i

Dieser Webauftritt wurde archiviert und wird nicht mehr aktualisiert.

Bei technischen Fragen kontaktieren Sie bitte das Webteam. Es gilt die Datenschutzerklärung der TU Darmstadt.

Publikationen des Sonderforschungsbereich 666

Headergrafik Maschinenbau
Exportieren als [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Gruppiere nach: Publikationsjahr | Autor(en) | Typ des Eintrags
Springe zu: 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014
Es werden nur Einträge angezeigt, bei denen keine untergeordnete Organisationseinheit ausgewählt wurde. Anzahl: 646.

2022

Fitzke, Erik ; Krebs, Robin ; Haase, Thorsten ; Mengler, Max ; Alber, Gernot ; Walther, Thomas (2022):
Time-dependent POVM reconstruction for single-photon avalanche photo diodes using adaptive regularization.
In: New Journal of Physics, 24, IOP Publishing, ISSN 1367-2630,
DOI: 10.1088/1367-2630/ac5004,
[Artikel]

Roth, Tobias ; Helm, Dominik ; Reif, Michael ; Mezini, Mira (2022):
CiFi: Versatile Analysis of Class and Field Immutability.
In: GI-Edition Lecture Notes in Informatics: Proceedings, P320, In: Software Engineering 2022: Fachtagung des GI-Fachbereichs Softwaretechnik, S. 81-82,
Gesellschaft für Informatik e.V., Software Engineering 2022, virtual Conference, 21.-25.02.2022, ISSN 1617-5468, ISBN 978-3-88579-714-2,
DOI: 10.18420/se2022-ws-027,
[Konferenzveröffentlichung]

Dessouky, Ghada ; Gruler, Alexander ; Mahmoody, Pouya ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2022):
Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures.
S. 1-18, Network and Distributed Systems Security (NDSS) Symposium 2022, San Diego, USA, 24.-28.04.2022, [Konferenzveröffentlichung]

Edlund, Martin ; Mantel, Heiko ; Weber, Alexandra ; Weißmantel, Tim (2022):
Graphical User Interfaces for a Qualitative and a Quantitative Side-Channel Analysis Tool. (Verlagsversion)
Darmstadt, DOI: 10.26083/tuprints-00020262,
[Report]

Faust, Sebastian ; Hazay, Carmit ; Kretzler, David ; Schlosser, Benjamin (2022):
Financially Backed Covert Security.
International Conference on Practice and Theory of Public-Key Cryptography 2022, virtual Conference, 08.-11.03.2022, DOI: 10.1007/978-3-030-97131-1_4,
[Konferenzveröffentlichung]

2021

Oak, Aditya ; Ahmadian, Amir M. ; Balliu, Musard ; Salvaneschi, Guido (2021):
Enclave-Based Secure Programming with JE.
In: Proceedings: 2021 IEEE Secure Development Conference, S. 71-78,
IEEE, 6th IEEE Secure Development Conference (SecDev 2021), virtual Conference, 18.-20.10.2021, ISBN 978-1-6654-3170-5,
DOI: 10.1109/SecDev51306.2021.00026,
[Konferenzveröffentlichung]

Patra, Arpita ; Schneider, Thomas ; Suresh, Ajith ; Yalame, Mohammad Hossein (2021):
SynCirc: Efficient Synthesis of Depth-Optimized Circuits for Secure Computation.
IEEE, 14th IEEE International Workshop on Hardware-Oriented Security and Trust (HOST'21), virtual Conference, 13.-14.12.2021, [Konferenzveröffentlichung]

Gajewski, Marvin ; Haase, Thorsten ; Alber, Gernot (2021):
Dissipation-enabled resonant adiabatic quantum state transfer: Entanglement generation and quantum cloning.
In: Physical Review A, 104 (5), APS Physics, ISSN 2469-9926,
DOI: 10.1103/PhysRevA.104.052608,
[Artikel]

Das, Poulami ; Erwig, Andreas ; Faust, Sebastian ; Loss, Julian ; Riahi, Siavash (2021):
The Exact Security of BIP32 Wallets.
In: CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, S. 1020-1042,
ACM, 2021 ACM SIGSAC Conference on Computer and Communications Security, virtual Conference, 15.-19.11.2021, ISBN 978-1-4503-8454-4,
DOI: 10.1145/3460120.3484807,
[Konferenzveröffentlichung]

Surminski, Sebastian ; Niesler, Christian ; Brasser, Ferdinand ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2021):
RealSWATT: Remote Software-Based Attestation for Embedded Devices under Realtime Constraints.
In: CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, S. 2890-2905,
ACM, 2021 ACM SIGSAC Conference on Computer and Communications Security, virtual Conference, 15.-19.11.2021, ISBN 978-1-4503-8454-4,
DOI: 10.1145/3460120.3484788,
[Konferenzveröffentlichung]

Brzuska, Christina ; Couteau, Geoffrey ; Karanko, Phila ; Rohrbach, Felix (2021):
On Derandomizing Yao’s Weak-to-Strong OWF Construction.
In: Lecture Notes in Computer Science, 13043, In: Theory of Cryptography, S. 429-456,
Springer, 19th International Conference on Theory of Cryptography (TCC 2021), Raleigh, USA, 08.-11.11.2021, ISBN 978-3-030-90452-4,
DOI: 10.1007/978-3-030-90453-1_15,
[Konferenzveröffentlichung]

Wickert, Anna-Katharina ; Baumgärtner, Lars ; Breitfelder, Florian ; Mezini, Mira (2021):
Python Crypto Misuses in the Wild.
15th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM ’21), virtual Conference, 11.-15.10.2021, DOI: 10.6084/m9.figshare.16499085.v1,
[Konferenzveröffentlichung]

Brendel, Jacqueline ; Fiedler, Rune ; Günther, Felix ; Janson, Christian ; Stebila, Douglas (2021):
Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake.
(Preprint), IACR, 2021/769, [Report]

Heinrich, Alexander ; Hollick, Matthias ; Schneider, Thomas ; Stute, Milan ; Weinert, Christian (2021):
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop.
30th USENIX Security Symposium, virtual Conference, 11.-13.08.2021, [Konferenzveröffentlichung]

Gonzalez, Ruben ; Hülsing, Andreas ; Kannwischer, Matthias ; Krämer, Juliane ; Lange, Tanja ; Stöttinger, Marc ; Waitz, Elisabeth ; Wiggers, Thom ; Yang, Bo-Yin (2021):
Verifying Post-Quantum Signatures in 8kB of RAM.
In: LNCS, 12841, In: Post-Quantum Cryptography, S. 215-233,
Springer, 12th International Conference on Post-Quantum Cryptography, virtual Conference, 20.-22.07.2021, ISBN 978-3-030-81292-8,
DOI: 10.1007/978-3-030-81293-5_12,
[Konferenzveröffentlichung]

Demmler, Daniel ; Katzenbeisser, Stefan ; Schneider, Thomas ; Schuster, Tom ; Weinert, Christian (2021):
Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation.
Preprint, 18th International Conference on Security and Cryptography (SECRYPT'21), virtual Conference, 06.-08-07.2021, [Konferenzveröffentlichung]

Keller, Hannah ; Möllering, Helen ; Schneider, Thomas ; Yalame, Mohammad Hossein (2021):
Balancing Quality and Efficiency in Private Clustering with Affinity Propagation.
18th International Conference on Security and Cryptography (SECRYPT'21), virtual Conference, 06.-08.07.2021, [Konferenzveröffentlichung]

Heinrich, Alexander ; Hollick, Matthias ; Schneider, Thomas ; Stute, Milan ; Weinert, Christian (2021):
AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop.
In: WiSec '21: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, S. 371-373,
ACM, 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28.06.–01.07.2021, ISBN 978-1-4503-8349-3,
DOI: 10.1145/3448300.3468252,
[Konferenzveröffentlichung]

Heldmann, Tim ; Schneider, Thomas ; Tkachenko, Oleksandr ; Weinert, Christian ; Yalame, Mohammad Hossein (2021):
LLVM-based Circuit Compilation for Practical Secure Computation.
In: LNCS, 12727, In: Applied Cryptography and Network Security: Proceedings Part II, S. 99-121,
Springer, 19th International Conference on Applied Cryptography and Network Security (ACNS'21), virtual Conference, 21.-24.06.2021, ISBN 978-3-030-78374-7,
DOI: 10.1007/978-3-030-78375-4_5,
[Konferenzveröffentlichung]

Bozdemir, Beyza ; Canard, Sebastian ; Ermis, Orhan ; Möllering, Helen ; Önen, Melek ; Schneider, Thomas (2021):
Privacy-preserving density-based clustering.
16th ACM ASIA Conference on Computer and Communications Security (ASIACCS'21), virtual Conference, 07.-11.06.2021, [Konferenzveröffentlichung]

Fomichev, Mikhail ; Hesse, Julia ; Almon, Lars ; Lippert, Timm ; Han, Jun ; Hollick, Matthias (2021):
FastZIP: faster and more secure zero-interaction pairing.
In: MobiSys '21: Proceedings of the 19th Annual International Conference on Mobile Systems, Applications, and Services, S. 440-452,
ACM, 19th Annual International Conference on Mobile Systems, Applications, and Services, virtual Conference, 24.06.-02.07.2021, ISBN 9781450384438,
DOI: 10.1145/3458864.3467883,
[Konferenzveröffentlichung]

Oak, Aditya ; Ahmadian, Amir M. ; Balliu, Musard ; Salvaneschi, Guido (2021):
Language Support for Secure Software Development with Enclaves.
34th IEEE Computer Security Foundations Symposium (CSF 2021), virtual Conference, 21.-24.06.2021, [Konferenzveröffentlichung]

Fereidooni, Hossein ; Marchal, Samuel ; Miettinen, Markus ; Mirhoseini, Azalia ; Möllering, Helen ; Nguyen, Thien Duc ; Rieger, Phillip ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Yalame, Mohammad Hossein ; Zeitouni, Shaza (2021):
SAFELearn: Secure Aggregation for private FEderated Learning.
4th Deep Learning and Security Workshop (DLS'21), virtual Conference, 27.05.2021, [Konferenzveröffentlichung]

Fischlin, Marc ; Rohrbach, Felix (2021):
Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge.
24th International Conference on Practice and Theory of Public-Key Cryptography, virtual Conference, 9.-13.05.2021, [Konferenzveröffentlichung]

Haase, Thorsten ; Alber, Gernot ; Stojanovic, Vladimir M. (2021):
Conversion from W to Greenberger-Horne-Zeilinger states in the Rydberg-blockade regime of neutral-atom systems.
In: Physical Review A, 103 (3), APS Physics, ISSN 2469-9926,
DOI: 10.1103/PhysRevA.103.032427,
[Artikel]

Stojanovic, Vladimir M. (2021):
Scalable W-type entanglement resource in neutral-atom arrays with Rydberg-dressed resonant dipole-dipole interaction.
In: Physical Review A, 103 (2), APS Physics, ISSN 2469-9926,
DOI: 10.1103/PhysRevA.103.022410,
[Artikel]

Nguyen, Thien Duc ; Rieger, Phillip ; Yalame, Mohammad Hossein ; Möllering, Helen ; Fereidooni, Hossein ; Marchal, Samuel ; Miettinen, Markus ; Mirhoseini, Azalia ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza (2021):
FLGUARD: Secure and Private Federated Learning.
In: arXiv-Computer Science, In: Crytography and Security, (Preprint), [Artikel]

Keller, Hannah ; Möllering, Helen ; Schneider, Thomas ; Yalame, Mohammad Hossein (2021):
Privacy - Preserving Clustering.
In: crypto day matters : Beiträge vom 32. Kryptotag,
Gesellschaft für Informatik e.V. / FG KRYPTO, 32. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik, virtual Conference, 15.01.2021, DOI: 10.18420/cdm-2021-32-42,
[Konferenzveröffentlichung]

Alkeilani Alkadri, Nabil ; Harasser, Patrick ; Janson, Christian (2021):
BlindOR: An Efficient Lattice-Based Blind Signature Scheme from OR-Proofs.
20th International Conference on Cryptology and Network Security (CANS 2021), Vienna, Austria, 13.-15.12.2021, [Konferenzveröffentlichung]

Aumayr, Lukas ; Ersoy, Oguzhan ; Erwig, Andreas ; Faust, Sebastian ; Hostáková, Kristina ; Maffei, Matteo ; Moreno-Sanchez, Pedro ; Riahi, Siavash (2021):
Bitcoin-Compatible Virtual Channels.
42nd IEEE Symposium on Security and Privacy, virtual Conference, 23.-27.05.2021, [Konferenzveröffentlichung]

Bahmani, Raad ; Brasser, Ferdinand ; Dessouky, Ghada ; Jauernig, Patrick ; Klimmek, Matthias ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2021):
CURE: A Security Architecture with CUstomizable and Resilient Enclaves.
30th USENIX Security Symposium (USENIX Security'21), Vancouver, Canada, 11.-13.08., [Konferenzveröffentlichung]

Cremers, Cas ; Düzlü, Samed ; Fiedler, Rune ; Fischlin, Marc ; Janson, Christian (2021):
BUFFing signature schemes beyond unforgeability and the case of post-quantum signature.
42nd IEEE Symposium on Security and Privacy, virtual Conference, 23.-27.05.2021, [Konferenzveröffentlichung]

Erwig, Andreas ; Faust, Sebastian ; Hostáková, Kristina ; Maitra, Monosij ; Riahi, Siavash (2021):
Two-Party Adaptor Signatures From Identification Schemes.
24th International Conference on Practice and Theory of Public-Key Cryptography, virtual Conference, 09.-13.05.2021, [Konferenzveröffentlichung]

Faust, Sebastian ; Hazay, Carmit ; Kretzler, David ; Schlosser, Benjamin (2021):
Generic Compiler for Publicly Verifiable Covert Multi-Party Computation.
40th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt 2021), Zagreb, Croatia, 17.-21.10.2021, [Konferenzveröffentlichung]

Fomichev, Mikhail ; Maass, Max ; Hollick, Matthias (2021):
Zero-Interaction Security-Towards Sound Experimental Validation. (Postprint)
In: GetMobile: Mobile Computing and Communications, 23 (2), Association for Computing Machinery (ACM), ISSN 2375-0529, e-ISSN 2375-0537,
DOI: 10.26083/tuprints-00018518,
[Artikel]

Gagliardoni, Tommaso ; Krämer, Juliane ; Struck, Patrick (2021):
Quantum Indistinguishability for Public Key Encryption.
In: Lecture Notes in Computer Science, In: Post-Quantum Cryptography : 12th International Workshop, PQCrypto 2021 Proceedings,
k. A., Springer, PQCrypto 2021 The Twelfth International Conference on Post-Quantum Cryptography, virtual Conference, July 20-22, 2021, ISBN 978-3-030-81292-8,
[Konferenzveröffentlichung]

Hagen, Christoph ; Weinert, Christian ; Sendner, Christoph ; Dmitrienko, Alexandra ; Schneider, Thomas (2021):
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers.
Internet Society, 28. Annual Network and Distributed System Security Symposium (NDSS'21), San Diego, California, USA, 21.-24.02. 2021, [Konferenzveröffentlichung]

Hedge, Aditya ; Möllering, Helen ; Schneider, Thomas ; Yalame, Mohammad Hossein (2021):
SoK: Efficient Privacy-preserving Clustering.
21st Privacy Enhancing Technologies Symposium (PETS 2021), virtual Conference, 12.-16.07.2021, [Konferenzveröffentlichung]

Muth, Philipp ; Geihs, Matthias ; Arul, Tolga ; Buchmann, Johannes ; Katzenbeisser, Stefan (2021):
ELSA: efficient long-term secure storage of large datasets (full version). (Verlagsversion)
In: EURASIP Journal on Information Security, 2020 (9), S. 1-20. Springer, ISSN 2510-523X,
DOI: 10.26083/tuprints-00017511,
[Artikel]

Niesler, Christian ; Surminski, Sebastian ; Davi, Lucas (2021):
HERA: Hotpatching of Embedded Real-time Applications.
Internet Society, 28th Network and Distributed System Security Symposium (NDSS) 2021, virtual Conference, 21.-25.02.2021, [Konferenzveröffentlichung]

Patra, Arpita ; Schneider, Thomas ; Suresh, Ajith ; Yalame, Mohammad Hossein (2021):
ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation.
30th USENIX Security Symposium (USENIX Security'21), Vancouver, Canada, 11.-13.08.2021, [Konferenzveröffentlichung]

Rodler, Michael ; Li, Wenting ; Karame, Ghassan O. ; Davi, Lucas (2021):
EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts.
30th USENIX Security Symposium, Vancouver, Canada, 11.-13.08.2021, [Konferenzveröffentlichung]

Weber, Alexandra ; Nikiforov, Oleg ; Sauer, Alexander ; Schickel, Johannes ; Alber, Gernot ; Mantel, Heiko ; Walther, Thomas (2021):
Cache-Side-Channel Quantification and Mitigation for Quantum Cryptography.
26th European Symposium on Research in Computer Security (ESORICS), virtual Conference, 04.-08.2021, [Konferenzveröffentlichung]

Zeitouni, Shaza ; Dessouky, Ghada ; Sadeghi, Ahmad-Reza (2021):
SoK: Secure FPGA Multi-Tenancy in the Cloud: Challenges and Opportunities.
6th IEEE European Symposium on Security and Privacy (Euro S&P 2021), virtual Conference, 06.-10.09.2021, [Konferenzveröffentlichung]

Zeitouni, Shaza ; Vliegen, Jo ; Frassetto, Tommaso ; Koch, Dirk ; Sadeghi, Ahmad-Reza ; Mentens, Nele (2021):
Trusted Configuration in Cloud FPGAs.
29th IEEE International Symposium on Field-Programmable Custom Computing Machines, virtual Conference, 09.-12.05.2021, [Konferenzveröffentlichung]

2020

Baumgärtner, Lars ; Dmitrienko, Alexandra ; Freisleben, Bernd ; Gruler, Alexander ; Höchst, Jonas ; Kühlberg, Joshua ; Mezini, Mira ; Mitev, Richard ; Miettinen, Markus ; Muhamedagic, Anel ; Nguyen, Thien Duc ; Penning, Alvar ; Pustelnik, Frederik ; Roos, Filipp ; Sadeghi, Ahmad-Reza ; Schwarz, Michael ; Uhl, Christian (2020):
Mind the GAP: Security & Privacy Risks of Contact Tracing Apps.
In: Proceedings : 2020 IEEE 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, S. 458-467,
IEEE, TrustCom 2020, virtual Conference, 29.12.2020-01.01.2021, ISBN 978-0-7381-4380-4,
[Konferenzveröffentlichung]

Lauinger, Johannes ; Baumgärtner, Lars ; Wickert, Anna-Katharina ; Mezini, Mira (2020):
Uncovering the Hidden Dangers: Finding Unsafe Go Code in the Wild.
In: Proceedings : 2020 IEEE 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, S. 410-417,
IEEE, TrustCom 2020, virtual Conference, 29.12.2020-01.01.2021, ISBN 978-0-7381-4380-4,
[Konferenzveröffentlichung]

Fischlin, Marc ; Günther, Felix ; Muth, Philipp (2020):
Information-Theoretic Security of Cryptographic Channels.
In: Information and Communications Security, S. 295-311,
Springer Nature, 22nd International Conference on Information and Communications Security (ICICS 2020), virtual Conference, 24.-26.08.2021, ISBN 978-3-030-61078-4,
DOI: 10.1007/978-3-030-61078-4_17,
[Konferenzveröffentlichung]

Sokolowski, Daniel ; Lehr, Jan-Patrick ; Bischof, Christian ; Salvaneschi, Guido (2020):
Leveraging Hybrid Cloud HPC with Multitier Reactive Programming.
In: Proceedings of SuperCompCloud 2020: 3rd Workshop on Interoperability of Supercomputing and Cloud Technologies, S. 27-32,
IEEE, 3rd International Workshop on Interoperability of Supercomputing and Cloud Technologies, Virtual Conference, 11.11.2020, ISBN 978-0-7381-1055-4,
DOI: 10.1109/SuperCompCloud51944.2020.00010,
[Konferenzveröffentlichung]

Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020):
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference (Extended Abstract).
ACM, Privacy Preserving Machine Learning in Practice (PPMLP'20) – CCS 2020 Workshop, Orlando, USA, 09.-13.11., [Konferenzveröffentlichung]

Helm, Dominik ; Kübler, Florian ; Reif, Michael ; Eichberg, Michael (2020):
Modular Collaborative Program Analysis in OPAL.
S. 184-196, ACM, 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2020), virtual Conference, 06.-16.11., DOI: 10.1145/3368089.3409765,
[Konferenzveröffentlichung]

Nguyen, Thien Duc ; Miettinen, Markus ; Sadeghi, Ahmad-Reza (2020):
Long Live Randomization: On Privacy-Preserving Contact Tracing in Pandemic.
In: MTD'20: Proceedings of the 7th ACM Workshop on Moving Target Defense,
ACM, CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, virtual Conference, 09.-13.11.2020, ISBN 978-1-4503-8085-0,
DOI: 10.1145/3411496.3421229,
[Konferenzveröffentlichung]

Schneider, Thomas (2020):
Engineering Privacy-Preserving Machine Learning Protocols.
2020 Workshop on Privacy-Preserving Machine Learning in Practice (PPMLP’20), virtual Conference, 09.11., [Konferenzveröffentlichung]

Treiber, Amos ; Molina, Alejandro ; Weinert, Christian ; Schneider, Thomas ; Kersting, Kristian (2020):
CryptoSPN: Expanding PPML beyond Neural Networks.
ACM, Privacy Preserving Machine Learning in Practice (PPMLP'20) – CCS 2020 Workshop, virtual Conference, 09.-13.11.20202, ISBN 978-1-4503-8088-1,
[Konferenzveröffentlichung]

Treiber, Amos ; Molina, Alejandro ; Weinert, Christian ; Schneider, Thomas ; Kersting, Kristian (2020):
CryptoSPN: Expanding PPML beyond Neural Networks (Contributed Talk).
The 2nd Privacy-Preserving Machine Learning Workshop, virtual Conference, 16.08.2020, [Konferenzveröffentlichung]

Buchmann, Johannes ; Dessouky, Ghada ; Frassetto, Tommaso ; Kiss, Ágnes ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Traverso, Giulia ; Zeitouni, Shaza (2020):
SAFE: A Secure and Efficient Long-Term Distributed Storage System.
8th International Workshop on Security in Blockchain and Cloud Computing (SBC'20), Taipei, Taiwan, June 1-5, 2020, [Konferenzveröffentlichung]

Büscher, Niklas ; Demmler, Daniel ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Krämer, Juliane ; Rathee, Deevashwer ; Schneider, Thomas ; Struck, Patrick (2020):
Secure Two-Party Computation in a Quantum world.
18th International Conference on Applied Cryptography and Network Security (ACNS'20), virtual Conference, 19.-22.10.2020, [Konferenzveröffentlichung]

Glanz, Leonid ; Müller, Patrick ; Baumgärtner, Lars ; Reif, Michael ; Anthonysamy, Pauline ; Mezini, Mira (2020):
Hidden in Plain Sight:Obfuscated Strings Threatening Your Privacy.
In: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, S. 694-707,
ACM, 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS '20), virtual Conference, 05.-09.10, ISBN 978-1-4503-6750-9,
DOI: 10.1145/3320269.3384745,
[Konferenzveröffentlichung]

Salvaneschi, Guido ; Wirth, Johannes ; Weisenburger, Pascal (2020):
A survey of multitier programming.
In: ACM Computing Surveys, 53 (4), ACM, ISSN 03600300,
DOI: 10.1145/3397495,
[Artikel]

Holz, Marco ; Kiss, Ágnes ; Rathee, Deevashwer ; Schneider, Thomas (2020):
Linear-Complexity Private Function Evaluation is Practical.
25. European Symposium on Research in Computer Security (ESORICS'20), virtual Conference, 14.-18.09.2020, [Konferenzveröffentlichung]

Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020):
MP2ML: A mixed-protocol machine learning framework for private inference.
15th International Conference on Availability, Reliability and Security (ARES'20), virtual Conference, 25.-28.08, [Konferenzveröffentlichung]

Cammarota, Rosario ; Schunter, Matthias ; Rajan, Anand ; Boemer, Fabian ; Kiss, Ágnes ; Treiber, Amos ; Weinert, Christian ; Schneider, Thomas ; Stapf, Emmanuel ; Sadeghi, Ahmad-Reza ; Demmler, Daniel ; Chen, Huili ; Hussain, Siam Umar ; Riazi, M. Sadegh ; Koushanfar, Farinaz ; Gupta, Saransh ; Rosing, Tajan Simunic ; Chaudhuri, Kamalika ; Nejatollahi, Hamid ; Dutt, Nikil ; Imani, Mohsen ; Laine, Kim ; Dubey, Anuj ; Aysu, Aydin ; Sadat Hosseini, Fateme ; Yang, Chengmo ; Wallace, Eric ; Norton, Pamela (2020):
Trustworthy AI Inference Systems: An Industry Research View.
In: Cryptography and Security, (Preprint), Version 1, arXiv, 2008.04449, [Report]

Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020):
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference (Contributed Talk).
The 2nd Privacy-Preserving Machine Learning Workshop, virtual Conference, 16.08.2020, [Konferenzveröffentlichung]

Cloosters, Tobias ; Rodler, Michael ; Davi, Lucas (2020):
TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves.
29th USENIX Security Symposium, virtual Conference, August 12.–14.2020, [Konferenzveröffentlichung]

Tillmanns, Jörn ; Classen, Jiska ; Rohrbach, Felix ; Hollick, Matthias (2020):
Firmware Insider: Bluetooth Randomness is Mostly Random.
14th USENIX Workshop on Offensive Technologies (WOOT 2020), virtual Conference, 11.08., [Konferenzveröffentlichung]

Heinze, Dennis ; Classen, Jiska ; Rohrbach, Felix (2020):
MagicPairing: Apple’s Take on Securing Bluetooth Peripherals.
13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, VIRTUAL, July 08.-10., 2020, DOI: 10.1145/3395351.3399343,
[Konferenzveröffentlichung]

Helm, Dominik ; Kübler, Florian ; Kölzer, Jan Thomas ; Haller, Philipp ; Eichberg, Michael ; Salvaneschi, Guido ; Mezini, Mira (2020):
A Programming Model for Semi-implicit Parallelization of Static Analyses.
S. 428-439, ACM, ISSTA '20: 29th SIGSOFT International Symposium on Software Testing and Analysis, virtual Conference, 18.-22.07., ISBN 978-1-4503-8008-9,
DOI: 10.1145/3395363.3397367,
[Konferenzveröffentlichung]

Shrishak, Kris ; Shulman, Haya (2020):
Limiting the Power of RPKI Authorities.
ACM, Proceedings of the Applied Networking Research Workshop (ANRW'20), Online Workshop, 30.-31.07., [Konferenzveröffentlichung]

Dessouky, Ghada ; Frassetto, Tommaso ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza (2020):
With Great Complexity Comes Great Vulnerability: Challenges of Secure Processor Design.
In: IEEE Security & Privacy, IEEE, ISSN 1540-7993,
DOI: 10.1109/MSEC.2020.2994978,
[Artikel]

Reif, Michael ; Kübler, Florian ; Helm, Dominik ; Hermann, Ben ; Eichberg, Michael ; Mezini, Mira (2020):
TACAI: An Intermediate Representation Based on Abstract Interpretation.
S. 2-7, SOAP 2020-9th ACM SIGPLAN International Workshop on the State Of the Art in Program Analysis, London, UK, June 2020, ISBN 9781450379977,
DOI: 10.1145/3394451.3397204,
[Konferenzveröffentlichung]

Stojanovic, Vladimir M. (2020):
Bare-Excitation Ground State of a Spinless-Fermion–Boson Model and W-State Engineering in an Array of Superconducting Qubits and Resonators.
In: Physical Review Letters, 124 (19), S. 190504. ISSN 0031-9007,
DOI: 10.1103/PhysRevLett.124.190504,
[Artikel]

Nieminen, Raine ; Järvinen, Kimmo (2020):
Practical Privacy-Preserving Indoor Localization based on Secure Two-Party Computation.
In: IEEE Transactions on Mobile Computing, IEEE, ISSN 1536-1233,
DOI: 10.1109/TMC.2020.2990871,
[Artikel]

Alhassan, Masaud Y. ; Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas (2020):
Efficient and Scalable Universal Circuits.
In: Journal of Cryptology (JoC), Springer, DOI: 10.1007/s00145-020-09346-z,
[Artikel]

Stojanovic, Vladimir M. (2020):
Entanglement-spectrum characterization of ground-state nonanalyticities in coupled excitation-phonon models.
In: Physical Review B, 101 (13), American Physical Society, ISSN 2469-9950,
DOI: 10.1103/PhysRevB.101.134301,
[Artikel]

Dessouky, Ghada ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020):
Enclave Computing on RISC-V: A Brighter Future for Security?
1st International Workshop on Secure RISC-V Architecture Design Exploration (SECRISC-V), co-located with ISPASS-2020, Boston, USA, 5.-7. April, 2020, [Konferenzveröffentlichung]

Krämer, Juliane ; Struck, Patrick (2020):
Encryption Schemes using Random Oracles: from Classical to Post-Quantum Security.
11th International Conference on Post-Quantum Cryptography (PQCrypto 2020), virtual Conference, 21.-23.09.2020, [Konferenzveröffentlichung]

Krämer, Juliane ; Struck, Patrick (2020):
Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions.
11th International Workshop on Constructive Side-Channel Analysis and Secure Design(COSADE 2020), Lugano, Switzerland, 05.-07.10.2020, [Konferenzveröffentlichung]

Alkim, Erdem ; Barreto, Paulo S. L. M. ; Bindel, Nina ; Krämer, Juliane ; Longa, Patrick ; Ricardini, Jefferson E. (2020):
The Lattice-Based Digital Signature Scheme qTESLA.
18th International Conference on Applied Cryptography and Network Security (ACNS 2020), virtual Conference, 19-22.10.2020, [Konferenzveröffentlichung]

Stonner, David Jakob ; Kysela, Jaroslav ; Weir, Graeme ; Novotny, Jaroslav ; Alber, Gernot ; Jex, Igor (2020):
Deterministic twirling with low resources.
In: Physics letters A, 384 (8), Elsevier, ISSN 0375-9601,
DOI: 10.1016/j.physleta.2019.126179,
[Artikel]

Bayerl, Sebastian P. ; Frassetto, Tommaso ; Jauernig, Patrick ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Weinert, Christian (2020):
Offline Model Guard: Secure and Private ML on Mobile Devices.
23. Design, Automation and Test in Europe Conference (DATE '20), Grenoble, France, 09. – 13. March 2020, [Konferenzveröffentlichung]

Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020):
Trusted Execution Environments: Properties, Applications, and Challenges.
In: IEEE Security & Privacy, 18 (2), S. 56-60. IEEE, e-ISSN 1558-4046,
DOI: 10.1109/MSEC.2019.2947124,
[Artikel]

Schneider, Thomas ; Treiber, Amos (2020):
A Comment on Privacy-Preserving Scalar Product Protocols as proposed in "SPOC".
In: IEEE Transactions on Parallel and Distributed Systems, IEEE, DOI: 10.1109/TPDS.2019.2939313,
[Artikel]

Weisenburger, Pascal ; Salvaneschi, Guido (2020):
Implementing a Language for Distributed Systems: Choices and Experiences with Type Level and Macro Programming in Scala.
In: The Art, Science, and Engineering of Programming, 4 (3), S. 17:1-17:29. AOSA, Inc, ISSN 2473-7321,
DOI: 10.22152/programming-journal.org/2020/4/17,
[Artikel]

Javadi, Mohammad ; Yalame, Mohammad Hossein ; Mahdiani, Hamid Reza (2020):
Small Constant Mean-Error Imprecise Adder/Multiplier for Efficient VLSI Implementation of MAC-based Applications.
In: Transactions on Computers, 2020, IEEE, ISSN 0018-9340, e-ISSN 1557-9956,
DOI: 10.1109/TC.2020.2972549,
[Artikel]

Sauer, Alexander ; Alber, Gernot (2020):
Quantum Bounds on Detector Efficiencies for Violating Bell Inequalities Using Semidefinite Programming.
4, In: Cryptography, 2020 (1), MDPI, DOI: 10.3390/cryptography4010002,
[Artikel]

Treiber, Amos ; Molina, Alejandro ; Weinert, Christian ; Schneider, Thomas ; Kersting, Kristian (2020):
CryptoSPN: Privacy-preserving Sum-Product Network Inference.
24th European Conference on Artificial Intelligence (ECAI'20), Santiago de Compostela, 8.-12. June 2020, [Konferenzveröffentlichung]

Acar, Abbas ; Fereidooni, Hossein ; Abera, Tigist ; Sikder, Amit Kumsr ; Miettinen, Markus ; Aksu, Hidayet ; Conti, Mauro ; Sadeghi, Ahmad-Reza (2020):
Peek-a-Boo: I see your smart home activities, even encrypted!
S. 207-218, WiSec 2020: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, virtual Conference, July 08.-10., 2020, [Konferenzveröffentlichung]

Adepu, Sridhar ; Brasser, Ferdinand ; Garcia, Luis ; Rodler, Michael ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Zonouz, Saman A. (2020):
Control Behavior Integrity for Distributed Cyber-Physical Systems.
In: 2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS), S. 1-15,
k. A., ACM/IEEE, 11th International Conference on Cyber-Physical Systems (ICCPS), Sydney, Australia, 22.-24. April, 2020, ISBN 978-1-7281-5501-2,
DOI: 10.1109/ICCPS48487.2020.00011,
[Konferenzveröffentlichung]

Alkeilani Alkadri, Nabil ; Bansarkhani, Rachid El ; Buchmann, Johannes (2020):
BLAZE: Practical Lattice-Based Blind Signatures for Privacy-Preserving Applications.
S. 484-502, Springer, 24th International Conference on Financial Cryptography and Data Security (FC'20), Kota Kinabalu, Malaysia, 10.-14.02., ISBN 978-3-030-51279-8,
[Konferenzveröffentlichung]

Alkeilani Alkadri, Nabil ; Bansarkhani, Rachid El ; Buchmann, Johannes (2020):
On Lattice-Based Interactive Protocols: An Approach with Less or No Aborts.
S. 41-61, Springer, The 25th Australasian Conference on Information Security and Privacy (ACISP'20), Perth, Australia, 30.11.-02.12., ISBN 978-3-030-55303-6,
[Konferenzveröffentlichung]

Alkeilani Alkadri, Nabil ; Das, Poulami ; Erwig, Andreas ; Faust, Sebastian ; Krämer, Juliane ; Riahi, Siavash ; Struck, Patrick (2020):
Deterministic Wallets in a Quantum World.
ACM, The 27th ACM Conference on Computer and Communications Security (CCS 2020), virtual Conference, 09.-13.11., [Konferenzveröffentlichung]

Bauspieß, Pia ; Kolberg, Jascha ; Demmler, Daniel ; Krämer, Juliane ; Busch, Christoph (2020):
Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection.
IEEE, 12th IEEE International Workshop on Information Forensics and Security (WIFS 2020), virtual Conference, 06.-11.12., [Konferenzveröffentlichung]

Bock, Estuardo Alpirez ; Brzuska, Chris ; Fischlin, Marc ; Janson, Christian ; Michiels, Wil (2020):
Security Reductions for White-Box Key-Storage in Mobile Payments.
Asiacrypt 2020 - 26th Annual International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, Korea, 06.-10.12., [Konferenzveröffentlichung]

Brandt, Markus ; Orlandi, Claudio ; Shrishak, Kris ; Shulman, Haya (2020):
Optimal Transport Layer for Secure Computation.
SECRYPT 2020-The 17th International Conference on Security and Cryptography, virtual Conference, 08.-10.07., [Konferenzveröffentlichung]

Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix ; Janson, Christian ; Stebila, Douglas (2020):
Towards Post-Quantum Security for Signal's X3DH Handshake.
27th Selected Areas in Cryptography (SAC 2020), virtual Conference, 19.-23.10., [Konferenzveröffentlichung]

Dalskov, Anders ; Keller, Marcel ; Orlandi, Claudio ; Shrishak, Kris ; Shulman, Haya (2020):
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC.
ESORICS 2020-The 25th European Symposium on Research in Computer Security, virtual Conference, 14.-18.09, [Konferenzveröffentlichung]

Davies, Gareth T. ; Janson, Christian ; Martin, Daniel P. (2020):
Client-oblivious OPRAM.
The 22nd International Conference on Information and Communications Security (ICICS 2020), virtual Conference, 24.-27.08., [Konferenzveröffentlichung]

Dessouky, Ghada ; Frassetto, Tommaso ; Sadeghi, Ahmad-Reza (2020):
HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments.
In: USENIX Security,
k.A., USENIX Association, 29th USENIX Security Syposium, Boston, MA, USA, 12.-14.08.2020, [Konferenzveröffentlichung]

Dessouky, Ghada ; Jauernig, Patrick ; Mentens, Nele ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020):
INVITED: AI Utopia or Dystopia - On Securing AI Platforms.
DAC'20-Design Automation Conference 2020, virtual Conference, 20.-24.07., [Konferenzveröffentlichung]

Eckey, Lisa ; Faust, Sebastian ; Schlosser, Benjamin (2020):
OptiSwap: Fast Optimistic Fair Exchange.
S. 543-557, ACM, 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS '20), virtual Conference, 05.-09.10., ISBN 978-1-4503-6750-9,
DOI: 10.1145/3320269.3384749,
[Konferenzveröffentlichung]

Erwig, Andreas ; Hesse, Julia ; Orlt, Maximilian ; Riahi, Siavash (2020):
Fuzzy Asymmetric Password-Authenticated Key Exchange.
26th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2020), virtual Conference, 07.-11.12., [Konferenzveröffentlichung]

Fischlin, Marc ; Harasser, Patrick ; Janson, Christian (2020):
Signatures from Sequential-OR Proofs.
EUROCRYPT 2020: 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, 10.-14. May 2020, [Konferenzveröffentlichung]

Hlavacek, Tomas ; Cunha, Italo ; Gilad, Yossi ; Herzberg, Amir ; Katz-Bassett, Ethan ; Schapira, Michael ; Shulman, Haya (2020):
DISCO: Sidestepping RPKI's Deployment Barriers.
Network and Distributed Systems Security Symposium (NDSS 2020), San Diego, USA, 23.-26. Febr., [Konferenzveröffentlichung]

Jeitner, Philipp ; Shulman, Haya ; Waidner, Michael (2020):
The Impact of DNS Insecurity on Time.
DSN2020 - 50th International Conference on Dependable Systems and Networks, virtual Conference, 29.06.-02.07., [Konferenzveröffentlichung]

Jeitner, Philipp ; Shulman, Haya ; Waidner, Michael (2020):
Pitfalls of Provably Secure Systems in Internet - The Case of Chronos-NTP.
DSN 2020-International Conference on Dependable Systems and Networks, virtual Conference, 29.06.-02.07, [Konferenzveröffentlichung]

Jeitner, Philipp ; Shulman, Haya ; Waidner, Michael (2020):
Secure Consensus Generation with Distributed DoH.
DSN 2020-International Conference on Dependable Systems and Networks, virtual Conference, 29.06.-02.07., [Konferenzveröffentlichung]

Kenjar, Zijo ; Frassetto, Tommaso ; Gens, David ; Franz, Michael ; Sadeghi, Ahmad-Reza (2020):
V0LTpwn: Attacking x86 Processor Integrity from Software.
29th USENIX Security Symposium, Boston, USA, August 12–14, 2020, [Konferenzveröffentlichung]

Krämer, Juliane ; Struck, Patrick (2020):
Security of Public Key Encryption against Resetting Attacks.
21st International Conference on Cryptology in India (Indocrypt 2020), virtual Conference, 13.-16.12., [Konferenzveröffentlichung]

Krüger, Stefan ; Ali, Karim ; Bodden, Eric (2020):
CogniCrypt_GEN - Generating Code for the Secure Usage of Crypto APIs.
International Symposium on Code Generation and Optimization, San Diego, CA, USA, February 22.-26., 2020, [Konferenzveröffentlichung]

Lohr, Matthias ; Schlosser, Benjamin ; Jürjens, Jan ; Staab, Matthias (2020):
Cost Fairness for Blockchain-Based Two-Party Exchang Protocols.
3rd IEEE International Conference on Blockchain, virtual Conference, 02.-06.11.2020, [Konferenzveröffentlichung]

Mantel, Heiko ; Scheidel, Lukas ; Schneider, Thomas ; Weber, Alexandra ; Weinert, Christian ; Weißmantel, Tim (2020):
RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation.
19. International Conference on Cryptology And Network Security (CANS'20), virtual Conference, 14.-16.12., [Konferenzveröffentlichung]

Mitev, Richard ; Pazii, Anna ; Miettinen, Markus ; Enck, William ; Sadeghi, Ahmad-Reza (2020):
LeakyPick: IoT Audio Spy Detector.
In: ICPS Proceedings, In: ACSAC '20: Annual Computer Security Applications Conference, S. 694-705,
ACM, 36th Annual Computer Security Applications Conference, virtual Conference, 07.-11.12.2020, ISBN 978-1-4503-8858-0,
DOI: 10.1145/3427228.3427277,
[Konferenzveröffentlichung]

Nguyen, Thien Duc ; Rieger, Phillip ; Miettinen, Markus ; Sadeghi, Ahmad-Reza (2020):
Poisoning Attacks on Federated Learning-based IoT Intrusion Detection System.
Workshop on Decentralized IoT Systems and Security (DISS) @ NDSS Symposium 2020, San Diego, USA, 23.-26.02. 2020, [Konferenzveröffentlichung]

Oesch, Sean ; Abu-Salma, Ruba ; Krämer, Juliane ; Wu, Justin ; Diallo, Oumar ; Ruoti, Scott (2020):
Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK.
ACM, Annual Computer Security Applications Conference (ACSAC 2020), virtual Conference, 07.-11.12., [Konferenzveröffentlichung]

Roth, Johannes ; Karatsiolis, Vangelis ; Krämer, Juliane (2020):
Classic McEliece Implementation with Low Memory Footprint.
19th Smart Card Research and Advanced Application Conference (CARDIS 2020), virtual Conference, 18.-19.11., [Konferenzveröffentlichung]

Schneider, Markus ; Shulman, Haya ; Sidis, Adi ; Sidis, Ravid ; Waidner, Michael (2020):
Diving into Email Bomb Attack.
DSN 2020-International Conference on Dependable Systems and Networks, virtual Conference, 29.06.-02.07., [Konferenzveröffentlichung]

Shrishak, Kris ; Shulman, Haya (2020):
MPC for Securing Internet Infrastructure.
IEEE, 50th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2020), virtual Conference, 29.06.-02.07., [Konferenzveröffentlichung]

Zeitouni, Shaza ; Stapf, Emmanuel ; Fereidooni, Hossein ; Sadeghi, Ahmad-Reza (2020):
On the Security of Strong Memristor-based Physically Unclonable Functions.
Design Automation Conference 2020, virtual Conference, 19.-22.07., [Konferenzveröffentlichung]

2019

Krämer, Juliane ; Marzougui, Soundes (2019):
Post-Quantum Cryptography in Embedded Systems.
In: ARES '19: Proceedings of the 14th International Conference on Availability, Reliability and Security,
ACM, 14th International Conference on Availability, Reliability and Security, Canterbury, United Kingdom, 26.-29.08.2019, ISBN 978-1-4503-7164-3,
DOI: 10.1145/3339252.3341475,
[Konferenzveröffentlichung]

Schuster, Tom (2019):
Optimizing HyCC with Compiler Intermediate Representation.
Darmstadt, TU Darmstadt, [Bachelorarbeit]

Brasser, Ferdinand ; Capkun, Srdjan ; Dmitrienko, Alexandra ; Frassetto, Tommaso ; Kostiainen, Kari ; Sadeghi, Ahmad-Reza (2019):
DR.SGX: Automated and Adjustable Side-Channel Protection for SGX using Data Location Randomization.
ACSAC - 35th Annual Computer Security Applications Conference, San Juan, Puerto Rico, December 9-13, [Konferenzveröffentlichung]

Degabriele, Jean Paul ; Janson, Christian ; Struck, Patrick (2019):
Sponges Resist Leakage: The Case of Authenticated Encryption.
ASIACRYPT 2019 - 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, 08.-12.12., [Konferenzveröffentlichung]

Bayerl, Sebastian P. ; Brasser, Ferdinand ; Busch, Christoph ; Frassetto, Tommaso ; Jauernig, Patrick ; Kolberg, Jascha ; Nautsch, Andreas ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Treiber, Amos ; Weinert, Christian (2019):
Privacy-preserving speech processing via STPC and TEEs (Poster).
2. Privacy Preserving Machine Learning (PPML) – CCS 2019 Workshop, London, 15. November 2019, [Konferenzveröffentlichung]

Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix ; Stebila, Douglas (2019):
Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms.
Cryptology ePrint Archive, 2019/1356, [Report]

Das, Poulami ; Faust, Sebastian ; Loss, Julian (2019):
A Formal Treatment of Deterministic Wallets.
ACM CCS 2019 - Symposium on Computer and Communications Security, London, UK, November, 11th -15th, [Konferenzveröffentlichung]

Dessouky, Ghada ; Zeitouni, Shaza ; Ibrahim, Ahmad ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2019):
CHASE: A Configurable Hardware-Assisted Security Extension for Real-Time Systems.
New York, IEEE, 2019 International Conference On Computer Aided Design (ICCAD), The Westin Westminster Westminster, CO, 4.-7. November 2019, [Konferenzveröffentlichung]

Felsen, Susanne ; Kiss, Ágnes ; Schneider, Thomas ; Weinert, Christian (2019):
Secure and Private Function Evaluation with Intel SGX.
CCSW 2019 - The ACM Cloud Computing Security Workshop, London, UK, November, 11th, 2019, [Konferenzveröffentlichung]

Fomichev, Mikhail ; Maass, Max ; Hollick, Matthias (2019):
Zero-Interaction Security - Towards Sound Experimental Validation.
In: GetMobile: Mobile Computing and Communications, 23 (2), S. 16-21. ISSN 23750529,
DOI: 10.1145/3372300.3372304,
[Artikel]

Günther, Daniel ; Kiss, Ágnes ; Scheidel, Lukas ; Schneider, Thomas (2019):
Poster: Framework for Semi-private Function Evaluation with Application to Secure Insurance Rate Calculation.
ACM, ACM CCS 2019, London, November 11-15, 2019, DOI: 10.1145/3319535.3363251,
[Konferenzveröffentlichung]

Köhler, Mirco ; Salvaneschi, Guido (2019):
Automated Refactoring to Reactive Programming.
ASE'19 - The 34th International Conference on Automated Software Engineering, San Diego, Ca, USA, November 10.-15.,2019, DOI: 10.1109/ASE.2019.00082,
[Konferenzveröffentlichung]

Nautsch, Andreas ; Jiménez, Abelino ; Treiber, Amos ; Kolberg, Jascha ; Jasserand, Catherine ; Kindt, Els ; Delgado, Héctor ; Todisco, Massimiliano ; Hmani, Mohamed Amine ; Mtibaa, Aymen ; Abdelraheem, Mohammed Ahmed ; Abad, Alberto ; Teixeira, Francisco ; Matrouf, Driss ; Gomez-Barrero, Marta ; Petrovska-Delacrétaz, Dijana ; Chollet, Gérard ; Evans, Nicholas ; Schneider, Thomas ; Bonastre, Jean-François ; Raj, Bhiksha ; Trancoso, Isabel ; Busch, Christoph (2019):
Preserving Privacy in Speaker and Speech Characterisation.
In: Computer Speech and Language, 58, S. 441-480. Elsevier, ISSN 0885-2308,
DOI: 10.1016/j.csl.2019.06.001,
[Artikel]

