 12.-14.08.2020, [Conference or Workshop Item]

Dessouky, Ghada and Jauernig, Patrick and Mentens, Nele and Sadeghi, Ahmad-Reza and Stapf, Emmanuel (2020):
INVITED: AI Utopia or Dystopia - On Securing AI Platforms.
DAC'20-Design Automation Conference 2020, virtual Conference, 20.-24.07., [Conference or Workshop Item]

Eckey, Lisa and Faust, Sebastian and Schlosser, Benjamin (2020):
OptiSwap: Fast Optimistic Fair Exchange.
pp. 543-557, ACM, 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS '20), virtual Conference, 05.-09.10., ISBN 978-1-4503-6750-9,
DOI: 10.1145/3320269.3384749,
[Conference or Workshop Item]

Erwig, Andreas and Hesse, Julia and Orlt, Maximilian and Riahi, Siavash (2020):
Fuzzy Asymmetric Password-Authenticated Key Exchange.
26th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2020), virtual Conference, 07.-11.12., [Conference or Workshop Item]

Fischlin, Marc and Harasser, Patrick and Janson, Christian (2020):
Signatures from Sequential-OR Proofs.
EUROCRYPT 2020: 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, 10.-14. May 2020, [Conference or Workshop Item]

Hlavacek, Tomas and Cunha, Italo and Gilad, Yossi and Herzberg, Amir and Katz-Bassett, Ethan and Schapira, Michael and Shulman, Haya (2020):
DISCO: Sidestepping RPKI's Deployment Barriers.
Network and Distributed Systems Security Symposium (NDSS 2020), San Diego, USA, 23.-26. Febr., [Conference or Workshop Item]

Jeitner, Philipp and Shulman, Haya and Waidner, Michael (2020):
The Impact of DNS Insecurity on Time.
DSN2020 - 50th International Conference on Dependable Systems and Networks, virtual Conference, 29.06.-02.07., [Conference or Workshop Item]

Jeitner, Philipp and Shulman, Haya and Waidner, Michael (2020):
Pitfalls of Provably Secure Systems in Internet - The Case of Chronos-NTP.
DSN 2020-International Conference on Dependable Systems and Networks, virtual Conference, 29.06.-02.07, [Conference or Workshop Item]

Jeitner, Philipp and Shulman, Haya and Waidner, Michael (2020):
Secure Consensus Generation with Distributed DoH.
DSN 2020-International Conference on Dependable Systems and Networks, virtual Conference, 29.06.-02.07., [Conference or Workshop Item]

Kaufhold, Marc-André and Haunschild, Jasmin and Reuter, Christian (2020):
Warning the Public: A Survey on Attitudes, Expectations and Use of Mobile Crisis Apps in Germany.
AIS, Proceedings of the European Conference on Information Systems (ECIS 2020), ISBN 978-1-7336325-1-5,
[Conference or Workshop Item]

Kenjar, Zijo and Frassetto, Tommaso and Gens, David and Franz, Michael and Sadeghi, Ahmad-Reza (2020):
V0LTpwn: Attacking x86 Processor Integrity from Software.
29th USENIX Security Symposium, Boston, USA, August 12–14, 2020, [Conference or Workshop Item]

Krämer, Juliane and Struck, Patrick (2020):
Security of Public Key Encryption against Resetting Attacks.
21st International Conference on Cryptology in India (Indocrypt 2020), virtual Conference, 13.-16.12., [Conference or Workshop Item]

Krüger, Stefan and Ali, Karim and Bodden, Eric (2020):
CogniCrypt_GEN - Generating Code for the Secure Usage of Crypto APIs.
International Symposium on Code Generation and Optimization, San Diego, CA, USA, February 22.-26., 2020, [Conference or Workshop Item]

Lohr, Matthias and Schlosser, Benjamin and Jürjens, Jan and Staab, Matthias (2020):
Cost Fairness for Blockchain-Based Two-Party Exchang Protocols.
3rd IEEE International Conference on Blockchain, virtual Conference, 02.-06.11.2020, [Conference or Workshop Item]

Mantel, Heiko and Scheidel, Lukas and Schneider, Thomas and Weber, Alexandra and Weinert, Christian and Weißmantel, Tim (2020):
RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation.
19. International Conference on Cryptology And Network Security (CANS'20), virtual Conference, 14.-16.12., [Conference or Workshop Item]

Mazaheri, Sogol (2020):
Cryptographic Primitives that Resist Backdooring and Subversion. (Publisher's Version)
Darmstadt, Technische Universität,
DOI: 10.25534/tuprints-00014550,
[Ph.D. Thesis]

Mitev, Richard and Pazii, Anna and Miettinen, Markus and Enck, William and Sadeghi, Ahmad-Reza (2020):
LeakyPick: IoT Audio Spy Detector.
In: ICPS Proceedings, In: ACSAC '20: Annual Computer Security Applications Conference, pp. 694-705,
ACM, 36th Annual Computer Security Applications Conference, virtual Conference, 07.-11.12.2020, ISBN 978-1-4503-8858-0,
DOI: 10.1145/3427228.3427277,
[Conference or Workshop Item]

Nguyen, Thien Duc and Rieger, Phillip and Miettinen, Markus and Sadeghi, Ahmad-Reza (2020):
Poisoning Attacks on Federated Learning-based IoT Intrusion Detection System.
Workshop on Decentralized IoT Systems and Security (DISS) @ NDSS Symposium 2020, San Diego, USA, 23.-26.02. 2020, [Conference or Workshop Item]

Oesch, Sean and Abu-Salma, Ruba and Krämer, Juliane and Wu, Justin and Diallo, Oumar and Ruoti, Scott (2020):
Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK.
ACM, Annual Computer Security Applications Conference (ACSAC 2020), virtual Conference, 07.-11.12., [Conference or Workshop Item]

Reuter, Christian and Haunschild, Jasmin and Hollick, Matthias and Mühlhäuser, Max and Vogt, Joachim and Kreutzer, Michael (2020):
Towards Secure Urban Infrastructures: Cyber Security Challenges to Information and Communication Technology in Smart Cities.
Gesellschaft für Informatik e.V., Mensch und Computer 2020 - Digitaler Wandel im Fluss der Zeit, virtual Conference, 06.-09.09., [Conference or Workshop Item]

Reuter, Christian and Kaufhold, Marc-André and Comes, Tina and Knodt, Michèle and Mühlhäuser, Max (2020):
Mobile Resilience: Designing Mobile Interactive Systems for Societal and Technical Resilience.
22nd International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI 2020), virtual Conference, 05.-09.10., [Conference or Workshop Item]

Reuter, Christian and Kaufhold, Marc-André and Schmid, Stefka (2020):
Risikokulturen bei der Nutzung Sozialer Medien in Katastrophenlagen.
In: BBK Bevölkerungsschutz, 2, pp. 14-17. Bundesamt für Bevölkerungs-schutz und Katastrophenhilfe, ISSN 0940-7154,
[Article]

Roth, Johannes and Karatsiolis, Vangelis and Krämer, Juliane (2020):
Classic McEliece Implementation with Low Memory Footprint.
19th Smart Card Research and Advanced Application Conference (CARDIS 2020), virtual Conference, 18.-19.11., [Conference or Workshop Item]

Schneider, Markus and Shulman, Haya and Sidis, Adi and Sidis, Ravid and Waidner, Michael (2020):
Diving into Email Bomb Attack.
DSN 2020-International Conference on Dependable Systems and Networks, virtual Conference, 29.06.-02.07., [Conference or Workshop Item]

Shrishak, Kris and Shulman, Haya (2020):
MPC for Securing Internet Infrastructure.
IEEE, 50th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2020), virtual Conference, 29.06.-02.07., [Conference or Workshop Item]

Stute, Milan and Agarwal, Pranay and Kumar, Abhinav and Asadi, Arash and Hollick, Matthias (2020):
LIDOR : A Lightweight DoS-Resilient Communication Protocol for Safety-Critical IoT Systems. (Postprint)
In: IEEE Internet of Things Journal, 7 (8), pp. 6802-6816. IEEE, ISSN 2372-2541,
DOI: 10.25534/tuprints-00013320,
[Article]

Zeitouni, Shaza and Stapf, Emmanuel and Fereidooni, Hossein and Sadeghi, Ahmad-Reza (2020):
On the Security of Strong Memristor-based Physically Unclonable Functions.
Design Automation Conference 2020, virtual Conference, 19.-22.07., [Conference or Workshop Item]

2019

Krämer, Juliane and Marzougui, Soundes (2019):
Post-Quantum Cryptography in Embedded Systems.
In: ARES '19: Proceedings of the 14th International Conference on Availability, Reliability and Security,
ACM, 14th International Conference on Availability, Reliability and Security, Canterbury, United Kingdom, 26.-29.08.2019, ISBN 978-1-4503-7164-3,
DOI: 10.1145/3339252.3341475,
[Conference or Workshop Item]

Schuster, Tom (2019):
Optimizing HyCC with Compiler Intermediate Representation.
Darmstadt, TU Darmstadt, [Bachelor Thesis]

Brasser, Ferdinand and Capkun, Srdjan and Dmitrienko, Alexandra and Frassetto, Tommaso and Kostiainen, Kari and Sadeghi, Ahmad-Reza (2019):
DR.SGX: Automated and Adjustable Side-Channel Protection for SGX using Data Location Randomization.
ACSAC - 35th Annual Computer Security Applications Conference, San Juan, Puerto Rico, December 9-13, [Conference or Workshop Item]

Degabriele, Jean Paul and Janson, Christian and Struck, Patrick (2019):
Sponges Resist Leakage: The Case of Authenticated Encryption.
ASIACRYPT 2019 - 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, 08.-12.12., [Conference or Workshop Item]

Stonner, David Jakob and Kysela, Jaroslav and Weir, Graeme and Novotny, Jaroslav and Alber, Gernot and Jex, Igor (2019):
Deterministic twirling with low resources.
In: Physics Letters A, 2019, Elsevier, DOI: 10.1016/j.physleta.2019.126179,
[Article]

Zimmermann, Verena and Gerber, Paul and Marky, Karola and Böck, Leon and Kirchbuchner, Florian (2019):
Assessing Users’ Privacy and Security Concerns of Smart Home Technologies.
18, In: i-com Journal of Interactive Media, 2019 (3), pp. 197-216. De Gruyter, e-ISSN 2196-6826,
DOI: 10.1515/icom-2019-0015,
[Article]

Bayerl, Sebastian P. and Brasser, Ferdinand and Busch, Christoph and Frassetto, Tommaso and Jauernig, Patrick and Kolberg, Jascha and Nautsch, Andreas and Riedhammer, Korbinian and Sadeghi, Ahmad-Reza and Schneider, Thomas and Stapf, Emmanuel and Treiber, Amos and Weinert, Christian (2019):
Privacy-preserving speech processing via STPC and TEEs (Poster).
2. Privacy Preserving Machine Learning (PPML) – CCS 2019 Workshop, London, 15. November 2019, [Conference or Workshop Item]

Brendel, Jacqueline and Fischlin, Marc and Günther, Felix and Stebila, Douglas (2019):
Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms.
Cryptology ePrint Archive, 2019/1356, [Report]

Das, Poulami and Faust, Sebastian and Loss, Julian (2019):
A Formal Treatment of Deterministic Wallets.
ACM CCS 2019 - Symposium on Computer and Communications Security, London, UK, November, 11th -15th, [Conference or Workshop Item]

Dessouky, Ghada and Zeitouni, Shaza and Ibrahim, Ahmad and Davi, Lucas and Sadeghi, Ahmad-Reza (2019):
CHASE: A Configurable Hardware-Assisted Security Extension for Real-Time Systems.
New York, IEEE, 2019 International Conference On Computer Aided Design (ICCAD), The Westin Westminster Westminster, CO, 4.-7. November 2019, [Conference or Workshop Item]

Felsen, Susanne and Kiss, Ágnes and Schneider, Thomas and Weinert, Christian (2019):
Secure and Private Function Evaluation with Intel SGX.
CCSW 2019 - The ACM Cloud Computing Security Workshop, London, UK, November, 11th, 2019, [Conference or Workshop Item]

Fomichev, Mikhail and Maass, Max and Hollick, Matthias (2019):
Zero-Interaction Security - Towards Sound Experimental Validation.
In: GetMobile: Mobile Computing and Communications, 23 (2), pp. 16-21. ISSN 23750529,
DOI: 10.1145/3372300.3372304,
[Article]

Günther, Daniel and Kiss, Ágnes and Scheidel, Lukas and Schneider, Thomas (2019):
Poster: Framework for Semi-private Function Evaluation with Application to Secure Insurance Rate Calculation.
ACM, ACM CCS 2019, London, November 11-15, 2019, DOI: 10.1145/3319535.3363251,
[Conference or Workshop Item]

Köhler, Mirco and Salvaneschi, Guido (2019):
Automated Refactoring to Reactive Programming.
ASE'19 - The 34th International Conference on Automated Software Engineering, San Diego, Ca, USA, November 10.-15.,2019, DOI: 10.1109/ASE.2019.00082,
[Conference or Workshop Item]

Nguyen, Giang Nam (2019):
Developing Performance Models for Codes with Exponential Runtime Behavior.
Darmstadt, TU Darmstadt, [Master Thesis]

Reith, Robert Nikolai and Schneider, Thomas and Tkachenko, Oleksandr (2019):
Efficiently Stealing your Machine Learning Models.
In: Proceedings of the 2019 Workshop on Privacy in the Electronic Society,
WPES'19 - 18. Workshop on Privacy in the Electronic Society, London, UK, November, 11th, [Conference or Workshop Item]

Treiber, Amos and Nautsch, Andreas and Kolberg, Jascha and Schneider, Thomas and Busch, Christoph (2019):
Privacy-preserving PLDA speaker verification using outsourced secure computation.
In: Speech Communication, Elsevier, DOI: 10.1016/j.specom.2019.09.004,
[Article]

Zaidan, Firas (2019):
Developing a Fuzzing Framework for ARM TrustZone.
Darmstadt, TU Darmstadt, [Master Thesis]

Fladung, Lukas and Nikolopoulos, Georgios M. and Alber, Gernot and Fischlin, Marc (2019):
Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys.
In: Cryptography, 3 (4), MDPI, DOI: 10.3390/cryptography3040025,
[Article]

Krüger, Stefan and Späth, Johannes and Ali, Karim and Bodden, Eric and Mezini, Mira (2019):
CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.
In: IEEE Transactions on Software Engineering, 2019, Institute of Electrical and Electronics Engineers, ISSN 1939-3520,
DOI: 10.1109/TSE.2019.2948910,
[Article]

Järvinen, Kimmo and Kiss, Ágnes and Schneider, Thomas and Tkachenko, Oleksandr and Yang, Zheng (2019):
Faster Privacy-Preserving Location Proximity Schemes for Circles and Polygons.
In: IET Information Security, DOI: 10.1049/iet-ifs.2019.0125,
[Article]

Buchmann, Johannes and Geihs, Matthias and Hamacher, Kay and Katzenbeisser, Stefan and Stammler, Sebastian (2019):
Long-term integrity protection of genomic data.
In: EURASIP Journal on Information Security, p. 16. SpringerOpen, DOI: 10.1186/s13635-019-0099-x,
[Article]

Fischlin, Marc and Haagh, Helene (2019):
How to Sign with White-Boxed AES.
Santiago de Chile, Springer, Latincrypt 2019, Oct. 2–4, 2019, [Conference or Workshop Item]

Krämer, Juliane (2019):
Post-Quantum Cryptography and its Application to the IoT.
In: Informatik Spektrum, 42 (5), pp. 343-344. Springer Heidelberg, ISSN 0170-6012,
DOI: 10.1007/s00287-019-01200-2,
[Article]

Rathee, Deevashwer and Schneider, Thomas and Shukla, K. K. (2019):
Improved multiplication triple generation over rings via RLWE-based AHE.
18. International Conference on Cryptology And Network Security (CANS'19), Fuzhou, China, 25-27 October 2019, [Conference or Workshop Item]

Salvaneschi, Guido and Köhler, Mirko and Sokolowski, Daniel and Haller, Philipp and Erdweg, Sebastian and Mezini, Mira (2019):
Language-integrated privacy-aware distributed queries.
In: Proceedings of the ACM on Programming Languages, 3 (OOPSLA), p. 167. ACM, ISSN 2475-1421,
DOI: 10.1145/3360593,
[Article]

Ghaeini, Hamid Reza and Chan, Matthew and Bahmani, Raad and Brasser, Ferdinand and Garcia, Luis and Zhou, Jianying and Sadeghi, Ahmad-Reza and Tippenhauer, Nils Ole and Zonouz, Saman A. (2019):
PAtt: Physics-based Attestation of Control Systems.
Beijing, 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Beijing, 23. - 25.09.2019, [Conference or Workshop Item]

Brendel, Jacqueline and Fischlin, Marc and Günther, Felix (2019):
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids.
pp. 521-541, ESORICS 2019 - The European Symposium on Research in Computer Security, Luxembourg, 23.-27.09.2019, ISBN 978-3-030-29962-0,
[Conference or Workshop Item]

Grinko, Margarita and Kaufhold, Marc-André and Reuter, Christian Alt, Florian and Bulling, Andreas and Döring, Tanja (eds.) (2019):
Adoption, Use and Diffusion of Crisis Apps in Germany: A Representative Survey.
MuC'19 - Mensch und Computer, Hamburg, Germany, 8. bis 11. September 2019, ISBN 978-1-4503-7198-8,
DOI: 10.1145/3340764.3340782,
[Conference or Workshop Item]

Kalle, Timo and Kaufhold, Marc-André and Kuntke, Franz and Reuter, Christian and Rizk, Amr and Steinmetz, Ralf David, Klaus (ed.) (2019):
Resilience in Security and Crises through Adaptions and Transitions.
In: GI-Edition. Proceedings, 294, Bonn, Gesellschaft für Informatik e. V., 49. Jahrestagung der Gesellschaft für Informatik, Kassel, Germany, 23.-26. September 2019, ISBN 978-3-88579-688-6,
DOI: 10.18420/inf2019_ws60,
[Conference or Workshop Item]

Nikolopoulos, Georgios M. (2019):
Optical scheme for cryptographic commitments with physical unclonable keys.
In: Optical Express, 27 (20), pp. 29367-29379. DOI: 10.1364/OE.27.029367,
[Article]

Stonner, David Jakob (2019):
Construction of Random Unitary Operations for Asymptotic Preparation of Werner States.
Darmstadt, Technische Universität Darmstadt, [Bachelor Thesis]

Spielhofer, Thomas and Hahne, Anna Sophie and Reuter, Christian and Kaufhold, Marc-André and Schmid, Stefka (2019):
Social Media Use in Emergencies of Citizens in the United Kingdom.
Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), València, Spain, May 19 to 22, 2019, [Conference or Workshop Item]

Bindel, Nina and Braun, Johannes and Gladiator, Luca and Stöckert, Tobias and Wirth, Johannes (2019):
X.509-Compliant Hybrid Certificates for the Post-Quantum Transition.
In: Journal of Open Source Software, 4 (40), The Open Journal, ISSN 2475-9066,
DOI: 10.21105/joss.01606,
[Article]

Reif, Michael and Kübler, Florian and Eichberg, Michael and Helm, Dominik and Mezini, Mira (2019):
Judge: Identifying, Understanding, and Evaluating Sources of Unsoundness in Call Graphs.
pp. 251-261, 28th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA'19), Beijing, China, 15.07.-19.0.7. 2019, ISBN 978-1-4503-6224-5,
DOI: 10.1145/3293882.3330555,
[Conference or Workshop Item]

Boukoros, Spyros and Humbert, Mathias and Katzenbeisser, Stefan and Troncoso, Carmela (2019):
On (The Lack Of) Location Privacy in Crowdsourcing Applications.
USENIX Security Symposium, Santa Clara, CA, USA, August 14–16, 2019, [Conference or Workshop Item]

Das, Poulami and Eckey, Lisa and Frassetto, Tommaso and Gens, David and Hostáková, Kristina and Jauernig, Patrick and Faust, Sebastian and Sadeghi, Ahmad-Reza (2019):
FastKitten: Practical Smart Contracts on Bitcoin.
28th USENIX Security Symposium, Santa Clara, CA, USA, 14.-16.08.2019, [Conference or Workshop Item]

Kales, Daniel and Rechberger, Christian and Schneider, Thomas and Senker, Matthias and Weinert, Christian (2019):
Mobile Private Contact Discovery at Scale.
USENIX, 28. USENIX Security Symposium (USENIX Security'19), [Conference or Workshop Item]

Nautsch, Andreas and Patino, Jose and Treiber, Amos and Stafylakis, Themos and Mezira, Petr and Todisco, Massimiliano and Schneider, Thomas and Evans, Nicholas (2019):
Privacy-Preserving Speaker Recognition with Cohort Score Normalisation.
Interspeech 2019, Graz, Austria, 15.-19.09.2019, [Conference or Workshop Item]

Nikolopoulos, Georgios M. (2019):
Cryptographic one-way function based on boson sampling.
18, In: Quantum Information Processing, 2019 (8), p. 259. Springer Nature, ISSN 1570-0755, e-ISSN 1573-1332,
DOI: 10.1007/s11128-019-2372-9,
[Article]

Stute, Milan and Narain, Sashank and Mariotto, Alex and Heinrich, Alexander and Kreitschmann, David and Noubir, Guevara and Hollick, Matthias (2019):
A Billion Open Interfaces for Eve and Mallory : MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link. (Publisher's Version)
In: Proceedings of the 28th USENIX Security Symposium, pp. 37-54,
Berkeley, CA, USENIX Association, 28th USENIX Security Symposium (USENIX Security 19), Santa Clara, USA, 14.-16.8.2019, ISBN 978-1-939133-06-9,
DOI: 10.25534/tuprints-00013264,
[Conference or Workshop Item]

Paverd, Andrew and Völp, Marcus and Brasser, Ferdinand and Schunter, Matthias and Asokan, N. and Sadeghi, Ahmad-Reza and Esteves-Verissimo, Paulo and Steininger, Andreas and Holz, Thorsten (2019):
Sustainable Security & Safety: Challenges and Opportunities.
Stuttgart, 4th International Workshop on Security and Dependability of Critical Embedded Real-Time Systems (CERTS), Stuttgart, 09.07.2019, DOI: 10.4230/OASIcs.CERTS.2019.4,
[Conference or Workshop Item]

Bock, Carsten and Brasser, Ferdinand and Gens, David and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2019):
RIP-RH: Preventing Rowhammer-based Inter-Process Attacks.
Auckland, ACM Asia Conference on Computer and Communications Security (AsiaCCS), Auckland, 07. - 12.07.2019, DOI: 10.1145/3321705.3329827,
[Conference or Workshop Item]

Kiss, Ágnes and Naderpour, Masoud and Liu, Jian and Asokan, N. and Schneider, Thomas (2019):
SoK: Modular and Efficient Private Decision Tree Evaluation.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2, De Gruyter Open, [Article]

Kiss, Ágnes and Schick, Oliver and Schneider, Thomas (2019):
Web Application for Privacy-Preserving Scheduling using Secure Computation.
In: 16. International Conference on Security and Cryptography (SECRYPT'19),
SciTePress, [Conference or Workshop Item]

Schneider, Thomas and Tkachenko, Oleksandr (2019):
EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs.
ACM, 14. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'19), [Conference or Workshop Item]

Zucker, René (2019):
Erstellung eines Python-Interfaces für die Erforschung von Polytopen in der Quanteninformationstheorie.
Darmstadt, TU Darmstadt, Fachbereich Informatik, [Bachelor Thesis]

Kohnhäuser, Florian and Büscher, Niklas and Katzenbeisser, Stefan (2019):
A Practical Attestation Protocol for Autonomous Embedded Systems.
4th IEEE European Symposium on Security and Privacy (EuroS&P'19), Stockholm, Sweden, 17-19 June 2019, [Conference or Workshop Item]

Olt, Christian M. and Mesbah, Neda (2019):
Weary of Watching Out? - Cause and Effect of Security Fatigue.
European Conference on Information Systems - ECIS 2019, Stockholm, Sweden, 8. - 14.6.2019, [Conference or Workshop Item]

Wagner, Amina and Mesbah, Neda (2019):
Too Confident to Care: Investigating Overconfidence in Privacy Decision Making.
European Conference on Information Systems - ECIS 2019, Stockholm, Sweden, 8. - 14.6.2019, [Conference or Workshop Item]

Zimmermann, Verena and Gerber, Nina and Mayer, Peter and Kleboth, Marius and von Preuschen, Alexandra and Schmidt, Konstantin (2019):
Keep on rating – on the systematic rating and comparison of authentication schemes.
In: Information & Computer Security, Emerald Publishing, ISSN 2056-4961,
DOI: 10.1108/ICS-01-2019-0020,
[Article]

Kohnhäuser, Florian (2019):
Advanced Remote Attestation Protocols for Embedded Systems.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Traverso, Giulia (2019):
Long-Term Confidential Secret Sharing-Based Distributed Storage Systems.
Darmstadt, Technische Universität, FG Informatik,
[Ph.D. Thesis]

Songhori, Ebrahim and Riazi, M. Sadegh and Hussain, Siam and Sadeghi, Ahmad-Reza and Koushanfar, Farinaz (2019):
ARM2GC: Succinct Garbled Processor for Secure Computation.
Las Vegas, USA, Design Automation Conference (DAC), 2019 56th ACM/EDAC/IEEE, Las Vegas, USA, June, 2.-6., [Conference or Workshop Item]

Batina, Lejla and Jauernig, Patrick and Mentens, Nele and Sadeghi, Ahmad-Reza and Stapf, Emmanuel (2019):
In Hardware We Trust: Gains and Pains of Hardware-assisted Security.
In: Proceedings of the 56th Annual Design Automation Conference 2019,
k.A., ACM, Design Automation Conference 2019, Las Vegas, NV, USA, June 02 - 06, 2019, [Conference or Workshop Item]

Burger, Michael and Bischof, Christian and Krämer, Juliane (2019):
p3Enum: A new Parameterizable and Shared-Memory Parallelized Shortest Vector Problem Solver.
In: 19th INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE, pp. 535-542,
Springer, Faro, Portugal, 12.-14.06.2019, DOI: 10.1007/978-3-030-22750-0_48,
[Conference or Workshop Item]

Gerber, Nina and Zimmermann, Verena and Volkamer, Melanie (2019):
Why Johnny Fails to Protect his Privacy.
Los Alamos, California, 4th European Workshop on Usable Security (EuroUSEC 2019), Stockholm, Schweden, 20.06.2019, [Conference or Workshop Item]

Järvinen, Kimmo and Leppäkoski, Helena and Lohan, Elena Simona and Richter, Philipp and Schneider, Thomas and Tkachenko, Oleksandr and Yang, Zheng (2019):
PILOT: Practical Privacy-Preserving Indoor Localization using OuTsourcing.
In: 4. IEEE European Symposium on Security and Privacy (EuroS&P'19),
[Conference or Workshop Item]

Mantel, Heiko and Probst, Christian (2019):
On the Meaning and Purpose of Attack Trees.
The 32nd IEEE Computer Security Foundations Symposium (CSF), Hoboken, NJ, USA, Jun 25, 2019 - Jun 28, 2019, [Conference or Workshop Item]

Nautsch, Andreas and Jiménez, Abelino and Treiber, Amos and Kolberg, Jascha and Jasserand, Catherine and Kindt, Els and Delgado, Héctor and Todisco, Massimiliano and Hmani, Mohamed Amine and Mtibaa, Aymen and Abdelraheem, Mohammed Ahmed and Abad, Alberto and Teixeira, Francisco and Matrouf, Driss and Gomez-Barrero, Marta and Petrovska-Delacrétaz, Dijana and Chollet, Gérard and Evans, Nicholas and Schneider, Thomas and Bonastre, Jean-François and Raj, Bhiksha and Trancoso, Isabel and Busch, Christoph (2019):
Preserving Privacy in Speaker and Speech Characterisation.
In: Computer Speech and Language, Elsevier, DOI: 10.1016/j.csl.2019.06.001,
[Article]

Renaud, Karen and Zimmermann, Verena (2019):
Encouraging Password Manager Reuse.
In: Network Security, 2019 (6), Elsevier, DOI: 10.1016/S1353-4858(19)30075-3,
[Article]

Zimmermann, Verena and Dickhaut, Ernestine and Gerber, Paul and Vogt, Joachim (2019):
Vision: Shining Light on Smart Homes – Supporting Informed Decision-Making of End Users.
Los Alamos, California, IEEE, 4th European Workshop on Usable Security (EuroUSEC 2019), Stockholm, Schweden, 20.06.2019, [Conference or Workshop Item]

Boukoros, Spyridon (2019):
Multidimensional Privacy Quantification for User Empowerment.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Kohnhäuser, Florian and Püllen, Dominik and Katzenbeisser, Stefan (2019):
Ensuring the Safe and Secure Operation of Electronic Control Units in Road Vehicles.
IEEE Workshop on the Internet of Safe Things, San Francisco, California, USA, 23rd May 2019, [Conference or Workshop Item]

Kaufhold, Marc-André and Rupp, Nicola and Reuter, Christian and Habdank, Matthias (2019):
Mitigating Information Overload in Social Media during Conflicts and Crises: Design and Evaluation of a Cross-Platform Alerting System.
In: Behaviour & Information Technology (BIT), 38, pp. 1-24. Taylor & Francis, DOI: 10.1080/0144929X.2019.1620334,
[Article]

OConnor, TJ and Mohamed, Reham and Miettinen, Markus and Enck, William and Reaves, Bradley and Sadeghi, Ahmad-Reza (2019):
HomeSnitch: Behavior Transparency and Control for Smart Home IoT Devices.
Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Miami, FL, USA, [Conference or Workshop Item]

Brendel, Jacqueline and Gerber, Nina (2019):
Sichere Instant Messaging Apps.
In: Datenschutz und Datensicherheit - DuD, 43 (5), pp. 276-280. Springer, ISSN 1862-2607 (elektronische Version); 1614-0702 (gedruckte Version),
DOI: 10.1007/s11623-019-1107-5,
[Article]

Amann, Sven and Nguyen, Hoan Anh and Nadi, Sarah and Nguyen, Tien N. and Mezini, Mira (2019):
Investigating Next Steps in Static API-Misuse Detection.
In: MSR, In: Proceedings of the 16th International Conference on Mining Software Repositories,
k.A., IEEE, 2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR), Montreal, QC, Canada, Sun 26 - Mon 27 May 2019, [Conference or Workshop Item]

Bindel, Nina and Brendel, Jacqueline and Fischlin, Marc and Goncalves, Brian and Stebila, Douglas (2019):
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange.
Chongqing, China, PQCrypto 2019, May 8-10, 2019, [Conference or Workshop Item]

Dziembowski, Stefan and Eckey, Lisa and Faust, Sebastian and Hesse, Julia and Hostakova, Kristina (2019):
Multiparty Virtual State Channels.
In: Eurocrypt 2019,
Darmstadt, IACR, 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, [Conference or Workshop Item]

Pinkas, Benny and Schneider, Thomas and Tkachenko, Oleksandr and Yanai, Avishay (2019):
Efficient Circuit-based PSI with Linear Communication.
In: 38. Advances in Cryptology -- EUROCRYPT 2019,
Springer, [Conference or Workshop Item]

Geihs, Matthias and Nikiforov, Oleg and Demirel, Denise and Sauer, Alexander and Butin, Denis and Günther, Felix and Alber, Gernot and Walther, Thomas and Buchmann, Johannes (2019):
The Status of Quantum-Based Long-Term Secure Communication over the Internet.
In: IEEE Transactions on Sustainable Computing, IEEE, ISSN 2377-3782,
DOI: htps://doi.org/10.1109/TSUSC.2019.2913948,
[Article]

Speth, Jonathan (2019):
How secure are business applications? An in-depth study on the security of business applications.
Darmstadt, TU Darmstadt, [Bachelor Thesis]

Ranly, Paul Moritz (2019):
On the feasibility of hierarchical secret sharing-based distributed storage systems.
Darmstadt, TU Darmstadt, [Bachelor Thesis]

Krämer, Juliane and Loiero, Mirjam (2019):
Fault Attacks on UOV and Rainbow.
10th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2019), Darmstadt, Germany, 03.-05.04., [Conference or Workshop Item]

