Number of items: 315.
Conference or Workshop Item (A Paper)
Zhang, Boyang and Zheng, Li and Yang, Ziqing and He, Xinlei and Backes, Michael and Fritz, Mario and Zhang, Yang
(2024)
SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models.
(In Press)
Jallow, Alfusainey and Schilling, Michael and Backes, Michael and Bugiel, Sven
(2024)
Measuring the Effects of Stack Overflow Code Snippet Evolution on Open-Source Software Security.
Qu, Yiting and Shen, Xinyue and He, Xinlei and Backes, Michael and Zannettou, Savvas and Zhang, Yang
(2023)
Unsafe Diffusion: On the Generation of Unsafe Images and
Hateful Memes From Text-To-Image Models.
(Submitted)
Wang, Haiming and Zhang, Zhikun and Wang, Tianhao and He, Shibo and Backes, Michael and Chen, Jiming and Zhang, Yang
(2023)
PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov Model.
Li, Zheng and Yu, Ning and Salem, Ahmed and Backes, Michael and Fritz, Mario and Zhang, Yang
(2023)
UnGANable: Defending Against GAN-based Face Manipulation.
Staicu, Cristian-Alexandru and Rahaman, Sazzadur and Kiss, Ágnes and Backes, Michael
(2023)
Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages.
Rasifard, Hamed and Gopinath, Rahul and Backes, Michael and Nemati, Hamed
(2023)
SEAL: Capability-Based Access Control for Data-Analytic Scenarios.
(In Press)
Ghorbani Lyastani, Sanam and Bugiel, Sven and Backes, Michael
(2023)
A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites.
Qu, Yiting and He, Xinlei and Pierson, Shannon and Backes, Michael and Zhang, Yang and Zannettou, Savvas
(2023)
On the Evolution of (Hateful) Memes by Means of Multimodal Contrastive Learning.
Li, Zheng and Liu, Yiyong and He, Xinlei and Yu, Ning and Backes, Michael and Zhang, Yang
(2022)
Auditing Membership Leakages of Multi-Exit Networks.
Shen, Yun and Han, Yufei and Zhang, Zhikun and Chen, Min and Yu, Ting and Backes, Michael and Zhang, Yang and Stringhini, Gianluca
(2022)
Finding MNEMON: Reviving Memories of Node Embeddings.
(In Press)
Nguyen, Trung Tin and Backes, Michael and Stock, Ben
(2022)
Freely Given Consent? Studying Consent Notice of Third-Party Tracking and Its Violations of GDPR in Android Apps.
(In Press)
Chen, Min and Zhang, Zhikun and Wang, Tianhao and Backes, Michael and Humbert, Mathias and Zhang, Yang
(2022)
Graph Unlearning.
(In Press)
Liu, Yiyong and Zhao, Zhengyu and Backes, Michael and Zhang, Yang
(2022)
Membership Inference Attacks by Exploiting Loss Trajectory.
Huang, Hai and Zhang, Zhikun and Shen, Yun and Backes, Michael and Li, Qi and Zhang, Yang
(2022)
On the Privacy Risks of Cell-Based NAS Architectures.
Si, Wai Man and Backes, Michael and Blackburn, Jeremy and De Cristofaro, Emiliano and Stringhini, Gianluca and Zannettou, Savvas and Zhang, Yang
(2022)
Why So Toxic? Measuring and Triggering Toxic Behavior in Open-Domain Chatbots.
Backes, Michael and Berrang, Pascal and Hanzlik, Lucjan and Pryvalov, Ivan
(2022)
A framework for constructing Single Secret Leader Election from MPC.
(In Press)
Liu, Yugeng and Wen, Rui and He, Xinlei and Salem, Ahmed and Zhang, Zhikun and Backes, Michael and De Cristofaro, Emiliano and Fritz, Mario and Zhang, Yang
(2022)
ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models.
Zhang, Zhikun and Chen, Min and Backes, Michael and Shen, Yun and Zhang, Yang
(2022)
Inference Attacks Against Graph Neural Networks.
Bieringer, Lukas and Grosse, Kathrin and Backes, Michael and Biggio, Battista and Krombholz, Katharina
(2022)
Industrial practitioners' mental models of adversarial machine learning.
Salem, Ahmed and Wen, Rui and Backes, Michael and Ma, Shiqing and Zhang, Yang
(2022)
Dynamic Backdoor Attacks Against Machine Learning Models.
Shen, Xinyue and He, Xinlei and Backes, Michael and Blackburn, Jeremy and Zannettou, Savvas and Zhang, Yang
(2022)
On Xing Tian and the Perseverance of Anti-China Sentiment Online.