Nguyen, Giang Nam (2019):
Developing Performance Models for Codes with Exponential Runtime Behavior.
Darmstadt, TU Darmstadt, [Masterarbeit]

Reith, Robert Nikolai ; Schneider, Thomas ; Tkachenko, Oleksandr (2019):
Efficiently Stealing your Machine Learning Models.
In: Proceedings of the 2019 Workshop on Privacy in the Electronic Society,
WPES'19 - 18. Workshop on Privacy in the Electronic Society, London, UK, November, 11th, [Konferenzveröffentlichung]

Treiber, Amos ; Nautsch, Andreas ; Kolberg, Jascha ; Schneider, Thomas ; Busch, Christoph (2019):
Privacy-preserving PLDA speaker verification using outsourced secure computation.
In: Speech Communication, Elsevier, DOI: 10.1016/j.specom.2019.09.004,
[Artikel]

Zaidan, Firas (2019):
Developing a Fuzzing Framework for ARM TrustZone.
Darmstadt, TU Darmstadt, [Masterarbeit]

Fladung, Lukas ; Nikolopoulos, Georgios M. ; Alber, Gernot ; Fischlin, Marc (2019):
Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys.
In: Cryptography, 3 (4), MDPI, DOI: 10.3390/cryptography3040025,
[Artikel]

Krüger, Stefan ; Späth, Johannes ; Ali, Karim ; Bodden, Eric ; Mezini, Mira (2019):
CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.
In: IEEE Transactions on Software Engineering, 2019, Institute of Electrical and Electronics Engineers, ISSN 1939-3520,
DOI: 10.1109/TSE.2019.2948910,
[Artikel]

Järvinen, Kimmo ; Kiss, Ágnes ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng (2019):
Faster Privacy-Preserving Location Proximity Schemes for Circles and Polygons.
In: IET Information Security, DOI: 10.1049/iet-ifs.2019.0125,
[Artikel]

Brendel, Jacqueline (2019):
Future-Proofing Key Exchange Protocols.
Darmstadt, Technische Universität,
DOI: 10.25534/tuprints-00009642,
[Dissertation]

Buchmann, Johannes ; Geihs, Matthias ; Hamacher, Kay ; Katzenbeisser, Stefan ; Stammler, Sebastian (2019):
Long-term integrity protection of genomic data.
In: EURASIP Journal on Information Security, S. 16. SpringerOpen, DOI: 10.1186/s13635-019-0099-x,
[Artikel]

Fischlin, Marc ; Haagh, Helene (2019):
How to Sign with White-Boxed AES.
Santiago de Chile, Springer, Latincrypt 2019, Oct. 2–4, 2019, [Konferenzveröffentlichung]

Krämer, Juliane (2019):
Post-Quantum Cryptography and its Application to the IoT.
In: Informatik Spektrum, 42 (5), S. 343-344. Springer Heidelberg, ISSN 0170-6012,
DOI: 10.1007/s00287-019-01200-2,
[Artikel]

Rathee, Deevashwer ; Schneider, Thomas ; Shukla, K. K. (2019):
Improved multiplication triple generation over rings via RLWE-based AHE.
18. International Conference on Cryptology And Network Security (CANS'19), Fuzhou, China, 25-27 October 2019, [Konferenzveröffentlichung]

Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix (2019):
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids.
S. 521-541, ESORICS 2019 - The European Symposium on Research in Computer Security, Luxembourg, 23.-27.09.2019, ISBN 978-3-030-29962-0,
[Konferenzveröffentlichung]

Nikolopoulos, Georgios M. (2019):
Optical scheme for cryptographic commitments with physical unclonable keys.
In: Optical Express, 27 (20), S. 29367-29379. DOI: 10.1364/OE.27.029367,
[Artikel]

Stonner, David Jakob (2019):
Construction of Random Unitary Operations for Asymptotic Preparation of Werner States.
Darmstadt, Technische Universität Darmstadt, [Bachelorarbeit]

Bindel, Nina ; Braun, Johannes ; Gladiator, Luca ; Stöckert, Tobias ; Wirth, Johannes (2019):
X.509-Compliant Hybrid Certificates for the Post-Quantum Transition.
In: Journal of Open Source Software, 4 (40), The Open Journal, ISSN 2475-9066,
DOI: 10.21105/joss.01606,
[Artikel]

Reif, Michael ; Kübler, Florian ; Eichberg, Michael ; Helm, Dominik ; Mezini, Mira (2019):
Judge: Identifying, Understanding, and Evaluating Sources of Unsoundness in Call Graphs.
S. 251-261, 28th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA'19), Beijing, China, 15.07.-19.0.7. 2019, ISBN 978-1-4503-6224-5,
DOI: 10.1145/3293882.3330555,
[Konferenzveröffentlichung]

Das, Poulami ; Eckey, Lisa ; Frassetto, Tommaso ; Gens, David ; Hostáková, Kristina ; Jauernig, Patrick ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2019):
FastKitten: Practical Smart Contracts on Bitcoin.
28th USENIX Security Symposium, Santa Clara, CA, USA, 14.-16.08.2019, [Konferenzveröffentlichung]

Kales, Daniel ; Rechberger, Christian ; Schneider, Thomas ; Senker, Matthias ; Weinert, Christian (2019):
Mobile Private Contact Discovery at Scale.
USENIX, 28. USENIX Security Symposium (USENIX Security'19), [Konferenzveröffentlichung]

Nautsch, Andreas ; Patino, Jose ; Treiber, Amos ; Stafylakis, Themos ; Mezira, Petr ; Todisco, Massimiliano ; Schneider, Thomas ; Evans, Nicholas (2019):
Privacy-Preserving Speaker Recognition with Cohort Score Normalisation.
Interspeech 2019, Graz, Austria, 15.-19.09.2019, [Konferenzveröffentlichung]

Nikolopoulos, Georgios M. (2019):
Cryptographic one-way function based on boson sampling.
18, In: Quantum Information Processing, 2019 (8), S. 259. Springer Nature, ISSN 1570-0755, e-ISSN 1573-1332,
DOI: 10.1007/s11128-019-2372-9,
[Artikel]

Burger, Michael ; Bischof, Christian ; Krämer, Juliane
Khalid, Zine-Dine (Hrsg.) (2019):
A new Parallelization for p3Enum and Parallelized Generation of Optimized Pruning Functions.
S. 931-940, HPCS 2019- International Conference on High Performance Computing & Simulation, Dublin, Irland, 15.-19.07., [Konferenzveröffentlichung]

Kiss, Ágnes ; Naderpour, Masoud ; Liu, Jian ; Asokan, N. ; Schneider, Thomas (2019):
SoK: Modular and Efficient Private Decision Tree Evaluation.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2, De Gruyter Open, [Artikel]

Kiss, Ágnes ; Schick, Oliver ; Schneider, Thomas (2019):
Web Application for Privacy-Preserving Scheduling using Secure Computation.
In: 16. International Conference on Security and Cryptography (SECRYPT'19),
SciTePress, [Konferenzveröffentlichung]

Schneider, Thomas ; Tkachenko, Oleksandr (2019):
EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs.
ACM, 14. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'19), [Konferenzveröffentlichung]

Zucker, René (2019):
Erstellung eines Python-Interfaces für die Erforschung von Polytopen in der Quanteninformationstheorie.
Darmstadt, TU Darmstadt, Fachbereich Informatik, [Bachelorarbeit]

Mantz, Dennis ; Classen, Jiska ; Schulz, Matthias ; Hollick, Matthias (2019):
InternalBlue - Bluetooth Binary Patching and Experimentation Framework.
The 17th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys ’19), Seoul, South Korea, June 17.-21., 2019, DOI: 10.1145/3307334.3326089,
[Konferenzveröffentlichung]

Traverso, Giulia (2019):
Long-Term Confidential Secret Sharing-Based Distributed Storage Systems.
Darmstadt, Technische Universität, FG Informatik,
[Dissertation]

Songhori, Ebrahim ; Riazi, M. Sadegh ; Hussain, Siam ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2019):
ARM2GC: Succinct Garbled Processor for Secure Computation.
Las Vegas, USA, Design Automation Conference (DAC), 2019 56th ACM/EDAC/IEEE, Las Vegas, USA, June, 2.-6., [Konferenzveröffentlichung]

Batina, Lejla ; Jauernig, Patrick ; Mentens, Nele ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2019):
In Hardware We Trust: Gains and Pains of Hardware-assisted Security.
In: Proceedings of the 56th Annual Design Automation Conference 2019,
k.A., ACM, Design Automation Conference 2019, Las Vegas, NV, USA, June 02 - 06, 2019, [Konferenzveröffentlichung]

Burger, Michael ; Bischof, Christian ; Krämer, Juliane (2019):
p3Enum: A new Parameterizable and Shared-Memory Parallelized Shortest Vector Problem Solver.
In: 19th INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE, S. 535-542,
Springer, Faro, Portugal, 12.-14.06.2019, DOI: 10.1007/978-3-030-22750-0_48,
[Konferenzveröffentlichung]

Järvinen, Kimmo ; Leppäkoski, Helena ; Lohan, Elena Simona ; Richter, Philipp ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng (2019):
PILOT: Practical Privacy-Preserving Indoor Localization using OuTsourcing.
In: 4. IEEE European Symposium on Security and Privacy (EuroS&P'19),
[Konferenzveröffentlichung]

Mantel, Heiko ; Probst, Christian (2019):
On the Meaning and Purpose of Attack Trees.
The 32nd IEEE Computer Security Foundations Symposium (CSF), Hoboken, NJ, USA, Jun 25, 2019 - Jun 28, 2019, [Konferenzveröffentlichung]

Dessouky, Ghada ; Gens, David ; Haney, Patrick ; Persyn, Garrett ; Kanuparthi, Arun K. ; Khattri, Hareesh ; Fung, Jason M. ; Sadeghi, Ahmad-Reza ; Rajendran, Jeyavijayan (2019):
HardFails: Insights into Software-Exploitable Hardware Bugs.
28th USENIX Security Symposium, Santa Clara, CA, USA, 14.-16.08.2019, [Konferenzveröffentlichung]

Classen, Jiska ; Hollick, Matthias (2019):
Inside Job: Diagnosing Bluetooth Lower Layers Using Off-the-Shelf Devices.
12th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'19), Miami, FL, USA, May 15.-17., 2019, DOI: 10.1145/3317549.3319727,
[Konferenzveröffentlichung]

O'Connor, T. J. ; Mohamed, Reham ; Miettinen, Markus ; Enck, William ; Reaves, Bradley ; Sadeghi, Ahmad-Reza (2019):
HomeSnitch: Behavior Transparency and Control for Smart Home IoT Devices.
Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Miami, FL, USA, [Konferenzveröffentlichung]

Brendel, Jacqueline ; Gerber, Nina (2019):
Sichere Instant Messaging Apps.
In: Datenschutz und Datensicherheit - DuD, 43 (5), S. 276-280. Springer, ISSN 1862-2607 (elektronische Version); 1614-0702 (gedruckte Version),
DOI: 10.1007/s11623-019-1107-5,
[Artikel]

Amann, Sven ; Nguyen, Hoan Anh ; Nadi, Sarah ; Nguyen, Tien N. ; Mezini, Mira (2019):
Investigating Next Steps in Static API-Misuse Detection.
In: MSR, In: Proceedings of the 16th International Conference on Mining Software Repositories,
k.A., IEEE, 2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR), Montreal, QC, Canada, Sun 26 - Mon 27 May 2019, [Konferenzveröffentlichung]

Bindel, Nina ; Brendel, Jacqueline ; Fischlin, Marc ; Goncalves, Brian ; Stebila, Douglas (2019):
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange.
Chongqing, China, PQCrypto 2019, May 8-10, 2019, [Konferenzveröffentlichung]

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Hesse, Julia ; Hostakova, Kristina (2019):
Multiparty Virtual State Channels.
In: Eurocrypt 2019,
Darmstadt, IACR, 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, [Konferenzveröffentlichung]

Pinkas, Benny ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yanai, Avishay (2019):
Efficient Circuit-based PSI with Linear Communication.
In: 38. Advances in Cryptology -- EUROCRYPT 2019,
Springer, [Konferenzveröffentlichung]

Geihs, Matthias ; Nikiforov, Oleg ; Demirel, Denise ; Sauer, Alexander ; Butin, Denis ; Günther, Felix ; Alber, Gernot ; Walther, Thomas ; Buchmann, Johannes (2019):
The Status of Quantum-Based Long-Term Secure Communication over the Internet.
In: IEEE Transactions on Sustainable Computing, IEEE, ISSN 2377-3782,
DOI: htps://doi.org/10.1109/TSUSC.2019.2913948,
[Artikel]

Speth, Jonathan (2019):
How secure are business applications? An in-depth study on the security of business applications.
Darmstadt, TU Darmstadt, [Bachelorarbeit]

Ranly, Paul Moritz (2019):
On the feasibility of hierarchical secret sharing-based distributed storage systems.
Darmstadt, TU Darmstadt, [Bachelorarbeit]

Krämer, Juliane ; Loiero, Mirjam (2019):
Fault Attacks on UOV and Rainbow.
10th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2019), Darmstadt, Germany, 03.-05.04., [Konferenzveröffentlichung]

Roth, Kai (2019):
Entwicklung eines Schlüsselverwaltungssystems zum Quantenschlüsselaustausch.
Darmstadt, TU Darmstadt, [Masterarbeit]

Nguyen, Thien Duc ; Marchal, Samuel ; Miettinen, Markus ; Fereidooni, Hossein ; Asokan, N. ; Sadeghi, Ahmad-Reza (2019):
DÏoT: A Federated Self-learning Anomaly Detection System for IoT.
In: The 39th IEEE International Conference on Distributed Computing Systems (ICDCS 2019),
[Konferenzveröffentlichung]

Wickert, Anna-Katharina ; Reif, Michael ; Eichberg, Michael ; Dodhy, Anam ; Mezini, Mira (2019):
A Dataset of Parametric Cryptographic Misuses.
IEEE, 2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR), [Konferenzveröffentlichung]

Fomichev, Mikhail ; Maass, Max ; Almon, Lars ; Molina, Alejandro ; Hollick, Matthias (2019):
Perils of Zero-Interaction Security in the Internet of Things.
In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 3 (1), ACM, DOI: 10.1145/3314397,
[Artikel]

Truong, Hien Thi Thu ; Toivonen, Juhani ; Nguyen, Thien Duc ; Soriente, Claudio ; Tarkoma, Sasu ; Asokan, N. (2019):
DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification.
k.A., IEEE International Conference on Pervasive Computing and Communications (PerCom2019), Kyoto, Japan, March 2019, [Konferenzveröffentlichung]

Schulz, Philipp (2019):
Developing Secure Distributed Systems with Modular Tierless Programming.
TU Darmstadt, [Masterarbeit]

Srivatsa, Jeevan Karanam (2019):
Benchmarking of Data Provenance Computation Methods to Support Debugging in Apache Spark.
TU Darmstadt, [Masterarbeit]

Marchal, Samuel ; Miettinen, Markus ; Nguyen, Thien Duc ; Sadeghi, Ahmad-Reza ; Asokan, N. (2019):
AUDI: Towards Autonomous IoT Device-Type Identification.
In: IEEE Journal on Selected Areas in Communications (JSAC) on Artificial Intelligence and Machine Learning for Networking and Communications, [Artikel]

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2019):
HEALED: HEaling & Attestation for Low-end Embedded Devices.
23rd International Conference Financial Cryptography and Data Security (FC 2019), 2019, [Konferenzveröffentlichung]

Das, Poulami ; Eckey, Lisa ; Frassetto, Tommaso ; Gens, David ; Hostakova, Kristina ; Jauernig, Patrick ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2019):
FastKitten: Practical Smart Contracts on Bitcoin.
Cryptology ePrint Archive, Report 2019/154, [Report]

Schabhüser, Lucas ; Butin, Denis ; Buchmann, Johannes (2019):
Context Hiding Multi-Key Linearly Homomorphic Authenticators.
In: Topics in Cryptology - CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, S. 493-513,
Springer, San Francisco, CA, USA, March 4–8, 2019, [Konferenzveröffentlichung]

Rodler, Michael ; Li, Wenting ; Karame, Ghassan O. ; Davi, Lucas (2019):
Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks.
In: Proceedings of 26th Annual Network & Distributed System Security Symposium (NDSS),
26th Annual Network & Distributed System Security Symposium (NDSS), Catamaran Resort Hotel & Spa, San Diego, CA, [Konferenzveröffentlichung]

Surminski, Sebastian ; Rodler, Michael ; Davi, Lucas (2019):
Poster: Automated Evaluation of Fuzzers.
Internet Society, NDSS 2019 : 26th Annual Network and Distributed System Security Symposium, San Diego, California, 24 – 27 February 2019, [Konferenzveröffentlichung]

Aschermann, Cornelius ; Frassetto, Tommaso ; Holz, Thorsten ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Teuchert, Daniel (2019):
Nautilus: Fishing for Deep Bugs with Grammars.
In: 26th Annual Network & Distributed System Security Symposium (NDSS),
[Konferenzveröffentlichung]

Brasser, Ferdinand ; Gens, David ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2019):
SANCTUARY: ARMing TrustZone with User-space Enclaves.
In: 26th Annual Network & Distributed System Security Symposium (NDSS),
[Konferenzveröffentlichung]

Krüger, Stefan ; Hermann, Ben (2019):
Can an online service predict gender?: on the state-of-the-art in gender identification from texts.
GE@ICSE 2019 : 2nd Workshop on Gender Equality in Software Engineering, Montreal, Canada, May 27, 2019, DOI: 10.1109/GE.2019.00012,
[Konferenzveröffentlichung]

Maier, Christine ; Brydges, Tiff ; Jurcevic, Petar ; Trautmann, Nils ; Hempel, Cornelius ; Lanyon, Ben P. ; Hauke, Philipp ; Blatt, Rainer ; Roos, Christian F. (2019):
Environment-Assisted Quantum Transport in a 10-qubit Network.
In: PHYSICAL REVIEW LETTERS, 122 (5), S. 050501. American Physical Society, DOI: 10.1103/PhysRevLett.122.050501,
[Artikel]

Wegert, Leonard (2019):
Preparations for Assembling Franson Interferometers in a Quantum Key Distributuion Setup.
TU Darmstadt, [Bachelorarbeit]

Weiser, Samuel ; Werner, Mario ; Brasser, Ferdinand ; Malenko, Maja ; Mangard, Stefan ; Sadeghi, Ahmad-Reza (2019):
TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V.
In: 26th Annual Network & Distributed System Security Symposium (NDSS),
[Konferenzveröffentlichung]

Abera, Tigist ; Bahmani, Raad ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2019):
DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous System.
In: 26th Annual Network & Distributed System Security Symposium (NDSS),
[Konferenzveröffentlichung]

Mohamed, Reham ; O'Connor, Terrance ; Miettinen, Markus ; Enck, William ; Sadeghi, Ahmad-Reza
Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang (Urheber) (2019):
HONEYSCOPE: IoT Device Protection with Deceptive Network Views,.
In: Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings, [Buchkapitel]

Felsen, Susanne (2019):
Secure Two-Party Computation: ABY versus Intel SGX.
TU Darmstadt, [Masterarbeit]

Reuter, Christian ; Altmann, Jürgen ; Göttsche, Malte ; Himmel, Mirko (Hrsg.) (2019):
SCIENCE PEACE SECURITY ‘19: Proceedings of the Interdisciplinary Conference on Technical Peace and Security Research.
Darmstadt, tuprints, DOI: 10.25534/tuprints-00009164,
[Konferenzveröffentlichung]

Bansarkhani, Rachid El (2019):
LARA - A Design Concept for Lattice-based Encryption.
S. 377-395, FC 2019: 23rd International Conference on Financial Cryptography and Data Security, Frigate Bay, St. Kitts and Nevis, February 18.-22., 2019, ISBN 978-3-030-32100-0,
DOI: 10.1007/978-3-030-32101-7_23,
[Konferenzveröffentlichung]

Bock, Estuardo Alpirez ; Brzuska, Chris ; Fischlin, Marc ; Janson, Christian ; Michiels, Wil (2019):
Security Reductions for White-Box Key-Storage in Mobile Payments.
In: ePrint, [Artikel]

Demmler, Daniel (2019):
Towards Practical Privacy-Preserving Protocols.
Darmstadt, Technische Universität,
[Dissertation]

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Malinowski, Daniel (2019):
Perun: Virtual Payment Hubs over Cryptocurrencies.
S. 327-340, IEEE Computer Society, 39th IEEE Symposium on Security and Privacy, THE HYATT REGENCY, SAN FRANCISCO, CA, MAY 21-23, 2018, [Konferenzveröffentlichung]

Dziembowski, Stefan ; Faust, Sebastian ; Zebrowski, Karol (2019):
Simple Refreshing in the Noisy Leakage Model.
IACR, The 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, 8.12.-12.12. 2019, [Konferenzveröffentlichung]

Fischlin, Marc ; Günther, Felix (2019):
Modeling Memory Faults in Signature and Encryption Schemes.
In: eprint, eprint.iacr.org, [Artikel]

Geihs, Matthias ; Schabhüser, Lucas ; Buchmann, Johannes (2019):
Efficient Proactive Secret Sharing for Large Data via Concise Vector Commitments.
In: LNCS, Springer, International Conference on Codes, Cryptology, and Information Security (C2SI) 2019, Rabat, Morocco, April 22 - 24, 2019, [Konferenzveröffentlichung]

Nyman, Thomas ; Dessouky, Ghada ; Zeitouni, Shaza ; Lehikoinen, Aaro ; Paverd, Andrew ; Asokan, N. ; Sadeghi, Ahmad-Reza (2019):
HardScope: Hardening Embedded Systems Against Data-Oriented Attacks.
ACM/IEEE, Design Automation Conference (DAC), 2019, [Konferenzveröffentlichung]

Oak, Aditya ; Mezini, Mira ; Salvaneschi, Guido (2019):
Language Support for Multiple Privacy Enhancing Technologies.
ACM, Conference Companion of the 3rd International Conference on Art, Science, and Engineering of Programming, [Konferenzveröffentlichung]

Oliveira Nunes, Ivan de ; Dessouky, Ghada ; Ibrahim, Ahmad ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2019):
Towards Systematic Design of Collective Remote Attestation Protocols.
IEEE, The 39th International Conference on Distributed Computing Systems (ICDCS) 2019, Dallas, TX, USA, 7-10 July 2019, ISBN 978-1-7281-2520-6,
DOI: 10.1109/ICDCS.2019.00120,
[Konferenzveröffentlichung]

Salvaneschi, Guido ; Köhler, Mirko ; Sokolowski, Daniel ; Haller, Philipp ; Erdweg, Sebastian ; Mezini, Mira (2019):
Language-Integrated Privacy-Aware Distributed Queries. (Verlagsversion)
In: Proceedings of the ACM on Programming Languages, 3 (OOPSLA), S. 1-30. Association for Computing Machinery, ISSN 2475-1421,
DOI: 10.25534/tuprints-00014553,
[Artikel]

Schabhüser, Lucas ; Butin, Denis ; Buchmann, Johannes (2019):
Function-Dependent Commitments from Homomorphic Authenticators.
Springer, 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, 3-5 July 2019, [Konferenzveröffentlichung]

2018

Geihs, Matthias ; Buchmann, Johannes (2018):
ELSA: Efficient Long-Term Secure Storage of Large Datasets.
In: Information Security and Cryptology- ICISC 2018, S. 269-286,
Springer Nature, 21st Annual International Conference on Information Security and Cryptology, Seoul, Korean, 28.-30.11.2018, ISBN 978-3-030-12145-7,
DOI: 10.1007/978-3-030-12146-4_17,
[Konferenzveröffentlichung]

Fasihi Yazdi, Mohsen (2018):
Study on Security Level of "Security Stack Exchange": How Trustable are Code Snippet on this Plattform?!
TU Darmstadt, [Masterarbeit]

Büscher, Niklas (2018):
Compilation for More Practical Secure Multi-Party Computation.
Darmstadt, Technische Universität,
[Dissertation]