Roth, Kai (2019):
Entwicklung eines Schlüsselverwaltungssystems zum Quantenschlüsselaustausch.
Darmstadt, TU Darmstadt, [Master Thesis]

Nguyen, Thien Duc and Marchal, Samuel and Miettinen, Markus and Fereidooni, Hossein and Asokan, N. and Sadeghi, Ahmad-Reza (2019):
DÏoT: A Federated Self-learning Anomaly Detection System for IoT.
In: The 39th IEEE International Conference on Distributed Computing Systems (ICDCS 2019),
[Conference or Workshop Item]

Wickert, Anna-Katharina and Reif, Michael and Eichberg, Michael and Dodhy, Anam and Mezini, Mira (2019):
A Dataset of Parametric Cryptographic Misuses.
IEEE, 2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR), [Conference or Workshop Item]

Truong, Hien Thi Thu and Toivonen, Juhani and Nguyen, Thien Duc and Soriente, Claudio and Tarkoma, Sasu and Asokan, N. (2019):
DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification.
k.A., IEEE International Conference on Pervasive Computing and Communications (PerCom2019), Kyoto, Japan, March 2019, [Conference or Workshop Item]

Reuter, Christian (ed.) (2019):
Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace.
Wiesbaden, Springer Vieweg, ISBN 978-3-658-25651-7,
DOI: 10.1007/978-3-658-25652-4,
[Book]

Schulz, Philipp (2019):
Developing Secure Distributed Systems with Modular Tierless Programming.
TU Darmstadt, [Master Thesis]

Srivatsa, Jeevan Karanam (2019):
Benchmarking of Data Provenance Computation Methods to Support Debugging in Apache Spark.
TU Darmstadt, [Master Thesis]

Grube, Tim and Daubert, Jörg and Mühlhäuser, Max (2019):
Asymmetric DCnets for Effective and Efficient Sender Anonymity.
Abu Dhabi, UAE, IEEE, IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9-13 Dec. 2018, ISSN 25766813, ISBN 9781538647271,
DOI: 10.1109/GLOCOM.2018.8647607,
[Conference or Workshop Item]

Marchal, Samuel and Miettinen, Markus and Nguyen, Thien Duc and Sadeghi, Ahmad-Reza and Asokan, N. (2019):
AUDI: Towards Autonomous IoT Device-Type Identification.
In: IEEE Journal on Selected Areas in Communications (JSAC) on Artificial Intelligence and Machine Learning for Networking and Communications, [Article]

Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Tsudik, Gene (2019):
HEALED: HEaling & Attestation for Low-end Embedded Devices.
23rd International Conference Financial Cryptography and Data Security (FC 2019), 2019, [Conference or Workshop Item]

Das, Poulami and Eckey, Lisa and Frassetto, Tommaso and Gens, David and Hostakova, Kristina and Jauernig, Patrick and Faust, Sebastian and Sadeghi, Ahmad-Reza (2019):
FastKitten: Practical Smart Contracts on Bitcoin.
Cryptology ePrint Archive, Report 2019/154, [Report]

Schabhüser, Lucas and Butin, Denis and Buchmann, Johannes (2019):
Context Hiding Multi-Key Linearly Homomorphic Authenticators.
In: Topics in Cryptology - CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, pp. 493-513,
Springer, San Francisco, CA, USA, March 4–8, 2019, [Conference or Workshop Item]

Rodler, Michael and Li, Wenting and Karame, Ghassan O. and Davi, Lucas (2019):
Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks.
In: Proceedings of 26th Annual Network & Distributed System Security Symposium (NDSS),
26th Annual Network & Distributed System Security Symposium (NDSS), Catamaran Resort Hotel & Spa, San Diego, CA, [Conference or Workshop Item]

Surminski, Sebastian and Rodler, Michael and Davi, Lucas (2019):
Poster: Automated Evaluation of Fuzzers.
Internet Society, NDSS 2019 : 26th Annual Network and Distributed System Security Symposium, San Diego, California, 24 – 27 February 2019, [Conference or Workshop Item]

Aschermann, Cornelius and Frassetto, Tommaso and Holz, Thorsten and Jauernig, Patrick and Sadeghi, Ahmad-Reza and Teuchert, Daniel (2019):
Nautilus: Fishing for Deep Bugs with Grammars.
In: 26th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Brasser, Ferdinand and Gens, David and Jauernig, Patrick and Sadeghi, Ahmad-Reza and Stapf, Emmanuel (2019):
SANCTUARY: ARMing TrustZone with User-space Enclaves.
In: 26th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Krüger, Stefan and Hermann, Ben (2019):
Can an online service predict gender?: on the state-of-the-art in gender identification from texts.
GE@ICSE 2019 : 2nd Workshop on Gender Equality in Software Engineering, Montreal, Canada, May 27, 2019, DOI: 10.1109/GE.2019.00012,
[Conference or Workshop Item]

Maier, Christine and Brydges, Tiff and Jurcevic, Petar and Trautmann, Nils and Hempel, Cornelius and Lanyon, Ben P. and Hauke, Philipp and Blatt, Rainer and Roos, Christian F. (2019):
Environment-Assisted Quantum Transport in a 10-qubit Network.
In: PHYSICAL REVIEW LETTERS, 122 (5), pp. 050501. American Physical Society, DOI: 10.1103/PhysRevLett.122.050501,
[Article]

Wegert, Leonard (2019):
Preparations for Assembling Franson Interferometers in a Quantum Key Distributuion Setup.
TU Darmstadt, [Bachelor Thesis]

Weiser, Samuel and Werner, Mario and Brasser, Ferdinand and Malenko, Maja and Mangard, Stefan and Sadeghi, Ahmad-Reza (2019):
TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V.
In: 26th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Heidt, Margareta and Gerlach, Jin and Buxmann, Peter (2019):
A Holistic View on Organizational IT Security: The Influence of Contextual Aspects During IT Security Decisions.
Hawaii International Conference on System Sciences (HICSS), Wailea, USA, 08.-11.01.2019, [Conference or Workshop Item]

Mohamed, Reham and O'Connor, Terrance and Miettinen, Markus and Enck, William and Sadeghi, Ahmad-Reza Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang (Corporate Creators) (2019):
HONEYSCOPE: IoT Device Protection with Deceptive Network Views,.
In: Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings, [Book Section]

Heidt, Margareta and Olt, Christian M. and Buxmann, Peter (2019):
To (Psychologically) Own Data is to Protect Data: How Psychological Ownership Determines Protective Behavior in a Work and Private Context.
Internationale Tagung Wirtschaftsinformatik, Siegen, Deutschland, 24.02.2019-27.02.2019, [Conference or Workshop Item]

Felsen, Susanne (2019):
Secure Two-Party Computation: ABY versus Intel SGX.
TU Darmstadt, [Master Thesis]

Reuter, Christian and Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko (eds.) (2019):
SCIENCE PEACE SECURITY ‘19: Proceedings of the Interdisciplinary Conference on Technical Peace and Security Research.
Darmstadt, tuprints, DOI: 10.25534/tuprints-00009164,
[Conference or Workshop Item]

Aldehoff, Larissa and Dankenbring, Meri and Reuter, Christian (2019):
Renouncing Privacy in Crisis Management? People's View on Social Media Monitoring and Surveillance.
Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), València, Spain, May 19 to 22, 2019, [Conference or Workshop Item]

Almon, Lars and Álvarez, Flor and Kamp, Laurenz and Hollick, Matthias (2019):
The King is Dead Long Live the King! Towards Systematic Performance Evaluation of Heterogeneous Bluetooth Mesh Networks in Real World Environments.
2019 IEEE 44nd Conference on Local Computer Networks (LCN), Osnabrück, 14-17 Oktober 2019, [Conference or Workshop Item]

Bernardi, Ansgar and Reuter, Christian and Schneider, Wolfgang and Linsner, Sebastian and Kaufhold, Marc-André Meyer-Aurich, A. (ed.) (2019):
Hybride Dienstleistungen in digitalisierten Kooperationen in der Landwirtschaft.
In: Gesellschaft für Informatik: GI-Edition / Proceedings, 287, In: Informatik in der Land-, Forst- und Ernährungswirtschaft : Fokus: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, pp. 25-30,
Bonn, Gesellschaft für Informatik, 38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, Wien, 18.-19.2.2019, ISBN 978-3-88579-681-7,
[Conference or Workshop Item]

Bock, Estuardo Alpirez and Brzuska, Chris and Fischlin, Marc and Janson, Christian and Michiels, Wil (2019):
Security Reductions for White-Box Key-Storage in Mobile Payments.
In: ePrint, [Article]

De Oliveira Nunes, Ivan and Dessouky, Ghada and Ibrahim, Ahmad and Rattanavipanon, Norrathep and Sadeghi, Ahmad-Reza and Tsudik, Gene (2019):
Towards Systematic Design of Collective Remote Attestation Protocols.
The 39th International Conference on Distributed Computing Systems (ICDCS) 2019, [Conference or Workshop Item]

Demmler, Daniel (2019):
Towards Practical Privacy-Preserving Protocols.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Dziembowski, Stefan and Eckey, Lisa and Faust, Sebastian and Malinowski, Daniel (2019):
Perun: Virtual Payment Hubs over Cryptocurrencies.
pp. 327-340, IEEE Computer Society, 39th IEEE Symposium on Security and Privacy, THE HYATT REGENCY, SAN FRANCISCO, CA, MAY 21-23, 2018, [Conference or Workshop Item]

Dziembowski, Stefan and Faust, Sebastian and Zebrowski, Karol (2019):
Simple Refreshing in the Noisy Leakage Model.
IACR, The 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, 8.12.-12.12. 2019, [Conference or Workshop Item]

El Bansarkhani, Rachid (2019):
LARA - A Design Concept for Lattice-based Encryption.
pp. 377-395, FC 2019: 23rd International Conference on Financial Cryptography and Data Security, Frigate Bay, St. Kitts and Nevis, February 18.-22., 2019, ISBN 978-3-030-32100-0,
DOI: 10.1007/978-3-030-32101-7_23,
[Conference or Workshop Item]

Fischlin, Marc and Günther, Felix (2019):
Modeling Memory Faults in Signature and Encryption Schemes.
In: eprint, eprint.iacr.org, [Article]

Geihs, Matthias and Schabhüser, Lucas and Buchmann, Johannes (2019):
Efficient Proactive Secret Sharing for Large Data via Concise Vector Commitments.
In: LNCS, Springer, International Conference on Codes, Cryptology, and Information Security (C2SI) 2019, Rabat, Morocco, April 22 - 24, 2019, [Conference or Workshop Item]

Hartwig, Katrin and Reuter, Christian (2019):
TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter.
Siegen, Germany, Proceedings of the International Conference on Wirtschaftsinformatik (WI), Siegen, Germany, 23.-27.2.2019, [Conference or Workshop Item]

Hartwig, Katrin and Reuter, Christian Reuter, Christian (ed.) (2019):
Fighting Misinformation on Twitter: The Plugin based approach TrustyTweet.
Darmstadt, Germany, TUprints, SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges, Darmstadt, Germany, 25.-27.9.2019, [Conference or Workshop Item]

Kaufhold, Marc-André and Grinko, Margarita and Reuter, Christian and Schorch, Marén and Langer, Amanda and Skudelny, Sascha and Hollick, Matthias (2019):
Potentiale von IKT beim Ausfall kritischer Infrastrukturen: Erwartungen, Informationsgewinnung und Mediennutzung der Zivilbevölkerung in Deutschland.
Siegen, Germany, Proceedings of the International Conference on Wirtschaftsinformatik, Siegen, Germany, 23.-27.2.2019, [Conference or Workshop Item]

Kaufhold, Marc-André and Reuter, Christian Reuter, Christian (ed.) (2019):
Cultural Violence and Peace in Social Media.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, [Book Section]

Kaufhold, Marc-André and Reuter, Christian Reuter, Christian (ed.) (2019):
Social Media Misuse: Cultural Violence, Peace and Security in Digital Networks.
Darmstadt, Germany, TUprints, SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges, Darmstadt, Germany, 25.-27.9.2019, [Conference or Workshop Item]

Kaufhold, Marc-André and Reuter, Christian and Ludwig, Thomas (2019):
Cross-Media Usage of Social Big Data for Emergency Services and Volunteer Communities: Approaches, Development and Challenges of Multi-Platform Social Media Services.
In: arXiv:1907.07725 cs.SI, pp. 1-11. [Article]

Kaufhold, Marc-André and Schmidt, Arne and Seifert, Fabienne and Riebe, Thea and Reuter, Christian (2019):
SentiNet: Twitter-basierter Ansatz zur kombinierten Netzwerk- und Stimmungsanalyse in Katastrophenlagen.
ACM, Mensch und Computer 2019 - Workshopband, Hamburg, Germany, 8.-11.9.2019, ISSN 2510-2672,
[Conference or Workshop Item]

Langer, Amanda and Kaufhold, Marc-André and Runft, Elena and Reuter, Christian and Grinko, Margarita and Pipek, Volkmar (2019):
Counter Narratives in Social Media: An Empirical Study on Combat and Prevention of Terrorism.
Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), València, Spain, May 19 to 22, 2019, [Conference or Workshop Item]

Linsner, Sebastian and Varma, Rashmi and Reuter, Christian (2019):
Vulnerability Assessment in the Smart Farming Infrastructure through Cyberattacks.
Wien, 38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, Wien, 18.-19. Februar 2019, [Conference or Workshop Item]

Nyman, Thomas and Dessouky, Ghada and Zeitouni, Shaza and Lehikoinen, Aaro and Paverd, Andrew and Asokan, N. and Sadeghi, Ahmad-Reza (2019):
HardScope: Hardening Embedded Systems Against Data-Oriented Attacks.
ACM/IEEE, Design Automation Conference (DAC), 2019, [Conference or Workshop Item]

Oak, Aditya and Mezini, Mira and Salvaneschi, Guido (2019):
Language Support for Multiple Privacy Enhancing Technologies.
ACM, Conference Companion of the 3rd International Conference on Art, Science, and Engineering of Programming, [Conference or Workshop Item]

Reinhold, Thomas and Reuter, Christian Reuter, Christian (ed.) (2019):
From Cyber War to Cyber Peace.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, [Book Section]

Reinhold, Thomas and Reuter, Christian Reuter, Christian (ed.) (2019):
Verification in Cyberspace.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, [Book Section]

Reuter, Christian (2019):
SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges.
Darmstadt, Germany, TUprints, [Book]

Reuter, Christian Reuter, Christian (ed.) (2019):
Information Technology for Peace and Security - Introduction and Overview.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, [Book Section]

Reuter, Christian Reuter, Christian and Schultz, Tanjev and Stegbauer, Christian (eds.) (2019):
Fake News und manipulierte Meinungsbildung.
In: Digitalisierung der Kommunikation und der Wandel von Organisationen, pp. accepted, Frankfurt am Main, Mercator Science-Policy Fellowship-Programme, [Book Section]

Reuter, Christian Ückert, Sandra (ed.) (2019):
Quo Vadis? Digitalisierung und Social Media im Bevölkerungsschutz.
In: Digitalisierung als Erfolgsfaktor für Unternehmern im Wohlfahrts- und Sozialwesen, Nomos, [Book Section]

Reuter, Christian and Aldehoff, Larissa and Riebe, Thea and Kaufhold, Marc-André Reuter, Christian (ed.) (2019):
IT in Peace, Conflict, and Security Research.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, [Book Section]

Reuter, Christian and Altmann, Jürgen and Aal, Konstantin and Aldehoff, Larissa and Buchmann, Johannes and Bernhardt, Ute and Denker, Kai and Herrmann, Dominik and Hollick, Matthias and Katzenbeisser, Stefan and Kaufhold, Marc-André and Nordmann, Alfred and Reinhold, Thomas and Riebe, Thea and Ripper, Annette and Ruhmann, Ingo and Saalbach, Klaus-Peter and Schörnig, Niklas and Sunyaev, Ali and Wulf, Volker Reuter, Christian (ed.) (2019):
The Future of IT in Peace and Security.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, ISBN 978-3-658-25652-4,
DOI: 10.1007/978-3-658-25652-4_19,
[Book Section]

Reuter, Christian and Hartwig, Katrin and Kirchner, Jan and Schlegel, Noah (2019):
Fake News Perception in Germany: A Representative Study of People's Attitudes and Approaches to Counteract Disinformation.
Siegen, Germany, Proceedings of the International Conference on Wirtschaftsinformatik, Siegen, Germany, [Conference or Workshop Item]

Reuter, Christian and Häusser, Katja and Bien, Mona and Herbert, Franziska Alt, Florian and Bulling, Andreas and Döring, Tanja (eds.) (2019):
Between Effort and Security: User Assessment of the Adequacy of Security Mechanisms for App Categories.
ACM, Mensch und Computer 2019, Hamburg, Germany, 8.-11.0.2019, ISSN ISSN 2510-2672,
[Conference or Workshop Item]

Reuter, Christian and Mentler, Tilo and Nestler, Simon and Herczeg, Michael and Ludwig, Thomas and Pottebaum, Jens and Kaufhold, Marc-André (2019):
6. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen - Neue digitale Realitäten.
ACM, Mensch und Computer 2019, Hamburg, Germany, 8.-11.9.2019, ISSN 2510-2672,
[Conference or Workshop Item]

Reuter, Christian and Riebe, Thea and Aldehoff, Larissa and Kaufhold, Marc-André and Reinhold, Thomas Werkner, Ines-Jacqueline (ed.) (2019):
Cyberwar zwischen Fiktion und Realität – technologische Möglichkeiten.
In: Cyberwar – die Digitalisierung der Kriegsführung?, pp. akzeptiert, Springer VS, [Book Section]

Reuter, Christian and Schneider, Wolfgang and Eberz, Daniel (2019):
Resilient Smart Farming (RSF) – Nutzung digitaler Technologien in krisensicherer Infrastruktur.
38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, Wien, AUT, 18.-19.02.2019, [Conference or Workshop Item]

Reuter, Christian and Schultz, Tanjev and Stegbauer, Christian (2019):
Digitalisierung der Kommunikation und der Wandel von Organisationen.
Frankfurt am Main, Mercator Science-Policy Fellowship-Programme, [Book]

Reuter, Christian and Stieglitz, Stefan and Imran, Muhammad (2019):
Social Media in Conflicts and Crises.
In: Behaviour & Information Technology (BIT), 38, DOI: 10.1080/0144929X.2019.1629025.,
[Article]

Reuter, Christian and Stieglitz, Stefan and Imran, Muhammad (2019):
Special Issue on Social Media in Conflicts and Crises.
accepted, [Book]

Riebe, Thea and Kaufhold, Marc-André and Kumar, Tarun and Reuter, Christian Reuter, Christian (ed.) (2019):
Threat Intelligence Application for Cyber Attribution.
Darmstadt, Germany, TUprints, SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges, Darmstadt, Germany, 25.-27.9.2019, [Conference or Workshop Item]

Riebe, Thea and Langer, Amanda and Kaufhold, Marc-André and Kretschmer, Nina Katharina and Reuter, Christian (2019):
Werte und Wertekonflikte in sozialen Medien für die Vernetzung ungebundener Helfer in Krisensituationen – Ein Value-Sensitive Design Ansatz.
Mensch und Computer 2019, Hamburg, Germany, 8.-11.9.2019, ISSN 2510-2672,
[Conference or Workshop Item]

Riebe, Thea and Reuter, Christian (2019):
Dual-Use in der IT: Bewertung in der Softwareentwicklung.
In: Wissenschaft & Frieden, (1), pp. 46-48. [Article]

Riebe, Thea and Reuter, Christian Reuter, Christian (ed.) (2019):
Accessing Dual Use in IT Development.
Darmstadt, Germany, TUprints, SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges, Darmstadt, Germany, 25.-27.9.2019, [Conference or Workshop Item]

Riebe, Thea and Reuter, Christian Reuter, Christian (ed.) (2019):
Dual Use and Dilemmas for Cybersecurity, Peace and Technology Assessment.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, [Book Section]

Saeed, Saqib and Pipek, Volkmar and Rohde, Markus and Reuter, Christian and Carvalho, Pinatti De (2019):
Nomadic Knowledge Sharing Practices and Challenges: Findings from a Long-term Case Study.
In: IEEE Access, 7 (1), pp. 63564-63577. DOI: 10.1109/ACCESS.2019.2916903,
[Article]

Schabhüser, Lucas and Butin, Denis and Buchmann, Johannes (2019):
Function-Dependent Commitments from Homomorphic Authenticators.
Springer, 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, 3-5 July 2019, [Conference or Workshop Item]

Schmidbauer-Wolf, Gina Maria and Herbert, Franziska and Reuter, Christian (2019):
Ein Kampf gegen Windmühlen: qualitative Studie über Informatikabsolventinnen und ihre Datenprivatheit.
ACM, Mensch und Computer 2019 - Workshopband, Hamburg, Germany, 8.-11.9.2019, ISSN 2510-2672,
[Conference or Workshop Item]

Schmidbauer-Wolf, Gina Maria and Herbert, Franziska and Reuter, Christian Altmann, Jürgen and Göttsche, Malte and Himmel, Mirko and Reuter, Christian (eds.) (2019):
Responsible Data Usage in Smart Cities: Privacy in Everyday Life vs. Reacting to Emergency Situations.
pp. 70-73, SCIENCE PEACE SECURITY '19 - Interdisciplinary Conference on Technical Peace and Security Challenges, Darmstadt, Germany, 25.-27.9., DOI: 10.25534/tuprints-00009164,
[Conference or Workshop Item]

Stute, Milan and Narain, Sashank and Mariotto, Alex and Heinrich, Alexander and Kreitschmann, David and Noubir, Guevara and Hollick, Matthias (2019):
A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link.
Santa Clara, CA, USA, 28th USENIX Security Symposium (USENIX Security '19), Santa Clara, CA, USA, August 14–16, 2019, [Conference or Workshop Item]

Zimmermann, Verena and Renaud, Karen (2019):
Moving from a "human-as-problem” to a "human-as-solution” cybersecurity mindset.
In: International Journal of Human-Computer Studies, Elsevier, DOI: 10.1016/j.ijhcs.2019.05.005,
[Article]

Álvarez, Flor and Almon, Lars and Radtki, Hauke and Hollick, Matthias (2019):
Bluemergency: Mediating Post-disaster Communication Systems using the Internet of Things and Bluetooth Mesh.
9th IEEE Global Humanitarian Technology Conference (IEEE GHTC 2019), Seattle, WA, 17-20, Oktober, 2019, [Conference or Workshop Item]

2018

Geihs, Matthias and Buchmann, Johannes (2018):
ELSA: Efficient Long-Term Secure Storage of Large Datasets.
In: LNCS, In: International Conference on Information Security and Cryptology (ICISC) 2018,
Springer, Seoul, Korean, Nov 28, 2018 - Nov 30, 2018, [Conference or Workshop Item]

Heidt, Margareta and Gerlach, Jin (2018):
The Influence of SME Constraints in an Organizational IT Security Context.
San Francisco, USA, International Conference on Information Systems (ICIS), San Francisco, USA, 13.-16.12.2018, [Conference or Workshop Item]

Fasihi Yazdi, Mohsen (2018):
Study on Security Level of "Security Stack Exchange": How Trustable are Code Snippet on this Plattform?!
TU Darmstadt, [Master Thesis]

Büscher, Niklas (2018):
Compilation for More Practical Secure Multi-Party Computation.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

McCracken, Gabriel (2018):
A Field Theory for Quantum Markov Processes.
TU Darmstadt, [Bachelor Thesis]

Reith, Robert Nikolai (2018):
Silently Learning your Support Vector Machines Models.
TU Darmstadt, [Bachelor Thesis]

Dantas, Yuri Gil and Hamann, Tobias and Mantel, Heiko (2018):
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
In: LNCS, In: The 11th International Symposium on Foundations & Practice of Security (FPS),
Springer, The 11th International Symposium on Foundations & Practice of Security (FPS), Montreal, Canada, 13, 14 and 15 November 2018, [Conference or Workshop Item]

Stute, Milan and Kreitschmann, David and Hollick, Matthias (2018):
Demo: Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link.
ACM, The 24th Annual International Conference on Mobile Computing and Networking (MobiCom '18), New Delhi, India, October 29–November 2, 2018, DOI: 10.1145/3241539.3267716,
[Conference or Workshop Item]

Gil Dantas, Yuri and Hamann, Tobias and Mantel, Heiko (2018):
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
In: The 11th International Symposium on Foundations & Practice of Security (FPS), Springer, [Article]

Stute, Milan and Kreitschmann, David and Hollick, Matthias (2018):
One Billion Apples' Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol.
ACM, The 24th Annual International Conference on Mobile Computing and Networking (MobiCom '18), New Delhi, India, October 29–November 2, 2018, DOI: 10.1145/3241539.3241566,
[Conference or Workshop Item]

Brandt, Markus and Dai, Tianxiang and Klein, Amit and Shulman, Haya and Waidner, Michael (2018):
Domain Validation ++ for MitM-Resilient PKI.
ACM CCS 2018, Toronto, Canada, 15.-19.10. 2018, [Conference or Workshop Item]

Degabriele, Jean Paul and Fischlin, Marc (2018):
Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove.
In: LNCS, In: Advances in Cryptology – ASIACRYPT 2018,
Springer, Asiacrypt 2018 - the 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, Australia, December 02-06, 2018, [Conference or Workshop Item]

Karvelas, Nikolaos and Treiber, Amos and Katzenbeisser, Stefan (2018):
Examining Leakage of Access Counts in ORAM Constructions.
In: 17. Workshop on Privacy in the Electronic Society (WPES’18), pp. 66-70,
ACM, DOI: 10.1145/3267323.3268963,
[Conference or Workshop Item]

Burger, Michael and Bischof, Christian and Calotoiu, Alexandru and Wunderer, Thomas and Wolf, Felix (2018):
Exploring the Performance Envelope of the LLL Algorithm.
In: CSE-2018,
IEEE Computer Society, CSE 2018 – 21st IEEE International Conference on Computational Science and Engineering, Faculty of Automatic Control and Computers, University Politehnica of Bucharest, Romania, 29.-31.10.2018, [Conference or Workshop Item]

Dziembowski, Stefan and Eckey, Lisa and Faust, Sebastian (2018):
FairSwap: How to fairly exchange digital goods.
In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security,
ACM, 25th ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, 15-19 October 2018, [Conference or Workshop Item]

Dix, Isabella (2018):
A Type System and an Implementation for Detecting the Lucky13 Vulnerability with SPASCA.
TU Darmstadt, [Master Thesis]

Ibrahim, Ahmad (2018):
Collective Attestation: for a Stronger Security in Embedded Networks.
IEEE, Salvador, Brazil, Brazil, October, 2.-5., DOI: 10.1109/SRDS.2018.00039,
[Conference or Workshop Item]

Büscher, Niklas and Demmler, Daniel and Katzenbeisser, Stefan and Kretzmer, David and Schneider, Thomas (2018):
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
In: 25. ACM Conference on Computer and Communications Security (CCS'18), pp. 847-861,
ACM, DOI: 10.1145/3243734.3243786,
[Conference or Workshop Item]

Dziembowski, Stefan and Faust, Sebastian and Hostakova, Kristina (2018):
General State Channel Networks.
2018, In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security,
ACM, 25th ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, 15-19 October 2018, [Conference or Workshop Item]

Keshavaprakash, Manoj (2018):
A Benchmark for New and Existing Model Comparison.
TU Darmstadt, [Master Thesis]

Marakis, Vassilios (2018):
Anwendung der semiklassischen Näherung auf Probleme des Zentralkraftfeldes und der Quantendefekttheorie.
TU Darmstadt, [Master Thesis]

Schmid, Jakob (2018):
Independent Compilation for the Arithmetic Black Box.
TU Darmstadt, [Master Thesis]

Schneider, Thomas and Tkachenko, Oleksandr (2018):
Towards Efficient Privacy-Preserving Similar Sequence Queries on Outsourced Genomic Databases.
In: 17. Workshop on Privacy in the Electronic Society (WPES’18), pp. 71-75,
ACM, DOI: 10.1145/3267323.3268956,
[Conference or Workshop Item]

Guski, Florian (2018):
Simulation of the Quantum Hybrid Attack in Q#.
TU Darmstadt, [Bachelor Thesis]

Wunderer, Thomas (2018):
A Detailed Analysis of the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack.
In: Journal of Mathematical Cryptology (JMC), De Gruyter, [Article]

Wunderer, Thomas and Burger, Michael and Nguyen, Giang Nam (2018):
Parallelizing the Hybrid Lattice Reduction and Meet-in-the-Middle Attack.
In: CSE-2018,
IEEE Computer Society, CSE 2018 – 21st IEEE International Conference on Computational Science and Engineering, Faculty of Automatic Control and Computers, University Politehnica of Bucharest, Romania, 29.-31.10.2018, [Conference or Workshop Item]

Fischlin, Marc and Mazaheri, Sogol (2018):
Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks.
In: 2018 IEEE 31st Computer Security Foundations Symposium (CSF),
IEEE, 2018 IEEE 31st Computer Security Foundations Symposium (CSF), Oxford, UK, 9.-12.7. 2018, DOI: 10.1109/CSF.2018.00013,
[Conference or Workshop Item]

Karvelas, Nikolaos and Treiber, Amos and Katzenbeisser, Stefan (2018):
Examining Leakage of Access Counts in ORAM Constructions.
In: 29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag),
Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), Bosch Renningen, Germany, 6.-7.9.2018, [Conference or Workshop Item]

El Bansarkhani, Rachid (2018):
LARA - A Design Concept for Lattice-based Encryption.
In: ePrint Archive, (Report 2017/049), [Report]

Günther, Daniel (2018):
Private Function Evaluation with Universal Circuits.
In: 29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag),
Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), Bosch Renningen, Germany, 6.-7.9.2018, [Conference or Workshop Item]

Palacios, Joan and Steinmetzer, Daniel and Loch, Adrian and Hollick, Matthias and Widmer, Joerg (2018):
Adaptive Codebook Optimization for Beam-Training on Off-The-Shelf IEEE 802.11ad Devices.
MobiCom 2018 - 24th ACM Annual International Conference on Mobile Computing and Networking, New Delhi, India, 29.10.-2.11.2018, DOI: 10.1145/3241539.3241576,
[Conference or Workshop Item]

Brasser, Ferdinand and Frassetto, Tommaso and Riedhammer, Korbinian and Sadeghi, Ahmad-Reza and Schneider, Thomas and Weinert, Christian (2018):
VoiceGuard: Secure and Private Speech Processing.
In: Interspeech 2018, pp. 1303-1307,
International Speech Communication Association (ISCA), DOI: 10.21437/Interspeech.2018-2032,
[Conference or Workshop Item]

Earley, Timothy (2018):
Extending the Language Coverage of Side-Channel Finder AVR.
TU Darmstadt, [Bachelor Thesis]

Helm, Dominik and Kübler, Florian and Eichberg, Michael and Reif, Michael and Mezini, Mira (2018):
A unified lattice model and framework for purity analyses.
In: Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, pp. 340-350,
ACM, ASE 2018, Corum, Montpellier, France, 3.-7.9.2018, DOI: 10.1145/3238147.3238226,
[Conference or Workshop Item]

Humbert, Marcel Nikolas (2018):
Einführung in die Störungstheorie der Allgemeinen Relativitätstheorie.
TU Darmstadt, [Bachelor Thesis]

Järvinen, Kimmo and Kiss, Ágnes and Schneider, Thomas and Tkachenko, Oleksandr and Yang, Zheng (2018):
Faster Privacy-Preserving Location Proximity Schemes.
In: 17. International Conference on Cryptology And Network Security (CANS'18), pp. 3-22,
Springer, DOI: 10.1007/978-3-030-00434-7_1,
[Conference or Workshop Item]

Tkachenko, Oleksandr (2018):
Privacy-Preserving Genomics on a Large Scale.
In: 29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag),
Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), Bosch Renningen, Germany, 6.-7.9.2018, [Conference or Workshop Item]

