2024 |
MINERVA: Secure Collaborative Machine Tool Data Utilization Leveraging Confidentiality-Protecting Technologies [pdf]
Andy Ludwig, Michael P. Heinl, and Alexander Giehl
Open Identity Summit 2024
|
|
Cybersecurity as a Service [pdf]
John Morris, Stefan Tatschner, Michael P. Heinl, Patrizia Heinl, Thomas Newe, and Sven Plaga
Springer Nature Switzerland
|
|
Harder or Different? Understanding Generalization of Audio Deepfake Detection [pdf]
Nicolas M. Mueller, Nicholas Evans, Hemlata Tak, Philip Sperl, and Konstantin Boettinger
Artificial Intelligence (cs.AI); Audio and Speech Processing (eess.AS)
|
|
Gateway to the Danger Zone: Secure and Authentic Remote Reset in Machine Safety [pdf]
Sebastian N. Peters, Nikolai Puch, Michael P. Heinl, Philipp Zieris, Mykolai Protsenko, Thorsten Larsen-Vefring, Marcel Ely Gomes, Aliza Maftun,, and Thomas Zeschg
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and Security
|
|
ParsEval: Evaluation of Parsing Behavior using Real-world Out-in-the-wild X.509 Certificates [pdf]
Stefan Tatschner, Sebastian N. Peters, Michael P. Heinl, Tobias Specht, and Thomas Newe
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and Security
|
|
ISLAB: Immutable Memory Management Metadata for Commodity Operating System Kernels
Marius Momeu, Fabian Kilger, Christopher Roemheld, Simon Schnueckel, Sergej Proskurin, Michalis Polychronakis, and Vasileios Kemerlis
AsiaCCS ACM Asia Conference on Computer and Communications Security
|
|
A New Approach to Voice Authenticity [pdf]
Nicolas M. Mueller, Piotr Kawa, Shen Hu, Matthias Neu, Jennifer Williams, Philip Sperl, and Konstantin Boettinger
Artificial Intelligence (cs.AI); Audio and Speech Processing (eess.AS)
|
|
MLAAD: The Multi-Language Audio Anti-Spoofing Dataset [pdf]
Nicolas M. Mueller, Piotr Kawa, Wei Herng Choong, Edresson Casanova, Eren Goelge, Thorsten Mueller, Piotr Syga, Philip Sperl, and Konstantin Boettinger
IJCNN 2024
|
2023 |
MANTRA: A Graph-based Unified Information Aggregation Foundation for Enhancing Cybersecurity Management in Critical Infrastructures [pdf]
Phillip Fuxen, Rudolf Hackenberg, Michael Heinl, Mirko Ross, Heiko Rossnagel, Christian Schunck, and Raphael Yahalom
Open Identity Summit 2023
|
|
From Standard to Practice: Towards ISA/IEC 62443conform Public Key Infrastructures
Michael P. Heinl, Maximilian Pursche, Nikolai Puch, Sebastian Peters, and Alexander Giehl
SAFECOMP 2023: 42nd International Conference on Computer Safety, Reliability and Security
|
|
GuaranTEE: Introducing Control-Flow Attestation for Trusted Execution Environments [pdf]
Mathias Morbitzer, Benedikt Kopf, and Philipp Zieris
2023 IEEE 16th International Conference on Cloud Computing (CLOUD)
|
|
Complex valued neural networks for antispoofing [pdf]
Nicolas M. Mueller, Philip Sperl,, Philip Sperl, and Konstantin Boettinger
Interspeech 2023
|
|
Universal Remote Attestation for Cloud and Edge Platforms ott2023universal [pdf]
Simon Ott, Monika Kamhuber, Joana Pecholt, and Sascha Wessel
ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security
|
|
Lock-in Thermography for the Localization of Security Hard Blocks on SoC Devices. [pdf]
Michael Koegel, Sebastian Brand, Christian Grosse, Frank Altmann, Bodo Selmke, Kilian Zinnecker, Robert Hesselbarth, and Nisha Jacob Kabakci
ISTFA 2023
|
|
Protecting Publicly Available Data With Machine Learning Shortcuts [pdf]
Nicolas M. Mueller, Maximilian Burgert, Pascal Debus, Jennifer Williams, Philip Sperl,, and Konstantin Boettinger
BMVC 2023
|
|
An Integrated Algorithm for Robust and Imperceptible Audio Adversarial Examples [pdf]
Armin Ettenhofer, Jan-Philipp Schulze, and Karla Pizzi
Proc. 3rd Symposium on Security and Privacy in Speech Communication
|
|
A Quic(k) Security Overview: A Literature Research on Implemented Security Recommendations [pdf]
Stefan Tatschner, Sebastian N. Peters, David Emeis, John Morris, and Thomas Newe
ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security
|
|
A Uniform Representation of Classical and Quantum Source Code for Static Code Analysis [pdf]
Maximilian Kaul, Alexander Kuechler, and Christian Banse
2023 IEEE International Conference on Quantum Computing and Engineering (QCE)
|
|
AbsIntIO: Towards Showing the Absence of Integer Overflows in Binaries using Abstract Interpretation [pdf]
Alexander Kuechler, Leon Wenning, and Florian Wendland
ASIA CCS '23: ACM ASIA Conference on Computer and Communications Security, Melbourne, VIC, Australia, July 2023
|
|
D-GATE: Decentralized Geolocation and Time Enforcement for Usage Control [pdf]
Hendrik Meyer Zum Felde, Jean-Luc Reding, and Michael Lux
2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
|
|
A Semantic Evidence-based Approach to Continuous Cloud Service Certification [pdf]
Christian Banse, Immanuel Kunz, Nico Haas, and Angelika Schneider
SAC 2023, 38th ACM/SIGAPP Symposium on Applied Computing. Proceedings
|
|
Privacy Property Graph: Towards Automated Privacy Threat Modeling via Static Graph-based Analysis [pdf]
Immanuel Kunz, Konrad Weiss, Angelika Schneider, and Christian Banse
Proceedings on Privacy Enhancing Technologies
|
|
CryptSan: Leveraging ARM Pointer Authentication for Memory Safety in C/C++ [pdf]
Konrad Hohentanner, Philipp Zieris, and Julian Horsch
SAC '23: Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing
|
|
CryptSan: Leveraging ARM Pointer Authentication for Memory Safety in C/C++ [pdf]
Konrad Hohentanner, Philipp Zieris, and Julian Horsch
SAC '23: Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing
|
|
HWASanIO: Detecting C/C++ Intra-object Overflows with Memory Shading [pdf]
Konrad Hohentanner, Florian Kasten, and Lukas Auer
SOAP 2023: Proceedings of the 12th ACM SIGPLAN International Workshop on the State Of the Art in Program Analysis
|
|
Localized Shortcut Removal [pdf]
Nicolas Mueller, Jochen Jacobs, Jennifer Williams, and Konstantin Böttinger
XAI4CV @ CVPR2023
|
|
Whiteboxgrind – Automated Analysis of Whitebox Cryptography [pdf]
Tobias Holl, Katharina Bogad, and Michael Gruber
Constructive Side-Channel Analysis and Secure Design: 14th International Workshop, COSADE 2023, Munich, Germany, April 3–4, 2023, Proceedings
|
|
Extending Actor Models in Data Spaces [pdf]
Hendrik Meyer zum Felde, Maarten Kollenstart, Thomas Bellebaum, Simon Dalmolen, and Gerd Brost
WWW '23 Companion: Companion Proceedings of the ACM Web Conference 2023
|
|
R2-AD2: Detecting Anomalies by Analysing the Raw Gradient [pdf]
Jan-Philipp Schulze, Philip Sperl, Ana Radutoiu, Carla Sagebiel, and Konstantin Böttinger
Machine Learning and Knowledge Discovery in Databases: European Conference, ECML PKDD 2022, Grenoble, France, September 19–23, 2022, Proceedings, Part I
|
|
Free Willy: Prune System Calls to Enhance Software Security
Charlie Groh, Sergej Proskurin, and Apostolis Zarras
ACM/SIGAPP Symposium on Applied Computing (SAC)
|
|
Shortcut detection with variational autoencoders [pdf]
Nicolas M. Mueller, Simon Roschmann, Shahbaz Khan, Philip Sperl, and Konstantin Boettinger
Accepted at the ICML 2023 Workshop on Spurious Correlations, Invariance and Stability
|
2022 |
Compiler-based Attack Origin Tracking with~Dynamic Taint Analysis [pdf]
Oliver Braunsdorf, Stefan Sessinghaus, and Julian Horsch
Information Security and Cryptology ICISC 2021
|
|
Building Trust in Data Spaces [pdf]
Monika Huber, Sascha Wessel, Gerd Brost, and Nadja Menz
Designing Data Spaces
|
|
Comparing Unsupervised Detection Algorithms for~Audio Adversarial Examples [pdf]
Shanatip Choosaksakunwiboon, Karla Pizzi, and Ching-Yu Kao
Speech and Computer
|
|
Application-Oriented Selection of Privacy Enhancing Technologies [pdf]
Immanuel Kunz and Andreas Maria Binder
Springer International Publishing
|
|
Remote Electronic Voting in Uncontrolled Environments: A Classifying Survey [pdf]
Michael Heinl, Simon Goelz,, Simon Goelz, and Christoph Boesch
ACM Computing Surveys, Volume 55, Issue 8
|
|
Remote Electronic Voting in Uncontrolled Environments: A Classifying Survey [pdf]
Michael P. Heinl, Simon Gölz, and Christoph Bösch
ACM Comput. Surv.