Salem, Ahmed and Backes, Michael and Zhang, Yang
(2022)
Get a Model! Model Hijacking Attack Against Machine Learning Models.
Chen, Min and Zhang, Zhikun and Wang, Tianhao and Backes, Michael and Humbert, Mathias and Zhang, Yang
(2021)
When Machine Unlearning Jeopardizes Privacy.
Roth, Sebastian and Gröber, Lea and Backes, Michael and Krombholz, Katharina and Stock, Ben
(2021)
12 Angry Developers – A Qualitative Study on Developers’ Struggles with CSP.
Fass, Aurore and Somé, Dolière Francis and Backes, Michael and Stock, Ben
(2021)
DoubleX: Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale.
Huang, Jie and Backes, Michael and Bugiel, Sven
(2021)
A11y and Privacy don’t have to be mutually exclusive: Constraining Accessibility Service Misuse on Android.
(In Press)
Elbitar, Yusra and Schilling, Michael and Nguyen, Trung Tin and Backes, Michael and Bugiel, Sven
(2021)
Explanation Beats Context: The Effect of Timing & Rationales on Users’ Runtime Permission Decisions.
Zhang, Zhikun and Wang, Tianhao and Honorio, Jean and Li, Ninghui and Backes, Michael and He, Shibo and Chen, Jiming and Zhang, Yang
(2021)
PrivSyn: Differentially Private Data Synthesis.
He, Xinlei and Jia, Jinyuan and Gong, Neil Zhenqiang and Backes, Michael and Zhang, Yang
(2021)
Stealing Links from Graph Neural Networks.
Nguyen, Trung Tin and Backes, Michael and Marnau, Ninja and Stock, Ben
(2021)
Share First, Ask Later (or Never?) - Studying Violations of GDPR's Explicit Consent in Android Apps.
Oltrogge, Marten and Huaman, Nicolas and Amft, Sabrina and Acar, Yasemin and Backes, Michael and Fahl, Sascha
(2021)
Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications.
(In Press)
Künnemann, Robert and Garg, Deepak and Backes, Michael
(2021)
Accountability in the Decentralised-Adversary Setting.
(In Press)
Hanzlik, Lucjan and Zhang, Yang and Grosse, Kathrin and Salem, Ahmed and Augustin, Maximilian and Backes, Michael and Fritz, Mario
(2021)
MLCapsule: Guarded Offline Deployment of Machine Learning as a Service.
Nguyen, Trung Tin and Nguyen, Duc Cuong and Schilling, Michael and Wang, Gang and Backes, Michael
(2021)
Measuring User Perception for Detecting Unexpected Access to Sensitive Resource in Mobile Apps.
(Submitted)
Moog, Marvin and Demmel, Markus and Backes, Michael and Fass, Aurore
(2021)
Statically Detecting JavaScript Obfuscation and Minification Techniques in the Wild.
Grosse, Kathrin and Backes, Michael
(2021)
Do winning tickets exist before DNN training?
Chen, Xiaoyi and Salem, Ahmed and Chen, Dingfan and Backes, Michael and Ma, Shiqing and Shen, Qingni and Wu, Zhonghai and Zhang, Yang
(2021)
BadNL: Backdoor Attacks against NLP Models with Semantic-preserving Improvements.
Nguyen, Duc Cuong and Derr, Erik and Backes, Michael and Bugiel, Sven
(2020)
Up2Dep: Android Tool Support to Fix Insecure Code Dependencies.
Tran, Nicolas and Speicher, Patrick and Künnemann, Robert and Backes, Michael and Torralba, Àlvaro and Hoffmann, Jörg
(2020)
Planning in the Browser.
Hagestedt, Inken and Humbert, Mathias and Berrang, Pascal and Lehmann, Irina and Eils, Roland and Backes, Michael and Zhang, Yang
(2020)
Membership Inference Against DNA Methylation Databases.
Salem, Ahmed and Bhattacharya, Apratim and Backes, Michael and Fritz, Mario and Zhang, Yang
(2020)
Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning.
Calzavara, Stefano and Roth, Sebastian and Rabitti, Alvise and Backes, Michael and Stock, Ben
(2020)
A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web.
Roth, Sebastian and Backes, Michael and Stock, Ben
(2020)
Assessing the Impact of Script Gadgets on CSP at Scale.
Ghorbani Lyastani, Sanam and Schilling, Michael and Neumayr, Michaela and Backes, Michael and Bugiel, Sven
(2020)
Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication.