Hlavacek, Tomas and Herzberg, Amir and Shulman, Haya and Waidner, Michael (2018):
Practical Experience: Methodologies for Measuring Route Origin Validation.
DSN 2017 - The 47th IEEE/IFIP International Conference on Dependable Systems and Networks, Denver,CO,USA, 26.-29.06.2018, [Conference or Workshop Item]

Anagnostopoulos, Nikolaos Athanasios and Arul, Tolga and Fan, Yufan and Hatzfeld, Christian and Tehranipoor, Fatemeh and Katzenbeisser, Stefan (2018):
Addressing the Effects of Temperature Variations on Intrinsic Memory-Based Physical Unclonable Functions.
28th Crypto-Day, Kirchheim bei München, Germany, 07.- 08.06.2018, DOI: 10.18420/cdm-2018-28-23,
[Conference or Workshop Item]

Kumar, Manish and Anagnostopoulos, Nikolaos Athanasios and Fan, Yufan and Katzenbeisser, Stefan (2018):
Advanced Reconfigurable Physical Unclonable Functions(AR-PUFs) and Their Security Applications.
28th Crypto-Day, Kirchheim bei München, Germany, 07.- 08.06.2018, DOI: 10.18420/cdm-2018-28-22,
[Conference or Workshop Item]

Schaller, André and Xiong, Wenjie and Anagnostopoulos, Nikolaos Athanasios and Saleem, Umair and Gabmeyer, Sebastian and Skoric, Boris and Katzenbeisser, Stefan and Szefer, Jakub (2018):
Decay-Based DRAM PUFs in Commodity Devices.
In: IEEE Transactions on Dependable and Secure Computing (TDSC), [Article]

Helm, Dominik (2018):
A Framework for Modular Purity Analyses.
TU Darmstadt, [Master Thesis]

Kalsen, Ali (2018):
On the impact of quantum algorithms on lattice enumeration.
TU Darmstadt, [Master Thesis]

Sharma, Ratika (2018):
Testing the effects of voltage variations on PUF implementations in Commercial Off-The-Shelf (COTS) devices.
TU Darmstadt, [Master Thesis]

Frassetto, Tommaso and Jauernig, Patrick and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2018):
IMIX: In-Process Memory Isolation EXtension.
In: Proceedings of the 27th USENIX Security Symposium, pp. 83-97,
27th USENIX Security Symposium - Technical Sessions Track 2, Baltimore, MD, USA, 15.-17.08.2018, ISBN 978-1-939133-04-5,
[Conference or Workshop Item]

Gerber, Nina and Zimmermann, Verena and Henhapl, Birgit and Emeröz, Sinem and Volkamer, Melanie (2018):
Finally Johnny Can Encrypt. But Does This Make Him Feel More Secure?
International Conference on Availability, Reliability and Security (ARES), Hamburg, Germany, 27.08. - 30.08.2018, DOI: 10.1145/3230833.3230859,
[Conference or Workshop Item]

Kiss, Ágnes and Schick, Oliver and Schneider, Thomas (2018):
Web Application for Privacy-Preserving Scheduling (Poster).
27. USENIX Security Symposium: USENIX Security'18 : Poster Session, Baltimore, MD, USA, August 15–17, 2018, [Conference or Workshop Item]

Mitev, Richard (2018):
Lyin’ Alexa - Skill-Based Man-in-the-Middle Attack on Virtual Assistants.
TU Darmstadt, [Master Thesis]

Zimmermann, Verena and Gerber, Nina and Kleboth, Marius and von Preuschen, Alexandra and Schmidt, Konstantin and Mayer, Peter Clarke, Nathan L. and Furnell, Steven M. (eds.) (2018):
The Quest to Replace Passwords Revisited – Rating Authentication Schemes.
In: Twelth International Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018), pp. 38-48,
Plymouth, UK, University of Plymouth, Twelth International Symposium on Human Aspects of Information Security & Assurance (HAISA), Dundee, UK, 29. - 31.08.2018, [Conference or Workshop Item]

du Crest de Villeneuve, Come (2018):
Evaluation of the Efficiency of different Architectures and Pathfinding Algorithms.
TU Darmstadt, [Master Thesis]

Dodhy, Anam (2018):
Misuses of Parameters for Cryptographic APIs.
TU Darmstadt, [Master Thesis]

Ece, Olcay (2018):
Security of E-Mail-Encryption.
TU Darmstadt, [Bachelor Thesis]

Hald, Martin (2018):
Cryptographic Analysis of the Bitmessage Protocol.
TU Darmstadt, [Master Thesis]

Hanreich, Matthias (2018):
Security Analysis and Firmware Modification of Fitbit Fitness Trackers.
TU Darmstadt, [Master Thesis]

Kumar, Manish (2018):
Advanced Reconfigurable Physical Unclonable Functions(AR-PUFs) and their security applications.
TU Darmstadt, [Master Thesis]

Nanjunde Gowda, Vidyashree (2018):
Benchmarking Static Misuse or Bug Detectors Using Software Vulnerabilities.
TU Darmstadt, [Master Thesis]

Kohnhäuser, Florian and Büscher, Niklas and Katzenbeisser, Stefan (2018):
SALAD: Secure and Lightweight Attestation of Highly Dynamic and Disruptive Networks.
In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security, pp. 329-342,
Incheon, Republic of Korea, DOI: 10.1145/3196494.3196544,
[Conference or Workshop Item]

Baack, Leon (2018):
Optimisation of parts of a set-up for quantum key distribution.
TU Darmstadt, [Bachelor Thesis]

Buescher, Niklas and Weber, Alina and Katzenbeisser, Stefan (2018):
Towards Practical RAM based Secure Computation.
In: European Symposium on Research in Computer Security (ESORICS),
ESORICS 2018, Barcelona, Spain, 3.9.-7.9. 2018, [Conference or Workshop Item]

Göhring, Matthias and Shulman, Haya and Waidner, Michael (2018):
Path MTU Discovery Considered Harmful.
ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems, Vienna, Austria, 2.-5.7.2018, [Conference or Workshop Item]

Classen, Jiska and Wegemer, Daniel (2018):
Fitbit Firmware Hacking.
Recon,
[Other]

Daubert, Jörg and Boopalan, Dhanasekar and Mühlhäuser, Max and Vasilomanolakis, Emmanouil (2018):
HoneyDrone: a medium-interaction Unmanned Aerial Vehicle Honeypot.
In: IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies, pp. 1-6,
IEEE, Taipei, Taiwan, DOI: 10.1109/NOMS.2018.8406315,
[Conference or Workshop Item]

Albrecht, Martin R. and Curtis, Benjamin R. and Deo, Amit and Davidson, Alex and Player, Rachel and Postlethwaite, Eamonn W. and Virdia, Fernando and Wunderer, Thomas (2018):
Estimate all the {LWE, NTRU} schemes!
In: LNCS, In: SCN 2018,
11th Conference on Security and Cryptography for Networks, Amalfi, Italy, [Conference or Workshop Item]

Alexopoulos, Nikolaos and Habib, Sheikh Mahbub and Mühlhäuser, Max (2018):
Towards Secure Distributed Trust Management on a Global Scale.
pp. 49-54, ACM, IoT S&P’18: ACM SIGCOMM 2018 Workshop on IoT Security and Privacy, Budapest, Hungary, 20.-25.08, ISBN 978-1-4503-5905-4,
DOI: 10.1145/3229565.3229569,
[Conference or Workshop Item]

Anagnostopoulos, Nikolaos Athanasios and Katzenbeisser, Stefan and Chandy, John A. and Tehranipoor, Fatemeh (2018):
An Overview of DRAM-Based Security Primitives.
In: Cryptography 2018, 2 (7), MDPI, DOI: 10.3390/cryptography2020007,
[Article]

Bindel, Nina and Buchmann, Johannes and Göpfert, Florian and Schmidt, Markus (2018):
Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples.
In: Journal of Mathematical Cryptology, de Gruyter, [Article]

Fischlin, Marc and Harasser, Patrick (2018):
Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent.
In: Springer International Publishing, LNCS 10892, In: Applied Cryptography and Network Security - ACNS 2018, pp. 202-220,
16th International Conference, ACNS 2018, Leuven, Belgium, 2.7.-4.7. 2018, [Conference or Workshop Item]

Geihs, Matthias and Karvelas, Nikolaos and Katzenbeisser, Stefan and Buchmann, Johannes (2018):
PROPYLA: Privacy Preserving Long-Term Secure Storage.
In: ACM, In: SCC Workshop @ AsiaCCS 2018,
Songdo, Incheon, Korea, The Sixth International Workshop on Security in Cloud Computing (SCC), [Conference or Workshop Item]

Kannwischer, Matthias and Genêt, Aymeric and Butin, Denis and Krämer, Juliane and Buchmann, Johannes (2018):
Differential Power Analysis of XMSS and SPHINCS.
In: LNCS, 10815, pp. 168-188, Springer, 9th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2018), Singapore, 23.-24.04., ISBN 978-3-319-89640-3,
DOI: 10.1007/978-3-319-89641-0_10,
[Conference or Workshop Item]

Schabhüser, Lucas and Butin, Denis and Demirel, Denise and Buchmann, Johannes (2018):
Function-Dependent Commitments for Verifiable Multi-Party Computation.
In: LNCS, In: Information Security - 21st International Conference, ISC 2018,
Guildford, UK, [Conference or Workshop Item]

Wunderer, Thomas and Wang, Yuntao (2018):
Revisiting the Sparsification Technique in Kannan’s Embedding Attack on LWE.
In: Springer LNCS, In: ISPEC 2018,
Tokyo, Japan, 14th International Conference on Information Security Practice and Experience (ISPEC 2018), [Conference or Workshop Item]

Carpent, Xavier and Eldefrawy, Karim and Rattanavipanon, Norrathep and Sadeghi, Ahmad-Reza and Tsudik, Gene (2018):
Invited: Reconciling Remote Attestation and Safety-Critical Operation on Simple IoT Devices.
ACM, Design Automation Conference, San Francisco, USA, 2018, June 24-29, [Conference or Workshop Item]

Dessouky, Ghada and Abera, Tigist and Ibrahim, Ahmad and Sadeghi, Ahmad-Reza (2018):
LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution.
37th IEEE International Conference On Computer Aided Design 2018 (ICCAD’18), 2018, [Conference or Workshop Item]

Ambrosin, Moreno and Conti, Mauro and Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Schunter, Matthias (2018):
SCIoT: A Secure and sCalable end-to-end management framework for IoT Devices.
23rd European Symposium on Research in Computer Security (ESORICS 2018), Barcelona, Spain, 2018, [Conference or Workshop Item]

Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Tsudik, Gene (2018):
US-AID: Unattended Scalable Attestation of IoT Devices.
37th IEEE International Symposium on Reliable Distributed Systems (SRDS 2018), 2018, [Conference or Workshop Item]

Demmler, Daniel and Rindal, Peter and Rosulek, Mike and Trieu, Ni (2018):
PIR-PSI: Scaling Private Contact Discovery.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), pp. 159-178. De Gruyter Open, DOI: 10.1515/popets-2018-0037,
[Article]

Eichberg, Michael and Kübler, Florian and Helm, Dominik and Reif, Michael and Salvaneschi, Guido and Mezini, Mira (2018):
Lattice Based Modularization of Static Analyses.
In: Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, pp. 113-118,
ACM, SOAP 2018, Amsterdam, Netherlands, DOI: 10.1145/3236454.3236509,
[Conference or Workshop Item]

Franke, Fabian (2018):
Learning the Beams.
TU Darmstadt, [Master Thesis]

Krüger, Stefan and Späth, Johannes and Ali, Karim and Bodden, Eric and Mezini, Mira (2018):
CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.
In: 32nd European Conference on Object-Oriented Programming (ECOOP 2018), pp. 10:1-10:27,
Schloss Dagstuhl-Leibniz-Zentrum für Informatik, 32nd European Conference on Object-Oriented Programming (ECOOP 2018), Amsterdam, The Netherlands, 15.-21.07.2018, DOI: 10.4230/LIPIcs.ECOOP.2018.10,
[Conference or Workshop Item]

Mantz, Dennis (2018):
InternalBlue – A Bluetooth Experimentation Framework Based on Mobile Device Reverse Engineering.
TU Darmstadt, [Master Thesis]

Mehmedovic, Damir (2018):
Wi-Fi Based Key Exchange On Android Smartphones.
TU Darmstadt, [Bachelor Thesis]

Reif, Michael and Eichberg, Michael and Kübler, Florian and Mezini, Mira (2018):
Systematic Evaluation of the Unsoundness of Call Graph Construction Algorithms for Java.
In: Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, pp. 107-112,
ACM, SOAP 2018, Amsterdam, Netherlands, DOI: 10.1145/3236454.3236503,
[Conference or Workshop Item]

Rowe, Steven (2018):
Blockchain-based market for alert data exchange in Collaborative Intrusion Detection Systems.
TU Darmstadt, [Bachelor Thesis]

Senker, Matthias (2018):
PSI Meets Signal: Integrating a Malicious-Secure Private Contact Discovery Solution in an Open-Source Instant Messaging Service.
TU Darmstadt, [Master Thesis]

Anagnostopoulos, Nikolaos Athanasios and Arul, Tolga and Fan, Yufan and Hatzfeld, Christian and Schaller, André and Xiong, Wenjie and Jain, Manishkumar and Saleem, Umair and Lotichius, Jan and Gabmeyer, Sebastian and Szefer, Jakub and Katzenbeisser, Stefan (2018):
Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security.
In: Cryptography, 2 (3), MDPI, ISSN 2410-387X,
DOI: 10.3390/cryptography2030013,
[Article]

Heidt, Margareta (2018):
Learning from Climate Research: Applying the Finite Pool of Worry on Cyber-Related Hazards.
In: European Conference on Information Systems (ECIS), Portsmouth, United Kingdom, 2018 [Research-in-Progress], [Article]

Schaad, Andreas and Grohmann, Bjoern and Winzenried, Oliver and Brasser, Ferdinand and Sadeghi, Ahmad-Reza (2018):
Towards a Cloud-based System for Software Protection and Licensing.
In: Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, ICETE 2018 - Volume 2, pp. 698-702,
k.A., SciTePress, Secrypt 2018, Porto, Portugal, 26.-28.07.2018, ISBN 978-989-758-319-3,
DOI: 10.5220/0006899506980702,
[Conference or Workshop Item]

Richter, Philipp and Yang, Zheng and Tkachenko, Oleksandr and Leppäkoski, Helena and Järvinen, Kimmo and Schneider, Thomas (2018):
Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting.
In: 8. International Conference on Localization and GNSS (ICL-GNSS'18), pp. 1-6,
IEEE, DOI: 10.1109/ICL-GNSS.2018.8440910,
[Conference or Workshop Item]

Amler, Hendrik (2018):
Evaluation of payment channel networks for micropayments.
TU Darmstadt, [Master Thesis]

Deaconescu, Razvan and Carabas, Costin and Manda, Iulia and Enck, William and Chiroiu, Mihai and Li, Ninghui and Sadeghi, Ahmad-Reza (2018):
iOracle: Automated Evaluation of Access Control Policies in iOS.
In: AsiaCCS, In: 13th ASIA Conference on Information, Computer and Communications Security,
[Conference or Workshop Item]

Gajewski, Marvin (2018):
Asymptotische Eigenschaften offener quantenoptischer Systeme.
TU Darmstadt, [Bachelor Thesis]

Miettinen, Markus and Nguyen, Thien Duc and Asokan, N. and Sadeghi, Ahmad-Reza (2018):
Revisiting Context-Based Pairing in IoT.
In: Proceedings of the 55th Design Automation Conference (DAC), pp. 32:1-32:6,
ACM, 55th Design Automation Conference (DAC), San Francisco, CA, USA, 24.-29.06. 2018, [Conference or Workshop Item]

Renaud, Karen and Zimmermann, Verena (2018):
Guidelines For Ethical Nudging in Password Authentication.
In: South African Institute Of Electrical Engineers (SAIEE), 109 (2), pp. 102-118. [Article]

Riazi, M. Sadegh and Weinert, Christian and Tkachenko, Oleksandr and Songhori, Ebrahim M. and Schneider, Thomas and Koushanfar, Farinaz (2018):
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications.
In: 13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18), pp. 707-721,
ACM, DOI: 10.1145/3196494.3196522,
[Conference or Workshop Item]

Steinmetzer, Daniel and Yuan, Yimin and Hollick, Matthias (2018):
Beam-Stealing: Intercepting the Sector Sweep to Launch Man-in-the-Middle Attacks on Wireless IEEE 802.11ad Networks.
pp. 12-22, 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Stockholm, Sweden, Jun 18, 2018 - Jun 20, 2018, DOI: 10.1145/3212480.3212499,
[Conference or Workshop Item]

Tkachenko, Oleksandr and Weinert, Christian and Schneider, Thomas and Hamacher, Kay (2018):
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
In: 13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18), pp. 221-235,
ACM, DOI: 10.1145/3196494.3196541,
[Conference or Workshop Item]

Varky, Jacek (2018):
TeePay – Using Trusted Execution Environments for Off-chain Payment.
TU Darmstadt, [Master Thesis]

Zeitouni, Shaza and Gens, David and Sadeghi, Ahmad-Reza (2018):
It’s Hammer Time: How to Attack (Rowhammer-based) DRAM-PUFs.
In: Design Automation Conference (DAC) 2018,
[Conference or Workshop Item]

van der Wijden, Marius (2018):
Payment and State Channels in practice.
TU Darmstadt, [Master Thesis]

Kiel, Robert (2018):
Zero-Knowledge Contingent Payments.
TU Darmstadt, [Master Thesis]

Ullrich, Fabian (2018):
Analysing and Evaluating Interface, Communication, and Web Security in Productive IoT Ecosystems.
TU Darmstadt, [Master Thesis]

Wolf, Yannic (2018):
Eine Faserverstärkerstufe für den Quantenhub.
TU Darmstadt, [Bachelor Thesis]

Biondo, Andrea and Conti, Mauro and Davi, Lucas and Frassetto, Tommaso and Sadeghi, Ahmad-Reza (2018):
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX.
27th USENIX Security Symposium, [Conference or Workshop Item]

Liu, Mo-meng and Krämer, Juliane and Hu, Yu-pu and Buchmann, Johannes (2018):
Quantum security analysis of a lattice-based oblivious transfer protocol.
In: LNCS, In: Frontiers of Information Technology & Electronic Engineering, 18 (9), pp. 1348-1369. Springer, ISSN 2095-9184 (Print) 2095-9230 (Online),
[Article]

Nguyen, Lisa and Krüger, Stefan and Hill, Patrick and Ali, Karim and Bodden, Eric (2018):
VisuFlow: a Debugging Environment for Static Analyses.
In: ICSE,
ACM, [Conference or Workshop Item]

Treiber, Amos (2018):
Access Count Leakage in Oblivious RAMs.
TU Darmstadt, [Master Thesis]

Deligeorgopoulos, Efstathios (2018):
Evaluation of Proactive Secret Sharing for Long-Term Secure Storage.
TU Darmstadt, [Master Thesis]

Scheidel, Lukas (2018):
Distributed Path ORAM.
TU Darmstadt, [Bachelor Thesis]

Bielsa, Guillermo and Palacios, Joan and Loch, Adrian and Steinmetzer, Daniel and Cesari, Paolo and Widmer, Joerg (2018):
Indoor Localization Using Commercial Off-The-Shelf 60 GHz Access Points.
IEEE International Conference on Computer Communications (INFOCOM), Honolulu, Hawaii, USA, 15-19 April 2018, [Conference or Workshop Item]

Pinkas, Benny and Schneider, Thomas and Weinert, Christian and Wieder, Udi (2018):
Efficient Circuit-based PSI via Cuckoo Hashing.
In: 37. Advances in Cryptology -- EUROCRYPT 2018, pp. 125-157,
Springer, DOI: 10.1007/978-3-319-78372-7_5,
[Conference or Workshop Item]

Tariq, Taha (2018):
Web application for privacy-preserving assignments.
TU Darmstadt, [Master Thesis]

Vasilomanolakis, Emmanouil and Daubert, Jörg and Boopalan, Dhanasekar and Mühlhäuser, Max (2018):
Don't Steal my Drone: Catching Attackers with an Unmanned Aerial Vehicle Honeypot.
In: IEEE/IFIP Network Operations and Management Symposium (NOMS), pp. 1-2,
IEEE, Taipei, Taiwan., DOI: 10.1109/NOMS.2018.8406119,
[Conference or Workshop Item]

Glanz, Leonid and Amann, Sven and Eichberg, Michael and Reif, Michael and Mezini, Mira Tichy, Matthias and Bodden, Eric and Kuhrmann, Marco and Wagner, Stefan and Steghöfer, Jan-Philipp (eds.) (2018):
CodeMatch: Obfuscation Won't Conceal Your Repackaged App.
In: Software Engineering und Software Management 2018, pp. 117-118, Gesellschaft für Informatik, [Book Section]

Brandy, Malte (2018):
Asymptotische Eigenschaften iterierter Quantenoperationen.
TU Darmstadt, [Master Thesis]

Neubauer, Sven (2018):
Angriffsanalyse einer TETRA-Basisstation.
TU Darmstadt, [Bachelor Thesis]

Alhassan, Masaud Y. (2018):
Improving scalability of universal circuits for large-scale private function evaluation.
TU Darmstadt, [Master Thesis]

Classen, Jiska and Wegemer, Daniel and Patras, Paul and Spink, Tom and Hollick, Matthias (2018):
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware.
In: PACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT),
ACM, [Conference or Workshop Item]

Hofmann, Daniel (2018):
Charakterisierung von verschränkten Photonenpaaren.
TU Darmstadt, [Master Thesis]

Saleem, Umair Muhammad (2018):
Flash-based Physical Unclonable Functions (PUFs) using Commercial Off-The-Shelf (COTS) NAND Flash Memory.
TU Darmstadt, [Master Thesis]

Gens, David and Schmitt, Simon and Davi, Lucas and Sadeghi, Ahmad-Reza (2018):
K-Miner: Uncovering Memory Corruption in Linux.
In: 25th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Trautmann, Nils and Hauke, Philipp (2018):
Trapped-ion quantum simulation of excitation transport: Disordered, noisy, and long-range connected quantum networks.
In: PHYSICAL REVIEW A, 97, pp. 023606. [Article]

Ahmad, Saad (2018):
Using Physical Unclonable Functions (PUFs) for Data-Link Layer Authenticity Verification to Mitigate Attacks on IEEE 802.11ad Beam Training.
TU Darmstadt, [Master Thesis]

Alexopoulos, Nikolaos and Habib, Sheikh Mahbub and Schulz, Steffen and Mühlhäuser, Max (2018):
M-STAR: A Modular, Evidence-based Software Trustworthiness Framework.
In: arxiv, In: CoRR, abs/1801.05764, [Article]

Gerber, Paul and Ghiglieri, Marco and Henhapl, Birgit and Kulyk, Oksana and Marky, Karola and Mayer, Peter and Reinheimer, Benjamin and Volkamer, Melanie (2018):
Human Factors in Security.
In: Sicherheitskritische Mensch-Computer-Interaktion, pp. 83-98, Springer, [Book Section]

Pinkas, Benny and Schneider, Thomas and Zohner, Michael (2018):
Scalable Private Set Intersection Based on OT Extension.
In: ACM Transactions on Privacy and Security (TOPS), 21 (2), pp. 7:1-7:35. DOI: 10.1145/3154794,
[Article]

Steinmetzer, Daniel and Wegemer, Daniel and Hollick, Matthias (2018):
A Practical IEEE 802.11ad Research Platform: The Hidden Potential of Off -the-Shelf Devices.
In: 3rd NSF Millimeter-Wave RCN Workshop,
3rd NSF Millimeter-Wave RCN Workshop, [Conference or Workshop Item]

Reuter, Christian (ed.) (2018):
Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement.
Wiesbaden, Springer Vieweg (Lehrbuch/Fachbuch), ISBN 978-3-658-19522-9,
DOI: 10.1007/978-3-658-19523-6,
[Book]

Reuter, Christian and Hughes, Amanda Lee and Hiltz, Starr Roxanne and Imran, Muhammad and Plotnick, Linda (eds.) (2018):
International Journal of Human–Computer Interaction : Special Issue: Social Media in Crisis Management.
34, (4), New York, Taylor & Francis, ISSN 1044-7318, e-ISSN 1532-7590,
[Journal]

Reuter, Christian and Mentler, Tilo (eds.) (2018):
Journal of Contingencies and Crisis Management : Special Issue: Human-Computer-Interaction and Social Media in Safety-Critical Systems.
26, (1), New York, Wiley, ISSN 0966-0879,
[Journal]

Amann, Sven and Nguyen, Hoan Anh and Nadi, Sarah and Nguyen, Tien and Mezini, Mira (2018):
A Systematic Evaluation of API-Misuse Detectors.
In: IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, [Article]

Asokan, N. and Gröndahl, Tommi and Nguyen, Hoang Long and Nguyen, Thien Duc and Paverd, Andrew and Pendyala, Praveen and Sadeghi, Ahmad-Reza and Stobert, Elizabeth and Tamrakar, Sandeep (2018):
OmniShare: Encrypted Cloud Storage for the Multi-Device Era.
In: IEEE Internet Computing, p. 1. ISSN 1089-7801,
DOI: 10.1109/MIC.2018.182130646,
[Article]

Asokan, N. and Miettinen, Markus (2018):
Ad-Hoc Key Agreement: a Brief History and the Challenges Ahead.
In: Computer Communications, ISSN 0140-3664,
DOI: 10.1016/j.comcom.2018.07.030,
[Article]

Brandt, Markus and Shulman, Haya and Waidner, Michael (2018):
Internet As a Source of Randomness.
pp. 64-70, HotNets '18: 17th ACM Workshop on Hot Topics in Networks, Redmond, USA, November 2018, DOI: 10.1145/3286062.3286072,
[Conference or Workshop Item]

Brasser, Ferdinand and Davi, Lucas and Dhavlle, Abhijitt and Frassetto, Tommaso and Dinakarrao, Sai Manoj Pudukotai and Rafatirad, Setareh and Sadeghi, Ahmad-Reza and Sasan, Avesta and Sayadi, Hossein and Zeitouni, Shaza and Homayoun, Houman (2018):
Advances and Throwbacks in Hardware-assisted Security: Special Session.
In: CASES '18, pp. 15:1-15:10, Piscataway, NJ, USA, IEEE Press, Proceedings of the International Conference on Compilers, Architecture and Synthesis for Embedded Systems, Piscataway, NJ, USA, ISBN 978-1-5386-5564-1,
[Conference or Workshop Item]

Dai, Tianxiang and Shulman, Haya and Waidner, Michael (2018):
Off-path Attacks Against PKI.
pp. 2213-2215, ACM SIGSAG Conference on Computer and Communications Security (CCS 2018), Toronto, Canada, October 2018, DOI: 10.1145/3243734.3278516,
[Conference or Workshop Item]

Dessouky, Ghada and Gens, David and Haney, Patrick and Persyn, Garrett and Kanuparthi, Arun K. and Khattri, Hareesh and Fung, Jason M. and Sadeghi, Ahmad-Reza and Rajendran, Jeyavijayan (2018):
When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs.
In: Cryptography and Security, abs/1812.00197, [Article]

Geihs, Matthias (2018):
Long-Term Protection of Integrity and Confidentiality – Security Foundations and System Constructions.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Gerber, Nina and Zimmermann, Verena and Henhapl, Birgit and Emeröz, Sinem and Volkamer, Melanie and Hilt, Tobias (2018):
Nutzerwahrnehmung der Ende-zu-Ende-Verschlüsselung in WhatsApp.
In: Datenschutz und Datensicherheit (DuD), 42 (11), pp. 680-685. [Article]

Gil Dantas, Yuri and Gay, Richard and Hamann, Tobias and Mantel, Heiko and Schickel, Johannes (2018):
An Evaluation of Bucketing in Systems with Non-Deterministic Timing Behavior.
33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection (IFIP SEC), [Conference or Workshop Item]

Gilad, Yossi and Hlavacek, Tomas and Herzberg, Amir and Schapira, Michael and Shulman, Haya (2018):
Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security.
pp. 57-63, ACM, HotNets'18: 17th ACM Workshop on Hot Topics in Networks, November 2018, Redmond, USA, ISBN 978-1-4503-6120-0,
DOI: 10.1145/3286062.3286071,
[Conference or Workshop Item]

Ibrahim, Ahmad (2018):
Securing Embedded Networks Through Secure Collective Attestation.
In: MobiSys PhD Forum '18, pp. 1-2, New York, NY, USA, ACM, Workshop at 16th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys 2018), 2018, New York, NY, USA, ISBN 978-1-4503-5841-5,
DOI: 10.1145/3212711.3212712,
[Conference or Workshop Item]

Ide, Tobias and Sumer, Vakur and Aldehoff, Larissa Ojendal, Joakim and Swain, Ashok (eds.) (2018):
Environmental Peacebuilding in the Middle East.
In: Routledge Handbook of Environmental Conflict and Peacebuilding, London, Routledge, [Book Section]

Kaufhold, Marc-André and Gizikis, Alexis and Reuter, Christian and Habdank, Matthias and Grinko, Margarita (2018):
Avoiding Chaotic Use of Social Media before, during and after Emergencies: Design and Evaluation of Citizens' Guidelines.
In: Journal of Contingencies and Crisis Management (JCCM), pp. 1-16. DOI: 10.1111/1468-5973.12249,
[Article]

Kaufhold, Marc-André and Reuter, Christian and Ermert, Tobias (2018):
Interaktionsdesign eines Risiko-Bewertungskonzepts für KMU.
pp. 309-312, Dresden, Germany, Gesellschaft für Informatik e.V., Mensch und Computer 2018: Tagungsband, Dresden, Germany, [Conference or Workshop Item]

Kaufhold, Marc-André and Reuter, Christian and Riebe, Thea and von Radziewski, Elmar Dachselt, Raimund and Weber, Gerhard (eds.) (2018):
Design eines BCM-Dashboards für kleine und mittlere Unternehmen.
pp. 579-586, Dresden, Germany, Gesellschaft für Informatik e.V., Mensch und Computer 2018: Workshopband, Dresden, Germany, [Conference or Workshop Item]

Kaufhold, Marc-André and Riebe, Thea and Reuter, Christian and Hester, Julian and Jeske, Danny and Knüver, Lisa and Richert, Viktoria (2018):
Business Continuity Management in Micro Enterprises: Perception, Strategies and Use of ICT.
In: International Journal of Information Systems for Crisis Response and Management (IJISCRAM), 10 (1), pp. 1-19. DOI: 10.4018/IJISCRAM.2018010101,
[Article]

Kaufhold, Marc-André and Rupp, Nicola and Reuter, Christian and Amelunxen, Christoph and Cristaldi, Massimo (2018):
112.SOCIAL: Design and Evaluation of a Mobile Crisis App for Bidirectional Communication between Emergency Services and Citizen.
pp. accepted, Portsmouth, UK, Proceedings of the European Conference on Information Systems (ECIS), Portsmouth, UK, [Conference or Workshop Item]

Lemos, Marcilio O. O. and Dantas, Yuri Gil and Fonseca, Iguatemi E. and Nigam, Vivek (2018):
On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks.
In: Journal of Logical and Algebraic Methods in Programming, 94, pp. 45-67. Elsevier, ISSN 2352-2216,
[Article]

Mantel, Heiko and Schickel, Johannes and Weber, Alexandra and Weber, Friedrich (2018):
How Secure is Green IT? The Case of Software-Based Energy Side Channels.
Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS), [Conference or Workshop Item]

Mohan, Sibin and Asplund, Mikael and Bloom, Gedare and Sadeghi, Ahmad-Reza and Ibrahim, Ahmad and Salajageh, Negin and Griffioen, Paul and Sinopoli, Bruno (2018):
The Future of IoT Security: Special Session.
In: EMSOFT '18, pp. 16:1-16:7, Piscataway, NJ, USA, IEEE Press, International Conference on Embedded Software (EMSOFT 2018), 2018, Piscataway, NJ, USA, ISBN 978-1-5386-5564-1,
[Conference or Workshop Item]

Nguyen, Thien Duc and Marchal, Samuel and Miettinen, Markus and Dang, Minh Hoang and Asokan, N. and Sadeghi, Ahmad-Reza (2018):
DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices.
In: CoRR, abs/1804.07474, [Article]

