TU Darmstadt / ULB / TUbiblio

Einträge mit Organisationseinheit "20 Fachbereich Informatik > EC SPRIDE"

Exportieren als [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Gruppiere nach: Autor(en) | Publikationsjahr | Typ des Eintrags | Sprache | Keine Gruppierung
Es werden nur Einträge angezeigt, bei denen keine untergeordnete Organisationseinheit ausgewählt wurde. Anzahl: 168.

Artikel

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael (2018)
Scalable Private Set Intersection Based on OT Extension.
In: ACM Transactions on Privacy and Security (TOPS), 21 (2)
doi: 10.1145/3154794
Artikel, Bibliographie

Kiss, Ágnes ; Liu, Jian ; Schneider, Thomas ; Asokan, N. ; Pinkas, Benny (2017)
Private Set Intersection for Unequal Set Sizes with Mobile Applications.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (4)
doi: 10.1515/popets-2017-0044
Artikel, Bibliographie

Asharov, Gilad ; Demmler, Daniel ; Schapira, Michael ; Schneider, Thomas ; Segev, Gil ; Shenker, Scott ; Zohner, Michael (2017)
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (3)
doi: 10.1515/popets-2017-0033
Artikel, Bibliographie

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2017)
More Efficient Oblivious Transfer Extensions.
In: Journal of Cryptology (JoC), 30 (3)
doi: 10.1007/s00145-016-9236-6
Artikel, Bibliographie

Riazi, M. Sadegh ; Songhori, Ebrahim M. ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz (2017)
Toward Practical Secure Stable Matching.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (1)
doi: 10.1515/popets-2017-0005
Artikel, Bibliographie

Rasthofer, Siegfried ; Arzt, Steven ; Bodden, Eric (2014)
A machine-learning approach for classifying and categorizing android sources and sinks.
In: 2014 Network and Distributed System Security Symposium (NDSS)
Artikel, Bibliographie

Rasthofer, Siegfried ; Arzt, Steven ; Lovat, Enrico ; Bodden, Eric (2014)
DROIDFORCE: Enforcing Complex, Data-Centric, System-Wide Policies in Android.
In: Proceedings of the International Conference on Availability, Reliability and Security (ARES)
Artikel, Bibliographie

Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric (2013)
Instrumenting Android and Java Applications as Easy as abc.
In: Runtime Verification 2013 (RV'13)
Artikel, Bibliographie

Brzuska, Christina ; Fischlin, Marc ; Smart, Nigel ; Warinschi, Bogdan ; Williams, Stephen (2013)
Less is more: relaxed yet composable security notions for key exchange.
In: Int. J. Inf. Sec, 12 (4)
Artikel, Bibliographie

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2013)
A Systematic Approach to Practically Efficient General Two-Party Secure Function Evaluation Protocols and their Modular Design.
In: Journal of Computer Security (JCS), 21 (2)
doi: 10.3233/JCS-130464
Artikel, Bibliographie

Dagdelen, Ö. ; Fischlin, M. ; Gagliardoni, Tommaso (2013)
The Fiat-Shamir Transformation in a Quantum World.
In: arXiv:1306.0315, 2013
Artikel, Bibliographie

Bodden, Eric ; Lam, Patrick ; Hendren, Laurie (2012)
Partially evaluating finite-state runtime monitors ahead of time.
In: ACM Transactions on Programming Languages and Systems (TOPLAS)
Artikel, Bibliographie

Robillard, Martin P. ; Bodden, Eric ; Kawrykow, David ; Mezini, Mira ; Ratchford, Tristan (2012)
Automated API Property Inference Techniques.
In: IEEE Transactions on Software Engineering (TSE)
Artikel, Bibliographie

Barni, Mauro ; Failla, Pierluigi ; Lazzeretti, Riccardo ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2011)
Privacy-Preserving ECG Classification with Branching Programs and Neural Networks.
In: IEEE Transactions on Information Forensics and Security (TIFS), 6 (2)
doi: 10.1109/TIFS.2011.2108650
Artikel, Bibliographie

Bodden, Eric ; Havelund, Klaus (2010)
Aspect-oriented Race Detection in Java.
In: IEEE Transactions on Software Engineering (TSE), 36 (4)
Artikel, Bibliographie

Aly, Sherif G. ; Nadi, Sarah ; Hamdan, Karim (2008)
A Java-Based Programming Language Support of Location Management in Pervasive Systems.
In: International Journal of Computer Science and Network Security, 8 (6)
Artikel, Bibliographie

Buchkapitel

Bodden, Eric ; Pun, Ka I. ; Steffen, Martin ; Stolz, Volker ; Wickert, Anna-Katharina
Hrsg.: Margaria, Tiziana ; Steffen, Bernhard (2016)
Information Flow Analysis for Go.
In: Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques
doi: 10.1007/978-3-319-47166-2_30
Buchkapitel, Bibliographie

Baluda, Mauro (2015)
EvoSE: Evolutionary Symbolic Execution.
In: 6th International Workshop on Automating Test Case Design, Selection and Evaluation (A-TEST 2015): Proceedings
Buchkapitel, Bibliographie

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2013)
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation.
In: CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
doi: 10.1145/2508859.2516738
Buchkapitel, Bibliographie

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Varadharajan, Vijay
Hrsg.: Foresti, Sara ; Yung, Moti ; Martinelli, Fabio (2012)
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.
In: European Symposium on Research in Computer Science (ESORICS)
Buchkapitel, Bibliographie

Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010)
Efficient Secure Two-Party Computation with Untrusted Hardware Tokens.
In: Towards Hardware Intrinsic Security: Foundation and Practice
doi: 10.1007/978-3-642-14452-3_17
Buchkapitel, Bibliographie

Bangerter, Endre ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Tsay, Joe-Kai (2009)
On the Design and Implementation of Efficient Zero-Knowledge Proofs of Knowledge.
In: ECRYPT workshop on Software Performance Enhancements for Encryption and Decryption and Cryptographic Compilers (SPEED-CC'09)
Buchkapitel, Bibliographie

