TU Darmstadt / ULB / TUbiblio

Einträge mit Organisationseinheit "20 Fachbereich Informatik > EC SPRIDE"

Ebene hoch
Gruppiere nach: Autor(en) | Datum | Typ des Eintrags | Sprache | Keine Gruppierung
Springe zu: A | B | C | D | E | F | G | H | I | J | K | L | M | N | P | R | S | T | W | Z
Anzahl der Einträge auf dieser Ebene: 162.

A

Asharov, Gilad ; Demmler, Daniel ; Schapira, Michael ; Schneider, Thomas ; Segev, Gil ; Shenker, Scott ; Zohner, Michael :
Privacy-Preserving Interdomain Routing at Internet Scale.
In: PoPETs - Proceedings on Privacy Enhancing Technologies
[Artikel], (2017)

Arzt, Steven :
Static Data Flow Analysis for Android Applications.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5937]
Technische Universität , Darmstadt
[Dissertation], (2016)

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael :
More Efficient Oblivious Transfer Extensions.
In: Journal of Cryptology
[Artikel], (2016)

Arzt, Steven ; Nadi, Sarah ; Ali, Karim ; Bodden, Eric ; Erdweg, Sebastian ; Mezini, Mira :
Towards Secure Integration of Cryptographic Software.
[Online-Edition: http://2015.splashcon.org/track/onward2015-papers]
In: OOPSLA Onward!, 25.10.2015, Piitsburgh. In: Proceedings of the 2015 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming & Software .
[Konferenz- oder Workshop-Beitrag], (2015)

Arzt, Steven ; Rasthofer, Siegfried ; Hahn, Robert ; Bodden, Eric :
Using Targeted Symbolic Execution for Reducing False-Positives in Dataflow Analysis.
In: 4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 14.06.2015, Portland, USA. Proceedings of the 4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis
[Konferenz- oder Workshop-Beitrag], (2015)

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael :
More efficient oblivious transfer extensions with security for malicious adversaries.
34th Advances in Cryptology - EUROCRYPT 2015
[Konferenz- oder Workshop-Beitrag], (2015)

Albrecht, Martin ; Rechberger, Christian ; Schneider, Thomas ; Tiessen, Tyge ; Zohner, Michael :
Ciphers for MPC and FHE.
34th Advances in Cryptology - EUROCRYPT 2015 Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Ali, Karim ; Rapoport, Marianna ; Lhoták, Ondřej ; Dolby, Julian ; Tip, Frank :
Constructing Call Graphs of Scala Programs.
[Online-Edition: http://dx.doi.org/10.1007/978-3-662-44202-9_3]
In: Proceedings of the 28th European Conference on Object-Oriented Programming. In: ECOOP '14 .
[Konferenz- oder Workshop-Beitrag], (2014)

Arzt, Steven ; Rasthofer, Siegfried ; Fritz, Christian ; Bodden, Eric ; Bartel, Alexandre ; Klein, Jacques ; Le Traon, Yves ; Octeau, Damien ; McDaniel, Patrick :
Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps.
In: Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, Edinburgh.
[Konferenz- oder Workshop-Beitrag], (2014)

Arzt, Steven ; Huber, Stephan ; Rasthofer, Siegfried ; Bodden, Eric :
Denial-of-App Attack: Inhibiting the Installation of Android Apps on Stock Phones.
In: 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, Scottsdale. In: Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices .
[Konferenz- oder Workshop-Beitrag], (2014)

Arzt, Steven ; Bodden, Eric :
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes.
In: ICSE, Hyderabad.
[Konferenz- oder Workshop-Beitrag], (2014)

Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric :
Instrumenting Android and Java Applications as Easy as abc.
In: Runtime Verification 2013 (RV'13) pp. 364-381.
[Artikel], (2013)

Arzt, Steven ; Bodden, Eric :
Efficiently updating IDE-based data-flow analyses in response to incremental program changes.
[Online-Edition: http://www.bodden.de/pubs/TUD-CS-2013-0253.pdf]

[Report], (2013)

Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric :
SuSi: A Tool for the Fully Automated Classification and Categorization of Android Sources and Sinks.
[Online-Edition: http://www.informatik.tu-darmstadt.de/fileadmin/user_upload/...]

[Report], (2013)

Arzt, Steven ; Falzon, Kevin ; Follner, Andreas ; Rasthofer, Siegfried ; Bodden, Eric ; Stolz, Volker :
How useful are existing monitoring languages for securing Android apps?
[Online-Edition: http://www.bodden.de/pubs/aff13howuseful.pdf]
In: 6. Arbeitstagung Programmiersprachen (ATPS 2013). In: GI Lecture Notes in Informatics . Gesellschaft für Informatik
[Konferenz- oder Workshop-Beitrag], (2013)

Arzt, Steven ; Falzon, Kevin ; Follner, Andreas ; Rasthofer, Siegfried ; Bodden, Eric ; Stolz, Volker :
How useful are existing monitoring languages for securing Android apps?
[Online-Edition: http://www.bodden.de/pubs/aff13howuseful.pdf]
In: 6. Arbeitstagung Programmiersprachen (ATPS 2013). In: GI Lecture Notes in Informatics . Gesellschaft für Informatik
[Konferenz- oder Workshop-Beitrag], (2013)

Ali, Karim ; Lhoták, Ondřej :
Averroes: Whole-Program Analysis without the Whole Program.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-39038-8_16]
In: Proceedings of the 27th European Conference on Object-Oriented Programming. In: ECOOP '13 .
[Konferenz- oder Workshop-Beitrag], (2013)

Asokan, N. ; Dmitrienko, Alexandra ; Nagy, Marcin ; Reshetova, Elena ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stelle, Stanislaus :
CrowdShare: Secure Mobile Resource Sharing.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-38980-1_27]
11. International Conference on Applied Cryptography and Network Security (ACNS'13)
[Konferenz- oder Workshop-Beitrag], (2013)