McCracken, Gabriel (2018):
A Field Theory for Quantum Markov Processes.
TU Darmstadt, [Bachelorarbeit]

Reith, Robert Nikolai (2018):
Silently Learning your Support Vector Machines Models.
TU Darmstadt, [Bachelorarbeit]

Dantas, Yuri Gil ; Hamann, Tobias ; Mantel, Heiko (2018):
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
In: LNCS, In: The 11th International Symposium on Foundations & Practice of Security (FPS),
Springer, The 11th International Symposium on Foundations & Practice of Security (FPS), Montreal, Canada, 13, 14 and 15 November 2018, [Konferenzveröffentlichung]

Gil Dantas, Yuri ; Hamann, Tobias ; Mantel, Heiko (2018):
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
In: The 11th International Symposium on Foundations & Practice of Security (FPS), Springer, [Artikel]

Brandt, Markus ; Dai, Tianxiang ; Klein, Amit ; Shulman, Haya ; Waidner, Michael (2018):
Domain Validation ++ for MitM-Resilient PKI.
ACM CCS 2018, Toronto, Canada, 15.-19.10. 2018, [Konferenzveröffentlichung]

Degabriele, Jean Paul ; Fischlin, Marc (2018):
Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove.
In: LNCS, In: Advances in Cryptology – ASIACRYPT 2018,
Springer, Asiacrypt 2018 - the 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, Australia, December 02-06, 2018, [Konferenzveröffentlichung]

Burger, Michael ; Bischof, Christian ; Calotoiu, Alexandru ; Wunderer, Thomas ; Wolf, Felix (2018):
Exploring the Performance Envelope of the LLL Algorithm.
In: CSE-2018,
IEEE Computer Society, CSE 2018 – 21st IEEE International Conference on Computational Science and Engineering, Faculty of Automatic Control and Computers, University Politehnica of Bucharest, Romania, 29.-31.10.2018, [Konferenzveröffentlichung]

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian (2018):
FairSwap: How to fairly exchange digital goods.
In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security,
ACM, 25th ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, 15-19 October 2018, [Konferenzveröffentlichung]

Dix, Isabella (2018):
A Type System and an Implementation for Detecting the Lucky13 Vulnerability with SPASCA.
TU Darmstadt, [Masterarbeit]

Büscher, Niklas ; Demmler, Daniel ; Katzenbeisser, Stefan ; Kretzmer, David ; Schneider, Thomas (2018):
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
In: 25. ACM Conference on Computer and Communications Security (CCS'18), S. 847-861,
ACM, DOI: 10.1145/3243734.3243786,
[Konferenzveröffentlichung]

Dziembowski, Stefan ; Faust, Sebastian ; Hostakova, Kristina (2018):
General State Channel Networks.
2018, In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security,
ACM, 25th ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, 15-19 October 2018, [Konferenzveröffentlichung]

Keshavaprakash, Manoj (2018):
A Benchmark for New and Existing Model Comparison.
TU Darmstadt, [Masterarbeit]

Marakis, Vassilios (2018):
Anwendung der semiklassischen Näherung auf Probleme des Zentralkraftfeldes und der Quantendefekttheorie.
TU Darmstadt, [Masterarbeit]

Schmid, Jakob (2018):
Independent Compilation for the Arithmetic Black Box.
TU Darmstadt, [Masterarbeit]

Schneider, Thomas ; Tkachenko, Oleksandr (2018):
Towards Efficient Privacy-Preserving Similar Sequence Queries on Outsourced Genomic Databases.
In: 17. Workshop on Privacy in the Electronic Society (WPES’18), S. 71-75,
ACM, DOI: 10.1145/3267323.3268956,
[Konferenzveröffentlichung]

Guski, Florian (2018):
Simulation of the Quantum Hybrid Attack in Q#.
TU Darmstadt, [Bachelorarbeit]

Wunderer, Thomas (2018):
A Detailed Analysis of the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack.
In: Journal of Mathematical Cryptology (JMC), De Gruyter, [Artikel]

Wunderer, Thomas ; Burger, Michael ; Nguyen, Giang Nam (2018):
Parallelizing the Hybrid Lattice Reduction and Meet-in-the-Middle Attack.
In: CSE-2018,
IEEE Computer Society, CSE 2018 – 21st IEEE International Conference on Computational Science and Engineering, Faculty of Automatic Control and Computers, University Politehnica of Bucharest, Romania, 29.-31.10.2018, [Konferenzveröffentlichung]

Fischlin, Marc ; Mazaheri, Sogol (2018):
Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks.
In: 2018 IEEE 31st Computer Security Foundations Symposium (CSF),
IEEE, 2018 IEEE 31st Computer Security Foundations Symposium (CSF), Oxford, UK, 9.-12.7. 2018, DOI: 10.1109/CSF.2018.00013,
[Konferenzveröffentlichung]

Karvelas, Nikolaos ; Treiber, Amos ; Katzenbeisser, Stefan (2018):
Examining Leakage of Access Counts in ORAM Constructions.
In: crypto day matters: Beiträge vom 29. Kryptotag,
Gesellschaft für Informatik e.V., Kryptotag29: 29. Krypto-Tag @ Bosch, Renningen, Germany, 06.-07.09.2018, DOI: 10.18420/cdm-2018-29-24,
[Konferenzveröffentlichung]

Bansarkhani, Rachid El (2018):
LARA - A Design Concept for Lattice-based Encryption.
In: ePrint Archive, (Report 2017/049), [Report]

Günther, Daniel (2018):
Private Function Evaluation with Universal Circuits.
In: 29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag),
Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), Bosch Renningen, Germany, 6.-7.9.2018, [Konferenzveröffentlichung]

Palacios, Joan ; Steinmetzer, Daniel ; Loch, Adrian ; Hollick, Matthias ; Widmer, Joerg (2018):
Adaptive Codebook Optimization for Beam-Training on Off-The-Shelf IEEE 802.11ad Devices.
MobiCom 2018 - 24th ACM Annual International Conference on Mobile Computing and Networking, New Delhi, India, 29.10.-2.11.2018, DOI: 10.1145/3241539.3241576,
[Konferenzveröffentlichung]

Brasser, Ferdinand ; Frassetto, Tommaso ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Weinert, Christian (2018):
VoiceGuard: Secure and Private Speech Processing.
In: Interspeech 2018, S. 1303-1307,
International Speech Communication Association (ISCA), DOI: 10.21437/Interspeech.2018-2032,
[Konferenzveröffentlichung]

Earley, Timothy (2018):
Extending the Language Coverage of Side-Channel Finder AVR.
TU Darmstadt, [Bachelorarbeit]

Helm, Dominik ; Kübler, Florian ; Eichberg, Michael ; Reif, Michael ; Mezini, Mira (2018):
A unified lattice model and framework for purity analyses.
In: Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, S. 340-350,
ACM, ASE 2018, Corum, Montpellier, France, 3.-7.9.2018, DOI: 10.1145/3238147.3238226,
[Konferenzveröffentlichung]

Humbert, Marcel Nikolas (2018):
Einführung in die Störungstheorie der Allgemeinen Relativitätstheorie.
TU Darmstadt, [Bachelorarbeit]

Järvinen, Kimmo ; Kiss, Ágnes ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng (2018):
Faster Privacy-Preserving Location Proximity Schemes.
In: 17. International Conference on Cryptology And Network Security (CANS'18), S. 3-22,
Springer, DOI: 10.1007/978-3-030-00434-7_1,
[Konferenzveröffentlichung]

Tkachenko, Oleksandr (2018):
Privacy-Preserving Genomics on a Large Scale.
In: 29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag),
Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), Bosch Renningen, Germany, 6.-7.9.2018, [Konferenzveröffentlichung]

Hlavacek, Tomas ; Herzberg, Amir ; Shulman, Haya ; Waidner, Michael (2018):
Practical Experience: Methodologies for Measuring Route Origin Validation.
DSN 2017 - The 47th IEEE/IFIP International Conference on Dependable Systems and Networks, Denver,CO,USA, 26.-29.06.2018, [Konferenzveröffentlichung]

Anagnostopoulos, Nikolaos Athanasios ; Arul, Tolga ; Fan, Yufan ; Hatzfeld, Christian ; Tehranipoor, Fatemeh ; Katzenbeisser, Stefan (2018):
Addressing the Effects of Temperature Variations on Intrinsic Memory-Based Physical Unclonable Functions.
28th Crypto-Day, Kirchheim bei München, Germany, 07.- 08.06.2018, DOI: 10.18420/cdm-2018-28-23,
[Konferenzveröffentlichung]

Kumar, Manish ; Anagnostopoulos, Nikolaos Athanasios ; Fan, Yufan ; Katzenbeisser, Stefan (2018):
Advanced Reconfigurable Physical Unclonable Functions(AR-PUFs) and Their Security Applications.
28th Crypto-Day, Kirchheim bei München, Germany, 07.- 08.06.2018, DOI: 10.18420/cdm-2018-28-22,
[Konferenzveröffentlichung]

Schaller, André ; Xiong, Wenjie ; Anagnostopoulos, Nikolaos Athanasios ; Saleem, Umair ; Gabmeyer, Sebastian ; Skoric, Boris ; Katzenbeisser, Stefan ; Szefer, Jakub (2018):
Decay-Based DRAM PUFs in Commodity Devices.
In: IEEE Transactions on Dependable and Secure Computing (TDSC), [Artikel]

Helm, Dominik (2018):
A Framework for Modular Purity Analyses.
TU Darmstadt, [Masterarbeit]

Sharma, Ratika (2018):
Testing the effects of voltage variations on PUF implementations in Commercial Off-The-Shelf (COTS) devices.
TU Darmstadt, [Masterarbeit]

Frassetto, Tommaso ; Jauernig, Patrick ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2018):
IMIX: In-Process Memory Isolation EXtension.
In: Proceedings of the 27th USENIX Security Symposium, S. 83-97,
27th USENIX Security Symposium - Technical Sessions Track 2, Baltimore, MD, USA, 15.-17.08.2018, ISBN 978-1-939133-04-5,
[Konferenzveröffentlichung]

Kiss, Ágnes ; Schick, Oliver ; Schneider, Thomas (2018):
Web Application for Privacy-Preserving Scheduling (Poster).
27. USENIX Security Symposium: USENIX Security'18 : Poster Session, Baltimore, MD, USA, August 15–17, 2018, [Konferenzveröffentlichung]

Mitev, Richard (2018):
Lyin’ Alexa - Skill-Based Man-in-the-Middle Attack on Virtual Assistants.
TU Darmstadt, [Masterarbeit]

Villeneuve, Come du Crest de (2018):
Evaluation of the Efficiency of different Architectures and Pathfinding Algorithms.
TU Darmstadt, [Masterarbeit]

Dodhy, Anam (2018):
Misuses of Parameters for Cryptographic APIs.
TU Darmstadt, [Masterarbeit]

Ece, Olcay (2018):
Security of E-Mail-Encryption.
TU Darmstadt, [Bachelorarbeit]

Hald, Martin (2018):
Cryptographic Analysis of the Bitmessage Protocol.
TU Darmstadt, [Masterarbeit]

Hanreich, Matthias (2018):
Security Analysis and Firmware Modification of Fitbit Fitness Trackers.
TU Darmstadt, [Masterarbeit]

Kumar, Manish (2018):
Advanced Reconfigurable Physical Unclonable Functions(AR-PUFs) and their security applications.
TU Darmstadt, [Masterarbeit]

Nanjunde Gowda, Vidyashree (2018):
Benchmarking Static Misuse or Bug Detectors Using Software Vulnerabilities.
TU Darmstadt, [Masterarbeit]

Baack, Leon (2018):
Optimisation of parts of a set-up for quantum key distribution.
TU Darmstadt, [Bachelorarbeit]

Buescher, Niklas ; Weber, Alina ; Katzenbeisser, Stefan (2018):
Towards Practical RAM based Secure Computation.
In: European Symposium on Research in Computer Security (ESORICS),
ESORICS 2018, Barcelona, Spain, 3.9.-7.9. 2018, [Konferenzveröffentlichung]

Göhring, Matthias ; Shulman, Haya ; Waidner, Michael (2018):
Path MTU Discovery Considered Harmful.
ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems, Vienna, Austria, 2.-5.7.2018, [Konferenzveröffentlichung]

Classen, Jiska ; Wegemer, Daniel (2018):
Fitbit Firmware Hacking.
Recon,
[Anderes]

Albrecht, Martin R. ; Curtis, Benjamin R. ; Deo, Amit ; Davidson, Alex ; Player, Rachel ; Postlethwaite, Eamonn W. ; Virdia, Fernando ; Wunderer, Thomas (2018):
Estimate all the {LWE, NTRU} schemes!
In: LNCS, In: SCN 2018,
11th Conference on Security and Cryptography for Networks, Amalfi, Italy, [Konferenzveröffentlichung]

Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Mühlhäuser, Max (2018):
Towards Secure Distributed Trust Management on a Global Scale.
S. 49-54, ACM, IoT S&P’18: ACM SIGCOMM 2018 Workshop on IoT Security and Privacy, Budapest, Hungary, 20.-25.08, ISBN 978-1-4503-5905-4,
DOI: 10.1145/3229565.3229569,
[Konferenzveröffentlichung]

Anagnostopoulos, Nikolaos Athanasios ; Katzenbeisser, Stefan ; Chandy, John A. ; Tehranipoor, Fatemeh (2018):
An Overview of DRAM-Based Security Primitives.
In: Cryptography 2018, 2 (7), MDPI, DOI: 10.3390/cryptography2020007,
[Artikel]

Bindel, Nina ; Buchmann, Johannes ; Göpfert, Florian ; Schmidt, Markus (2018):
Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples.
In: Journal of Mathematical Cryptology, de Gruyter, [Artikel]

Fischlin, Marc ; Harasser, Patrick (2018):
Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent.
In: Springer International Publishing, LNCS 10892, In: Applied Cryptography and Network Security - ACNS 2018, S. 202-220,
16th International Conference, ACNS 2018, Leuven, Belgium, 2.7.-4.7. 2018, [Konferenzveröffentlichung]

Geihs, Matthias ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Buchmann, Johannes (2018):
PROPYLA: Privacy Preserving Long-Term Secure Storage.
In: ACM, In: SCC Workshop @ AsiaCCS 2018,
Songdo, Incheon, Korea, The Sixth International Workshop on Security in Cloud Computing (SCC), [Konferenzveröffentlichung]

Kannwischer, Matthias ; Genêt, Aymeric ; Butin, Denis ; Krämer, Juliane ; Buchmann, Johannes (2018):
Differential Power Analysis of XMSS and SPHINCS.
In: LNCS, 10815, S. 168-188, Springer, 9th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2018), Singapore, 23.-24.04., ISBN 978-3-319-89640-3,
DOI: 10.1007/978-3-319-89641-0_10,
[Konferenzveröffentlichung]

Schabhüser, Lucas ; Butin, Denis ; Demirel, Denise ; Buchmann, Johannes (2018):
Function-Dependent Commitments for Verifiable Multi-Party Computation.
In: LNCS, In: Information Security - 21st International Conference, ISC 2018,
Guildford, UK, [Konferenzveröffentlichung]

Wunderer, Thomas ; Wang, Yuntao (2018):
Revisiting the Sparsification Technique in Kannan’s Embedding Attack on LWE.
In: Springer LNCS, In: ISPEC 2018,
Tokyo, Japan, 14th International Conference on Information Security Practice and Experience (ISPEC 2018), [Konferenzveröffentlichung]

Carpent, Xavier ; Eldefrawy, Karim ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2018):
Invited: Reconciling Remote Attestation and Safety-Critical Operation on Simple IoT Devices.
ACM, Design Automation Conference, San Francisco, USA, 2018, June 24-29, [Konferenzveröffentlichung]

Dessouky, Ghada ; Abera, Tigist ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza (2018):
LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution.
37th IEEE International Conference On Computer Aided Design 2018 (ICCAD’18), 2018, [Konferenzveröffentlichung]

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2018):
SCIoT: A Secure and sCalable end-to-end management framework for IoT Devices.
23rd European Symposium on Research in Computer Security (ESORICS 2018), Barcelona, Spain, 2018, [Konferenzveröffentlichung]

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2018):
US-AID: Unattended Scalable Attestation of IoT Devices.
37th IEEE International Symposium on Reliable Distributed Systems (SRDS 2018), 2018, [Konferenzveröffentlichung]

Demmler, Daniel ; Rindal, Peter ; Rosulek, Mike ; Trieu, Ni (2018):
PIR-PSI: Scaling Private Contact Discovery.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), S. 159-178. De Gruyter Open, DOI: 10.1515/popets-2018-0037,
[Artikel]

Eichberg, Michael ; Kübler, Florian ; Helm, Dominik ; Reif, Michael ; Salvaneschi, Guido ; Mezini, Mira (2018):
Lattice Based Modularization of Static Analyses.
In: Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, S. 113-118,
ACM, SOAP 2018, Amsterdam, Netherlands, DOI: 10.1145/3236454.3236509,
[Konferenzveröffentlichung]

Franke, Fabian (2018):
Learning the Beams.
TU Darmstadt, [Masterarbeit]

Krüger, Stefan ; Späth, Johannes ; Ali, Karim ; Bodden, Eric ; Mezini, Mira (2018):
CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.
In: 32nd European Conference on Object-Oriented Programming (ECOOP 2018), S. 10:1-10:27,
Schloss Dagstuhl-Leibniz-Zentrum für Informatik, 32nd European Conference on Object-Oriented Programming (ECOOP 2018), Amsterdam, The Netherlands, 15.-21.07.2018, DOI: 10.4230/LIPIcs.ECOOP.2018.10,
[Konferenzveröffentlichung]

Mantz, Dennis (2018):
InternalBlue – A Bluetooth Experimentation Framework Based on Mobile Device Reverse Engineering.
TU Darmstadt, [Masterarbeit]

Mehmedovic, Damir (2018):
Wi-Fi Based Key Exchange On Android Smartphones.
TU Darmstadt, [Bachelorarbeit]

Reif, Michael ; Eichberg, Michael ; Kübler, Florian ; Mezini, Mira (2018):
Systematic Evaluation of the Unsoundness of Call Graph Construction Algorithms for Java.
In: Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, S. 107-112,
ACM, SOAP 2018, Amsterdam, Netherlands, DOI: 10.1145/3236454.3236503,
[Konferenzveröffentlichung]

Rowe, Steven (2018):
Blockchain-based market for alert data exchange in Collaborative Intrusion Detection Systems.
TU Darmstadt, [Bachelorarbeit]

Senker, Matthias (2018):
PSI Meets Signal: Integrating a Malicious-Secure Private Contact Discovery Solution in an Open-Source Instant Messaging Service.
TU Darmstadt, [Masterarbeit]

Anagnostopoulos, Nikolaos Athanasios ; Arul, Tolga ; Fan, Yufan ; Hatzfeld, Christian ; Schaller, André ; Xiong, Wenjie ; Jain, Manishkumar ; Saleem, Umair ; Lotichius, Jan ; Gabmeyer, Sebastian ; Szefer, Jakub ; Katzenbeisser, Stefan (2018):
Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security.
In: Cryptography, 2 (3), MDPI, ISSN 2410-387X,
DOI: 10.3390/cryptography2030013,
[Artikel]

Schaad, Andreas ; Grohmann, Bjoern ; Winzenried, Oliver ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza (2018):
Towards a Cloud-based System for Software Protection and Licensing.
In: Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, ICETE 2018 - Volume 2, S. 698-702,
k.A., SciTePress, Secrypt 2018, Porto, Portugal, 26.-28.07.2018, ISBN 978-989-758-319-3,
DOI: 10.5220/0006899506980702,
[Konferenzveröffentlichung]

Richter, Philipp ; Yang, Zheng ; Tkachenko, Oleksandr ; Leppäkoski, Helena ; Järvinen, Kimmo ; Schneider, Thomas (2018):
Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting.
In: 8. International Conference on Localization and GNSS (ICL-GNSS'18), S. 1-6,
IEEE, DOI: 10.1109/ICL-GNSS.2018.8440910,
[Konferenzveröffentlichung]

Amler, Hendrik (2018):
Evaluation of payment channel networks for micropayments.
TU Darmstadt, [Masterarbeit]

Deaconescu, Razvan ; Carabas, Costin ; Manda, Iulia ; Enck, William ; Chiroiu, Mihai ; Li, Ninghui ; Sadeghi, Ahmad-Reza (2018):
iOracle: Automated Evaluation of Access Control Policies in iOS.
In: AsiaCCS, In: 13th ASIA Conference on Information, Computer and Communications Security,
[Konferenzveröffentlichung]

Gajewski, Marvin (2018):
Asymptotische Eigenschaften offener quantenoptischer Systeme.
TU Darmstadt, [Bachelorarbeit]

Miettinen, Markus ; Nguyen, Thien Duc ; Asokan, N. ; Sadeghi, Ahmad-Reza (2018):
Revisiting Context-Based Pairing in IoT.
In: Proceedings of the 55th Design Automation Conference (DAC), S. 32:1-32:6,
ACM, 55th Design Automation Conference (DAC), San Francisco, CA, USA, 24.-29.06. 2018, [Konferenzveröffentlichung]

Riazi, M. Sadegh ; Weinert, Christian ; Tkachenko, Oleksandr ; Songhori, Ebrahim M. ; Schneider, Thomas ; Koushanfar, Farinaz (2018):
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications.
In: 13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18), S. 707-721,
ACM, DOI: 10.1145/3196494.3196522,
[Konferenzveröffentlichung]

Steinmetzer, Daniel ; Yuan, Yimin ; Hollick, Matthias (2018):
Beam-Stealing: Intercepting the Sector Sweep to Launch Man-in-the-Middle Attacks on Wireless IEEE 802.11ad Networks.
S. 12-22, 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Stockholm, Sweden, Jun 18, 2018 - Jun 20, 2018, DOI: 10.1145/3212480.3212499,
[Konferenzveröffentlichung]

Tkachenko, Oleksandr ; Weinert, Christian ; Schneider, Thomas ; Hamacher, Kay (2018):
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
In: 13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18), S. 221-235,
ACM, DOI: 10.1145/3196494.3196541,
[Konferenzveröffentlichung]

Varky, Jacek (2018):
TeePay – Using Trusted Execution Environments for Off-chain Payment.
TU Darmstadt, [Masterarbeit]

Wijden, Marius van der (2018):
Payment and State Channels in practice.
TU Darmstadt, [Masterarbeit]

Zeitouni, Shaza ; Gens, David ; Sadeghi, Ahmad-Reza (2018):
It’s Hammer Time: How to Attack (Rowhammer-based) DRAM-PUFs.
In: Design Automation Conference (DAC) 2018,
[Konferenzveröffentlichung]

Kiel, Robert (2018):
Zero-Knowledge Contingent Payments.
TU Darmstadt, [Masterarbeit]

Ullrich, Fabian (2018):
Analysing and Evaluating Interface, Communication, and Web Security in Productive IoT Ecosystems.
TU Darmstadt, [Masterarbeit]

Wolf, Yannic (2018):
Eine Faserverstärkerstufe für den Quantenhub.
TU Darmstadt, [Bachelorarbeit]

Liu, Mo-meng ; Krämer, Juliane ; Hu, Yu-pu ; Buchmann, Johannes (2018):
Quantum security analysis of a lattice-based oblivious transfer protocol.
In: LNCS, In: Frontiers of Information Technology & Electronic Engineering, 18 (9), S. 1348-1369. Springer, ISSN 2095-9184 (Print) 2095-9230 (Online),
[Artikel]

Nguyen, Lisa ; Krüger, Stefan ; Hill, Patrick ; Ali, Karim ; Bodden, Eric (2018):
VisuFlow: a Debugging Environment for Static Analyses.
In: ICSE,
ACM, [Konferenzveröffentlichung]

Treiber, Amos (2018):
Access Count Leakage in Oblivious RAMs.
TU Darmstadt, [Masterarbeit]

Deligeorgopoulos, Efstathios (2018):
Evaluation of Proactive Secret Sharing for Long-Term Secure Storage.
TU Darmstadt, [Masterarbeit]