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima.
In: ECRYPT workshop on Software Performance Enhancements for Encryption and Decryption and Cryptographic Compilers (SPEED-CC'09)
Buchkapitel, Bibliographie

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
How to Combine Homomorphic Encryption and Garbled Circuits - Improved Circuits and Computing the Minimum Distance Efficiently.
In: 1. International Workshop on Signal Processing in the EncryptEd Domain (SPEED'09)
Buchkapitel, Bibliographie

Barni, Mauro ; Failla, Pierluigi ; Kolesnikov, Vladimir ; Lazzeretti, Riccardo ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Combining Signal Processing and Cryptographic Protocol Design for Efficient ECG Classification.
In: 1. International Workshop on Signal Processing in the EncryptEd Domain (SPEED'09)
Buchkapitel, Bibliographie

Bangerter, Endre ; Briner, Thomas ; Henecka, Wilko ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Automatic Generation of Sigma-Protocols.
In: 6. European Workshop on Public Key Services, Applications and Infrastructures (EUROPKI'09)
doi: 10.1007/978-3-642-16441-5_5
Buchkapitel, Bibliographie

Barni, Mauro ; Failla, Pierluigi ; Kolesnikov, Vladimir ; Lazzeretti, Riccardo ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Secure Evaluation of Private Linear Branching Programs with Medical Applications.
In: 14. European Symposium on Research in Computer Security (ESORICS'09)
doi: 10.1007/978-3-642-04444-1_26
Buchkapitel, Bibliographie

Sadeghi, Ahmad-Reza ; Schneider, Thomas (2008)
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification.
In: 11. International Conference on Information Security and Cryptology (ICISC'08)
doi: 10.1007/978-3-642-00730-9_21
Buchkapitel, Bibliographie

Buch

Schneider, Thomas (2012)
Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation.
doi: 10.1007/978-3-642-30042-4
Buch, Bibliographie

Konferenzveröffentlichung

Krüger, Stefan ; Reif, Michael ; Wickert, Anna-Katharina ; Nadi, Sarah ; Ali, Karim ; Bodden, Eric ; Mezini, Mira ; Acar, Yasemin ; Fahl, Sascha (2023)
Securing Your Crypto-API Usage Through Tool Support - A Usability Study.
2023 IEEE Secure Development Conference. Atlanta, USA (18.10.2023 - 20.10.2023)
doi: 10.1109/SecDev56634.2023.00015
Konferenzveröffentlichung, Bibliographie

Nachtigall, Marcus ; Schlichtig, Michael ; Bodden, Eric (2023)
Evaluation of Usability Criteria Addressed by Static Analysis Tools on a Large Scale.
Software Engineering 2023 - Fachtagung des GI-Fachbereichs Softwaretechnik. Paderborn, Germany (20.02.2023 – 24.02.2023)
Konferenzveröffentlichung, Bibliographie

Schlichtig, Michael ; Sassalla, Steffen ; Narasimhan, Krishna ; Bodden, Eric (2023)
Introducing FUM: A Framework for API Usage Constraint and Misuse Classification.
Software Engineering 2023 - Fachtagung des GI-Fachbereichs Softwaretechnik. Paderborn, Germany (20.02.2023 – 24.02.2023)
Konferenzveröffentlichung, Bibliographie

Wickert, Anna-Katharina ; Baumgärtner, Lars ; Schlichtig, Michael ; Narasimhan, Krishna ; Mezini, Mira (2022)
To Fix or Not to Fix: A Critical Study of Crypto-misuses in the Wild.
21st International Conference on Trust, Security and Privacy in Computing and Communications. Wuhan, Peoples Republik of China (09.12.2022-11.12.2022)
doi: 10.1109/TrustCom56396.2022.00051
Konferenzveröffentlichung, Bibliographie

Schlichtig, Michael ; Sassalla, Steffen ; Narasimhan, Krishna ; Bodden, Eric (2022)
FUM - A Framework for API Usage constraint and Misuse Classification.
29th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER). virtual Conference (15.03.2022 - 18.03.2022)
doi: 10.1109/SANER53432.2022.00085
Konferenzveröffentlichung, Bibliographie

Nachtigall, Marcus ; Schlichtig, Michael ; Bodden, Eric (2022)
A large-scale study of usability criteria addressed by static analysis tools.
31st ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA'22). virtual Conference (18.07.2022 - 22.07.2022)
doi: 10.1145/3533767.3534374
Konferenzveröffentlichung, Bibliographie

Tkachenko, Oleksandr ; Weinert, Christian ; Schneider, Thomas ; Hamacher, Kay (2018)
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18). Incheon Republic of Korea (04.06.2018-04.06.2018)
doi: 10.1145/3196494.3196541
Konferenzveröffentlichung, Bibliographie

Riazi, M. Sadegh ; Weinert, Christian ; Tkachenko, Oleksandr ; Songhori, Ebrahim M. ; Schneider, Thomas ; Koushanfar, Farinaz (2018)
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications.
13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18). Incheon Republic of Korea (04.06.2018-04.06.2018)
doi: 10.1145/3196494.3196522
Konferenzveröffentlichung, Bibliographie

Pinkas, Benny ; Schneider, Thomas ; Weinert, Christian ; Wieder, Udi (2018)
Efficient Circuit-based PSI via Cuckoo Hashing.
37. Advances in Cryptology -- EUROCRYPT 2018. Tel Aviv, Israel (29.04.2019-03.05.2018)
doi: 10.1007/978-3-319-78372-7_5
Konferenzveröffentlichung, Bibliographie

Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas (2017)
More Efficient Universal Circuit Constructions.
23. Advances in Cryptology -- ASIACRYPT 2017. Hong Kong, China (03.12.2017-07.12.2017)
doi: 10.1007/978-3-319-70697-9_16
Konferenzveröffentlichung, Bibliographie

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas (2017)
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.
13. International Conference on emerging Networking EXperiments and Technologies (CoNEXT'17). Incheon Republic of Korea (12.12.2017-15.12.2017)
doi: 10.1145/3143361.3143362
Konferenzveröffentlichung, Bibliographie