|
|
Real or Fake? A Practical Method for Detecting Tempered Images
Kao Ching-Yu, Wan Hongjia, Markert Karla, and Konstantin Böttinger
IPAS2022
|
|
Assessing the Impact of Transformations on Physical Adversarial Attacks [pdf]
Paul Andrei Sava, Jan-Philipp Schulze, Philip Sperl, and Konstantin Böttinger
Proceedings of the 15th {ACM} Workshop on Artificial Intelligence and Security
|
|
Security Risk Assessments: Modeling and Risk Level Propagation [pdf]
Daniel Angermeier, Hannah Wester, Kristian Beilke, Gerhard Hansch, and Jörn Eichler
ACM Transactions on Cyber-Physical Systems
|
|
Katana: Robust, Automated, Binary-Only Forensic Analysis of Linux Memory Snapshots [pdf]
Fabian Franzen, Tobias Holl, Manuel Andreas, Julian Kirsch, and Jens Grossklags
Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses
|
|
Human Perception of Audio Deepfakes [pdf]
Nicolas Miller, Karla Pizzi, and Jennifer Williams
Proceedings of the 1st International Workshop on Deepfake Detection for Audio Multimedia
|
|
Anomaly Detection by Recombining Gated Unsupervised Experts [pdf]
Jan-Philipp Schulze, Philip Sperl, and Konstantin Böttinger
International Joint Conference on Neural Networks, IJCNN 2022. Proceedings
|
|
Rectifying adversarial inputs using XAI techniques [pdf]
Ching-Yu Kao, Junhao Chen, Karla Markert, and Konstantin Böttinger
2022 30th European Signal Processing Conference
|
|
Double-Adversarial Activation Anomaly Detection: Adversarial Autoencoders are Anomaly Generators [pdf]
Jan-Philipp Schulze, Philip Sperl, and Konstantin Böttinger
2022 International Joint Conference on Neural Networks
|
|
A Continuous Risk Assessment Methodology for Cloud Infrastructures [pdf]
Immanuel Kunz, Angelika Schneider, and Christian Banse
2022 22nd IEEE International Symposium on Cluster, Cloud and Internet Computing - CCGrid
|
|
GyroidOS: Packaging Linux with a Minimal Surface [pdf]
Felix Wruck, Vasil Sarafov, Florian Jakobsmeier, and Michael Weiss
{Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems
|
2021 |
Hybroid: Toward Android Malware Detectionand Categorization with Program Code and Network Traffic
Mohammad Reza Norouzian, Peng Xu, Claudia Eckert, and Apostolis Zarras
International Security Conference (ISC 2021)
|
|
DA3G: Detecting Adversarial Attacks by Analysing Gradients [pdf]
Jan-Philipp Schulze, Philip Sperl, and Konstantin Böttinger
Computer Security ESORICS 2021
|
|
GAIA-X and IDS [pdf]
Otto Boris, Rubina Alina, Andreas Eitel, Andreas Teuscher, Anna Maria Schleimer, Christoph Lange, Dominik Stingl, Evgueni Loukipoudis, Gerd Brost, Gernot Boege, Heinrich Pettenpohl, Jörg Langkau, Joshua Gelhaar, Koki Mitani, Marius Hupperz, Monika Huber, Nils Jahnke, Robin Branstätter, Sascha Wessel, and Sebastian Bader
-
|
|
Falcon: Malware Detection and Categorization with Network Traffic Images
Peng Xu, Claudia Eckert, and Apostolis Zarras
ICANN - The International Conference on Artificial Neural Networks
|
|
HawkEye: Cross-Platform Malware Detection with Representation Learning on Graphs
Peng Xu, Youyi Zhang, Claudia Eckert, and Apostolis Zarras
ICANN - The International Conference on Artificial Neural Networks
|
|
VIA: Analyzing Device Interfaces of Protected Virtual Machines [pdf]
Felicitas Hetzelt, Martin Radev, Robert Buhren, Mathias Morbitzer, and Jean-Pierre Seifert
Annual Computer Security Applications Conference
|
|
Language Dependencies in Adversarial Attacks on Speech Recognition Systems [pdf]
Karla Markert, Donika Mirdita, and Konstantin Böttinger
2021 ISCA Symposium on Security and Privacy in Speech Communication
|
|
Visualizing Automatic Speech Recognition Means for a Better Understanding? [pdf]
Karla Markert, Romain Parracone, Mykhailo Kulakov, Philip Sperl, Ching-Yu Kao, and Konstantin Böttinger
2021 ISCA Symposium on Security and Privacy in Speech Communication
|
|
Data Sovereignty in the Cloud - Wishful Thinking or Reality? [pdf]
Christian Banse
Proceedings of the 2021 on Cloud Computing Security Workshop
|
|
Securing Remote Policy Enforcement by a Multi-Enclave based Attestation Architecture [pdf]
Hendrik Meyer Zum Felde, Mathias Morbitzer, and Julian Schütte
2021 IEEE 19th International Conference on Embedded and Ubiquitous Computing
|
|
iTOP: Automating Counterfeit Object-Oriented Programming Attacks [pdf]
Paul Muntean, Richard Viehoever, Zhiqiang Lin, Gang Tan, Jens Grossklags, and Claudia Eckert
Research in Attacks, Intrusions, and Defenses - 21st International Symposium, RAID 2021, San Sebastian, Spain, October 6-8, 2021, Proceedings
|
|
Cloud Property Graph: Connecting Cloud Security Assessments with Static Code Analysis [pdf]
C. Banse, I. Kunz, A. Schneider, and K. Weiss
2021 IEEE 14th International Conference on Cloud Computing (CLOUD)
|
|
Cloud Property Graph: Connecting Cloud Security Assessments with Static Code Analysis [pdf]
Christian Banse, Immanuel Kunz, Angelika Schneider, and Konrad Weiss
2021 IEEE 14th International Conference on Cloud Computing CLOUD
|
|
Leveraging Edge Computing and Differential Privacy to Securely Enable Industrial Cloud Collaboration Along the Value Chain [pdf]
Alexander Giehl, Michael P. Heinl, and Maximilian Busch
2021 IEEE 17th International Conference on Automation Science and Engineering
|
|
MESH: A Memory-Efficient Safe Heap for C/C++ [pdf]
Emanuel Q. Vintila, Philipp Zieris, and Julian Horsch
The 16th International Conference on Availability, Reliability and Security
|
|
Decentralized Identities for Self-sovereign End-users (DISSENS) [pdf]
Emanuel Q. Vintila, Philipp Zieris, and Julian Horsch
The 16th International Conference on Availability, Reliability and Security
|
|
MESH: A Memory-Efficient Safe Heap for C/C++ [pdf]
Emanuel Q. Vintila, Philipp Zieris, and Julian Horsch
The 16th International Conference on Availability, Reliability and Security
|
|
The Stream Exchange Protocol: A Secure and Lightweight Tool for Decentralized Connection Establishment [pdf]
Stefan Tatschner, Ferdinand Jarisch, Alexander Giehl, Sven Plaga, and Thomas Newe
Sensors
|
|
Security Concept with Distributed Trust-Levels for Autonomous Cooperative Vehicle Networks [pdf]
Tobias Madl
2021 IEEE Intelligent Vehicles Symposium IV
|
|
A Comparative Security Analysis of the German Federal Postal Voting Process [pdf]
Michael P. Heinl, Simon Gölz, and Christoph Bösch
DG.O2021: The 22nd Annual International Conference on Digital Government Research
|
|
SEVerity: Code Injection Attacks against Encrypted Virtual Machines [pdf]
Mathias Morbitzer, Sergej Proskurin, Martin Radev, Erick Quintanar Salas, and Marko Dorfhuber
IEEE Workshop on Offensive Technologies (WOOT)
|
|
Method Confusion Attack on Bluetooth Pairing
Maximilian Tschirschnitz, Ludwig Peuckert, Fabian Franzen, and Jens Grossklags
IEEE Symposium on Security and Privacy (Oakland)
|
2020 |
ρFEM: Efficient Backward-edge Protection Using Reversed Forward-edge Mappings
Paul Muntean, Matthias Neumayer, Zhiqiang Lin, Gang Tan, Jens Grossklags, and Claudia Eckert
Annual Computer Security Applications Conference (ACSAC), ACM, 2020
|
|
Detecting and Categorizing Android Malware with Graph Neural Networks
Peng Xu, Claudia Eckert, and Apostolis Zarras
The 36th ACM/SIGAPP Symposium On Applied Computing
|
|
IntRepair: Informed Repairing of Integer Overflows [pdf]
Paul Muntean, Martin Monperrus, Hao Sun, Jens Grossklags, and Claudia Eckert
International Conference on Software Engineering (ICSE), Journal First, ACM/IEEE
|
|
xMP: Selective Memory Protection for Kernel and User Space
Sergej Proskurin, Marius Momeu, Seyedhamed Ghavamnia, Vasileios P. Kemerlis, and Michalis Polychronakis
IEEE Symposium on Security and Privacy (Oakland)
|
|
FridgeLock: Preventing Data Theft on Suspended Linux with Usable Memory Encryption
Fabian Franzen, Manuel Andreas, and Manuel Huber
Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy
|
2019 |
Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger Cryptography [pdf]
Felix Fischer, Huang Xiao, Ching-Yu Kao, Yannick Stachelscheid, Benjamin Johnson, Danial Raza, Paul Fawkesley, Nat Buckley, Konstantin Böttinger, Paul Muntean, and Jens Grossklags
28th USENIX Security Symposium (USENIX Security 19)
|
|
Analyzing Control Flow Integrity with LLVM-CFI [pdf]
Paul Muntean, Matthias Neumayer, Zhiqiang Lin, Gang Tan, Jens Grossklags, and Claudia Eckert
Annual Computer Security Applications Conference (ACSAC), ACM, 2019.
