Publikationen

Productivity vs. Security: Mitigating Conflicting Goals in Organizations [to appear]
Mayer, Peter; Gerber, Nina; McDermott, Ronja; Volkamer, Melanie; Vogt, Joachim
[Journal Article]

Integration des gitterbasierten LARA-Verschlüsselungsverfahrens in JCA
Dietsch, Sascha Thorsten
[Master Thesis]

Are We There Yet? On RPKIs Deployment and Security
Cohen, Avichai; Gilad, Yossi; Herzberg, Amir; Schapira, Michael; Shulman, Haya
[Conference Proceedings]

User experiences of TORPEDO: TOoltip-powered phishing email DetectiOn [to appear]
Volkamer, Melanie; Renaud, Karen; Reinheimer, Benjamin; Kunz, Alexandra
[Journal Article]

Towards Enhancing the Visual Analysis of Interdomain Routing
Ulmer, Alex; Kohlhammer, Jörn; Shulman, Haya
[Conference Proceedings]

One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in Signed Domains
Shulman, Haya; Waidner, Michael
[Conference Proceedings]

Poster: Secure Storage of Masked Passwords
Mayer, Peter; Volkamer, Melanie
[Conference Proceedings]

LINCOS – A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality
Braun, Johannes; Buchmann, Johannes; Demirel, Denise; Geihs, Matthias; Fujiwara, Mikio; Moriai, Shiho; Sasaki, Masahide; Waseda, Atsushi
[Conference Proceedings]

A Practical Multivariate Blind Signature Scheme
Petzoldt, Albrecht; Szepieniec, Alan; Mohamed, Mohamed Saied Emam
[Conference Proceedings]

Internet-Wide Study of DNS Cache Injections
Klein, Amit; Shulman, Haya; Waidner, Michael
[Conference Proceedings]

Cheetah: Just-in-Time Taint Analysis for Android Apps
Do, Lisa Nguyen Quang; Ali, Karim; Livshits, Benjamin; Bodden, Eric; Smith, Justin; Murphy-Hill, Emerson
[Conference Proceedings]

Finding Common Ground: A Survey of Capacitive Sensing in Human-Computer Interaction
Grosse-Puppendahl, Tobias; Holz, Christian; Cohn, Gabe A.; Wimmer, Raphael; Bechtold, Oskar; Hodges, Steve; Reynolds, Matthew S.; Smith, Joshua R.
[Conference Proceedings]

Hardening Java s Access Control by Abolishing Implicit Privilege Elevation
Holzinger, Philipp; Hermann, Ben; Lerch, Johannes; Bodden, Eric; Mezini, Mira
[Conference Proceedings]

Flexibles: Deformation-Aware 3D-Printed Tangibles for Capacitive Touchscreens
Schmitz, Martin; Steimle, Jürgen; Huber, Jochen; Dezfuli, Niloofar; Mühlhäuser, Max
[Conference Proceedings]

Counting in the Dark: Caches Discovery and Enumeration in the Internet
Klein, Amit; Shulman, Haya; Waidner, Michael
[Conference Proceedings]

A Co-contextual Type Checker for Featherweight Java
Kuci, Edlira; Erdweg, Sebastian; Bračevac, Oliver; Bejleri, Andi; Mezini, Mira
[Conference Proceedings]

Systematic Black-Box Analysis of Collaborative Web Applications
Billes, Marina; M\oller, Anders; Pradel, Michael
[Conference Proceedings]

A Second Look at Password Composition Policies in the Wild: Comparing Samples from 2010 and 2016
Mayer, Peter; Kirchner, Jan; Volkamer, Melanie
[Conference Proceedings]

Update-tolerant and Revocable Password Backup
Horsch, Moritz; Braun, Johannes; Metz, Dominique; Buchmann, Johannes
[Conference Proceedings]

Just-in-Time Static Analysis
Do, Lisa Nguyen Quang; Ali, Karim; Livshits, Benjamin; Bodden, Eric; Smith, Justin; Murphy-Hill, Emerson
[Conference Proceedings]

Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering
Büscher, Niklas; Boukoros, Spyros; Bauregger, Stefan; Katzenbeisser, Stefan
[Conference Proceedings]

Reliable Behavioural Factors in the Information Security Context [to appear]
Mayer, Peter; Kunz, Alexandra; Volkamer, Melanie
[Conference Proceedings]

Zero Round-Trip Time for the Extended Access Control Protocol
Brendel, Jacqueline; Fischlin, Marc
[Conference Proceedings]

Cover Traffic: A Trade of Anonymity and Efficiency
Grube, Tim; Thummerer, Markus; Daubert, Jörg; Mühlhäuser, Max
[Conference Proceedings]

Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit
Fereidooni, Hossein; Classen, Jiska; Spink, Tom; Patras, Paul; Miettinen, Markus; Sadeghi, Ahmad-Reza; Hollick, Matthias; Conti, Mauro
[Conference Proceedings]