Krüger, Stefan ; Nadi, Sarah ; Reif, Michael ; Ali, Karim ; Mezini, Mira ; Bodden, Eric ; Göpfert, Florian ; Günther, Felix ; Weinert, Christian ; Demmler, Daniel ; Kamath, Ram (2017)
CogniCrypt: Supporting Developers in using Cryptography.
Automated Software Engineering (ASE'17). Urbana, Illinois, USA (30.10.2017-03.11.2017)
doi: 10.1109/ASE.2017.8115707
Konferenzveröffentlichung, Bibliographie

Demmler, Daniel ; Hamacher, Kay ; Schneider, Thomas ; Stammler, Sebastian (2017)
Privacy-Preserving Whole-Genome Variant Queries.
16. International Conference on Cryptology And Network Security (CANS'17). Hong Kong (30.11.2017-02.12.2017)
Konferenzveröffentlichung, Bibliographie

Demmler, Daniel ; Holz, Marco ; Schneider, Thomas (2017)
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks.
15. International Conference on Applied Cryptography and Network Security (ACNS'17). Kanazawa, Japan (10.07.2017-12.07.2017)
doi: 10.1007/978-3-319-61204-1_30
Konferenzveröffentlichung, Bibliographie

Heuser, Stephan ; Reaves, Bradley ; Pendyala, Praveen Kumar ; Carter, Henry ; Dmitrienko, Alexandra ; Kiyavash, Negar ; Enck, William ; Sadeghi, Ahmad-Reza ; Traynor, Patrick (2017)
Phonion: Practical Protection of Metadata in Telephony Networks.
Konferenzveröffentlichung, Bibliographie

Weinert, Christian ; Demirel, Denise ; Vigil, Martín ; Geihs, Matthias ; Buchmann, Johannes (2017)
MoPS: A Modular Protection Scheme for Long-Term Storage.
12. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'17). Abu Dhabi United Arab Emirates (02.04.2017-06.04.2017)
doi: 10.1145/3052973.3053025
Konferenzveröffentlichung, Bibliographie

Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017)
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
Konferenzveröffentlichung, Bibliographie

Rudd, Robert ; Skowyra, Richard ; Bigelow, David ; Dedhia, Veer ; Hobson, Thomas ; Crane, Stephen ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Franz, Michael ; Sadeghi, Ahmad-Reza ; Okhravi, Hamed (2017)
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
Konferenzveröffentlichung, Bibliographie

Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael (2017)
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
24. Annual Network and Distributed System Security Symposium (NDSS'17). San Diego, California (26.02.2017-01.03.2017)
doi: 10.14722/ndss.2017.23097
Konferenzveröffentlichung, Bibliographie

Nielsen, Jesper Buus ; Schneider, Thomas ; Trifiletti, Roberto (2017)
Constant Round Maliciously Secure 2PC with Function-Independent Preprocessing using LEGO.
24. Annual Network and Distributed System Security Symposium (NDSS'17). San Diego, California (26.02.2017-01.03.2017)
doi: 10.14722/ndss.2017.23075
Konferenzveröffentlichung, Bibliographie

Garcia, Luis ; Brasser, Ferdinand ; Cintuglu, Mehmet H. ; Sadeghi, Ahmad-Reza ; Mohammed, Osama ; Zonouz, Saman A. (2017)
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
Konferenzveröffentlichung, Bibliographie

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas (2016)
Towards Securing Internet eXchange Points Against Curious onlooKers.
ACM, IRTF & ISOC Applied Networking Research Workshop (ANRW'16). Berlin (16.07.2016-16.07.2016)
doi: 10.1145/2959424.2959427
Konferenzveröffentlichung, Bibliographie

Songhori, Ebrahim ; Zeitouni, Shaza ; Dessouky, Ghada ; Schneider, Thomas ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2016)
GarbledCPU: A MIPS Processor for Secure Computation in Hardware.
53. Annual Design Automation Conference (DAC'16). Austin Texas (05.06.2016-09.06.2016)
doi: 10.1145/2897937.2898027
Konferenzveröffentlichung, Bibliographie

Kiss, Ágnes ; Schneider, Thomas (2016)
Valiant's Universal Circuit is Practical.
35. Advances in Cryptology -- EUROCRYPT 2016. Wien (08.05.2016-12.05.2016)
doi: 10.1007/978-3-662-49890-3_27
Konferenzveröffentlichung, Bibliographie

Rauzy, Pablo ; Kiss, Ágnes ; Krämer, Juliane ; Seifert, Jean-Pierre (2016)
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT.
doi: 10.1007/978-3-319-43283-0_7
Konferenzveröffentlichung, Bibliographie

Nadi, Sarah ; Krüger, Stefan (2016)
Variability Modeling of Cryptographic Components (Clafer Experience Report).
Tenth International Workshop on Variability Modelling of Software-intensive Systems. Salvador, Brazil (27.01.2016-29.01.2016)
Konferenzveröffentlichung, Bibliographie

Lerch, Johannes ; Späth, Johannes ; Bodden, Eric ; Mezini, Mira (2015)
Access-Path Abstraction: Scaling Field-Sensitive Data-Flow Analysis with Unbounded Access Paths.
Automated Software Engineering (ASE), 2015 30th IEEE/ACM International Conference on. Lincoln, Nebraska, USA (09.11.2015-13.11.2015)
Konferenzveröffentlichung, Bibliographie

Krämer, Juliane ; Kiss, Ágnes ; Stüber, Anke (2015)
On the Optimality of Differential Fault Analyses on CLEFIA.
doi: 10.1007/978-3-319-32859-1_15
Konferenzveröffentlichung, Bibliographie

Demmler, Daniel ; Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza (2015)
Automated Synthesis of Optimized Circuits for Secure Computation.
22. ACM Conference on Computer and Communications Security (CCS'15). Denver Colorado USA (12.10.2015-16.10.2015)
doi: 10.1145/2810103.2813678
Konferenzveröffentlichung, Bibliographie

