Publikationen

Don't Steal my Drone: Catching Attackers with an Unmanned Aerial Vehicle Honeypot
Vasilomanolakis, Emmanouil; Daubert, Jörg; Boopalan, Dhanasekar; Mühlhäuser, Max
IEEE/IFIP Network Operations and Management Symposium (NOMS), p.1-2
Sprache: English
[Conference Proceedings]

Indoor Localization Using Commercial Off-The-Shelf 60 GHz Access Points
Bielsa, Guillermo; Palacios, Joan; Loch, Adrian; Steinmetzer, Daniel; Cesari, Paolo; Widmer, Joerg
Sprache: English
[Conference Proceedings]

VisuFlow: a Debugging Environment for Static Analyses
Nguyen, Lisa; Krüger, Stefan; Hill, Patrick; Ali, Karim; Bodden, Eric
ICSE
Sprache: German
[Conference Proceedings]

Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies
Tkachenko, Oleksandr; Weinert, Christian; Schneider, Thomas; Hamacher, Kay
13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18), p.221-235
Sprache: English
[Conference Proceedings]

Beam-Stealing: Intercepting the Sector Sweep to Launch Man-in-the-Middle Attacks on Wireless IEEE 802.11ad Networks
Steinmetzer, Daniel; Yuan, Yimin; Hollick, Matthias
Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, p.12-22
Sprache: English
[Conference Proceedings]

Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications
Riazi, M. Sadegh; Weinert, Christian; Tkachenko, Oleksandr; Songhori, Ebrahim M.; Schneider, Thomas; Koushanfar, Farinaz
13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18), p.707-721
Sprache: English
[Conference Proceedings]

Revisiting Context-Based Pairing in IoT
Miettinen, Markus; Nguyen, Thien Duc; Asokan, N.; Sadeghi, Ahmad-Reza
Proceedings of the 55th Design Automation Conference (DAC), p.32:1-32:6
Sprache: English
[Conference Proceedings]

iOracle: Automated Evaluation of Access Control Policies in iOS
Deaconescu, Razvan; Carabas, Costin; Manda, Iulia; Enck, William; Chiroiu, Mihai; Li, Ninghui; Sadeghi, Ahmad-Reza
13th ASIA Conference on Information, Computer and Communications Security
Sprache: German
[Conference Proceedings]

Revisiting the Sparsification Technique in Kannan’s Embedding Attack on LWE
Wunderer, Thomas; Wang, Yuntao
ISPEC 2018
Sprache: English
[Conference Proceedings]

Function-Dependent Commitments for Verifiable Multi-Party Computation
Schabhüser, Lucas; Butin, Denis; Demirel, Denise; Buchmann, Johannes
Information Security - 21st International Conference, ISC 2018
Sprache: English
[Conference Proceedings]

Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting
Richter, Philipp; Yang, Zheng; Tkachenko, Oleksandr; Leppäkoski, Helena; Järvinen, Kimmo; Schneider, Thomas
8. International Conference on Localization and GNSS (ICL-GNSS'18), p.1-6
Sprache: English
[Conference Proceedings]

How Secure is Green IT? The Case of Software-Based Energy Side Channels
Mantel, Heiko; Schickel, Johannes; Weber, Alexandra; Weber, Friedrich
ESORICS 2018
Sprache: English
[Conference Proceedings]

Differential Power Analysis of XMSS and SPHINCS
Kannwischer, Matthias; Genêt, Aymeric; Butin, Denis; Krämer, Juliane; Buchmann, Johannes
COSADE2018
Sprache: English
[Conference Proceedings]

Faster Privacy-Preserving Location Proximity Schemes
Järvinen, Kimmo; Kiss, Ágnes; Schneider, Thomas; Tkachenko, Oleksandr; Yang, Zheng
17. International Conference on Cryptology And Network Security (CANS'18), p.3-22
Sprache: English
[Conference Proceedings]

PROPYLA: Privacy Preserving Long-Term Secure Storage
Geihs, Matthias; Karvelas, Nikolaos; Katzenbeisser, Stefan; Buchmann, Johannes
SCC Workshop @ AsiaCCS 2018
Sprache: English
[Conference Proceedings]

Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent
Fischlin, Marc; Harasser, Patrick
Applied Cryptography and Network Security - ACNS 2018, p.202-220
Sprache: English
[Conference Proceedings]

PIR-PSI: Scaling Private Contact Discovery
Demmler, Daniel; Rindal, Peter; Rosulek, Mike; Trieu, Ni
Sprache: English
[Journal Article]

Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples
Bindel, Nina; Buchmann, Johannes; Göpfert, Florian; Schmidt, Markus
Sprache: English
[Journal Article]

An Overview of DRAM-Based Security Primitives
Anagnostopoulos, Nikolaos Athanasios; Katzenbeisser, Stefan; Chandy, John A.; Tehranipoor, Fatemeh
Sprache: English
[Journal Article]

Towards Secure Distributed Trust Management on a Global Scale
Alexopoulos, Nikolaos; Habib, Sheikh Mahbub; Mühlhäuser, Max
IoT S&P’18: ACM SIGCOMM 2018 Workshop on IoT Security and Privacy, p.49-54
Sprache: English
[Conference Proceedings]

Estimate all the {LWE, NTRU} schemes!
Albrecht, Martin R.; Curtis, Benjamin R.; Deo, Amit; Davidson, Alex; Player, Rachel; Postlethwaite, Eamonn W.; Virdia, Fernando; Wunderer, Thomas
SCN 2018
Sprache: English
[Conference Proceedings]

Towards Practical RAM based Secure Computation
Buescher, Niklas; Weber, Alina; Katzenbeisser, Stefan
European Symposium on Research in Computer Security (ESORICS)
Sprache: English
[Conference Proceedings]

IMIX: In-Process Memory Isolation EXtension
Frassetto, Tommaso; Jauernig, Patrick; Liebchen, Christopher; Sadeghi, Ahmad-Reza
27th USENIX Security Symposium
Sprache: English
[Conference Proceedings]

Decay-Based DRAM PUFs in Commodity Devices
Schaller, André; Xiong, Wenjie; Anagnostopoulos, Nikolaos Athanasios; Saleem, Umair; Gabmeyer, Sebastian; Skoric, Boris; Katzenbeisser, Stefan; Szefer, Jakub
Sprache: English
[Journal Article]

Advanced Reconfigurable Physical Unclonable Functions(AR-PUFs) and Their Security Applications
Kumar, Manish; Anagnostopoulos, Nikolaos Athanasios; Fan, Yufan; Katzenbeisser, Stefan
28th Crypto-Day
Sprache: English
[Conference Proceedings]