Esiyok, Ilkan and Hanzlik, Lucjan and Künnemann, Robert and Budde, Lena Marie and Backes, Michael
(2020)
TrollThrottle — Raising the Cost of Astroturfing.
Zhang, Yang and Humbert, Mathias and Surma, Bartlomiej and Manoharan, Praveen and Vreeken, Jilles and Backes, Michael
(2020)
Towards Plausible Graph Anonymization.
Fass, Aurore and Backes, Michael and Stock, Ben
(2019)
JStap: A Static Pre-Filter for Malicious JavaScript Detection.
Jia, Jinyuan and Salem, Ahmed and Backes, Michael and Gong, Neil Zhenqiang and Zhang, Yang
(2019)
MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples.
Fass, Aurore and Backes, Michael and Stock, Ben
(2019)
HideNoSeek: Camouflaging Malicious JavaScript in Benign ASTs.
Rahman, Tahleen and Surma, Bartlomiej and Backes, Michael and Zhang, Yang
(2019)
Fairwalk: Towards Fair Graph Embedding.
Nguyen, Duc Cuong and Derr, Erik and Backes, Michael and Bugiel, Sven
(2019)
Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security & Privacy.
Eskandarian, Saba and Cogan, Jonathan and Birnbaum, Sawyer and Brandon, Peh Chang Wei and Franke, Dillon and Fraser, Forest and Garcia, Gaspar and Gong, Eric and Nguyen, Hung T. and Sethi, Taresh K. and Subbiah, Vishal and Backes, Michael and Pellegrino, Giancarlo and Boneh, Dan
(2019)
Fidelius: Protecting User Secrets from Compromised Browsers.
Hagestedt, Inken and Zhang, Yang and Humbert, Mathias and Berrang, Pascal and Haixu, Tang and XiaoFeng, Wang and Backes, Michael
(2019)
MBeacon: Privacy-Preserving Beacons for DNA Methylation Data.
Salem, Ahmed and Zhang, Yang and Humbert, Mathias and Berrang, Pascal and Fritz, Mario and Backes, Michael
(2019)
ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models.
Künnemann, Robert and Esiyok, Ilkan and Backes, Michael
(2019)
Automated Verification of Accountability in Security Protocols.
(In Press)
Künnemann, Robert and Garg, Deepak and Backes, Michael
(2019)
Causality & Control flow.
(In Press)
Backes, Michael and Hanzlik, Lucjan and Herzberg, Amir and Kate, Aniket and Pryvalov, Ivan
(2019)
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup.
(In Press)
Dax, Alexander and Tangermann, Sven and Künnemann, Robert and Backes, Michael
(2019)
How to wrap it up - A formally verified proposal for the use of authenticated wrapping in PKCS#11.
(In Press)
Backes, Michael and Hanzlik, Lucjan and Schneider-Bensch, Jonas
(2019)
Membership Privacy for Fully Dynamic Group Signatures.
Backes, Michael and Döttling, Nico and Hanzlik, Lucjan and Kluczniak, Kamil and Schneider, Jonas
(2019)
Ring Signatures: Logarithmic Size, No Setup -- from Standard Assumptions.
Speicher, Patrick and Steinmetz, Marcel and Hoffmann, Jörg and Backes, Michael and Künnemann, Robert
(2019)
Towards Automated Network Mitigation Analysis.
Speicher, Patrick and Steinmetz, Marcel and Hoffmann, Jörg and Backes, Michael and Künnemann, Robert
(2019)
Towards Automated Network Mitigation Analysis (extended version).
Huang, Jie and Pereira Borges Jr., Nataniel and Bugiel, Sven and Backes, Michael
(2019)
Up-To-Crash: Evaluating Third-Party Library Updatability on Android.
Ghorbani Lyastani, Sanam and Schilling, Michael and Fahl, Sascha and Backes, Michael and Bugiel, Sven
(2018)
Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse.
Fass, Aurore and Krawczyk, Robert and Backes, Michael and Stock, Ben
(2018)
JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript.
Xu, Meng and Qian, Chenxiong and Lu, Kangjie and Backes, Michael and Kim, Taesoo
(2018)
Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels.
Berrang, Pascal and Humbert, Mathias and Zhang, Yang and Lehmann, Irina and Eils, Roland and Backes, Michael
(2018)
Dissecting Privacy Risks in Biomedical Data.
Zhang, Yang and Humbert, Mathias and Rahman, Tahleen and Li, Cheng-Te and Pang, Jun and Backes, Michael
(2018)
Tagvisor: A Privacy Advisor for Sharing Hashtags.
Stock, Ben and Pellegrino, Giancarlo and Li, Frank and Backes, Michael and Rossow, Christian
(2018)
Didn’t You Hear Me? — Towards More Successful Web Vulnerability Notifications.