Falzon, Kevin ; Bodden, Eric
Hrsg.: Lopez, Javier ; Mitchell, Chris J. (2015)
Dynamically Provisioning Isolation in Hierarchical Architectures.
Information Security Conference. Trondheim
Konferenzveröffentlichung, Bibliographie

Arzt, Steven ; Nadi, Sarah ; Ali, Karim ; Bodden, Eric ; Erdweg, Sebastian ; Mezini, Mira (2015)
Towards Secure Integration of Cryptographic Software.
OOPSLA Onward!. Piitsburgh (25.10.2015-25.10.2015)
Konferenzveröffentlichung, Bibliographie

Pinkas, Benny ; Schneider, Thomas ; Segev, Gil ; Zohner, Michael (2015)
Phasing: Private Set Intersection using Permutation-based Hashing.
24. USENIX Security Symposium (USENIX Security'15). Austin, TX (10.08.2016-12.08.2016)
Konferenzveröffentlichung, Bibliographie

Koeberl, Patrick ; Phegade, Vinay ; Rajan, Anand ; Schneider, Thomas ; Schulz, Steffen ; Zhdanova, Maria (2015)
Time to Rethink: Trust Brokerage using Trusted Execution Environments.
8. International Conference on Trust and Trustworthy Computing (TRUST'15). Heraklion, Greece (24.08.2015-26.08.2015)
doi: 10.1007/978-3-319-22846-4_11
Konferenzveröffentlichung, Bibliographie

Lerch, Johannes ; Hermann, Ben (2015)
Design Your Analysis: A Case Study on Implementation Reusability of Data-flow Functions.
Proceedings of the 4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis. New York, NY, USA
Konferenzveröffentlichung, Bibliographie

Arzt, Steven ; Rasthofer, Siegfried ; Hahn, Robert ; Bodden, Eric (2015)
Using Targeted Symbolic Execution for Reducing False-Positives in Dataflow Analysis.
4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis. Portland, USA (14.06.2015-14.06.2015)
Konferenzveröffentlichung, Bibliographie

Songhori, Ebrahim ; Hussain, Siam ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz (2015)
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits.
36. IEEE Symposium on Security and Privacy (IEEE S&P'15). San Jose, California (18.05.2015-20.05.2015)
doi: 10.1109/SP.2015.32
Konferenzveröffentlichung, Bibliographie

Albrecht, Martin ; Rechberger, Christian ; Schneider, Thomas ; Tiessen, Tyge ; Zohner, Michael (2015)
Ciphers for MPC and FHE.
34. Advances in Cryptology -- EUROCRYPT 2015. Sofia, Bulgaria (26.04.2015-30.04.2015)
doi: 10.1007/978-3-662-46800-5_17
Konferenzveröffentlichung, Bibliographie

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2015)
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
34. Advances in Cryptology -- EUROCRYPT 2015. Sofia, Bulgaria (26.04.2015-30.04.2015)
doi: 10.1007/978-3-662-46800-5_26
Konferenzveröffentlichung, Bibliographie

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2015)
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
22nd Annual Network and Distributed System Security Symposium (NDSS'15). San Diego, USA (08.02.2015-11.02.2015)
doi: 10.14722/ndss.2015.23113
Konferenzveröffentlichung, Bibliographie

Eichberg, Michael ; Hermann, Ben ; Mezini, Mira ; Glanz, Leonid (2015)
Hidden Truths in Dead Software Paths.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering. New York, NY, USA
Konferenzveröffentlichung, Bibliographie

Hermann, Ben ; Reif, Michael ; Eichberg, Michael ; Mezini, Mira (2015)
Getting to Know You: Towards a Capability Model for Java.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering. New York, NY, USA
Konferenzveröffentlichung, Bibliographie

Lerch, Johannes ; Hermann, Ben ; Bodden, Eric ; Mezini, Mira (2014)
FlowTwist: Efficient Context-sensitive Inside-out Taint Analysis for Large Codebases.
Proceedings of the 22Nd ACM SIGSOFT International Symposium on Foundations of Software Engineering.
Konferenzveröffentlichung, Bibliographie

Demmler, Daniel ; Herzberg, Amir ; Schneider, Thomas (2014)
RAID-PIR: Practical Multi-Server PIR.
6. ACM Cloud Computing Security Workshop (CCSW'14). Scottsdale, Arizona, USA (07.11.2014-07.11.2014)
doi: 10.1145/2664168.2664181
Konferenzveröffentlichung, Bibliographie

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael (2014)
Faster Private Set Intersection based on OT Extension.
23. USENIX Security Symposium (USENIX Security'14). San Diego, CA (20.08.2014-22.08.2014)
Konferenzveröffentlichung, Bibliographie

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2014)
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens.
23. USENIX Security Symposium (USENIX Security'14). San Diego, USA (20.08.2014-22.08.2014)
Konferenzveröffentlichung, Bibliographie

Bringer, Julien ; Chabanne, Hervé ; Favre, Mélanie ; Patey, Alain ; Schneider, Thomas ; Zohner, Michael (2014)
GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification.
2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14). Salzburg, Austria (11.06.2014-13.06.2014)
doi: 10.1145/2600918.2600922
Konferenzveröffentlichung, Bibliographie

Schneider, Matthias ; Schneider, Thomas (2014)
Notes on Non-Interactive Secure Comparison in "Image Feature Extraction in the Encrypted Domain with Privacy-Preserving SIFT".
2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14). Salzburg, Austria (11.06.2014-13.06.2014)
doi: 10.1145/2600918.2600927
Konferenzveröffentlichung, Bibliographie

Kerschbaum, Florian ; Schneider, Thomas ; Schröpfer, Axel (2014)
Automatic protocol selection in secure two-party computations.
12. International Conference on Applied Cryptography and Network Security (ACNS'14). Lausanne, Switzerland (10.06.2014-13.06.2014)
doi: 10.1007/978-3-319-07536-5_33
Konferenzveröffentlichung, Bibliographie

