TU Darmstadt / ULB / TUbiblio

Einträge mit Organisationseinheit "DFG-Sonderforschungsbereiche (inkl. Transregio) > Sonderforschungsbereiche > SFB 1119: CROSSING – Kryptographiebasierte Sicherheitslösungen als Grundlage für Vertrauen in heutigen und zukünftigen IT-Systemen"

Ebene hoch
Gruppiere nach: Autor(en) | Datum | Typ des Eintrags | Sprache | Keine Gruppierung
Springe zu: A | B | C | D | E | F | G | H | I | J | K | L | M | N | P | R | S | T | U | V | W | Y | Z
Anzahl der Einträge auf dieser Ebene: 348.

A

Anagnostopoulos, Nikolaos A. ; Arul, Tolga ; Fan, Yufan ; Hatzfeld, Christian ; Schaller, André ; Xiong, Wenjie ; Jain, Manishkumar ; Saleem, Umair ; Lotichius, Jan ; Gabmeyer, Sebastian ; Szefer, Jakub ; Katzenbeisser, Stefan :
Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security.
In: Cryptography 2018
[Artikel], (2018)

Anagnostopoulos, Nikolaos A. ; Arul, Tolga ; Fan, Yufan ; Hatzfeld, Christian ; Tehranipoor, Fatemeh ; Katzenbeisser, Stefan :
Addressing the Effects of Temperature Variations on Intrinsic Memory-Based Physical Unclonable Functions.
In: GI .
[Konferenz- oder Workshop-Beitrag], (2018)

Albrecht, Martin R. ; Curtis, Benjamin R. ; Deo, Amit ; Davidson, Alex ; Player, Rachel ; Postlethwaite, Eamonn W. ; Virdia, Fernando ; Wunderer, Thomas :
Estimate all the {LWE, NTRU} schemes!
[Online-Edition: http://scn.di.unisa.it/]
In: 11th Conference on Security and Cryptography for Networks, Amalfi, Italy. In: LNCS .
[Konferenz- oder Workshop-Beitrag], (2018)

Anagnostopoulos, Nikolaos A. ; Katzenbeisser, Stefan ; Chandy, John A. ; Tehranipoor, Fatemeh :
An Overview of DRAM-Based Security Primitives.
In: Cryptography 2018, Volume 2 (7)
[Artikel], (2018)

Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Mühlhäuser, Max :
Towards Secure Distributed Trust Management on a Global Scale.
[Online-Edition: https://conferences.sigcomm.org/sigcomm/2018/workshop-iotsp....]
In: ACM .
[Konferenz- oder Workshop-Beitrag], (2018)

Alhassan, Masaud Y. :
Improving scalability of universal circuits for large-scale private function evaluation.
TU Darmstadt
[Masterarbeit], (2018)

Ahmad, Saad :
Using Physical Unclonable Functions (PUFs) for Data-Link Layer Authenticity Verification to Mitigate Attacks on IEEE 802.11ad Beam Training.
TU Darmstadt
[Masterarbeit], (2018)

Amann, Sven ; Nguyen, Hoan Anh ; Nadi, Sarah ; Nguyen, Tien ; Mezini, Mira :
A Systematic Evaluation of API-Misuse Detectors.
In: IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
[Artikel], (2018)

Ay, Serafettin :
Detecting WiFi Covert Channels.
TU Darmstadt
[Masterarbeit], (2017)

Anagnostopoulos, Nikolaos A. ; Gabmeyer, Sebastian :
An extensice classication and analysis of attaks against Physical Unclonable Functions (PUFs).
27th Crypto-Day
[Konferenz- oder Workshop-Beitrag], (2017)

Albrecht, Martin ; Göpfert, Florian ; Vidria, Fernando ; Wunderer, Thomas :
Revisiting the Expected Cost of Solving uSVP and Applications to LWE.
ASIACRYPT 2017 - Advances in Cryptology Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Afridi, Hassaan Ali Khan :
Investigating the relation between bugs and vulnerabilities in the Debian ecosystem.
TU Darmstadt
[Masterarbeit], (2017)

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Mühlhäuser, Max :
Towards Blockchain-Based Collaborative Intrusion Detection Systems.
International Conference on Critical Information Infrastructures Security Springer-Verlag
[Konferenz- oder Workshop-Beitrag], (2017)

Arias, Orlando ; Gens, David ; Jin, Yier ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Sullivan, Dean :
LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization.
20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2017)
[Konferenz- oder Workshop-Beitrag], (2017)

Alexopoulos, Nikolaos ; Daubert, Jörg ; Mühlhäuser, Max ; Habib, Sheikh Mahbub :
Beyond the Hype: On Using Blockchains in Trust Management for Authentication.
In: IEEE Trustcom IEEE
[Konferenz- oder Workshop-Beitrag], (2017)

Alexopoulos, Nikolaos ; Kiayias, Aggelos ; Talviste, Riivo ; Zacharias, Thomas :
MCMix: Anonymous Messaging via Secure Multiparty Computation.
26th USENIX Security Symposium
[Konferenz- oder Workshop-Beitrag], (2017)

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Frieß, Tamara ; Mühlhäuser, Max :
TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER).
USENIX Security Symposium Poster Session
[Anderes], (2017)

Anagnostopoulos, Nikolaos A. ; Schaller, André ; Fan, Yufan ; Xiong, Wenjie ; Tehranipoor, Fatemeh ; Arul, Tolga ; Gabmeyer, Sebastian ; Szefer, Jakub ; Chandy, John A. ; Katzenbeisser, Stefan :
Insights into the Potential Usage of the Initial Values of DRAM Arrays of Commercial Off-the-Shelf Devices for Security Applications.
26th Crypto-Day
[Konferenz- oder Workshop-Beitrag], (2017)

Alkeilani Alkadri, Nabil ; Buchmann, Johannes ; El Bansarkhani, Rachid ; Krämer, Juliane :
A Framework to Select Parameters for Lattice-Based Cryptography.

[Anderes], (2017)

Alkim, Erdem ; Bindel, Nina ; Buchmann, Johannes ; Dagdelen, Özgür ; Eaton, Edward ; Gutoski, Gus ; Krämer, Juliane ; Pawlega, Filip :
Revisiting TESLA in the quantum random oracle model.
PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Alexopoulos, Nikolaos :
Student Research Abstract: On Enhancing Trust in Cryptographic Solutions.
Proceedings of the 32nd Annual ACM Symposium on Applied Computing ACM
[Konferenz- oder Workshop-Beitrag], (2017)

Asharov, Gilad ; Demmler, Daniel ; Schapira, Michael ; Schneider, Thomas ; Segev, Gil ; Shenker, Scott ; Zohner, Michael :
Privacy-Preserving Interdomain Routing at Internet Scale.
In: PoPETs - Proceedings on Privacy Enhancing Technologies
[Artikel], (2017)

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Ekberg, Jan-Erik ; Nyman, Thomas ; Paverd, Andrew ; Sadeghi, Ahmad-Reza ; Tsudik, Gene :
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
23rd ACM Conference on Computer and Communications Security (CCS)
[Konferenz- oder Workshop-Beitrag], (2016)

Anagnostopoulos, Nikolaos A. ; Katzenbeisser, Stefan ; Rosenstihl, Markus ; Schaller, André ; Gabmeyer, Sebastian ; Arul, Tolga :
Low-temperature data remanence attacks against intrinsic SRAM PUFs.

[Report], (2016)

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael :
More Efficient Oblivious Transfer Extensions.
In: Journal of Cryptology
[Artikel], (2016)

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Neven, Gregory ; Sadeghi, Ahmad-Reza ; Schunter, Matthias :
POSTER: Toward a Secure and Scalable Attestation.
ACM WiSEC 2016
[Konferenz- oder Workshop-Beitrag], (2016)

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Koushanfar, Farinaz ; Praverd, Andrew ; Tsudik, Gene ; Sadeghi, Ahmad-Reza :
Things, Trouble, Trust: On Building Trust in IoT Systems.
53rd Design Automation Conference (DAC)
[Konferenz- oder Workshop-Beitrag], (2016)

Alber, Gernot ; Trautmann, Nils :
Cooperative quantum electrodynamical processes in an ellipsoidal cavity.
In: Journal of Physics: Conference Series
[Artikel], (2016)

Akleylek, Sedat ; Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Marson, Giorgia Azzurra :
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation.
International Conference on Cryptology AFRICACRYPT 2016 Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Alagic, Gorjan ; Broadbent, Anne ; Fefferman, Bill ; Gagliardoni, Tommaso ; Schaffner, Christian ; Jules, Michael St. :
Computational Security of Quantum Encryption.
In: Lecture Notes in Computer Science - ICITS . Springer
[Anderes], (2016)

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian :
SEDA: Scalable Embedded Device Attestation.
22nd ACM Conference on Computer and Communications Security (CCS)
[Konferenz- oder Workshop-Beitrag], (2015)

Arzt, Steven ; Nadi, Sarah ; Ali, Karim ; Bodden, Eric ; Erdweg, Sebastian ; Mezini, Mira :
Towards Secure Integration of Cryptographic Software.
[Online-Edition: http://2015.splashcon.org/track/onward2015-papers]
In: OOPSLA Onward!, 25.10.2015, Piitsburgh. In: Proceedings of the 2015 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming & Software .
[Konferenz- oder Workshop-Beitrag], (2015)

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian :
SEDA - Technical Report.

[Report], (2015)

Alkim, Erdem ; Bindel, Nina ; Buchmann, Johannes ; Dagdelen, Özgür ; Schwabe, Peter :
TESLA: Tightly-Secure Efficient Signatures from Standard Lattices.