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael :
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation.
[Online-Edition: http://dl.acm.org/citation.cfm?id=2516738]
20th ACM Conference on Computer and Communications Security (CCS'13) ACM
[Konferenz- oder Workshop-Beitrag], (2013)

Alsouri, Sami ; Sinschek, Jan ; Sewe, Andreas ; Bodden, Eric ; Mezini, Mira ; Katzenbeisser, Stefan :
Dynamic Anomaly Detection for More Trustworthy Outsourced Computation.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-33383-5_11]
In: 15th International Conference on Information Security, 19-21 Sep 2012, Passau, Germany. In: Lecture Notes in Computer Science (ISSN 0302-9743) , 7483 .
[Konferenz- oder Workshop-Beitrag], (2012)

Ansaloni, Danilo ; Binder, Walter ; Bockisch, Christoph ; Bodden, Eric ; Hatun, Kardelen ; Marek, Lukas ; Qi, Zhengwei ; Sarimbekov, Aibek ; Sewe, Andreas ; Tuma, Petr ; Zheng, Yudi :
Challenges for Refinement and Composition of Instrumentations (Position Paper).
[Online-Edition: http://www.bodden.de/pubs/abb+12challenges.pdf]
In: International Conference on Software Composition (SC 2012).
[Konferenz- oder Workshop-Beitrag], (2012)

Ahmad, Junaid Jameel ; Li, Shujun ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-32946-3_22]
In: 16th International Conference on Financial Cryptography and Data Security (FC'12). In: LNCS , 7397 . Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Ali, Karim ; Lhoták, Ondřej :
Application-Only Call Graph Construction.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-31057-7_30]
In: Proceedings of the 26th European Conference on Object-Oriented Programming. In: ECOOP '12 .
[Konferenz- oder Workshop-Beitrag], (2012)

Almeida, José Bacelar ; Bangerter, Endre ; Barbosa, Manuel ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-15497-3₁₀]
In: 15th European Symposium on Research in Computer Security (ESORICS'10). In: LNCS , 6345 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Ali, Karim ; Aib, Issam ; Boutaba, Raouf :
P2P-AIS: A P2P Artificial Immune Systems architecture for detecting DDoS flooding attacks.
In: Global Information Infrastructure Symposium. In: GIIS '09 .
[Konferenz- oder Workshop-Beitrag], (2009)

Ali, Karim ; Boutaba, Raouf :
Applying Kernel Methods to Anomaly-based Intrusion Detection Systems.
In: Global Information Infrastructure Symposium. In: GIIS '09 .
[Konferenz- oder Workshop-Beitrag], (2009)

Aly, Sherif G. ; Nadi, Sarah ; Hamdan, Karim :
A Java-Based Programming Language Support of Location Management in Pervasive Systems.
In: International Journal of Computer Science and Network Security, 8 (6) pp. 329-336.
[Artikel], (2008)

B

Bodden, Eric ; Pun, Ka I. ; Steffen, Martin ; Stolz, Volker ; Wickert, Anna-Katharina
Margaria, Tiziana ; Steffen, Bernhard (eds.) :

Information Flow Analysis for Go.
[Online-Edition: https://doi.org/10.1007/978-3-319-47166-2_30]
In: Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques. Springer International Publishing , pp. 431-445. ISBN 978-3-319-47166-2 ISSN 0302-9743
[Buchkapitel], (2016)

Baluda, Mauro :
EvoSE: Evolutionary Symbolic Execution.
[Online-Edition: http://dx.doi.org/10.1145/2804322.2804325]
In: Proceedings for ESEC/FSE 2015 Workshops - 6th International Workshop on Automating Test Case Design, Selection and Evaluation (A-TEST 2015)
[Artikel], (2015)

Bringer, Julien ; Chabanne, Hervé ; Favre, Mélanie ; Patey, Alain ; Schneider, Thomas ; Zohner, Michael :
GSHADE: Faster privacy-preserving distance computation and biometric identification.
2nd ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14) ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Bodden, Eric ; Hermann, Ben ; Lerch, Johannes ; Mezini, Mira :
Reducing human factors in software security architectures.
[Online-Edition: http://www.bodden.de/pubs/blh+13reducing.pdf]
In: Future Security Conference 2013.
[Konferenz- oder Workshop-Beitrag], (2013)

Brzuska, Christina ; Fischlin, Marc ; Smart, Nigel ; Warinschi, Bogdan ; Williams, Stephen :
Less is more: relaxed yet composable security notions for key exchange.
In: Int. J. Inf. Sec, 12 (4) pp. 267-297.
[Artikel], (2013)

Bodden, Eric ; Mezini, Mira ; Brabrand, Claus ; Tolêdo, Társis ; Ribeiro, Márcio ; Borba, Paulo :
SPLlift - Statically Analyzing Software Product Lines in Minutes Instead of Years.
[Online-Edition: http://www.bodden.de/pubs/bmb+13spllift.pdf]
In: ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2013).
[Konferenz- oder Workshop-Beitrag], (2013)

Bodden, Eric ; Tolêdo, Társis ; Ribeiro, Márcio ; Brabrand, Claus ; Borba, Paulo ; Mezini, Mira :
Transparent and Efficient Reuse of IFDS-based Static Program Analyses for Software Product Lines.
[Online-Edition: http://www.bodden.de/pubs/btr+12transparent.pdf]

[Report], (2012)

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza :
myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android.