Ali, Karim ; Rapoport, Marianna ; Lhoták, Ondřej ; Dolby, Julian ; Tip, Frank (2014)
Constructing Call Graphs of Scala Programs.
Proceedings of the 28th European Conference on Object-Oriented Programming.
Konferenzveröffentlichung, Bibliographie

Arzt, Steven ; Rasthofer, Siegfried ; Fritz, Christian ; Bodden, Eric ; Bartel, Alexandre ; Klein, Jacques ; Le Traon, Yves ; Octeau, Damien ; McDaniel, Patrick (2014)
Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps.
Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation. Edinburgh
Konferenzveröffentlichung, Bibliographie

Arzt, Steven ; Huber, Stephan ; Rasthofer, Siegfried ; Bodden, Eric (2014)
Denial-of-App Attack: Inhibiting the Installation of Android Apps on Stock Phones.
4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices. Scottsdale
Konferenzveröffentlichung, Bibliographie

Arzt, Steven ; Bodden, Eric (2014)
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes.
ICSE. Hyderabad
Konferenzveröffentlichung, Bibliographie

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2013)
Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones.
19th Crypto-Day. Stuttgart, Germany (14.11.2013 - 15.11.2013)
Konferenzveröffentlichung, Bibliographie

Falzon, Kevin ; Bodden, Eric ; Purandare, Rahul (2013)
Distributed Finite-State Runtime Monitoring with Aggregated Events.
4th International Conference on Runtime Verification (RV'13). Rennes, France (24.09.2013-27.09.2013)
doi: 10.1007/978-3-642-40787-1_6
Konferenzveröffentlichung, Bibliographie

Bodden, Eric ; Hermann, Ben ; Lerch, Johannes ; Mezini, Mira (2013)
Reducing human factors in software security architectures.
Future Security Conference 2013.
Konferenzveröffentlichung, Bibliographie

Bodden, Eric ; Mezini, Mira ; Brabrand, Claus ; Tolêdo, Társis ; Ribeiro, Márcio ; Borba, Paulo (2013)
SPLlift - Statically Analyzing Software Product Lines in Minutes Instead of Years.
ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2013).
Konferenzveröffentlichung, Bibliographie

Asokan, N. ; Dmitrienko, Alexandra ; Nagy, Marcin ; Reshetova, Elena ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stelle, Stanislaus (2013)
CrowdShare: Secure Mobile Resource Sharing.
11. International Conference on Applied Cryptography and Network Security (ACNS'13). Banff AB Canada (25.06.2013-28.06.2013)
doi: 10.1007/978-3-642-38980-1_27
Konferenzveröffentlichung, Bibliographie

Henecka, Wilko ; Schneider, Thomas (2013)
Faster Secure Two-Party Computation with Less Memory.
8. ACM Symposium on Information, Computer and Communications Security (ASIACCS'13). Hangzhou, China (08.05.2013-10.05.2013)
doi: 10.1145/2484313.2484369
Konferenzveröffentlichung, Bibliographie

Kerschbaum, Florian ; Schneider, Thomas ; Schröpfer, Axel (2013)
Automatic Protocol Selection in Secure Two-Party Computations.
20th Network and Distributed System Security Symposium (NDSS'13). San Diego, USA (24.02.2013-27.02.2013)
Konferenzveröffentlichung, Bibliographie

Schneider, Thomas ; Zohner, Michael (2013)
GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits.
17. International Conference on Financial Cryptography and Data Security (FC'13). Okinawa, Japan (01.04.2013-05.04.2013)
doi: 10.1007/978-3-642-39884-1_23
Konferenzveröffentlichung, Bibliographie

Arzt, Steven ; Falzon, Kevin ; Follner, Andreas ; Rasthofer, Siegfried ; Bodden, Eric ; Stolz, Volker (2013)
How useful are existing monitoring languages for securing Android apps?
6. Arbeitstagung Programmiersprachen (ATPS 2013).
Konferenzveröffentlichung, Bibliographie

Ali, Karim ; Lhoták, Ondřej (2013)
Averroes: Whole-Program Analysis without the Whole Program.
Proceedings of the 27th European Conference on Object-Oriented Programming.
Konferenzveröffentlichung, Bibliographie

Mittelbach, Arno (2013)
Cryptophia’s Short Combiner for Collision-Resistant Hash Functions (best student paper).
Konferenzveröffentlichung, Bibliographie

Huss, Sorin A. ; Stöttinger, Marc ; Zohner, Michael (2013)
AMASIVE: An Adaptable and Modular Autonomous Side-Channel Vulnerability Evaluation Framework.
Konferenzveröffentlichung, Bibliographie

Schneider, Thomas ; Zohner, Michael (2012)
Efficient Secure Two-Party Computation.
Konferenzveröffentlichung, Bibliographie

Bodden, Eric ; Falzon, Kevin ; Pun, Ka I. ; Stolz, Volker (2012)
Delta-oriented Monitor Specification.
5th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2012).
Konferenzveröffentlichung, Bibliographie

Bodden, Eric ; Follner, Andreas ; Rasthofer, Siegfried (2012)
Challenges in defining a programming language for provably correct dynamic analyses.
5th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2012).
Konferenzveröffentlichung, Bibliographie

Falzon, Kevin ; Pace, Gordon J.
Hrsg.: Machado, Ricardo J. ; Maciel, Rita Suzana ; Rubin, Julia ; Botterweck, Goetz (2012)
Combining Testing and Runtime Verification.
8th International Workshop on Model-based Methodologies for Pervasive and Embedded Software. Essen, Germany (04.09.2012-04.09.2012)
Konferenzveröffentlichung, Bibliographie

Alsouri, Sami ; Sinschek, Jan ; Sewe, Andreas ; Bodden, Eric ; Mezini, Mira ; Katzenbeisser, Stefan (2012)
Dynamic Anomaly Detection for More Trustworthy Outsourced Computation.
15th International Conference on Information Security. Passau, Germany (19.09.2012-21.09.2012)
doi: 10.1007/978-3-642-33383-5_11
Konferenzveröffentlichung, Bibliographie