[Anderes], (2015)

Amin, Osama :
Implementation and Evaluation of PUF based Cryptographic Key Generation Schemes on FPGA.
TU Darmstadt
[Masterarbeit], (2015)

Arias, Orlando ; Davi, Lucas ; Hanreich, Matthias ; Jin, Yier ; Koeberl, Patrick ; Paul, Debayan ; Sadeghi, Ahmad-Reza ; Sullivan, Dean :
HAFIX: Hardware-Assisted Flow Integrity Extension.
52nd Design Automation Conference (DAC)
[Konferenz- oder Workshop-Beitrag], (2015)

Alkeilani Alkadri, Nabil :
Post-Quantum Commitment Schemes.
TU Darmstadt
[Masterarbeit], (2015)

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael :
More efficient oblivious transfer extensions with security for malicious adversaries.
34th Advances in Cryptology - EUROCRYPT 2015
[Konferenz- oder Workshop-Beitrag], (2015)

Albrecht, Martin ; Rechberger, Christian ; Schneider, Thomas ; Tiessen, Tyge ; Zohner, Michael :
Ciphers for MPC and FHE.
34th Advances in Cryptology - EUROCRYPT 2015 Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Araujo, Frederico ; Hamlen, Kevin ; Biedermann, Sebastian ; Katzenbeisser, Stefan :
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation.
In: ACM .
[Konferenz- oder Workshop-Beitrag], (2014)

B

Büscher, Niklas ; Demmler, Daniel ; Katzenbeisser, Stefan ; Kretzmer, David ; Schneider, Thomas :
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
[Online-Edition: https://www.sigsac.org/ccs/CCS2018/]
In: 25th ACM Conference on Computer and Communications Security (CCS'18), Toronto, Canada.
[Konferenz- oder Workshop-Beitrag], (2018)

Brasser, Ferdinand ; Frassetto, Tommaso ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Weinert, Christian :
VoiceGuard: Secure and Private Speech Processing.
In: Interspeech 2018
[Konferenz- oder Workshop-Beitrag], (2018)

Buescher, Niklas ; Weber, Alina ; Katzenbeisser, Stefan :
Towards Practical RAM based Secure Computation.
[Online-Edition: https://esorics2018.upc.edu/]
In: ESORICS 2018, 3.9.-7.9. 2018, Barcelona, Spain. European Symposium on Research in Computer Security (ESORICS)
[Konferenz- oder Workshop-Beitrag], (2018)

Baack, Leon :
Optimisation of parts of a set-up for quantum key distribution.
TU Darmstadt
[Bachelorarbeit], (2018)

Bindel, Nina ; Buchmann, Johannes ; Göpfert, Florian ; Schmidt, Markus :
Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples.
In: Journal of Mathematical Cryptology
[Artikel], (2018)

Bielsa, Guillermo ; Palacios, Joan ; Loch, Adrian ; Steinmetzer, Daniel ; Cesari, Paolo ; Widmer, Joerg :
Indoor Localization Using Commercial Off-The-Shelf 60 GHz Access Points.
In: IEEE International Conference on Computer Communications (INFOCOM), 15-19 April 2018, Honolulu, Hawaii, USA.
[Konferenz- oder Workshop-Beitrag], (2018)

Brandy, Malte :
Asymptotische Eigenschaften iterierter Quantenoperationen.
TU Darmstadt
[Masterarbeit], (2018)

Buchmann, Johannes ; Holzer, Patrick ; Wunderer, Thomas :
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β.
INDOCRYPT 2017 - 18th International Conference on Cryptology in India Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Buldas, Ahto ; Geihs, Matthias ; Buchmann, Johannes :
Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions.
ProvSec 2017 - The 11th International Conference on Provable Security Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Böck, Leon :
On P2P botnet monitoring in adverse conditions.
TU Darmstadt
[Masterarbeit], (2017)

Bindel, Nina ; Krämer, Juliane ; Schreiber, Johannes :
Hampering fault attacks against lattice-based signature schemes - countermeasures and their efficiency.
CODES/ISSS ’17 Companion Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra :
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
The 10th International Symposium on Foundations & Practice of Security Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Brendel, Jacqueline ; Fischlin, Marc :
Zero Round-Trip Time for the Extended Access Control Protocol.
ESORICS 2017 - 22nd European Symposium on Research in Computer Security
[Konferenz- oder Workshop-Beitrag], (2017)

Buchmann, Johannes ; Lauter, Kristin ; Mosca, Michele :
Postquantum Cryptography - State of the Art.
In: IEEE Security & Privacy, 15 pp. 12-13.
[Artikel], (2017)

Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix ; Janson, Christian :
PRF-ODH: Relations, Instantiations, and Impossibility Results.
CRYPTO 2017 - 37th International Cryptology Conference Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Butin, Denis :
Hash-Based Signatures: State of Play.
In: IEEE Security & Privacy, 15 (4) pp. 37-43.
[Artikel], (2017)

Brasser, Ferdinand ; Müller, Urs ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Capkun, Srdjan ; Sadeghi, Ahmad-Reza :
Software Grand Exposure: SGX Cache Attacks Are Practical.
In: WOOT .
[Konferenz- oder Workshop-Beitrag], (2017)

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
In: USENIX Security '17 .
[Konferenz- oder Workshop-Beitrag], (2017)

Büscher, Niklas ; Katzenbeisser, Stefan:
Compilation for Secure Multi-party Computation.
[Online-Edition: https://www.springer.com/de/book/9783319675213]
Springer Briefs in Computer Science ISBN 978-3-319-67521-3
[Buch], (2017)

Buldas, Ahto ; Geihs, Matthias ; Buchmann, Johannes :
Long-Term Secure Commitments via Extractable-Binding Commitments.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Bugge, Sebastian :
Solving Learning With Errors Instances Using Quantum Reductions.
TU Darmstadt
[Masterarbeit], (2017)

Boukoros, Spyros ; Karvelas, Nikolaos ; Katzenbeisser, Stefan :
A lightweight protocol for privacy preserving division.
IWCMC 2017 - 13th International Wireless Communications and Mobile Computing Conference IEEE
[Konferenz- oder Workshop-Beitrag], (2017)

Bindel, Nina ; Herath, Udyani ; McKague, Matthew ; Stebila, Douglas :
Transitioning to a Quantum-Resistant Public Key Infrastructure.
PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Buchmann, Johannes ; Braun, Johannes ; Demirel, Denise ; Geihs, Matthias :
Quantum Cryptography: a view from classical cryptography.
In: Quantum Science and Technology, 2 (2)
[Artikel], (2017)

Bindel, Nina :
Ein deutsches digitales Signaturverfahren auf dem Weg zum internationalen kryptographischen Standard.
Digitale Gesellschaft zwischen Risikobereitschaft und Sicherheitsbedürfnis- Tagungsband zum 15. Deutschen IT-Sicherheitskongress SecuMedia Verlag
[Konferenz- oder Workshop-Beitrag], (2017)

Braun, Johannes ; Buchmann, Johannes ; Demirel, Denise ; Fujiwara, Mikio ; Geihs, Matthias ; Moriai, Shiho ; Sasaki, Masahide ; Waseda, Atsushi :
SHORT PAPER: LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Buchmann, Johannes ; Demirel, Denise ; Schabhüser, Lucas ; Struck, Patrick :
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability.
In: LNCS (10194). Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra :
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
In: Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS).
[Konferenz- oder Workshop-Beitrag], (2017)

Brendel, Jacqueline ; Demirel, Denise :
Efficient Proactive Secret Sharing.
2016 Privacy, Security and Trust Conference IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Buescher, Niklas ; Kretzmer, David ; Jindal, Arnav ; Katzenbeisser, Stefan :
Scalable Secure Computation from ANSI-C.
WIFS - IEEE International Workshop on Information Forensics and Security IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Bieber, Julian :
Generalizing Semi-Private Function Evaluation.
TU Darmstadt
[Bachelorarbeit], (2016)

Buescher, Niklas ; Holzer, Andreas ; Weber, Alina ; Katzenbeisser, Stefan :
Compiling Low Depth Circuits for Practical Secure Computation.
21st European Symposium on Research in Computer Security (ESORICS 2016) Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Butin, Denis ; Demirel, Denise ; Buchmann, Johannes :
Formal Policy-based Provenance Audit.
The 11th International Workshop on Security - IWSEC 2016
[Konferenz- oder Workshop-Beitrag], (2016)

Braun, Johannes ; Buchmann, Johannes ; Demirel, Denise ; Fujiwara, Mikio ; Geihs, Matthias ; Moriai, Shiho ; Sasaki, Masahide ; Waseda, Atsushi :
LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper).

[Anderes], (2016)

Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane :
Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks.
FDTC 2016 - Fault Diagnosis and Tolerance in Cryptography IEEE Conference Publication
[Konferenz- oder Workshop-Beitrag], (2016)

Brasser, Ferdinand ; Ganapathy, Vinod ; Iftode, Liviu ; Kim, Daeyoung ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
Regulating ARM TrustZone Devices in Restricted Spaces.
14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys)
[Konferenz- oder Workshop-Beitrag], (2016)

Buchmann, Johannes ; Göpfert, Florian ; Güneysu, Tim ; Oder, Tobias ; Pöppelmann, Thomas :
High-Performance and Lightweight Lattice-Based Public-Key Encryption.
IoTPTS '16 - 2nd ACM International Workshop on IoT Privacy, Trust, and Security ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Buchmann, Johannes ; Büscher, Niklas ; Katzenbeisser, Stefan ; Krämer, Juliane ; Micciancio, Daniele ; Siim, Sander ; van Vredendaal, Christine ; Walter, Michael ; Göpfert, Florian :
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge.
ASIAPKC 16 - 3rd ACM International Workshop on ASIA Public-Key Cryptography ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Buchmann, Johannes ; Demirel, Denise ; Schabhüser, Lucas:
Privately and Publicly Verifiable Computing Techniques.
ISBN 978-3-319-53797-9
[Buch], (2016)

Buchmann, Johannes ; Göpfert, Florian ; Player, Rachel ; Wunderer, Thomas :
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack.
International Conference on Cryptology AFRICACRYPT 2016 Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Bernhard, David ; Fischlin, Marc ; Warinschi, Bogdan :
On the Hardness of Proving CCA-Security of Signed ElGamal.
In: LNCS (9614). Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Braden, Kjell ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
Leakage-Resilient Layout Randomization for Mobile Devices.
23rd Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag], (2016)

Brendel, Jacqueline :
Efficient Proactive Secret Sharing.
TU Darmstadt
[Masterarbeit], (2016)

Brasser, Ferdinand ; Rasmussen, Kasper ; Sadeghi, Ahmad-Reza ; Tsudik, Gene :
Remote Attestation for Low-End Embedded Devices: the Prover's Perspective.
In: DAC '16 . ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Borgwart, Andreas ; Boukoros, Spyros ; Shulman, Haya ; Waidner, Michael ; van Royeen, Carel :
Detection and Forensics of Domains Hijacking.
IEEE Global Communications Conference IEEE
[Konferenz- oder Workshop-Beitrag], (2015)