Scheidel, Lukas (2018):
Distributed Path ORAM.
TU Darmstadt, [Bachelorarbeit]

Bielsa, Guillermo ; Palacios, Joan ; Loch, Adrian ; Steinmetzer, Daniel ; Cesari, Paolo ; Widmer, Joerg (2018):
Indoor Localization Using Commercial Off-The-Shelf 60 GHz Access Points.
IEEE International Conference on Computer Communications (INFOCOM), Honolulu, Hawaii, USA, 15-19 April 2018, [Konferenzveröffentlichung]

Pinkas, Benny ; Schneider, Thomas ; Weinert, Christian ; Wieder, Udi (2018):
Efficient Circuit-based PSI via Cuckoo Hashing.
In: 37. Advances in Cryptology -- EUROCRYPT 2018, S. 125-157,
Springer, DOI: 10.1007/978-3-319-78372-7_5,
[Konferenzveröffentlichung]

Tariq, Taha (2018):
Web application for privacy-preserving assignments.
TU Darmstadt, [Masterarbeit]

Glanz, Leonid ; Amann, Sven ; Eichberg, Michael ; Reif, Michael ; Mezini, Mira
Tichy, Matthias ; Bodden, Eric ; Kuhrmann, Marco ; Wagner, Stefan ; Steghöfer, Jan-Philipp (Hrsg.) (2018):
CodeMatch: Obfuscation Won't Conceal Your Repackaged App.
In: Software Engineering und Software Management 2018, S. 117-118, Gesellschaft für Informatik, [Buchkapitel]

Brandy, Malte (2018):
Asymptotische Eigenschaften iterierter Quantenoperationen.
TU Darmstadt, [Masterarbeit]

Neubauer, Sven (2018):
Angriffsanalyse einer TETRA-Basisstation.
TU Darmstadt, [Bachelorarbeit]

Alhassan, Masaud Y. (2018):
Improving scalability of universal circuits for large-scale private function evaluation.
TU Darmstadt, [Masterarbeit]

Classen, Jiska ; Wegemer, Daniel ; Patras, Paul ; Spink, Tom ; Hollick, Matthias (2018):
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware.
In: PACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT),
ACM, [Konferenzveröffentlichung]

Hofmann, Daniel (2018):
Charakterisierung von verschränkten Photonenpaaren.
TU Darmstadt, [Masterarbeit]

Trautmann, N. ; Hauke, P. (2018):
Trapped-ion quantum simulation of excitation transport: Disordered, noisy, and long-range connected quantum networks.
In: Physical Review A, 97 (2), APS Physics, ISSN 2469-9926,
DOI: 10.1103/PhysRevA.97.023606,
[Artikel]

Saleem, Umair Muhammad (2018):
Flash-based Physical Unclonable Functions (PUFs) using Commercial Off-The-Shelf (COTS) NAND Flash Memory.
TU Darmstadt, [Masterarbeit]

Gens, David ; Schmitt, Simon ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2018):
K-Miner: Uncovering Memory Corruption in Linux.
In: 25th Annual Network & Distributed System Security Symposium (NDSS),
[Konferenzveröffentlichung]

Karvelas, Nikolaos ; Treiber, Amos ; Katzenbeisser, Stefan (2018):
Examining Leakage of Access Counts in ORAM Constructions.
In: WPES'18: Proceedings of the 2018 Workshop on Privacy in the Electronic Society, S. 66-70,
ACM, CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, Canada, 15.10.2018, ISBN 978-1-4503-5989-4,
DOI: 10.1145/3267323.3268963,
[Konferenzveröffentlichung]

Ahmad, Saad (2018):
Using Physical Unclonable Functions (PUFs) for Data-Link Layer Authenticity Verification to Mitigate Attacks on IEEE 802.11ad Beam Training.
TU Darmstadt, [Masterarbeit]

Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Schulz, Steffen ; Mühlhäuser, Max (2018):
M-STAR: A Modular, Evidence-based Software Trustworthiness Framework.
In: Cryptography and Security, (Preprint), 1. Version, arXiv, 1801.05764, [Report]

Nikiforov, Oleg ; Sauer, Alexander ; Schickel, Johannes ; Weber, Alexandra ; Alber, Gernot ; Mantel, Heiko ; Walther, Thomas (2018):
Side-Channel Analysis of Privacy Amplification in Postprocessing Software for a Quantum Key Distribution System.
[Report]

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael (2018):
Scalable Private Set Intersection Based on OT Extension.
In: ACM Transactions on Privacy and Security (TOPS), 21 (2), S. 7:1-7:35. DOI: 10.1145/3154794,
[Artikel]

Steinmetzer, Daniel ; Wegemer, Daniel ; Hollick, Matthias (2018):
A Practical IEEE 802.11ad Research Platform: The Hidden Potential of Off -the-Shelf Devices.
In: 3rd NSF Millimeter-Wave RCN Workshop,
3rd NSF Millimeter-Wave RCN Workshop, [Konferenzveröffentlichung]

Amann, Sven ; Nguyen, Hoan Anh ; Nadi, Sarah ; Nguyen, Tien ; Mezini, Mira (2018):
A Systematic Evaluation of API-Misuse Detectors.
In: IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, [Artikel]

Bindel, Nina (2018):
On the Security of Lattice-Based Signature Schemes in a Post-Quantum World.
Darmstadt, Technische Universität,
[Dissertation]

Brandt, Markus ; Shulman, Haya ; Waidner, Michael (2018):
Internet As a Source of Randomness.
S. 64-70, HotNets '18: 17th ACM Workshop on Hot Topics in Networks, Redmond, USA, November 2018, DOI: 10.1145/3286062.3286072,
[Konferenzveröffentlichung]

Brasser, Ferdinand ; Davi, Lucas ; Dhavlle, Abhijitt ; Frassetto, Tommaso ; Dinakarrao, Sai Manoj Pudukotai ; Rafatirad, Setareh ; Sadeghi, Ahmad-Reza ; Sasan, Avesta ; Sayadi, Hossein ; Zeitouni, Shaza ; Homayoun, Houman (2018):
Advances and Throwbacks in Hardware-assisted Security: Special Session.
In: CASES '18, S. 15:1-15:10, Piscataway, NJ, USA, IEEE Press, Proceedings of the International Conference on Compilers, Architecture and Synthesis for Embedded Systems, Piscataway, NJ, USA, ISBN 978-1-5386-5564-1,
[Konferenzveröffentlichung]

Dai, Tianxiang ; Shulman, Haya ; Waidner, Michael (2018):
Off-path Attacks Against PKI.
S. 2213-2215, ACM SIGSAG Conference on Computer and Communications Security (CCS 2018), Toronto, Canada, October 2018, DOI: 10.1145/3243734.3278516,
[Konferenzveröffentlichung]

Dessouky, Ghada ; Gens, David ; Haney, Patrick ; Persyn, Garrett ; Kanuparthi, Arun K. ; Khattri, Hareesh ; Fung, Jason M. ; Sadeghi, Ahmad-Reza ; Rajendran, Jeyavijayan (2018):
When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs.
In: Cryptography and Security, abs/1812.00197, [Artikel]

Geihs, Matthias (2018):
Long-Term Protection of Integrity and Confidentiality – Security Foundations and System Constructions.
Darmstadt, Technische Universität,
[Dissertation]

Gil Dantas, Yuri ; Gay, Richard ; Hamann, Tobias ; Mantel, Heiko ; Schickel, Johannes (2018):
An Evaluation of Bucketing in Systems with Non-Deterministic Timing Behavior.
33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection (IFIP SEC), [Konferenzveröffentlichung]

Gilad, Yossi ; Hlavacek, Tomas ; Herzberg, Amir ; Schapira, Michael ; Shulman, Haya (2018):
Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security.
S. 57-63, ACM, HotNets'18: 17th ACM Workshop on Hot Topics in Networks, November 2018, Redmond, USA, ISBN 978-1-4503-6120-0,
DOI: 10.1145/3286062.3286071,
[Konferenzveröffentlichung]

Lemos, Marcilio O. O. ; Dantas, Yuri Gil ; Fonseca, Iguatemi E. ; Nigam, Vivek (2018):
On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks.
In: Journal of Logical and Algebraic Methods in Programming, 94, S. 45-67. Elsevier, ISSN 2352-2216,
[Artikel]

Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra ; Weber, Friedrich (2018):
How Secure is Green IT? The Case of Software-Based Energy Side Channels.
Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS), [Konferenzveröffentlichung]

Reif, Michael ; Eichberg, Michael ; Mezini, Mira
Tichy, Matthias ; Bodden, Eric ; Kuhrmann, Marco ; Wagner, Stefan ; Steghöfer, Jan-Philipp (Hrsg.) (2018):
Call Graph Construction for Java Libraries.
S. 119-120, Bonn, Gesellschaft für Informatik, Software Engineering und Software Management 2018, Bonn, [Konferenzveröffentlichung]

Shrishak, Kris ; Shulman, Haya ; Waidner, Michael (2018):
Removing the Bottleneck for Practical 2PC.
S. 2300-2302, ACM SIGSAG Conference on Computer and Communications Security (ACM CCS), Toronto, Canada, 15.-19. Oct. 2018, DOI: 10.1145/3243734.3278521,
[Konferenzveröffentlichung]

Traverso, Giulia ; Butin, Denis ; Buchmann, Johannes ; Palesandro, Alex (2018):
Coalition-Resistant Peer Rating for Long-Term Confidentiality.
In: PST 2018 - 16th Annual Conference on Privacy, Security and Trust,
IEEE Computer Society, PST 2018 - 16th Annual Conference on Privacy, Security and Trust, Belfast, Northern Ireland, United Kingdom, August 28-30, 2018, [Konferenzveröffentlichung]

Wunderer, Thomas (2018):
On the Security of Lattice-Based Cryptography Against Lattice Reduction and Hybrid Attacks.
Darmstadt, Technische Universität,
[Dissertation]

2017

Deller, Yannick (2017):
Zweidimensionale Surface-Kodes und ihre Anwendungen.
TU Darmstadt, [Bachelorarbeit]

Fladung, Lukas (2017):
Semiclassical Laser Cooling of Trapped Ions in a One-Dimensional Standing Wave.
TU Darmstadt, [Bachelorarbeit]

Neumann, Klara Maria (2017):
Aufbau von Empfängerstationen für ein System zum Quantenschlüsselaustausch.
TU Darmstadt, [Bachelorarbeit]

Schürl, Stefan (2017):
Entwicklung eines FPGA-Systems zur hochauflösenden Zeitmessung.
TU Darmstadt, [Masterarbeit]

Albrecht, Martin ; Göpfert, Florian ; Vidria, Fernando ; Wunderer, Thomas (2017):
Revisiting the Expected Cost of Solving uSVP and Applications to LWE.
In: ASIACRYPT 2017 - Advances in Cryptology,
Springer, [Konferenzveröffentlichung]

Anagnostopoulos, Nikolaos Athanasios ; Gabmeyer, Sebastian ; Arul, Tolga ; Katzenbeisser, Stefan (2017):
An extensive classification and analysis of attacks against Physical Unclonable Functions (PUFs).
Angewandte Kryptographie of Gesellschaft für Informatik e.V, 27th Crypto-Day, Frankfurt (Oder), Germany, 7 - 8 December 2017, DOI: 10.13140/RG.2.2.25411.91689,
[Konferenzveröffentlichung]

Ay, Serafettin (2017):
Detecting WiFi Covert Channels.
Darmstadt, Technische Universität, [Masterarbeit]

Buchmann, Johannes ; Holzer, Patrick ; Wunderer, Thomas (2017):
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β.
In: INDOCRYPT 2017 - 18th International Conference on Cryptology in India,
Springer, [Konferenzveröffentlichung]

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas (2017):
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.
In: 13. International Conference on emerging Networking EXperiments and Technologies (CoNEXT'17), S. 120-133,
ACM, DOI: 10.1145/3143361.3143362,
[Konferenzveröffentlichung]

Garcia Cordero, Carlos ; Vasilomanolakis, Emmanouil ; Mühlhäuser, Max (2017):
ID2T - The Intrusion Detection Dataset Generation Toolkit.
Black Hat Europe 2017, London, United Kingdom, 04.-07.12.2017, [Konferenzveröffentlichung]

Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas (2017):
More Efficient Universal Circuit Constructions.
In: 23. Advances in Cryptology -- ASIACRYPT 2017, S. 443-470,
Springer, DOI: 10.1007/978-3-319-70697-9_16,
[Konferenzveröffentlichung]

Kübler, Florian (2017):
Foundations of a refinement-based framework for escape analyses.
Darmstadt, Technische Universität, [Masterarbeit]

Muneeb, Ahmed (2017):
mproving a Linux Device Driver for Visible Light Communication.
Darmstadt, Technische Universität, [Masterarbeit]

Sarangdhar, Ravi ; Fan, Yufan ; Anagnostopoulos, Nikolaos Athanasios ; Gayer, Udo ; Flederer, Frank ; Mikschl, Tobias ; Arul, Tolga ; John, Philipp R. ; Hierholz, Kirsten ; Montenegro, Sergio ; Katzenbeisser, Stefan (2017):
An investigation of the effects of radiation on current key storage solutions and on Physical Unclonable Functions (PUFs) being used as key storage.
Angewandte Kryptographie of Gesellschaft für Informatik e.V, 27th Crypto-Day, Frankfurt (Oder), Germany, 07.-08.12.2017, DOI: 10.13140/RG.2.2.33800.52483,
[Konferenzveröffentlichung]

Schick, Oliver (2017):
Web application for privacy-preserving scheduling.
Darmstadt, Technische Universität, [Bachelorarbeit]

Singh, Govind (2017):
o Static Bug Finders Identify API Misuses?
Darmstadt, Technische Universität, [Masterarbeit]

Steinmetzer, Daniel ; Wegemer, Daniel ; Schulz, Matthias ; Widmer, Jörg ; Hollick, Matthias (2017):
Compressive Millimeter-Wave Sector Selection in Off-the-Shelf IEEE 802.11ad Devices.
ACM, CoNEXT ’17: The 13th International Conference on emerging Networking EXperiments and Technologies, DOI: 10.1145/3143361.3143384,
[Konferenzveröffentlichung]

Vasilomanolakis, Emmanouil ; Wolf, Jan Helge ; Böck, Leon ; Mühlhäuser, Max ; Karuppayah, Shankar (2017):
I Trust my Zombies: a Trust-enabled Botnet.
In: Blackhat Europe,
London, UK, [Konferenzveröffentlichung]

Yuan, Yimin (2017):
Investigating Practical Man-in-the-middle Network Attacks on IEEE 802.11ad.
Darmstadt, Technische Universität, [Masterarbeit]

Müller, Patrick (2017):
Reconstruction of Obfuscated Strings.
TU Darmstadt, [Masterarbeit]

Afridi, Hassaan Ali Khan (2017):
Investigating the relation between bugs and vulnerabilities in the Debian ecosystem.
Darmstadt, Technische Universität, [Masterarbeit]

Demmler, Daniel ; Hamacher, Kay ; Schneider, Thomas ; Stammler, Sebastian (2017):
Privacy-Preserving Whole-Genome Variant Queries.
In: 16. International Conference on Cryptology And Network Security (CANS'17),
Springer, [Konferenzveröffentlichung]

Jauernig, Patrick Thomas (2017):
SMOV: Lighweight In-Process Memory Isolation.
Darmstadt, Technische Universität, [Bachelorarbeit]

Krüger, Stefan ; Nadi, Sarah ; Reif, Michael ; Ali, Karim ; Mezini, Mira ; Bodden, Eric ; Göpfert, Florian ; Günther, Felix ; Weinert, Christian ; Demmler, Daniel ; Kamath, Ram (2017):
CogniCrypt: Supporting Developers in using Cryptography.
In: Automated Software Engineering (ASE'17),
Piscataway, NJ, USA, ACM, Piscataway, NJ, USA, DOI: 10.1109/ASE.2017.8115707,
[Konferenzveröffentlichung]

Li, Ximeng ; Mantel, Heiko ; Schickel, Johannes ; Tasch, Markus ; Weber, Alexandra ; Toteva, Iva (2017):
SPASCA: Secure-Programming Assistant and Side-Channel Analyzer.
[Report]

Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra ; Weber, Friedrich (2017):
Vulnerabilities Introduced by Features for Software-based Energy Measurement.
[Report]

Sarangdhar, Ravi (2017):
An investigation of the effects of radiation on current key storage solutions and on Physical Unclonable Functions (PUFs) being used as key storage.
Darmstadt, Technische Universität, [Masterarbeit]

Wainakh, Aidmar (2017):
On the Analysis & Generation of Synthetic Attack for Intrusion Detection Systems.
Darmstadt, Technische Universität, [Masterarbeit]

Zeitouni, Shaza ; Dessouky, Ghada ; Arias, Orlando ; Sullivan, Dean ; Ibrahim, Ahmad ; Jin, Yier ; Sadeghi, Ahmad-Reza (2017):
ATRIUM: Runtime Attestation Resilient Under Memory Attacks.
In: 2017 International Conference On Computer Aided Design (ICCAD'17),
Irvine, California, US, [Konferenzveröffentlichung]

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Mühlhäuser, Max (2017):
Towards Blockchain-Based Collaborative Intrusion Detection Systems.
S. 107-118, Springer, 12th International Conference on Critical Information Infrastructures Security (CRITIS 2017), Lucca, Italy, 08.-13.10 2017, ISBN 978-3-319-99842-8,
DOI: 10.1007/978-3-319-99843-5_10,
[Konferenzveröffentlichung]

Bindel, Nina ; Krämer, Juliane ; Schreiber, Johannes (2017):
Hampering fault attacks against lattice-based signature schemes - countermeasures and their efficiency.
In: CODES/ISSS ’17 Companion,
Springer, [Konferenzveröffentlichung]

Buldas, Ahto ; Geihs, Matthias ; Buchmann, Johannes (2017):
Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions.
In: ProvSec 2017 - The 11th International Conference on Provable Security,
Springer, [Konferenzveröffentlichung]

Böck, Leon (2017):
On P2P botnet monitoring in adverse conditions.
Darmstadt, Technische Universität, [Masterarbeit]

Chauhan, Prankur (2017):
Improvement and integration of software tools for the evaluation and realization of Physical Unclonable Functions (PUFs) into an open-source library of cryptographic component (CogniCrypt).
Darmstadt, Technische Universität, [Masterarbeit]

Islam, Md. Monirul (2017):
Automating Trustworthiness Assessment of Mobile Applications.
Darmstadt, Technische Universität, [Masterarbeit]

Kornhuber, Tim (2017):
Implementation of a physical layer for visible light communication using the OpenVLC platform.
Darmstadt, Technische Universität, [Bachelorarbeit]

Kümpel, Michael (2017):
Implementierung des unteren MAC-Layers für die OpenVLC-Hardware.
Darmstadt, Technische Universität, [Bachelorarbeit]

Meister, Richard (2017):
Design and evaluation of a hybrid SDR testbed for visible light communication and Wi-Fi.
Darmstadt, Technische Universität, [Masterarbeit]

Schreiber, Johannes (2017):
Countermeasures Against First Order Fault Attacks Using the Example of ring-TESLA.
Darmstadt, Technische Universität, [Bachelorarbeit]

Sitnikov, Konstantin (2017):
A Survey on Post-Quantum Key Exchange.
Darmstadt, Technische Universität, [Bachelorarbeit]

Späth, Johannes ; Ali, Karim ; Bodden, Eric (2017):
IDEal: Efficient and Precise Alias-aware Dataflow Analysis.
In: 2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH),
ACM Press, [Konferenzveröffentlichung]

Steinmetzer, Daniel ; Loch, Adrian ; García-García, Amanda ; Widmer, Jörg ; Hollick, Matthias (2017):
Mitigating Lateral Interference: Adaptive Beam Switching for Robust Millimeter-Wave Networks.
In: 1st ACM Workshop on Millimeter Wave Networks and Sensing Systems (mmNets 2017), S. 6,
ACM, Snowbird, Utah, USA, ISBN 978-1-4503-5143-0/17/10,
DOI: 10.1145/3130242.3130244,
[Konferenzveröffentlichung]

Glanz, Leonid ; Amann, Sven ; Eichberg, Michael ; Reif, Michael ; Hermann, Ben ; Lerch, Johannes ; Mezini, Mira (2017):
CodeMatch: Obfuscation Won’t Conceal Your Repackaged App.
In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, S. 638-648,
Paderborn, Germany, Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, ISBN 978-1-4503-5105-8,
DOI: 10.1145/3106237.3106305,
[Konferenzveröffentlichung]

Arias, Orlando ; Gens, David ; Jin, Yier ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2017):
LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization.
In: 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2017),
[Konferenzveröffentlichung]

Brendel, Jacqueline ; Fischlin, Marc
Foley, Simon N. ; Gollmann, Dieter ; Snekkenes, Einar (Hrsg.) (2017):
Zero Round-Trip Time for the Extended Access Control Protocol.
In: Lecture notes in computer science, 1, In: Computer Security – ESORICS 2017. 22nd European Symposium on Research in Computer Security, Proceedings, S. 297-314, Cham, Springer International Publishing, ISBN 978-3-319-66401-9,
DOI: 10.1007/978-3-319-66402-6,
[Buchkapitel]

Fereidooni, Hossein ; Classen, Jiska ; Spink, Tom ; Patras, Paul ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Hollick, Matthias ; Conti, Mauro (2017):
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit.
In: Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID),
Atlanta, Georgia, USA, [Konferenzveröffentlichung]

Fomichev, Mikhail ; Álvarez, Flor ; Steinmetzer, Daniel ; Gardner-Stephen, Paul ; Hollick, Matthias (2017):
Survey and Systematization of Secure Device Pairing.
In: IEEE Communications Surveys & Tutorials, 20 (1), S. 517-550. DOI: 10.1109/COMST.2017.2748278,
[Artikel]

Funke, Sebastian ; Wiesmaier, Alexander ; Daubert, Jörg (2017):
Constrained PET Composition for Measuring Enforced Privacy.
In: Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES), S. 1-10,
ACM, DOI: 10.1145/3098954.3098968,
[Konferenzveröffentlichung]

Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan (2017):
Using Oblivious RAM in Genomic Studies.
In: DPM 2017 - Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2017 International Workshops,
Springer, Oslo, Norway, [Konferenzveröffentlichung]

Tkachenko, Oleksandr (2017):
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
TU Darmstadt, [Masterarbeit]

Cremer, Manuel (2017):
Test Cases for Detecting the Lucky 13 Vulnerability with SPASCA.
TU Darmstadt, [Bachelorarbeit]

Alexopoulos, Nikolaos ; Daubert, Jörg ; Mühlhäuser, Max ; Habib, Sheikh Mahbub (2017):
Beyond the Hype: On Using Blockchains in Trust Management for Authentication.
In: IEEE TrustCom 2017, S. 546-553,
IEEE, Sydney, Australia, 1-4 August 2017, DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.283,
[Konferenzveröffentlichung]

Alexopoulos, Nikolaos ; Kiayias, Aggelos ; Talviste, Riivo ; Zacharias, Thomas (2017):
MCMix: Anonymous Messaging via Secure Multiparty Computation.
In: 26th USENIX Security Symposium, S. 1217-1234,
USENIX Association, Vancouver, BC, Canada, 16-18 August 2018, [Konferenzveröffentlichung]

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Frieß, Tamara ; Mühlhäuser, Max (2017):
TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER).
USENIX Association, 26th USENIX Security Symposium, Vancouver, Canada, 16.-18.08.2017, [Konferenzveröffentlichung]

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017):
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
In: USENIX Security '17, In: 26th USENIX Security Symposium,
[Konferenzveröffentlichung]

Brasser, Ferdinand ; Müller, Urs ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Capkun, Srdjan ; Sadeghi, Ahmad-Reza (2017):
Software Grand Exposure: SGX Cache Attacks Are Practical.
In: WOOT, In: 11th USENIX Workshop on Offensive Technologies,
[Konferenzveröffentlichung]

Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix ; Janson, Christian
Katz, Jonathan ; Shacham, Hovav (Hrsg.) (2017):
PRF-ODH: Relations, Instantiations, and Impossibility Results.
In: CRYPTO 2017 - 37th International Cryptology Conference, S. 651-681,
Springer, Santa Barbara, CA, USA, [Konferenzveröffentlichung]

Buchmann, Johannes ; Lauter, Kristin ; Mosca, Michele (2017):
Postquantum Cryptography - State of the Art.
In: IEEE Security & Privacy, 15, S. 12-13. [Artikel]

Butin, Denis (2017):
Hash-Based Signatures: State of Play.
In: IEEE Security & Privacy, 15 (4), S. 37-43. DOI: 10.1109/MSP.2017.3151334,
[Artikel]

Günther, Felix ; Mazaheri, Sogol (2017):
A Formal Treatment of Multi-key Channels.
In: CRYPTO 2017 - 37th International Cryptology Conference,
Springer, Santa Barbara, CA, USA, [Konferenzveröffentlichung]

Karvelas, Nikolaos ; Senftleben, Marius ; Katzenbeisser, Stefan (2017):
Microblogging in a Privacy-Preserving way.
In: ARES 2017 - 12th International Conference on Availability, Reliability and Security,
ACM, Reggio Calabria, Italy, [Konferenzveröffentlichung]

Mulholland, John ; Mosca, Michele ; Braun, Johannes (2017):
The Day the Cryptography Dies.
In: IEEE Security & Privacy, 15 (4), S. 14-21. DOI: 10.1109/MSP.2017.3151325,
[Artikel]

Nauth, Julian (2017):
Charakterisierung von Bellschen Ungleichungen bei nicht-perfekter Detektion.
TU Darmstadt, [Bachelorarbeit]

Traverso, Giulia ; Garcia Cordero, Carlos ; Nojoumian, Mehrdad ; Azarderakhsh, Reza ; Demirel, Denise ; Habib, Sheikh Mahbub ; Buchmann, Johannes (2017):
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems.
15th Annual Conference on Privacy, Security and Trust (PST), Calgary, Canada, 28.-30.8. 2017, DOI: 10.1109/pst.2017.00040,
[Konferenzveröffentlichung]

Büscher, Niklas ; Katzenbeisser, Stefan (2017):
Compilation for Secure Multi-party Computation.
Springer Briefs in Computer Science, ISBN 978-3-319-67521-3,
[Buch]

Anagnostopoulos, Nikolaos Athanasios ; Schaller, André ; Fan, Yufan ; Xiong, Wenjie ; Tehranipoor, Fatemeh ; Arul, Tolga ; Gabmeyer, Sebastian ; Szefer, Jakub ; Chandy, John A. ; Katzenbeisser, Stefan (2017):
Insights into the Potential Usage of the Initial Values of DRAM Arrays of Commercial Off-the-Shelf Devices for Security Applications.
26th Crypto-Day, Nürnberg, Germany, 01.-02.06.2017, [Konferenzveröffentlichung]

Asharov, Gilad ; Demmler, Daniel ; Schapira, Michael ; Schneider, Thomas ; Segev, Gil ; Shenker, Scott ; Zohner, Michael (2017):
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (3), S. 143-163. De Gruyter Open, DOI: 10.1515/popets-2017-0033,
[Artikel]

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2017):
More Efficient Oblivious Transfer Extensions.
In: Journal of Cryptology (JoC), 30 (3), S. 805-858. Springer, DOI: 10.1007/s00145-016-9236-6,
[Artikel]

Bugge, Sebastian (2017):
Solving Learning With Errors Instances Using Quantum Reductions.
Darmstadt, Technische Universität, [Masterarbeit]

Buldas, Ahto ; Geihs, Matthias ; Buchmann, Johannes (2017):
Long-Term Secure Commitments via Extractable-Binding Commitments.
In: LNCS, In: ACISP 2017 - 22nd Australasian Conference on Information Security and Privacy,
Springer, Auckland, New Zealand, [Konferenzveröffentlichung]

Demmler, Daniel ; Holz, Marco ; Schneider, Thomas (2017):
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks.
In: 15. International Conference on Applied Cryptography and Network Security (ACNS'17), S. 599-619,
Springer, DOI: 10.1007/978-3-319-61204-1_30,
[Konferenzveröffentlichung]

Erwig, Andreas ; Fischlin, Marc ; Hald, Martin ; Helm, Dominik ; Kiel, Robert ; Kübler, Florian ; Kümmerlin, Michael ; Laenge, Jakob ; Rohrbach, Felix (2017):
Redactable Graph Hashing, Revisited.
In: ACISP 2017,
[Konferenzveröffentlichung]

Fuhry, Benny ; Bahmani, Raad ; Brasser, Ferdinand ; Hahn, Florian ; Kerschbaum, Florian ; Sadeghi, Ahmad-Reza (2017):
HardIDX: Practical and Secure Index with SGX.
In: Conference on Data and Applications Security and Privacy (DBSec),
[Konferenzveröffentlichung]

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Zeitouni, Shaza (2017):
SeED: Secure Non-Interactive Attestation for Embedded Devices.
In: 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017),
Boston, USA, [Konferenzveröffentlichung]

Kiss, Ágnes ; Liu, Jian ; Schneider, Thomas ; Asokan, N. ; Pinkas, Benny (2017):
Private Set Intersection for Unequal Set Sizes with Mobile Applications.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (4), S. 177-197. De Gruyter Open, DOI: 10.1515/popets-2017-0044,
[Artikel]

Kohnhäuser, Florian ; Büscher, Niklas ; Gabmeyer, Sebastian ; Katzenbeisser, Stefan (2017):
SCAPI: a scalable attestation protocol to detect software and physical attacks.
In: Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, S. 75-86,
ACM, [Konferenzveröffentlichung]

Langfeld, Benedikt (2017):
Vorbereitende Arbeiten zum Feldtest eines Systems zum Quantenschlüsselaustausch.
Darmstadt, Technische Universität, [Bachelorarbeit]

Yalame, Mohammad Hossein ; Farzam, Mohammad Hossein ; Sarmadi, Siavash Bayat (2017):
Secure Two-Party Computation Using an Efficient Garbled Circuit by Reducing Data Transfer.
In: 8. International Conference on Applications and Techniques in Information Security (ATIS'17),
Springer, [Konferenzveröffentlichung]

Alkeilani Alkadri, Nabil ; Buchmann, Johannes ; Bansarkhani, Rachid El ; Krämer, Juliane (2017):
A Framework to Select Parameters for Lattice-Based Cryptography.
In: Cryptology ePrint Archive, 2017 (615), S. 1-37. International Association for Cryptologic Research (IACR), [Artikel]

Alkim, Erdem ; Bindel, Nina ; Buchmann, Johannes ; Dagdelen, Özgür ; Eaton, Edward ; Gutoski, Gus ; Krämer, Juliane ; Pawlega, Filip (2017):
Revisiting TESLA in the quantum random oracle model.
In: PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography,
Springer, Utrecht, the Netherlands, [Konferenzveröffentlichung]

Bindel, Nina ; Herath, Udyani ; McKague, Matthew ; Stebila, Douglas (2017):
Transitioning to a Quantum-Resistant Public Key Infrastructure.
In: PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography,
Springer, Utrecht, the Netherlands, [Konferenzveröffentlichung]

Boukoros, Spyros ; Karvelas, Nikolaos ; Katzenbeisser, Stefan (2017):
A lightweight protocol for privacy preserving division.
In: IWCMC 2017 - 13th International Wireless Communications and Mobile Computing Conference,
IEEE, Valencia Spain, [Konferenzveröffentlichung]

Dessouky, Ghada ; Zeitouni, Shaza ; Nyman, Thomas ; Paverd, Andrew ; Davi, Lucas ; Koeberl, Patrick ; Asokan, N. ; Sadeghi, Ahmad-Reza (2017):
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware.
54th Design Automation Conference (DAC'17), [Konferenzveröffentlichung]

Funke, Sebastian
Daubert, Jörg (Hrsg.) (2017):
IoT Architektur zum Schutz von Privatsphäre Ende-zu-Ende.
In: Proceedings of the DACH Security 2017, S. 1-10,
München, DACH Security 2017, [Konferenzveröffentlichung]

Gagliardoni, Tommaso ; Karvelas, Nikolaos ; Katzenbeisser, S. (2017):
ORAMs in a Quantum World.
In: PQCrypto 2017 - 8th International Workshop Post-Quantum Cryptography,
Springer, Utrecht, The Netherlands, [Konferenzveröffentlichung]

Göpfert, Florian ; Vredendaal, Christine van ; Wunderer, Thomas (2017):
A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE.
In: PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography,
[Konferenzveröffentlichung]

Klein, Amit ; Shulman, Haya ; Waidner, Michael (2017):
Counting in the Dark: Caches Discovery and Enumeration in the Internet.
In: IEEE/IFIP International Conference on Dependable Systems and Networks (DSN),
Denver, CO, USA, [Konferenzveröffentlichung]

Bindel, Nina (2017):
Ein deutsches digitales Signaturverfahren auf dem Weg zum internationalen kryptographischen Standard.
In: Digitale Gesellschaft zwischen Risikobereitschaft und Sicherheitsbedürfnis- Tagungsband zum 15. Deutschen IT-Sicherheitskongress,
SecuMedia Verlag, [Konferenzveröffentlichung]

Buchmann, Johannes ; Braun, Johannes ; Demirel, Denise ; Geihs, Matthias (2017):
Quantum Cryptography: a view from classical cryptography.
In: Quantum Science and Technology, 2 (2), DOI: 10.1088/2058-9565/aa69cd,
[Artikel]

Klein, Amit ; Shulman, Haya ; Waidner, Michael (2017):
Internet-Wide Study of DNS Cache Injections.
In: IEEE International Conference on Computer Communications (INFOCOM),
Atlanta, GA, USA, [Konferenzveröffentlichung]

Trautmann, N. ; Ferenczi, Gergely ; Croke, Sarah ; Barnett, Stephen (2017):
Holographic quantum imaging: reconstructing spatial properties via two-particle interference.
In: Journal of Optics, 19 (5), IOP Publishing Ltd., ISSN 2040-8978,
DOI: 10.1088/2040-8986/aa67b6,
[Artikel]

Alexopoulos, Nikolaos (2017):
Student Research Abstract: On Enhancing Trust in Cryptographic Solutions.
In: Proceedings of the 32nd Annual ACM Symposium on Applied Computing,
New York, NY, USA, ACM, Marrakech, Morocco, 3-6 April 2017, DOI: 10.1145/3019612.3019921,
[Konferenzveröffentlichung]

Braun, Johannes ; Buchmann, Johannes ; Demirel, Denise ; Fujiwara, Mikio ; Geihs, Matthias ; Moriai, Shiho ; Sasaki, Masahide ; Waseda, Atsushi (2017):
SHORT PAPER: LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality.
In: ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, S. 461-468,
New York, ACM, ASIA CCS '17, Abu Dhabi, UAE, April 2-6, 2017, ISBN 978-1-4503-4944-4,
DOI: 10.1145/3052973.3053043,
[Konferenzveröffentlichung]

Buchmann, Johannes ; Demirel, Denise ; Schabhüser, Lucas ; Struck, Patrick (2017):
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability.
In: LNCS, In: C2SI 2017 - Codes, Cryptology and Information Security - Second International Conference in honor of Professor Claude Carlet, S. 142-160,
Springer, Rabat, Morocco, ISBN 978-3-319-55589-8,
[Konferenzveröffentlichung]

Fischlin, Marc ; Günther, Felix (2017):
Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates.
In: 2nd IEEE European Symposium on Security and Privacy (EuroS&P 2017),
IEEE, Paris, France, [Konferenzveröffentlichung]

Günther, Felix ; Hale, Britta ; Jager, Tibor ; Lauer, Sebastian (2017):
0-RTT Key Exchange with Full Forward Secrecy.
In: Eurocrypt 2017 - 36th International Conference on the Theory and Applications of Cryptographic Techniques,
Springer, [Konferenzveröffentlichung]

Holzer, Patrick (2017):
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β.
TU Darmstadt, [Masterarbeit]

Marson, Giorgia Azzurra ; Poettering, Bertram (2017):
Security Notions for Bidirectional Channels.
In: IACR Transactions on Symmetric Cryptology, 2017 (1), S. 405-426. DOI: 10.13154/tosc.v2017.i1.405-426,
[Artikel]

Portela, Bernardo ; Barbosa, Manuel ; Scerri, Guillaume ; Warinschi, Bogdan ; Bahmani, Raad ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza (2017):
Secure Multiparty Computation from SGX.
In: Financial Cryptography and Data Security,
[Konferenzveröffentlichung]

Weinert, Christian ; Demirel, Denise ; Vigil, Martín ; Geihs, Matthias ; Buchmann, Johannes (2017):
MoPS: A Modular Protection Scheme for Long-Term Storage.
In: 12. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'17), S. 436-448,
ACM, ISBN 978-1-4503-4944-4,
DOI: 10.1145/3052973.3053025,
[Konferenzveröffentlichung]

Mariano, Artur ; Laarhoven, Thijs ; Bischof, Christian (2017):
A Parallel Variant of LDSieve for the SVP on Lattices.
In: 2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP),
IEEE, 2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP), DOI: 10.1109/PDP.2017.60,
[Konferenzveröffentlichung]

Chen, Joe ; Steinmetzer, Daniel ; Classen, Jiska ; Knightly, Edward ; Hollick, Matthias (2017):
Pseudo Lateration: Millimeter-Wave Localization Using a Single RF Chain.
In: IEEE WCNC,
[Konferenzveröffentlichung]

Dantas, Yuri Gil ; Hamann, Tobias ; Mantel, Heiko ; Schickel, Johannes (2017):
An Experimental Study of a Bucketing Approach.
In: Quantitative Aspects of Programming Languages and Systems,
Uppsala, Sweden, [Konferenzveröffentlichung]

Günther, Daniel (2017):
Valiant's Universal Circuit - Towards a Modular Construction and Implementation.
Darmstadt, Technische Universität, [Bachelorarbeit]

Günther, Felix ; Poettering, Bertram (2017):
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes.
In: International Journal of Information Security, 16 (3), S. 281-297. Springer, ISSN 1615-5270,
[Artikel]

Pascoal, Túlio A. ; Dantas, Yuri Gil ; Fonseca, Iguatemi E. ; Nigam, Vivek (2017):
Slow TCAM Exhaustion DDoS Attack.
In: IFIP SEC 2017 - 32nd International Conference on ICT Systems Security and Privacy Protection, S. 17-31,
Springer, [Konferenzveröffentlichung]

Schurig, Sebastian (2017):
Development of a user interface and implementation of specific software tools for the evaluation and realization of PUFs with respect to security applications.
Darmstadt, Technische Universität, [Masterarbeit]

Toteva, Iva (2017):
Advancing Tool Support for the Detection of Side-Channel.
Darmstadt, Technische Universität, [Masterarbeit]

Trautmann, Nils ; Sonnleitner, Matthias ; Barnett, Stephen (2017):
Will a Decaying Atom Feel a Friction Force?
In: Physical Review Letters, 118 (5), APS Physics, ISSN 0031-9007,
DOI: 10.1103/PhysRevLett.118.053601,
[Artikel]

Cohen, Avichai ; Gilad, Yossi ; Herzberg, Amir ; Schapira, Michael ; Shulman, Haya (2017):
Are We There Yet? On RPKIs Deployment and Security.
In: Network and Distributed Systems Security (NDSS),
San Diego, CA, USA, [Konferenzveröffentlichung]

Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017):
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
In: 24th Annual Network & Distributed System Security Symposium (NDSS),
[Konferenzveröffentlichung]

Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael (2017):
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
In: 24. Annual Network and Distributed System Security Symposium (NDSS'17),
Internet Society, DOI: 10.14722/ndss.2017.23097,
[Konferenzveröffentlichung]

Nielsen, Jesper Buus ; Schneider, Thomas ; Trifiletti, Roberto (2017):
Constant Round Maliciously Secure 2PC with Function-Independent Preprocessing using LEGO.
In: 24. Annual Network and Distributed System Security Symposium (NDSS'17),
Internet Society, DOI: 10.14722/ndss.2017.23075,
[Konferenzveröffentlichung]

Rudd, Robert ; Skowyra, Richard ; Bigelow, David ; Dedhia, Veer ; Hobson, Thomas ; Crane, Stephen ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Franz, Michael ; Sadeghi, Ahmad-Reza ; Okhravi, Hamed (2017):
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
In: 24th Annual Network & Distributed System Security Symposium (NDSS),
[Konferenzveröffentlichung]

Schaller, André ; Xiong, Wenjie ; Anagnostopoulos, Nikolaos Athanasios ; Saleem, Umair ; Gabmeyer, Sebastian ; Katzenbeisser, Stefan ; Szefer, Jakub (2017):
Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security.
In: 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST),
Institute of Electrical and Electronics Engineers (IEEE), McLean, VA, USA, [Konferenzveröffentlichung]

Schmidt, Markus (2017):
Estimation of the Hardness of the Learning with Errors Problem with a Given Number of Samples.
Darmstadt, Technische Universität, [Masterarbeit]

Kohnhäuser, Florian ; Büscher, Niklas ; Gabmeyer, Sebastian ; Katzenbeisser, Stefan (2017):
Scalable Attestation Resilient to Physical Attacks for Embedded Devices in Mesh Networks.
In: arXiv, [Artikel]

Riazi, M. Sadegh ; Songhori, Ebrahim M. ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz (2017):
Toward Practical Secure Stable Matching.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (1), S. 62-78. De Gruyter Open, DOI: 10.1515/popets-2017-0005,
[Artikel]

Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra (2017):
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
S. 225-241, Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS), [Konferenzveröffentlichung]

Dewald, Florian ; Mantel, Heiko ; Weber, Alexandra (2017):
AVR Processors as a Platform for Language-Based Security.
S. 427-445, Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS), [Konferenzveröffentlichung]

Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Schickel, Johannes (2017):
Towards Accelerated Usage Control based on Access Correlations.
S. 245-261, Proceedings of the 22nd Nordic Conference on Secure IT Systems (NordSec), [Konferenzveröffentlichung]

Mantel, Heiko ; Weber, Alexandra ; Köpf, Boris (2017):
A Systematic Study of Cache Side Channels across AES Implementations.
S. 213-230, Proceedings of the 9th International Symposium on Engineering Secure Software and Systems (ESSoS), [Konferenzveröffentlichung]

Nyman, Thomas ; Dessouky, Ghada ; Zeitouni, Shaza ; Lehikoinen, Aaro ; Paverd, Andrew ; Asokan, N. ; Sadeghi, Ahmad-Reza (2017):
HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement.
In: Cryptography and Security, abs/1705.10295, [Artikel]

Schaller, André ; Stanko, Taras ; Skoric, Boris ; Katzenbeisser, Stefan (2017):
Eliminating Leakage in Reverse Fuzzy Extractors.
In: IEEE Transactions on Information Forensics and Security, [Artikel]

Schulz, Steffen ; Schaller, André ; Kohnhäuser, Florian ; Katzenbeisser, Stefan (2017):
Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors.
In: LNCS, In: ESORICS 2017 - European Symposium on Research in Computer Security, S. 437-455,
Springer, Oslo, Norway, ISBN 978-3-319-66398-2,
DOI: 10.1007/978-3-319-66399-9_24,
[Konferenzveröffentlichung]

Shulman, Haya ; Waidner, Michael (2017):
One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in the Internet.
In: Proceedings of the 14th USENIX Conference on Networked Systems Design and Implementation, S. 131-144,
USENIX Association, 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17), Boston, MA, USA, 27.-29.03. 2017, [Konferenzveröffentlichung]

2016

Wunderer, Thomas (2016):
Revisiting the Hybrid Attack: Improved Analysis and Refined Security Estimates.
In: Cryptology ePrint Archive, 2016 (733), S. 1-35. International Association for Cryptologic Research (IACR), [Artikel]

Brendel, Jacqueline ; Demirel, Denise (2016):
Efficient Proactive Secret Sharing.
In: 2016 Privacy, Security and Trust Conference,
IEEE, Auckland, New Zealand, [Konferenzveröffentlichung]

Geihs, Matthias ; Demirel, Denise ; Buchmann, Johannes (2016):
A security analysis of techniques for long-term integrity protection.
In: 2016 Privacy, Security and Trust Conference,
Auckland, New Zealand, [Konferenzveröffentlichung]

Traverso, Giulia ; Demirel, Denise ; Habib, Sheikh Mahbub ; Buchmann, Johannes (2016):
AS³: Adaptive Social Secret Sharing for Distributed Storage Systems.
In: 2016 Privacy, Security and Trust Conference,
IEEE, Auckland, New Zealand, [Konferenzveröffentlichung]

Schroth, Nils (2016):
Demonstrator for Privacy-Preserving Face Recognition.
TU Darmstadt, [Bachelorarbeit]

Bansarkhani, Rachid El ; Sturm, Jan (2016):
An Efficient Lattice-based Multisignature Scheme with Applications to Bitcoins.
In: 15th International Conference on Cryptology and Network Security - CANS 2016,
Milan, Italy, [Konferenzveröffentlichung]

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016):
CATT: Practical and Generic Software-only Defenses Against Rowhammer Attacks.
In: Cryptography and Security, [Artikel]

Buescher, Niklas ; Kretzmer, David ; Jindal, Arnav ; Katzenbeisser, Stefan (2016):
Scalable Secure Computation from ANSI-C.
In: WIFS - IEEE International Workshop on Information Forensics and Security,
IEEE, [Konferenzveröffentlichung]

Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016):
Towards a Policy-Agnostic Control-Flow Integrity Implementation.
In: Black Hat Europe,
[Konferenzveröffentlichung]

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Ekberg, Jan-Erik ; Nyman, Thomas ; Paverd, Andrew ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016):
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
In: 23rd ACM Conference on Computer and Communications Security (CCS),
[Konferenzveröffentlichung]

Bieber, Julian (2016):
Generalizing Semi-Private Function Evaluation.
TU Darmstadt, [Bachelorarbeit]

Classen, Jiska ; Steinmetzer, Daniel ; Hollick, Matthias (2016):
Opportunities and Pitfalls in Securing Visible Light Communication on the Physical Layer.
In: 3rd ACM Workshop on Visible Light Communication Systems, [Artikel]

Deshotels, Luke ; Deaconescu, Razvan ; Chiroiu, Mihai ; Davi, Lucas ; Enck, William ; Sadeghi, Ahmad-Reza (2016):
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
In: 23rd ACM Conference on Computer and Communications Security (CCS),
[Konferenzveröffentlichung]

Hauck, Markus ; Savvides, Savvas ; Eugster, Patrick ; Mezini, Mira ; Salvaneschi, Guido (2016):
SecureScala: Scala embedding of secure computations.
In: Proceedings of the 2016 7th ACM SIGPLAN Symposium on Scala,
ACM, [Konferenzveröffentlichung]

Holz, Marco (2016):
Effective Protection of Sensitive Metadata in Online Communication Networks.
TU Darmstadt, [Bachelorarbeit]

Jawed, Kashif (2016):
An Investigation and Implementation for the Effect of Row Hammering in Static Random Access Memory (SRAM) and Dynamic Random Access Memory (DRAM).
Darmstadt, Technische Universität, [Masterarbeit]

Pfeiffer, Martin ; Kwiotek, Jan-Pascal ; Classen, Jiska ; Klose, Robin ; Hollick, Matthias (2016):
Analyzing TETRA Location Privacy and Network Availability.
In: SPSM '16, S. 117-122, New York, NY, USA, ACM, 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, Vienna, Austria, DOI: 10.1145/2994459.2994463,
[Konferenzveröffentlichung]

Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Ibrahim, Ahmad ; Conti, Mauro ; Neven, Gregory (2016):
SANA: Secure and Scalable Aggregate Network Attestation.
In: 23rd ACM Conference on Computer and Communications Security (CCS) 2016,
CCS 2016, [Konferenzveröffentlichung]