|
|
IntRepair: Informed Repairing of Integer Overflows [pdf]
Paul Muntean, Martin Monperrus, Hao Sun, Jens Grossklags, and Claudia Eckert
Transactions on Software Engineering (TSE), IEEE
|
|
MANIS: Evading Malware Detection System on Graph Structure
Peng Xu, Bojan Kolosnjaji, Claudia Eckert, and Apostolis Zarras
The 35th ACM/SIGAPP Symposium On Applied Computing
|
2018 |
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables
Bojan Kolosnjaji
Proceedings of the European Signal Processing Conference (EUSIPCO 2018)
|
|
Freeze and crypt: Linux kernel support for main memory encryption
Manuel Huber, Julian Horsch, Junaid Ali, and Sascha Wessel
Computers & security
|
|
Hardware-accelerated Data Acquisition and Authentication for High-speed Video Streams on Future Heterogeneous Automotive Processing Platforms [pdf]
Martin Geier and Fabian Franzen
Proceedings of the International Conference on Computer-Aided Design
|
|
Classifying malware attacks in IaaS cloud environments
Peng Xu
Journal of cloud computing
|
|
Learning on a Budget for User Authentication on Mobile Devices
Bojan Kolosnjaji, Antonia Hüfner, Claudia Eckert, and Apostolis Zarras
Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2018)
|
|
Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection
Sergej Proskurin, Tamas Lengyel, Marius Momeu, Claudia Eckert, and Apostolis Zarras
Annual Computer Security Applications Conference (ACSAC)
|
|
SEVered: Subverting AMD's virtual machine encryption [pdf]
Mathias Morbitzer, Manuel Huber, Julian Horsch, and Sascha Wessel
European Workshop on Systems Security (EuroSec)
|
|
Kernel-Assisted Debugging of Linux Applications
Tobias Holl, Philipp Klocke, Fabian Franzen, and Julian Kirsch
2nd Reversing and Offensive-oriented Trends Symposium 2018 (ROOTS)
|
|
High-performance unsupervised anomaly detection for cyber-physical system networks [pdf]
Peter Schneider and Konstantin Böttinger
Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC)
|
|
τCFI: Type-Assisted Control Flow Integrity for x86-64 Binaries. [pdf]
Paul Muntean, Gang Tan, Zhiqiang Lin, Jens Grossklags, and Claudia Eckert
Research in Attacks, Intrusions, and Defenses - 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12,2018, Proceedings
|
|
PwIN: Pwning Intel piN -- Why DBI is Unsuitable for Security
Julian Kirsch, Zhechko Zhechev, Bruno Bierbaumer, and Thomas Kittel
23rd European Symposium on Research in Computer Security (ESORICS)
|
|
Follow the WhiteRabbit: Towards Consolidation of On-the-Fly Virtualization and Virtual Machine Introspection
Sergej Proskurin, Julian Kirsch, and Apostolis Zarras
IFIP International Conference on ICT Systems Security and Privacy Protection (IFIP SEC)
|
|
Practical Decentralized Attribute-Based Delegation Using Secure Name Systems [pdf]
Martin Schanzenbach, Christian Banse, and Julian Schütte
International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
|
|
CastSan: Efficient Detection of Polymorphic {C++} Object Type Confusions with {LLVM} [pdf]
Paul Muntean, Sebastian Wuerl, Jens Grossklags, and Claudia Eckert
Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}
|
|
LUCON: Data Flow Control for Message-Based IoT Systems [pdf]
Julian Schütte and Gerd Brost
17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
|
|
Attack Graph-Based Assessment of Exploitability Risks in Automotive On-Board Networks [pdf]
Martin Salfer and Claudia Eckert
Proceedings of the 13th International Conference on Availability, Reliability and Security ARES 2018
|
|
reclaimID: Secure, Self-Sovereign Identities Using Name Systems and Attribute-Based Encryption [pdf]
Martin Schanzenbach, Georg Bramm, and Julian Schütte
International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
|
|
Smashing the Stack Protector for Fun and Profit
Bruno Bierbaumer, Julian Kirsch, Thomas Kittel, Aurélien Francillon, and Apostolis Zarras
IFIP Information Security Conference & Privacy Conference (IFIP SEC)
|
|
Deep Reinforcement Fuzzing [pdf]
Konstantin Böttinger, Patrice Godefroid, and Rishabh Singh
IEEE Symposium on Security and Privacy Workshops, SPW 2018
|
|
Security Verification of Third Party Design Files in Manufacturing [pdf]
Alexander Giehl and Norbert Wiedermann
International Conference on Computer and Automation Engineering (ICCAE)
|
|
Graph-based Anomaly Detection for IoT Microservices [pdf]
François-Xavier Aubet, Marc-Oliver Pahl, Stefan Liebald, and Mohammad Reza Norouzian
Passive and Active Measurement (PAM)
|
2017 |
Cyber-Sicherheit in Industrie 4.0 [pdf]
Claudia Eckert
Handbuch Industrie 4.0 Geschäftsmodelle, Prozesse, Technik
|
|
Evaluating the performance of continuous test-based cloud service certification [pdf]
Phlilipp Stephanow and Christian Banse
17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGRID
|
|
Spoilers: Effective Malware Triage Using Hidden Fields
Zachary Hanif and Bojan Kolosnjaji
Microsoft DCC
|
|
Cybersicherheit beyond 2020!: Herausforderungen für die IT-Sicherheitsforschung
Claudia Eckert
Informatik-Spektrum 40
|
|
Security Testing over Encrypted Channels on the ARM Platform
Fatih Kilic, Benedikt Geßele, and Hasan Ibne Akram
Proceedings of the 12th International Conference on Internet Monitoring and Protection (ICIMP 2017)
|
|
Enhancing Control Flow Graph Based Binary Function Identification
Clemens Jonischkeit and Julian Kirsch
1st Reversing and Offensive-oriented Trends Symposium 2017 (ROOTS)
|
|
Dynamic Loader Oriented Programming on Linux
Julian Kirsch, Bruno Bierbaumer, Thomas Kittel, and Claudia Eckert
1st Reversing and Offensive-oriented Trends Symposium 2017 (ROOTS)
|
|
A survey on authorization in distributed systems: Information storage, data retrieval and trust evaluation [pdf]
Ava Ahadipour and Martin Schanzenbach
16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications,
|
|
TransCrypt: Transparent main memory encryption using a minimal ARM hypervisor [pdf]
Julian Horsch, Manuel Huber, and Sascha Wessel
16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
|
|
Hiding Behind the Shoulders of Giants: Abusing Crawlers for Indirect Web Attacks
Apostolis Zarras and Federico Maggi
15th Annual Conference on Privacy, Security and Trust (PST)
|
|
Freeze & crypt: Linux kernel support for main memory encryption [pdf]
Manuel Huber, Julian Horsch, and Sascha Wessel
CETE 2017, 14th International Joint Conference on e-Business and Telecommunications.
|
|
Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage [pdf]
George Webster, Bojan Kolosnjaji, Christian von Pentz, Zachary Hanif, Julian Kirsch, Apostolis Zarras, and Claudia Eckert
14th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)
|
|
Architecture for Resource-Aware VMI-based Cloud Malware Analysis
B. Taubmann and Bojan Kolosnjaji
4th Workshop on Security in highly connected IT systems
|
|
A taxonomy-based approach for security in software-defined networking [pdf]
Christian Banse and Julian Schütte
EEE International Conference on Communications, ICC 2017
|
|
Guiding a colony of black-box fuzzers with chemotaxis [pdf]
Konstantin Böttinger
SPW 2017, IEEE Symposium on Security and Privacy Workshops.
|
|
Empowering Convolutional Networks for Malware Classification and Analysis
Bojan Kolosnjaji, Ghadir Eraisha, George Webster, Apostolis Zarras, and Claudia Eckert
30th International Joint Conference on Neural Networks (IJCNN)
|
|
Combating Control Flow Linearization
Julian Kirsch, Clemens Jonischkeit, Thomas Kittel, Apostolis Zarras, and Claudia Eckert
32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC)
|
|
Towards Automated Classification of Firmware Images and Identification of Embedded Devices
Andrei Costin, Apostolis Zarras, and Aurélien Francillon
32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC)
|
|
Stack overflow considered harmful? The impact of copy&paste on Android application security [pdf]
Felix Fischer, Konstantin Böttinger, Huang Xiao, Christian Stransky, Yasemin Acar, Michael Backes, and Sascha Fahl
IEEE Symposium on Security and Privacy, SP 2017
|
|
Protecting Suspended Devices from Memory Attacks [pdf]
Manuel Huber, Julian Horsch, and Sascha Wessel
EuroSec'17 Proceedings of the 10th European Workshop on Systems Security
|
|
A process model to support continuous certification of cloud services [pdf]
Immanuel Kunz and Phlilipp Stephanow
AINA 2017, 31st IEEE International Conference on Advanced Information Networking and Applications
|
|
Towards continuous security certification of Software-as-a-Service applications using web application testing techniques [pdf]
Phlilipp Stephanow and Koosha Khajehmoogahi
AINA 2017, 31st IEEE International Conference on Advanced Information Networking and Applications
|
|
Size Matters: Open-Source Framework for Large Scale Analysis
George Webster and Christian von Pentz
Microsoft DCC
|
|
From Mole Hills to Mountains: Revealing Rich Header and Malware Triage
George Webster and Zachary Hanif
RSA USA
|
2016 |
Fuzzing binaries with Lévy flight swarms [pdf]
Konstantin Böttinger
EURASIP journal on information security (2016)
|
|
A flexible framework for mobile device forensics based on cold boot attacks [pdf]
Manuel Huber, Benjamin Taubmann, Sascha Wessel, Hans P. Reiser, and Georg Sigl
EURASIP journal on information security 2016
|
|
A data usage control system using dynamic taint tracking [pdf]
Julian Schütte and Gerd Brost
AINA 2016, 30st IEEE International Conference on Advanced Information Networking and Applications
|
|
CoKey: Fast token-based cooperative cryptography [pdf]
Julian Horsch, Sascha Wessel, and Claudia Eckert
Association for Computing Machinery -ACM-
|
|
Deep Learning for Classification of Malware System Call Sequences
Bojan Kolosnjaji, Apostolis Zarras, George Webster, and Claudia Eckert
29th Australasian Joint Conference on Artificial Intelligence (AI)
|
|
POSTER: vTableShield: Precise Protecting of Virtual Function Dispatches in C++ Programs
Paul Muntean, Peng Xu, and Claudia Eckert
Google Ph.D. Student Summit on Compiler & Programming Technology, Munich, Germany
|
|
Managing and presenting user attributes over a decentralized secure name system [pdf]
Martin Schanzenbach and Christian Banse
Data privacy management and security assurance. 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016
|
|
Novel weaknesses in IEC 62351 protected Smart Grid control systems [pdf]
Maximilian Strobel, Norbert Wiedermann, and Claudia Eckert
IEEE International Conference on Smart Grid Communications, SmartGridComm 2016
|
|