Böck, Leon ; Karuppayah, Shankar ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max :
Hide And Seek: Detecting Sensors in P2P Botnets.
Communications and Network Security (CNS), 2015 IEEE Conference on IEEE
[Konferenz- oder Workshop-Beitrag], (2015)

Buescher, Niklas ; Katzenbeisser, Stefan :
Faster Secure Computation through Automatic Parallelization.
24th USENIX Security Symposium (USENIX Security'15) USENIX Association
[Konferenz- oder Workshop-Beitrag], (2015)

Brasser, Ferdinand ; Koeberl, Patrick ; Mahjoub, Brahim El ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian :
TyTAN: Tiny Trust Anchor for Tiny Devices.
52nd Design Automation Conference (DAC) 2015
[Konferenz- oder Workshop-Beitrag], (2015)

Biedermann, Sebastian ; Katzenbeisser, Stefan ; Szefer, Jakub :
Hard Drive Side-Channel Attacks using Smartphone Magnetic Field Sensors.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015 pp. 5-13.
[Artikel], (2015)

Braun, Johannes :
Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication.
IEEE Conference on Communications and Network Security (IEEE CNS 2014 Poster Session)
[Konferenz- oder Workshop-Beitrag], (2014)

Buchmann, Johannes ; Bischof, Christian ; Dagdelen, Özgür ; Fitzpatrick, Robert ; Göpfert, Florian ; Mariano, Artur :
Nearest Planes in Practice.
International Conference on Cryptography and Information security -BalkanCryptSec 2014
[Konferenz- oder Workshop-Beitrag], (2014)

C

Classen, Jiska ; Wegemer, Daniel :
Fitbit Firmware Hacking.
Recon
[Anderes], (2018)

Classen, Jiska ; Wegemer, Daniel ; Patras, Paul ; Spink, Tom ; Hollick, Matthias :
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware.
PACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) ACM
[Konferenz- oder Workshop-Beitrag], (2018)

Cordero, Carlos Garcia ; Vasilomanolakis, Emmanouil ; Mühlhäuser, Max :
ID2T - The Intrusion Detection Dataset Generation Toolkit.
[Online-Edition: https://www.blackhat.com/eu-17/]

[Anderes], (2017)

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas :
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.
13. International Conference on emerging Networking EXperiments and Technologies (CoNEXT'17) ACM
[Konferenz- oder Workshop-Beitrag], (2017)

Chauhan, Prankur :
Improvement and integration of software tools for the evaluation and realization of Physical Unclonable Functions (PUFs) into an open-source library of cryptographic component (CogniCrypt).
TU Darmstadt
[Masterarbeit], (2017)

Cremer, Manuel :
Test Cases for Detecting the Lucky 13 Vulnerability with SPASCA.
TU Darmstadt
[Bachelorarbeit], (2017)

Chen, Joe ; Steinmetzer, Daniel ; Classen, Jiska ; Knightly, Edward ; Hollick, Matthias :
Pseudo Lateration: Millimeter-Wave Localization Using a Single RF Chain.
In: IEEE WCNC
[Konferenz- oder Workshop-Beitrag], (2017)

Classen, Jiska ; Steinmetzer, Daniel ; Hollick, Matthias :
Opportunities and Pitfalls in Securing Visible Light Communication on the Physical Layer.
In: 3rd ACM Workshop on Visible Light Communication Systems
[Artikel], (2016)

Conti, Mauro ; Crane, Stephen ; Frassetto, Tommaso ; Homescu, Andrei ; Koppen, Georg ; Larsen, Per ; Liebchen, Christopher ; Perry, Mike ; Sadeghi, Ahmad-Reza :
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
The annual Privacy Enhancing Technologies Symposium (PETS)
[Konferenz- oder Workshop-Beitrag], (2016)

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas :
Towards Securing Internet eXchange Points Against Curious onlooKers (Short Paper).
ACM, IRTF & ISOC Applied Networking Research Workshops (ANRW'16) ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Classen, Jiska :
Software Defined Radio – Open Source Wireless Hacking.

[Anderes], (2016)

Correia, Fabio ; Mariano, Artur ; Proença, Alberto ; Bischof, Christian ; Agrell, Erik :
Parallel Improved Schnorr-Euchner Enumeration SE++ for the CVP and SVP.
PDP 2016 - 24th Euromicro International Conference on Parallel, Distributed and Network-Based Processing
[Konferenz- oder Workshop-Beitrag], (2016)

Cam-Winget, Nancy ; Sadeghi, Ahmad-Reza ; Jin, Yier :
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected.
53rd Design Automation Conference (DAC)
[Konferenz- oder Workshop-Beitrag], (2016)

Classen, Jiska :
Building and Breaking Wireless Security.

[Anderes], (2015)

Conti, Mauro ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Negro, Marco ; Qunaibit, Mohaned ; Sadeghi, Ahmad-Reza :
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
22nd ACM Conference on Computer and Communications Security (CCS)
[Konferenz- oder Workshop-Beitrag], (2015)

Crane, Stephen ; Volckaert, Stijn ; Schuster, Felix ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Sutter, Bjorn De ; Franz, Michael :
It's a TRAP: Table Randomization and Protection against Function Reuse Attacks.
22nd ACM Conference on Computer and Communications Security (CCS)
[Konferenz- oder Workshop-Beitrag], (2015)

Classen, Jiska ; Chen, Joe ; Steinmetzer, Daniel ; Hollick, Matthias ; Knightly, Edward :
The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications.
2nd ACM Workshop on Visible Light Communication Systems
[Konferenz- oder Workshop-Beitrag], (2015)

Classen, Jiska ; Schulz, Matthias ; Hollick, Matthias :
Practical Covert Channels for WiFi Systems.
IEEE Conference on Communications and Network Security (CNS)
[Konferenz- oder Workshop-Beitrag], (2015)

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael :
Return to Where? You Can't Exploit What You Can't Find.
Blackhat USA
[Konferenz- oder Workshop-Beitrag], (2015)

Cabarcas, Daniel ; Demirel, Denise ; Göpfert, Florian ; Lancrenon, Jean ; Wunderer, Thomas :
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme.

[Report], (2015)

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael :
Readactor: Practical Code Randomization Resilient to Memory Disclosure.
36th IEEE Symposium on Security and Privacy (Oakland)
[Konferenz- oder Workshop-Beitrag], (2015)

Classen, Jiska ; Braun, Johannes ; Volk, Florian ; Hollick, Matthias ; Buchmann, Johannes ; Mühlhäuser, Max :
A Distributed Reputation System for Certification Authority Trust Management.
14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE UbiSafe Symposium)
[Konferenz- oder Workshop-Beitrag], (2015)

D

Dodhy, Anam :
Misuses of Parameters for Cryptographic APIs.
TU Darmstadt
[Masterarbeit], (2018)

Demmler, Daniel ; Rindal, Peter ; Rosulek, Mike ; Trieu, Ni :
PIR-PSI: Scaling Private Contact Discovery.
[Online-Edition: https://petsymposium.org/2018/index.php]
In: Proceedings on Privacy Enhancing Technologies (PoPETs)
[Artikel], (2018)

Dessouky, Ghada ; Abera, Tigist ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza :
LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution.
In: 37th IEEE International Conference On Computer Aided Design 2018 (ICCAD’18), 2018.
[Konferenz- oder Workshop-Beitrag], (2018)

Deaconescu, Razvan ; Carabas, Costin ; Manda, Iulia ; Enck, William ; Chiroiu, Mihai ; Li, Ninghui ; Sadeghi, Ahmad-Reza :
iOracle: Automated Evaluation of Access Control Policies in iOS.
In: AsiaCCS .
[Konferenz- oder Workshop-Beitrag], (2018)

Deligeorgopoulos, Efstathios :
Evaluation of Proactive Secret Sharing for Long-Term Secure Storage.
TU Darmstadt
[Masterarbeit], (2018)

Deller, Yannick :
Zweidimensionale Surface-Kodes und ihre Anwendungen.
TU Darmstadt
[Bachelorarbeit], (2017)

Demmler, Daniel ; Hamacher, Kay ; Schneider, Thomas ; Stammler, Sebastian :
Privacy-Preserving Whole-Genome Variant Queries.
CANS'17 - 16. International Conference on Cryptology And Network Security Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Dewald, Florian ; Mantel, Heiko ; Weber, Alexandra :
AVR Processors as a Platform for Language-Based Security.
ESORICS - Proceedings of the 22nd European Symposium on Research in Computer Security Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Demmler, Daniel ; Holz, Marco ; Schneider, Thomas :
OnionPIR: Effective protection of sensitive metadata in online communication networks.
ACNS'17 - 15. International Conference on Applied Cryptography and Network Security Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Dantas, Yuri Gil ; Hamann, Tobias ; Mantel, Heiko ; Schickel, Johannes :
An Experimental Study of a Bucketing Approach.
Quantitative Aspects of Programming Languages and Systems
[Konferenz- oder Workshop-Beitrag], (2017)

Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
24th Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag], (2017)

Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael :
Pushing the communication barrier in secure computation using lookup tables.
24. Annual Network and Distributed System Security Symposium (NDSS'17) The Internet society
[Konferenz- oder Workshop-Beitrag], (2017)

Dewald, Florian ; Mantel, Heiko ; Weber, Alexandra :
AVR Processors as a Platform for Language-Based Security.
In: Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS).
[Konferenz- oder Workshop-Beitrag], (2017)

Deshotels, Luke ; Deaconescu, Razvan ; Chiroiu, Mihai ; Davi, Lucas ; Enck, William ; Sadeghi, Ahmad-Reza :
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
23rd ACM Conference on Computer and Communications Security (CCS)
[Konferenz- oder Workshop-Beitrag], (2016)

Dowling, Benjamin ; Günther, Felix ; Herath, Udyani ; Stebila, Douglas :
Secure Logging Schemes and Certificate Transparency.
21st European Symposium on Research in Computer Security (ESORICS 2016) Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Demirel, Denise ; Krenn, Stephan ; Loruenser, Thomas ; Traverso, Giulia :
Efficient Third Party Auditing for a Distributed Storage System.
International Conference on Availability, Reliability and Security - ARES 2016 IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Dowling, Benjamin ; Fischlin, Marc ; Günther, Felix ; Stebila, Douglas :
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol.