Schabhüser, Lucas ; Demirel, Denise ; Buchmann, Johannes (2016):
An Unconditionally Hiding Auditing Procedure for Computations over Distributed Data.
In: The 2nd IEEE Workshop on Security and Privacy in the Cloud (SPC 2016),
Philadelphia, PA USA, [Konferenzveröffentlichung]

Vasilomanolakis, Emmanouil ; Stahn, Michael ; Garcia Cordero, Carlos ; Mühlhäuser, Max (2016):
On Probe-Response Attacks in Collaborative Intrusion Detection Systems.
In: IEEE Conference on Communications and Network Security, S. 279 - 286,
IEEE, Philadelphia, USA, ISBN 978-1-5090-3065-1,
DOI: 10.1109/CNS.2016.7860495,
[Konferenzveröffentlichung]

Trautmann, Nils ; Alber, Gernot ; Leuchs, Gerd (2016):
Efficient single-photon absorption by a trapped moving atom.
In: Physical Review A, 94 (3), APS Physics, ISSN 2469-9926,
DOI: 10.1103/PhysRevA.94.033832,
[Artikel]

Buescher, Niklas ; Holzer, Andreas ; Weber, Alina ; Katzenbeisser, Stefan (2016):
Compiling Low Depth Circuits for Practical Secure Computation.
In: 21st European Symposium on Research in Computer Security (ESORICS 2016),
Springer, Heraklion, Crete, Greece, [Konferenzveröffentlichung]

Butin, Denis ; Demirel, Denise ; Buchmann, Johannes (2016):
Formal Policy-based Provenance Audit.
In: The 11th International Workshop on Security - IWSEC 2016,
sola city Conference Center, Akihabara-Ochanomizu District, Tokyo, Japan, [Konferenzveröffentlichung]

Demirel, Denise ; Krenn, Stephan ; Loruenser, Thomas ; Traverso, Giulia (2016):
Efficient Third Party Auditing for a Distributed Storage System.
In: International Conference on Availability, Reliability and Security - ARES 2016,
IEEE, Salzburg, Austria, [Konferenzveröffentlichung]

Dowling, Benjamin ; Günther, Felix ; Herath, Udyani ; Stebila, Douglas (2016):
Secure Logging Schemes and Certificate Transparency.
In: 21st European Symposium on Research in Computer Security (ESORICS 2016),
Springer, Heraklion, Crete, Greece, [Konferenzveröffentlichung]

Kohnhäuser, Florian ; Katzenbeisser, Stefan (2016):
Secure Code Updates for Mesh Networked Commodity Low-End Embedded Devices.
In: 21st European Symposium on Research in Computer Security (ESORICS 2016), S. 320-338,
Springer, Heraklion, Greece, ISBN 978-3-319-45741-3,
DOI: 10.1007/978-3-319-45741-3_17,
[Konferenzveröffentlichung]

Bansarkhani, Rachid El ; El Kaafarani, Ali (2016):
Post-Quantum Attribute-Based Signatures from Lattice Assumptions.
In: Cryptology ePrint Archive, 2016 (823), S. 1-28. International Association for Cryptologic Research (IACR), [Artikel]

Anagnostopoulos, Nikolaos Athanasios ; Katzenbeisser, Stefan ; Rosenstihl, Markus ; Schaller, André ; Gabmeyer, Sebastian ; Arul, Tolga (2016):
Low-temperature data remanence attacks against intrinsic SRAM PUFs.
[Report]

Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane (2016):
Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks.
In: FDTC 2016 - Fault Diagnosis and Tolerance in Cryptography,
IEEE Conference Publication, Santa Barbara, CA, USA, [Konferenzveröffentlichung]

Braun, Johannes ; Buchmann, Johannes ; Demirel, Denise ; Fujiwara, Mikio ; Geihs, Matthias ; Moriai, Shiho ; Sasaki, Masahide ; Waseda, Atsushi (2016):
LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper).
In: ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, S. 1-13,
New York, ACM, ASIA CCS '17, Abu Dhabi, UEA, April 2-6, 2017, ISBN 978-1-4503-4944-4,
[Konferenzveröffentlichung]

Fischlin, Marc ; Herzberg, Amir ; Noon, Hon Bin ; Shulman, Haya (2016):
Obfuscation Combiners.
In: International Cryptology Conference (CRYPTO),
Santa Barbara, CA, USA, [Konferenzveröffentlichung]

Klir, Thomas (2016):
Design and Implementation of an Archiving System Providing Long-Term Integrity and Long-Term Confidentiality.
Darmstadt, Technische Universität, [Bachelorarbeit]

Schaller, André ; Xiong, Wenjie ; Gabmeyer, Sebastian ; Anagnostopoulos, Nikolaos Athanasios ; Saleem, Umair ; Katzenbeisser, Stefan ; Szefer, Jakub
Gierlichs, Benedikt ; Poschmann, Axel (Hrsg.) (2016):
Run-time Accessible DRAM PUFs in Commodity Devices.
In: Lecture Notes in Computer Science (LNCS), 9813, In: Cryptographic Hardware and Embedded Systems (CHES 2016), S. 432-453,
Springer, Santa Barbara, California, USA, ISBN 978-3-662-53140-2,
DOI: 10.1007/978-3-662-53140-2_21,
[Konferenzveröffentlichung]

Traverso, Giulia ; Demirel, Denise ; Buchmann, Johannes (2016):
Dynamic and Verifiable Hierarchical Secret Sharing.
In: 9th International Conference on Information Theoretic Security - ICITS 2016,
Springer, Tacoma, Washington, USA, [Konferenzveröffentlichung]

Weinert, Christian (2016):
Building a Modular Long-Term Archiving System.
Darmstadt, Technische Universität, [Bachelorarbeit]

Karuppayah, Shankar ; Vasilomanolakis, Emmanouil ; Haas, Steffen ; Fischer, Mathias ; Mühlhäuser, Max (2016):
BoobyTrap: On Autonomously Detecting and Characterizing Crawlers in P2P Botnets.
In: 2016 IEEE International Conference on Communications,
IEEE, IEEE International Conference on Communications (ICC 2016), Kuala Lumpur, Malaysia, 22.-27.05.2016, ISBN 978-1-4799-6664-6,
DOI: 10.1109/ICC.2016.7510885,
[Konferenzveröffentlichung]

Habib, Sheikh Mahbub ; Vassileva, Julita ; Mauw, Sjouke ; Mühlhäuser, Max (Hrsg.) (2016):
Trust Management X.
In: IFIP Advances in Information and Communication Technology, 473, 1. Auflage, Springer, 10th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2016), Darmstadt, Germany, 18.-22.07.2016, ISSN 1868-4238, ISBN 978-3-319-41353-2,
DOI: 10.1007/978-3-319-41354-9,
[Konferenzveröffentlichung]

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Neven, Gregory ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2016):
POSTER: Toward a Secure and Scalable Attestation.
In: ACM WiSEC 2016,
[Konferenzveröffentlichung]

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas (2016):
Towards Securing Internet eXchange Points Against Curious onlooKers.
In: ACM, IRTF & ISOC Applied Networking Research Workshop (ANRW'16), S. 32-34,
ACM, DOI: 10.1145/2959424.2959427,
[Konferenzveröffentlichung]

Conti, Mauro ; Crane, Stephen ; Frassetto, Tommaso ; Homescu, Andrei ; Koppen, Georg ; Larsen, Per ; Liebchen, Christopher ; Perry, Mike ; Sadeghi, Ahmad-Reza (2016):
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
In: The annual Privacy Enhancing Technologies Symposium (PETS),
[Konferenzveröffentlichung]

Feldmann, Anja ; Heyder, Philipp ; Kreutzer, Michael ; Schmid, Stefan ; Seifert, Jean-Pierre ; Shulman, Haya ; Thimmaraju, Kashyap ; Waidner, Michael ; Sieberg, Jens (2016):
NetCo: Reliable Routing with Unreliable Routers.
In: IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) Workshops,
Toulouse, France, [Konferenzveröffentlichung]

Gagliardoni, Tommaso ; Hülsing, Andreas ; Schaffner, Christian (2016):
Semantic Security and Indistinguishability in the Quantum World.
In: LNCS, In: Advances in Cryptology – CRYPTO 2016, S. 60-89,
Springer, DOI: 10.1007/978-3-662-53015-3_3,
[Konferenzveröffentlichung]

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene ; Zeitouni, Shaza (2016):
DARPA: Device Attestation Resilient to Physical Attacks.
In: ACM WiSEC 2016,
[Konferenzveröffentlichung]

Sadeghi, Ahmad-Reza ; Dessouky, Ghada (2016):
POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs.
In: ACM WiSec 2016,
[Konferenzveröffentlichung]

Schultes, Tobias ; Grau, Markus ; Steinmetzer, Daniel ; Hollick, Matthias (2016):
Far Away and Yet Nearby - A Framework for Practical Distance Fraud on Proximity Services for Mobile Devices (Demo).
In: ACM Conference on Security and Privacy in Wireless and Mobile Networks 2016 (ACM WiSec'16),
[Konferenzveröffentlichung]

Späth, Johannes ; Nguyen, Lisa ; Ali, Karim ; Bodden, Eric (2016):
Boomerang: Demand-Driven Flow-Sensitive, Field-Sensitive, and Context-Sensitive Pointer Analysis.
In: European Conference on Object-Oriented Programming, S. 25,
Dagstuhl, Rome, Italy, [Konferenzveröffentlichung]

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Koushanfar, Farinaz ; Praverd, Andrew ; Tsudik, Gene ; Sadeghi, Ahmad-Reza (2016):
Things, Trouble, Trust: On Building Trust in IoT Systems.
In: 53rd Design Automation Conference (DAC),
[Konferenzveröffentlichung]

Brasser, Ferdinand ; Ganapathy, Vinod ; Iftode, Liviu ; Kim, Daeyoung ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016):
Regulating ARM TrustZone Devices in Restricted Spaces.
In: 14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys),
[Konferenzveröffentlichung]

Lettner, Julian ; Kollenda, Benjamin ; Homescu, Andrei ; Larsen, Per ; Schuster, Felix ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Franz, Michael (2016):
Subversive-C: Abusing and Protecting Dynamic Message Dispatch.
In: USENIX Annual Technical Conference (ATC),
[Konferenzveröffentlichung]

Mariano, Artur ; Correia, Fabio ; Bischof, Christian (2016):
A vectorized, cache efficient LLL implementation.
In: VECPAR 2016 - 12th International Meeting on High Performance Computing for Computational Science,
Porto, Portugal, [Konferenzveröffentlichung]

Schabhüser, Lucas ; Demirel, Denise ; Buchmann, Johannes (2016):
An Unconditionally Hiding Auditing Procedure for Multi-Party Computations.
In: IACR - Cryptology ePrint Archive, [Artikel]

Songhori, Ebrahim ; Zeitouni, Shaza ; Dessouky, Ghada ; Schneider, Thomas ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2016):
GarbledCPU: A MIPS Processor for Secure Computation in Hardware.
In: 53. Annual Design Automation Conference (DAC'16), S. 73:1-73:6,
ACM, DOI: 10.1145/2897937.2898027,
[Konferenzveröffentlichung]

Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016):
Strategy Without Tactics: Policy-Agnostic Hardware-Enhanced Control-Flow Integrity.
In: 53rd Design Automation Conference (DAC),
[Konferenzveröffentlichung]

Traverso, Giulia ; Demirel, Denise ; Buchmann, Johannes (2016):
Homomorphic Signature Schemes - A survey.
In: SpringerBriefs in Computer Science, Springer, ISBN Softcover 978-3-319-32114-1 - ebook 978-3-319-32115-8,
DOI: 10.1007/978-3-319-32115-8,
[Buch]

Trautmann, Nils ; Alber, Gernot (2016):
Dissipation-enabled efficient excitation transfer from a single photon to a single quantum emitter.
In: Physical Review A, 93, APS Physics, ISSN 2469-9926,
DOI: 10.1103/PhysRevA.93.053807,
[Artikel]

Buchmann, Johannes ; Büscher, Niklas ; Katzenbeisser, Stefan ; Krämer, Juliane ; Micciancio, Daniele ; Siim, Sander ; Vredendaal, Christine van ; Walter, Michael ; Göpfert, Florian (2016):
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge.
In: ASIAPKC 16 - 3rd ACM International Workshop on ASIA Public-Key Cryptography,
ACM, Xi'an, China, [Konferenzveröffentlichung]

Buchmann, Johannes ; Göpfert, Florian ; Güneysu, Tim ; Oder, Tobias ; Pöppelmann, Thomas (2016):
High-Performance and Lightweight Lattice-Based Public-Key Encryption.
In: IoTPTS '16 - 2nd ACM International Workshop on IoT Privacy, Trust, and Security,
ACM, Xi'an, China, [Konferenzveröffentlichung]

Fischlin, Marc ; Günther, Felix ; Schmidt, Benedikt ; Warinschi, Bogdan (2016):
Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3.
In: 37th IEEE Symposium on Security and Privacy (S&P 2016),
IEEE, San Jose, California, USA, [Konferenzveröffentlichung]

Kiss, Ágnes ; Schneider, Thomas (2016):
Valiant's Universal Circuit is Practical.
In: 35. Advances in Cryptology -- EUROCRYPT 2016, S. 699-728,
Springer, DOI: 10.1007/978-3-662-49890-3_27,
[Konferenzveröffentlichung]

Nadi, Sarah ; Krüger, Stefan ; Mezini, Mira ; Bodden, Eric (2016):
"Jumping Through Hoops" Why do Java Developers Struggle With Cryptography APIs?
In: International Conference on Software Engineering,
ACM, Austin, Texas, USA, [Konferenzveröffentlichung]

Trautmann, Nils ; Hauke, Philipp (2016):
Quantum simulation of the dynamical Casimir effect with trapped ions.
In: New Journal of Physics, 18, IOP Publishing Ltd., ISSN 1367-2630,
DOI: 10.1088/1367-2630/18/4/043029,
[Artikel]

Akleylek, Sedat ; Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Marson, Giorgia Azzurra (2016):
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation.
In: International Conference on Cryptology AFRICACRYPT 2016, S. 10,
Springer, Fes, Morocco, [Konferenzveröffentlichung]

Alber, Gernot ; Trautmann, Nils (2016):
Cooperative quantum electrodynamical processes in an ellipsoidal cavity.
In: Journal of Physics: Conference Series, 672, IOP Publishing Ltd., ISSN 1742-6596,
DOI: 10.1088/1742-6596/672/1/012004,
[Artikel]

Buchmann, Johannes ; Demirel, Denise ; Schabhüser, Lucas (2016):
Privately and Publicly Verifiable Computing Techniques.
In: SpringerBriefs in Computer Science, Cham, Springer International Publishing - Springer, ISBN 978-3-319-53797-9,
[Buch]

Buchmann, Johannes ; Göpfert, Florian ; Player, Rachel ; Wunderer, Thomas (2016):
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack.
In: International Conference on Cryptology AFRICACRYPT 2016,
Springer, Fes, Morocco, [Konferenzveröffentlichung]

Classen, Jiska (2016):
Software Defined Radio – Open Source Wireless Hacking.
[Anderes]

Rauzy, Pablo ; Kiss, Ágnes ; Krämer, Juliane ; Seifert, Jean-Pierre (2016):
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT.
In: Constructive Side-Channel Analysis and Secure Design - 7. International Workshop (COSADE'16), S. 111-129,
Springer, DOI: 10.1007/978-3-319-43283-0_7,
[Konferenzveröffentlichung]

Shulman, Haya ; Waidner, Michael (2016):
Is the Internet Ready for DNSSEC: Evaluating Pitfalls in the Naming Infrastructure.
In: In Traffic Monitoring and Analysis (TMA),
Louvain La Neuve, Belgium, [Konferenzveröffentlichung]

Steinmetzer, Daniel ; Classen, Jiska ; Hollick, Matthias (2016):
Exploring Millimeter-Wave Network Scenarios with Ray-tracing based Simulations in mmTrace.
In: IEEE Infocom 2016 Poster Presentation (Infocom'16 Posters),
San Francisco, [Konferenzveröffentlichung]

Steinmetzer, Daniel ; Classen, Jiska ; Hollick, Matthias (2016):
mmTrace: Modeling Millimeter-wave Indoor Propagation with Image-based Ray-tracing.
In: Millimeter-wave Networking Workshop (mmNet 2016), [Artikel]

Bernhard, David ; Fischlin, Marc ; Warinschi, Bogdan (2016):
On the Hardness of Proving CCA-Security of Signed ElGamal.
In: LNCS, In: Public-Key Cryptography - PKC 2016, S. 24,
Springer, Taipei, Taiwan, ISBN 978-3-662-49384-7,
DOI: 10.1007/978-3-662-49384-7_3,
[Konferenzveröffentlichung]

McLaughlin, Stephen ; Konstantinou, Charalambos ; Wang, Xueyang ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Maniatakos, Michail ; Karri, Ramesh (2016):
The Cybersecurity Landscape in Industrial Control Systems.
In: Proceedings of the IEEE, 104 (5), S. 1039-1057. DOI: 10.1109/JPROC.2015.2512235,
[Artikel]

Zeitouni, Shaza ; Oren, Yossef ; Wachsmann, Christian ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2016):
Remanence Decay Side-Channel: The PUF Case.
In: IEEE Transactions on Information Forensics and Security, 99, DOI: TIFS.2015.2512534,
[Artikel]

Amann, Sven ; Nadi, Sarah ; Nguyen, Hoan A. ; Nguyen, Tien N. ; Mezini, Mira (2016):
MUBench: A Benchmark for API-Misuse Detectors.
In: MSR'16, In: Proceedings of the 13th International Conference on Mining Software Repositories,
13th International Conference on Mining Software Repositories, Austin, Texas, USA, May 14–15, 2016, [Konferenzveröffentlichung]

Daubert, Jörg ; Fischer, Mathias ; Grube, Tim ; Schiffner, Stefan ; Kikiras, Panayotis ; Mühlhäuser, Max (2016):
AnonPubSub: Anonymous Publish-Subscribe Overlays.
In: Computer Communications, 76, S. 42-53. Elsevier, ISSN 0140-3664,
DOI: 10.1016/j.comcom.2015.11.004,
[Artikel]

Braden, Kjell ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016):
Leakage-Resilient Layout Randomization for Mobile Devices.
In: 23rd Annual Network & Distributed System Security Symposium (NDSS),
[Konferenzveröffentlichung]

Correia, Fabio ; Mariano, Artur ; Proença, Alberto ; Bischof, Christian ; Agrell, Erik (2016):
Parallel Improved Schnorr-Euchner Enumeration SE++ for the CVP and SVP.
In: PDP 2016 - 24th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, S. 596-603,
Heraklion, Crete, Greece, [Konferenzveröffentlichung]

Degabriele, Jean Paul ; Fehr, Victoria ; Fischlin, Marc ; Gagliardoni, Tommaso ; Günther, Felix ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Paterson, Kenneth G. (2016):
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol.
In: International Journal of Information Security, 15 (6), S. 637-657. Springer, ISSN 1615-5270,
[Artikel]

Erbenich, Vanessa (2016):
On the Efficiency of Lattice-Based Encryption.
Darmstadt, Technische Universität, [Bachelorarbeit]

Mariano, Artur ; Bischof, Christian (2016):
Enhancing the scalability, tractability and memory usage of HashSieve on multi-core CPUs.
In: PDP2016,
Conference Publishing Services (CPS), Heraklion Crete, Greece, [Konferenzveröffentlichung]

Rieß, Susanne (2016):
An Analysis of Lattice-Based Key Exchange Protocols.
TU Darmstadt, [Masterarbeit]

Dowling, Benjamin ; Fischlin, Marc ; Günther, Felix ; Stebila, Douglas (2016):
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol.
In: Cryptology ePrint Archive, 2016 (81), S. 1-33. International Association for Cryptologic Research (IACR), [Artikel]

Akleylek, Sedat ; Dagdelen, Özgür ; Tok, Zaliha Yüce (2016):
On the Efficiency of Polynomial Multiplication for Lattice-Based Cryptography on GPUs Using CUDA.
In: LNCS, 9540, In: Cryptography and Information Security in the Balkans, S. 155-168,
Springer, Koper, Slovenia, [Konferenzveröffentlichung]

Brendel, Jacqueline (2016):
Efficient Proactive Secret Sharing.
Darmstadt, Technische Universität, [Masterarbeit]

Daubert, Jörg ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max (2016):
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks.
In: Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC), S. 738-744,
IEEE, Las Vegas, USA, ISBN 978-1-4673-9292-1,
DOI: 10.1109/CCNC.2016.7444871,
[Konferenzveröffentlichung]

Nadi, Sarah ; Krüger, Stefan (2016):
Variability Modeling of Cryptographic Components (Clafer Experience Report).
In: Proceedings of the Tenth International Workshop on Variability Modelling of Software-intensive Systems, Tenth International Workshop on Variability Modelling of Software-intensive Systems, Salvador, Brazil, 27. - 29.1.2016, [Konferenzveröffentlichung]

Alagic, Gorjan ; Broadbent, Anne ; Fefferman, Bill ; Gagliardoni, Tommaso ; Schaffner, Christian ; Jules, Michael St. (2016):
Computational Security of Quantum Encryption.
In: Lecture Notes in Computer Science - ICITS, 10015, In: Information Theoretic Security : 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, S. 47-71, Cham, Springer, ISBN 978-3-319-49174-5,
[Buchkapitel]

Brasser, Ferdinand ; Rasmussen, Kasper ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016):
Remote Attestation for Low-End Embedded Devices: the Prover's Perspective.
In: DAC '16, In: Proceedings of the 53nd Annual Design Automation Conference,
ACM, [Konferenzveröffentlichung]

Cam-Winget, Nancy ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016):
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected.
In: 53rd Design Automation Conference (DAC),
[Konferenzveröffentlichung]

Daubert, Jörg (2016):
Anonymous Publish-Subscribe Overlays.
Darmstadt, Technische Universität Darmstadt,
[Dissertation]

Göpfert, Florian (2016):
Securely Instantiating Cryptographic Schemes Based on the Learning with Errors Assumption.
Darmstadt, Technische Universität,
[Dissertation]

Reif, Michael ; Eichberg, Michael ; Hermann, Ben ; Lerch, Johannes ; Mezini, Mira (2016):
Call graph construction for Java libraries.
S. 474-486, Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, DOI: 10.1145/2950290.2950312,
[Konferenzveröffentlichung]

Sadeghi, Ahmad-Reza ; Armknecht, Frederik (2016):
Towards a Unified Security Model for Physically Unclonable Functions.
In: CT-RSA - Cryptographers' Track at the RSA Conference,
[Konferenzveröffentlichung]

Vigil, Martín ; Demirel, Denise ; Habib, Sheikh Mahbub ; Hauke, Sascha ; Buchmann, Johannes ; Mühlhäuser, Max (2016):
LoT: a Reputation-based Trust System for Long-term Archiving.
In: SECURWARE 2016, S. 262-270,
Thinkmind Digital Library, Nice, France, ISBN 978-1-61208-493-0,
[Konferenzveröffentlichung]

2015

Novotny, Jaroslav ; Alber, Gernot ; Jex, Igor (2015):
Universality in random quantum networks.
In: Physical Review A, 92 (6), APS Physics, ISSN 2469-9926,
DOI: 10.1103/PhysRevA.92.062335,
[Artikel]

Frydrych, Holger ; Marthaler, Michael ; Alber, Gernot (2015):
Pulse-controlled quantum gate sequences on a strongly coupled qubit chain.
In: Physical Review A, 92 (6), APS Physics, ISSN 2469-9926,
DOI: 10.1103/PhysRevA.92.062322,
[Artikel]

Borgwart, Andreas ; Boukoros, Spyros ; Shulman, Haya ; Waidner, Michael ; Royeen, Carel van (2015):
Detection and Forensics of Domains Hijacking.
In: IEEE Global Communications Conference,
IEEE, San Diego, CA, USA, [Konferenzveröffentlichung]

Classen, Jiska (2015):
Building and Breaking Wireless Security.
[Anderes]