Supporting Risk Assessment with the Systematic Identification, Merging, and Validation of Security Goals [pdf]
Daniel Angermeier, Alexander Nieding, and Jörn Eichler
4th International Workshop, RISK 2016
|
|
A Study of the Rich Header and Respective Malware Triage
George Webster and Julian Kirsch
Hacktivity
|
|
Policy-based implicit attestation for microkernel-based virtualized systems [pdf]
Steffen Wagner and Claudia Eckert
Information security. 19th international conference, ISC 2016
|
|
Leveraging Internet Services to Evade Censorship
Apostolis Zarras
19th International Conference on Information Security (ISC)
|
|
SKALD: A Scalable Architecture for Feature Extraction, Multi-User Analysis, and Real-Time Information Sharing [pdf]
George Webster, Zachary Hanif, Apostolis Zarras, and Claudia Eckert
19th International Conference on Information Security (ISC)
|
|
Efficient Data-Race Detection with Dynamic Symbolic Execution
Andreas Ibing
IEEE Software Engineering Workshop
|
|
Autocorrelation-Based Detection of Infinite Loops at Runtime
Andreas Ibing, Julian Kirsch, and Lorenz Panny
IEEE Int. Conf. Dependable, Autonomic and Secure Computing
|
|
DeepFuzz: Triggering vulnerabilities deeply hidden in binaries [pdf]
Konstantin Böttinger and Claudia Eckert
Detection of intrusions and malware, and vulnerability assessment. 13th International Conference
|
|
Detecting and correlating supranational threats for critical infrastructures
Konstantin Böttinger, Gerhard Hansch, and Bartol Filipovic
15th European Conference on Cyber Warfare and Security
|
|
Adaptive Semantics-Aware Malware Classification
Bojan Kolosnjaji, Apostolis Zarras, Tamas Lengyel, George Webster, and Claudia Eckert
13th Conference on Detection of Intrusions and Malware \& Vulnerability Assessment (DIMVA)
|
|
Test-based cloud service certification of opportunistic providers [pdf]
Philipp Stephanow, Gaurav Srivastava, and Julian Schütte
IEEE 9th International Conference on Cloud Computing
|
|
Hunting bugs with Lévy flight foraging [pdf]
Konstantin Böttinger
IEEE Symposium on Security and Privacy Workshops, SPW 2016
|
|
Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces
Andrei Costin, Apostolis Zarras, and Aurélien Francillon
11th ACM Asia Conference on Computer and Communications Security (ASIACCS)
|
|
Interactive Function Identification Decreasing the Effort of Reverse Engineering [pdf]
Fatih Kilic, Hannes Laner, and Claudia Eckert
Proceedings of the 11th International Conference on Information Security and Cryptology (Inscrypt 2015)
|
|
K-word proximity search on encrypted data [pdf]
Mark Gall and Gerd Brost
IEEE 30th International Conference on Advanced Information Networking and Applications
|
|
Neuralyzer: Flexible Expiration Times for the Revocation of Online Data
Apostolis Zarras, Katharina Kohls, Markus Duermuth, and Christina Poepper
6th ACM Conference on Data and Application Security and Privacy (CODASPY)
|
|
Dynamic Symbolic Execution with Interpolation Based Path Merging
Andreas Ibing
Int. Conf. Advances and Trends in Software Engineering
|
|
Generating threat profiles for cloud service certification systems
Philipp Stephanow, Christian Banse, and Julian Schütte
IEEE 17th International Symposium on High Assurance Systems Engineering
|
2015 |
Neural Network-Based User-Independent Physical Activity Recognition for Mobile Devices
Bojan Kolosnjaji and Claudia Eckert
Intelligent Data Engineering and Automated Learning--IDEAL 2015
|
|
iDeFEND: Intrusion Detection Framework for Encrypted Network Data [pdf]
Fatih Kilic and Claudia Eckert
Proceedings of the 14th International Conference on Cryptology and Network Security (CANS 2015)
|
|
iDeFEND: Intrusion Detection Framework for Encrypted Network Data [pdf]
Fatih Kilic and Claudia Eckert
Proceedings of the 14th International Conference on Cryptology and Network Security (CANS 2015)
|
|
Fraunhofer-Gesellschaft A secure architecture for operating system-level virtualization on mobile devices [pdf]
Manuel Huber, Julian Horsch, Michael Velten, Michael Weiss, and Sascha Wessel
Information security and cryptology. 11th international conference, Inscrypt 2015
|
|
seTPM: Towards Flexible Trusted Computing on Mobile Devices based on GlobalPlatform Secure Elements
Sergej Proskurin, Michael Weiss, and Georg Sigl
14th International Conference on Smart Card Research and Advanced Applications (CARDIS)
|
|
Counteracting Data-Only Malware with Code Pointer Examination
Thomas Kittel, Julian Kirsch, and Claudia Eckert
18th International Symposium on Research in Attacks, Intrusions and Defenses
|
|
Dynamic Symbolic Execution using Eclipse CDT
Andreas Ibing
Int. Conf. Software Eng. Advances
|
|
CloudIDEA: A Malware Defense Architecture for Cloud Data Centers
Andreas Fischer, Thomas Kittel, Bojan Kolosnjaji, Tamas Lengyel, Waseem Mandarawi, Hans P Reiser, B. Taubmann, Eva Weishäupl, Hermann de Meer, Tilo Müller, and Mykola Protsenko
5th International Symposium on Cloud Computing, Trusted Computing and Secure Virtual Infrastructures - Cloud and Trusted Computing (C&TC 2015)
|
|
POSTER: Automated Generation of Buffer Overflow Quick Fixes using Symbolic Execution and SMT
Paul Muntean and Claudia Eckert
TechDays Cyber Security Workshop, Munich, Germany
|
|
Automated Generation of Buffer Overflows Quick Fixes using Symbolic Execution and SMT
Paul Muntean, Vasantha Kommanapalli, Andreas Ibing, and Claudia Eckert
International Conference on Computer Safety, Reliability & Security (SAFECOMP), Delft, The Netherlands, September 2015. Springer LNCS
|
|
Virtual Machine Introspection with Xen on ARM
Tamas Lengyel, Thomas Kittel, and Claudia Eckert
2nd Workshop on Security in highly connected IT systems (SHCIS)
|
|
Automated Detection of Information Flow Vulnerabilities in UML State Charts and C Code
Paul Muntean, Adnan Rabbi, Andreas Ibing, and Claudia Eckert
International Conference on Software Quality, Reliability and Security Companion (QRS-C), Vancouver, Canada
|
|
Attack Surface and Vulnerability Assessment of Automotive Electronic Control Units [pdf]
Martin Salfer and Claudia Eckert
SECRYPT 2015 - Proceedings of the 12th International Conference on Security and Cryptography
|
|
Internet-Scale File Analysis
Zachary Hanif, Tamas Lengyel, and George Webster
Black Hat - USA
|
|
Revealing the Relationship Network Behind Link Spam
Apostolis Zarras, Antonis Papadogiannakis, Sotiris Ioannidis, and Thorsten Holz
13th Annual Conference on Privacy, Security and Trust (PST)
|
|
Is Feature Selection Secure against Training Data Poisoning?
Huang Xiao, Battista Biggio, Gavin Brown, Giorgio Fumera, Claudia Eckert, and Fabio Roli
Proceedings of The 32nd International Conference on Machine Learning (ICML'15)
|
|
POSTER: Automated Generation of Buffer Overflow Quick Fixes using Symbolic Execution and SMT
Paul Muntean and Claudia Eckert
Security Network Munich and BICCnet Workshop, Munich, Germany
|
|
Retrospective Protection utilizing Binary Rewriting
Sergej Proskurin, Fatih Kilic, and Claudia Eckert
14. Deutscher IT-Sicherheitskongress
|
|
User Identity Verification Based on Touchscreen Interaction Analysis in Web Contexts
Michael Velten, Peter Schneider, Sascha Wessel, and Claudia Eckert
Proceedings of the 11th International Conference on Information Security Practice and Experience (ISPEC 2015)
|
|
Detecting Fingerprinted Data in TLS Traffic
Konstantin Böttinger, Dieter Schuster, and Claudia Eckert
Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS)
|
|
Industrie 4.0 meets IT-Sicherheit: eine Herausforderung!
Claudia Eckert and Niels Fallenbeck
Informatik-Spektrum
|
|
Blind Format String Attacks
Fatih Kilic, Thomas Kittel, and Claudia Eckert
Proceedings of the 10th International Conference on Security and Privacy in Communication Networks (SecureComm 2014)
|
|
A Fixed-Point Algorithm for Automated Static Detection of Infinite Loops
Andreas Ibing and A. Mai
IEEE Int. Symp. High Assurance Systems Eng.
|
2014 |
SobiTra – A Software-based Trust-Anchor for ARM Cortex Application Processors
Julian Horsch, Sascha Wessel, Frederic Stumpf, and Claudia Eckert
Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (CODASPY ’14)
|
|
IT-Sicherheit und Cloud Computing
Niels Fallenbeck and Claudia Eckert
Springer Vieweg
|
|
Efficient Attack Forest Construction for Automotive On-board Networks [pdf]
Martin Salfer, Hendrik Schweppe, and Claudia Eckert
Lecture Notes in Computer Science
|
|
Virtual Machine Introspection with Xen on ARM
Tamas Lengyel
-
|
|
Code Validation for Modern OS Kernels
Thomas Kittel, Sebastian Vogl, Tamas Lengyel, Jonas Pfoh, and Claudia Eckert
Workshop on Malware Memory Forensics (MMF)
|
|
Pitfalls of virtual machine introspection on modern hardware
Tamas Lengyel, Thomas Kittel, George Webster, and Jacob Torrey
1st Workshop on Malware Memory Forensics (MMF)
|
|
Scalability, Fidelity and Stealth in the DRAKVUF Dynamic Malware Analysis System [pdf]
Tamas Lengyel, Steve Maresca, Bryan Payne, George Webster, Sebastian Vogl, and Aggelos Kiayias
Proceedings of the 30th Annual Computer Security Applications Conference
|
|
Context-sensitive Detection of Information Exposure Bugs with Symbolic Execution
Paul Muntean, Claudia Eckert, and Andreas Ibing
International Workshop on Innovative Software Development Methodologies and Practices (InnoSWDev), Hong Kong, China
|
|
The Art of False Alarms in the Game of Deception: Leveraging Fake Honeypots for Enhanced Security
Apostolis Zarras
48th IEEE International Carnahan Conference on Security Technology (ICCST)
|
|
Multi-tiered Security Architecture for ARM via the Virtualization and Security Extensions
Tamas Lengyel, Thomas Kittel, and Claudia Eckert
1st Workshop on Security in highly connected IT systems
|
|
Support Vector Machines under Adversarial Label Contamination
Huang Xiao, Battista Biggio, Blaine Nelson, Han Xiao, Claudia Eckert, and Fabio Roli
Journal of Neurocomputing, Special Issue on Advances in Learning with Label Noise
|
|
Dynamic Hooks: Hiding Control Flow Changes within Non-Control Data [pdf]
Sebastian Vogl, Robert Gawlik, Behrad Garmany, Thomas Kittel, Jonas Pfoh, Claudia Eckert, and Thorsten Holz
Proceedings of the 23rd USENIX Security Symposium
|
|
Automated Generation of Models for Fast and Precise Detection of HTTP-Based Malware
Apostolis Zarras, Antonis Papadogiannakis, Robert Gawlik, and Thorsten Holz
12th Annual Conference on Privacy, Security and Trust (PST)
|
|
IT-Sicherheit im Auto - Graphen-basierte Angriffssicherheitsevaluation von automobilen Bordnetzen.
