Publications

Sovereignty in Information Technology. Security, Safety and Fair Market Access by Openness and Control of the Supply Chain
Weber, Arnd; Reith, Steffen; Kasper, Michael; Kuhlmann, Dirk; Seifert, Jean-Pierre; Krauß, Christoph
Language: English
[Report, Electronic Publication]

Souveränität und die IT-Wertschöpfungskette
Weber, Arnd; Reith, Steffen; Kasper, Michael; Kuhlmann, Dirk; Seifert, Jean-Pierre; Krauß, Christoph
Language: German
[Journal Article]

Authorship verification in the absence of explicit features and thresholds
Halvani, Oren; Graner, Lukas; Vogel, Anna
Language: English
[Conference Paper]

Implementing Joux-Vitse's crossbred algorithm for solving MQ systems over F2 on GPUs
Niederhagen, Ruben; Ning, Kai-Chun; Yang, Bo-Yin
Language: English
[Conference Paper]

Concise data definition language (CDDL): A notational convention to express CBOR data structures
Birkholz, Henk; Vigano, Christoph; Bormann, Carsten
Language: English
[Report, Electronic Publication]

Face verification robustness & camera-subject distance: Camera-subject distance marginally affects automatic face verification
Berthe, Benoit; Croll, Christian; Henniger, Olaf
Language: English
[Journal Article]

Multi-biometric template protection based on bloom filters
Gomez-Barrero, M.; Rathgeb, C.; Li, G.; Raghavendra, R.; Galbally, J.; Busch, C.
[Journal Article]

Anti-Forensic Capacity and Detection Rating of Hiding Data in the ext4 Filesystem
Göbel, Thomas; Baier, Harald
[Conference Proceedings]

Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications
Riazi, M. Sadegh; Weinert, Christian; Tkachenko, Oleksandr; Songhori, Ebrahim M.; Schneider, Thomas; Koushanfar, Farinaz
[Conference Proceedings]

Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies
Tkachenko, Oleksandr; Weinert, Christian; Schneider, Thomas; Hamacher, K.
[Conference Proceedings]

VisuFlow: a Debugging Environment for Static Analyses
Nguyen, Lisa; Krüger, Stefan; Hill, Patrick; Ali, Karim; Bodden, Eric
[Conference Proceedings]

iOracle: Automated Evaluation of Access Control Policies in iOS
Deaconescu, Razvan; Carabas, Costin; Manda, Iulia; Enck, William; Chiroiu, Mihai; Li, Ninghui; Sadeghi, Ahmad-Reza
[Conference Proceedings]

Darum könnte die Bitcoin-Technologie ein gefährliches Sicherheitsrisiko für die ganze Wirtschaft sein
Kreutzer, Michael
Language: German
[Journal Article, Electronic Publication]

28. SmartCard Workshop 2018. Tagungsband: 21. und 22. Februar 2018, Darmstadt
Waldmann, Ulrich ; Fraunhofer-Institut für Sichere Informations­technologie -SIT-, Darmstadt
Language: German
[Conference Proceedings]

HoneyDrone: a medium-interaction Unmanned Aerial Vehicle Honeypot
Daubert, Jörg; Boopalan, Dhanasekar; Mühlhäuser, Max; Vasilomanolakis, Emmanouil
[Conference Proceedings]

Trapped-ion quantum simulation of excitation transport: Disordered, noisy, and long-range connected quantum networks
Trautmann, Nils; Hauke, Philipp
[Journal Article]

K-Miner: Uncovering Memory Corruption in Linux
Gens, David; Schmitt, Simon; Davi, Lucas; Sadeghi, Ahmad-Reza
[Conference Proceedings]

Revisiting Context-Based Pairing in IoT
Miettinen, Markus; Nguyen, Thien Duc; Asokan, N.; Sadeghi, Ahmad-Reza
[Conference Proceedings]

Don t Steal my Drone: Catching Attackers with an Unmanned Aerial Vehicle Honeypot
Vasilomanolakis, Emmanouil; Daubert, Jörg; Boopalan, Dhanasekar; Mühlhäuser, Max
[Conference Proceedings]

Digitale Wasserzeichen in der Kriminalistik
Waschetzki, Michael; Steinebach, Martin
Language: German
[Journal Article]

A Systematic Evaluation of API-Misuse Detectors
Amann, Sven; Nguyen, Hoan Anh; Nadi, Sarah; Nguyen, Tien; Mezini, Mira
[Journal Article]

Human Factors in Security
Gerber, Paul; Ghiglieri, Marco; Henhapl, Birgit; Kulyk, Oksana; Marky, Karola; Mayer, Peter; Reinheimer, Benjamin; Volkamer, Melanie
[Book Article]

Implications of vulnerable internet infrastructure
Shulman, Haya
Language: English
[Book Article]