Kononenko, Kirill (2012)
A Unified Approach to Identifying and Healing Vulnerabilities in x86 Machine Code.
Konferenzveröffentlichung, Bibliographie

Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2012)
XIFER: A Software Diversity Tool Against Code-Reuse Attacks.
Konferenzveröffentlichung, Bibliographie

Thies, Andreas ; Bodden, Eric (2012)
RefaFlex: Safer Refactorings for Reflective Java Programs [forthcoming].
International Symposium on Software Testing and Analysis (ISSTA 2012).
Konferenzveröffentlichung, Bibliographie

Ansaloni, Danilo ; Binder, Walter ; Bockisch, Christoph ; Bodden, Eric ; Hatun, Kardelen ; Marek, Lukas ; Qi, Zhengwei ; Sarimbekov, Aibek ; Sewe, Andreas ; Tuma, Petr ; Zheng, Yudi (2012)
Challenges for Refinement and Composition of Instrumentations (Position Paper).
International Conference on Software Composition (SC 2012).
Konferenzveröffentlichung, Bibliographie

Bodden, Eric (2012)
Towards Typesafe Weaving for Modular Reasoning in Aspect-Oriented Programs.
FOAL 2012: International Workshop on the Foundations of Aspect-Oriented Languages.
Konferenzveröffentlichung, Bibliographie

Ahmad, Junaid Jameel ; Li, Shujun ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2012)
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm.
16. International Conference on Financial Cryptography and Data Security (FC'12). Kralendijk, Bonaire (02.03.2012-02.03.2012)
doi: 10.1007/978-3-642-32946-3_22
Konferenzveröffentlichung, Bibliographie

Bodden, Eric (2012)
MOPBox: A Library Approach to Runtime Verification.
RV ; 2 (San Francisco, CA) : 2011.09.27-30 International Conference on Runtime Verification ; 2 (San Francisco, CA) : 2011.09.27-30.
Konferenzveröffentlichung, Bibliographie

Ali, Karim ; Lhoták, Ondřej (2012)
Application-Only Call Graph Construction.
Proceedings of the 26th European Conference on Object-Oriented Programming.
Konferenzveröffentlichung, Bibliographie

Bugiel, Sven ; Pöppelmann, Thomas ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2011)
AmazonIA: When Elasticity Snaps Back.
18. ACM Conference on Computer and Communications Security (CCS'11). Chicago Illinois USA (17.10.2011- 21.10.2011)
doi: 10.1145/2046707.2046753
Konferenzveröffentlichung, Bibliographie

Bugiel, Sven ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2011)
Twin Clouds: Secure Cloud Computing with Low Latency.
12. Communications and Multimedia Security Conference (CMS'11). Ghent, Belgium (19.10.2011-21.10.2011)
doi: 10.1007/978-3-642-24712-5_3
Konferenzveröffentlichung, Bibliographie

Lam, Patrick ; Bodden, Eric ; Lhotak, Ondrej ; Hendren, Laurie (2011)
The Soot framework for Java program analysis: a retrospective.
Cetus Users and Compiler Infastructure Workshop (CETUS 2011).
Konferenzveröffentlichung, Bibliographie

Bodden, Eric (2011)
Stateful Breakpoints: A Practical Approach to Defining Parameterized Runtime Monitors.
ESEC/FSE '11: Joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering.
Konferenzveröffentlichung, Bibliographie

Bodden, Eric (2011)
Continuation equivalence: a Correctness Criterion for Static Optimizations of Dynamic Analyses.
WODA '11: International Workshop on Dynamic Analysis.
Konferenzveröffentlichung, Bibliographie

Bugiel, Sven ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2011)
Twin Clouds: An Architecture for Secure Cloud Computing.
Workshop on Cryptography and Security in Clouds (WCSC'11). Zurich, Switzerland (15.03.2011 - 16.03.2011)
Konferenzveröffentlichung, Bibliographie

Bodden, Eric (2011)
Closure Joinpoints: Block joinpoints without surprises.
AOSD '11: Proceedings of the 10th International Conference on Aspect-oriented Software Development.
Konferenzveröffentlichung, Bibliographie

Fischlin, Marc ; Pinkas, Benny ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Visconti, Ivan (2011)
Secure Set Intersection with Untrusted Hardware Tokens.
11th Cryptographers' Track at the RSA Conference (CT-RSA'11). San Francisco, CA, USA (14.02.2011-18.02.2011)
doi: 10.1007/978-3-642-19074-2_1
Konferenzveröffentlichung, Bibliographie

Bodden, Eric ; Sewe, Andreas ; Sinschek, Jan ; Oueslati, Hela ; Mezini, Mira (2011)
Taming reflection: Aiding static analysis in the presence of reflection and custom class loaders.
International Conference on Software Engineering. Waikiki, Honolulu, HI, USA (21.05.2011-28.05.2011)
doi: 10.1145/1985793.1985827
Konferenzveröffentlichung, Bibliographie

Schneider, Thomas (2011)
Reden ist Silber - Schweigen ist Gold: Datensparsamkeit durch effizientes Rechnen unter Verschlüsselung.
12. Deutscher IT-Sicherheitskongress des BSI: Sicher in die digitale Welt von morgen. Bonn-Bad Godesberg (10.-05.2011-12.05.2011)
Konferenzveröffentlichung, Bibliographie

Inostroza, Milton ; Tanter, Éric ; Bodden, Eric (2011)
Join Point Interfaces for Modular Reasoning in Aspect-Oriented Programs.
ESEC/FSE '11: Joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering.
Konferenzveröffentlichung, Bibliographie

Bodden, Eric ; Lam, Patrick ; Hendren, Laurie (2010)
Clara: a Framework for Statically Evaluating Finite-state Runtime Monitors.
1st International Conference on Runtime Verification (RV).
Konferenzveröffentlichung, Bibliographie