[Report], (2012)

Bodden, Eric ; Falzon, Kevin ; Pun, Ka I. ; Stolz, Volker :
Delta-oriented Monitor Specification.
[Online-Edition: http://www.bodden.de/pubs/bfp+12delta.pdf]
In: 5th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2012). Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Bodden, Eric ; Follner, Andreas ; Rasthofer, Siegfried :
Challenges in defining a programming language for provably correct dynamic analyses.
In: 5th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2012). Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Bodden, Eric :
Towards Typesafe Weaving for Modular Reasoning in Aspect-Oriented Programs.
In: FOAL 2012: International Workshop on the Foundations of Aspect-Oriented Languages.
[Konferenz- oder Workshop-Beitrag], (2012)

Bodden, Eric :
Identifying meaningless parameterized linear-temporal-logic formulas.

[Report], (2012)

Bodden, Eric :
On the Expressiveness of Parameterized Finite-state Runtime Monitors.

[Report], (2012)

Bodden, Eric ; Lam, Patrick ; Hendren, Laurie :
Partially evaluating finite-state runtime monitors ahead of time.
In: ACM Transactions on Programming Languages and Systems (TOPLAS)
[Artikel], (2012)

Bodden, Eric :
MOPBox: A Library Approach to Runtime Verification.
[Online-Edition: http://www.bodden.de/pubs/bodden11mopbox.pdf]
In: RV ; 2 (San Francisco, CA) : 2011.09.27-30 International Conference on Runtime Verification ; 2 (San Francisco, CA) : 2011.09.27-30. In: Lecture notes in computer science , 7186 . Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Bodden, Eric ; Tanter, Éric ; Inostroza, Milton :
Safe and Practical Decoupling of Aspects with Join Point Interfaces.

[Report], (2012)

Bugiel, Sven ; Pöppelmann, Thomas ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
AmazonIA: When Elasticity Snaps Back.
[Online-Edition: http://dx.doi.org/10.1145/2046707.2046753]
In: 18th ACM Conference on Computer and Communications Security (CCS'11). ACM
[Konferenz- oder Workshop-Beitrag], (2011)

Bugiel, Sven ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Twin Clouds: Secure Cloud Computing with Low Latency.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-24712-5₃]
In: 12th Communications and Multimedia Security Conference (CMS'11). In: LNCS , 7025 . Springer
[Konferenz- oder Workshop-Beitrag], (2011)

Bodden, Eric :
Stateful Breakpoints: A Practical Approach to Defining Parameterized Runtime Monitors.
[Online-Edition: http://www.bodden.de/pubs/bodden11stateful.pdf]
In: ESEC/FSE '11: Joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering.
[Konferenz- oder Workshop-Beitrag], (2011)

Bodden, Eric :
Continuation equivalence: a Correctness Criterion for Static Optimizations of Dynamic Analyses.
[Online-Edition: http://www.bodden.de/pubs/bodden11continuation.pdf]
In: WODA '11: International Workshop on Dynamic Analysis. ACM
[Konferenz- oder Workshop-Beitrag], (2011)

Barni, Mauro ; Failla, Pierluigi ; Lazzeretti, Riccardo ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Privacy-Preserving ECG Classification with Branching Programs and Neural Networks.
[Online-Edition: http://dx.doi.org/10.1109/TIFS.2011.2108650]
In: IEEE Transactions on Information Forensics and Security (TIFS), 6 (2) pp. 452-468.
[Artikel], (2011)

Bodden, Eric :
Closure Joinpoints: Block joinpoints without surprises.
[Online-Edition: http://www.bodden.de/pubs/bodden11closure.pdf]
In: AOSD '11: Proceedings of the 10th International Conference on Aspect-oriented Software Development. ACM
[Konferenz- oder Workshop-Beitrag], (2011)

Bugiel, Sven ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Twin Clouds: An Architecture for Secure Cloud Computing (Extended Abstract).
[Online-Edition: http://www.zurich.ibm.com/~cca/csc2011/submissions/bugiel.pd...]
Workshop on Cryptography and Security in Clouds (WCSC'11)
[Konferenz- oder Workshop-Beitrag], (2011)

Bodden, Eric ; Sewe, Andreas ; Sinschek, Jan ; Oueslati, Hela ; Mezini, Mira :
Taming reflection: Aiding static analysis in the presence of reflection and custom class loaders.
[Online-Edition: http://doi.acm.org/10.1145/1985793.1985827]
In: International Conference on Software Engineering, 21-28 May 2011, Waikiki, Honolulu, HI, USA. Proceedings of the 33rd International Conference on Software Engineering New York, NY, USA
[Konferenz- oder Workshop-Beitrag], (2011)

Bodden, Eric ; Lam, Patrick ; Hendren, Laurie :
Clara: a Framework for Statically Evaluating Finite-state Runtime Monitors.
In: 1st International Conference on Runtime Verification (RV). In: LNCS , 6418 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Bodden, Eric ; Lam, Patrick :
Clara: Partially Evaluating Runtime Monitors at Compile Time.
In: 1st International Conference on Runtime Verification (RV). In: LNCS , 6418 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Bruch, Marcel ; Bodden, Eric ; Monperrus, Martin ; Mezini, Mira :
IDE 2.0: Collective Intelligence in Software Development.
[Online-Edition: http://www.bodden.de/pubs/bbmm10ide.pdf]
In: FSE/SDP Workshop on the Future of Software Engineering. ACM
[Konferenz- oder Workshop-Beitrag], (2010)

Bangerter, Endre ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
YAZKC: Yet Another Zero-Knowledge Compiler.
[Online-Edition: http://thomaschneider.de/papers/BKSS10Poster.pdf]
In: 19. USENIX Security Symposium (USENIX Security'10) Poster Session
[Anderes], (2010)

Bodden, Eric ; Havelund, Klaus :
Aspect-oriented Race Detection in Java.
In: IEEE Transactions on Software Engineering (TSE), 36 (4) pp. 509-527.
[Artikel], (2010)