Martin Salfer
BMW ProMotion Dialogtag
|
|
Persistent Data-only Malware: Function Hooks without Code [pdf]
Sebastian Vogl, Jonas Pfoh, Thomas Kittel, and Claudia Eckert
Proceedings of the 21th Annual Network & Distributed System Security Symposium (NDSS)
|
2013 |
Security Challenges in Automotive Hardware/Software Architecture Design
Florian Sagstetter, Martin Lukasiewycz, Sebastian Steinhorst, Marko Wolf, Alexandre Bouard, William R. Harris, Somesh Jha, Thomas Peyrin, Axel Poschmann, and Samarjit Chakraborty
Design, Automation and Test in Europe (DATE 2013)
|
|
Distributed Privacy-Preserving Aggregation of Metering Data in Smart Grids
Cristina Rottondi, Giacomo Verticale, and Christoph Krauß
IEEE Journal on Selected Areas in Communication (JSAC) - JSAC Smart Grid Communications Series
|
|
Identities for Embedded Systems Enabled by Physical Unclonable Functions
Dominik Merli, Georg Sigl, and Claudia Eckert
Number Theory and Cryptography (Lecture Notes in Computer Science)
|
|
Security Issues of Multi-Core Architectures—The Automotive Case
Thomas Kittel and Claudia Eckert
it-Information Technology
|
|
Middleware-based Security for Hyperconnected Applications in Future In-Car Networks
Alexandre Bouard, Dennis Burgkhardt, and Claudia Eckert
EAI Endorsed Transactions on Mobile Communications and Applications
|
|
Practical Information-Flow Aware Middleware for In-Car Communication
Alexandre Bouard, Benjamin Weyl, and Claudia Eckert
Workshop on Security, Privacy and Dependability for CyberVehicles (CyCAR’13)
|
|
Leveraging In-Car Security by Combining Information Flow Monitoring Techniques
Alexandre Bouard, Hendrik Schweppe, Benjamin Weyl, and Claudia Eckert
Second International Conference on Advances in Vehicular Systems Technologies and Applications (VEHICULAR 2013)
|
|
Middleware-Based Security and Privacy for In-car Integration of Third-Party Applications
Alexandre Bouard, Maximilian Graf, and Dennis Burgkhardt
Trust Management VII
|
|
Automotive Proxy-based Security Architecture for CE Device Integration
Alexandre Bouard, Johannes Schanda, Daniel Herrscher, and Claudia Eckert
Mobile Wireless Middleware, Operating Systems, and Applications
|
|
Comprehensive Analysis of Software Countermeasures Against Fault Attacks
Nikolaus Theissing, Dominik Merli, Michael Smola, Frederic Stumpf, and Georg Sigl
Design, Automation and Test in Europe (DATE 2013)
|
|
PAL - Privacy Augmented LTE: A Privacy-Preserving Scheme for Vehicular LTE Communication
Daniel Angermeier, Alexander Kiening, and Frederic Stumpf
Proceedings of the 10th ACM International Workshop on Vehicular Internetworking, Systems, and Applications (ACM VANET 2013)
|
|
Improving Mobile Device Security with Operating System-level Virtualization
Sascha Wessel, Frederic Stumpf, Ilja Herdt, and Claudia Eckert
28th IFIP International Information Security and Privacy Conference (SEC 2013)
|
|
A Decisional Attack to Privacy-friendly Data Aggregation in Smart Grids
Cristina Rottondi, Marco Savi, Daniele Polenghi, Giacomo Verticale, and Christoph Krauß
IEEE Globecom 2013 - Symposium on Selected Areas in Communications - GC13 SAC Green Communication Systems and Networks
|
|
k-subscription: Privacy-preserving Microblogging Browsing through Obfuscation
Panagiotis Papadopoulos, Antonis Papadogiannakis, Apostolis Zarras, Thorsten Holz, Michalis Polychronakis, and Evangelos P. Markatos
29th ACM Annual Computer Security Applications Conference (ACSAC)
|
|
Online Lazy Gaussian Process Committee and its Application in Real-Time Trajectory Prediction
Han Xiao and Claudia Eckert
Information Sciences
|
|
Efficient Online Sequence Prediction with Side Information
Han Xiao and Claudia Eckert
IEEE International Conference on Data Mining (ICDM)
|
|
Active File Integrity Monitoring using Paravirtualized Filesystems.
Michael Velten, Sascha Wessel, Frederic Stumpf, and Claudia Eckert
Proceedings of the 5th International Conference on Trusted Systems (InTrust 2013)
|
|
Indicative Support Vector Clustering with its Application on Anomaly Detection
Huang Xiao and Claudia Eckert
IEEE 12th International Conference on Machine Learning and Applications (ICMLA'13)
|
|
Verifiable Trust between Electronic Control Units based on a single Trust Anchor
Alexander Kiening, Christoph Krauß, and Claudia Eckert
11th Embedded Security in Cars (escar)
|
|
Lightweight Attestation & Secure Code Update for Multiple Separated Microkernel Tasks
Steffen Wagner, Christoph Krauß, and Claudia Eckert
Proceedings of the ISC 2013: The 16th Information Security Conference
|
|
Sicherheitsarchitektur - Quantitative Bewertung von Sicherheitsarchitekturen virtualisierter Mehrkern-Steuergeräte.
Martin Salfer
BMW ProMotion Dialogtag
|
|
Lazy Gaussian Process Committee for Real-Time Online Regression
Han Xiao and Claudia Eckert
27th AAAI Conference on Artificial Intelligence (AAAI '13)
|
|
Powwow: A Tool for Collaborative Software Jam Sessions [pdf]
Paul Muntean, Damir Ismailović, Sebastian Paetzold, and Bernd Bruegge
International Conference on Advanced Collaborative Networks, Systems and Applications (COLLA), Nice, France
|
|
Secure Distributed Data Aggregation in the Automatic Metering Infrastructure of Smart Grids
Cristina Rottondi, Giacomo Verticale, and Christoph Krauß
IEEE International Conference on Communications (ICC) - Selected Areas in Communications Symposium (ICC SAC)
|
|
Using Trusted Platform Modules for Location Assurance in Cloud Networking
Christoph Krauß and Volker Fusenig
Proceedings of the 7th International Conference on Network and System Security (NSS 2013)
|
|
Leveraging String Kernels for Malware Detection
Jonas Pfoh, Christian Schneider, and Claudia Eckert
Proceedings of the 7th International Conference on Network and System Security
|
|
X-TIER: Kernel Module Injection
Sebastian Vogl, Fatih Kilic, Christian Schneider, and Claudia Eckert
Proceedings of the 7th International Conference on Network and System Security
|
|
Learning from Multiple Observers with Unknown Expertise
Han Xiao, Huang Xiao, and Claudia Eckert
Proceedings of 17th Pacific-Asia Conference on Knowledge Discovery and Data Mining
|
|
Full Virtual Machine State Reconstruction for Security Applications
Christian Schneider
|
|
OPARS: Objective Photo Aesthetics Ranking System
Huang Xiao, Han Xiao, and Claudia Eckert
34th European Conference on Information Retrieval (ECIR'13)
|
|
A Framework for the Creation of Mobile Educational Games for Dyslexic Children
Juan Haladjian, Daniel Richter, Paul Muntean, Damir Ismailović, and Bernd Bruegge
International Conference on Mobile Learning (ML), Lisbon, Portugal
|
|
Leveraging Derivative Virtual Machine Introspection Methods for Security Applications
Jonas Pfoh
|
|
Analysis and improvment of security services schemes in EPON system [pdf]
Peng Xu
Optical Communication Technology
|
2012 |
Smart Mobile Apps -- Mit Business-Apps ins Zeitalter mobiler Geschäftsprozesse [pdf]
Claudia Eckert and Christian Schneider
Springer
|
|
Actively Learning Probabilistic Subsequential Transducers [pdf]
Hasan Ibne Akram, Colin de la Higuera, and Claudia Eckert
Proceedings of ICGI
|
|
Localized Electromagnetic Analysis of Cryptographic Implementations
Johann Heyszl, Stefan Mangard, Benedikt Heinz, Frederic Stumpf, and Georg Sigl
Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012
|
|
A Cache Timing Attack on AES in Virtualization Environments
Michael Weiss, Benedikt Heinz, and Frederic Stumpf
14th International Conference on Financial Cryptography and Data Security (Financial Crypto 2012)
|
|
Page-based Runtime Integrity Protection of User and Kernel Code
Sascha Wessel and Frederic Stumpf
Proceedings of EuroSec'12, 5th European Workshop on System Security
|
|
Complementary IBS: Application Specific Error Correction for PUFs
Matthias Hiller, Dominik Merli, Frederic Stumpf, and Georg Sigl
IEEE Int. Symposium on Hardware-Oriented Security and Trust
|
|
Attestation of Mobile Baseband Stacks
Steffen Wagner, Sascha Wessel, and Frederic Stumpf
The 6th International Conference on Network and System Security (NSS 2012)
|
|
Secure and Privacy-Aware Multiplexing of Hardware-Protected TPM Integrity Measurements among Virtual Machines
Michael Velten and Frederic Stumpf
15th International Conference on Information Security and Cryptology (ICISC 2012)
|
|
A Secure Architecture for Smart Meter Systems
Konstantin Böttinger, Daniel Angermeier, Andreas Ibing, Dieter Schuster, Frederic Stumpf, and Dirk Wacker
4th International Symposium on Cyberspace Safety and Security (CSS 2012)
|
|
A New Security Architecture for Smartcards Utilizing PUFs
Thomas Esbach, Walter Fumy, Olga Kulikovska, Dominik Merli, Dieter Schuster, and Frederic Stumpf
Information Security Solutions Europe (ISSE 2012)
|
|
The design and implementation of 128-bit AES encryption in PRIME [pdf]
Peng Xu
International Conference on Computer Science and Information Technology
|
|
Implementation of a Protocol for Secure Distributed Aggregation of Smart Metering Data
Cristina Rottondi, Giacomo Verticale, and Christoph Krauß
International Conference on Smart Grid Technology, Economics and Policies (SG-TEP 2012)
|
|
Automotive Proxy-based Security Architecture for CE Device Integration
Alexandre Bouard, Daniel Herrscher, Johannes Schanda, and Claudia Eckert
MOBILWARE 2012, 5th International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications, Berlin, Germany, November 13–14, 2012
|
|
Driving Automotive Middleware Towards a Secure IP-based Future
Alexandre Bouard, Anke Jentzsch, Benjamin Glas, Alexander Kiening, Thomas Kittel, and Benjamin Weyl
10th conference for Embedded Security in Cars (Escar'12)
|
|
Towards Secure Fieldbus Communication
Felix Wieczorek, Christoph Krauß, Frank Schiller, and Claudia Eckert
31st International Conference on Computer Safety, Reliability and Security (SAFECOMP)
|
|
Flash: Efficient, Stable and Optimal K-Anonymity
Florian Kohlmayer, Fabian Prasser, Claudia Eckert, Alfons Kemper, and Klaus A. Kuhn
Proceedings of the 4th IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT)
|
|
B@bel: Leveraging Email Delivery for Spam Mitigation
Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, and Giovanni Vigna
21st USENIX Security Symposium
|
|
Adversarial Label Flips Attack on Support Vector Machines
Han Xiao, Huang Xiao, and Claudia Eckert
20th European Conference on Artificial Intelligence (ECAI)
|
|
AWESOME - Automated Web Emulation for Secure Operation of a Malware-Analysis Environment [pdf]
Martin Brunner, Christian M. Fuchs, and Sascha Todt
Proceedings of the Sixth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2012)
|
|
E/E-Sicherheitsarchitektur - IT-Sicherheit virtualisierter Mehrkern-Systeme im Fahrzeug.