Nordmann, Alfred and Reuter, Christian and Lederer, Markus Wiemeyer, Josef (ed.) (2018):
IANUS am FiF und darüber hinaus: Die Bedeutung natur- und ingenieurwissenschaftlicher Friedensforschung für die TU Darmstadt.
In: 10 Jahre Forum interdisziplinäre Forschung an der TU Darmstadt, pp. 71-89, Darmstadt, [Book Section]

Reif, Michael and Eichberg, Michael and Mezini, Mira Tichy, Matthias and Bodden, Eric and Kuhrmann, Marco and Wagner, Stefan and Steghöfer, Jan-Philipp (eds.) (2018):
Call Graph Construction for Java Libraries.
pp. 119-120, Bonn, Gesellschaft für Informatik, Software Engineering und Software Management 2018, Bonn, [Conference or Workshop Item]

Renaud, Karen and Zimmermann, Verena (2018):
Ethical guidelines for nudging in information security & privacy.
In: International Journal of Human-Computer Studies (IJHCS), 120, pp. 22-35. Elsevier, DOI: 10.1016/j.ijhcs.2018.05.011,
[Article]

Renaud, Karen and Zimmermann, Verena (2018):
Nudging folks towards stronger password choices: Providing certainty is the key.
In: Behavioural Public Policy (BPP), pp. 1-31. Cambridge University Press, DOI: 10.1017/bpp.2018.3,
[Article]

Reuter, Christian Reuter, Christian (ed.) (2018):
Sicherheitskritische Mensch-Computer-Interaktion – Einleitung und überblick.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, pp. 3-14, Wiesbaden, Germany, Springer Vieweg, ISBN 978-3-658-19523-6,
DOI: 10.1007/978-3-658-19523-6_1,
[Book Section]

Reuter, Christian and Aal, Konstantin and Beham, Frank and Boden, Alexander and Brauner, Florian and Ludwig, Thomas and Lukosch, Stephan and Fiedrich, Frank and Fuchs-Kittowski, Frank and Geisler, Stefan and Gennen, Klaus and Herrmann, Dominik and Kaufhold, Marc-André and Klafft, Michael and Lipprandt, Myriam and Lo Iacono, Luigi and Pipek, Volkmar and Pottebaum, Jens and Mentler, Tilo and Nestler, Simon and Stieglitz, Stefan and Sturm, Christian and Rusch, Gebhard and Sackmann, Stefan and Volkamer, Melanie and Wulf, Volker Reuter, Christian (ed.) (2018):
Die Zukunft sicherheitskritischer Mensch-Computer-Interaktion.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, pp. 621-630, Wiesbaden, Germany, Springer Vieweg, ISBN 978-3-658-19523-6,
DOI: 10.1007/978-3-658-19523-6_30,
[Book Section]

Reuter, Christian and Backfried, Gerhard and Kaufhold, Marc-André and Spahr, Fabian (2018):
ISCRAM turns 15: A Trend Analysis of Social Media Papers 2004-2017.
Rochester, New York, USA, Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), Rochester, New York, USA, [Conference or Workshop Item]

Reuter, Christian and Hughes, Amanda Lee and Hiltz, Starr Roxanne and Imran, Muhammad and Plotnick, Linda (2018):
Editorial of the Special Issue on Social Media in Crisis Management.
In: International Journal on Human-Computer Interaction (IJHCI), 34 (4), pp. 277-279. DOI: 10.1080/10447318.2018.1427833,
[Article]

Reuter, Christian and Hughes, Amanda Lee and Kaufhold, Marc-André (2018):
Social Media in Crisis Management: An Evaluation and Analysis of Crisis Informatics Research.
In: International Journal on Human-Computer Interaction (IJHCI), 34 (4), pp. 280-294. DOI: 10.1080/10447318.2018.1427832,
[Article]

Reuter, Christian and Kaufhold, Marc-André (2018):
Fifteen Years of Social Media in Emergencies: A Retrospective Review and Future Directions for Crisis Informatics.
In: Journal of Contingencies and Crisis Management (JCCM), 26 (1), pp. 41-57. Wiley, ISSN 0966-0879,
DOI: 10.1111/1468-5973.12196,
[Article]

Reuter, Christian and Kaufhold, Marc-André Reuter, Christian (ed.) (2018):
Informatik für Frieden und Sicherheit.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, pp. 573-595, Wiesbaden, Germany, Springer Vieweg, ISBN 978-3-658-19523-6,
DOI: 10.1007/978-3-658-19523-6_28,
[Book Section]

Reuter, Christian and Kaufhold, Marc-André Reuter, Christian (ed.) (2018):
Soziale Medien in Notfällen, Krisen und Katastrophen.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, pp. 379-402, Wiesbaden, Springer Vieweg, ISBN 978-3-658-19523-6,
DOI: 10.1007/978-3-658-19523-6_19,
[Book Section]

Reuter, Christian and Kaufhold, Marc-André Reuter, Christian (ed.) (2018):
Usable Safety Engineering sicherheitskritischer interaktiver Systeme.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, pp. 17-40, Wiesbaden, Germany, Springer Vieweg, ISBN 978-3-658-19523-6,
DOI: 10.1007/978-3-658-19523-6_2,
[Book Section]

Reuter, Christian and Kaufhold, Marc-André and Spielhofer, Thomas and Hahne, Anna Sophie (2018):
Soziale Medien und Apps in Notsituationen: Eine repräsentative Studie über die Wahrnehmung in Deutschland.
In: BBK Bevölkerungsschutz, 2, pp. 22-24. [Article]

Reuter, Christian and Leopold, Inken (2018):
Mobile and Interactive Media in the Store? Design Case Study on Bluetooth Beacon Concepts for Food Retail.
In: Media in Action: An Interdisciplinary Journal on Cooperative Media, 2 (1), pp. in press. [Article]

Reuter, Christian and Ludwig, Thomas and Kaufhold, Marc-André and Spielhofer, Thomas (2018):
Studie: Wie sehen Mitarbeiter von Feuerwehr und THW den Einsatz sozialer Medien in Gefahrenlagen?
In: Crisis Prevention – Fachmagazin für Innere Sicherheit, Bevölkerungsschutz und Katastrophenhilfe, 1, pp. 64-66. [Article]

Reuter, Christian and Ludwig, Thomas and Mischur, Patrick (2018):
RescueGlass: Collaborative Applications involving Head-Mounted Displays for Red Cross Rescue Dog Units.
In: Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW), [Article]

Reuter, Christian and Ludwig, Thomas and Pipek, Volkmar Reuter, Christian (ed.) (2018):
Resilienz durch Kooperationstechnologien.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, pp. 443-465, Wiesbaden, Germany, Springer Vieweg, ISBN 978-3-658-19523-6,
DOI: 10.1007/978-3-658-19523-6_22,
[Book Section]

Reuter, Christian and Mentler, Tilo (2018):
Human-Computer-Interaction and Social Media in Safety-Critical Systems – Editorial.
In: Journal of Contingencies and Crisis Management (JCCM), 26 (1), pp. 2-3. Wiley, ISSN 0966-0879,
DOI: 10.1111/1468-5973.12192,
[Article]

Reuter, Christian and Mentler, Tilo and Nestler, Simon and Herczeg, Michael and Geisler, Stefan and Ludwig, Thomas and Pipek, Volkmar and Pottebaum, Jens Dachselt, Raimund and Weber, Gerhard (eds.) (2018):
5. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen.
pp. 565-569, Dresden, Germany, Gesellschaft für Informatik e.V., Mensch und Computer 2018: Workshopband, Dresden, Germany, [Conference or Workshop Item]

Reuter, Christian and Pottebaum, Jens (2018):
Guest Editorial Preface: Special Issue on IT-Support for Crisis and Continuity Management.
In: International Journal of Information Systems for Crisis Response and Management (IJISCRAM), 10 (1), pp. v-viii. [Article]

Reuter, Christian and Pottebaum, Jens (2018):
Special Issue on IT Support for Crisis and Continuity Management.
10, [Book]

Reuter, Christian and Schneider, Wolfgang and Eberz, Daniel and Bayer, Markus and Hartung, Daniel and Kaygusuz, Cemal Dachselt, Raimund and Weber, Gerhard (eds.) (2018):
Resiliente Digitalisierung der kritischen Infrastruktur Landwirtschaft - mobil, dezentral, ausfallsicher.
pp. 623-632, Dresden, Germany, Gesellschaft für Informatik e.V., Mensch und Computer 2018: Workshopband, Dresden, Germany, [Conference or Workshop Item]

Riebe, Thea and Nordmann, Alfred and Reuter, Christian (2018):
Responsible Research and Innovation: Interdisziplinärer Workshop von IANUS und Schader-Stiftung.
In: Wissenschaft & Frieden, pp. 60-61. [Article]

Riebe, Thea and Pätsch, Katja and Kaufhold, Marc-André and Reuter, Christian Dachselt, Raimund and Weber, Gerhard (eds.) (2018):
From Conspiracies to Insults: A Case Study of Radicalisation in Social Media Discourse.
pp. 595-603, Dresden, Germany, Gesellschaft für Informatik e.V., Mensch und Computer 2018: Workshopband, Dresden, Germany, [Conference or Workshop Item]

Scholl, Simon and Reuter, Christian and Ludwig, Thomas and Kaufhold, Marc-André (2018):
SocialML: EUD im Maschine Learning zur Analyse sozialer Medien.
pp. 443-446, Dresden, Germany, Gesellschaft für Informatik e.V., Mensch und Computer 2018: Tagungsband, Dresden, Germany, [Conference or Workshop Item]

Shrishak, Kris and Shulman, Haya and Waidner, Michael (2018):
Removing the Bottleneck for Practical 2PC.
pp. 2300-2302, ACM SIGSAG Conference on Computer and Communications Security (ACM CCS), Toronto, Canada, 15.-19. Oct. 2018, DOI: 10.1145/3243734.3278521,
[Conference or Workshop Item]

Stute, Milan and Kreitschmann, David and Hollick, Matthias (2018):
Demo : Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link. (Postprint)
In: MobiCom '18: Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, pp. 820-822,
New York, NY, Association for Computing Machinery, 24th Annual International Conference on Mobile Computing and Networking (ACM MobiCom 2018), New Delhi India, 29.10.-2.11.2018, ISBN 978-1-4503-5903-0,
DOI: 10.25534/tuprints-00013316,
[Conference or Workshop Item]

Stute, Milan and Kreitschmann, David and Hollick, Matthias (2018):
One Billion Apples' Secret Sauce : Recipe for the Apple Wireless Direct Link Ad hoc Protocol. (Postprint)
In: MobiCom '18: Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, pp. 529-543,
New York, NY, Association for Computing Machinery, 24th Annual International Conference on Mobile Computing and Networking (ACM MobiCom 2018), New Delhi India, 29.10.-2.11.2018, ISBN 978-1-4503-5903-0,
DOI: 10.25534/tuprints-00013315,
[Conference or Workshop Item]

Traverso, Giulia and Butin, Denis and Buchmann, Johannes and Palesandro, Alex (2018):
Coalition-Resistant Peer Rating for Long-Term Confidentiality.
In: PST 2018 - 16th Annual Conference on Privacy, Security and Trust,
IEEE Computer Society, PST 2018 - 16th Annual Conference on Privacy, Security and Trust, Belfast, Northern Ireland, United Kingdom, August 28-30, 2018, [Conference or Workshop Item]

Wunderer, Thomas (2018):
On the Security of Lattice-Based Cryptography Against Lattice Reduction and Hybrid Attacks.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Zimmermann, Verena and Bennighof, Merve and Edel, Miriam and Hofmann, Oliver and Jung, Judith and von Wick, Melina Dachselt, R. and Weber, G. (eds.) (2018):
‘Home, Smart Home’ – Exploring End Users’ Mental Models of Smart Homes.
In: Mensch und Computer 2018 - Workshopband,
Gesellschaft für Informatik e.V., Mensch und Computer, Dresden, Germany, 02.-05.09.2018, DOI: 10.18420/muc2018-ws08-0539,
[Conference or Workshop Item]

2017

Deller, Yannick (2017):
Zweidimensionale Surface-Kodes und ihre Anwendungen.
TU Darmstadt, [Bachelor Thesis]

Fladung, Lukas (2017):
Semiclassical Laser Cooling of Trapped Ions in a One-Dimensional Standing Wave.
TU Darmstadt, [Bachelor Thesis]

Neumann, Klara Maria (2017):
Aufbau von Empfängerstationen für ein System zum Quantenschlüsselaustausch.
TU Darmstadt, [Bachelor Thesis]

Schürl, Stefan (2017):
Entwicklung eines FPGA-Systems zur hochauflösenden Zeitmessung.
TU Darmstadt, [Master Thesis]

Albrecht, Martin and Göpfert, Florian and Vidria, Fernando and Wunderer, Thomas (2017):
Revisiting the Expected Cost of Solving uSVP and Applications to LWE.
In: ASIACRYPT 2017 - Advances in Cryptology,
Springer, [Conference or Workshop Item]

Anagnostopoulos, Nikolaos Athanasios and Gabmeyer, Sebastian and Arul, Tolga and Katzenbeisser, Stefan (2017):
An extensive classification and analysis of attacks against Physical Unclonable Functions (PUFs).
Angewandte Kryptographie of Gesellschaft für Informatik e.V, 27th Crypto-Day, Frankfurt (Oder), Germany, 7 - 8 December 2017, DOI: 10.13140/RG.2.2.25411.91689,
[Conference or Workshop Item]

Ay, Serafettin (2017):
Detecting WiFi Covert Channels.
Darmstadt, Technische Universität, [Master Thesis]

Buchmann, Johannes and Holzer, Patrick and Wunderer, Thomas (2017):
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β.
In: INDOCRYPT 2017 - 18th International Conference on Cryptology in India,
Springer, [Conference or Workshop Item]

Chiesa, Marco and Demmler, Daniel and Canini, Marco and Schapira, Michael and Schneider, Thomas (2017):
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.
In: 13. International Conference on emerging Networking EXperiments and Technologies (CoNEXT'17), pp. 120-133,
ACM, DOI: 10.1145/3143361.3143362,
[Conference or Workshop Item]

Garcia Cordero, Carlos and Vasilomanolakis, Emmanouil and Mühlhäuser, Max (2017):
ID2T - The Intrusion Detection Dataset Generation Toolkit.
Black Hat Europe 2017, London, UK, 04.-07.12., [Conference or Workshop Item]

Günther, Daniel and Kiss, Ágnes and Schneider, Thomas (2017):
More Efficient Universal Circuit Constructions.
In: 23. Advances in Cryptology -- ASIACRYPT 2017, pp. 443-470,
Springer, DOI: 10.1007/978-3-319-70697-9_16,
[Conference or Workshop Item]

Kübler, Florian (2017):
Foundations of a refinement-based framework for escape analyses.
Darmstadt, Technische Universität, [Master Thesis]

Muneeb, Ahmed (2017):
mproving a Linux Device Driver for Visible Light Communication.
Darmstadt, Technische Universität, [Master Thesis]

Sarangdhar, Ravi and Fan, Yufan and Anagnostopoulos, Nikolaos Athanasios and Gayer, Udo and Flederer, Frank and Mikschl, Tobias and Arul, Tolga and John, Philipp R. and Hierholz, Kirsten and Montenegro, Sergio and Katzenbeisser, Stefan (2017):
An investigation of the effects of radiation on current key storage solutions and on Physical Unclonable Functions (PUFs) being used as key storage.
Angewandte Kryptographie of Gesellschaft für Informatik e.V, 27th Crypto-Day, Frankfurt (Oder), Germany, 07.-08.12.2017, DOI: 10.13140/RG.2.2.33800.52483,
[Conference or Workshop Item]

Singh, Govind (2017):
o Static Bug Finders Identify API Misuses?
Darmstadt, Technische Universität, [Master Thesis]

Steinmetzer, Daniel and Wegemer, Daniel and Schulz, Matthias and Widmer, Jörg and Hollick, Matthias (2017):
Compressive Millimeter-Wave Sector Selection in Off-the-Shelf IEEE 802.11ad Devices.
ACM, CoNEXT ’17: The 13th International Conference on emerging Networking EXperiments and Technologies, DOI: 10.1145/3143361.3143384,
[Conference or Workshop Item]

Vasilomanolakis, Emmanouil and Wolf, Jan Helge and Böck, Leon and Mühlhäuser, Max and Karuppayah, Shankar (2017):
I Trust my Zombies: a Trust-enabled Botnet.
In: Blackhat Europe,
London, UK, [Conference or Workshop Item]

Yuan, Yimin (2017):
Investigating Practical Man-in-the-middle Network Attacks on IEEE 802.11ad.
Darmstadt, Technische Universität, [Master Thesis]

Müller, Patrick (2017):
Reconstruction of Obfuscated Strings.
TU Darmstadt, [Master Thesis]

Afridi, Hassaan Ali Khan (2017):
Investigating the relation between bugs and vulnerabilities in the Debian ecosystem.
Darmstadt, Technische Universität, [Master Thesis]

Demmler, Daniel and Hamacher, Kay and Schneider, Thomas and Stammler, Sebastian (2017):
Privacy-Preserving Whole-Genome Variant Queries.
In: 16. International Conference on Cryptology And Network Security (CANS'17),
Springer, [Conference or Workshop Item]

Frassetto, Tommaso and Gens, David and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2017):
JITGuard: Hardening Just-in-time Compilers with SGX.
In: 24th ACM Conference on Computer and Communications Security (CCS),
Dallas, TX, USA, ISBN 978-1-4503-4946-8/17/10,
DOI: 10.1145/3133956.3134037,
[Conference or Workshop Item]

Jauernig, Patrick Thomas (2017):
SMOV: Lighweight In-Process Memory Isolation.
Darmstadt, Technische Universität, [Bachelor Thesis]

Krüger, Stefan and Nadi, Sarah and Reif, Michael and Ali, Karim and Mezini, Mira and Bodden, Eric and Göpfert, Florian and Günther, Felix and Weinert, Christian and Demmler, Daniel and Kamath, Ram (2017):
CogniCrypt: Supporting Developers in using Cryptography.
In: Automated Software Engineering (ASE'17),
Piscataway, NJ, USA, ACM, Piscataway, NJ, USA, DOI: 10.1109/ASE.2017.8115707,
[Conference or Workshop Item]

Liu, Jian and Juuti, Mika and Lu, Yao and Asokan, N. (2017):
Oblivious Neural Network Predictions via MiniONN Transformations.
In: ACM CCS 2017, ACM Conference on Computer and Communications Security,
DOI: 10.1145/3133956.3134056,
[Conference or Workshop Item]

Sarangdhar, Ravi (2017):
An investigation of the effects of radiation on current key storage solutions and on Physical Unclonable Functions (PUFs) being used as key storage.
Darmstadt, Technische Universität, [Master Thesis]

Wainakh, Aidmar (2017):
On the Analysis & Generation of Synthetic Attack for Intrusion Detection Systems.
Darmstadt, Technische Universität, [Master Thesis]

Zeitouni, Shaza and Dessouky, Ghada and Arias, Orlando and Sullivan, Dean and Ibrahim, Ahmad and Jin, Yier and Sadeghi, Ahmad-Reza (2017):
ATRIUM: Runtime Attestation Resilient Under Memory Attacks.
In: 2017 International Conference On Computer Aided Design (ICCAD'17),
Irvine, California, US, [Conference or Workshop Item]

Alexopoulos, Nikolaos and Vasilomanolakis, Emmanouil and Ivanko, Natalia Reka and Mühlhäuser, Max (2017):
Towards Blockchain-Based Collaborative Intrusion Detection Systems.
pp. 107-118, Springer, 12th International Conference on Critical Information Infrastructures Security (CRITIS 2017), Lucca, Italy, 08.-13.10 2017, ISBN 978-3-319-99842-8,
DOI: 10.1007/978-3-319-99843-5_10,
[Conference or Workshop Item]

Bindel, Nina and Krämer, Juliane and Schreiber, Johannes (2017):
Hampering fault attacks against lattice-based signature schemes - countermeasures and their efficiency.
In: CODES/ISSS ’17 Companion,
Springer, [Conference or Workshop Item]

Buldas, Ahto and Geihs, Matthias and Buchmann, Johannes (2017):
Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions.
In: ProvSec 2017 - The 11th International Conference on Provable Security,
Springer, [Conference or Workshop Item]

Böck, Leon (2017):
On P2P botnet monitoring in adverse conditions.
Darmstadt, Technische Universität, [Master Thesis]

Chauhan, Prankur (2017):
Improvement and integration of software tools for the evaluation and realization of Physical Unclonable Functions (PUFs) into an open-source library of cryptographic component (CogniCrypt).
Darmstadt, Technische Universität, [Master Thesis]

Grube, Tim and Volk, Florian and Mühlhäuser, Max and Bhairav, Suhas and Sachidananda, Vinay and Elovici, Yuval (2017):
Complexity Reduction in Graphs: A User Centric Approach to Graph Exploration.
In: 10th International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, pp. 24-31,
Athens, Greece, IARIA, [Conference or Workshop Item]

Horsch, Moritz and Braun, Johannes and Buchmann, Johannes (2017):
Password Assistance.
In: Open Identity Summit 2017,
Karlstad, Sweden, [Conference or Workshop Item]

Kornhuber, Tim (2017):
Implementation of a physical layer for visible light communication using the OpenVLC platform.
Darmstadt, Technische Universität, [Bachelor Thesis]

Kümpel, Michael (2017):
Implementierung des unteren MAC-Layers für die OpenVLC-Hardware.
Darmstadt, Technische Universität, [Bachelor Thesis]

Marchal, Samuel and Armano, Giovanni and Gröndahl, Tommi and Saari, Kalle and Singh, Nidhi and Asokan, N. (2017):
Off-the-Hook: An Efficient and Usable Client-Side Phishing Prevention Application.
66, In: The 16th IEEE International Symposium on Network Computing and Applications (NCA 2017), pp. 1717 - 1733,
DOI: 10.1109/TC.2017.2703808,
[Conference or Workshop Item]

Renaud, Karen and Maguire, Joseph and Zimmermann, Verena and Draper, Steve (2017):
Lessons Learned from Evaluating Eight Password Nudges in the Wild.
In: Proceedings of LASER 2017 Learning from Authoritative Security Experiment Results, pp. 25-38,
Usenix Associaton, Learning from Authoritative Security Experiment Results (LASER), Arlington, VA, USA, 18.-19.10.2017, [Conference or Workshop Item]

Schreiber, Johannes (2017):
Countermeasures Against First Order Fault Attacks Using the Example of ring-TESLA.
Darmstadt, Technische Universität, [Bachelor Thesis]

Schulz, Matthias and Wegemer, Daniel and Hollick, Matthias (2017):
Nexmon: Build Your Own Wi-Fi Testbeds With Low-Level MAC and PHY-Access Using Firmware Patches on Off-the-Shelf Mobile Devices.
In: Proceedings of the 11th Workshop on Wireless Network Testbeds, Experimental Evaluation & CHaracterization, pp. 59-66,
11th Workshop on Wireless Network Testbeds, Experimental Evaluation & CHaracterization, Snowbird, Utah, USA, October 2017, [Conference or Workshop Item]

Sitnikov, Konstantin (2017):
A Survey on Post-Quantum Key Exchange.
Darmstadt, Technische Universität, [Bachelor Thesis]

Späth, Johannes and Ali, Karim and Bodden, Eric (2017):
IDEal: Efficient and Precise Alias-aware Dataflow Analysis.
In: 2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH),
ACM Press, [Conference or Workshop Item]

Steinmetzer, Daniel and Loch, Adrian and García-García, Amanda and Widmer, Jörg and Hollick, Matthias (2017):
Mitigating Lateral Interference: Adaptive Beam Switching for Robust Millimeter-Wave Networks.
In: 1st ACM Workshop on Millimeter Wave Networks and Sensing Systems (mmNets 2017), p. 6,
ACM, Snowbird, Utah, USA, ISBN 978-1-4503-5143-0/17/10,
DOI: 10.1145/3130242.3130244,
[Conference or Workshop Item]

Glanz, Leonid and Amann, Sven and Eichberg, Michael and Reif, Michael and Hermann, Ben and Lerch, Johannes and Mezini, Mira (2017):
CodeMatch: Obfuscation Won’t Conceal Your Repackaged App.
In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, pp. 638-648,
Paderborn, Germany, Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, ISBN 978-1-4503-5105-8,
DOI: 10.1145/3106237.3106305,
[Conference or Workshop Item]

Arias, Orlando and Gens, David and Jin, Yier and Liebchen, Christopher and Sadeghi, Ahmad-Reza and Sullivan, Dean (2017):
LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization.
In: 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2017),
[Conference or Workshop Item]

Brendel, Jacqueline and Fischlin, Marc Foley, Simon N. and Gollmann, Dieter and Snekkenes, Einar (eds.) (2017):
Zero Round-Trip Time for the Extended Access Control Protocol.
In: Lecture notes in computer science, 1, In: Computer Security – ESORICS 2017. 22nd European Symposium on Research in Computer Security, Proceedings, pp. 297-314, Cham, Springer International Publishing, ISBN 978-3-319-66401-9,
DOI: 10.1007/978-3-319-66402-6,
[Book Section]

Fereidooni, Hossein and Classen, Jiska and Spink, Tom and Patras, Paul and Miettinen, Markus and Sadeghi, Ahmad-Reza and Hollick, Matthias and Conti, Mauro (2017):
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit.
In: Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID),
Atlanta, Georgia, USA, [Conference or Workshop Item]

Fomichev, Mikhail and Álvarez, Flor and Steinmetzer, Daniel and Gardner-Stephen, Paul and Hollick, Matthias (2017):
Survey and Systematization of Secure Device Pairing.
In: IEEE Communications Surveys & Tutorials, 20 (1), pp. 517-550. DOI: 10.1109/COMST.2017.2748278,
[Article]

Funke, Sebastian and Wiesmaier, Alexander and Daubert, Jörg (2017):
Constrained PET Composition for Measuring Enforced Privacy.
In: Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES), pp. 1-10,
ACM, DOI: 10.1145/3098954.3098968,
[Conference or Workshop Item]

Gerber, Nina and Zimmermann, Verena Burghardt, Manuel and Wimmer, Raphael and Wolff, Christian and Womser-Hacker, Christa (eds.) (2017):
Security vs. privacy? User preferences regarding text passwords and biometric authentication.
In: Mensch und Computer 2017 - Workshopband: Spielend einfach integrieren, 10.-13. September 2017, Regensburg, pp. 279-287,
Gesellschaft für Informatik, Regensburg, Germany, DOI: 10.18420/muc2017-ws05-0405,
[Conference or Workshop Item]

Grube, Tim and Thummerer, Markus and Daubert, Jörg and Mühlhäuser, Max (2017):
Cover Traffic: A Trade of Anonymity and Efficiency.
In: Lecture Notes in Computer Science, 10547, In: Security and Trust Management. STM 2017., pp. 213-223,
Oslo, Norway, Springer, 13th International Workshop on Security and Trust Management, Oslo, Norway, DOI: 10.1007/978-3-319-68063-7_15,
[Conference or Workshop Item]

Karuppayah, Shankar and Böck, Leon and Grube, Tim and Manickam, Selvakumar and Mühlhäuser, Max and Fischer, Mathias (2017):
SensorBuster: On Identifying Sensor Nodes in P2P Botnets.
In: International Conference on Availability, Reliability and Security (ARES), pp. 1-6,
New York, USA, ACM, Reggio Calabria, Italy, DOI: 10.1145/3098954.3098991,
[Conference or Workshop Item]

Karvelas, Nikolaos and Peter, Andreas and Katzenbeisser, Stefan (2017):
Using Oblivious RAM in Genomic Studies.
In: DPM 2017 - Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2017 International Workshops,
Springer, Oslo, Norway, [Conference or Workshop Item]

Tkachenko, Oleksandr (2017):
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
TU Darmstadt, [Master Thesis]

Whitefield, Jorden and Chen, Liqun and Kargl, Frank and Paverd, Andrew and Schneider, Steve and Treharne, Helen and Wesemeyer, Stephan (2017):
Formal Analysis of V2X Revocation Protocols.
In: Security and Trust Management _ 13th International Workshop, STM 2017, Proceedings,
ISBN 9783319680620,
DOI: 10.1007/978-3-319-68063-7_10,
[Conference or Workshop Item]

Zimmermann, Verena and Henhapl, Birgit and Gerber, Nina and Enzmann, Matthias Burghardt, Manuel and Wimmer, Raphael and Wolff, Christian and Womser-Hacker, Christa (eds.) (2017):
Promoting secure Email communication and authentication.
In: Mensch und Computer 2017 - Workshopband: Spielend einfach integrieren, pp. 269-277, Norderstedt, Gesellschaft für Informatik, ISBN 978-3-7460-8210-3,
DOI: 10.18420/muc2017-ws05-0404,
[Book Section]

Cremer, Manuel (2017):
Test Cases for Detecting the Lucky 13 Vulnerability with SPASCA.
TU Darmstadt, [Bachelor Thesis]

Alexopoulos, Nikolaos and Daubert, Jörg and Mühlhäuser, Max and Habib, Sheikh Mahbub (2017):
Beyond the Hype: On Using Blockchains in Trust Management for Authentication.
In: IEEE TrustCom 2017, pp. 546-553,
IEEE, Sydney, Australia, 1-4 August 2017, DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.283,
[Conference or Workshop Item]

Alexopoulos, Nikolaos and Kiayias, Aggelos and Talviste, Riivo and Zacharias, Thomas (2017):
MCMix: Anonymous Messaging via Secure Multiparty Computation.
In: 26th USENIX Security Symposium, pp. 1217-1234,
USENIX Association, Vancouver, BC, Canada, 16-18 August 2018, [Conference or Workshop Item]

Alexopoulos, Nikolaos and Vasilomanolakis, Emmanouil and Ivanko, Natalia Reka and Frieß, Tamara and Mühlhäuser, Max (2017):
TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER).
In: USENIX Security Symposium Poster Session,
Berkeley, CA, USENIX Association, USENIX Security Symposium, Vancouver, Canada, August 16-18, 2017, [Conference or Workshop Item]

Bernhard, David and Kulyk, Oksana and Volkamer, Melanie (2017):
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme.
In: 12th International Conference on Availability, Reliability and Security - ARES 2017, pp. 1-10,
ACM, DOI: 10.1145/3098954.3098990,
[Conference or Workshop Item]

Brasser, Ferdinand and Davi, Lucas and Gens, David and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2017):
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
In: USENIX Security '17, In: 26th USENIX Security Symposium,
[Conference or Workshop Item]

Brasser, Ferdinand and Müller, Urs and Dmitrienko, Alexandra and Kostiainen, Kari and Capkun, Srdjan and Sadeghi, Ahmad-Reza (2017):
Software Grand Exposure: SGX Cache Attacks Are Practical.
In: WOOT, In: 11th USENIX Workshop on Offensive Technologies,
[Conference or Workshop Item]

Brendel, Jacqueline and Fischlin, Marc and Günther, Felix and Janson, Christian Katz, Jonathan and Shacham, Hovav (eds.) (2017):
PRF-ODH: Relations, Instantiations, and Impossibility Results.
In: CRYPTO 2017 - 37th International Cryptology Conference, pp. 651-681,
Springer, Santa Barbara, CA, USA, [Conference or Workshop Item]

Buchmann, Johannes and Lauter, Kristin and Mosca, Michele (2017):
Postquantum Cryptography - State of the Art.
In: IEEE Security & Privacy, 15, pp. 12-13. [Article]

Butin, Denis (2017):
Hash-Based Signatures: State of Play.
In: IEEE Security & Privacy, 15 (4), pp. 37-43. DOI: 10.1109/MSP.2017.3151334,
[Article]

Günther, Felix and Mazaheri, Sogol (2017):
A Formal Treatment of Multi-key Channels.
In: CRYPTO 2017 - 37th International Cryptology Conference,
Springer, Santa Barbara, CA, USA, [Conference or Workshop Item]

Karvelas, Nikolaos and Senftleben, Marius and Katzenbeisser, Stefan (2017):
Microblogging in a Privacy-Preserving way.
In: ARES 2017 - 12th International Conference on Availability, Reliability and Security,
ACM, Reggio Calabria, Italy, [Conference or Workshop Item]