[Anderes], (2016)

Degabriele, Jean Paul ; Fehr, Victoria ; Fischlin, Marc ; Gagliardoni, Tommaso ; Günther, Felix ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Paterson, Kenneth G. :
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol.
In: International Journal of Information Security (IJIS)
[Artikel], (2016)

Daubert, Jörg ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max :
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks.
Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC) IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Daubert, Jörg ; Fischer, Mathias ; Grube, Tim ; Schiffner, Stefan ; Kikiras, Panayotis ; Mühlhäuser, Max :
AnonPubSub: Anonymous Publish-Subscribe Overlays.
In: Elsevier Computer Communications (ComCom), 76 pp. 42-53.
[Artikel], (2016)

Davi, Lucas ; Sadeghi, Ahmad-Reza:
Building Secure Defenses Against Code-Reuse Attacks.
Springer International Publishing ISBN 978-3-319-25544-6
[Buch], (2015)

Dagdelen, Özgür ; Gajek, Sebastian ; Göpfert, Florian :
Learning With Errors in the Exponent.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Dowling, Benjamin ; Fischlin, Marc ; Günther, Felix ; Stebila, Douglas :
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates.
22nd ACM Conference on Computer and Communications Security (CCS 2015) ACM
[Konferenz- oder Workshop-Beitrag], (2015)

Demmler, Daniel ; Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza :
Automated Synthesis of Optimized Circuits for Secure Computation.
22nd ACM Conference on Computer and Communications Security (CCS'15)
[Konferenz- oder Workshop-Beitrag], (2015)

Demirel, Denise ; Lancrenon, Jean :
How to Securely Prolong the Computational Bindingness of Pedersen Commitments.

[Report], (2015)

Davi, Lucas ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Snow, Kevin ; Monrose, Fabian :
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
22nd Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag], (2015)

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael :
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
Network and Distributed System Security Symposium (NDSS'15)
[Konferenz- oder Workshop-Beitrag], (2015)

Demmler, Daniel ; Herzberg, Amir ; Schneider, Thomas :
RAID-PIR: Practical multi-server PIR.
6th ACM Cloud Computing Security Workshop (ACM CCSW'14) ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Dagdelen, Özgür ; El Bansarkhani, Rachid ; Göpfert, Florian ; Güneysu, Tim ; Oder, Tobias ; Pöppelmann, Thomas ; Sanchez, Ana Helena ; Schwabe, Peter :
High-speed signatures from standard lattices.
Latincrypt 2014
[Konferenz- oder Workshop-Beitrag], (2014)

Degabriele, Jean Paul ; Fehr, Victoria ; Fischlin, Marc ; Gagliardoni, Tommaso ; Günther, Felix ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Paterson, Kenneth G.
Chen, Liqun ; Mitchell, Chris (eds.) :

Unpicking PLAID: A Cryptographic Analysis of an ISO-standards-track Authentication Protocol.
In: LNCS (8893). Springer
[Konferenz- oder Workshop-Beitrag], (2014)

E

Ece, Olcay :
Security of E-Mail-Encryption.
TU Darmstadt
[Bachelorarbeit], (2018)

Erwig, Andreas ; Fischlin, Marc ; Hald, Martin ; Helm, Dominik ; Kiel, Robert ; Kübler, Florian ; Kümmerlin, Michael ; Laenge, Jakob ; Rohrbach, Felix :
Redactable Graph Hashing, Revisited.
ACISP 2017
[Konferenz- oder Workshop-Beitrag], (2017)

El Bansarkhani, Rachid ; Sturm, Jan :
An Efficient Lattice-based Multisignature Scheme with Applications to Bitcoins.
15th International Conference on Cryptology and Network Security - CANS 2016
[Konferenz- oder Workshop-Beitrag], (2016)

El Bansarkhani, Rachid ; El Kaafarani, Ali :
Post-Quantum Attribute-Based Signatures from Lattice Assumptions.

[Anderes], (2016)

Erbenich, Vanessa :
On the Efficiency of Lattice-Based Encryption.
TU Darmstadt
[Masterarbeit], (2016)

El Bansarkhani, Rachid ; Dagdelen, Özgür ; Buchmann, Johannes :
Augmented Learning with Errors: The Untapped Potential of the Error Term.
Financial Cryptography and Data Security - 19th International Conference, FC 2015, Puerto Rico, January 26 - 30, 2015 Springer
[Konferenz- oder Workshop-Beitrag], (2015)

El Bansarkhani, Rachid ; Buchmann, Johannes :
High Performance Lattice-based CCA-secure Encryption.
In: Cryptology ePrint Archive p. 20.
[Artikel], (2015)

F

Frassetto, Tommaso ; Jauernig, Patrick Thomas ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
IMIX: In-Process Memory Isolation EXtension.
In: 27th USENIX Security Symposium, 15.-17.08.2018, Baltimore, MD, USA. 27th USENIX Security Symposium
[Konferenz- oder Workshop-Beitrag], (2018)

Fischlin, Marc ; Harasser, Patrick :
Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent.
[Online-Edition: https://www.springer.com/us/book/9783319933863]
In: 16th International Conference, ACNS 2018, 2.7.-4.7. 2018, Leuven, Belgium. In: Springer International Publishing , LNCS 10892 .
[Konferenz- oder Workshop-Beitrag], (2018)

Fladung, Lukas :
Semiclassical Laser Cooling of Trapped Ions in a One-Dimensional Standing Wave.
TU Darmstadt
[Bachelorarbeit], (2017)

Fomichev, Mikhail ; Álvarez, Flor ; Steinmetzer, Daniel ; Gardner-Stephen, Paul ; Hollick, Matthias :
Survey and Systematization of Secure Device Pairing.
In: IEEE Communications Surveys & Tutorials, PP p. 1.
[Artikel], (2017)

Fereidooni, Hossein ; Classen, Jiska ; Spink, Tom ; Patras, Paul ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Hollick, Matthias ; Conti, Mauro :
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit.
Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)
[Konferenz- oder Workshop-Beitrag], (2017)

Fuhry, Benny ; Bahmani, Raad ; Brasser, Ferdinand ; Hahn, Florian ; Kerschbaum, Florian ; Sadeghi, Ahmad-Reza :
HardIDX: Practical and Secure Index with SGX.
Conference on Data and Applications Security and Privacy (DBSec)
[Konferenz- oder Workshop-Beitrag], (2017)

Funke, Sebastian
Daubert, Jörg (ed.) :

IoT Architektur zum Schutz von Privatsphäre Ende-zu-Ende.
Proceedings of the DACH Security 2017 DACH Security 2017
[Konferenz- oder Workshop-Beitrag], (2017)

Fischlin, Marc ; Günther, Felix :
Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates.
2nd IEEE European Symposium on Security and Privacy (EuroS&P 2017) IEEE
[Konferenz- oder Workshop-Beitrag], (2017)

Fischlin, Marc ; Günther, Felix ; Schmidt, Benedikt ; Warinschi, Bogdan :
Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3.
37th IEEE Symposium on Security and Privacy (S&P 2016) IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Frydrych, Holger ; Marthaler, Michael ; Alber, Gernot :
Pulse-controlled quantum gate sequences on a strongly coupled qubit chain.
In: Phys. Rev. A, American Physical Society (92) p. 10.
[Artikel], (2015)

Fischlin, Marc ; Günther, Felix ; Marson, Giorgia Azzurra ; Paterson, Kenneth G. :
Data Is a Stream: Security of Stream-Based Channels.
Advances in Cryptology - CRYPTO 2015 Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Frydrych, H. ; Hoskovec, A. ; Jex, I. ; Alber, G. :
Selective dynamical decoupling for quantum state transfer.
In: Journal of Physics B: Atomic, Molecular and Optical Physics, IOP Publishing 025501.
[Artikel], (2015)

Fischlin, Marc ; Günther, Felix :
Multi-Stage Key Exchange and the Case of Google's QUIC Protocol.
CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security ACM
[Konferenz- oder Workshop-Beitrag], (2014)

G

Guski, Florian :
Simulation of the Quantum Hybrid Attack in Q#.
TU Darmstadt
[Bachelorarbeit], (2018)

Geihs, Matthias ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Buchmann, Johannes :
PROPYLA: Privacy Preserving Long-Term Secure Storage.
In: The Sixth International Workshop on Security in Cloud Computing (SCC). In: ACM . Songdo, Incheon, Korea
[Konferenz- oder Workshop-Beitrag], (2018)

Gens, David ; Schmitt, Simon ; Davi, Lucas ; Sadeghi, Ahmad-Reza :
K-Miner: Uncovering Memory Corruption in Linux.
25th Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag], (2018)

Gil Dantas, Yuri ; Gay, Richard ; Hamann, Tobias ; Mantel, Heiko ; Schickel, Johannes :
An Evaluation of Bucketing in Systems with Non-Deterministic Timing Behavior.
In: 33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection (IFIP SEC).
[Konferenz- oder Workshop-Beitrag], (2018)

Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas :
More Efficient Universal Circuit Constructions.
ASIACRYPT 2017 - Advances in Cryptology Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Schickel, Johannes :
Towards Accelerated Usage Control based on Access Correlations.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Günther, Felix ; Mazaheri, Sogol :
A Formal Treatment of Multi-key Channels.
CRYPTO 2017 - 37th International Cryptology Conference Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Göpfert, Florian ; van Vredendaal, Christine ; Wunderer, Thomas :
A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE.
PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography
[Konferenz- oder Workshop-Beitrag], (2017)

Gagliardoni, Tommaso ; Karvelas, Nikolaos ; Katzenbeisser, S. :
ORAMs in a Quantum World.
PQCrypto 2017 - 8th International Workshop Post-Quantum Cryptography Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Günther, Felix ; Hale, Britta ; Jager, Tibor ; Lauer, Sebastian :
0-RTT Key Exchange with Full Forward Secrecy.
Eurocrypt 2017 - 36th International Conference on the Theory and Applications of Cryptographic Techniques Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Günther, Daniel :
Valiant's Universal Circuit - Towards a Modular Construction and Implementation.
TU Darmstadt
[Bachelorarbeit], (2017)

Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Schickel, Johannes :
Towards Accelerated Usage Control based on Access Correlations.
In: Proceedings of the 22nd Nordic Conference on Secure IT Systems (NordSec).
[Konferenz- oder Workshop-Beitrag], (2017)