Martin Salfer
BMW ProMotion Dialogtag
|
|
A Framework for Game Tuning [pdf]
Juan Haladjian, Blagina Simeonova, Barbara Köhler, Frank Ziegler, Paul Muntean, Damir Ismailović, and Bernd Bruegge
IADIS Game and Entertainment Techonologies (GET), Lisbon, Portugal
|
|
Smart Camp: Building Scalable and Highly Available IT-Infrastructures
Sergej Proskurin, David McMeekin, and Achim Karduck
6th IEEE International Conference on Digital Ecosystems and Technologies (DEST) - Complex Environment Engineering
|
|
Highly Efficient Optimal K-Anonymity For Biomedical Datasets
Florian Kohlmayer, Fabian Prasser, Claudia Eckert, Alfons Kemper, and Klaus A. Kuhn
Proceedings of the 25th IEEE International Symposium on Computer-Based Medical Systems (CBMS)
|
|
Evasion Attack of Multi-Class Linear Classifiers
Han Xiao, Thomas Stibor, and Claudia Eckert
Proceedings of the 16th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD)
|
|
Virtualisierung: Vision einer intelligenten Vernetzung. [pdf]
Hans-Ulrich Michel, Dirk Kaule, and Martin Salfer
Elektronik automotive
|
|
Using Hardware Performance Events for Instruction-Level Monitoring on the x86 Architecture
Sebastian Vogl and Claudia Eckert
Proceedings of {EuroSec}'12, 5th European Workshop on System Security
|
|
Bridging the Semantic Gap Through Static Code Analysis
Christian Schneider, Jonas Pfoh, and Claudia Eckert
Proceedings of {EuroSec}'12, 5th European Workshop on System Security
|
2011 |
Sicherheit im Smart Grid - Herausforderungen und Handlungsempfehlungen
Claudia Eckert and Christoph Krauß
Datenschutz und Datensicherheit
|
|
Innovative Sicherheitstechnologien: sine-qua-non für safety-kritische Systeme?
Claudia Eckert
IT-Sicherheit zwischen Regulierung und Innovation, Tagungsband zur zweiten EICT-Konferenz IT-Sicherheit
|
|
A Cost-Effective FPGA-based Fault Simulation Environment
Angelika Janning, Johann Heyszl, Frederic Stumpf, and Georg Sigl
Proceedings of the Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2011)
|
|
Semi-invasive EM Attack on FPGA RO PUFs and Countermeasures
Dominik Merli, Dieter Schuster, Frederic Stumpf, and Georg Sigl
Proceedings of the 6th Workshop on Embedded Systems Security (WESS 2011)
|
|
Asymmetric Cryptography in Automotive Access and Immobilizers
Johann Heyszl and Frederic Stumpf
Proceedings of the 9th escar Embedded Security in Cars Conference
|
|
Nitro: Hardware-based System Call Tracing for Virtual Machines [pdf]
Jonas Pfoh, Christian Schneider, and Claudia Eckert
Advances in Information and Computer Security
|
|
A Universal Semantic Bridge for Virtual Machine Introspection
Christian Schneider, Jonas Pfoh, and Claudia Eckert
Information Systems Security
|
|
T-CUP: A TPM-based Code Update Protocol Enabling Attestations for Sensor Networks
Steffen Wagner, Christoph Krauß, and Claudia Eckert
7th International ICST Conference on Security and Privacy in Communication Networks (SecureComm)
|
|
Understanding Fraudulent Activities in Online Ad Exchanges
Brett Stone-Gross, Ryan Stevens, Apostolis Zarras, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna
11th ACM SIGCOMM Internet Measurement Conference (IMC)
|
|
A cooperative in-car game for heterogeneous players [pdf]
Nora Broy, Sebastian Goebl, Matheus Hauder, Thomas Kothmayr, Michael Kugler, Florian Reinhart, Martin Salfer, Kevin Schlieper, and Elisabeth André
Proceedings of the 3rd International Conference on Automotive User Interfaces and Interactive Vehicular Applications
|
|
Data Provenance with Watermarks for Usage Control Monitors at Disaster Recovery
Martin Salfer, Sven Wohlgemuth, Sebastian Schrittwieser, Bernhard Bauer, and Isao Echizen
Internet of Things (iThings/CPSCom), 2011 International Conference on and 4th International Conference on Cyber, Physical and Social Computing
|
|
A Supervised Topic Transition Model for Detecting Malicious System Call Sequences
Thomas Stibor and Han Xiao
KDD Workshop on Knowledge Discovery, Modeling, and Simulation
|
|
Artificial Immune Systems - 10th International Conference, ICARIS 2011, Cambridge, UK, July 18-21, 2011. Proceeding [pdf]
Pietro Lio, Giuseppe Nicosia, and Thomas Stibor
|
|
Side-Channel Analysis of PUFs and Fuzzy Extractors
Dominik Merli, Dieter Schuster, Frederic Stumpf, and Georg Sigl
4th International Conference on Trust and Trustworthy Computing (Trust 2011)
|
2010 |
Toward Artificial Synesthesia: Linking Images and Sounds via Words
Han Xiao and Frederic Stumpf
NIPS Workshop on Machine Learning for Next Generation Computer Vision Challenges
|
|
Leveraging Attestation Techniques for Trust-Establishment in Distributed Systems
Frederic Stumpf
|
|
On Immunological Memory as a Function of a Recursive Proliferation Process
Thomas Stibor and Anastasio Salazar-Banuelos
15th IEEE International Conference on Engineering of Complex Computer Systems
|
|
Grammatical Inference Algorithms in MATLAB
Hasan Ibne Akram, Colin de la Higuera, Huang Xiao, and Claudia Eckert
ICGI 2010: Proceedings of the 10th International Colloquium on Grammatical Inference
|
|
Detecting Compromised Nodes in Wireless Sensor Networks: Misbehavior-based Detection versus Attestation-based Detection
Christoph Krauß
it-Information Technology
|
|
A Security Model for Future Vehicular Electronic Infrastructures
Roland Bless, Gerrit Grotewold, Christian Haas, Boris Hackstein, Stefan Hofmann, Anke Jentzsch, Alexander Kiening, Christoph Krauß, Julian Lamberty, Michael Müter, Peter Schoo, Lars Völker, and Christoph Werle
8th Embedded Security in Cars (escar)
|
|
Handling Insider Attacks in Wireless Sensor Networks
Christoph Krauß
|
|
Efficient Collapsed Gibbs Sampling For Latent Dirichlet Allocation
Han Xiao and Thomas Stibor
Asian Conference on Machine Learning (ACML)
|
|
Simplifying Parallel and Distributed Simulation with the DUP System
Nathan S. Evans, Chris GauthierDickey, Christian Grothoff, Krista Grothoff, Jeff Keene, and Matthew J. Rutherford
Proceedings of the 2010 Spring Simulation Multiconference (SpringSim'10)
|
|
Distributed Stream Processing with DUP
Kai Christian Bader, Tilo Eißler, Nathan S. Evans, Chris GauthierDickey, Christian Grothoff, Krista Grothoff, Jeff Keene, Harald Meier, Craig Ritzdorf, and Matthew J. Rutherford
IFIP International Conference on Network and Parallel Computing (NPC 2010)
|
|
PSMA: A Parallel Algorithm for Learning Regular Languages [pdf]
Hasan Ibne Akram, Alban Batard, Colin de la Higuera, and Claudia Eckert
NIPS Workshop on Learning on Cores, Clusters and Clouds
|
|
A Study of Detecting Computer Viruses in Real-Infected Files in the n-gram Representation with Machine Learning Methods
Thomas Stibor
A Study of Detecting Computer Viruses in Real-Infected Files in the n-gram Representation with Machine Learning Methods
|
|
Infiltrating critical infrastructures with next-generation attacks: W32.Stuxnet as a showcase threat [pdf]
Martin Brunner, Hans Hofinger, Christoph Krauß, Christopher Roblee, Peter Schoo, and Sascha Todt
Fraunhofer SIT, Darmstadt
|
|
Improving the Quality of Ring Oscillator PUFs on FPGAs
Dominik Merli, Frederic Stumpf, and Claudia Eckert
Proceedings of the 5th Workshop on Embedded Systems Security (WESS'2010)
|
|
Konzept für ein deutschlandweites Krankheitsnetz am Beispiel von mitoREGISTER
Florian Kohlmayer, R.R. Lautenschläger, S.H.R Wurst, T. Klopstock, H. Prokisch, T. Meitinger, Claudia Eckert, and Klaus A. Kuhn
GI Jahrestagung (2)
|
|
Anonymity and Privacy in Distributed Early Warning Systems
Martin Brunner, Hans Hofinger, Christopher Roblee, Peter Schoo, and Sascha Todt
roceedings of the 5th International Conference on Critical Information Infrastructures Security (CRITIS 2010)
|
|
The Fraunhofer SIT malware analysis laboratory - establishing a secured, honeynet-based cyber threat analysis and research environment [pdf]
Martin Brunner, Michael Epah, Hans Hofinger, Christopher Roblee, Peter Schoo, and Sascha Todt
Fraunhofer SIT, Darmstadt
|
|
Datenschutz und Datensicherheit in intelligenten Energienetzen
Petra Beenken, Hans-Jürgen Appelrath, and Claudia Eckert
DACH Security 2010
|
|
MalCoBox: Designing a 10 Gb/s Malware Collection Honeypot Using Reconfigurable Technology [pdf]
Sascha Muehlbach, Martin Brunner, Christopher Roblee, and Andreas Koch
Field Programmable Logic and Applications (FPL), 2010 International Conference on
|
|
Exploiting the x86 Architecture to Derive Virtual Machine State Information
Jonas Pfoh, Christian Schneider, and Claudia Eckert
Proceedings of the Fourth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2010)
|
|
Efficient One-Pass Entity Authentication based on ECC for Constrained Devices
Johann Heyszl and Frederic Stumpf
IEEE Int. Symposium on Hardware-Oriented Security and Trust
|
|
Mobile Robot Navigation on Partially Known Maps using a Fast A* Algorithm Version
Paul Muntean
IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR 2010), presented at the student session, not published
|
|
Digitale Daten in Geräten und Systemen
Claudia Eckert
Carl-Heymanns-Verlag
|
2009 |
PDoS-Resilient Push Protocols for Sensor Networks
Matthias Enzmann, Christoph Krauß, and Claudia Eckert
The Third International Conference on Sensor Technologies and Applications (SENSORCOMM 2009)
|
|
On Multi-Authority Ciphertext-Policy Attribute-Based Encryption
Sascha Müller, Stefan Katzenbeisser, and Claudia Eckert
Bulletin of the Korean Mathematical Society
|
|
Translation-based steganography
Christian Grothoff, Krista Grothoff, Ludmila Alkhutova, and Mikhail J. Atallah
Journal of Computer Security
|
|
User-centric Identity Management in Ambient Environments
Hasan Ibne Akram and Mario Hoffmann
International Journal on Advances in Intelligent Systems
|
|
Short Hash-based Signatures for Wireless Sensor Networks
Erik Dahmen and Christoph Krauß
Proceedings of the 8th International Conference on Cryptology and Network Security (CANS 2009)
|
|
A Formal Model for Virtual Machine Introspection [pdf]
Jonas Pfoh, Christian Schneider, and Claudia Eckert
Proceedings of the 2nd Workshop on Virtual Machine Security (VMSec '09)
|
|
A Security Architecture for Multipurpose ECUs in Vehicles
Frederic Stumpf, Christian Meves, Benjamin Weyl, and Marko Wolf
25. VDI/VW-Gemeinschaftstagung: Automotive Security
|
|
Foundations of r-contiguous Matching in Negative Selection for Anomaly Detection [pdf]
Thomas Stibor
Natural Computing
|
|
Identity Metasystem in Location Based Persistent Authentication
Hasan Ibne Akram, Christian Damsgaard, Christian Damsgaard Jensen, and Mario Hoffmann
In Proceedings of the 3rd European Workshop on Combining Context with Trust, Security and Privacy (EuroCAT09)
|
|
On Controlled Sharing of Virtual Goods
Claudia Eckert, Frederic Stumpf, and Omid Tafreschi
Proceedings of the 7th International Workshop for Technical, Economic and Legal Aspects of Business Models for Virtual Goods
|
|
ITK-Kompendium 2010
Claudia Eckert
FAZ-Institut
|
|
Geometrical Insights into the Dendritic Cell Algorithm
Thomas Stibor, Robert Oates, Graham Kendall, and Jonathan M. Garibaldi
Proceedings of the Genetic and Evolutionary Computation Conference (GECCO-2009)
|
|
Revocation of TPM Keys
Stefan Katzenbeisser, Klaus Kursawe, and Frederic Stumpf
Proceedings of the Second International Conference on Trusted Computing (TRUST 2009)
|
|
Enhancing Control of Service Compositions in Service-Oriented Architectures
Christian Schneider, Frederic Stumpf, and Claudia Eckert
Proceedings of the Third International Workshop on Advances in Information Security ({WAIS} 2009)
|
2008 |
Ways to Track Your Lover
Lars Fischer and Claudia Eckert
Proceedings of the WiVeC Symposium 2008
|
|
Measuring Unlinkability Revisited
Lars Fischer, Stefan Katzenbeisser, and Claudia Eckert
Seventh ACM Workshop on Privacy in the Electronic Society (WPES '08)
|
|
Defending against False-Endorsement-Based DoS Attacks in Wireless Sensor Networks
Christoph Krauß, Markus Schneider, and Claudia Eckert
WiSec '08: Proceedings of the First ACM Conference on Wireless Network Security
|
|
An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs
Christoph Krauß, Markus Schneider, and Claudia Eckert
International Workshop on Security and Privacy in Wireless and Mobile Computing, Networking and Communications
|
|
On Handling Insider Attacks in Wireless Sensor Networks
Christoph Krauß, Markus Schneider, and Claudia Eckert
Information Security Technical Report
|
|
Distributed Attribute-Based Encryption
Sascha Müller, Stefan Katzenbeisser, and Claudia Eckert
11th International Conference on Information Security and Cryptology (ICISC 08)
|
|
An Empirical Study of Self/Non-Self Discrimination in Binary Data with a Kernel Estimator
Thomas Stibor
Proceedings of the 7th International Conference on Artificial Immune Systems (ICARIS)
|
|
Discriminating Self from Non-Self with Finite Mixtures of Multivariate Bernoulli Distributions
Thomas Stibor
Proceedings of the Genetic and Evolutionary Computation Conference (GECCO)
|
|
Towards Secure E-Commerce Based on Virtualization and Attestation Techniques
Frederic Stumpf, Claudia Eckert, and Shane Balfe
Proceedings of the Third International Conference on Availability, Reliability and Security (ARES 2008)
|
|
A Reputation System for Electronic Negotiations
O. Tafreschi, D. Maehler, J. Fengel, M. Rebstock, and Claudia Eckert
Computer Standards & Interfaces
|
|
Theoretical Advances in Artificial Immune Systems
Jonathan Timmis, Andrew Hone, Thomas Stibor, and Ed Clark
Theoretical Computer Science
|
|
Improving the Scalability of Platform Attestation
Frederic Stumpf, Stefan Katzenbeisser, and Claudia Eckert
Proceedings of the Third ACM Workshop on Scalable Trusted Computing (ACM STC'08)
|
|
Laws of Identity in Ambient Environments: The HYDRA Approach [pdf]
Hasan Ibne Akram and Mario Hoffmann
Mobile Ubiquitous Computing, Systems, Services and Technologies, 2008. UBICOMM '08. The Second International Conference on
|
|
Distributed Attribute-Based Encryption
Sascha Müller, Stefan Katzenbeisser, and Claudia Eckert
11th International Conference on Information Security and Cryptology (ICISC 08)
|
|
Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques
Frederic Stumpf and Claudia Eckert
Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2008)
|
|
Measuring Unlinkability Revisited
Lars Fischer, Stefan Katzenbeisser, and Claudia Eckert
Seventh ACM Workshop on Privacy in the Electronic Society (WPES '08)
|
|
Supports for Identity Management in Ambient Environments - The Hydra Approach [pdf]
Hasan Ibne Akram and Mario Hoffmann
International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services I-CENTRIC 2008, In Proceedings of ICSNC '08.
|
|
Requirements Analysis for Identity Management in. Ambient Environments: The HYDRA Approach
Hasan Ibne Akram and Mario Hoffmann
In Proceedings of the 2nd International Workshop on Combining Context with Trust, Security, and Privacy
|
2007 |
Phase Transition and the Computational Complexity of Generating r-contiguous Detectors
Thomas Stibor
Proceedings of the 6th International Conference on Artificial Immune Systems (ICARIS-2007)
|
|
Situation-based Policy Enforcement
Thomas Buntrock, Hans-Christian Esperer, and Claudia Eckert
Proceedings of the 4th International Conference on Trust, Privacy and Security in Digital Business (TrustBus'07)
|
|
Comments on Real-Valued Negative Selection vs. Real-Valued Positive Selection and One-Class SVM
Thomas Stibor and J. Timmis
Proceedings of the Congress on Evolutionary Computation (CEC-2007)
|
|
Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques
Christoph Krauß, Frederic Stumpf, and Claudia Eckert
Proceedings of the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks
|
|
Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques
Christoph Krauß, Thomas Stibor, and Claudia Eckert
Proceedings of the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks
|
|
A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks
Christoph Krauß, Markus Schneider, Kpatcha Bayarou, and Claudia Eckert
2nd International Conference on Availability, Reliability and Security ({ARES}) 2007
|
|
Ambient Intelligence: Neue Herausforderungen fuer die IT-Sicherheit
Claudia Eckert
TU-Darmstadt, thema Forschung
|
2006 |
Lost in just the translation
Ryan Stutsman, Christian Grothoff, Mikhail Atallah, and Krista Grothoff
Proceedings of the the 21st Annual ACM Symposium on Applied Computing (SAC 2006)
|
|
Artificial Immune Systems for IT-Security
Thomas Stibor, J. Timmis, and Claudia Eckert
it-Information Technology (Systems Biology and Information Technology)
|
|
On the Use of Hyperspheres in Artificial Immune Systems as Antibody Recognition Regions
Thomas Stibor, J. Timmis, and Claudia Eckert
Proceedings of the 5th International Conference on Artificial Immune Systems (ICARIS-2006)
|
|
On Permutation Masks in Hamming Negative Selection
Thomas Stibor, J. Timmis, and Claudia Eckert
Proceedings of the 5th International Conference on Artificial Immune Systems (ICARIS-2006)
|
|
Hades - Hardware Assisted Document Security
P. Röder, Frederic Stumpf, R. Grewe, and Claudia Eckert
Second Workshop on Advances in Trusted Computing (WATC '06 Fall)
|
|
A Robust Integrity Reporting Protocol for Remote Attestation
Frederic Stumpf, Omid Tafreschi, Patrick Röder, and Claudia Eckert
Second Workshop on Advances in Trusted Computing (WATC '06 Fall)
|
|
History-based Access Control and Information Flow Control for Structured Documents
P. Röder, O. Tafreschi, C. Müller, and Claudia Eckert
Proceedings of the First International Workshop on Security (IWSEC 2006)
|
|
Experimental Performance Evaluation of Secure, Mobile IP-based, 3G-WLAN Handover.