Kulyk, Oksana and Reinheimer, Benjamin and Gerber, Paul and Volk, Florian and Volkamer, Melanie and Mühlhäuser, Max (2017):
Advancing Trust Visualisations for Wider Applicability and User Acceptance.
In: 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 562-569,
IEEE, DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.285,
[Conference or Workshop Item]

Mayer, Peter and Kunz, Alexandra and Volkamer, Melanie (2017):
Reliable Behavioural Factors in the Information Security Context.
In: International Conference on Availability, Reliability and Security,
DOI: 10.1145/3098954.3098986,
[Conference or Workshop Item]

Mulholland, John and Mosca, Michele and Braun, Johannes (2017):
The Day the Cryptography Dies.
In: IEEE Security & Privacy, 15 (4), pp. 14-21. DOI: 10.1109/MSP.2017.3151325,
[Article]

Nauth, Julian (2017):
Charakterisierung von Bellschen Ungleichungen bei nicht-perfekter Detektion.
TU Darmstadt, [Bachelor Thesis]

Traverso, Giulia and Garcia Cordero, Carlos and Nojoumian, Mehrdad and Azarderakhsh, Reza and Demirel, Denise and Habib, Sheikh Mahbub and Buchmann, Johannes (2017):
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems.
15th Annual Conference on Privacy, Security and Trust (PST), Calgary, Canada, 28.-30.8. 2017, DOI: 10.1109/pst.2017.00040,
[Conference or Workshop Item]

Büscher, Niklas and Katzenbeisser, Stefan (2017):
Compilation for Secure Multi-party Computation.
Springer Briefs in Computer Science, ISBN 978-3-319-67521-3,
[Book]

Anagnostopoulos, Nikolaos Athanasios and Schaller, André and Fan, Yufan and Xiong, Wenjie and Tehranipoor, Fatemeh and Arul, Tolga and Gabmeyer, Sebastian and Szefer, Jakub and Chandy, John A. and Katzenbeisser, Stefan (2017):
Insights into the Potential Usage of the Initial Values of DRAM Arrays of Commercial Off-the-Shelf Devices for Security Applications.
26th Crypto-Day, Nürnberg, Germany, 01.-02.06.2017, [Conference or Workshop Item]

Asharov, Gilad and Demmler, Daniel and Schapira, Michael and Schneider, Thomas and Segev, Gil and Shenker, Scott and Zohner, Michael (2017):
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (3), pp. 143-163. De Gruyter Open, DOI: 10.1515/popets-2017-0033,
[Article]

Asharov, Gilad and Lindell, Yehuda and Schneider, Thomas and Zohner, Michael (2017):
More Efficient Oblivious Transfer Extensions.
In: Journal of Cryptology (JoC), 30 (3), pp. 805-858. Springer, DOI: 10.1007/s00145-016-9236-6,
[Article]

Bugge, Sebastian (2017):
Solving Learning With Errors Instances Using Quantum Reductions.
Darmstadt, Technische Universität, [Master Thesis]

Buldas, Ahto and Geihs, Matthias and Buchmann, Johannes (2017):
Long-Term Secure Commitments via Extractable-Binding Commitments.
In: LNCS, In: ACISP 2017 - 22nd Australasian Conference on Information Security and Privacy,
Springer, Auckland, New Zealand, [Conference or Workshop Item]

Büscher, Niklas and Boukoros, Spyros and Bauregger, Stefan and Katzenbeisser, Stefan (2017):
Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering.
2017, In: Proceedings on Privacy Enhancing Technologies, pp. 118–134,
De Gruyter, Minneapolis, USA, DOI: 10.1515/popets-2017-0030,
[Conference or Workshop Item]

Demmler, Daniel and Holz, Marco and Schneider, Thomas (2017):
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks.
In: 15. International Conference on Applied Cryptography and Network Security (ACNS'17), pp. 599-619,
Springer, DOI: 10.1007/978-3-319-61204-1_30,
[Conference or Workshop Item]

Do, Lisa Nguyen Quang and Ali, Karim and Livshits, Benjamin and Bodden, Eric and Smith, Justin and Murphy-Hill, Emerson (2017):
Just-in-Time Static Analysis.
In: Proceedings of ISSTA ’17, p. 447,
ACM, Santa Barbara, California, United States, ISBN 978-1-4503-5076-1,
DOI: 10.1145/3092703.3092705,
[Conference or Workshop Item]

Erwig, Andreas and Fischlin, Marc and Hald, Martin and Helm, Dominik and Kiel, Robert and Kübler, Florian and Kümmerlin, Michael and Laenge, Jakob and Rohrbach, Felix (2017):
Redactable Graph Hashing, Revisited.
In: ACISP 2017,
[Conference or Workshop Item]

Fuhry, Benny and Bahmani, Raad and Brasser, Ferdinand and Hahn, Florian and Kerschbaum, Florian and Sadeghi, Ahmad-Reza (2017):
HardIDX: Practical and Secure Index with SGX.
In: Conference on Data and Applications Security and Privacy (DBSec),
[Conference or Workshop Item]

Ghiglieri, Marco and Volkamer, Melanie and Renaud, Karen (2017):
Exploring Consumers' Attitudes of Smart TV Related Privacy Risks.
10292, In: Human Aspects of Information Security, Privacy and Trust. HAS 2017. Lecture Notes in Computer Science, pp. 656-674,
Springer, Cham, Vancouver, Canada, ISBN 978-3-319-58460-7,
DOI: 10.1007/978-3-319-58460-7,
[Conference or Workshop Item]

Heuser, Stephan and Reaves, Bradley and Pendyala, Praveen Kumar and Carter, Henry and Dmitrienko, Alexandra and Kiyavash, Negar and Enck, William and Sadeghi, Ahmad-Reza and Traynor, Patrick (2017):
Phonion: Practical Protection of Metadata in Telephony Networks.
In: Proceedings on Privacy Enhancing Technologies (PoPETs),
[Conference or Workshop Item]

Horsch, Moritz and Braun, Johannes and Metz, Dominique and Buchmann, Johannes (2017):
Update-tolerant and Revocable Password Backup.
In: ACISP 2017 - 22nd Australasian Conference on Information Security and Privacy,
Auckland, New Zealand, [Conference or Workshop Item]

Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Zeitouni, Shaza (2017):
SeED: Secure Non-Interactive Attestation for Embedded Devices.
In: 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017),
Boston, USA, [Conference or Workshop Item]

Kiss, Ágnes and Liu, Jian and Schneider, Thomas and Asokan, N. and Pinkas, Benny (2017):
Private Set Intersection for Unequal Set Sizes with Mobile Applications.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (4), pp. 177-197. De Gruyter Open, DOI: 10.1515/popets-2017-0044,
[Article]

Kohnhäuser, Florian and Büscher, Niklas and Gabmeyer, Sebastian and Katzenbeisser, Stefan (2017):
SCAPI: a scalable attestation protocol to detect software and physical attacks.
In: Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 75-86,
ACM, [Conference or Workshop Item]

Kulyk, Oksana and Reinheimer, Benjamin and Volkamer, Melanie (2017):
Sharing Information with Web Services -- A Mental Model Approach in the Context of Optional Information.
10292, In: International Conference on Human-Computer Interaction (HCII), pp. 675-690,
Springer, DOI: 10.1007/978-3-319-58460-7_46,
[Conference or Workshop Item]

Langfeld, Benedikt (2017):
Vorbereitende Arbeiten zum Feldtest eines Systems zum Quantenschlüsselaustausch.
Darmstadt, Technische Universität, [Bachelor Thesis]

Schulz, Matthias and Gringoli, Francesco and Koch, Michael and Steinmetzer, Daniel and Hollick, Matthias (2017):
Massive reactive smartphone-based jamming using arbitrary waveforms and adaptive power control.
pp. 111-121, 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017), Boston, USA, 18.-20.07.2017, ISBN 978-1-4503-5084-6,
DOI: 10.1145/3098243.3098253,
[Conference or Workshop Item]

Schulz, Matthias and Hollick, Matthias and Gringoli, Francesco and Deligeorgopoulos, Efstathios (2017):
DEMO: Demonstrating Reactive Smartphone-Based Jamming.
In: Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017), pp. 285-287,
ACM, ISBN 978-1-4503-5084-6,
DOI: 10.1145/3098243.3106022,
[Conference or Workshop Item]

Yalame, Mohammad Hossein and Farzam, Mohammad Hossein and Sarmadi, Siavash Bayat (2017):
Secure Two-Party Computation Using an Efficient Garbled Circuit by Reducing Data Transfer.
In: 8. International Conference on Applications and Techniques in Information Security (ATIS'17),
Springer, [Conference or Workshop Item]

Zimmermann, Verena and Gerber, Nina Tryfonas, Theo (ed.) (2017):
“If It Wasn’t Secure, They Would Not Use It in the Movies” – Security Perceptions and User Acceptance of Authentication Technologies.
In: Human Aspects of Information Security, Privacy and Trust, pp. 265-283,
Springer, 5th International Conference on Human Aspects of Information Security, Privacy and Trust (HAS), Vancouver, BC, Canada, 09.07.-4.07.2017, [Conference or Workshop Item]

Alkeilani Alkadri, Nabil and Buchmann, Johannes and El Bansarkhani, Rachid and Krämer, Juliane (2017):
A Framework to Select Parameters for Lattice-Based Cryptography.
In: Cryptology ePrint Archive, 2017 (615), pp. 1-37. International Association for Cryptologic Research (IACR), [Article]

Alkim, Erdem and Bindel, Nina and Buchmann, Johannes and Dagdelen, Özgür and Eaton, Edward and Gutoski, Gus and Krämer, Juliane and Pawlega, Filip (2017):
Revisiting TESLA in the quantum random oracle model.
In: PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography,
Springer, Utrecht, the Netherlands, [Conference or Workshop Item]

Billes, Marina and Møller, Anders and Pradel, Michael (2017):
Systematic Black-Box Analysis of Collaborative Web Applications.
In: PLDI '17 ACM SIGPLAN Conference on Programming Language Design and Implementation, p. 708,
ACM New York, NY, USA, Barcelona, Spain, ISBN 978-1-4503-4988-8,
DOI: 10.1145/3062341.3062363,
[Conference or Workshop Item]

Bindel, Nina and Herath, Udyani and McKague, Matthew and Stebila, Douglas (2017):
Transitioning to a Quantum-Resistant Public Key Infrastructure.
In: PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography,
Springer, Utrecht, the Netherlands, [Conference or Workshop Item]

Boukoros, Spyros and Karvelas, Nikolaos and Katzenbeisser, Stefan (2017):
A lightweight protocol for privacy preserving division.
In: IWCMC 2017 - 13th International Wireless Communications and Mobile Computing Conference,
IEEE, Valencia Spain, [Conference or Workshop Item]

Dessouky, Ghada and Zeitouni, Shaza and Nyman, Thomas and Paverd, Andrew and Davi, Lucas and Koeberl, Patrick and Asokan, N. and Sadeghi, Ahmad-Reza (2017):
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware.
54th Design Automation Conference (DAC'17), [Conference or Workshop Item]

Funke, Sebastian Daubert, Jörg (ed.) (2017):
IoT Architektur zum Schutz von Privatsphäre Ende-zu-Ende.
In: Proceedings of the DACH Security 2017, pp. 1-10,
München, DACH Security 2017, [Conference or Workshop Item]

Gagliardoni, Tommaso and Karvelas, Nikolaos and Katzenbeisser, S. (2017):
ORAMs in a Quantum World.
In: PQCrypto 2017 - 8th International Workshop Post-Quantum Cryptography,
Springer, Utrecht, The Netherlands, [Conference or Workshop Item]

Göpfert, Florian and van Vredendaal, Christine and Wunderer, Thomas (2017):
A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE.
In: PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography,
[Conference or Workshop Item]

Klein, Amit and Shulman, Haya and Waidner, Michael (2017):
Counting in the Dark: Caches Discovery and Enumeration in the Internet.
In: IEEE/IFIP International Conference on Dependable Systems and Networks (DSN),
Denver, CO, USA, [Conference or Workshop Item]

Kulyk, Oksana and Neumann, Stephan and Budurushi, Jurlind and Volkamer, Melanie (2017):
Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?
In: IEEE Security & Privacy, 15 (3), pp. 24-29. DOI: 10.1109/MSP.2017.70,
[Article]

Miettinen, Markus and Marchal, Samuel and Hafeez, Ibbad and Asokan, N. and Sadeghi, Ahmad-Reza and Tarkoma, Sasu (2017):
IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT.
In: Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017),
DOI: 10.1109/ICDCS.2017.283,
[Conference or Workshop Item]

Miettinen, Markus and Marchal, Samuel and Hafeez, Ibbad and Frassetto, Tommaso and Asokan, N. and Sadeghi, Ahmad-Reza and Tarkoma, Sasu (2017):
IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT.
In: Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017),
IEEE, Atlanta, GA, USA, DOI: 10.1109/ICDCS.2017.284,
[Conference or Workshop Item]

Vasilomanolakis, Emmanouil and Habib, Sheikh Mahbub and Milaszewicz, Pavlos and Malik, Rabee Sohail and Mühlhäuser, Max Steghöfer, Jan-Philipp and Esfandiari, Babak (eds.) (2017):
Towards Trust-Aware Collaborative Intrusion Detection: Challenges and Solutions.
In: Trust Management XI, pp. 94-109,
Springer, 11th International Conference on Trust Management (IFIPTM 2017), Gothenburg, Sweden, 12.-16.06., ISBN 978-3-319-59170-4,
DOI: 10.1007/978-3-319-59171-1_8,
[Conference or Workshop Item]

Bindel, Nina (2017):
Ein deutsches digitales Signaturverfahren auf dem Weg zum internationalen kryptographischen Standard.
In: Digitale Gesellschaft zwischen Risikobereitschaft und Sicherheitsbedürfnis- Tagungsband zum 15. Deutschen IT-Sicherheitskongress,
SecuMedia Verlag, [Conference or Workshop Item]

Buchmann, Johannes and Braun, Johannes and Demirel, Denise and Geihs, Matthias (2017):
Quantum Cryptography: a view from classical cryptography.
In: Quantum Science and Technology, 2 (2), DOI: 10.1088/2058-9565/aa69cd,
[Article]

Do, Lisa Nguyen Quang and Ali, Karim and Livshits, Benjamin and Bodden, Eric and Smith, Justin and Murphy-Hill, Emerson (2017):
Cheetah: Just-in-Time Taint Analysis for Android Apps.
In: 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C), pp. 39-42,
Curran Associates, Inc., Buenos Aires, Argentina, ISBN 978-1-5386-1589-8,
DOI: 10.1109/ICSE-C.2017.20,
[Conference or Workshop Item]

Grosse-Puppendahl, Tobias and Holz, Christian and Cohn, Gabe A. and Wimmer, Raphael and Bechtold, Oskar and Hodges, Steve and Reynolds, Matthew S. and Smith, Joshua R. (2017):
Finding Common Ground: A Survey of Capacitive Sensing in Human-Computer Interaction.
In: CHI'17 CHI Conference on Human Factors in Computing Systems, pp. 3293-3316,
ACM, Denver, CO, USA, ISBN 978-1-4503-4655-9,
DOI: 10.1145/3025453.3025808,
[Conference or Workshop Item]

Holzinger, Philipp and Hermann, Ben and Lerch, Johannes and Bodden, Eric and Mezini, Mira (2017):
Hardening Java's Access Control by Abolishing Implicit Privilege Elevation.
2, In: 2017 IEEE Symposium on Security and Privacy (SP 2017), pp. 1.109,
Curran Associates, Inc, San Jose, CA, USA, ISBN 978-1-5090-5534-0,
[Conference or Workshop Item]

Klein, Amit and Shulman, Haya and Waidner, Michael (2017):
Internet-Wide Study of DNS Cache Injections.
In: IEEE International Conference on Computer Communications (INFOCOM),
Atlanta, GA, USA, [Conference or Workshop Item]

Neumann, Stephan and Noll, Manuel and Volkamer, Melanie (2017):
Election-Dependent Security Evaluation of Internet Voting Schemes.
502, In: ICT Systems Security and Privacy Protection. SEC 2017. IFIP Advances in Information and Communication Technology, pp. 371-382,
Springer, Rome, Italy, DOI: 10.1007/978-3-319-58469-0_25,
[Conference or Workshop Item]

Schmitz, Martin and Steimle, Jürgen and Huber, Jochen and Dezfuli, Niloofar and Mühlhäuser, Max (2017):
Flexibles: Deformation-Aware 3D-Printed Tangibles for Capacitive Touchscreens.
In: CHI '17, In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 1001-1014,
ACM, Denver, Colorado, USA, ISBN 978-1-4503-4655-9,
DOI: 10.1145/3025453.3025663,
[Conference or Workshop Item]

Alexopoulos, Nikolaos (2017):
Student Research Abstract: On Enhancing Trust in Cryptographic Solutions.
In: Proceedings of the 32nd Annual ACM Symposium on Applied Computing,
New York, NY, USA, ACM, Marrakech, Morocco, 3-6 April 2017, DOI: 10.1145/3019612.3019921,
[Conference or Workshop Item]

Braun, Johannes and Buchmann, Johannes and Demirel, Denise and Fujiwara, Mikio and Geihs, Matthias and Moriai, Shiho and Sasaki, Masahide and Waseda, Atsushi (2017):
SHORT PAPER: LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality.
In: ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 461-468,
New York, ACM, ASIA CCS '17, Abu Dhabi, UAE, April 2-6, 2017, ISBN 978-1-4503-4944-4,
DOI: 10.1145/3052973.3053043,
[Conference or Workshop Item]

Buchmann, Johannes and Demirel, Denise and Schabhüser, Lucas and Struck, Patrick (2017):
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability.
In: LNCS, In: C2SI 2017 - Codes, Cryptology and Information Security - Second International Conference in honor of Professor Claude Carlet, pp. 142-160,
Springer, Rabat, Morocco, ISBN 978-3-319-55589-8,
[Conference or Workshop Item]

Fischlin, Marc and Günther, Felix (2017):
Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates.
In: 2nd IEEE European Symposium on Security and Privacy (EuroS&P 2017),
IEEE, Paris, France, [Conference or Workshop Item]

Günther, Felix and Hale, Britta and Jager, Tibor and Lauer, Sebastian (2017):
0-RTT Key Exchange with Full Forward Secrecy.
In: Eurocrypt 2017 - 36th International Conference on the Theory and Applications of Cryptographic Techniques,
Springer, [Conference or Workshop Item]

Holzer, Patrick (2017):
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β.
TU Darmstadt, [Master Thesis]

Kulyk, Oksana and Neumann, Stephan and Marky, Karola and Volkamer, Melanie (2017):
Enabling Vote Delegation in Boardroom Voting.
In: Workshop on Advances in Secure Electronic Voting Associated with Financial Crypto 2017, pp. 419-433,
Springer, [Conference or Workshop Item]

Marson, Giorgia Azzurra and Poettering, Bertram (2017):
Security Notions for Bidirectional Channels.
In: IACR Transactions on Symmetric Cryptology, 2017 (1), pp. 405-426. DOI: 10.13154/tosc.v2017.i1.405-426,
[Article]

Mayer, Peter and Volkamer, Melanie (2017):
Poster: Secure Storage of Masked Passwords.
In: IEEE European Symposium on Security and Privacy Posters,
[Conference or Workshop Item]

Petzoldt, Albrecht and Szepieniec, Alan and Mohamed, Mohamed Saied Emam (2017):
A Practical Multivariate Blind Signature Scheme.
In: Financial Cryptography and Data Security 2017,
Malta, [Conference or Workshop Item]

Portela, Bernardo and Barbosa, Manuel and Scerri, Guillaume and Warinschi, Bogdan and Bahmani, Raad and Brasser, Ferdinand and Sadeghi, Ahmad-Reza (2017):
Secure Multiparty Computation from SGX.
In: Financial Cryptography and Data Security,
[Conference or Workshop Item]

Tamrakar, Sandeep and Liu, Jian and Paverd, Andrew and Ekberg, Jan-Erik and Pinkas, Benny and Asokan, N. (2017):
The Circle Game: Scalable Private Membership Test Using Trusted Hardware.
In: ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security, pp. 31-44,
DOI: 10.1145/3052973.3053006,
[Conference or Workshop Item]

Trautmann, Nils and Ferenczi, Gergely and Croke, Sarah and Barnett, Stephen (2017):
Holographic quantum imaging: reconstructing spatial properties via two-particle interference.
In: Journal of Optics, 19 (5), IOP Publishing, [Article]

Weinert, Christian and Demirel, Denise and Vigil, Martín and Geihs, Matthias and Buchmann, Johannes (2017):
MoPS: A Modular Protection Scheme for Long-Term Storage.
In: 12. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'17), pp. 436-448,
ACM, ISBN 978-1-4503-4944-4,
DOI: 10.1145/3052973.3053025,
[Conference or Workshop Item]

Zimmermann, Verena and Volkamer, Melanie and Vogt, Joachim and Henhapl, Birgit (2017):
Ende-zu-Ende sichere E-Mail-Kommunikation.
In: >Datenschutz und Datensicherheit - DUD, 41, pp. 308-313. [Article]

Mariano, Artur and Laarhoven, Thijs and Bischof, Christian (2017):
A Parallel Variant of LDSieve for the SVP on Lattices.
In: 2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP),
IEEE, 2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP), DOI: 10.1109/PDP.2017.60,
[Conference or Workshop Item]

Dantas, Yuri Gil and Hamann, Tobias and Mantel, Heiko and Schickel, Johannes (2017):
An Experimental Study of a Bucketing Approach.
In: Quantitative Aspects of Programming Languages and Systems,
Uppsala, Sweden, [Conference or Workshop Item]

Grube, Tim and Hauke, Sascha and Daubert, Jörg and Mühlhäuser, Max (2017):
Ant Colonies for Efficient and Anonymous Group Communication Systems.
In: 2017 International Conference on Networked Systems (NetSys), pp. 1-8,
Göttingen, Germany, IEEE, DOI: 10.1109/NetSys.2017.7903958,
[Conference or Workshop Item]

Günther, Daniel (2017):
Valiant's Universal Circuit - Towards a Modular Construction and Implementation.
Darmstadt, Technische Universität, [Bachelor Thesis]

Günther, Felix and Poettering, Bertram (2017):
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes.
In: International Journal of Information Security, 16 (3), pp. 281-297. Springer, ISSN 1615-5270,
[Article]

Pascoal, Túlio A. and Dantas, Yuri Gil and Fonseca, Iguatemi E. and Nigam, Vivek (2017):
Slow TCAM Exhaustion DDoS Attack.
In: IFIP SEC 2017 - 32nd International Conference on ICT Systems Security and Privacy Protection, pp. 17-31,
Springer, [Conference or Workshop Item]

Schurig, Sebastian (2017):
Development of a user interface and implementation of specific software tools for the evaluation and realization of PUFs with respect to security applications.
Darmstadt, Technische Universität, [Master Thesis]

Shulman, Haya and Waidner, Michael (2017):
One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in Signed Domains.
In: The 14th USENIX Symposium on Networked SystemsDesign and Implementation (NSDI),
Boston, MA, USA, [Conference or Workshop Item]

Toteva, Iva (2017):
Advancing Tool Support for the Detection of Side-Channel.
Darmstadt, Technische Universität, [Master Thesis]

Cohen, Avichai and Gilad, Yossi and Herzberg, Amir and Schapira, Michael and Shulman, Haya (2017):
Are We There Yet? On RPKIs Deployment and Security.
In: Network and Distributed Systems Security (NDSS),
San Diego, CA, USA, [Conference or Workshop Item]

Davi, Lucas and Gens, David and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2017):
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
In: 24th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Dessouky, Ghada and Koushanfar, Farinaz and Sadeghi, Ahmad-Reza and Schneider, Thomas and Zeitouni, Shaza and Zohner, Michael (2017):
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
In: 24. Annual Network and Distributed System Security Symposium (NDSS'17),
Internet Society, DOI: 10.14722/ndss.2017.23097,
[Conference or Workshop Item]

Garcia, Luis and Brasser, Ferdinand and Cintuglu, Mehmet H. and Sadeghi, Ahmad-Reza and Mohammed, Osama and Zonouz, Saman A. (2017):
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
In: 24th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Nielsen, Jesper Buus and Schneider, Thomas and Trifiletti, Roberto (2017):
Constant Round Maliciously Secure 2PC with Function-Independent Preprocessing using LEGO.
In: 24. Annual Network and Distributed System Security Symposium (NDSS'17),
Internet Society, DOI: 10.14722/ndss.2017.23075,
[Conference or Workshop Item]

Rudd, Robert and Skowyra, Richard and Bigelow, David and Dedhia, Veer and Hobson, Thomas and Crane, Stephen and Liebchen, Christopher and Larsen, Per and Davi, Lucas and Franz, Michael and Sadeghi, Ahmad-Reza and Okhravi, Hamed (2017):
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
In: 24th Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Schaller, André and Xiong, Wenjie and Anagnostopoulos, Nikolaos Athanasios and Saleem, Umair and Gabmeyer, Sebastian and Katzenbeisser, Stefan and Szefer, Jakub (2017):
Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security.
In: 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST),
Institute of Electrical and Electronics Engineers (IEEE), McLean, VA, USA, [Conference or Workshop Item]

Schmidt, Markus (2017):
Estimation of the Hardness of the Learning with Errors Problem with a Given Number of Samples.
Darmstadt, Technische Universität, [Master Thesis]

Trautmann, Nils and Sonnleitner, Matthias and Barnett, Stephen (2017):
Will a Decaying Atom Feel a Friction Force?
In: Physical Review Letters, [Article]

Ulmer, Alex and Kohlhammer, Jörn and Shulman, Haya (2017):
Towards Enhancing the Visual Analysis of Interdomain Routing.
In: VISIGRAPP 2017 : 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications,
Porto, Portugal, [Conference or Workshop Item]

Volkamer, Melanie and Renaud, Karen and Reinheimer, Benjamin and Kunz, Alexandra (2017):
User experiences of TORPEDO: TOoltip-powered phishing email DetectiOn.
In: >Computers & Security, 71, pp. 100-113. DOI: 10.1016/j.cose.2017.02.004,
[Article]

Ankele, Robin and Kucuk, Kubilay A. and Martin, Andrew and Simpson, Andrew and Paverd, Andrew (2017):
Applying the Trustworthy Remote Entity to Privacy-Preserving Multiparty Computation: Requirements and Criteria for Large-Scale Applications.
In: 13th IEEE International Conference on Advanced and Trusted Computing, pp. 414-422,
ISBN 9781509027705,
DOI: 10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0077,
[Conference or Workshop Item]

Dietsch, Sascha Thorsten (2017):
Integration des gitterbasierten LARA-Verschlüsselungsverfahrens in JCA.
Darmstadt, Technische Universität, [Bachelor Thesis]

Grube, Tim and Hauke, Sascha and Daubert, Jörg and Mühlhäuser, Max (2017):
Ant Colony Optimisation - A Solution to Efficient Anonymous Group Communication?
In: 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 337-340,
Las Vegas, NV, USA, IEEE, Las Vegas (USA), DOI: 10.1109/CCNC.2017.7983129,
[Conference or Workshop Item]

Kohnhäuser, Florian and Büscher, Niklas and Gabmeyer, Sebastian and Katzenbeisser, Stefan (2017):
Scalable Attestation Resilient to Physical Attacks for Embedded Devices in Mesh Networks.
In: arXiv, [Article]

Rehfeld, Silke and Volkamer, Melanie and Neumann, Stephan (2017):
Sicherheit in der Kommunikation: kostenloses Maßnahmen-Angebot für KMU gegen Internetbetrug.
In: >Mittelstand 4.0 - Agentur Kommunikation, [Article]

Riazi, M. Sadegh and Songhori, Ebrahim M. and Sadeghi, Ahmad-Reza and Schneider, Thomas and Koushanfar, Farinaz (2017):
Toward Practical Secure Stable Matching.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (1), pp. 62-78. De Gruyter Open, DOI: 10.1515/popets-2017-0005,
[Article]

Pottebaum, Jens and Reuter, Christian (eds.) (2017):
International Journal of Information Systems for Crisis Response and Management (IJISCRAM) : Special Issue on IT-Support for Critical Infrastructure Protection.
9, (4), Hershey, Pa., IGI Global, ISSN 1937-9420,
[Journal]

Bindel, Nina and Buchmann, Johannes and Krämer, Juliane and Mantel, Heiko and Schickel, Johannes and Weber, Alexandra (2017):
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
pp. 225-241, Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS), [Conference or Workshop Item]

Boukoros, Spyros and Katzenbeisser, Stefan (2017):
Measuring privacy in high dimensional microdata collections.
pp. 15:1-15:8, Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, DOI: 10.1145/3098954.3098977,
[Conference or Workshop Item]

Dewald, Florian and Mantel, Heiko and Weber, Alexandra (2017):
AVR Processors as a Platform for Language-Based Security.
pp. 427-445, Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS), [Conference or Workshop Item]

Gay, Richard and Hu, Jinwei and Mantel, Heiko and Mazaheri, Sogol (2017):
Relationship-Based Access Control for Resharing in Decentralized Online Social Networks.
pp. 18-34, Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS), [Conference or Workshop Item]

Gay, Richard and Hu, Jinwei and Mantel, Heiko and Schickel, Johannes (2017):
Towards Accelerated Usage Control based on Access Correlations.
pp. 245-261, Proceedings of the 22nd Nordic Conference on Secure IT Systems (NordSec), [Conference or Workshop Item]

Gerber, Paul and Volkamer, Melanie and Gerber, Nina (2017):
Das Privacy-Paradoxon - Ein Erklärungsversuch und Handlungsempfehlungen.
In: Dialogmarketing Perspektiven 2016/2017: Tagungsband 11. wissenschaftlicher interdisziplinärer Kongress für Dialogmarketing, pp. 139-167,
Springer Fachmedien Wiesbaden, ISBN 978-3-658-16835-3,
DOI: 10.1007/978-3-658-16835-3_8,
[Conference or Workshop Item]

Kaufhold, Marc-André and Reuter, Christian (2017):
Integration von Flow in die Mensch- Computer-Interaktion? Potenziale für die Gestaltung interaktiver Systeme.
In: Mittelstand-Digital "Wissenschaft trifft Praxis", 7 (1), pp. 78-88. [Article]

Kaufhold, Marc-André and Reuter, Christian Comes, Tina and Bénaben, Frédérick and Hanachi, Chihab and Lauras, Matthieu (eds.) (2017):
The Impact of Social Media in Emergencies: A Case Study with the Fire Department of Frankfurt.
In: Agility is coming : mines Albi : Proceedings of Information Systems for Crisis Response and Management (ISCRAM), pp. 603-612,
Albi, France, ISCRAM 2017 - 14th International Conference on Information Systems for Crisis Response and Management, Albi, France, May 21-24, 2017, [Conference or Workshop Item]

Kaufhold, Marc-André and Reuter, Christian and Ludwig, Thomas and Scholl, Simon Eibl, Maximilian and Gaedke, Martin (eds.) (2017):
Social Media Analytics: Eine Marktstudie im Krisenmanagement.
pp. 1325-1338, Bonn, INFORMATIK 2017, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik, Bonn, [Conference or Workshop Item]

Kaufhold, Marc-André and Reuter, Christian and Stefan, Marvin Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C. (eds.) (2017):
Gesellschaftliche Herausforderungen des Missbrauchs von Bots und sozialen Medien.
In: Mensch und Computer 2017 - Workshopband, pp. 51-58,
Regensburg, Germany, Gesellschaft für Informatik e.V., DOI: 10.18420/muc2017-ws01-0386,
[Conference or Workshop Item]

Leopold, Inken and Reuter, Christian Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C. (eds.) (2017):
Kundenakzeptanz von Bluetooth-Beacons im Lebensmittelhandel.
pp. 361-364, Regensburg, Germany, Gesellschaft für Informatik e.V., Mensch & Computer: Tagungsband, Regensburg, Germany, DOI: 10.18420/muc2017-mci-0350,
[Conference or Workshop Item]