Davi, Lucas ; Sadeghi, Ahmad-Reza (2015):
Building Secure Defenses Against Code-Reuse Attacks.
Cham, Springer International Publishing, ISBN 978-3-319-25544-6,
DOI: 10.1007/978-3-319-25546-0,
[Buch]

Larsen, Per ; Brunthaler, Stefan ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Franz, Michael (2015):
Automated Software Diversity.
In: Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool, DOI: 10.2200/S00686ED1V01Y201512SPT014,
[Buch]

Proksch, Sebastian ; Lerch, Johannes ; Mezini, Mira (2015):
Intelligent Code Completion with Bayesian Networks.
In: ACM Transactions on Software Engineering and Methodology (TOSEM), 25 (1), S. 3:1-3:31. ACM Press, [Artikel]

Dagdelen, Özgür ; Gajek, Sebastian ; Göpfert, Florian (2015):
Learning With Errors in the Exponent.
In: LNCS, In: 18th International Conference on information Security and Cryptology (ICISC) 2015,
Springer, Seoul, Korea, [Konferenzveröffentlichung]

Krämer, Juliane ; Kiss, Ágnes ; Stüber, Anke (2015):
On the Optimality of Differential Fault Analyses on CLEFIA.
In: 6. International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS'15), S. 181-196,
Springer, DOI: 10.1007/978-3-319-32859-1_15,
[Konferenzveröffentlichung]

Lerch, Johannes ; Späth, Johannes ; Bodden, Eric ; Mezini, Mira (2015):
Access-Path Abstraction: Scaling Field-Sensitive Data-Flow Analysis with Unbounded Access Paths.
In: Proceedings of the 2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE), S. 619-629,
Washington, DC, USA, IEEE Computer Society, Automated Software Engineering (ASE), 2015 30th IEEE/ACM International Conference on, Lincoln, Nebraska, USA, 9.-13. November 2015, [Konferenzveröffentlichung]

Volk, Florian ; Trüschler, Nadine ; Mühlhäuser, Max (2015):
Rating Decomposition with Conjoint Analysis and Machine Learning.
In: CENTRIC 2015: The Eighth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, S. 36-41,
IARIA, Barcelona, Spain, ISBN 978-1-61208-440-4,
[Konferenzveröffentlichung]

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian (2015):
SEDA: Scalable Embedded Device Attestation.
In: 22nd ACM Conference on Computer and Communications Security (CCS),
[Konferenzveröffentlichung]

Conti, Mauro ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Negro, Marco ; Qunaibit, Mohaned ; Sadeghi, Ahmad-Reza (2015):
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
In: 22nd ACM Conference on Computer and Communications Security (CCS),
[Konferenzveröffentlichung]

Crane, Stephen ; Volckaert, Stijn ; Schuster, Felix ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Sutter, Bjorn De ; Franz, Michael (2015):
It's a TRAP: Table Randomization and Protection against Function Reuse Attacks.
In: 22nd ACM Conference on Computer and Communications Security (CCS),
[Konferenzveröffentlichung]

Demmler, Daniel ; Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza (2015):
Automated Synthesis of Optimized Circuits for Secure Computation.
In: 22. ACM Conference on Computer and Communications Security (CCS'15), S. 1504-1517,
ACM, DOI: 10.1145/2810103.2813678,
[Konferenzveröffentlichung]

Dowling, Benjamin ; Fischlin, Marc ; Günther, Felix ; Stebila, Douglas (2015):
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates.
In: 22nd ACM Conference on Computer and Communications Security (CCS 2015), S. 1197-1210,
ACM, Denver, Colorado, USA, [Konferenzveröffentlichung]

Schaller, André ; Skoric, Boris ; Katzenbeisser, Stefan (2015):
On the Systematic Drift of Physically Unclonable Functions Due to Aging.
In: 5th International Workshop on Trustworthy Embedded Devices (TrustED 2015), S. 15-20,
Denver, Colorado, USA, ISBN 978-1-4503-3828-8,
DOI: 10.1145/2808414.2808417,
[Konferenzveröffentlichung]

Shulman, Haya ; Waidner, Michael (2015):
DNSSEC for Cyber Forensics.
In: EURASIP J. Information Security, (16), S. 14. [Artikel]

Böck, Leon ; Karuppayah, Shankar ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max (2015):
Hide And Seek: Detecting Sensors in P2P Botnets.
In: Communications and Network Security (CNS), 2015 IEEE Conference on, S. 731-732,
IEEE, Florence, Italy, DOI: 10.1109/CNS.2015.7346908,
[Konferenzveröffentlichung]

Classen, Jiska ; Chen, Joe ; Steinmetzer, Daniel ; Hollick, Matthias ; Knightly, Edward (2015):
The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications.
In: 2nd ACM Workshop on Visible Light Communication Systems, S. 6,
Paris, France, [Konferenzveröffentlichung]

Classen, Jiska ; Schulz, Matthias ; Hollick, Matthias (2015):
Practical Covert Channels for WiFi Systems.
In: IEEE Conference on Communications and Network Security (CNS), S. 8,
Florence, Italy, [Konferenzveröffentlichung]

Mantel, Heiko ; Starostin, Artem (2015):
Transforming Out Timing Leaks, More or Less.
In: LNCS, In: Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS 2015) - Part I, S. 20,
Springer, Vienna, Austria, [Konferenzveröffentlichung]

Mariano, Artur ; Laarhoven, Thijs ; Bischof, Christian (2015):
Parallel (Probable) Lock-Free Hash Sieve: A Practical Sieving Algorithm for the SVP.
S. 590-599, IEEE, 44th International Conference on Parallel Processing (ICPP 2015), Beijing, China, 01.-04.09., ISSN 01903918,
DOI: 10.1109/ICPP.2015.68,
[Konferenzveröffentlichung]

Shulman, Haya ; Waidner, Michael (2015):
Towards Security of Internet's Naming Infrastructure.
In: Computer Security ESORICS,
Vienna, Austria, [Konferenzveröffentlichung]

Steinmetzer, Daniel ; Chen, Joe ; Classen, Jiska ; Knightly, Edward ; Hollick, Matthias (2015):
Eavesdropping with Periscopes: Experimental Security Analysis of Highly Directional Millimeter Waves.
In: IEEE Conference on Communications and Network Security 2015 (CNS),
Florence, DOI: 10.1109/CNS.2015.7346844,
[Konferenzveröffentlichung]

Arzt, Steven ; Nadi, Sarah ; Ali, Karim ; Bodden, Eric ; Erdweg, Sebastian ; Mezini, Mira (2015):
Towards Secure Integration of Cryptographic Software.
In: Proceedings of the 2015 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming & Software, OOPSLA Onward!, Piitsburgh, 25.10.2015, [Konferenzveröffentlichung]

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian (2015):
SEDA - Technical Report.
[Report]

Buescher, Niklas ; Katzenbeisser, Stefan (2015):
Faster Secure Computation through Automatic Parallelization.
In: 24th USENIX Security Symposium (USENIX Security'15),
USENIX Association, Washington, D.C., USA, [Konferenzveröffentlichung]

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael (2015):
Return to Where? You Can't Exploit What You Can't Find.
In: Blackhat USA,
[Konferenzveröffentlichung]

Fischlin, Marc ; Günther, Felix ; Marson, Giorgia Azzurra ; Paterson, Kenneth G. (2015):
Data Is a Stream: Security of Stream-Based Channels.
In: Advances in Cryptology - CRYPTO 2015, S. 545-564,
Springer, Santa Barbara, CA, USA, [Konferenzveröffentlichung]

Koeberl, Patrick ; Phegade, Vinay ; Rajan, Anand ; Schneider, Thomas ; Schulz, Steffen ; Zhdanova, Maria (2015):
Time to Rethink: Trust Brokerage using Trusted Execution Environments.
In: 8. International Conference on Trust and Trustworthy Computing (TRUST'15), S. 181-190,
Springer, DOI: 10.1007/978-3-319-22846-4_11,
[Konferenzveröffentlichung]

Kohnhäuser, Florian ; Schaller, André ; Katzenbeisser, Stefan (2015):
PUF-based Software Protection for Low-end Embedded Devices.
In: 8th International Conference on Trust and Trustworthy Computing (TRUST 2015), S. 3-21,
Springer, Heraklion, Crete, Greece, ISBN 978-3-319-22846-4,
DOI: 10.1007/978-3-319-22846-4_1,
[Konferenzveröffentlichung]

Pinkas, Benny ; Schneider, Thomas ; Segev, Gil ; Zohner, Michael (2015):
Phasing: Private Set Intersection using Permutation-based Hashing.
In: 24. USENIX Security Symposium (USENIX Security'15), S. 515-530,
USENIX, [Konferenzveröffentlichung]

Alkim, Erdem ; Bindel, Nina ; Buchmann, Johannes ; Dagdelen, Özgür ; Schwabe, Peter (2015):
TESLA: Tightly-Secure Efficient Signatures from Standard Lattices.
In: Cryptology ePrints Archive, 2015 (755), S. 1-24. International Association for Cryptologic Research (IACR), [Artikel]

Medeiros, Flávio ; Kästner, Christian ; Ribeiro, Márcio ; Nadi, Sarah ; Gheyi, Rohit (2015):
The Love/Hate Relationship with the C Preprocessor: An Interview Study.
In: European Conference on Object-Oriented Programming, S. 999-1022,
Prague, Czech Republic, [Konferenzveröffentlichung]

Amin, Osama (2015):
Implementation and Evaluation of PUF based Cryptographic Key Generation Schemes on FPGA.
Darmstadt, Technische Universität, [Masterarbeit]

Arias, Orlando ; Davi, Lucas ; Hanreich, Matthias ; Jin, Yier ; Koeberl, Patrick ; Paul, Debayan ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2015):
HAFIX: Hardware-Assisted Flow Integrity Extension.
In: 52nd Design Automation Conference (DAC),
[Konferenzveröffentlichung]

Brasser, Ferdinand ; Koeberl, Patrick ; Mahjoub, Brahim El ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2015):
TyTAN: Tiny Trust Anchor for Tiny Devices.
In: 52nd Design Automation Conference (DAC) 2015,
[Konferenzveröffentlichung]

Cabarcas, Daniel ; Demirel, Denise ; Göpfert, Florian ; Lancrenon, Jean ; Wunderer, Thomas (2015):
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme.
[Report]

Demirel, Denise ; Lancrenon, Jean (2015):
How to Securely Prolong the Computational Bindingness of Pedersen Commitments.
[Report]

Egert, Rolf ; Fischlin, Marc ; Gens, David ; Jacob, Sven ; Senker, Matthias ; Tillmans, Jörg (2015):
Privately computing set-union and set-intersection cardinality via bloom filters.
In: Information Security and Privacy (ACISP), S. 413-430. Springer International, [Artikel]

Günther, Felix ; Poettering, Bertram (2015):
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes.
In: 20th Australasian Conference on Information Security and Privacy (ACISP 2015), S. 195-212,
Springer, Queensland University of Technology (QUT), Brisbane, Australia, [Konferenzveröffentlichung]

Habib, Sheikh Mahbub ; Volk, Florian ; Hauke, Sascha ; Mühlhäuser, Max
Ko, Ryan ; Choo, Kim-Kwang Raymond (Hrsg.) (2015):
Computational trust methods for security quantification in the cloud ecosystem.
In: The cloud security ecosystem : technical, legal, business and management issues, S. 463-493, Amsterdam Heidelberg, Elsevier Syngress, ISBN 978-0-12-801595-7,
DOI: 10.1016/B978-0-12-801595-7.00021-5,
[Buchkapitel]

Songhori, Ebrahim ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2015):
Compacting Privacy-Preserving k-Nearest Neighbor Search using Logic Synthesis.
In: 52nd Design Automation Conference (DAC),
[Konferenzveröffentlichung]

Steinmetzer, Daniel ; Schulz, Matthias ; Hollick, Matthias (2015):
Lockpicking Physical Layer Key Exchange: Weak Adversary Models Invite the Thief.
In: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec),
New York, ISBN 978-1-4503-3623-9/15/06,
DOI: 10.1145/2766498.2766514,
[Konferenzveröffentlichung]

Trautmann, N. ; Alber, G. ; Agarwal, G. S. ; Leuchs, G. (2015):
Time-Reversal-Symmetric Single-Photon Wave Packets for Free-Space Quantum Communication.
In: Physical Review Letters, 114 (17), APS Physics, ISSN 0031-9007,
DOI: 10.1103/PhysRevLett.114.173601,
[Artikel]

Alkeilani Alkadri, Nabil (2015):
Post-Quantum Commitment Schemes.
Darmstadt, Technische Universität, [Masterarbeit]

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael (2015):
Readactor: Practical Code Randomization Resilient to Memory Disclosure.
In: 36th IEEE Symposium on Security and Privacy (Oakland),
[Konferenzveröffentlichung]

Lateef, Muhammad Raees (2015):
Design, Implementation and Evaluation of a Lightweight Attestation Scheme for Embedded Systems.
Darmstadt, Technische Universität, [Masterarbeit]

Schuster, Felix ; Tendyck, Thomas ; Liebchen, Christopher ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten (2015):
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications.
In: 36th IEEE Symposium on Security and Privacy (Oakland),
[Konferenzveröffentlichung]

Songhori, Ebrahim ; Hussain, Siam ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz (2015):
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits.
In: 36. IEEE Symposium on Security and Privacy (IEEE S&P'15), S. 411-428,
IEEE, DOI: 10.1109/SP.2015.32,
[Konferenzveröffentlichung]

Vigil, Martín ; Buchmann, Johannes ; Cabarcas, Daniel ; Weinert, Christian ; Wiesmaier, Alexander (2015):
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey.
In: Computers & Security, 50, S. 16-32. [Artikel]

Zhou, Shurui ; Al-Kofahi, Jafar ; Nguyen, Tien ; Kaestner, Christian ; Nadi, Sarah (2015):
Extracting Configuration Knowledge from Build Files with Symbolic Analysis.
In: 3rd International Workshop on Release Engineering, S. 4,
Florence, Italy, [Konferenzveröffentlichung]

Albrecht, Martin ; Rechberger, Christian ; Schneider, Thomas ; Tiessen, Tyge ; Zohner, Michael (2015):
Ciphers for MPC and FHE.
In: 34. Advances in Cryptology -- EUROCRYPT 2015, S. 430-454,
Springer, DOI: 10.1007/978-3-662-46800-5_17,
[Konferenzveröffentlichung]

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2015):
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
In: 34. Advances in Cryptology -- EUROCRYPT 2015, S. 673-701,
Springer, DOI: 10.1007/978-3-662-46800-5_26,
[Konferenzveröffentlichung]

Davi, Lucas ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Snow, Kevin ; Monrose, Fabian (2015):
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
In: 22nd Annual Network & Distributed System Security Symposium (NDSS),
[Konferenzveröffentlichung]

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2015):
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
Internet Society, 22. Annual Network and Distributed System Security Symposium (NDSS'15), San Diego, CA, 8-11 February 2015, ISBN 1-891562-38-X,
DOI: 10.14722/ndss.2015.23113,
[Konferenzveröffentlichung]

Herzberg, Amir ; Shulman, Haya (2015):
Cipher-Suite Negotiation for DNSSEC: Hop-by-Hop or End-to-End?
In: Internet Computing, IEEE, (19), S. 80-84. [Artikel]

Frydrych, H. ; Hoskovec, A. ; Jex, I. ; Alber, G. (2015):
Selective dynamical decoupling for quantum state transfer.
In: Journal of Physics B: Atomic, Molecular and Optical Physics, 48 (2), IOP Publishing Ltd., ISSN 0953-4075,
DOI: 10.1088/0953-4075/48/2/025501,
[Artikel]

Bansarkhani, Rachid El ; Buchmann, Johannes (2015):
High Performance Lattice-based CCA-secure Encryption.
In: Cryptology ePrint Archive, S. 20. [Artikel]

Bansarkhani, Rachid El ; Dagdelen, Özgür ; Buchmann, Johannes (2015):
Augmented Learning with Errors: The Untapped Potential of the Error Term.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015, Puerto Rico, January 26 - 30, 2015, S. 20,
Springer, Isla Verde, Puerto Rico, [Konferenzveröffentlichung]

Biedermann, Sebastian ; Katzenbeisser, Stefan ; Szefer, Jakub (2015):
Hard Drive Side-Channel Attacks using Smartphone Magnetic Field Sensors.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015, S. 5-13. [Artikel]

Bollmann, Dominik ; Lortz, Steffen ; Mantel, Heiko ; Starostin, Artem (2015):
An Automatic Inference of Minimal Security Types.
In: Proceedings of the 11th International Conference on Information Systems Security (ICISS),
[Konferenzveröffentlichung]

Classen, Jiska ; Braun, Johannes ; Volk, Florian ; Hollick, Matthias ; Buchmann, Johannes ; Mühlhäuser, Max (2015):
A Distributed Reputation System for Certification Authority Trust Management.
In: 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE UbiSafe Symposium),
Helsinki, Finland, [Konferenzveröffentlichung]

Fehr, Victoria ; Fischlin, Marc (2015):
Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version).
In: IACR Cryptology ePrint Archive, 2015, S. 765. [Artikel]

Ganji, Fatemeh ; Krämer, Juliane ; Seifert, Jean-Pierre ; Tajik, Shahin (2015):
Lattice Basis Reduction Attack against Physically Unclonable Functions.
In: 22nd ACM Conference on Computer and Communications Security (CCS 2015),
Denver, Colorado, US, [Konferenzveröffentlichung]

Geihs, Matthias ; Demirel, Denise ; Buchmann, Johannes (2015):
On the Security of Long-lived Archiving Systems based on the Evidence Record Syntax.
In: Codes, Cryptology and Information Security,
Springer, Mohammed V University, Rabat, Morocco, [Konferenzveröffentlichung]

Zhang, Jiang ; Zhang, Zhenfeng ; Ding, Jintai ; Snook, Michael ; Dagdelen, Özgür (2015):
Authenticated Key Exchange from Ideal Lattices.
In: EUROCRYPT 2015,
Sofia, Bulgaria, [Konferenzveröffentlichung]

2014

Trautmann, N. ; Bernad, J. Z. ; Sondermann, M. ; Alber, G. ; Sanchez-Soto, L. L. ; Leuchs, G. (2014):
Generation of entangled matter qubits in two opposing parabolic mirrors.
In: Physical Review A, 90 (6), APS Physics, ISSN 2469-9926,
DOI: 10.1103/PhysRevA.90.063814,
[Artikel]

Fischlin, Marc ; Günther, Felix (2014):
Multi-Stage Key Exchange and the Case of Google's QUIC Protocol.
In: CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, S. 12,
ACM, Scottsdale, Arizona, USA, [Konferenzveröffentlichung]

Günther, Felix ; Manulis, Mark ; Peter, Andreas
Gritzalis, Dimitris ; Kiayias, Aggelos ; Askoxylakis, Ioannis (Hrsg.) (2014):
Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation.
In: LNCS, In: Cryptology and Network Security (13th International Conference, CANS 2014), S. 321-336,
Springer, Heraklion, Crete, Greece, ISBN 978-3-319-12280-9,
[Konferenzveröffentlichung]

Herzberg, Amir ; Shulman, Haya (2014):
DNS Authentication as a Service: Preventing Amplifikation Attacks.
In: ACSAC, In: 30th Annual Computer Security Applications Conference, S. 356-365,
New Orleans, LA, USA, [Konferenzveröffentlichung]

Herzberg, Amir ; Shulman, Haya ; Crispo, Bruno (2014):
Less is More: Cipher-Suite Negotiation for DNSSEC.
In: Computer Security Applications Conference (ACM ACSAC),
ACSAC, IEEE, New Orleans, Louisiana, U.S., [Konferenzveröffentlichung]

Vigil, Martín ; Weinert, Christian ; Demirel, Denise ; Buchmann, Johannes (2014):
An efficient time-stamping solution for long-term digital archiving.
In: IEEE 33rd International Performance Computing and Communications Conference (IPCCC), S. 1-8,
Austin, TX, USA, DOI: 10.1109/PCCC.2014.7017099,
[Konferenzveröffentlichung]

Wachsmann, Christian ; Sadeghi, Ahmad-Reza (2014):
Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions.
In: Synthesis Lectures on Information Security, Privacy, and Trust, 12, San Rafael, Morgan & Claypool Publishers, ISBN 9781627055093,
DOI: 10.2200/S00622ED1V01Y201412SPT012,
[Buch]

Araujo, Frederico ; Hamlen, Kevin ; Biedermann, Sebastian ; Katzenbeisser, Stefan (2014):
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation.
In: ACM, In: Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014, S. 942-953,
Scottsdale, AZ, USA, [Konferenzveröffentlichung]

Demmler, Daniel ; Herzberg, Amir ; Schneider, Thomas (2014):
RAID-PIR: Practical Multi-Server PIR.
S. 45-56, ACM, 6. ACM Cloud Computing Security Workshop (CCSW'14), Scottsdale, Arizona, USA, November 07 - 07, 2014, ISBN 978-1-4503-3239-2,
DOI: 10.1145/2664168.2664181,
[Konferenzveröffentlichung]

Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan ; Tews, Erik ; Hamacher, Kay (2014):
Privacy-Preserving Whole Genome Sequence Processing through Proxy-Aided ORAM.
In: ACM, In: Proceedings of the 13th annual {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2014, Scottsdale, AZ, USA, November 2, 2014, S. 25-35,
Scottsdale, AZ, USA, DOI: 10.1145/2665943.2665962,
[Konferenzveröffentlichung]

Kohnhäuser, Florian (2014):
PUF-based Software Integrity Protection.
Darmstadt, Technische Universität, [Masterarbeit]

Shulman, Haya ; Ezra, Shiran (2014):
Poster: On the Resilience of DNS Infrastructure.
In: ACM Conference on Computer and Communications Security (ACM CCS),
ACM, Scottsdale, Arizona, USA, [Konferenzveröffentlichung]

Braun, Johannes (2014):
Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication.
In: IEEE Conference on Communications and Network Security (IEEE CNS 2014 Poster Session),
San Francisco, USA, [Konferenzveröffentlichung]

Buchmann, Johannes ; Bischof, Christian ; Dagdelen, Özgür ; Fitzpatrick, Robert ; Göpfert, Florian ; Mariano, Artur (2014):
Nearest Planes in Practice.
In: International Conference on Cryptography and Information security -BalkanCryptSec 2014,
Istanbul, Turkey, [Konferenzveröffentlichung]

Dagdelen, Özgür ; Bansarkhani, Rachid El ; Göpfert, Florian ; Güneysu, Tim ; Oder, Tobias ; Pöppelmann, Thomas ; Sanchez, Ana Helena ; Schwabe, Peter (2014):
High-speed signatures from standard lattices.
In: Latincrypt 2014,
Florianópolis, Brazil, [Konferenzveröffentlichung]

Herzberg, Amir ; Shulman, Haya (2014):
DNS Security: Past, Present and Future.
In: Future Security Conference 2014,
Berlin, Germany, [Konferenzveröffentlichung]

Kong, Joonho ; Koushanfar, Farinaz ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2014):
PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs.
In: Design Automation Conference (DAC) 2014, S. 1-6,
ACM Press, [Konferenzveröffentlichung]

Degabriele, Jean Paul ; Fehr, Victoria ; Fischlin, Marc ; Gagliardoni, Tommaso ; Günther, Felix ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Paterson, Kenneth G.
Chen, Liqun ; Mitchell, Chris (Hrsg.) (2014):
Unpicking PLAID: A Cryptographic Analysis of an ISO-standards-track Authentication Protocol.
In: Lecture Notes in Computer Science, In: Security Standardisation Research : Proceedings of the 1st International Conference on Research in Security Standardisation (SSR), S. 1-25, Cham, Springer, ISBN 978-3-319-14054-4,
[Buchkapitel]

Shulman, Haya (2014):
Pretty Bad Privacy: Pitfalls of DNS Encryption.
In: Proceedings of the 13th annual ACM workshop on Privacy in the electronic society, S. 191-200 (9),
Scottsdale, Arizona, USA, [Konferenzveröffentlichung]

Diese Liste wurde am Mon May 16 01:39:20 2022 CEST generiert.