R. Marx, K.M. Bayarou, Claudia Eckert, M. Mattheß, M. Ritscher, M. Lananier, A.R. Prasad, Peter Schoo, and A. Zugenmaier
Wireless Personal Multimedia Communications (WPMC)
|
|
Secure Mobility in Beyond 3G
A.R. Prasad, J. Laganier, A. Zugenmaier, Peter Schoo, K.M. Bayarou, Claudia Eckert, R. Marx, M. Mattheß, and M. Ritscher
Wireless Personal Multimedia Communications (WPMC)
|
|
The Link between r-contiguous Detectors and k-CNF Satisfiability
Thomas Stibor, J. Timmis, and Claudia Eckert
Proceedings of the Congress on Evolutionary Computation (CEC-2006)
|
|
Generalization Regions in Hamming Negative Selection
Thomas Stibor, J. Timmis, and Claudia Eckert
Intelligent Information Systems (IIS-2006)
|
|
On the Appropriateness of Negative Selection for Anomaly Detection and Network Intrusion Detection
Thomas Stibor
|
|
Interworking von UMTS und WLAN: Nutzen und Sicherheitsaspekte
K.M. Bayarou and Claudia Eckert
Telekommunikation Aktuell, Berichte aus Forschung und Entwicklung in Informationstechnik und Telekommunikation
|
2005 |
Secure mobile business solutions for real-time enterprises
Claudia Eckert
Springer-Verlag
|
|
Security Issues of Mobile Devices
Claudia Eckert
Security in Pervasive Computing, Second International Conference, SPC 2005
|
|
RBAC Policy Engineering with Patterns
T. Rochaeli and Claudia Eckert
Proceedings of the Semantic Web and Policy Workshop
|
|
Is Negative Selection Appropriate for Anomaly Detection ?
Thomas Stibor, P. Mohr, J. Timis, and Claudia Eckert
Proceedings of the ACM SIGEVO Genetic and Evolutionary Computation Conference (GECCO-2005)
|
|
A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques [pdf]
Thomas Stibor, Jonathan Timmis, and Claudia Eckert
Proceedings of the 4th International Conference on Artificial Immune Systems (ICARIS-2005)
|
|
Mobile Kommunikation: Technik und Sicherheitsprobleme
Claudia Eckert
Datenschutz in der mobilen Welt - Realität oder Utopie?
|
|
Kundenbindung durch ein anonymes Rabattsystem
Claudia Eckert, M. Enzmann, S. Okunick, and M. Schneider
Konferenz D-A-CH Security
|
|
Translation-Based Steganography
Krista Grothoff
Proceedings of the 2005 Information Hiding Workshop
|
|
Mobile Technologien -- Chancen und neue IT-Sicherheitsrisiken
Claudia Eckert
9ter deutscher Sicherheitskongreß des BSI
|
|
Ubiquitäre Sicherheit für dynamische, mobile Systeme – eine Herausforderung für die IT-Sicherheit
Claudia Eckert
PIK
|
|
NoSE - building virtual honeynets made easy
Frederic Stumpf, Andreas Görlach, and Lars Brückner
Proceedings of the 12th International Linux System Technology Conference (Linux-Kongress 2005)
|
|
Identification of Security Requirements in WLAN-WLAN Inter-Domain Handovers based on Threat And Risk Analysis
M. Mattheß, Christoph Krauß, K.M. Bayarou, Claudia Eckert, A.R. Prasad, and Peter Schoo
The 8th International Symposium on Wireless Personal Multimedia Communications WPMC 2005
|
|
On the Appropriateness of Negative Selection defined over Hamming Shape-Space as a Network Intrusion Detection System
Thomas Stibor, J. Timmis, and Claudia Eckert
Proceedings of the Congress on Evolutionary Computation (CEC-2005)
|
2004 |
An Investigation of R-Chunk Detector Generation on Higher Alphabets
Thomas Stibor, K.M. Bayarou, and Claudia Eckert
Genetic and Evolutionary Computation GECCO 2004
|
|
Protected Transmission of Biometric Authentication Data for Oncard-Matching
U. Waldmann, D. Scheuermann, and Claudia Eckert
SAC 2004 Security
|
|
NGN, AII-IP, B3G: Enabler für das Future Net?! Üerblick über Entwicklungen im Bereich zukünftiger Netze
Claudia Eckert, K.M. Bayarou, and S. Rohr
Informatik-Spektrum
|
|
Semantic Representation of English Phrasal Verbs
Krista Grothoff, Julija Televnaja, Christian Hempelmann, and Katarina Triezenberg
Intelligent Information Systems
|
|
Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text
Krista Grothoff
|
|
Interworking von UMTS und WLAN: eine sicherheitstechnische Betrachtung
Claudia Eckert, K.M. Bayarou, and S. Rohr
18. DFN-Tagung
|
|
Technologie-Entwicklungen und Probleme auf dem Weg zum Future Net
Claudia Eckert
18. DFN-Tagung
|
|
SIMS - eine Simulationsumgebung zur Analyse von Klassen von Angriffen
K.M. Bayarou, Claudia Eckert, and M. Steiner
Konferenz D-A-CH Security,
|
|
IT-Sicherheit: Probleme, Lösungen und einige neue Herausforderungen
Claudia Eckert
TU-Darmstadt, thema Forschung
|
2003 |
gap - Practical Anonymous Networking
Krista Grothoff and Christian Grothoff
Privacy Enhancing Technologies, Third International Workshop (PET 2003)
|
|
Sicheres mobiles Arbeiten - Zwischen Wunsch und Wirklichkeit
Claudia Eckert
Zeitschrift FifF-Kommunikation
|
|
Mobil, aber sicher!
Claudia Eckert
Springer Verlag
|
|
Schwerpunkt "IT-Sicherheit" Mobiles Arbeiten, sind Sie sicher?
Claudia Eckert
Zeitschrift "Frauenarbeit und Informatik", Schwerpunkt "IT-Sicherheit"
|
|
Sicherheit und E-Learning
Claudia Eckert
Workshop "E-Learning: Beherrschbarkeit und Sicherheit"
|
|
Die Technik in der IT-Sicherheit
Claudia Eckert and J. Dittmann
Zeitschrift "Frauenarbeit und Informatik", Schwerpunkt "IT-Sicherheit"
|
|
Schutz biometrischer Daten bei Authentisierung auf Smartcards
U. Waldmann, D. Scheuermann, and Claudia Eckert
Konferenz D-A-CH Security
|
|
Sicherheit -- Bremse oder Schrittmacher? [pdf]
Claudia Eckert
Comtec zeitschrift für Telekommunikationstechnik
|
2002 |
Pseudonymes Einkaufen physischer Güter für Internet-Shops ohne Zwischenhändler
M. Enzmann and Claudia Eckert
Konferenz Elektronische Geschäftsprozesse
|
|
IT-Sicherheit - Schrittmacher oder Bremser der Innovationen
Claudia Eckert and H. Thielman
Springer Verlag
|
|
Efficient Sharing of Encrypted Data
Krista Grothoff, Christian Grothoff, Tzvetan Horozov, and Ioana Patrascu
Information Security and Privacy, 7th Australian Conference (ACISP 2002)
|
|
IT-Sicherheit: Innovationen für die Informations- und Wissensgesellschaft
Claudia Eckert and H. Thielman
M, Fachzeitschrift für Information Management & Consulting
|
|
Ein Vergleich moderner Linux-Sicherheitsmechanismen
Claudia Eckert, H. Görl, and A. Buchmann
Konferenz Elektronische Geschäftsprozesse
|
2001 |
Anonym im Internet? Probleme und Lösungen
Claudia Eckert and A. Pircher
Arbeitskonferenz Kommunikationssicherheit
|
|
Internet Anonymity: Problems and Solutions
Claudia Eckert and A. Pircher
Proceedings of the International Conference on Information Security, Trusted Information - The New Decade Challenge
|
|
Zur Sicherheit mobiler persönlicher Endgeräte - eine Bestandsaufnahme
Claudia Eckert
Arbeitskonferenz Kommunikationssicherheit
|
2000 |
Mobile Devices In eBusiness - New Opportunities And New Risks
Claudia Eckert
Proceedings of the SIS2000 Workshop
|
|
Trust and Confidence in Open Systems: Does Security Harmonize with Mobility?
U. Baumgarten, Claudia Eckert, and H. Görl
9th ACM SIGOPS European Workshop Beyond the PC: New Challenges for the Operating Systems
|
|
GSFS - a New Group-Aware Cryptographic File System
Claudia Eckert, F. Erhard, and J. Geiger
Proceedings of the World Computer Congress, SEC2000
|
|
Flexible, Distributed and Adaptive Ressource Managament in MoDIS
Claudia Eckert, M. Pizka, and C. Rehn
Proceedings Europar2000
|
|
GSFS - ein gruppenfähiges, verschlüsselndes Dateisystem
F. Erhard, J. Geiger, and Claudia Eckert
Arbeitskonferenz Systemsicherheit
|
1999 |
Improving Resource Management in Distributed Systems using Language-level Structuring Concepts
Claudia Eckert and M. Pizka
The Journal of Supercomputing
|
1998 |
Mobil und anonym im Netz mit dem Mixed Mobile Internet Protocol
Claudia Eckert and U. Baumgarten
Zeitschrift der Datenschutz-Berater
|
|
Sichere, verteilte Systeme – Konzepte, Modelle und Systemarchitekturen
Claudia Eckert
|