Publications

A lightweight protocol for privacy preserving division
Boukoros, Spyros; Karvelas, Nikolaos; Katzenbeisser, Stefan
[Conference Proceedings]

Using Oblivious RAM in Genomic Studies
Karvelas, Nikolaos; Katzenbeisser, Stefan
[Conference Proceedings]

Standortlokalisierung in modernen Smartphones - Grundlagen und aktuelle Ent­wicklungen
Grimm, Rüdiger; Dhein, Andreas
Language: German
[Journal Article]

ORAMs in a Quantum World
Gagliardoni, Tommaso; Karvelas, Nikolaos; Katzenbeisser, S.
[Conference Proceedings]

Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics
Bindel, Nina; Buchmann, Johannes; Krämer, Juliane; Mantel, Heiko; Schickel, Johannes; Weber, Alexandra
[Conference Proceedings]

Hardening Javas Access Control by Abolishing Implicit Privilege Elevation
Holzinger, Philipp; Hermann, Ben; Lerch, Johannes; Bodden, Eric; Mezini. Mira
Language: English
[Conference Paper]

Forensic Image Inspection Assisted by Deep Learning
Steinebach, Martin; Mayer, Felix
Language: English
[Conference Paper]

Alle reden über Blockchain
Grimm, Rüdiger; Heinemann, Andreas
Language: German
[Journal Article]

Towards Accelerated Usage Control based on Access Correlations
Gay, Richard; Hu, Jinwei; Mantel, Heiko; Schickel, Johannes
[Conference Proceedings]

Survey and Systematization of Secure Device Pairing
Fomichev, Mikhail; Álvarez, Flor; Steinmetzer, Daniel; Gardner-Stephen, Paul; Hollick, Matthias
[Journal Article]

Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems
Traverso, Giulia; Cordero, Carlos Garcia; Nojoumian, Mehrdad; Azarderakhsh, Reza; Demirel, Denise; Habib, Sheikh Mahbub; Buchmann, Johannes
[Conference Proceedings]

SIXPACK: Securing Internet eXchange Points Against Curious onlooKers
Chiesa, Marco; Demmler, Daniel; Canini, Marco; Schapira, Michael; Schneider, Thomas
[Conference Proceedings]

The soot-based toolchain for analyzing android apps
Rasthofer, Siegfried; Arzt, Steven; Bodden, Eric
Language: English
[Conference Paper]

Making malory behave maliciously: Targeted fuzzing of android execution environments
Rasthofer, Siegfried; Arzt, Steven; Triller, Stefan; Pradel, Michael
Language: English
[Journal Article]

Improving mobile-malware investigations with static and dynamic code analysis techniques
Rasthofer, Siegfried; Bodden, Eric; Zeller, Andreas; Mezini, Mira
Language: English
[Dissertation, Electronic Publication]

Mitigating Lateral Interference: Adaptive Beam Switching for Robust Millimeter-Wave Networks
Steinmetzer, Daniel; Loch, Adrian; García-García, Amanda; Widmer, Jörg; Hollick, Matthias
[Conference Proceedings]

Postquantum Cryptography - State of the Art
Buchmann, Johannes; Lauter, Kristin; Mosca, Michele
[Journal Article]

The Day the Cryptography Dies
Mulholland, John; Mosca, Michele; Braun, Johannes
[Journal Article]

Hash-Based Signatures: State of Play
Butin, Denis
[Journal Article]

CodeMatch: Obfuscation Won’t Conceal Your Repackaged App
Glanz, Leonid; Amann, Sven; Eichberg, Michael; Reif, Michael; Hermann, Ben; Lerch, Johannes; Mezini, Mira
[Conference Proceedings]

More Efficient Universal Circuit Constructions
Günther, Daniel; Kiss, Ágnes; Schneider, Thomas
[Conference Proceedings]

Productivity vs. Security: Mitigating Conflicting Goals in Organizations [to appear]
Mayer, Peter; Gerber, Nina; McDermott, Ronja; Volkamer, Melanie; Vogt, Joachim
[Journal Article]

Integration des gitterbasierten LARA-Verschlüsselungsverfahrens in JCA
Dietsch, Sascha Thorsten
[Master Thesis]

Are We There Yet? On RPKIs Deployment and Security
Cohen, Avichai; Gilad, Yossi; Herzberg, Amir; Schapira, Michael; Shulman, Haya
[Conference Proceedings]

User experiences of TORPEDO: TOoltip-powered phishing email DetectiOn [to appear]
Volkamer, Melanie; Renaud, Karen; Reinheimer, Benjamin; Kunz, Alexandra
[Journal Article]