Barni, Mauro ; Failla, Pierluigi ; Kolesnikov, Vladimir ; Lazzeretti, Riccardo ; Paus, Annika ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Efficient Privacy-Preserving Classification of ECG Signals.
[Online-Edition: http://dx.doi.org/10.1109/WIFS.2009.5386475]
In: 1st IEEE International Workshop on Information Forensics and Security (IEEE WIFS'09). IEEE
[Konferenz- oder Workshop-Beitrag], (2009)

Bangerter, Endre ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Tsay, Joe-Kai :
On the Design and Implementation of Efficient Zero-Knowledge Proofs of Knowledge.
[Online-Edition: http://thomaschneider.de/papers/BKSST09.pdf]
In: ECRYPT workshop on Software Performance Enhancements for Encryption and Decryption and Cryptographic Compilers (SPEED-CC'09).
[Konferenz- oder Workshop-Beitrag], (2009)

Barni, Mauro ; Failla, Pierluigi ; Kolesnikov, Vladimir ; Lazzeretti, Riccardo ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Combining Signal Processing and Cryptographic Protocol Design for Efficient ECG Classification.
[Online-Edition: http://thomaschneider.de/papers/BFKLSS09SPEED.pdf]
In: 1st International Workshop on Signal Processing in the EncryptEd Domain (SPEED'09).
[Konferenz- oder Workshop-Beitrag], (2009)

Barni, Mauro ; Failla, Pierluigi ; Kolesnikov, Vladimir ; Lazzeretti, Riccardo ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Secure Evaluation of Private Linear Branching Programs with Medical Applications.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-04444-1]
In: 14th European Symposium on Research in Computer Security (ESORICS'09). In: LNCS , 5789 . Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Bangerter, Endre ; Briner, Thomas ; Henecka, Wilko ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Automatic Generation of Sigma-Protocols.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-16441-5₅]
In: 6th European Workshop on Public Key Services, Applications and Infrastructures (EUROPKI'09). In: LNCS , 6391 . Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Bangerter, Endre ; Barzan, Stefania ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Tsay, Joe-Kai :
Bringing Zero-Knowledge Proofs of Knowledge to Practice.
[Online-Edition: http://thomaschneider.de/papers/BBKSST09.pdf]
In: 17th International Workshop on Security Protocols (SPW'09).
[Konferenz- oder Workshop-Beitrag], (2009)

Bangerter, Endre ; Camenisch, Jan ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Automatic Generation of Sound Zero-Knowledge Protocols.
[Online-Edition: http://thomaschneider.de/papers/BCKSS09Poster.pdf]
In: 28. Advances in Cryptology - EUROCRYPT 2009 Poster Session
[Anderes], (2009)

C

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas :
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.
13. International Conference on emerging Networking EXperiments and Technologies (CoNEXT'17) ACM
[Konferenz- oder Workshop-Beitrag], (2017)

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas :
Towards Securing Internet eXchange Points Against Curious onlooKers (Short Paper).
ACM, IRTF & ISOC Applied Networking Research Workshops (ANRW'16) ACM
[Konferenz- oder Workshop-Beitrag], (2016)

D

Demmler, Daniel ; Hamacher, Kay ; Schneider, Thomas ; Stammler, Sebastian :
Privacy-Preserving Whole-Genome Variant Queries.
CANS'17 - 16. International Conference on Cryptology And Network Security Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Demmler, Daniel ; Holz, Marco ; Schneider, Thomas :
OnionPIR: Effective protection of sensitive metadata in online communication networks.
ACNS'17 - 15. International Conference on Applied Cryptography and Network Security Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael :
Pushing the communication barrier in secure computation using lookup tables.
24. Annual Network and Distributed System Security Symposium (NDSS'17) The Internet society
[Konferenz- oder Workshop-Beitrag], (2017)

Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
24th Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag], (2017)

Demmler, Daniel ; Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza :
Automated Synthesis of Optimized Circuits for Secure Computation.
22nd ACM Conference on Computer and Communications Security (CCS'15)
[Konferenz- oder Workshop-Beitrag], (2015)

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael :
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
Network and Distributed System Security Symposium (NDSS'15)
[Konferenz- oder Workshop-Beitrag], (2015)

Demmler, Daniel ; Herzberg, Amir ; Schneider, Thomas :
RAID-PIR: Practical multi-server PIR.
6th ACM Cloud Computing Security Workshop (ACM CCSW'14) ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael :
Ad-hoc secure two-party computation on mobile devices using hardware tokens.
23rd USENIX Security Symposium (USENIX Security'14)
[Konferenz- oder Workshop-Beitrag], (2014)

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael :
Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones.
19. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag) Fachgruppe Kryptographie in der Gesellschaft für Informatik
[Konferenz- oder Workshop-Beitrag], (2013)

Demmler, Daniel :
Hardware-Assisted Two-Party Secure Computation on Mobile Devices.
TU Darmstadt
[Masterarbeit], (2013)

Dagdelen, Ö. ; Fischlin, M. ; Gagliardoni, Tommaso :
The Fiat-Shamir Transformation in a Quantum World.
In: arXiv:1306.0315, 2013
[Artikel], (2013)

Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza :
XIFER: A Software Diversity Tool Against Code-Reuse Attacks.
4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3 2012)
[Konferenz- oder Workshop-Beitrag], (2012)

E

Eichberg, Michael ; Hermann, Ben ; Mezini, Mira ; Glanz, Leonid :
Hidden Truths in Dead Software Paths.
[Online-Edition: http://doi.acm.org/10.1145/2786805.2786865]
In: Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, New York, NY, USA. In: ESEC/FSE 2015 . ACM , New York, NY, USA
[Konferenz- oder Workshop-Beitrag], (2015)

F

Follner, Andreas :
On Generating Gadget Chains for Return-Oriented Programming.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5906]
Technische Universität Darmstadt , Darmstadt
[Dissertation], (2016)

Falzon, Kevin :
On the Use of Migration to Stop Illicit Channels.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5907]
Technische Universität , Darmstadt
[Dissertation], (2016)