Li, Ximeng and Mantel, Heiko and Tasch, Markus (2017):
Taming Message-passing Communication in Compositional Reasoning about Confidentiality.
pp. 45-66, Proceedings of the 15th Asian Symposium on Programming Languages and Systems (APLAS), [Conference or Workshop Item]

Ludwig, Thomas and Kotthaus, Christoph and Reuter, Christian and Dongen, Sören Van and Pipek, Volkmar (2017):
Situated crowdsourcing during disasters: Managing the tasks of spontaneous volunteers through public displays.
In: International Journal on Human-Computer Studies (IJHCS), 102 (C), pp. 103-121. DOI: 10.1016/j.ijhcs.2016.09.008,
[Article]

Mantel, Heiko and Weber, Alexandra and Köpf, Boris (2017):
A Systematic Study of Cache Side Channels across AES Implementations.
pp. 213-230, Proceedings of the 9th International Symposium on Engineering Secure Software and Systems (ESSoS), [Conference or Workshop Item]

Mayer, Peter and Gerber, Nina and McDermott, Ronja and Volkamer, Melanie and Vogt, Joachim (2017):
Productivity vs. Security: Mitigating Conflicting Goals in Organizations.
In: Information and Computer Security, 25 (2), pp. 137-151. DOI: 10.1108/ICS-03-2017-0014,
[Article]

Mosconi, Gaia and Korn, Matthias and Reuter, Christian and Tolmie, Peter and Teli, Maurizio and Pipek, Volkmar (2017):
From Facebook to the Neighbourhood: Infrastructuring of Hybrid Community Engagement.
In: Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW), 26 (4-6), pp. 959-1003. DOI: 10.1007/s10606-017-9291-z,
[Article]

Nyman, Thomas and Dessouky, Ghada and Zeitouni, Shaza and Lehikoinen, Aaro and Paverd, Andrew and Asokan, N. and Sadeghi, Ahmad-Reza (2017):
HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement.
In: Cryptography and Security, abs/1705.10295, [Article]

Pinatti de Carvalho, Aparecido Fabiano and Saeed, Saqib and Reuter, Christian and Wulf, Volker (2017):
The Role of Technological Infrastructure in Nomadic Practices of a Social Activist Community.
pp. 41-47, Sheffield, UK, Proceedings of the ECSCW-Workshop on Nomadic Culture Beyond Work Practices, International Reports on Socio-Informatics (IRSI), Sheffield, UK, [Conference or Workshop Item]

Pottebaum, Jens and Erfurth, Christian and Reuter, Christian Eibl, Maximilian and Gaedke, Martin (eds.) (2017):
IT-Rettung 2017: IT-Unterstützung in Emergency Management & Response.
pp. 1281-1282, Bonn, INFORMATIK 2017, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik, Bonn, [Conference or Workshop Item]

Pottebaum, Jens and Reuter, Christian (2017):
Guest Editorial Preface: Special Issue on IT-Support for Critical Infrastructure Protection.
In: International Journal of Information Systems for Crisis Response and Management (IJISCRAM), 9 (4), pp. iv-vii. IGI Global, ISSN 1937-9420,
[Article]

Reinhold, Thomas (2017):
Zur Verantwortung der Informatik in einer technologisierten Gesellschaft.
In: Sicherheit und Frieden, [Article]

Reinhold, Thomas and Schulze, Matthias (2017):
Arbeitspapier: „Digitale Gegenangriffe – Eine Analyse der technischen und politischen Implikationen von „hack backs“.
[Other]

Renaud, Karen and Zimmermann, Verena (2017):
Enriched Nudges Lead to Stronger Password Replacements … but Implement Mindfully.
In: Proceedings of the 2017 Information Security for South Africa (ISSA) Conference, pp. 1-9,
IEEE, Information Security for South Africa (ISSA), Johannesburg, South Africa, 16.-17.08.2017, [Conference or Workshop Item]

Reuter, Christian and Kaufhold, Marc-André and Klös, Jonas Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C. (eds.) (2017):
Benutzbare Sicherheit: Usability, Safety und Security bei Passwörtern.
pp. 33-41, Regensburg, Germany, Gesellschaft für Informatik e.V., Mensch & Computer: Workshopband, Regensburg, Germany, DOI: 10.18420/muc2017-ws01-0384,
[Conference or Workshop Item]

Reuter, Christian and Kaufhold, Marc-André and Leopold, Inken and Knipp, Hannah (2017):
Katwarn, NINA or FEMA? Multi-Method Study on Distribution, Use and Public Views on Crisis Apps.
pp. 2187-2201, Guimar\~es, Portugal, European Conference on Information Systems (ECIS), Guimar\~es, Portugal, [Conference or Workshop Item]

Reuter, Christian and Kaufhold, Marc-André and Leopold, Inken and Knipp, Hannah Klafft, Michael (ed.) (2017):
Informing the Population: Mobile Warning Apps.
In: Risk and Crisis Communication in Disaster Prevention and Management, pp. 31-41, Wilhelmshaven, epubli, ISBN 9783745054484,
[Book Section]

Reuter, Christian and Kaufhold, Marc-André and Ludwig, Thomas Paterno, Fabio and Wulf, Volker (eds.) (2017):
End-User Development and Social Big Data - Towards Tailorable Situation Assessment with Social Media.
In: New Perspectives in End-User Development, pp. 307-332, Springer, ISBN 978-3-319-60290-5,
DOI: 10.1007/978-3-319-60291-2_12,
[Book Section]

Reuter, Christian and Kaufhold, Marc-André and Schorch, Marén and Gerwinski, Jan and Soost, Christian and Hassan, Sohaib S. and Rusch, Gebhard and Moog, Petra and Pipek, Volkmar and Wulf, Volker Hoch, Gero and Schröteler von Brandt, Hildegard and Stein, Volker and Schwarz, Angela (eds.) (2017):
Digitalisierung und Zivile Sicherheit: Zivilgesellschaftliche und betriebliche Kontinuität in Katastrophenlagen (KontiKat).
In: Sicherheit (DIAGONAL Jahrgang 38), pp. 207-224, Göttingen, Vandenhoeck & Ruprecht, ISBN 978-3-8471-0739-2,
DOI: 10.14220/digo.2017.38.1.207,
[Book Section]

Reuter, Christian and Kaufhold, Marc-André and Spielhofer, Thomas and Hahne, Anna Sophie (2017):
Social Media in Emergencies: A Representative Study on Citizens' Perception in Germany.
In: Proceedings of the ACM Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing, 1 (Issue CSCW), pp. 1-19. DOI: 10.1145/3134725,
[Article]

Reuter, Christian and Kaufhold, Marc-André and Steinfort, René Comes, Tina and Bénaben, Frédérick and Hanachi, Chihab and Lauras, Matthieu (eds.) (2017):
Rumors, Fake News and Social Bots in Conflicts and Emergencies: Towards a Model for Believability in Social Media.
pp. 583-591, Albi, France, Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), Albi, France, [Conference or Workshop Item]

Reuter, Christian and Ludwig, Thomas and Kaufhold, Marc-André and Hupertz, Julian Wohlgemuth, V. and Fuchs-Kittowski, Frank and Wittmann, Jochen (eds.) (2017):
Social Media Resilience during Infrastructure Breakdowns using Mobile Ad-Hoc Networks.
In: Advances and New Trends in Environmental Informatics : Stability, Continuity, Innovation, pp. 75-88, Berlin, Germany, Springer, ISBN 978-3-319-44711-7,
DOI: 10.1007/978-3-319-44711-7_7,
[Book Section]

Reuter, Christian and Mentler, Tilo and Geisler, Stefan and Herczeg, Michael and Ludwig, Thomas and Pipek, Volkmar and Nestler, Simon Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C. (eds.) (2017):
4. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen.
In: Mensch und Computer 2017 - Workshopband, pp. 5-8,
Regensburg, Germany, Gesellschaft für Informatik e.V., DOI: 10.18420/muc2017-ws01-0380,
[Conference or Workshop Item]

Reuter, Christian and Pätsch, Katja and Runft, Elena (2017):
IT for Peace? Fighting Against Terrorism in Social Media – An Explorative Twitter Study.
In: i-com: Journal of Interactive Media, 16 (2), pp. 181-195. DOI: 10.1515/icom-2017-0013,
[Article]

Reuter, Christian and Pätsch, Katja and Runft, Elena Leimeister, J. M. and Brenner, W. (eds.) (2017):
Terrorbekämpfung mithilfe sozialer Medien – ein explorativer Einblick am Beispiel von Twitter.
pp. 649-663, St. Gallen, Switzerland, Proceedings of the International Conference on Wirtschaftsinformatik (WI), St. Gallen, Switzerland, [Conference or Workshop Item]

Reuter, Christian and Spielhofer, Thomas (2017):
Towards Social Resilience: A Quantitative and Qualitative Survey on Citizens' Perception of Social Media in Emergencies in Europe.
In: Journal Technological Forecasting and Social Change (TFSC), 121, pp. 168-180. DOI: 10.1016/j.techfore.2016.07.038,
[Article]

Reuter, Christian and Wiegärtner, Daniel and Müller, Claudia Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C. (eds.) (2017):
DIVOA – Unterstützung der älteren Bevölkerung bei Schadenslagen.
pp. 295-298, Regensburg, Germany, Gesellschaft für Informatik e.V., Mensch & Computer: Tagungsband, Regensburg, Germany, DOI: 10.18420/muc2017-mci-0352,
[Conference or Workshop Item]

Riebe, Thea and Geisse, Jens (2017):
Warum die Cyber-Sicherheitskultur ein Update braucht.
Frankfurt a.M., sicherheitspolitik-blog.de,
[Other]

Schulz, Steffen and Schaller, André and Kohnhäuser, Florian and Katzenbeisser, Stefan (2017):
Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors.
In: LNCS, In: ESORICS 2017 - European Symposium on Research in Computer Security, pp. 437-455,
Springer, Oslo, Norway, ISBN 978-3-319-66398-2,
DOI: 10.1007/978-3-319-66399-9_24,
[Conference or Workshop Item]

Shulman, Haya and Waidner, Michael (2017):
One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in the Internet.
In: Proceedings of the 14th USENIX Conference on Networked Systems Design and Implementation, pp. 131-144,
USENIX Association, 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17), Boston, MA, USA, 27.-29.03. 2017, [Conference or Workshop Item]

Sullivan, Dean and Arias, Orlando and Gens, David and Davi, Lucas and Sadeghi, Ahmad-Reza and Jin, Yier (2017):
Execution Integrity with In-Place Encryption.
In: CoRR, abs/1703.02698, [Article]

Tundis, Andrea and Garcia Cordero, Carlos and Egert, Rolf and Garro, Alfredo and Mühlhäuser, Max (2017):
Increasing the Resilience of Cyber Physical Systems in Smart Grid Environments using Dynamic Cells.
pp. 796-807, 19th International Conference on Cyber-Physical Systems (ICCPS), Zurich, Switzerland, 13th-14th January, 2017, DOI: 10.5281/zenodo.1130542,
[Conference or Workshop Item]

Wiegärtner, Daniel and Reuter, Christian and Müller, Claudia Burghardt, M. and Wimmer, R. and Wolff, C. and Womser-Hacker, C. (eds.) (2017):
Erwartungen der älteren Bevölkerung an IKT für Krisenkommunikation.
pp. 609-614, Regensburg, Germany, Gesellschaft für Informatik e.V., Mensch & Computer: Workshopband, Regensburg, Germany, DOI: 10.18420/muc2017-ws17-0416,
[Conference or Workshop Item]

von Drachenfels, Magdalena and Riebe, Thea (2017):
Normative Ordnungen des Digitalen - Konferenzbericht.
Frankfurt a.M., sicherheitspolitik-blog.de,
[Other]

2016

Wunderer, Thomas (2016):
Revisiting the Hybrid Attack: Improved Analysis and Refined Security Estimates.
In: Cryptology ePrint Archive, 2016 (733), pp. 1-35. International Association for Cryptologic Research (IACR), [Article]

Brendel, Jacqueline and Demirel, Denise (2016):
Efficient Proactive Secret Sharing.
In: 2016 Privacy, Security and Trust Conference,
IEEE, Auckland, New Zealand, [Conference or Workshop Item]

Garcia Cordero, Carlos and Hauke, Sascha and Mühlhäuser, Max and Fischer, Mathias (2016):
Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks.
In: 14th Annual Conference on Privacy, Security and Trust (PST), pp. 317 - 324,
IEEE, ISBN 978-1-5090-4379-8,
DOI: 10.1109/PST.2016.7906980,
[Conference or Workshop Item]

Geihs, Matthias and Demirel, Denise and Buchmann, Johannes (2016):
A security analysis of techniques for long-term integrity protection.
In: 2016 Privacy, Security and Trust Conference,
Auckland, New Zealand, [Conference or Workshop Item]

Gerber, Paul and Renaud, Karen and Volkamer, Melanie (2016):
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions.
In: >Journal of Information Security and Applications, 34 (1), pp. 8-26. DOI: 10.1016/j.jisa.2016.10.003,
[Article]

Mayer, Peter and Berket, Hermann and Volkamer, Melanie (2016):
Enabling Automatic Password Change in Password Managers Through Crowdsourcing.
In: International Conference on Passwords,
Springer LNCS, [Conference or Workshop Item]

Sang, Bo and Petri, Gustavo and Ardekani, Masoud Saeida and Ravi, Srivatsan and Eugster, Patrick (2016):
Programming Scalable Cloud Services with AEON.
In: Middleware '16 Proceedings of the 17th International Middleware Conference, pp. 16:1,
ACM, Trento, Italy, ISBN 978-1-4503-4300-8,
DOI: 10.1145/2988336.2988352,
[Conference or Workshop Item]

Traverso, Giulia and Demirel, Denise and Habib, Sheikh Mahbub and Buchmann, Johannes (2016):
AS³: Adaptive Social Secret Sharing for Distributed Storage Systems.
In: 2016 Privacy, Security and Trust Conference,
IEEE, Auckland, New Zealand, [Conference or Workshop Item]

Schroth, Nils (2016):
Demonstrator for Privacy-Preserving Face Recognition.
TU Darmstadt, [Bachelor Thesis]

Buescher, Niklas and Kretzmer, David and Jindal, Arnav and Katzenbeisser, Stefan (2016):
Scalable Secure Computation from ANSI-C.
In: WIFS - IEEE International Workshop on Information Forensics and Security,
IEEE, [Conference or Workshop Item]

Dai, Tianxiang and Shulman, Haya and Waidner, Michael (2016):
DNSSEC Misconfigurations in Popular Domains.
In: vol 10052, In: Cryptology and Network Security. CANS 2016,
Springer, Cham, Milano, Italy, [Conference or Workshop Item]

El Bansarkhani, Rachid and Sturm, Jan (2016):
An Efficient Lattice-based Multisignature Scheme with Applications to Bitcoins.
In: 15th International Conference on Cryptology and Network Security - CANS 2016,
Milan, Italy, [Conference or Workshop Item]

Kogan, Kirill and Nikolenko, Sergey I. and Eugster, Patrick and Shalimov, Alexander and Rottenstreich, Ori (2016):
FIB efficiency in distributed platforms.
In: 2016 IEEE 24th International Conference on Network Protocols (ICNP), pp. 1-10,
IEEE, Singapore, Singapore, DOI: 10.1109/ICNP.2016.7784452,
[Conference or Workshop Item]

Lato, Ellen (2016):
Fault Attacks on Lattice-Based Encryption Schemes.
Darmstadt, Technische Universität, [Master Thesis]

Nobach, Leonhard and Rimac, I. and Hilt, V. and Hausheer, David (2016):
SliM: Enabling Efficient, Seamless NFV State Migration (Poster Paper).
In: 2016 IEEE 24th International Conference on Network Protocols (ICNP), pp. 1-2,
IEEE, Singapore, Singapore, ISBN 978-1-5090-3281-5/16,
DOI: 10.1109/ICNP.2016.7784459,
[Conference or Workshop Item]

Sullivan, Dean and Arias, Orlando and Davi, Lucas and Sadeghi, Ahmad-Reza and Jin, Yier (2016):
Towards a Policy-Agnostic Control-Flow Integrity Implementation.
In: Black Hat Europe,
[Conference or Workshop Item]

Wang, Lin and Jiao, Lei and Kliazovich, Dzmitry and Bouvry, Pascal (2016):
Reconciling Task Assignment and Scheduling in Mobile Edge Clouds.
In: 2016 IEEE 24th International Conference on Network Protocols (ICNP), pp. 1-6,
IEEE, Singapore, Singapore, DOI: 10.1109/ICNP.2016.7785317,
[Conference or Workshop Item]

Wang, Weihang and Zheng, Yunhui and Xing, Xinyu and Kwon, Yonghwi and Zhang, Xiangyu and Eugster, Patrick (2016):
WebRanz: web page randomization for better advertisement delivery and web-bot prevention.
In: FSE 2016 Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 205-216,
ACM, Seattle, WA, USA, ISBN 978-1-4503-4218-6,
DOI: 10.1145/2950290.2950352,
[Conference or Workshop Item]

Abera, Tigist and Asokan, N. and Davi, Lucas and Ekberg, Jan-Erik and Nyman, Thomas and Paverd, Andrew and Sadeghi, Ahmad-Reza and Tsudik, Gene (2016):
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
In: 23rd ACM Conference on Computer and Communications Security (CCS),
[Conference or Workshop Item]

Baumann, Peter and Katzenbeisser, Stefan and Stopczynski, Martin and Tews, Erik (2016):
Disguised Chromium Browser: Robust browser, Flash and Canvas Fingerprinting Protection.
In: WPES '16 Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, pp. 37-46,
ACM, Vienna, Austria, ISBN 978-1-4503-4569-9,
DOI: 10.1145/2994620.2994621,
[Conference or Workshop Item]

Bieber, Julian (2016):
Generalizing Semi-Private Function Evaluation.
TU Darmstadt, [Bachelor Thesis]

Classen, Jiska and Steinmetzer, Daniel and Hollick, Matthias (2016):
Opportunities and Pitfalls in Securing Visible Light Communication on the Physical Layer.
In: 3rd ACM Workshop on Visible Light Communication Systems, [Article]

Deshotels, Luke and Deaconescu, Razvan and Chiroiu, Mihai and Davi, Lucas and Enck, William and Sadeghi, Ahmad-Reza (2016):
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
In: 23rd ACM Conference on Computer and Communications Security (CCS),
[Conference or Workshop Item]

Fojtik, Roman (2016):
Salt Synchronization Service.
Darmstadt, Technische Universität, [Bachelor Thesis]

Hauck, Markus and Savvides, Savvas and Eugster, Patrick and Mezini, Mira and Salvaneschi, Guido (2016):
SecureScala: Scala embedding of secure computations.
In: Proceedings of the 2016 7th ACM SIGPLAN Symposium on Scala,
ACM, [Conference or Workshop Item]

Herzberg, Amir and Shulman, Haya and Waidner, Michael (2016):
Stratum Filtering: Cloud-Based Detection of Attack Sources.
In: ACM Cloud Computing Security Workshop (CCSW),
Vienna, Austria, [Conference or Workshop Item]

Holz, Marco (2016):
Effective Protection of Sensitive Metadata in Online Communication Networks.
TU Darmstadt, [Bachelor Thesis]

Jawed, Kashif (2016):
An Investigation and Implementation for the Effect of Row Hammering in Static Random Access Memory (SRAM) and Dynamic Random Access Memory (DRAM).
Darmstadt, Technische Universität, [Master Thesis]

Lacoste, Marc and Sousa, Paulo and Neves, Nuno and Miettinen, Markus and Ramos, Fernando M.V. and Vukolic, Marko and Charmet, Fabien and Yaich, Reda and Oborzynski, Krzysztof and Vernekar, Gitesh (2016):
User-Centric Security and Dependability in the Cloud of Clouds.
In: IEEE Cloud Computing Special issue on Cloud Security, 3 (5), pp. 64-75. [Article]

Mayer, Peter and Neumann, Stephan and Volkamer, Melanie (2016):
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes.
In: CCS '16, In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1817-1819,
ACM, Vienna, Austria, ISBN 978-1-4503-4139-4,
DOI: 10.1145/2976749.2989045,
[Conference or Workshop Item]

Pfeiffer, Martin and Kwiotek, Jan-Pascal and Classen, Jiska and Klose, Robin and Hollick, Matthias (2016):
Analyzing TETRA Location Privacy and Network Availability.
In: SPSM '16, pp. 117-122, New York, NY, USA, ACM, 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, Vienna, Austria, DOI: 10.1145/2994459.2994463,
[Conference or Workshop Item]

Renaud, Karen and Flowerday, Stephen and English, Rosanne and Volkamer, Melanie (2016):
Why don’t UK citizens protest against privacy-invading dragnet surveillance?
In: >Information and Computer Security, 24 (4), pp. 400-415. DOI: 10.1108/ICS-06-2015-0024,
[Article]

Sadeghi, Ahmad-Reza and Schunter, Matthias and Ibrahim, Ahmad and Conti, Mauro and Neven, Gregory (2016):
SANA: Secure and Scalable Aggregate Network Attestation.
In: 23rd ACM Conference on Computer and Communications Security (CCS) 2016,
CCS 2016, [Conference or Workshop Item]

Schabhüser, Lucas and Demirel, Denise and Buchmann, Johannes (2016):
An Unconditionally Hiding Auditing Procedure for Computations over Distributed Data.
In: The 2nd IEEE Workshop on Security and Privacy in the Cloud (SPC 2016),
Philadelphia, PA USA, [Conference or Workshop Item]

Vasilomanolakis, Emmanouil and Stahn, Michael and Garcia Cordero, Carlos and Mühlhäuser, Max (2016):
On Probe-Response Attacks in Collaborative Intrusion Detection Systems.
In: IEEE Conference on Communications and Network Security, pp. 279 - 286,
IEEE, Philadelphia, USA, ISBN 978-1-5090-3065-1,
DOI: 10.1109/CNS.2016.7860495,
[Conference or Workshop Item]

Ali, Azmzt and Othmane, Lotfi Ben (2016):
Towards effective security assurance for incremental software development - the case of zen cart application,.
In: Proc. of the 11th International Conference on Availabil- ity, Reliability and Security (ARES),
[Conference or Workshop Item]

Appel, Michael and Bossert, Andreas and Cooper, Steven and Kußmaul, Tobias and Löffler, Johannes and Pauer, Christof and Wiesmaier, Alexander (2016):
Block ciphers for the IoT – SIMON, SPECK, KATAN, LED, TEA, PRESENT, and SEA compared.
[Report]

Appel, Michael and Pauer, Christof and Wiesmaier, Alexander (2016):
Security aspects and comparison of block ciphers LED and TEA.
[Report]

Bossert, Andreas and Cooper, Steven and Wiesmaier, Alexander (2016):
A comparison of block ciphers SIMON, SPECK, and KATAN.
[Report]

Buescher, Niklas and Holzer, Andreas and Weber, Alina and Katzenbeisser, Stefan (2016):
Compiling Low Depth Circuits for Practical Secure Computation.
In: 21st European Symposium on Research in Computer Security (ESORICS 2016),
Springer, Heraklion, Crete, Greece, [Conference or Workshop Item]

Butin, Denis and Demirel, Denise and Buchmann, Johannes (2016):
Formal Policy-based Provenance Audit.
In: The 11th International Workshop on Security - IWSEC 2016,
sola city Conference Center, Akihabara-Ochanomizu District, Tokyo, Japan, [Conference or Workshop Item]

Demirel, Denise and Krenn, Stephan and Loruenser, Thomas and Traverso, Giulia (2016):
Efficient Third Party Auditing for a Distributed Storage System.
In: International Conference on Availability, Reliability and Security - ARES 2016,
IEEE, Salzburg, Austria, [Conference or Workshop Item]

Diedrich, Lennart and Jattke, Patrick and Murati, Lulzim and Senker, Matthias and Wiesmaier, Alexander (2016):
Comparison of Lightweight Stream Ciphers: MICKEY 2.0, WG-8, Grain and Trivium.
[Report]

Dowling, Benjamin and Günther, Felix and Herath, Udyani and Stebila, Douglas (2016):
Secure Logging Schemes and Certificate Transparency.
In: 21st European Symposium on Research in Computer Security (ESORICS 2016),
Springer, Heraklion, Crete, Greece, [Conference or Workshop Item]

Ghiglieri, Marco and Stopczynski, Martin (2016):
SecLab: An Innovative Approach to Learn and Understand Current Security and Privacy Issues.
ACM SIGITE, [Conference or Workshop Item]

Jattke, Patrick and Senker, Matthias and Wiesmaier, Alexander (2016):
Comparison of two Lightweight Stream Ciphers: MICKEY 2.0 & WG-8.
[Report]

Kohnhäuser, Florian and Katzenbeisser, Stefan (2016):
Secure Code Updates for Mesh Networked Commodity Low-End Embedded Devices.
In: 21st European Symposium on Research in Computer Security (ESORICS 2016), pp. 320-338,
Springer, Heraklion, Greece, ISBN 978-3-319-45741-3,
DOI: 10.1007/978-3-319-45741-3_17,
[Conference or Workshop Item]

Kulyk, Oksana and Marky, Karola and Neumann, Stephan and Volkamer, Melanie (2016):
Introducing Proxy Voting to Helios.
In: 11th International Conference on Availability, Reliability and Security - ARES 2016, pp. 98 - 106,
IEEE, Salzburg, DOI: 10.1109/ARES.2016.38,
[Conference or Workshop Item]

Lieb, Patrick and Schmidt, Markus and Wiesmaier, Alexander (2016):
ECDSA and QUARTZ in Comparison with RSA.
[Report]

Mohamed, Mohamed Saied Emam and El Bansarkhani, Rachid and Petzoldt, Albrecht (2016):
MQSAS - A Multivariate Sequential Aggregate Signature Scheme.
In: ISC 2016 - The 19th Information Security Conference, pp. 426-440,
Springer LNCS, Honolulu, Hi, USA, [Conference or Workshop Item]

Reinheimer, Benjamin and Braun, Kristoffer and Volkamer, Melanie (2016):
Entwicklung eines Interfaces zur privacy-friendly Cookie-Einstellung.
In: MuC-Workshop „Usable Security and Privacy“,
Gesellschaft für Informatik e.V., Aachen, Germany, [Conference or Workshop Item]

Roepke, Rene and Thraem, Timo and Wagener, Johannes and Wiesmaier, Alexander (2016):
A Survey on Protocols securing the Internet of Things: DTLS, IPSec and IEEE 802.11i.
[Report]

Trautmann, Nils and Alber, Gernot and Leuchs, Gerd (2016):
Efficient single-photon absorption by a trapped moving atom.
In: Physical Review A, p. 8. American Physical Society, [Article]

Volkamer, Melanie and Renaud, Karen and Gerber, Paul (2016):
Spot the phish by checking the pruned URL.
In: Information and Computer Security, 24 (4), pp. 372-385. DOI: 10.1108/ICS-07-2015-0032,
[Article]

El Bansarkhani, Rachid and El Kaafarani, Ali (2016):
Post-Quantum Attribute-Based Signatures from Lattice Assumptions.
In: Cryptology ePrint Archive, 2016 (823), pp. 1-28. International Association for Cryptologic Research (IACR), [Article]

Anagnostopoulos, Nikolaos Athanasios and Katzenbeisser, Stefan and Rosenstihl, Markus and Schaller, André and Gabmeyer, Sebastian and Arul, Tolga (2016):
Low-temperature data remanence attacks against intrinsic SRAM PUFs.
[Report]

Bindel, Nina and Buchmann, Johannes and Krämer, Juliane (2016):
Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks.
In: FDTC 2016 - Fault Diagnosis and Tolerance in Cryptography,
IEEE Conference Publication, Santa Barbara, CA, USA, [Conference or Workshop Item]

Braun, Johannes and Buchmann, Johannes and Demirel, Denise and Fujiwara, Mikio and Geihs, Matthias and Moriai, Shiho and Sasaki, Masahide and Waseda, Atsushi (2016):
LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper).
In: ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 1-13,
New York, ACM, ASIA CCS '17, Abu Dhabi, UEA, April 2-6, 2017, ISBN 978-1-4503-4944-4,
[Conference or Workshop Item]

Demirel, Denise and Traverso, Giulia and Krenn, Stephan and Loruenser, Thomas (2016):
Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage System.
In: 2016 11th International Conference on Availability, Reliability and Security (ARES), pp. 88-97,
IEEE, Salzburg, Austria, ISBN 978-1-5090-0990-9/16,
DOI: 10.1109/ARES.2016.88,
[Conference or Workshop Item]

Fischlin, Marc and Herzberg, Amir and Noon, Hon Bin and Shulman, Haya (2016):
Obfuscation Combiners.
In: International Cryptology Conference (CRYPTO),
Santa Barbara, CA, USA, [Conference or Workshop Item]

Frömmgen, Alexander and Stohr, Denny and Fornoff, Jan and Effelsberg, Wolfgang and Buchmann, Alejandro (2016):
Capture and Replay: Reproducible Network Experiments in Mininet.
In: SIGCOMM '16 Proceedings of the 2016 ACM SIGCOMM Conference, pp. 621-622,
ACM, Florianopolis, Brazil, ISBN 978-1-4503-4193-6,
DOI: 10.1145/2934872.2959076,
[Conference or Workshop Item]

Klir, Thomas (2016):
Design and Implementation of an Archiving System Providing Long-Term Integrity and Long-Term Confidentiality.
Darmstadt, Technische Universität, [Bachelor Thesis]

McGrew, David and Kampanakis, Panos and Fluhrer, Scott and Gazdag, Stefan-Lukas and Butin, Denis and Buchmann, Johannes (2016):
State Management for Hash-Based Signatures.
In: 3rd International Conference on Research in Security Standardisation (SSR 2016),
Springer LNCS, Gaithersburg, USA, [Conference or Workshop Item]

Schaller, André and Xiong, Wenjie and Gabmeyer, Sebastian and Anagnostopoulos, Nikolaos Athanasios and Saleem, Umair and Katzenbeisser, Stefan and Szefer, Jakub Gierlichs, Benedikt and Poschmann, Axel (eds.) (2016):
Run-time Accessible DRAM PUFs in Commodity Devices.
In: Lecture Notes in Computer Science (LNCS), 9813, In: Cryptographic Hardware and Embedded Systems (CHES 2016), pp. 432-453,
Springer, Santa Barbara, California, USA, ISBN 978-3-662-53140-2,
DOI: 10.1007/978-3-662-53140-2_21,
[Conference or Workshop Item]

Traverso, Giulia and Demirel, Denise and Buchmann, Johannes (2016):
Dynamic and Verifiable Hierarchical Secret Sharing.
In: 9th International Conference on Information Theoretic Security - ICITS 2016,
Springer, Tacoma, Washington, USA, [Conference or Workshop Item]

Weinert, Christian (2016):
Building a Modular Long-Term Archiving System.
Darmstadt, Technische Universität, [Bachelor Thesis]

Habib, Sheikh Mahbub and Vassileva, Julita and Mauw, Sjouke and Mühlhäuser, Max (eds.) (2016):
Trust Management X - 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016 Proceedings.
IFIP AICT 473, Springer, Darmstadt, Germany, [Conference or Workshop Item]

Ambrosin, Moreno and Conti, Mauro and Ibrahim, Ahmad and Neven, Gregory and Sadeghi, Ahmad-Reza and Schunter, Matthias (2016):
POSTER: Toward a Secure and Scalable Attestation.
In: ACM WiSEC 2016,
[Conference or Workshop Item]

Chiesa, Marco and Demmler, Daniel and Canini, Marco and Schapira, Michael and Schneider, Thomas (2016):
Towards Securing Internet eXchange Points Against Curious onlooKers.
In: ACM, IRTF & ISOC Applied Networking Research Workshop (ANRW'16), pp. 32-34,
ACM, DOI: 10.1145/2959424.2959427,
[Conference or Workshop Item]

Conti, Mauro and Crane, Stephen and Frassetto, Tommaso and Homescu, Andrei and Koppen, Georg and Larsen, Per and Liebchen, Christopher and Perry, Mike and Sadeghi, Ahmad-Reza (2016):
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
In: The annual Privacy Enhancing Technologies Symposium (PETS),
[Conference or Workshop Item]