Geihs, Matthias ; Demirel, Denise ; Buchmann, Johannes :
A security analysis of techniques for long-term integrity protection.
2016 Privacy, Security and Trust Conference
[Konferenz- oder Workshop-Beitrag], (2016)

Gagliardoni, Tommaso ; Hülsing, Andreas ; Schaffner, Christian :
Semantic Security and Indistinguishability in the Quantum World.
In: LNCS (9816). Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Günther, Felix ; Poettering, Bertram :
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes.
In: International Journal of Information Security (IJIS)
[Artikel], (2016)

Günther, Felix ; Poettering, Bertram :
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes.
20th Australasian Conference on Information Security and Privacy (ACISP 2015) Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Ganji, Fatemeh ; Krämer, Juliane ; Seifert, Jean-Pierre ; Tajik, Shahin :
Lattice Basis Reduction Attack against Physically Unclonable Functions.
22nd ACM Conference on Computer and Communications Security (CCS 2015)
[Konferenz- oder Workshop-Beitrag], (2015)

Geihs, Matthias ; Demirel, Denise ; Buchmann, Johannes :
On the Security of Long-lived Archiving Systems based on the Evidence Record Syntax.
Codes, Cryptology and Information Security Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Günther, Felix ; Manulis, Mark ; Peter, Andreas
Gritzalis, Dimitris ; Kiayias, Aggelos ; Askoxylakis, Ioannis (eds.) :

Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation.
In: LNCS (8813). Springer
[Konferenz- oder Workshop-Beitrag], (2014)

H

Helm, Dominik :
A Framework for Modular Purity Analyses.
TU Darmstadt
[Masterarbeit], (2018)

Hald, Martin :
Cryptographic Analysis of the Bitmessage Protocol.
TU Darmstadt
[Masterarbeit], (2018)

Hanreich, Matthias :
Security Analysis and Firmware Modification of Fitbit Fitness Trackers.
TU Darmstadt
[Masterarbeit], (2018)

Holzer, Patrick :
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β.
TU Darmstadt
[Masterarbeit], (2017)

Hauck, Markus ; Savvides, Savvas ; Eugster, Patrick ; Mezini, Mira ; Salvaneschi, Guido :
SecureScala: Scala embedding of secure computations.
Proceedings of the 2016 7th ACM SIGPLAN Symposium on Scala ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Holz, Marco :
Protecting Metadata with PIR and Tor.
TU Darmstadt
[Bachelorarbeit], (2016)

Habib, Sheikh Mahbub ; Volk, Florian ; Hauke, Sascha ; Mühlhäuser, Max :
Computational trust methods for security quantification in the cloud ecosystem.
In: The Cloud Security Ecosystem, Syngress/Elsevier pp. 463-493.
[Artikel], (2015)

Habib, Sheikh Mahbub ; Volk, Florian ; Hauke, Sascha ; Mühlhäuser, Max :
Computational trust methods for security quantification in the cloud ecosystem.
In: Keine Angabe Syngress Boston, USA , pp. 463-493. ISBN 978-0-12-801595-7
[Buchkapitel], (2015)

Herzberg, Amir ; Shulman, Haya :
Cipher-Suite Negotiation for DNSSEC: Hop-by-Hop or End-to-End?
In: Internet Computing, IEEE (19) pp. 80-84.
[Artikel], (2015)

Herzberg, Amir ; Shulman, Haya :
DNS Authentication as a Service: Preventing Amplifikation Attacks.
In: ACSAC .
[Konferenz- oder Workshop-Beitrag], (2014)

Herzberg, Amir ; Shulman, Haya ; Crispo, Bruno :
Less is More: Cipher-Suite Negotiation for DNSSEC.
Computer Security Applications Conference (ACM ACSAC) ACSAC, IEEE
[Konferenz- oder Workshop-Beitrag], (2014)

Herzberg, Amir ; Shulman, Haya :
DNS Security: Past, Present and Future.
Future Security Conference 2014
[Konferenz- oder Workshop-Beitrag], (2014)

I

Islam, Md. Monirul :
Automating Trustworthiness Assessment of Mobile Applications.
TU Darmstadt
[Masterarbeit], (2017)

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Zeitouni, Shaza :
SeED: Secure Non-Interactive Attestation for Embedded Devices.
10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017)
[Konferenz- oder Workshop-Beitrag], (2017)

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene ; Zeitouni, Shaza :
DARPA: Device Attestation Resilient to Physical Attacks.
ACM WiSEC 2016
[Konferenz- oder Workshop-Beitrag], (2016)

J

Järvinen, Kimmo ; Kiss, Ágnes ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng :
Faster privacy-preserving location proximity schemes.
[Online-Edition: http://cans2018.na.icar.cnr.it/]
In: Cryptology And Network Security (CANS 2018). CANS 2018 Naples, Italy
[Konferenz- oder Workshop-Beitrag], (2018)

Jauernig, Patrick Thomas :
SMOV: Lighweight In-Process Memory Isolation.
TU Darmstadt
[Masterarbeit], (2017)

Jawed, Kashif :
An Investigation and Implementation for the Effect of Row Hammering in Static Random Access Memory (SRAM) and Dynamic Random Access Memory (DRAM).
TU Darmstadt
[Masterarbeit], (2016)

K

Kumar, Manish ; Anagnostopoulos, Nikolaos A. ; Fan, Yufan ; Katzenbeisser, Stefan :
Advanced Reconfigurable Physical Unclonable Functions(AR-PUFs) and Their Security Applications.
In: GI .
[Konferenz- oder Workshop-Beitrag], (2018)

Kalsen, Ali :
On the impact of quantum algorithms on lattice enumeration.
TU Darmstadt
[Masterarbeit], (2018)

Kiss, Ágnes ; Schick, Oliver ; Schneider, Thomas :
Web Application for Privacy-Preserving Scheduling (Poster).
In: USENIX Security Symposium USENIX Association
[Anderes], (2018)

Kumar, Manish :
Advanced Reconfigurable Physical Unclonable Functions(AR-PUFs) and their security applications.
TU Darmstadt
[Masterarbeit], (2018)

Kannwischer, Matthias ; Genêt, Aymeric ; Butin, Denis ; Krämer, Juliane ; Buchmann, Johannes :
Differential Power Analysis of XMSS and SPHINCS.
In: COSADE: International Workshop on Constructive Side-Channel Analysis and Secure Design. In: LNCS , 10815 . Singapore
[Konferenz- oder Workshop-Beitrag], (2018)

Kiel, Robert :
Zero-Knowledge Contingent Payments.
TU Darmstadt
[Masterarbeit], (2018)

Kübler, Florian :
Foundations of a refinement-based framework for escape analyses.
TU Darmstadt
[Masterarbeit], (2017)

Krüger, Stefan ; Nadi, Sarah ; Reif, Michael ; Ali, Karim ; Mezini, Mira ; Bodden, Eric ; Göpfert, Florian ; Günther, Felix ; Weinert, Christian ; Demmler, Daniel ; Kamath, Ram :
CogniCrypt: Supporting Developers in using Cryptography.
[Online-Edition: http://dl.acm.org/citation.cfm?id=3155562.3155681]
Automated Software Engineering (ASE'17) ACM , Piscataway, NJ, USA
[Konferenz- oder Workshop-Beitrag], (2017)

Kornhuber, Tim :
Implementation of a physical layer for visible light communication using the OpenVLC platform.
TU Darmstadt
[Masterarbeit], (2017)

Kümpel, Michael :
Implementierung des unteren MAC-Layers für die OpenVLC-Hardware.
TU Darmstadt
[Masterarbeit], (2017)

Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan :
Using Oblivious RAM in Genomic Studies.
DPM 2017 - Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2017 International Workshops Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Karvelas, Nikolaos ; Senftleben, Marius ; Katzenbeisser, Stefan :
Microblogging in a Privacy-Preserving way.
ARES 2017 - 12th International Conference on Availability, Reliability and Security ACM
[Konferenz- oder Workshop-Beitrag], (2017)

Kohnhäuser, Florian ; Büscher, Niklas ; Gabmeyer, Sebastian ; Katzenbeisser, Stefan :
SCAPI: a scalable attestation protocol to detect software and physical attacks.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks ACM
[Konferenz- oder Workshop-Beitrag], (2017)

Kiss, Ágnes ; Liu, Jian ; Schneider, Thomas ; Asokan, N. ; Pinkas, Benny :
Private Set Intersection for Unequal Set Sizes with Mobile Applications.
In: PoPETs - Proceedings on Privacy Enhancing Technologies
[Artikel], (2017)

Kohnhäuser, Florian ; Büscher, Niklas ; Gabmeyer, Sebastian ; Katzenbeisser, Stefan :
Scalable Attestation Resilient to Physical Attacks for Embedded Devices in Mesh Networks.
In: arXiv
[Artikel], (2017)

Kohnhäuser, Florian ; Katzenbeisser, Stefan :
Secure Code Updates for Mesh Networked Commodity Low-End Embedded Devices.
21st European Symposium on Research in Computer Security (ESORICS 2016) Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Klir, Thomas :
Design and Implementation of an Archiving System Providing Long-Term Integrity and Long-Term Confidentiality.
TU Darmstadt
[Masterarbeit], (2016)

Karuppayah, Shankar ; Vasilomanolakis, Emmanouil ; Haas, Steffen ; Fischer, Mathias ; Mühlhäuser, Max :
BoobyTrap: On Autonomously Detecting and Characterizing Crawlers in P2P Botnets.
IEEE ICC Communication and Information Systems Security Symposium IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Kiss, Ágnes ; Schneider, Thomas :
Valiant's universal circuit is practical.
35. Advances in Cryptology - EUROCRYPT 2016 Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Krämer, Juliane ; Kiss, Ágnes ; Stüber, Anke :
On the Optimality of Differential Fault Analyses on CLEFIA.
MACIS 2015 - Sixth International Conference on Mathematical Aspects of Computer and Information Sciences Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Kohnhäuser, Florian ; Schaller, André ; Katzenbeisser, Stefan :
PUF-based Software Protection for Low-end Embedded Devices.
8th International Conference on Trust and Trustworthy Computing (TRUST 2015) Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Koeberl, Patrick ; Phegade, Vinay ; Rajan, Anand ; Schneider, Thomas ; Schulz, Steffen ; Zhdanova, Maria :
Time to rethink: Trust brokerage using trusted execution environments.
8th International Conference on Trust & Trustworthy Computing (TRUST'15) Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Kohnhäuser, Florian :
PUF-based Software Integrity Protection.
TU Darmstadt
[Masterarbeit], (2014)

Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan ; Tews, Erik ; Hamacher, Kay :
Privacy-Preserving Whole Genome Sequence Processing through Proxy-Aided ORAM.
In: ACM .
[Konferenz- oder Workshop-Beitrag], (2014)

Kong, Joonho ; Koushanfar, Farinaz ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian :
PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs.
Design Automation Conference (DAC) 2014 ACM Press
[Konferenz- oder Workshop-Beitrag], (2014)

L

Li, Ximeng ; Mantel, Heiko ; Schickel, Johannes ; Tasch, Markus ; Weber, Alexandra ; Toteva, Iva :
SPASCA: Secure-Programming Assistant and Side-Channel Analyzer.