Falzon, Kevin ; Bodden, Eric
Lopez, Javier ; Mitchell, Chris J. (eds.) :

Dynamically Provisioning Isolation in Hierarchical Architectures.
In: Information Security Conference, Trondheim. In: Lecture Notes in Computer Science , 9290 .
[Konferenz- oder Workshop-Beitrag], (2015)

Falzon, Kevin ; Bodden, Eric ; Purandare, Rahul :
Distributed Finite-State Runtime Monitoring with Aggregated Events.
In: Runtime Verification 2013 (RV'13), LNCS
[Artikel], (2013)

Fritz, Christian ; Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric ; Bartel, Alexandre ; Klein, Jacques ; le Traon, Yves ; Octeau, Damien ; McDaniel, Patrick :
Highly Precise Taint Analysis for Android Applications.
[Online-Edition: http://www.informatik.tu-darmstadt.de/fileadmin/user_upload/...]

[Report], (2013)

Falzon, Kevin ; Pace, Gordon J.
Machado, Ricardo J. ; Maciel, Rita Suzana ; Rubin, Julia ; Botterweck, Goetz (eds.) :

Combining Testing and Runtime Verification.
[Online-Edition: http://www.di.uminho.pt/mompes]
In: 8th International Workshop on Model-based Methodologies for Pervasive and Embedded Software, September 04, 2012, Essen, Germany.
[Konferenz- oder Workshop-Beitrag], (2012)

Fischlin, Marc ; Pinkas, Benny ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Visconti, Ivan :
Secure Set Intersection with Untrusted Hardware Tokens.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-19074-2₁]
In: 11th Cryptographers' Track at the RSA Conference (CT-RSA'11). In: LNCS , 6558 . Springer
[Konferenz- oder Workshop-Beitrag], (2011)

G

Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas :
More Efficient Universal Circuit Constructions.
ASIACRYPT 2017 - Advances in Cryptology Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Günther, Daniel :
Valiant's Universal Circuit - Towards a Modular Construction and Implementation.
TU Darmstadt
[Bachelorarbeit], (2017)

Garcia, Luis ; Brasser, Ferdinand ; Cintuglu, Mehmet H. ; Sadeghi, Ahmad-Reza ; Mohammed, Osama ; Zonouz, Saman A. :
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
24th Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag], (2017)

H

Heuser, Stephan ; Reaves, Bradley ; Pendyala, Praveen Kumar ; Carter, Henry ; Dmitrienko, Alexandra ; Kiyavash, Negar ; Enck, William ; Sadeghi, Ahmad-Reza ; Traynor, Patrick :
Phonion: Practical Protection of Metadata in Telephony Networks.
Proceedings on Privacy Enhancing Technologies (PoPETs)
[Konferenz- oder Workshop-Beitrag], (2017)

Hermann, Ben ; Reif, Michael ; Eichberg, Michael ; Mezini, Mira :
Getting to Know You: Towards a Capability Model for Java.
[Online-Edition: http://doi.acm.org/10.1145/2786805.2786829]
In: Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, New York, NY, USA. In: ESEC/FSE 2015 . ACM , New York, NY, USA
[Konferenz- oder Workshop-Beitrag], (2015)

Hiemenz, Benedikt :
Analysis and Extensions of the PCF Secure Two-Party Computation Compiler.
TU Darmstadt
[Bachelorarbeit], (2014)

Henecka, Wilko ; Schneider, Thomas :
Faster secure two-party computation with less memory.
[Online-Edition: http://dx.doi.org/10.1145/2484313.2484369]
8th ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIA CCS '13)
[Konferenz- oder Workshop-Beitrag], (2013)

Huss, Sorin A. ; Stöttinger, Marc ; Zohner, Michael :
AMASIVE: An Adaptable and Modular Autonomous Side-Channel Vulnerability Evaluation Framework.
Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday
[Konferenz- oder Workshop-Beitrag], (2013)

Henecka, Wilko ; Kögl, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Wehrenberg, Immo :
TASTY: Tool for Automating Secure Two-partY computations.
[Online-Edition: http://dx.doi.org/10.1145/1866307.1866358]
In: 17th ACM Conference on Computer and Communications Security (CCS'10). ACM
[Konferenz- oder Workshop-Beitrag], (2010)

I

Inostroza, Milton ; Tanter, Éric ; Bodden, Eric :
Modular Reasoning with Join Point Interfaces.

[Report], (2011)

Inostroza, Milton ; Tanter, Éric ; Bodden, Eric :
Join Point Interfaces for Modular Reasoning in Aspect-Oriented Programs.
[Online-Edition: http://www.bodden.de/pubs/itb11jpi.pdf]
In: ESEC/FSE '11: Joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering.
[Konferenz- oder Workshop-Beitrag], (2011)

J

Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-15031-9₂₆]
In: 12th International Workshop on Cryptographic Hardware and Embedded Systems (CHES'10). In: LNCS , 6225 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Embedded SFE: Offloading Server and Network using Hardware Tokens.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-14577-3]
In: 14th International Conference on Financial Cryptography and Data Security (FC'10). In: LNCS , 6052 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas
Sadeghi, Ahmad-Reza ; Naccache, David (eds.) :

Efficient Secure Two-Party Computation with Untrusted Hardware Tokens.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-14452-3₁₇]
In: Towards Hardware Intrinsic Security: Foundation and Practice. Information Security and Cryptography. Springer-Verlag Berlin Heidelberg , pp. 367-386.
[Buchkapitel], (2010)

K

Krüger, Stefan ; Nadi, Sarah ; Reif, Michael ; Ali, Karim ; Mezini, Mira ; Bodden, Eric ; Göpfert, Florian ; Günther, Felix ; Weinert, Christian ; Demmler, Daniel ; Kamath, Ram :
CogniCrypt: Supporting Developers in using Cryptography.
[Online-Edition: http://dl.acm.org/citation.cfm?id=3155562.3155681]
Automated Software Engineering (ASE'17) ACM , Piscataway, NJ, USA
[Konferenz- oder Workshop-Beitrag], (2017)