Ermuth, Markus and Pradel, Michael (2016):
Monkey see, monkey do: effective generation of GUI tests with inferred macro events.
In: ISSTA 2016 Proceedings of the 25th International Symposium on Software Testing and Analysis, pp. 82-93,
ACM, Saarbrücken, Germany, ISBN 978-1-4503-4390-9,
DOI: 10.1145/2931037.2931053,
[Conference or Workshop Item]

Feldmann, Anja and Heyder, Philipp and Kreutzer, Michael and Schmid, Stefan and Seifert, Jean-Pierre and Shulman, Haya and Thimmaraju, Kashyap and Waidner, Michael and Sieberg, Jens (2016):
NetCo: Reliable Routing with Unreliable Routers.
In: IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) Workshops,
Toulouse, France, [Conference or Workshop Item]

Gagliardoni, Tommaso and Hülsing, Andreas and Schaffner, Christian (2016):
Semantic Security and Indistinguishability in the Quantum World.
In: LNCS, In: Advances in Cryptology – CRYPTO 2016, pp. 60-89,
Springer, DOI: 10.1007/978-3-662-53015-3_3,
[Conference or Workshop Item]

Gerber, Nina and McDermott, Ronja and Volkamer, Melanie and Vogt, Joachim (2016):
Understanding information security compliance - Why goal setting and rewards might be a bad idea.
10., In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), pp. 145-155,
University of Plymouth, Frankfurt, Germany, [Conference or Workshop Item]

Gutmann, Andreas and Volkamer, Melanie and Renaud, Karen (2016):
Memorable And Secure: How Do You Choose Your PIN?
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), pp. 156-166,
University of Plymouth, Frankfurt, [Conference or Workshop Item]

Horsch, Moritz and Schlipf, Mario and Braun, Johannes and Buchmann, Johannes (2016):
Password Requirements Markup Language.
In: ACISP 2016 - 21st Australasian Conference on Information Security and Privacy,
Melbourne, Australia, [Conference or Workshop Item]

Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Tsudik, Gene and Zeitouni, Shaza (2016):
DARPA: Device Attestation Resilient to Physical Attacks.
In: ACM WiSEC 2016,
[Conference or Workshop Item]

Kunz, Alexandra and Volkamer, Melanie and Stockhardt, Simon and Palberg, Sven and Lottermann, Tessa and Piegert, Eric (2016):
NoPhish: Evaluation of a web application that teaches people being aware of phishing attacks.
In: Jahrestagung der Gesellschaft für Informatik, pp. 509--518,
Lecture Notes in Informatics (LNI), Bonn, Germany, [Conference or Workshop Item]

Mayer, Peter and Neumann, Stephan and Storck, Daniel and Volkamer, Melanie (2016):
Supporting Decision Makers in Choosing Suitable Authentication Schemes.
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), pp. 67-77,
University of Plymouth, Frankfurt, [Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Dessouky, Ghada (2016):
POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs.
In: ACM WiSec 2016,
[Conference or Workshop Item]

Schultes, Tobias and Grau, Markus and Steinmetzer, Daniel and Hollick, Matthias (2016):
Far Away and Yet Nearby - A Framework for Practical Distance Fraud on Proximity Services for Mobile Devices (Demo).
In: ACM Conference on Security and Privacy in Wireless and Mobile Networks 2016 (ACM WiSec'16),
[Conference or Workshop Item]

Schulz, Matthias and Klapper, Patrick and Hollick, Matthias and Tews, Erik (2016):
Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet.
In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec 2016), pp. 43-48,
ACM, ISBN 978-1-4503-4270-4,
DOI: 10.1145/2939918.2940650,
[Conference or Workshop Item]

Schulz, Matthias and Loch, Adrian and Hollick, Matthias (2016):
DEMO: Demonstrating Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems.
In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec 2016), pp. 201-203,
ACM, ISBN 978-1-4503-4270-4,
DOI: 10.1145/2939918.2942418,
[Conference or Workshop Item]

Schulz, Matthias and Wegemer, Daniel and Hollick, Matthias (2016):
DEMO: Using NexMon, the C-based WiFi firmware modification framework.
In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec 2016), pp. 213-215,
ACM, ISBN 978-1-4503-4270-4,
DOI: 10.1145/2939918.2942419,
[Conference or Workshop Item]

Späth, Johannes and Do, Lisa Nguyen Quang and Ali, Karim and Bodden, Eric (2016):
Boomerang: Demand-Driven Flow-Sensitive, Field-Sensitive, and Context-Sensitive Pointer Analysis.
In: 30th European Conference on Object-Oriented Programming (ECOOP 2016), pp. 22:1,
Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Rome, Italy, ISBN 978-3-95977-014-9,
DOI: 10.4230/LIPIcs.ECOOP.2016.22,
[Conference or Workshop Item]

Späth, Johannes and Nguyen, Lisa and Ali, Karim and Bodden, Eric (2016):
Boomerang: Demand-Driven Flow-Sensitive, Field-Sensitive, and Context-Sensitive Pointer Analysis.
In: European Conference on Object-Oriented Programming, p. 25,
Dagstuhl, Rome, Italy, [Conference or Workshop Item]

Wang, Weihang and Zheng, Yunhui and Liu, Peng and Xu, Lei and Zhang, Xiangyu and Eugster, Patrick (2016):
ARROW: automated repair of races on client-side web pages.
In: ISSTA 2016 Proceedings of the 25th International Symposium on Software Testing and Analysis, pp. 201-212,
ACM, Saarbrücken, Germany, ISBN 978-1-4503-4390-9,
DOI: 10.1145/2931037.2931052,
[Conference or Workshop Item]

Yu, Tingting and Pradel, Michael (2016):
SyncProf: detecting, localizing, and optimizing synchronization bottlenecks.
In: ISSTA 2016 Proceedings of the 25th International Symposium on Software Testing and Analysis, pp. 389-400,
ACM, Saarbrücken, Germany, ISBN 978-1-4503-4390-9,
DOI: 10.1145/2931037.2931070,
[Conference or Workshop Item]

Zheng, Yao and Schulz, Matthias and Lou, Wenjing and Hou, Thomas and Hollick, Matthias (2016):
Profiling the Strength of Physical-Layer Security: A Study in Orthogonal Blinding.
In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec 2016), pp. 21-30,
ACM, ISBN 978-1-4503-4270-4,
DOI: 10.1145/2939918.2939933,
[Conference or Workshop Item]

Abera, Tigist and Asokan, N. and Davi, Lucas and Koushanfar, Farinaz and Praverd, Andrew and Tsudik, Gene and Sadeghi, Ahmad-Reza (2016):
Things, Trouble, Trust: On Building Trust in IoT Systems.
In: 53rd Design Automation Conference (DAC),
[Conference or Workshop Item]

Borgwart, Andreas and Shulman, Haya and Waidner, Michael (2016):
Towards Automated Measurements of Internets Naming Infrastructure.
In: International Conference on Software Science, Technology and Engineering (SWSTE),
Beer Sheva, Israel, [Conference or Workshop Item]

Brasser, Ferdinand and Ganapathy, Vinod and Iftode, Liviu and Kim, Daeyoung and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2016):
Regulating ARM TrustZone Devices in Restricted Spaces.
In: 14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys),
[Conference or Workshop Item]

Dix, Isabella (2016):
Implementation of a Reputation System for CA Trust Management.
Darmstadt, Technische Universität, [Bachelor Thesis]

Herzberg, Amir and Shulman, Haya and Waidner, Michael (2016):
Survey of Software Protection with Minimal Hardware.
In: International Conference on Software Science, Technology and Engineering (SWSTE),
Beer Sheva, Israel, [Conference or Workshop Item]

Kulyk, Oksana and Neumann, Stephan and Marky, Karola and Budurushi, Jurlind and Volkamer, Melanie (2016):
Coercion-resistant Proxy Voting.
In: 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, pp. 3-16,
Springer, Ghent, Belgium, [Conference or Workshop Item]

Lettner, Julian and Kollenda, Benjamin and Homescu, Andrei and Larsen, Per and Schuster, Felix and Davi, Lucas and Sadeghi, Ahmad-Reza and Holz, Thorsten and Franz, Michael (2016):
Subversive-C: Abusing and Protecting Dynamic Message Dispatch.
In: USENIX Annual Technical Conference (ATC),
[Conference or Workshop Item]

Mariano, Artur and Correia, Fabio and Bischof, Christian (2016):
A vectorized, cache efficient LLL implementation.
In: VECPAR 2016 - 12th International Meeting on High Performance Computing for Computational Science,
Porto, Portugal, [Conference or Workshop Item]

Neumann, Stephan and Volkamer, Melanie and Budurushi, Jurlind and Prandini, Marco (2016):
SecIVo: a quantitative security evaluation framework for internet voting schemes.
In: >Annals of Telecommunications, pp. 1-16. DOI: 10.1007/s12243-016-0520-0,
[Article]

Roth, Johannes (2016):
Analyse von TLS Bibliotheken basierend auf Fuzz Testing.
Darmstadt, Technische Universität, [Bachelor Thesis]

Schabhüser, Lucas and Demirel, Denise and Buchmann, Johannes (2016):
An Unconditionally Hiding Auditing Procedure for Multi-Party Computations.
In: IACR - Cryptology ePrint Archive, [Article]

Songhori, Ebrahim and Zeitouni, Shaza and Dessouky, Ghada and Schneider, Thomas and Sadeghi, Ahmad-Reza and Koushanfar, Farinaz (2016):
GarbledCPU: A MIPS Processor for Secure Computation in Hardware.
In: 53. Annual Design Automation Conference (DAC'16), pp. 73:1-73:6,
ACM, DOI: 10.1145/2897937.2898027,
[Conference or Workshop Item]

Stockhardt, Simon and Reinheimer, Benjamin and Volkamer, Melanie and Mayer, Peter and Kunz, Alexandra and Rack, Philipp and Lehmann, Daniel (2016):
Teaching Phishing-Security: Which Way is Best?
In: 31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), pp. 135-149,
Springer, Ghent, Belgium, [Conference or Workshop Item]

Sullivan, Dean and Arias, Orlando and Davi, Lucas and Larsen, Per and Sadeghi, Ahmad-Reza and Jin, Yier (2016):
Strategy Without Tactics: Policy-Agnostic Hardware-Enhanced Control-Flow Integrity.
In: 53rd Design Automation Conference (DAC),
[Conference or Workshop Item]

Traverso, Giulia and Demirel, Denise and Buchmann, Johannes (2016):
Homomorphic Signature Schemes - A survey.
In: SpringerBriefs in Computer Science, Springer, ISBN Softcover 978-3-319-32114-1 - ebook 978-3-319-32115-8,
DOI: 10.1007/978-3-319-32115-8,
[Book]

Volkamer, Melanie and Renaud, Karen and Reinheimer, Benjamin (2016):
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn.
In: 31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), pp. 161-175,
Springer, Ghent, Belgium, [Conference or Workshop Item]

Arzt, Steven and Bodden, Eric (2016):
StubDroid: automatic inference of precise data-flow summaries for the android framework.
In: ICSE '16 Proceedings of the 38th International Conference on Software Engineering, pp. 725-735,
ACM, ISBN 978-1-4503-3900-1,
DOI: 10.1145/2884781.2884816,
[Conference or Workshop Item]

Bernhard, David and Kulyk, Oksana and Volkamer, Melanie (2016):
Security Proofs for Participation Privacy and Stronger Verifiability for Helios.
Darmstadt, CRISP, DOI: 10.5445/IR/1000081968,
[Report]

Buchmann, Johannes and Büscher, Niklas and Katzenbeisser, Stefan and Krämer, Juliane and Micciancio, Daniele and Siim, Sander and van Vredendaal, Christine and Walter, Michael and Göpfert, Florian (2016):
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge.
In: ASIAPKC 16 - 3rd ACM International Workshop on ASIA Public-Key Cryptography,
ACM, Xi'an, China, [Conference or Workshop Item]

Buchmann, Johannes and Göpfert, Florian and Güneysu, Tim and Oder, Tobias and Pöppelmann, Thomas (2016):
High-Performance and Lightweight Lattice-Based Public-Key Encryption.
In: IoTPTS '16 - 2nd ACM International Workshop on IoT Privacy, Trust, and Security,
ACM, Xi'an, China, [Conference or Workshop Item]

Budurushi, Jurlind and Hilt, Annika and Volkamer, Melanie (2016):
"E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern.
In: Datenschutz und Datensicherheit - DuD, 40 (5), pp. 300-304. Springer Fachmedien Wiesbaden, DOI: 10.1007/s11623-016-0600-3,
[Article]

Fischlin, Marc and Günther, Felix and Schmidt, Benedikt and Warinschi, Bogdan (2016):
Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3.
In: 37th IEEE Symposium on Security and Privacy (S&P 2016),
IEEE, San Jose, California, USA, [Conference or Workshop Item]

Ghiglieri, Marco and Waidner, Michael (2016):
HbbTV Security and Privacy: Issues and Challenges.
In: >IEEE Security & Privacy, 14 (3), pp. pp. 61-67. [Article]

Karuppayah, Shankar and Vasilomanolakis, Emmanouil and Haas, Steffen and Fischer, Mathias and Mühlhäuser, Max (2016):
BoobyTrap: On Autonomously Detecting and Characterizing Crawlers in P2P Botnets.
In: IEEE ICC Communication and Information Systems Security Symposium, pp. 1-7,
IEEE, Kuala Lumpur, Malaysia, ISBN 978-1-4799-6664-6,
DOI: 10.1109/ICC.2016.7510885,
[Conference or Workshop Item]

Kiss, Ágnes and Schneider, Thomas (2016):
Valiant's Universal Circuit is Practical.
In: 35. Advances in Cryptology -- EUROCRYPT 2016, pp. 699-728,
Springer, DOI: 10.1007/978-3-662-49890-3_27,
[Conference or Workshop Item]

Liu, Hui and Liu, Qiurong and Staicu, Cristian-Alexandru and Pradel, Michael and Luo, Yue (2016):
Nomen est Omen: Exploring and Exploiting Similarities between Argument and Parameter Names.
In: ICSE '16 Proceedings of the 38th International Conference on Software Engineering, pp. 1063-1073,
ACM, Austin, Texas, ISBN 978-1-4503-3900-1,
DOI: 10.1145/2884781.2884841,
[Conference or Workshop Item]

Nadi, Sarah and Krüger, Stefan and Mezini, Mira and Bodden, Eric (2016):
"Jumping Through Hoops" Why do Java Developers Struggle With Cryptography APIs?
In: International Conference on Software Engineering,
ACM, Austin, Texas, USA, [Conference or Workshop Item]

Nadi, Sarah and Krüger, Stefan and Mezini, Mira and Bodden, Eric (2016):
Jumping through hoops: why do Java developers struggle with cryptography APIs?
In: ICSE '16 Proceedings of the 38th International Conference on Software Engineering, pp. 935-946,
ACM, Austin, Texas, ISBN 978-1-4503-3900-1,
DOI: 10.1145/2884781.2884790,
[Conference or Workshop Item]

Salvaneschi, Guido and Mezini, Mira (2016):
Debugging for reactive programming.
In: ICSE '16 Proceedings of the 38th International Conference on Software Engineering, pp. 796-807,
ACM, Austin, TX, ISBN 978-1-4503-3900-1,
DOI: 10.1145/2884781.2884815,
[Conference or Workshop Item]

Schmitz, Martin and Leister, Andreas and Dezfuli, Niloofar and Riemann, Jan and Müller, Florian and Mühlhäuser, Max (2016):
Liquido: Embedding Liquids into 3D Printed Objects to Sense Tilting and Motion.
In: CHI EA'16, In: Proceedings of the 34rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, pp. 2688-2696,
ACM, San Jose, CA, USA, ISBN 978-1-4503-4082-3,
DOI: 10.1145/2851581.2892275,
[Conference or Workshop Item]

Schochlow, Verena and Neumann, Stephan and Braun, Kristoffer and Volkamer, Melanie (2016):
Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung.
5/2016, In: Datenschutz und Datensicherheit, pp. 295-299,
DOI: 10.1007/s11623-016-0599-5,
[Conference or Workshop Item]

Selakovic, Marija and Pradel, Michael (2016):
Performance issues and optimizations in JavaScript: an empirical study.
In: ICSE '16 Proceedings of the 38th International Conference on Software Engineering, pp. 61-72,
ACM Association for Computing Machinery, Austin, Texas, ISBN 978-1-4503-3900-1,
DOI: 10.1145/2884781.2884829,
[Conference or Workshop Item]

Taha, Ahmed and Metzler, Patrick and Trapero, Ruben and Luna, Jesus and Suri, Neeraj (2016):
Identifying and Utilizing Dependencies Across Cloud Security Services.
In: ASIA CCS '16 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 329-340,
ACM, Xi'an, China, ISBN 978-1-4503-4233-9,
DOI: 10.1145/2897845.2897911,
[Conference or Workshop Item]

Akleylek, Sedat and Bindel, Nina and Buchmann, Johannes and Krämer, Juliane and Marson, Giorgia Azzurra (2016):
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation.
In: International Conference on Cryptology AFRICACRYPT 2016, p. 10,
Springer, Fes, Morocco, [Conference or Workshop Item]

Alber, Gernot and Trautmann, Nils (2016):
Cooperative quantum electrodynamical processes in an ellipsoidal cavity.
In: Journal of Physics: Conference Series, [Article]

Buchmann, Johannes and Demirel, Denise and Schabhüser, Lucas (2016):
Privately and Publicly Verifiable Computing Techniques.
ISBN 978-3-319-53797-9,
[Book]

Buchmann, Johannes and Göpfert, Florian and Player, Rachel and Wunderer, Thomas (2016):
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack.
In: International Conference on Cryptology AFRICACRYPT 2016,
Springer, Fes, Morocco, [Conference or Workshop Item]

Budurushi, Jurlind and Reanaud, Karen and Volkamer, Melanie and Woide, Marcel (2016):
An Investigation into the Usability of Electronic Voting Systems for Complex Elections.
In: Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, 71 (7), pp. 309–322. Springer Paris, DOI: 10.1007/s12243-016-0510-2,
[Article]

Classen, Jiska (2016):
Software Defined Radio – Open Source Wireless Hacking.
[Other]

Marky, Karola and Gutmann, Andreas and Rack, Philipp and Volkamer, Melanie (2016):
Privacy Friendly Apps-Making Developers Aware of Privacy Violations.
1575, In: 1st International Workshop on Innovations in Mobile Privacy and Security, pp. 46-48,
CEUR Workshop Proceedings, [Conference or Workshop Item]

Mayer, Christoph (2016):
Implementing a Toolkit for Ring-LWE Cryptography.
TU Darmstadt, [Master Thesis]

Müller, Florian and Günther, Sebastian and Dezfuli, Niloofar and Khalilbeigi, Mohammadreza and Mühlhäuser, Max (2016):
ProxiWatch: Enhancing Smartwatch Interaction through Proximity-based Hand Input.
In: CHI EA '16: Proceedings of the 34rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems,
ACM New York, NY, USA, DOI: 10.1145/2851581.2892450,
[Conference or Workshop Item]

Rauzy, Pablo and Kiss, Ágnes and Krämer, Juliane and Seifert, Jean-Pierre (2016):
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT.
In: Constructive Side-Channel Analysis and Secure Design - 7. International Workshop (COSADE'16), pp. 111-129,
Springer, DOI: 10.1007/978-3-319-43283-0_7,
[Conference or Workshop Item]

Shulman, Haya and Waidner, Michael (2016):
Is the Internet Ready for DNSSEC: Evaluating Pitfalls in the Naming Infrastructure.
In: In Traffic Monitoring and Analysis (TMA),
Louvain La Neuve, Belgium, [Conference or Workshop Item]

Steinmetzer, Daniel and Classen, Jiska and Hollick, Matthias (2016):
Exploring Millimeter-Wave Network Scenarios with Ray-tracing based Simulations in mmTrace.
In: IEEE Infocom 2016 Poster Presentation (Infocom'16 Posters),
San Francisco, [Conference or Workshop Item]

Steinmetzer, Daniel and Classen, Jiska and Hollick, Matthias (2016):
mmTrace: Modeling Millimeter-wave Indoor Propagation with Image-based Ray-tracing.
In: Millimeter-wave Networking Workshop (mmNet 2016), [Article]

Strenzke, Falko (2016):
An Analysis of OpenSSL's Random Number Generator.
In: Lecture Notes in Computer Science 9665, In: Advances in Cryptology – EUROCRYPT 2016. 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 644-669,
Springer, Vienna, Austria, ISBN 978-3-662-49889-7,
DOI: 10.1007/978-3-662-49890-3 25,
[Conference or Workshop Item]

Trautmann, Nils and Hauke, Philipp (2016):
Quantum simulation of the dynamical Casimir effect with trapped ions.
In: New Journal of Physics, (18), pp. 043029. [Article]

Bernhard, David and Fischlin, Marc and Warinschi, Bogdan (2016):
On the Hardness of Proving CCA-Security of Signed ElGamal.
In: LNCS, In: Public-Key Cryptography - PKC 2016, p. 24,
Springer, Taipei, Taiwan, ISBN 978-3-662-49384-7,
DOI: 10.1007/978-3-662-49384-7_3,
[Conference or Workshop Item]

Gutmann, Andreas and Renaud, Karen and Maguire, Joseph and Mayer, Peter and Volkamer, Melanie and Matsuura, Kanta and Müller-Quade, Jörn (2016):
ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology.
In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 357-371,
IEEE, Saarbrucken, DOI: 10.1109/EuroSP.2016.35,
[Conference or Workshop Item]

Kogan, Kirill and Menikkumbura, Danushka and Petri, Gustavo and Noh, Youngtae and Nikolenko, Sergey I. and Eugster, Patrick (2016):
BASEL (Buffer mAnagement SpEcification Language).
In: ANCS '16 Proceedings of the 2016 Symposium on Architectures for Networking and Communications Systems, pp. 69-74,
ACM, Santa Clara, CA, ISBN 978-1-4503-4183-7,
DOI: 10.1145/2881025.2881027,
[Conference or Workshop Item]

McLaughlin, Stephen and Konstantinou, Charalambos and Wang, Xueyang and Davi, Lucas and Sadeghi, Ahmad-Reza and Maniatakos, Michail and Karri, Ramesh (2016):
The Cybersecurity Landscape in Industrial Control Systems.
In: Proceedings of the IEEE, 104 (5), pp. 1039-1057. DOI: 10.1109/JPROC.2015.2512235,
[Article]

Waidner, Michael and Kasper, Michael (2016):
Security in Industrie 4.0 - Challenges and Solutions for the Fourth Industrial Revolution.
In: DATE 2016 (Design, Automation and Test in Europe),
Dresden, Germany, [Conference or Workshop Item]

Zeitouni, Shaza and Oren, Yossef and Wachsmann, Christian and Koeberl, Patrick and Sadeghi, Ahmad-Reza (2016):
Remanence Decay Side-Channel: The PUF Case.
In: IEEE Transactions on Information Forensics and Security, 99, DOI: TIFS.2015.2512534,
[Article]

Braden, Kjell and Crane, Stephen and Davi, Lucas and Franz, Michael and Larsen, Per and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2016):
Leakage-Resilient Layout Randomization for Mobile Devices.
In: 23rd Annual Network & Distributed System Security Symposium (NDSS),
[Conference or Workshop Item]

Correia, Fabio and Mariano, Artur and Proença, Alberto and Bischof, Christian and Agrell, Erik (2016):
Parallel Improved Schnorr-Euchner Enumeration SE++ for the CVP and SVP.
In: PDP 2016 - 24th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, pp. 596-603,
Heraklion, Crete, Greece, [Conference or Workshop Item]

Degabriele, Jean Paul and Fehr, Victoria and Fischlin, Marc and Gagliardoni, Tommaso and Günther, Felix and Marson, Giorgia Azzurra and Mittelbach, Arno and Paterson, Kenneth G. (2016):
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol.
In: International Journal of Information Security, 15 (6), pp. 637-657. Springer, ISSN 1615-5270,
[Article]

Erbenich, Vanessa (2016):
On the Efficiency of Lattice-Based Encryption.
Darmstadt, Technische Universität, [Bachelor Thesis]

Ghiglieri, Marco and Hansen, Marit and Nebel, Maxi and Pörschke, Julia Victoria and Fhom, Hervais Simo (2016):
Smart-TV und Privatheit - Bedrohungspotenziale und Handlungsmöglichkeiten.
[Report]

Kulyk, Oksana and Gerber, Paul and Reinheimer, Benjamin and Renaud, Karen and Volkamer, Melanie (2016):
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do.
In: NDSS Workshop on Usable Security (USEC),
Internet Society., San Diego, California, ISBN 1891562428,
[Conference or Workshop Item]

Kulyk, Oksana and Volkamer, Melanie (2016):
Efficiency Comparison of Various Approaches in E-Voting Protocols.
In: Financial Cryptography and Data Security. FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Revised Selected Papers, pp. 209-233,
Springer, Barbados, [Conference or Workshop Item]

Mariano, Artur and Bischof, Christian (2016):
Enhancing the scalability, tractability and memory usage of HashSieve on multi-core CPUs.
In: PDP2016,
Conference Publishing Services (CPS), Heraklion Crete, Greece, [Conference or Workshop Item]

Rasthofer, Siegfried and Arzt, Steven and Miltenberger, Marc and Bodden, Eric (2016):
Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques.
In: Network and Distributed System Security Symposium 2016, pp. 1-15,
Internet Society, San Diego, CA, ISBN 1-891562-41-X,
DOI: 10.14722/ndss.2016.23066,
[Conference or Workshop Item]

Rieß, Susanne (2016):
An Analysis of Lattice-Based Key Exchange Protocols.
TU Darmstadt, [Master Thesis]

Dowling, Benjamin and Fischlin, Marc and Günther, Felix and Stebila, Douglas (2016):
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol.
In: Cryptology ePrint Archive, 2016 (81), pp. 1-33. International Association for Cryptologic Research (IACR), [Article]

Akleylek, Sedat and Dagdelen, Özgür and Tok, Zaliha Yüce (2016):
On the Efficiency of Polynomial Multiplication for Lattice-Based Cryptography on GPUs Using CUDA.
In: LNCS, 9540, In: Cryptography and Information Security in the Balkans, pp. 155-168,
Springer, Koper, Slovenia, [Conference or Workshop Item]

Appel, Michael and Pauer, Christof and Wiesmaier, Alexander (2016):
Sicherheitsaspekte und Vergleich der Blockchifren LED und TEA.
[Report]

Brendel, Jacqueline (2016):
Efficient Proactive Secret Sharing.
Darmstadt, Technische Universität, [Master Thesis]

Daubert, Jörg and Grube, Tim and Fischer, Mathias and Mühlhäuser, Max (2016):
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks.
In: Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC), pp. 738-744,
IEEE, Las Vegas, USA, ISBN 978-1-4673-9292-1,
DOI: 10.1109/CCNC.2016.7444871,
[Conference or Workshop Item]

Heuser, Stephan and Negro, Marco and Pendyala, Praveen Kumar and Sadeghi, Ahmad-Reza (2016):
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
In: Financial Crypto 2016,
[Conference or Workshop Item]

Heuser, Stephan and Negro, Marco and Pendyala, Praveen Kumar and Sadeghi, Ahmad-Reza (2016):
Technical Report: DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
[Report]

Nadi, Sarah and Krüger, Stefan (2016):
Variability Modeling of Cryptographic Components (Clafer Experience Report).
In: Proceedings of the Tenth International Workshop on Variability Modelling of Software-intensive Systems, Tenth International Workshop on Variability Modelling of Software-intensive Systems, Salvador, Brazil, 27. - 29.1.2016, [Conference or Workshop Item]

Strohbach, Martin and Daubert, Jörg and Ravkin, Herman and Lischka, Mario Curry, Edward and Wahlster, Wolfgang (eds.) (2016):
Big Data Storage.
In: New Horizons for a Data-Driven Economy - A Roadmap for Usage and Exploitation of Big Data in Europe, pp. 119-141, Springer, ISBN 978-3-319-21568-6,
DOI: 10.1007/978-3-319-21569-3,
[Book Section]

Alagic, Gorjan and Broadbent, Anne and Fefferman, Bill and Gagliardoni, Tommaso and Schaffner, Christian and Jules, Michael St. (2016):
Computational Security of Quantum Encryption.
In: Lecture Notes in Computer Science - ICITS, 10015, In: Information Theoretic Security : 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, pp. 47-71, Cham, Springer, ISBN 978-3-319-49174-5,
[Book Section]

Brasser, Ferdinand and Rasmussen, Kasper and Sadeghi, Ahmad-Reza and Tsudik, Gene (2016):
Remote Attestation for Low-End Embedded Devices: the Prover's Perspective.
In: DAC '16, In: Proceedings of the 53nd Annual Design Automation Conference,
ACM, [Conference or Workshop Item]

Cam-Winget, Nancy and Sadeghi, Ahmad-Reza and Jin, Yier (2016):
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected.
In: 53rd Design Automation Conference (DAC),
[Conference or Workshop Item]

Daubert, Jörg (2016):
Anonymous Publish-Subscribe Overlays.
Darmstadt, Technische Universität Darmstadt,
[Ph.D. Thesis]

Fleisch, Gilbert (2016):
Towards policy checks on passwords via fully homomorphic encryption.
Darmstadt, Technische Universität, [Master Thesis]

Göpfert, Florian (2016):
Securely Instantiating Cryptographic Schemes Based on the Learning with Errors Assumption.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Miettinen, Markus and Huang, Jialin and Nguyen, Thien Duc and Asokan, N. and Sadeghi, Ahmad-Reza (2016):
Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments.
In: Proc. 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'16),
Darmstadt, Germany, [Conference or Workshop Item]

Reif, Michael and Eichberg, Michael and Hermann, Ben and Lerch, Johannes and Mezini, Mira (2016):
Call graph construction for Java libraries.
pp. 474-486, Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, DOI: 10.1145/2950290.2950312,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Armknecht, Frederik (2016):
Towards a Unified Security Model for Physically Unclonable Functions.
In: CT-RSA - Cryptographers' Track at the RSA Conference,
[Conference or Workshop Item]

Trautmann, Nils and Alber, Gernot (2016):
Dissipation-enabled efficient excitation transfer from a single photon to a single quantum emitter.
In: Physical Review A, p. 9. DOI: 10.1103/PhysRevA.93.053807,
[Article]

Vigil, Martín and Demirel, Denise and Habib, Sheikh Mahbub and Hauke, Sascha and Buchmann, Johannes and Mühlhäuser, Max (2016):
LoT: a Reputation-based Trust System for Long-term Archiving.
In: SECURWARE 2016, pp. 262-270,
Thinkmind Digital Library, Nice, France, ISBN 978-1-61208-493-0,
[Conference or Workshop Item]

2015

Bagci, Ibrahim Ethem and Roedig, Utz and Martinovic, Ivan and Schulz, Matthias and Hollick, Matthias (2015):
IOT: Using Channel State Information for Tamper Detection in the Internet of Things.
In: ACSAC 2015, In: Using Channel State Information for Tamper Detection in the Internet of Things, pp. 131-140,
ACM, Los Angeles, CA, USA, ISBN 978-1-4503-3682-6,
DOI: 10.1145/2818000.2818028,
[Conference or Workshop Item]

Borgwart, Andreas and Boukoros, Spyros and Shulman, Haya and Waidner, Michael and van Royeen, Carel (2015):
Detection and Forensics of Domains Hijacking.
In: IEEE Global Communications Conference,
IEEE, San Diego, CA, USA, [Conference or Workshop Item]

Classen, Jiska (2015):
Building and Breaking Wireless Security.
[Other]

Davi, Lucas and Sadeghi, Ahmad-Reza (2015):
Building Secure Defenses Against Code-Reuse Attacks.
Springer International Publishing, ISBN 978-3-319-25544-6,
DOI: 10.1007/978-3-319-25546-0,
[Book]

Frydrych, Holger and Marthaler, Michael and Alber, Gernot (2015):
Pulse-controlled quantum gate sequences on a strongly coupled qubit chain.
In: Phys. Rev. A, American Physical Society, (92), p. 10. [Article]

Larsen, Per and Brunthaler, Stefan and Davi, Lucas and Sadeghi, Ahmad-Reza and Franz, Michael (2015):
Automated Software Diversity.
In: Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool, DOI: 10.2200/S00686ED1V01Y201512SPT014,
[Book]