[Report], (2017)

Langfeld, Benedikt :
Vorbereitende Arbeiten zum Feldtest eines Systems zum Quantenschlüsselaustausch.
TU Darmstadt
[Masterarbeit], (2017)

Lemos, Marcilio O. O. ; Dantas, Yuri Gil ; Fonseca, Iguatemi E. ; Nigam, Vivek :
On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks.
In: Journal of Logical and Algebraic Methods in Programming
[Artikel], (2017)

Lettner, Julian ; Kollenda, Benjamin ; Homescu, Andrei ; Larsen, Per ; Schuster, Felix ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Franz, Michael :
Subversive-C: Abusing and Protecting Dynamic Message Dispatch.
USENIX Annual Technical Conference (ATC)
[Konferenz- oder Workshop-Beitrag], (2016)

Larsen, Per ; Brunthaler, Stefan ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Franz, Michael:
Automated Software Diversity.
Synthesis Lectures on Information Security, Privacy, and Trust. Morgan & Claypool
[Buch], (2015)

Lateef, Muhammad Raees :
Design, Implementation and Evaluation of a Lightweight Attestation Scheme for Embedded Systems.
TU Darmstadt
[Masterarbeit], (2015)

M

Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra ; Weber, Friedrich :
How Secure is Green IT? The Case of Software-Based Energy Side Channels.
[Online-Edition: https://esorics2018.upc.edu/]
In: ESORICS 2018, 3.9.-7.9. 2018, Barcelona, Spain. In: Springer LNCS . Barcelona, Spain
[Konferenz- oder Workshop-Beitrag], (2018)

Miettinen, Markus ; Nguyen, Thien Duc ; Asokan, N. ; Sadeghi, Ahmad-Reza :
Revisiting Context-Based Pairing in IoT.
In: 55th Design Automation Conference (DAC), 24.-29.06. 2018, San Francisco, CA, USA. Proceedings of the 55th Design Automation Conference (DAC) ACM
[Konferenz- oder Workshop-Beitrag], (2018)

Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra ; Weber, Friedrich :
How Secure is Green IT? The Case of Software-Based Energy Side Channels.
In: Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS).
[Konferenz- oder Workshop-Beitrag], (2018)

Muneeb, Ahmed :
mproving a Linux Device Driver for Visible Light Communication.
TU Darmstadt
[Masterarbeit], (2017)

Müller, Patrick :
Reconstruction of Obfuscated Strings.
TU Darmstadt
[Masterarbeit], (2017)

Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra ; Weber, Friedrich :
Vulnerabilities Introduced by Features for Software-based Energy Measurement.

[Report], (2017)

Meister, Richard :
Design and evaluation of a hybrid SDR testbed for visible light communication and Wi-Fi.
TU Darmstadt
[Masterarbeit], (2017)

Mulholland, John ; Mosca, Michele ; Braun, Johannes :
The Day the Cryptography Dies.
In: IEEE Security & Privacy, 15 (4) pp. 14-21.
[Artikel], (2017)

Mantel, Heiko ; Weber, Alexandra ; Köpf, Boris :
A Systematic Study of Cache Side Channels across AES Implementations.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Marson, Giorgia Azzurra ; Poettering, Bertram :
Security Notions for Bidirectional Channels.
In: IACR Transactions on Symmetric Cryptology, 2017 (Volume 2017 Issue 1) pp. 405-426.
[Artikel], (2017)

Mantel, Heiko ; Weber, Alexandra ; Köpf, Boris :
A Systematic Study of Cache Side Channels across AES Implementations.
In: Proceedings of the 9th International Symposium on Engineering Secure Software and Systems (ESSoS).
[Konferenz- oder Workshop-Beitrag], (2017)

Mariano, Artur ; Correia, Fabio ; Bischof, Christian :
A vectorized, cache efficient LLL implementation.
VECPAR 2016 - 12th International Meeting on High Performance Computing for Computational Science
[Konferenz- oder Workshop-Beitrag], (2016)

McLaughlin, Stephen ; Konstantinou, Charalambos ; Wang, Xueyang ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Maniatakos, Michail ; Karri, Ramesh :
The Cybersecurity Landscape in Industrial Control Systems.
In: Proceedings of the IEEE, PP (99)
[Artikel], (2016)

Mariano, Artur ; Bischof, Christian :
Enhancing the scalability, tractability and memory usage of HashSieve on multi-core CPUs.
PDP2016 Conference Publishing Services (CPS)
[Konferenz- oder Workshop-Beitrag], (2016)

Mariano, Artur ; Laarhoven, Thijs ; Bischof, Christian :
Parallel (probable) lock-free HashSieve: a practical sieving algorithm for the SVP.
ICPP 2015 - The 44th Annual Conference 2015 International Conference on Parallel Processing in press
[Konferenz- oder Workshop-Beitrag], (2015)

Mantel, Heiko ; Starostin, Artem :
Transforming Out Timing Leaks, More or Less.
In: LNCS (9326). Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Medeiros, Flávio ; Kästner, Christian ; Ribeiro, Márcio ; Nadi, Sarah ; Gheyi, Rohit :
The Love/Hate Relationship with the C Preprocessor: An Interview Study.
European Conference on Object-Oriented Programming
[Konferenz- oder Workshop-Beitrag], (2015)

N

Nanjunde Gowda, Vidyashree :
Benchmarking Static Misuse or Bug Detectors Using Software Vulnerabilities.
TU Darmstadt
[Masterarbeit], (2018)

Nguyen, Lisa ; Krüger, Stefan ; Hill, Patrick ; Ali, Karim ; Bodden, Eric :
VisuFlow: a Debugging Environment for Static Analyses.
ICSE ACM
[Konferenz- oder Workshop-Beitrag], (2018)

Neubauer, Sven :
Angriffsanalyse einer TETRA-Basisstation.
TU Darmstadt
[Bachelorarbeit], (2018)

Nikiforov, Oleg ; Sauer, Alexander ; Schickel, Johannes ; Weber, Alexandra ; Alber, Gernot ; Mantel, Heiko ; Walther, Thomas :
Side-Channel Analysis of Privacy Amplification in Postprocessing Software for a Quantum Key Distribution System.

[Report], (2018)

Neumann, Klara Maria :
Aufbau von Empfängerstationen für ein System zum Quantenschlüsselaustausch.
TU Darmstadt
[Bachelorarbeit], (2017)

Nielsen, Jesper Buus ; Schneider, Thomas ; Trifiletti, Roberto :
Constant round maliciously secure 2PC with function-independent preprocessing using LEGO.
24. Annual Network and Distributed System Security Symposium (NDSS'17) The Internet Society
[Konferenz- oder Workshop-Beitrag], (2017)

Nadi, Sarah ; Krüger, Stefan ; Mezini, Mira ; Bodden, Eric :
"Jumping Through Hoops" Why do Java Developers Struggle With Cryptography APIs?
International Conference on Software Engineering ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Nadi, Sarah ; Krüger, Stefan :
Variability Modeling of Cryptographic Components (Clafer Experience Report).
In: Tenth International Workshop on Variability Modelling of Software-intensive Systems, 27. - 29.1.2016, Salvador, Brazil. In: Proceedings of the Tenth International Workshop on Variability Modelling of Software-intensive Systems .
[Konferenz- oder Workshop-Beitrag], (2016)

P

Pinkas, Benny ; Schneider, Thomas ; Weinert, Christian ; Wieder, Udi :
Efficient Circuit-based PSI via Cuckoo Hashing.
EUROCRYPT 2018 Springer
[Konferenz- oder Workshop-Beitrag], (2018)

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael :
Scalable private set intersection based on OT extension.
In: Transactions on Privacy and Security (TOPS)
[Artikel], (2018)

Portela, Bernardo ; Barbosa, Manuel ; Scerri, Guillaume ; Warinschi, Bogdan ; Bahmani, Raad ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza :
Secure Multiparty Computation from SGX.
Financial Cryptography and Data Security
[Konferenz- oder Workshop-Beitrag], (2017)

Pascoal, Túlio A. ; Dantas, Yuri Gil ; Fonseca, Iguatemi E. ; Nigam, Vivek :
Slow TCAM Exhaustion DDoS Attack.
IFIP SEC 2017 - 32nd International Conference on ICT Systems Security and Privacy Protection Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Pascoal, Tulio A. ; Dantas, Yuri Gil ; Fonseca, Iguatemi E. ; Nigam, Vivek :
Slow TCAM Exhaustion DDoS Attack.
In: Proceedings of the 32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC).
[Konferenz- oder Workshop-Beitrag], (2017)

Pfeiffer, Martin ; Kwiotek, Jan-Pascal ; Classen, Jiska ; Klose, Robin ; Hollick, Matthias :
Analyzing TETRA Location Privacy and Network Availability.
In: SPSM '16 . ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Pinkas, Benny ; Schneider, Thomas ; Segev, Gil ; Zohner, Michael :
Phasing: Private set intersection using permutation-based hashing.
24th USENIX Security Symposium (USENIX Security'15)
[Konferenz- oder Workshop-Beitrag], (2015)

R

Richter, Philipp ; Yang, Zheng ; Tkachenko, Oleksandr ; Leppäkoski, Helena ; Järvinen, Kimmo ; Schneider, Thomas :
Received Signal Strength quantization for secure indoorpositioning via fingerprinting.
8. International Conference on Localization and GNSS (ICL-GNSS'18)
[Konferenz- oder Workshop-Beitrag], (2018)