Bodden, Eric ; Lam, Patrick (2010)
Clara: Partially Evaluating Runtime Monitors at Compile Time.
1st International Conference on Runtime Verification (RV).
Konferenzveröffentlichung, Bibliographie

Kim, Chang Hwan Peter ; Bodden, Eric ; Batory, Don ; Khurshid, Sarfraz (2010)
Reducing Configurations to Monitor in a Software Product Line.
1st International Conference on Runtime Verification (RV).
Konferenzveröffentlichung, Bibliographie

Bruch, Marcel ; Bodden, Eric ; Monperrus, Martin ; Mezini, Mira (2010)
IDE 2.0: Collective Intelligence in Software Development.
FSE/SDP Workshop on the Future of Software Engineering.
doi: 10.1145/1882362.1882374?
Konferenzveröffentlichung, Bibliographie

Henecka, Wilko ; Kögl, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Wehrenberg, Immo (2010)
TASTY: Tool for Automating Secure Two-partY computations.
CCS'10. Chicago Illinois USA (04.10.2010-08.10.2010)
doi: 10.1145/1866307.1866358
Konferenzveröffentlichung, Bibliographie

Almeida, José Bacelar ; Bangerter, Endre ; Barbosa, Manuel ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010)
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols.
15th European Symposium on Research in Computer Security (ESORICS'10). Athens, Greece (20.09.2010 - 22.09.2010)
doi: 10.1007/978-3-642-15497-3_10
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010)
Verschlüsselt Rechnen: Sichere Verarbeitung verschlüsselter medizinischer Daten am Beispiel der Klassifikation von EKG-Daten.
Workshop Innovative und sichere Informationstechnologie für das Gesundheitswesen von morgen (perspeGKtive'10). Mannheim (08.09.2010-08.09.2010)
Konferenzveröffentlichung, Bibliographie

Bangerter, Endre ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010)
YACZK: Yet Another Compiler for Zero-Knowledge.
19th USENIX Security Symposium. Washington D.C., USA (14.08.2019-16.08.2019)
Konferenzveröffentlichung, Bibliographie

Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010)
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs.
12. International Workshop on Cryptographic Hardware and Embedded Systems (CHES'10). Santa Barbara, USA (17.08.2010-20.08.2010)
doi: 10.1007/978-3-642-15031-9_26
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Winandy, Marcel (2010)
Token-Based Cloud Computing - Secure Outsourcing of Data and Arbitrary Computations with Lower Latency.
3. International Conference on Trust and Trustworthy Computing (TRUST'10) - Workshop on Trust in the Cloud. Berlin (21.06.2010-23.06.2010)
doi: 10.1007/978-3-642-13869-0_30
Konferenzveröffentlichung, Bibliographie

Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010)
Embedded SFE: Offloading Server and Network using Hardware Tokens.
14. International Conference on Financial Cryptography and Data Security (FC'10). Tenerife, Canary Islands (25.01.2010-28.10.2010)
doi: 10.1007/978-3-642-14577-3_17
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Wehrenberg, Immo (2009)
Efficient Privacy-Preserving Face Recognition.
12. International Conference on Information Security and Cryptology (ICISC'09). Seoul, Korea (02.12.2009-04.12.2009)
doi: 10.1007/978-3-642-14423-3_16
Konferenzveröffentlichung, Bibliographie

Barni, Mauro ; Failla, Pierluigi ; Kolesnikov, Vladimir ; Lazzeretti, Riccardo ; Paus, Annika ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Efficient Privacy-Preserving Classification of ECG Signals.
2009 First IEEE International Workshop on Information Forensics and Security (WIFS). London (06.12.2009-09.12.2009)
doi: 10.1109/WIFS.2009.5386475
Konferenzveröffentlichung, Bibliographie

Pinkas, Benny ; Schneider, Thomas ; Smart, Nigel P. ; Williams, Stephen C. (2009)
Secure Two-Party Computation is Practical.
15. Advances in Cryptology -- ASIACRYPT 2009. Tokyo, Japan (06.12.2009-10.12.2009)
doi: 10.1007/978-3-642-10366-7_15
Konferenzveröffentlichung, Bibliographie

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima.
8. International Conference on Cryptology And Network Security (CANS'09). Kanazawa, Japan (12.12.2009-14.12.2009)
doi: 10.1007/978-3-642-10433-6_1
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Ask Your E-Doctor Without Telling: Privacy-Preserving Medical Diagnostics.
3rd Section Days of Ruhr-University Bochum Research School. Bochum, Germany (06.11.2009-06.11.2009)
Konferenzveröffentlichung, Bibliographie

Paus, Annika ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Practical Secure Evaluation of Semi-Private Functions.
7. International Conference on Applied Cryptography and Network Security (ACNS'09). Paris, France (02.06.2009 - 05.06.2009)
doi: 10.1007/978-3-642-01957-9_6
Konferenzveröffentlichung, Bibliographie

Bangerter, Endre ; Barzan, Stefania ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Tsay, Joe-Kai (2009)
Bringing Zero-Knowledge Proofs of Knowledge to Practice.
17. International Workshop on Security Protocols (SPW'09). Cambridge, UK (01.04.2009-03.04.2009)
doi: 10.1007/978-3-642-36213-2_9
Konferenzveröffentlichung, Bibliographie

Bangerter, Endre ; Camenisch, Jan ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Automatic Generation of Sound Zero-Knowledge Protocols.
28th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Cologne, Germany (26.04.2009-30.04.2009)
Konferenzveröffentlichung, Bibliographie

Ali, Karim ; Aib, Issam ; Boutaba, Raouf (2009)
P2P-AIS: A P2P Artificial Immune Systems architecture for detecting DDoS flooding attacks.
Global Information Infrastructure Symposium.
Konferenzveröffentlichung, Bibliographie

Ali, Karim ; Boutaba, Raouf (2009)
Applying Kernel Methods to Anomaly-based Intrusion Detection Systems.
Global Information Infrastructure Symposium.
Konferenzveröffentlichung, Bibliographie