Kiss, Ágnes ; Liu, Jian ; Schneider, Thomas ; Asokan, N. ; Pinkas, Benny :
Private Set Intersection for Unequal Set Sizes with Mobile Applications.
In: PoPETs - Proceedings on Privacy Enhancing Technologies
[Artikel], (2017)

Kiss, Ágnes ; Schneider, Thomas :
Valiant's universal circuit is practical.
35. Advances in Cryptology - EUROCRYPT 2016 Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Krämer, Juliane ; Kiss, Ágnes ; Stüber, Anke :
On the Optimality of Differential Fault Analyses on CLEFIA.
MACIS 2015 - Sixth International Conference on Mathematical Aspects of Computer and Information Sciences Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Koeberl, Patrick ; Phegade, Vinay ; Rajan, Anand ; Schneider, Thomas ; Schulz, Steffen ; Zhdanova, Maria :
Time to rethink: Trust brokerage using trusted execution environments.
8th International Conference on Trust & Trustworthy Computing (TRUST'15) Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Kerschbaum, Florian ; Schneider, Thomas ; Schröpfer, Axel :
Automatic protocol selection in secure two-party computations.
[Online-Edition: http://dx.doi.org/10.1007/978-3-319-07536-5_33]
In: 12. International Conference on Applied Cryptography and Network Security (ACNS'14).
[Konferenz- oder Workshop-Beitrag], (2014)

Kerschbaum, Florian ; Schneider, Thomas ; Schröpfer, Axel :
Short Talk: Automatic Protocol Selection in Secure Two-Party Computations.
In: 20. Network and Distributed System Security Symposium (NDSS'13)
[Anderes], (2013)

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design.
[Online-Edition: http://dx.doi.org/10.3233/JCS-130464]
In: Journal of Computer Security (JCS), 21 (2) pp. 283-315.
[Artikel], (2013)

Kononenko, Kirill :
A Unified Approach to Identifying and Healing Vulnerabilities in x86 Machine Code.
International Conference on Mobile Computing and Networking
[Konferenz- oder Workshop-Beitrag], (2012)

Kim, Chang Hwan Peter ; Bodden, Eric ; Batory, Don ; Khurshid, Sarfraz :
Reducing Configurations to Monitor in a Software Product Line.
[Online-Edition: http://www.bodden.de/pubs/kbbk10reducing.pdf]
In: 1st International Conference on Runtime Verification (RV). In: LNCS , 6418 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-10433-6₁]
In: 8th International Conference on Cryptology And Network Security (CANS'09). In: LNCS , 5888 . Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima.
[Online-Edition: http://thomaschneider.de/papers/KSS09SPEEDCC.pdf]
In: ECRYPT workshop on Software Performance Enhancements for Encryption and Decryption and Cryptographic Compilers (SPEED-CC'09).
[Konferenz- oder Workshop-Beitrag], (2009)

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
How to Combine Homomorphic Encryption and Garbled Circuits - Improved Circuits and Computing the Minimum Distance Efficiently.
[Online-Edition: http://thomaschneider.de/papers/KSS09SPEED.pdf]
In: 1st International Workshop on Signal Processing in the EncryptEd Domain (SPEED'09).
[Konferenz- oder Workshop-Beitrag], (2009)

Kolesnikov, Vladimir ; Schneider, Thomas :
Secure Function Evaluation Techniques for Circuits Containing XOR Gates with Applications to Universal Circuits.
[Online-Edition: http://www.freepatentsonline.com/y2009/0175443.html]

[Norm, Patent, Standard], (2008)

Kolesnikov, Vladimir ; Schneider, Thomas :
Universal Circuit for Secure Function Evaluation.
[Online-Edition: http://www.google.com/patents/US20090140767]

[Norm, Patent, Standard], (2008)

Kolesnikov, Vladimir ; Schneider, Thomas :
Improved Garbled Circuit: Free XOR Gates and Applications.
[Online-Edition: http://dx.doi.org/10.1007/978-3-540-70583-3₄₀]
In: 35th International Colloquium on Automata, Languages and Programming (ICALP'08). In: LNCS , 5126 . Springer
[Konferenz- oder Workshop-Beitrag], (2008)

Kolesnikov, Vladimir ; Schneider, Thomas ; Strehl, Volker :
Practical Secure Function Evaluation.
[Online-Edition: http://thomaschneider.de/papers/KSS08.pdf]
In: 8. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag).
[Konferenz- oder Workshop-Beitrag], (2008)

Kolesnikov, Vladimir ; Schneider, Thomas :
A Practical Universal Circuit Construction and Secure Evaluation of Private Functions.
[Online-Edition: http://dx.doi.org/10.1007/978-3-540-85230-8₇]
In: 12th International Conference on Financial Cryptography and Data Security (FC'08). In: LNCS , 5143 . Springer
[Konferenz- oder Workshop-Beitrag], (2008)

L

Lerch, Johannes :
On the Scalability of Static Program Analysis to Detect Vulnerabilities in the Java Platform.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5580]
Technische Universität Darmstadt , Darmstadt
[Dissertation], (2016)

Lerch, Johannes ; Späth, Johannes ; Bodden, Eric ; Mezini, Mira :
Access-Path Abstraction: Scaling Field-Sensitive Data-Flow Analysis with Unbounded Access Paths.
In: Automated Software Engineering (ASE), 2015 30th IEEE/ACM International Conference on, Lincoln, Nebraska, USA.
[Konferenz- oder Workshop-Beitrag], (2015)