Riazi, M. Sadegh ; Weinert, Christian ; Tkachenko, Oleksandr ; Songhori, Ebrahim M. ; Schneider, Thomas ; Koushanfar, Farinaz :
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications.
ACM Asia Conference on Computer and Communications Security (ASIACCS'18) ACM
[Konferenz- oder Workshop-Beitrag], (2018)

Riazi, M. Sadegh ; Songhori, Ebrahim M. ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz :
Toward Practical Secure Stable Matching.
In: Proceedings on Privacy Enhancing Technologies (PoPETs)
[Artikel], (2017)

Rudd, Robert ; Skowyra, Richard ; Bigelow, David ; Dedhia, Veer ; Hobson, Thomas ; Crane, Stephen ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Franz, Michael ; Sadeghi, Ahmad-Reza ; Okhravi, Hamed :
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
24th Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag], (2017)

Rauzy, Pablo ; Kiss, Ágnes ; Krämer, Juliane ; Seifert, Jean-Pierre :
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT.
COSADE 2016 Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Rieß, Susanne :
An Analysis of Lattice-Based Key Exchange Protocols.
TU Darmstadt
[Masterarbeit], (2016)

Reif, Michael ; Eichberg, Michael ; Hermann, Ben ; Lerch, Johannes ; Mezini, Mira :
Call graph construction for Java libraries.
In: Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering.
[Konferenz- oder Workshop-Beitrag], (2016)

S

Schaller, André ; Xiong, Wenjie ; Anagnostopoulos, Nikolaos A. ; Saleem, Umair ; Gabmeyer, Sebastian ; Skoric, Boris ; Katzenbeisser, Stefan ; Szefer, Jakub :
Decay-Based DRAM PUFs in Commodity Devices.
In: IEEE Transactions on Dependable and Secure Computing (TDSC)
[Artikel], (2018)

Sharma, Ratika :
Testing the effects of voltage variations on PUF implementations in Commercial Off-The-Shelf (COTS) devices.
TU Darmstadt
[Masterarbeit], (2018)

Schabhüser, Lucas ; Butin, Denis ; Demirel, Denise ; Buchmann, Johannes :
Function-Dependent Commitments for Verifiable Multi-Party Computation.
[Online-Edition: http://isc2018.sccs.surrey.ac.uk/]
In: LNCS . Guildford, UK
[Konferenz- oder Workshop-Beitrag], (2018)

Steinmetzer, Daniel ; Yuan, Yimin ; Hollick, Matthias :
Beam-Stealing: Intercepting the Sector Sweep to Launch Man-in-the-Middle Attacks on Wireless IEEE 802.11ad Networks.
In: 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Jun 18, 2018 - Jun 20, 2018, Stockholm, Sweden. Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks
[Konferenz- oder Workshop-Beitrag], (2018)

Scheidel, Lukas :
Distributed Path ORAM.
TU Darmstadt
[Bachelorarbeit], (2018)

Saleem, Umair Muhammad :
Flash-based Physical Unclonable Functions (PUFs) using Commercial Off-The-Shelf (COTS) NAND Flash Memory.
TU Darmstadt
[Masterarbeit], (2018)

Schürl, Stefan :
Entwicklung eines FPGA-Systems zur hochauflösenden Zeitmessung.
TU Darmstadt
[Masterarbeit], (2017)

Schick, Oliver :
Web application for privacy-preserving scheduling.
TU Darmstadt
[Bachelorarbeit], (2017)

Sarangdhar, Ravi ; Fan, Yufan ; Anagnostopoulos, Nikolaos A. ; Gayer, Udo ; Flederer, Frank ; Mikschl, Tobias ; Arul, Tolga ; John, Philipp R. ; Hierholz, Kirsten ; Montenegro, Sergio ; Katzenbeisser, Stefan :
An investigation of the effects of radiation on current key storage solutions and on Physical Unclonable Functions (PUFs) being.
27th Crypto-Day
[Konferenz- oder Workshop-Beitrag], (2017)

Singh, Govind :
o Static Bug Finders Identify API Misuses?
TU Darmstadt
[Masterarbeit], (2017)

Sarangdhar, Ravi :
An investigation of the effects of radiation on current key storage solutions and on Physical Unclonable Functions (PUFs) being used as key storage.
TU Darmstadt
[Masterarbeit], (2017)

Sitnikov, Konstantin :
A Survey on Post-Quantum Key Exchange.
TU Darmstadt
[Masterarbeit], (2017)

Schreiber, Johannes :
Countermeasures Against First Order Fault Attacks Using the Example of ring-TESLA.
TU Darmstadt
[Masterarbeit], (2017)

Steinmetzer, Daniel ; Loch, Adrian ; García-García, Amanda ; Widmer, Jörg ; Hollick, Matthias :
Mitigating Lateral Interference: Adaptive Beam Switching for Robust Millimeter-Wave Networks.
1st ACM Workshop on Millimeter Wave Networks and Sensing Systems (mmNets 2017) ACM
[Konferenz- oder Workshop-Beitrag], (2017)

Schurig, Sebastian :
Development of a user interface and implementation of specific software tools for the evaluation and realization of PUFs with respect to security applications.
TU Darmstadt
[Masterarbeit], (2017)

Schaller, André ; Xiong, Wenjie ; Anagnostopoulos, Nikolaos A. ; Saleem, Umair ; Gabmeyer, Sebastian ; Katzenbeisser, Stefan ; Szefer, Jakub :
Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security.
2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) Institute of Electrical and Electronics Engineers (IEEE)
[Konferenz- oder Workshop-Beitrag], (2017)

Schmidt, Markus :
Estimation of the Hardness of the Learning with Errors Problem with a Given Number of Samples.
TU Darmstadt
[Masterarbeit], (2017)

Schaller, André ; Stanko, Taras ; Skoric, Boris ; Katzenbeisser, Stefan :
Eliminating Leakage in Reverse Fuzzy Extractors.
In: IEEE Transactions on Information Forensics and Security
[Artikel], (2017)

Schulz, Steffen ; Schaller, André ; Kohnhäuser, Florian ; Katzenbeisser, Stefan :
Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors.
In: LNCS (10493). Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Schroth, Nils :
Demonstrator for Privacy-Preserving Face Recognition.
TU Darmstadt
[Bachelorarbeit], (2016)

Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Jin, Yier :
Towards a Policy-Agnostic Control-Flow Integrity Implementation.
Black Hat Europe
[Konferenz- oder Workshop-Beitrag], (2016)

Schabhüser, Lucas ; Demirel, Denise ; Buchmann, Johannes :
An Unconditionally Hiding Auditing Procedure for Computations over Distributed Data.
The 2nd IEEE Workshop on Security and Privacy in the Cloud (SPC 2016)
[Konferenz- oder Workshop-Beitrag], (2016)

Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Ibrahim, Ahmad ; Conti, Mauro ; Neven, Gregory :
SANA: Secure and Scalable Aggregate Network Attestation.
23rd ACM Conference on Computer and Communications Security (CCS) 2016 CCS 2016
[Konferenz- oder Workshop-Beitrag], (2016)

Schaller, André ; Xiong, Wenjie ; Gabmeyer, Sebastian ; Anagnostopoulos, Nikolaos A. ; Saleem, Umair ; Katzenbeisser, Stefan ; Szefer, Jakub
Gierlichs, Benedikt ; Poschmann, Axel (eds.) :

Run-time Accessible DRAM PUFs in Commodity Devices.
In: Lecture Notes in Computer Science (LNCS) , 9813 . Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Schultes, Tobias ; Grau, Markus ; Steinmetzer, Daniel ; Hollick, Matthias :
Far Away and Yet Nearby - A Framework for Practical Distance Fraud on Proximity Services for Mobile Devices (Demo).
ACM Conference on Security and Privacy in Wireless and Mobile Networks 2016 (ACM WiSec'16)
[Konferenz- oder Workshop-Beitrag], (2016)

Sadeghi, Ahmad-Reza ; Dessouky, Ghada :
POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs.
ACM WiSec 2016
[Konferenz- oder Workshop-Beitrag], (2016)

Späth, Johannes ; Nguyen, Lisa ; Ali, Karim ; Bodden, Eric :
Boomerang: Demand-Driven Flow-Sensitive, Field-Sensitive, and Context-Sensitive Pointer Analysis.
European Conference on Object-Oriented Programming Dagstuhl
[Konferenz- oder Workshop-Beitrag], (2016)

Schabhüser, Lucas ; Demirel, Denise ; Buchmann, Johannes :
An Unconditionally Hiding Auditing Procedure for Multi-Party Computations.
In: IACR - Cryptology ePrint Archive, 2016
[Artikel], (2016)

Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Jin, Yier :
Strategy Without Tactics: Policy-Agnostic Hardware-Enhanced Control-Flow Integrity.
53rd Design Automation Conference (DAC)
[Konferenz- oder Workshop-Beitrag], (2016)

Songhori, Ebrahim ; Zeitouni, Shaza ; Dessouky, Ghada ; Schneider, Thomas ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz :
GarbledCPU: A MIPS Processor for Secure Computation in Hardware.
53rd Design Automation Conference (DAC'16)
[Konferenz- oder Workshop-Beitrag], (2016)

Steinmetzer, Daniel ; Classen, Jiska ; Hollick, Matthias :
Exploring Millimeter-Wave Network Scenarios with Ray-tracing based Simulations in mmTrace.
IEEE Infocom 2016 Poster Presentation (Infocom'16 Posters)
[Konferenz- oder Workshop-Beitrag], (2016)

Steinmetzer, Daniel ; Classen, Jiska ; Hollick, Matthias :
mmTrace: Modeling Millimeter-wave Indoor Propagation with Image-based Ray-tracing.
In: Millimeter-wave Networking Workshop (mmNet 2016)
[Artikel], (2016)

Sadeghi, Ahmad-Reza ; Armknecht, Frederik :
Towards a Unified Security Model for Physically Unclonable Functions.
CT-RSA - Cryptographers' Track at the RSA Conference
[Konferenz- oder Workshop-Beitrag], (2016)

Schaller, André ; Skoric, Boris ; Katzenbeisser, Stefan :
On the Systematic Drift of Physically Unclonable Functions Due to Aging.
In: TrustED
[Konferenz- oder Workshop-Beitrag], (2015)