Mayer, Peter and Volkamer, Melanie (2015):
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing.
In: ACSAC 2015, In: Proceedings of the 31st Annual Computer Security Applications Conference, pp. 431-440,
ACM, Los Angeles, CA, USA, ISBN 978-1-4503-3682-6,
DOI: 10.1145/2818000.2818043,
[Conference or Workshop Item]

Pellegrino, Giancarlo and Tschürtz, Constantin and Bodden, Eric and Rossow, Christian Bos, Herbert and Monrose, Fabian and Blanc, Gregory (eds.) (2015):
jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications.
In: Lecture Notes in Computer Science 9404, In: Research in Attacks, Intrusions, and Defenses. 18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015. Proceedings., pp. 295-316,
Springer Cham, Kyoto, Japan, ISBN 978-3-319-26361-8,
DOI: 10.1007/978-3-319-26362-5,
[Conference or Workshop Item]

Schlipf, Mario (2015):
Password Policy Crawler.
Darmstadt, Technische Universität, [Master Thesis]

Wolf, Peter and Barrat, Jordi and Bolo, Eden and Bravo, Alejandro and Krimmer, Robert and Neumann, Stephan and Parreño, Al and Schürmann, Carsten and Volkamer, Melanie (2015):
Certification of ICTs in Elections.
1, nternational Institute for Democracy and Electoral Assistance, [Book]

Coudert, Fanny and Butin, Denis and Métayer, Daniel Le (2015):
Body-worn Cameras for Police Accountability: Opportunities and Risks.
In: Computer Law & Security Review (CLSR), 31 (6), pp. 749-762. [Article]

Dagdelen, Özgür and Gajek, Sebastian and Göpfert, Florian (2015):
Learning With Errors in the Exponent.
In: LNCS, In: 18th International Conference on information Security and Cryptology (ICISC) 2015,
Springer, Seoul, Korea, [Conference or Workshop Item]

Krämer, Juliane and Kiss, Ágnes and Stüber, Anke (2015):
On the Optimality of Differential Fault Analyses on CLEFIA.
In: 6. International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS'15), pp. 181-196,
Springer, DOI: 10.1007/978-3-319-32859-1_15,
[Conference or Workshop Item]

Lerch, Johannes and Späth, Johannes and Bodden, Eric and Mezini, Mira (2015):
Access-Path Abstraction: Scaling Field-Sensitive Data-Flow Analysis with Unbounded Access Paths.
In: Proceedings of the 2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE), pp. 619-629,
Washington, DC, USA, IEEE Computer Society, Automated Software Engineering (ASE), 2015 30th IEEE/ACM International Conference on, Lincoln, Nebraska, USA, 9.-13. November 2015, [Conference or Workshop Item]

Petzoldt, Albrecht and Cheng, Ming-Shing and Yang, Bo-Yin and Chengdong, Tao and Ding, Jintai (2015):
Design Principles for HFEv- based Signature Schemes.
In: LNCS, In: ASIACRYPT 2015 - Part I - 21st International Conference on the Theory and Application of Cryptology and Information Security, pp. 1-24,
Springer, Auckland, New Zealand, [Conference or Workshop Item]

Volk, Florian and Trüschler, Nadine and Mühlhäuser, Max (2015):
Rating Decomposition with Conjoint Analysis and Machine Learning.
In: CENTRIC 2015: The Eighth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, pp. 36-41,
IARIA, Barcelona, Spain, ISBN 978-1-61208-440-4,
[Conference or Workshop Item]

Asokan, N. and Brasser, Ferdinand and Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Schunter, Matthias and Tsudik, Gene and Wachsmann, Christian (2015):
SEDA: Scalable Embedded Device Attestation.
In: 22nd ACM Conference on Computer and Communications Security (CCS),
[Conference or Workshop Item]

Conti, Mauro and Crane, Stephen and Davi, Lucas and Franz, Michael and Larsen, Per and Liebchen, Christopher and Negro, Marco and Qunaibit, Mohaned and Sadeghi, Ahmad-Reza (2015):
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
In: 22nd ACM Conference on Computer and Communications Security (CCS),
[Conference or Workshop Item]

Crane, Stephen and Volckaert, Stijn and Schuster, Felix and Liebchen, Christopher and Larsen, Per and Davi, Lucas and Sadeghi, Ahmad-Reza and Holz, Thorsten and Sutter, Bjorn De and Franz, Michael (2015):
It's a TRAP: Table Randomization and Protection against Function Reuse Attacks.
In: 22nd ACM Conference on Computer and Communications Security (CCS),
[Conference or Workshop Item]

Della Toffola, Luca and Pradel, Michael and Gross, Thomas R. Andy, Gill (ed.) (2015):
Performance problems you can fix: a dynamic analysis of memoization opportunities.
In: OOPSLA 2015, 50, In: Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications, pp. 607-622,
ACM, Pittsburgh, PA, USA, ISBN 978-1-4503-3689-5,
DOI: 10.1145/2814270.2814290,
[Conference or Workshop Item]

Demmler, Daniel and Dessouky, Ghada and Koushanfar, Farinaz and Sadeghi, Ahmad-Reza and Schneider, Thomas and Zeitouni, Shaza (2015):
Automated Synthesis of Optimized Circuits for Secure Computation.
In: 22. ACM Conference on Computer and Communications Security (CCS'15), pp. 1504-1517,
ACM, DOI: 10.1145/2810103.2813678,
[Conference or Workshop Item]

Dowling, Benjamin and Fischlin, Marc and Günther, Felix and Stebila, Douglas (2015):
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates.
In: 22nd ACM Conference on Computer and Communications Security (CCS 2015), pp. 1197-1210,
ACM, Denver, Colorado, USA, [Conference or Workshop Item]

Fischlin, Marc and Mazaheri, Sogol (2015):
Notions of Deniable Message Authentication.
In: WPES '15, In: Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, pp. 55-64,
ACM, Denver, Colorado, USA, ISBN 978-1-4503-3820-2,
DOI: 10.1145/2808138.2808143,
[Conference or Workshop Item]

Neumann, Stephan and Volkamer, Melanie and Strube, Moritz and Jung, Wolfgang and Brelle, Achim (2015):
Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem.
In: Datenschutz und Datensicherheit, 2015 (11), pp. 747-752. DOI: 10.1007/s11623-015-0512-7,
[Article]

Novotny, Jaroslav and Alber, Gernot and Jex, Igor (2015):
Universality in random quantum networks.
In: Physical Review A, 92 (062335), DOI: 10.1103/PhysRevA.92.062335,
[Article]

Saissi, Habib and Bokor, Peter and Suri, Neeraj (2015):
PBMC: Symbolic Slicing for the Verification of Concurrent Programs.
In: Proceedings of the Symposium on Automated Technology for Verification and Analysis, ATVA 2015,
[Conference or Workshop Item]

Schaller, André and Skoric, Boris and Katzenbeisser, Stefan (2015):
On the Systematic Drift of Physically Unclonable Functions Due to Aging.
In: 5th International Workshop on Trustworthy Embedded Devices (TrustED 2015), pp. 15-20,
Denver, Colorado, USA, ISBN 978-1-4503-3828-8,
DOI: 10.1145/2808414.2808417,
[Conference or Workshop Item]

Shulman, Haya and Waidner, Michael (2015):
DNSSEC for Cyber Forensics.
In: EURASIP J. Information Security, (16), p. 14. [Article]

Ta, Vinh-Thong and Butin, Denis and Métayer, Daniel Le (2015):
Formal Accountability for Biometric Surveillance: A Case Study.
In: LNCS, In: Annual Privacy Forum (APF2015),
Springer, Luxembourg, [Conference or Workshop Item]

Böck, Leon and Karuppayah, Shankar and Grube, Tim and Fischer, Mathias and Mühlhäuser, Max (2015):
Hide And Seek: Detecting Sensors in P2P Botnets.
In: Communications and Network Security (CNS), 2015 IEEE Conference on, pp. 731-732,
IEEE, Florence, Italy, DOI: 10.1109/CNS.2015.7346908,
[Conference or Workshop Item]

Classen, Jiska and Chen, Joe and Steinmetzer, Daniel and Hollick, Matthias and Knightly, Edward (2015):
The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications.
In: 2nd ACM Workshop on Visible Light Communication Systems, p. 6,
Paris, France, [Conference or Workshop Item]

Classen, Jiska and Schulz, Matthias and Hollick, Matthias (2015):
Practical Covert Channels for WiFi Systems.
In: IEEE Conference on Communications and Network Security (CNS), p. 8,
Florence, Italy, [Conference or Workshop Item]

Funke, Sebastian and Daubert, Jörg and Wiesmaier, Alexander and Kikiras, Panayotis and Mühlhäuser, Max (2015):
End-2-End Privacy Architecture for IoT.
IEEE Conference on Communications and Network Security (CNS), Florence, Italy, 28.-30. Sept. 2015, ISBN 978-1-4673-7876-5,
DOI: 10.1109/CNS.2015.7346895,
[Conference or Workshop Item]

Germanus, Daniel and Ismail, Hatem and Suri, Neeraj (2015):
PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation.
In: InProceedings of the 34th International Symposium on Reliable Distributed Systems, 28.09.2015-01.10.2015, Montreal,
[Conference or Workshop Item]

Kulyk, Oksana and Teague, Vanessa and Volkamer, Melanie Haenni, Rolf and Koenig, Reto and Wikström, Douglas (eds.) (2015):
Extending Helios Towards Private Eligibility Verifiability.
In: E-Voting and Identity: 5th International Conference - VoteID 2015, pp. 57-73,
Springer, Bern, Switzerland, [Conference or Workshop Item]

Mantel, Heiko and Starostin, Artem (2015):
Transforming Out Timing Leaks, More or Less.
In: LNCS, In: Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS 2015) - Part I, p. 20,
Springer, Vienna, Austria, [Conference or Workshop Item]

Mariano, Artur and Laarhoven, Thijs and Bischof, Christian (2015):
Parallel (Probable) Lock-Free Hash Sieve: A Practical Sieving Algorithm for the SVP.
pp. 590-599, IEEE, 44th International Conference on Parallel Processing (ICPP 2015), Beijing, China, 01.-04.09., ISSN 01903918,
DOI: 10.1109/ICPP.2015.68,
[Conference or Workshop Item]

Piper, Thorsten and Suri, Neeraj and Fuhrman, Thomas (2015):
On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety Mechanisms.
In: InProceedings of the 11th European Dependable Computing Conference ,07.09.2015-11.09.2015, Paris,
[Conference or Workshop Item]

Shulman, Haya and Waidner, Michael (2015):
Towards Security of Internet's Naming Infrastructure.
In: Computer Security ESORICS,
Vienna, Austria, [Conference or Workshop Item]

Shulman, Haya and Waidner, Michael Pernul, Günther and Ryan, Michael Y. A. and Weippl, Edgar (eds.) (2015):
DNS-Scopy: Towards Security of Internet Naming Infrastructure.
In: Lecture Notes in Computer Science 9326, 1, In: 20th European Symposium on Research in Computer Security Vienna, Austria, September 21 – 25, 2015 Proceedings, pp. 3-22,
Springer-Verlag New York, Inc., Vienna, Austria, ISBN 978-3-319-24173-9,
DOI: 10.1007/978-3-319-24174-6_1,
[Conference or Workshop Item]

Steinmetzer, Daniel and Chen, Joe and Classen, Jiska and Knightly, Edward and Hollick, Matthias (2015):
Eavesdropping with Periscopes: Experimental Security Analysis of Highly Directional Millimeter Waves.
In: IEEE Conference on Communications and Network Security 2015 (CNS),
Florence, DOI: 10.1109/CNS.2015.7346844,
[Conference or Workshop Item]

Tao, Chengdong and Xiang, Hong and Petzoldt, Albrecht and Ding, Jintai (2015):
Simple Matrix - A Multivariate Public Key Cryptosystem (MPKC) for Encryption.
In: Finite Fields and Their Applications, (35), pp. 352-368. [Article]

Volkamer, Melanie and Renaud, Karen and Kulyk, Oksana and Emeröz, Sinem Foresti, Sara (ed.) (2015):
A Socio-Technical Investigation into Smartphone Security.
In: Security and Trust Management: 11th International Workshop - STM 2015, pp. 265-273,
Springer, [Conference or Workshop Item]

Arzt, Steven and Nadi, Sarah and Ali, Karim and Bodden, Eric and Erdweg, Sebastian and Mezini, Mira (2015):
Towards Secure Integration of Cryptographic Software.
In: Proceedings of the 2015 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming & Software, OOPSLA Onward!, Piitsburgh, 25.10.2015, [Conference or Workshop Item]

Asokan, N. and Brasser, Ferdinand and Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Schunter, Matthias and Tsudik, Gene and Wachsmann, Christian (2015):
SEDA - Technical Report.
[Report]

Buescher, Niklas and Katzenbeisser, Stefan (2015):
Faster Secure Computation through Automatic Parallelization.
In: 24th USENIX Security Symposium (USENIX Security'15),
USENIX Association, Washington, D.C., USA, [Conference or Workshop Item]

Crane, Stephen and Liebchen, Christopher and Homescu, Andrei and Davi, Lucas and Larsen, Per and Sadeghi, Ahmad-Reza and Brunthaler, Stefan and Franz, Michael (2015):
Return to Where? You Can't Exploit What You Can't Find.
In: Blackhat USA,
[Conference or Workshop Item]

Fischlin, Marc and Günther, Felix and Marson, Giorgia Azzurra and Paterson, Kenneth G. (2015):
Data Is a Stream: Security of Stream-Based Channels.
In: Advances in Cryptology - CRYPTO 2015, pp. 545-564,
Springer, Santa Barbara, CA, USA, [Conference or Workshop Item]

Gong, Liang and Pradel, Michael and Sen, Koushik (2015):
JITProf: pinpointing JIT-unfriendly JavaScript code.
In: ESEC/FSE 2015, In: Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, pp. 357-368,
ACM, Bergamo, Italy, ISBN 978-1-4503-3675-8,
DOI: 10.1145/2786805.2786831,
[Conference or Workshop Item]

Horsch, Moritz and Hülsing, Andreas and Buchmann, Johannes (2015):
PALPAS - PAsswordLess PAssword Synchronization.
In: International Conference on Availability, Reliability and Security (ARES),
Université Paul Sabatier, Toulouse, France, [Conference or Workshop Item]

Huang, Jialin and Vaudenay, Serge and Lai, Xuejia and Nyberg, Kaisa (2015):
Capacity and Data Complexity in Multidimensional Linear Attack.
In: CRYPTO,
[Conference or Workshop Item]

Koeberl, Patrick and Phegade, Vinay and Rajan, Anand and Schneider, Thomas and Schulz, Steffen and Zhdanova, Maria (2015):
Time to Rethink: Trust Brokerage using Trusted Execution Environments.
In: 8. International Conference on Trust and Trustworthy Computing (TRUST'15), pp. 181-190,
Springer, DOI: 10.1007/978-3-319-22846-4_11,
[Conference or Workshop Item]

Kohnhäuser, Florian and Schaller, André and Katzenbeisser, Stefan (2015):
PUF-based Software Protection for Low-end Embedded Devices.
In: 8th International Conference on Trust and Trustworthy Computing (TRUST 2015), pp. 3-21,
Springer, Heraklion, Crete, Greece, ISBN 978-3-319-22846-4,
DOI: 10.1007/978-3-319-22846-4_1,
[Conference or Workshop Item]

Kulyk, Oksana and Neumann, Stephan and Budurushi, Jurlind and Volkamer, Melanie and Haenni, Rolf and Koenig, Reto and von Bergen, Philemon (2015):
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
In: 10th International Conference on Availability, Reliability and Security - ARES 2015, pp. 224-229,
IEEE, Toulouse, France, DOI: 10.1109/ARES.2015.75,
[Conference or Workshop Item]

Meskanen, Tommi and Ramezanian, Sara and Liu, Jian and Niemi, Valtteri (2015):
Private Membership Test for Bloom Filters.
In: The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15),
Helsinki, Finland, [Conference or Workshop Item]

Mineraud, Julien and Lancerin, Federico and Balasubramaniam, Sasitharan and Conti, Mauro and Tarkoma, Sasu (2015):
You are AIRing too much: Assessing the privacy of users in crowdsourcing environmental data.
In: The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15),
Helsinki, Finland, [Conference or Workshop Item]

Nyman, Thomas and McGillion, Brian and Asokan, N. (2015):
On Making Emerging Trusted Execution Environments Accessible to Developers.
In: Lecture Notes in Computer Science, 9229, In: 8th International Conference on Trust & Trustworthy Computing, pp. 58-67,
Springer International Publishing, Heraklion, Crete, Greece, ISBN 978-3-319-22845-7,
DOI: 10.1007/978-3-319-22846-4_4,
[Conference or Workshop Item]

Pellegrino, Giancarlo and Balzarotti, Davide and Winter, Stefan and Suri, Neeraj (2015):
In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services.
In: Proceedings of USENIX Security Symposium, 12.-14. August 2015, Washington D.C,
[Conference or Workshop Item]

Pinkas, Benny and Schneider, Thomas and Segev, Gil and Zohner, Michael (2015):
Phasing: Private Set Intersection using Permutation-based Hashing.
In: 24. USENIX Security Symposium (USENIX Security'15), pp. 515-530,
USENIX, [Conference or Workshop Item]

Rasthofer, Siegfried and Asrar, Irfan and Huber, Stephan and Bodden, Eric (2015):
How Current Android Malware Seeks to Evade Automated Code Analysis.
In: 9th International Conference on Information Security Theory and Practice (WISTP'2015),
[Conference or Workshop Item]

Tamrakar, Sandeep and Ekberg, Jan-Erik and Laitinen, Pekka (2015):
On Rehoming the Electronic Id to TEEs.
In: The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15),
Helsinki, Finland, [Conference or Workshop Item]

Volkamer, Melanie and Renaud, Karen and Braun, Kristoffer and Canova, Gamze and Reinheimer, Benjamin Conti, Mauro and Schunter, Matthias and Askoxylakis, Ioannis (eds.) (2015):
Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness.
In: Trust and Trustworthy Computing, In: International Conference on Trust and Trustworthy Computing (TRUST), pp. 104-121,
Springer, Heraklion, Crete, Greece, ISBN 978-3-319-22845-7,
DOI: 10.1007/978-3-319-22846-4_7,
[Conference or Workshop Item]

Volkamer, Melanie and Renaud, Karen and Kulyk, Oksana and Emeröz, Sinem (2015):
An Investigation into the "Other" Barriers to Adoption of Smartphone Security Precautions (Poor Usability being a Given).
[Report]

Alkim, Erdem and Bindel, Nina and Buchmann, Johannes and Dagdelen, Özgür and Schwabe, Peter (2015):
TESLA: Tightly-Secure Efficient Signatures from Standard Lattices.
In: Cryptology ePrints Archive, 2015 (755), pp. 1-24. International Association for Cryptologic Research (IACR), [Article]

Askarov, Aslan and Chong, Stephen and Mantel, Heiko (2015):
Hybrid Monitors for Concurrent Noninterference.
In: Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF), pp. 137-151,
IEEE Computer Society, Verona, Italy, ISBN 978-1-4673-7539-9,
DOI: 10.1109/CSF.2015.17,
[Conference or Workshop Item]

Diedrich, Lennart and Murati, Lulzim and Wiesmaier, Alexander (2015):
Stream ciphers in the IoT: Grain and Trivium.
[Report]

Do, Lisa Nguyen Quang and Ali, Karim and Bodden, Eric and Livshits, Benjamin (2015):
Toward a Just-in-Time Static Analysis.
[Article]

Do, Trinh Minh Tri and Dousse, Olivier and Miettinen, Markus and Gatica-Perez, Daniel (2015):
A probabilistic kernel method for human mobility prediction with smartphones.
In: Pervasive and Mobile Computing, 20, pp. 13-28. DOI: 10.1016/j.pmcj.2014.09.001,
[Article]

Ghiglieri, Marco and Lange, Benjamin and Simo, Hervais and Waidner, Michael (2015):
Security und Privacy bei Smart TVs – Bedrohungspotential und technische Lösungsansätze.
In: Weiterdenken, In: Digitale Schwellen - Freiheit und Privatheit in der digitalisierten Welt, pp. 67-84,
Dreseden, [Conference or Workshop Item]

Gong, Liang and Pradel, Michael and Sridharan, Manu and Sen, Koushik (2015):
DLint: Dynamically Checking Bad Coding Practices in JavaScript.
In: ISSTA 2015, In: Proceedings of the 2015 International Symposium on Software Testing and Analysis, pp. 94-105,
ACM, Baltimore, MD, USA, ISBN 978-1-4503-3620-8,
DOI: 10.1145/2771783.2771809,
[Conference or Workshop Item]

Kußmaul, Tobias and Löffler, Johannes and Wiesmaier, Alexander (2015):
Block ciphers PRESENT and SEA in comparison.
[Report]

Letzkus, Fabian (2015):
NotaryCache: Preventing man-in-the-middle attacks through ubiquitous multi-path probing.
Darmstadt, Technische Universität, [Master Thesis]

Loruenser, Thomas and Rodriguez, Charles Bastos and Demirel, Denise and Fischer-Hübner, Simone and Gross, Thomas R. and Langer, Thomas and des Noes, Mathieu and Poehls, Henrich and Rozenberg, Boris and Slamanig, Daniel (2015):
Towards a New Paradigm for Privacy and Security in Cloud Services.
In: CoRR abs/1506.05980 (2015), [Article]

Luna, Jesus and Suri, Neeraj and Iorga, Michaela and Karmel, Anil (2015):
Leveraging the Potential of Cloud Security Service Level Agreements through Standards.
In: Proceedings of IEEE Cloud Computing, 27.06.- 02.07. 2015, New York,
[Conference or Workshop Item]

Medeiros, Flávio and Kästner, Christian and Ribeiro, Márcio and Nadi, Sarah and Gheyi, Rohit (2015):
The Love/Hate Relationship with the C Preprocessor: An Interview Study.
In: European Conference on Object-Oriented Programming, pp. 999-1022,
Prague, Czech Republic, [Conference or Workshop Item]

Meuser, Tobias and Schmidt, Larissa and Wiesmaier, Alexander (2015):
Comparing Lightweight Hash Functions – PHOTON & Quark.
[Report]

Kulyk, Oksana and Neumann, Stephan and Budurushi, Jurlind and Volkamer, Melanie and Haenni, Rolf and Koenig, Reto and von Bergen, Philemon (2015):
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
In: Cryptology ePrint Archive, 2015 (558), pp. 1-19. International Association for Cryptologic Research (IACR), [Article]

Arias, Orlando and Davi, Lucas and Hanreich, Matthias and Jin, Yier and Koeberl, Patrick and Paul, Debayan and Sadeghi, Ahmad-Reza and Sullivan, Dean (2015):
HAFIX: Hardware-Assisted Flow Integrity Extension.
In: 52nd Design Automation Conference (DAC),
[Conference or Workshop Item]

Arias, Orlando and Davi, Lucas and Hanreich, Matthias and Jin, Yier and Koeberl, Patrick and Paul, Debayan and Sadeghi, Ahmad-Reza and Sullivan, Dean (2015):
HAFIX: Hardware-Assisted Flow Integrity Extension (Best Paper Award).
In: 52nd Design Automation Conference (DAC),
[Conference or Workshop Item]

Brasser, Ferdinand and Koeberl, Patrick and Mahjoub, Brahim El and Sadeghi, Ahmad-Reza and Wachsmann, Christian (2015):
TyTAN: Tiny Trust Anchor for Tiny Devices.
In: 52nd Design Automation Conference (DAC) 2015,
[Conference or Workshop Item]

Cabarcas, Daniel and Demirel, Denise and Göpfert, Florian and Lancrenon, Jean and Wunderer, Thomas (2015):
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme.
[Report]

Daubert, Jörg and Wiesmaier, Alexander and Kikiras, Panayotis (2015):
A View on Privacy & Trust in IoT.
In: IEEE International Conference on Communication (ICC), International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (IoT/CPS-Security), pp. 2665-2670,
IEEE, First IEEE International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (IoT/CPS-Security), IEEE International Conference on Communications, (ICC), London, UK, DOI: 10.1109/ICCW.2015.7247581,
[Conference or Workshop Item]

Demirel, Denise and Lancrenon, Jean (2015):
How to Securely Prolong the Computational Bindingness of Pedersen Commitments.
[Report]

Gutmann, Andreas and Renaud, Karen and Volkamer, Melanie (2015):
Nudging Bank Account Holders Towards More Secure PIN Management.
4, In: Journal of Internet Technology and Secured Transaction (JITST), pp. 380 - 386,
Infonomics Society, DOI: 10.20533/jitst.2046.3723.2015.0049,
[Conference or Workshop Item]

Günther, Felix and Poettering, Bertram (2015):
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes.
In: 20th Australasian Conference on Information Security and Privacy (ACISP 2015), pp. 195-212,
Springer, Queensland University of Technology (QUT), Brisbane, Australia, [Conference or Workshop Item]

Habib, Sheikh Mahbub and Volk, Florian and Hauke, Sascha and Mühlhäuser, Max Ko, Ryan and Choo, Kim-Kwang Raymond (eds.) (2015):
Computational trust methods for security quantification in the cloud ecosystem.
In: The cloud security ecosystem : technical, legal, business and management issues, pp. 463-493, Amsterdam Heidelberg, Elsevier Syngress, ISBN 978-0-12-801595-7,
DOI: 10.1016/B978-0-12-801595-7.00021-5,
[Book Section]

Hasan, T. and Kikiras, Panayotis and Leonardi, Alessandro and Ziekow, Holger and Daubert, Jörg (2015):
Cloud-based IoT Analytics for the Smart Grid: Experiences from a 3-year Pilot.
In: Proceedings of the 10th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities (TRIDENTCOM), pp. 1-10,
ACM, Vancouver, Canada, DOI: 10.4108/icst.tridentcom.2015.259694,
[Conference or Workshop Item]

Nagy, Marcin and Bui, Thanh Phong and Cristofaro, Emiliano De and Asokan, N. and Ott, Jörg and Sadeghi, Ahmad-Reza (2015):
How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL.
In: ACM WiSEC 2015,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Wachsmann, Christian and Waidner, Michael (2015):
Security and Privacy Challenges in Industrial Internet of Things.
In: 52nd Design Automation Conference (DAC) Research,
[Conference or Workshop Item]

Schäfer, Marcel and Mair, Sebastian and Berchtold, Waldemar and Steinebach, Martin (2015):
Universal Threshold Calculation for Fingerprinting Decoders using Mixture Models.
In: IH&MMSec '15 Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, pp. 109-114,
ACM, Portland, Oregon, ISBN 978-1-4503-3587-4,
DOI: 10.1145/2756601.2756611,
[Conference or Workshop Item]

Songhori, Ebrahim and Sadeghi, Ahmad-Reza and Koushanfar, Farinaz (2015):
Compacting Privacy-Preserving k-Nearest Neighbor Search using Logic Synthesis.
In: 52nd Design Automation Conference (DAC),
[Conference or Workshop Item]

Steinmetzer, Daniel and Schulz, Matthias and Hollick, Matthias (2015):
Lockpicking Physical Layer Key Exchange: Weak Adversary Models Invite the Thief.
In: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec),
New York, ISBN 978-1-4503-3623-9/15/06,
DOI: 10.1145/2766498.2766514,
[Conference or Workshop Item]

Struck, Patrick (2015):
On the difference between hardness and security: a comparison of lattice-based signature schemes.
TU Darmstadt, [Master Thesis]

Wilk, Stefan and Schönherr, Sophie and Stohr, Denny and Effelsberg, Wolfgang (2015):
EnvDASH: An Environment-Aware Dynamic Adaptive Streaming over HTTP System.
In: TVX '15, In: Proceedings of the ACM International Conference on Interactive Experiences for TV and Online Video, pp. 113-118,
ACM, Brussels, Belgium, ISBN 978-1-4503-3526-3,
DOI: 10.1145/2745197.2745205,
[Conference or Workshop Item]

Alkeilani Alkadri, Nabil (2015):
Post-Quantum Commitment Schemes.
Darmstadt, Technische Universität, [Master Thesis]

Arabadzhieva, Vladislava (2015):
Privacy Taxonomy for Verifiable Poll-site Voting Schemes.
Darmstadt, Technische Universität, [Bachelor Thesis]

Braun, Kristoffer and Rack, Philipp (2015):
Shoulder-surfing resistente Authentisierung an mobilen Endgeräten.
Darmstadt, Technische Universität, [Bachelor Thesis]

Canova, Gamze and Volkamer, Melanie and Bergmann, Clemens and Borza, Roland and Reinheimer, Benjamin and Stockhardt, Simon and Tenberg, Ralf (2015):
Learn To Spot Phishing URLs with the Android NoPhish App.
In: IFIP Advances in Information and Communication Technology, In: Information Security Education Across the Curriculum - 9th (IFIP), pp. 87-100,
Springer, Hamburg, Germany, DOI: 10.1007/978-3-319-18500-2_8,
[Conference or Workshop Item]

Crane, Stephen and Liebchen, Christopher and Homescu, Andrei and Davi, Lucas and Larsen, Per and Sadeghi, Ahmad-Reza and Brunthaler, Stefan and Franz, Michael (2015):
Readactor: Practical Code Randomization Resilient to Memory Disclosure.
In: 36th IEEE Symposium on Security and Privacy (Oakland),
[Conference or Workshop Item]

Ghiglieri, Marco and Müller, Jan (2015):
Datenschutzfreundliche Erfassung von Nutzungsdaten bei Smart Entertainment Geräten.
In: 14. Deutscher IT-Sicherheitskongress,
[Conference or Workshop Item]

Ghiglieri, Marco and Oswald, Florian (2015):
SSP – Ansatz zur garantierten Durchsetzung von Web Sicherheitsmaßnahmen auf dem Client.
In: 14. Deutscher IT-Sicherheitskongress,
[Conference or Workshop Item]

Pradel, Michael and Schuh, Parker and Sen, Koushik (2015):
TypeDevil: dynamic type inconsistency analysis for JavaScript.
1, In: Proceedings of the 37th International Conference on Software Engineering, pp. 314-324,
IEEE Press, Florence, Italy, ISBN 978-1-4799-1934-5,
DOI: 10.1109/ICSE.2015.51,
[Conference or Workshop Item]

Schuster, Felix and Tendyck, Thomas and Liebchen, Christopher and Davi, Lucas and Sadeghi, Ahmad-Reza and Holz, Thorsten (2015):
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications.
In: 36th IEEE Symposium on Security and Privacy (Oakland),
[Conference or Workshop Item]

Shirazi, Fatemeh and Goehring, Matthias and Diaz, Claudia (2015):
Tor Experimentation Tools.
In: International Workshop on Privacy Engineering – IWPE'15, co-located with 36th IEEE symposium on Security and Privacy,
IEEE, FAIRMONT, SAN JOSE, CA, [Conference or Workshop Item]

Songhori, Ebrahim and Hussain, Siam and Sadeghi, Ahmad-Reza and Schneider, Thomas and Koushanfar, Farinaz (2015):
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits.
In: 36. IEEE Symposium on Security and Privacy (IEEE S&P'15), pp. 411-428,
IEEE, DOI: 10.1109/SP.2015.32,
[Conference or Workshop Item]

Vigil, Martín and Buchmann, Johannes and Cabarcas, Daniel and Weinert, Christian and Wiesmaier, Alexander (2015):
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey.
In: Computers & Security, 50, pp. 16-32. [Article]

Winter, Stefan and Piper, Thorsten and Schwahn, Oliver and Natella, Roberto and Suri, Neeraj and Cotroneo, Domenico (2015):
GRINDER: On Reusability of Fault Injection Tools.
In: Proceedings of the ICSE/AST, 23.05.-24.05.2015, Florenz,
[Conference or Workshop Item]

Zhou, Shurui and Al-Kofahi, Jafar and Nguyen, Tien and Kaestner, Christian and Nadi, Sarah (2015):
Extracting Configuration Knowledge from Build Files with Symbolic Analysis.
In: 3rd International Workshop on Release Engineering, p. 4,
Florence, Italy, [Conference or Workshop Item]