Lerch, Johannes ; Hermann, Ben :
Design Your Analysis: A Case Study on Implementation Reusability of Data-flow Functions.
[Online-Edition: http://doi.acm.org/10.1145/2771284.2771289]
In: Proceedings of the 4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, New York, NY, USA. In: SOAP 2015 . ACM , New York, NY, USA
[Konferenz- oder Workshop-Beitrag], (2015)

Lerch, Johannes ; Hermann, Ben ; Bodden, Eric ; Mezini, Mira :
FlowTwist: Efficient Context-sensitive Inside-out Taint Analysis for Large Codebases.
[Online-Edition: http://doi.acm.org/10.1145/2635868.2635878]
In: Proceedings of the 22Nd ACM SIGSOFT International Symposium on Foundations of Software Engineering. In: FSE 2014 . ACM , New York, NY, USA
[Konferenz- oder Workshop-Beitrag], (2014)

Li, Li ; Bartel, Alexandre ; Klein, Jacques ; Traon, Yves Le ; Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric ; Octeau, Damien ; McDaniel, Patrick :
I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis.
[Online-Edition: http://www.abartel.net/static/p/tr-iccta.pdf]
In: arXiv preprint arXiv:1404.7431
[Report], (2014)

Lam, Patrick ; Bodden, Eric ; Lhotak, Ondrej ; Hendren, Laurie :
The Soot framework for Java program analysis: a retrospective.
[Online-Edition: http://www.bodden.de/pubs/lblh11soot.pdf]
In: Cetus Users and Compiler Infastructure Workshop (CETUS 2011).
[Konferenz- oder Workshop-Beitrag], (2011)

M

Mittelbach, Arno :
Cryptophia’s Short Combiner for Collision-Resistant Hash Functions (best student paper).
In: Lecture Notes in Computer Science . Springer
[Konferenz- oder Workshop-Beitrag], (2013)

N

Nielsen, Jesper Buus ; Schneider, Thomas ; Trifiletti, Roberto :
Constant round maliciously secure 2PC with function-independent preprocessing using LEGO.
24. Annual Network and Distributed System Security Symposium (NDSS'17) The Internet Society
[Konferenz- oder Workshop-Beitrag], (2017)

Nadi, Sarah ; Krüger, Stefan :
Variability Modeling of Cryptographic Components (Clafer Experience Report).
In: Tenth International Workshop on Variability Modelling of Software-intensive Systems, 27. - 29.1.2016, Salvador, Brazil. In: Proceedings of the Tenth International Workshop on Variability Modelling of Software-intensive Systems .
[Konferenz- oder Workshop-Beitrag], (2016)

P

Pinkas, Benny ; Schneider, Thomas ; Weinert, Christian ; Wieder, Udi :
Efficient Circuit-based PSI via Cuckoo Hashing.
EUROCRYPT 2018 Springer
[Konferenz- oder Workshop-Beitrag], (2018)

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael :
Scalable private set intersection based on OT extension.
In: Transactions on Privacy and Security (TOPS)
[Artikel], (2018)

Pinkas, Benny ; Schneider, Thomas ; Segev, Gil ; Zohner, Michael :
Phasing: Private set intersection using permutation-based hashing.
24th USENIX Security Symposium (USENIX Security'15)
[Konferenz- oder Workshop-Beitrag], (2015)

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael :
Faster private set intersection based on OT extension.
23rd USENIX Security Symposium (USENIX Security'14)
[Konferenz- oder Workshop-Beitrag], (2014)

Pullonen, Pille ; Bogdanov, Dan ; Schneider, Thomas :
The design and implementation of a two-party protocol suite for SHAREMIND 3.
[Online-Edition: http://research.cyber.ee/reports/T-4-17-The-design-and-imple...]

[Report], (2012)

Pinkas, Benny ; Schneider, Thomas ; Smart, Nigel P. ; Williams, Stephen C. :
Secure Two-Party Computation is Practical.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-10366-7₁₅]
In: 15th Advances in Cryptology — ASIACRYPT 2009. In: LNCS , 5912 . Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Paus, Annika ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Practical Secure Evaluation of Semi-Private Functions.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-01957-9]
In: 7th International Conference on Applied Cryptography and Network Security (ACNS'09). In: LNCS , 5536 . Springer
[Konferenz- oder Workshop-Beitrag], (2009)

R

Riazi, M. Sadegh ; Weinert, Christian ; Tkachenko, Oleksandr ; Songhori, Ebrahim M. ; Schneider, Thomas ; Koushanfar, Farinaz :
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications.
ACM Asia Conference on Computer and Communications Security (ASIACCS'18) ACM
[Konferenz- oder Workshop-Beitrag], (2018)

Riazi, M. Sadegh ; Songhori, Ebrahim M. ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz :
Toward Practical Secure Stable Matching.
In: Proceedings on Privacy Enhancing Technologies (PoPETs)
[Artikel], (2017)

Rudd, Robert ; Skowyra, Richard ; Bigelow, David ; Dedhia, Veer ; Hobson, Thomas ; Crane, Stephen ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Franz, Michael ; Sadeghi, Ahmad-Reza ; Okhravi, Hamed :
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
24th Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag], (2017)

Rasthofer, Siegfried :
Improving Mobile-Malware Investigations with Static and Dynamic Code Analysis Techniques.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5911]
Technische Universität Darmstadt , Darmstadt
[Dissertation], (2016)

Rauzy, Pablo ; Kiss, Ágnes ; Krämer, Juliane ; Seifert, Jean-Pierre :
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT.
COSADE 2016 Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Rasthofer, Siegfried ; Arzt, Steven ; Lovat, Enrico ; Bodden, Eric :
DROIDFORCE: Enforcing Complex, Data-Centric, System-Wide Policies in Android.
In: Proceedings of the International Conference on Availability, Reliability and Security (ARES)
[Artikel], (2014)

Rasthofer, Siegfried ; Arzt, Steven ; Bodden, Eric :
A machine-learning approach for classifying and categorizing android sources and sinks.
In: 2014 Network and Distributed System Security Symposium (NDSS)
[Artikel], (2014)