Shulman, Haya ; Waidner, Michael :
DNSSEC for Cyber Forensics.
In: EURASIP J. Information Security (16) p. 14.
[Artikel], (2015)

Steinmetzer, Daniel ; Chen, Joe ; Classen, Jiska ; Knightly, Edward ; Hollick, Matthias :
Eavesdropping with Periscopes: Experimental Security Analysis of Highly Directional Millimeter Waves.
IEEE Conference on Communications and Network Security 2015 (CNS)
[Konferenz- oder Workshop-Beitrag], (2015)

Shulman, Haya ; Waidner, Michael :
Towards Security of Internet's Naming Infrastructure.
Computer Security ESORICS
[Konferenz- oder Workshop-Beitrag], (2015)

Steinmetzer, Daniel ; Schulz, Matthias ; Hollick, Matthias :
Lockpicking Physical Layer Key Exchange: Weak Adversary Models Invite the Thief.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec)
[Konferenz- oder Workshop-Beitrag], (2015)

Songhori, Ebrahim ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz :
Compacting Privacy-Preserving k-Nearest Neighbor Search using Logic Synthesis.
52nd Design Automation Conference (DAC)
[Konferenz- oder Workshop-Beitrag], (2015)

Schuster, Felix ; Tendyck, Thomas ; Liebchen, Christopher ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten :
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications.
36th IEEE Symposium on Security and Privacy (Oakland)
[Konferenz- oder Workshop-Beitrag], (2015)

Songhori, Ebrahim ; Hussain, Siam ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz :
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits.
36th IEEE Symposium on Security and Privacy (Oakland)
[Konferenz- oder Workshop-Beitrag], (2015)

Shulman, Haya ; Ezra, Shiran :
Poster: On the Resilience of DNS Infrastructure.
ACM Conference on Computer and Communications Security (ACM CCS) ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Shulman, Haya :
Pretty Bad Privacy: Pitfalls of DNS Encryption.
Proceedings of the 13th annual ACM workshop on Privacy in the electronic society
[Konferenz- oder Workshop-Beitrag], (2014)

T

Tkachenko, Oleksandr ; Weinert, Christian ; Schneider, Thomas ; Hamacher, K. :
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
ACM Asia Conference on Computer and Communications Security (ASIACCS'18) ACM
[Konferenz- oder Workshop-Beitrag], (2018)

Treiber, Amos :
Access Count Leakage in Oblivious RAMs.
TU Darmstadt
[Masterarbeit], (2018)

Tariq, Taha :
Web application for privacy-preserving assignments.
TU Darmstadt
[Masterarbeit], (2018)

Trautmann, Nils ; Hauke, Philipp :
Trapped-ion quantum simulation of excitation transport: Disordered, noisy, and long-range connected quantum networks.
In: PHYSICAL REVIEW A, 97 023606.
[Artikel], (2018)

Tkachenko, Oleksandr :
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
TU Darmstadt
[Masterarbeit], (2017)

Toteva, Iva :
Advancing Tool Support for the Detection of Side-Channel.
TU Darmstadt
[Masterarbeit], (2017)

Trautmann, Nils ; Sonnleitner, Matthias ; Barnett, Stephen :
Will a Decaying Atom Feel a Friction Force?
In: Physical Review Letters
[Artikel], (2017)

Traverso, Giulia ; Demirel, Denise ; Habib, Sheikh Mahbub ; Buchmann, Johannes :
AS³: Adaptive Social Secret Sharing for Distributed Storage Systems.
2016 Privacy, Security and Trust Conference IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Trautmann, Nils ; Alber, Gernot ; Leuchs, Gerd :
Efficient single-photon absorption by a trapped moving atom.
In: Physical Review A p. 8.
[Artikel], (2016)

Traverso, Giulia ; Demirel, Denise ; Buchmann, Johannes :
Dynamic and Verifiable Hierarchical Secret Sharing.
9th International Conference on Information Theoretic Security - ICITS 2016 Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Traverso, Giulia ; Demirel, Denise ; Buchmann, Johannes:
Homomorphic Signature Schemes - A survey.
SpringerBriefs in Computer Science. Springer ISBN Softcover 978-3-319-32114-1 - ebook 978-3-319-32115-8
[Buch], (2016)

Trautmann, Nils ; Hauke, Philipp :
Quantum simulation of the dynamical Casimir effect with trapped ions.
In: New Journal of Physics (18) 043029.
[Artikel], (2016)

Trautmann, Nils ; Alber, Gernot :
Dissipation-enabled efficient excitation transfer from a single photon to a single quantum emitter.
In: Physical Review A p. 9.
[Artikel], (2016)

Trautmann, N. ; Alber, G. ; Agarwal, G. S. ; Leuchs, G. :
Time-Reversal-Symmetric Single-Photon Wave Packets for Free-Space Quantum Communication.
In: PHYSICAL REVIEW LETTERS, APS p. 173601.
[Artikel], (2015)

Trautmann, N. ; Bernad, J. Z. ; Sondermann, M. ; Alber, G. ; Sanchez-Soto, L. L. ; Leuchs, G. :
Generation of entangled matter qubits in two opposing parabolic mirrors.
In: PHYSICAL REVIEW A 90 063814.
[Artikel], (2014)

U

Ullrich, Fabian :
Analysing and Evaluating Interface, Communication, and Web Security in Productive IoT Ecosystems.
TU Darmstadt
[Masterarbeit], (2018)

V

Vasilomanolakis, Emmanouil ; Wolf, Jan Helge ; Böck, Leon ; Mühlhäuser, Max ; Karuppayah, Shankar :
I Trust my Zombies: a Trust-enabled Botnet.
Blackhat Europe
[Konferenz- oder Workshop-Beitrag], (2017)

Vasilomanolakis, Emmanouil ; Stahn, Michael ; Cordero, Carlos Garcia ; Mühlhäuser, Max :
On Probe-Response Attacks in Collaborative Intrusion Detection Systems.
IEEE Conference on Communications and Network Security IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Vigil, Martín ; Demirel, Denise ; Habib, Sheikh Mahbub ; Hauke, Sascha ; Buchmann, Johannes ; Mühlhäuser, Max :
LoT: a Reputation-based Trust System for Long-term Archiving.
SECURWARE 2016 Thinkmind Digital Library
[Konferenz- oder Workshop-Beitrag], (2016)

Volk, Florian ; Trüschler, Nadine ; Mühlhäuser, Max :
Rating Decomposition with Conjoint Analysis and Machine Learning.
CENTRIC 2015: The Eighth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services IARIA
[Konferenz- oder Workshop-Beitrag], (2015)

Vigil, Martín ; Buchmann, Johannes ; Cabarcas, Daniel ; Weinert, Christian ; Wiesmaier, Alexander :
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey.
In: Computers & Security, 50 pp. 16-32.
[Artikel], (2015)

Vigil, Martín ; Weinert, Christian ; Demirel, Denise ; Buchmann, Johannes :
An efficient time-stamping solution for long-term digital archiving.
IEEE 33rd International Performance Computing and Communications Conference (IPCCC)
[Konferenz- oder Workshop-Beitrag], (2014)

W

Wunderer, Thomas ; Wang, Yuntao :
Revisiting the Sparsification Technique in Kannan’s Embedding Attack on LWE.
In: 14th International Conference on Information Security Practice and Experience (ISPEC 2018). In: Springer LNCS . Tokyo, Japan
[Konferenz- oder Workshop-Beitrag], (2018)

Wolf, Yannic :
Eine Faserverstärkerstufe für den Quantenhub.
TU Darmstadt
[Bachelorarbeit], (2018)

Wainakh, Aidmar :
On the Analysis & Generation of Synthetic Attack for Intrusion Detection Systems.
TU Darmstadt
[Masterarbeit], (2017)

Weinert, Christian ; Demirel, Denise ; Vigil, Martín ; Geihs, Matthias ; Buchmann, Johannes :
MoPS: A Modular Protection Scheme for Long-Term Storage.
ASIA CCS 2017 - ACM Asia Conference on Computer and Communications Security ACM
[Konferenz- oder Workshop-Beitrag], (2017)

Wunderer, Thomas :
Revisiting the Hybrid Attack: Improved Analysis and Refined Security Estimates.

[Anderes], (2016)

Weinert, Christian :
Building a Modular Long-Term Archiving System.
TU Darmstadt
[Masterarbeit], (2016)

Wachsmann, Christian ; Sadeghi, Ahmad-Reza:
Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions.
Synthesis Lectures on Information Security, Privacy, and Trust. Morgan & Claypool Publishers ISBN 9781627055093
[Buch], (2014)

Y

Yuan, Yimin :
Investigating Practical Man-in-the-middle Network Attacks on IEEE 802.11ad.
TU Darmstadt
[Masterarbeit], (2017)

Z

Zeitouni, Shaza ; Gens, David ; Sadeghi, Ahmad-Reza :
It’s Hammer Time: How to Attack (Rowhammer-based) DRAM-PUFs.
In: Design Automation Conference (DAC) 2018
[Konferenz- oder Workshop-Beitrag], (2018)

Zeitouni, Shaza ; Dessouky, Ghada ; Arias, Orlando ; Sullivan, Dean ; Ibrahim, Ahmad ; Jin, Yier ; Sadeghi, Ahmad-Reza :
ATRIUM: Runtime Attestation Resilient Under Memory Attacks.
2017 International Conference On Computer Aided Design (ICCAD'17)
[Konferenz- oder Workshop-Beitrag], (2017)

Zeitouni, Shaza ; Oren, Yossef ; Wachsmann, Christian ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza :
Remanence Decay Side-Channel: The PUF Case.
In: IEEE Transactions on Information Forensics and Security, 99
[Artikel], (2016)

Zhou, Shurui ; Al-Kofahi, Jafar ; Nguyen, Tien ; Kaestner, Christian ; Nadi, Sarah :
Extracting Configuration Knowledge from Build Files with Symbolic Analysis.
3rd International Workshop on Release Engineering
[Konferenz- oder Workshop-Beitrag], (2015)

Zhang, Jiang ; Zhang, Zhenfeng ; Ding, Jintai ; Snook, Michael ; Dagdelen, Özgür :
Authenticated Key Exchange from Ideal Lattices.
EUROCRYPT 2015
[Konferenz- oder Workshop-Beitrag], (2015)

Diese Liste wurde am Sun Aug 12 02:12:44 2018 CEST generiert.