Kolesnikov, Vladimir ; Schneider, Thomas (2008)
Improved Garbled Circuit: Free XOR Gates and Applications.
35. International Colloquium on Automata, Languages and Programming (ICALP'08). Reykjavik, Iceland (07.07.2008-11.07.2008)
doi: 10.1007/978-3-540-70583-3_40
Konferenzveröffentlichung, Bibliographie

Kolesnikov, Vladimir ; Schneider, Thomas ; Strehl, Volker (2008)
Practical Secure Function Evaluation.
8. Kryptotag. Tübingen, Germany (11.04.2008)
Konferenzveröffentlichung, Bibliographie

Schneider, Thomas (2008)
Practical secure function evaluation.
Informatiktage 2008 - Fachwissenschaftlicher Informatik-Kongress. Bonn, Germany (14.03.2008 - 15.03.2008)
Konferenzveröffentlichung, Bibliographie

Kolesnikov, Vladimir ; Schneider, Thomas (2008)
A Practical Universal Circuit Construction and Secure Evaluation of Private Functions.
12th International Conference on Financial Cryptography and Data Security (FC'08). Cozumel, Mexico (28.01.2008 - 31.01.2008)
doi: 10.1007/978-3-540-85230-8_7
Konferenzveröffentlichung, Bibliographie

Report

Li, Li ; Bartel, Alexandre ; Klein, Jacques ; Le Traon, Yves ; Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric ; Octeau, Damien ; McDaniel, Patrick (2014)
I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis.
Report, Bibliographie

Arzt, Steven ; Bodden, Eric (2013)
Efficiently updating IDE-based data-flow analyses in response to incremental program changes.
Report, Bibliographie

Fritz, Christian ; Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric ; Bartel, Alexandre ; Klein, Jacques ; Le Traon, Yves ; Octeau, Damien ; McDaniel, Patrick (2013)
Highly Precise Taint Analysis for Android Applications.
Report, Bibliographie

Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric (2013)
SuSi: A Tool for the Fully Automated Classification and Categorization of Android Sources and Sinks.
Report, Bibliographie

Bodden, Eric ; Tolêdo, Társis ; Ribeiro, Márcio ; Brabrand, Claus ; Borba, Paulo ; Mezini, Mira (2012)
Transparent and Efficient Reuse of IFDS-based Static Program Analyses for Software Product Lines.
Report, Bibliographie

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2012)
myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android.
Report, Bibliographie

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Varadharajan, Vijay (2012)
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs (full version).
Report, Bibliographie

Bodden, Eric (2012)
Identifying meaningless parameterized linear-temporal-logic formulas.
Report, Bibliographie

Bodden, Eric (2012)
On the Expressiveness of Parameterized Finite-state Runtime Monitors.
Report, Bibliographie

Pullonen, Pille ; Bogdanov, Dan ; Schneider, Thomas (2012)
The Design and Implementation of a Two-Party Protocol Suite for SHAREMIND 3.
Report, Bibliographie

Bodden, Eric ; Tanter, Éric ; Inostroza, Milton (2012)
Safe and Practical Decoupling of Aspects with Join Point Interfaces.
Report, Bibliographie

Inostroza, Milton ; Tanter, Éric ; Bodden, Eric (2011)
Modular Reasoning with Join Point Interfaces.
Report, Bibliographie

Dissertation

Falzon, Kevin (2017)
On the Use of Migration to Stop Illicit Channels.
Technische Universität Darmstadt
Dissertation, Erstveröffentlichung

Follner, Andreas (2017)
On Generating Gadget Chains for Return-Oriented Programming.
Technische Universität Darmstadt
Dissertation, Erstveröffentlichung

Rasthofer, Siegfried (2017)
Improving Mobile-Malware Investigations with Static and Dynamic Code Analysis Techniques.
Technische Universität Darmstadt
Dissertation, Erstveröffentlichung

Arzt, Steven (2017)
Static Data Flow Analysis for Android Applications.
Technische Universität Darmstadt
Dissertation, Erstveröffentlichung

Zohner, Michael (2017)
Faster Oblivious Transfer Extension and Its Impact on Secure Computation.
Technische Universität Darmstadt
Dissertation, Erstveröffentlichung

Lerch, Johannes (2016)
On the Scalability of Static Program Analysis to Detect Vulnerabilities in the Java Platform.
Technische Universität Darmstadt
Dissertation, Erstveröffentlichung

Schneider, Thomas (2011)
Engineering Secure Two-Party Computation Protocols - Advances in Design, Optimization, and Applications of Efficient Secure Function Evaluation.
Ruhr-Universität Bochum
Dissertation, Bibliographie

Norm, Patent, Standard

Kolesnikov, Vladimir ; Schneider, Thomas (2013)
Secure Function Evaluation Techniques for Circuits Containing XOR Gates with Applications to Universal Circuits.
Norm, Patent, Standard, Bibliographie

Kolesnikov, Vladimir ; Schneider, Thomas (2012)
Universal Circuit for Secure Function Evaluation.
Norm, Patent, Standard, Bibliographie

Bachelorarbeit

Günther, Daniel (2017)
Valiant's Universal Circuit - Towards a Modular Construction and Implementation.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie

Hiemenz, Benedikt (2014)
Analysis and Extensions of the PCF Secure Two-Party Computation Compiler.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie

Schneider, Thomas (2007)
Secure Task Migration and Interprocess Communication in Reconfigurable, Distributed, Embedded Systems.
University Erlangen-Nürnberg, Germany
Bachelorarbeit, Bibliographie

Diplom- oder Magisterarbeit

Schneider, Thomas (2008)
Practical Secure Function Evaluation.
Friedrich-Alexander-Universität Erlangen-Nürnberg
Diplom- oder Magisterarbeit, Bibliographie

Masterarbeit

Demmler, Daniel (2013)
Hardware-Assisted Two-Party Secure Computation on Mobile Devices.
Technische Universität Darmstadt
Masterarbeit, Bibliographie

Diese Liste wurde am Sun Dec 15 02:05:35 2024 CET generiert.