Robillard, Martin P. ; Bodden, Eric ; Kawrykow, David ; Mezini, Mira ; Ratchford, Tristan :
Automated API Property Inference Techniques.
[Online-Edition: http://www.bodden.de/pubs/rbk+12automated.pdf]
In: IEEE Transactions on Software Engineering (TSE)
[Artikel], (2012)

S

Songhori, Ebrahim ; Zeitouni, Shaza ; Dessouky, Ghada ; Schneider, Thomas ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz :
GarbledCPU: A MIPS Processor for Secure Computation in Hardware.
53rd Design Automation Conference (DAC'16)
[Konferenz- oder Workshop-Beitrag], (2016)

Songhori, Ebrahim ; Hussain, Siam ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz :
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits.
36th IEEE Symposium on Security and Privacy (Oakland)
[Konferenz- oder Workshop-Beitrag], (2015)

Schneider, Matthias ; Schneider, Thomas :
Notes on non-interactive secure comparison in “image feature extraction in the encrypted domain with privacy-preserving SIFT”.
2nd ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14) ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Schneider, Thomas ; Zohner, Michael :
GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-39884-1_23]
In: 17th International Conference on Financial Cryptography and Data Security (FC'13). In: LNCS , 7859 .
[Konferenz- oder Workshop-Beitrag], (2013)

Schneider, Thomas ; Zohner, Michael :
Efficient secure two-party computation.
In: 17. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag), Mannheim.
[Konferenz- oder Workshop-Beitrag], (2012)

Schneider, Thomas:
Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation.
Springer-Verlag Berlin Heidelberg , p. 162. ISBN 978-3-642-30041-7
[Buch], (2012)

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Varadharajan, Vijay :
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs (full version).

[Report], (2012)

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Varadharajan, Vijay
Foresti, Sara ; Yung, Moti (eds.) :

The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.
In: LNCS . Springer Verlag
[Konferenz- oder Workshop-Beitrag], (2012)

Schneider, Thomas :
Engineering Secure Two-Party Computation Protocols — Advances in Design, Optimization, and Applications of Efficient Secure Function Evaluation.
[Online-Edition: http://thomaschneider.de/papers/S11Thesis.pdf]
Ruhr-University Bochum, Germany
[Dissertation]

Schneider, Thomas :
Reden ist Silber - Schweigen ist Gold: Datensparsamkeit durch effizientes Rechnen unter Verschlüsselung.
[Online-Edition: http://buchshop.secumedia.de/buchshop/index.php?page=detail&...]
In: 12. Deutscher IT-Sicherheitskongress des BSI: Sicher in die digitale Welt von morgen. SecuMedia-Verlag
[Konferenz- oder Workshop-Beitrag], (2011)

Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Verschlüsselt Rechnen: Sichere Verarbeitung verschlüsselter medizinischer Daten am Beispiel der Klassifikation von EKG-Daten.
[Online-Edition: http://www.gi-ev.de/service/publikationen/lni/gi-edition-pro...]
In: Workshop Innovative und sichere Informationstechnologie für das Gesundheitswesen von morgen (perspeGKtive'10). In: LNI , P-174 . Bonner Köllen Verlag
[Konferenz- oder Workshop-Beitrag], (2010)

Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Winandy, Marcel :
Token-Based Cloud Computing — Secure Outsourcing of Data and Arbitrary Computations with Lower Latency.
3rd International Conference on Trust and Trustworthy Computing (TRUST'10) - Workshop on Trust in the Cloud Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Wehrenberg, Immo :
Efficient Privacy-Preserving Face Recognition.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-14423-3₁₆]
In: 12th International Conference on Information Security and Cryptology (ICISC'09). In: LNCS , 5984 . Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Ask Your E-Doctor Without Telling: Privacy-Preserving Medical Diagnostics.
In: Section Days of Ruhr-University Bochum Research School
[Anderes], (2009)

Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-00730-9₂₁]
In: 11th International Conference on Information Security and Cryptology (ICISC'08). In: LNCS , 5461 . Springer
[Konferenz- oder Workshop-Beitrag], (2008)

Schneider, Thomas :
Practical Secure Function Evaluation.
[Online-Edition: http://thomaschneider.de/papers/S08Thesis.pdf]
University Erlangen-Nürnberg, Germany
[Masterarbeit], (2008)

Schneider, Thomas :
Secure Task Migration and Interprocess Communication in Reconfigurable, Distributed, Embedded Systems.
University Erlangen-Nürnberg, Germany
[Bachelorarbeit], (2007)

T

Tkachenko, Oleksandr ; Weinert, Christian ; Schneider, Thomas ; Hamacher, Kay :
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
ACM Asia Conference on Computer and Communications Security (ASIACCS'18) ACM
[Konferenz- oder Workshop-Beitrag], (2018)

Thies, Andreas ; Bodden, Eric :
RefaFlex: Safer Refactorings for Reflective Java Programs [forthcoming].
[Online-Edition: http://www.bodden.de/pubs/tb12refaflex.pdf]
In: International Symposium on Software Testing and Analysis (ISSTA 2012).
[Konferenz- oder Workshop-Beitrag], (2012)

W

Weinert, Christian ; Demirel, Denise ; Vigil, Martín ; Geihs, Matthias ; Buchmann, Johannes :
MoPS: A Modular Protection Scheme for Long-Term Storage.
ASIA CCS 2017 - ACM Asia Conference on Computer and Communications Security ACM
[Konferenz- oder Workshop-Beitrag], (2017)

Z

Zohner, Michael :
Faster Oblivious Transfer Extension and Its Impact on Secure Computation.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6154]
Technische Universität , Darmstadt
[Dissertation], (2016)

Diese Liste wurde am Sun Sep 23 02:35:55 2018 CEST generiert.