Speicher, Patrick and Steinmetz, Marcel and Künnemann, Robert and Simeonovski, Milivoj and Pellegrino, Giancarlo and Hoffmann, Jörg and Backes, Michael
(2018)
Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure.
Asghar, Muhammad Rizwan and Backes, Michael and Simeonovski, Milivoj
(2018)
PRIMA: Privacy-Preserving Identity and Access Management at Internet-Scale.
Salem, Ahmed and Berrang, Pascal and Humbert, Mathias and Backes, Michael
(2018)
Privacy-Preserving Similar Patient Queries for Combined Biomedical Data.
(In Press)
Oltrogge, Marten and Derr, Erik and Stransky, Christian and Acar, Yasemin and Fahl, Sascha and Rossow, Christian and Pellegrino, Giancarlo and Bugiel, Sven and Backes, Michael
(2018)
The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators.
Backes, Michael and Hanzlik, Lucjan and Kluczniak, Kamil and Schneider, Jonas
(2018)
Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys.
(In Press)
Speicher, Patrick and Steinmetz, Marcel and Backes, Michael and Hoffmann, Jörg and Künnemann, Robert
(2018)
Stackelberg Planning: Towards Effective Leader-Follower State Space Search.
Backes, Michael and Humbert, Mathias and Pang, Jun and Zhang, Yang
(2017)
walk2friends: Inferring Social Links from Mobility Profiles.
Krupp, Johannes and Karami, Mohammad and Rossow, Christian and McCoy, Damon and Backes, Michael
(2017)
Linking Amplification DDoS Attacks to Booter Services.
Backes, Michael and Gomez-Rodriguez, Manuel and Manoharan, Praveen and Surma, Bartlomiej
(2017)
Reconciling Privacy and Utility in Continuous-Time Diffusion Networks.
Stransky, Christian and Acar, Yasemin and Nguyen, Duc Cuong and Wermke, Dominik and Redmiles, Elissa M. and Kim, Doowon and Backes, Michael and Garfinkel, Simson and Mazurek, Michelle and Fahl, Sascha
(2017)
Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers.
Backes, Michael and Berrang, Pascal and Bieg, Matthias and Elis, Roland and Herrmann, Carl and Humbert, Mathias and Lehmann, Irina
(2017)
Identifying Personal DNA Methylation Profiles by Genotype Inference.
Acar, Yasemin and Backes, Michael and Fahl, Sascha and Garfinkel, Simson and Kim, Doowon and Mazurek, Michelle and Stransky, Christian
(2017)
Comparing the Usability of Cryptographic APIs.
Fischer, Felix and Böttinger, Konstantin and Xiao, Huang and Stransky, Christian and Acar, Yasemin and Backes, Michael and Fahl, Sascha
(2017)
Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security.
Backes, Michael and Bugiel, Sven and Schranz, Oliver and Styp-Rekowsky, Philipp von and Weisgerber, Sebastian
(2017)
ARTist: The Android Runtime Instrumentation and Security Toolkit.
Backes, Michael and Rieck, Konrad and Skoruppa, Malte and Stock, Ben and Yamaguchi, Fabian
(2017)
Efficient and Flexible Discovery of PHP Application Vulnerabilities.
Backes, Michael and Nauman, Mohammad
(2017)
LUNA: Quantifying and Leveraging Uncertainty in Android Malware Analysis through Bayesian Machine Learning.
Backes, Michael and Dreier, Jannik and Kremer, Steve and Künnemann, Robert
(2017)
A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and its Application to Fair Exchange.
Simeonovski, Milivoj and Pellegrino, Giancarlo and Rossow, Christian and Backes, Michael
(2017)
Who Controls the Internet? Analyzing Global Threats using Property Graph Traversals.
Maisuradze, Giorgi and Backes, Michael and Rossow, Christian
(2017)
Dachshund: Digging for and Securing (Non-)Blinded Constants in JIT Code.
Lu, Kangjie and Walter, Marie-Therese and Pfaff, David and Nürnberger, Stefan and Lee, Wenke and Backes, Michael
(2017)
Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying.
Stock, Ben and Johns, Martin and Steffens, Marius and Backes, Michael
(2017)
How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security.
Huang, Jie and Schranz, Oliver and Bugiel, Sven and Backes, Michael
(2017)
The ART of App Compartmentalization: Compiler-based Library Privilege Separation on Stock Android.
Grosse, Kathrin and Papernot, Nicolas and Manoharan, Praveen and Backes, Michael and McDaniel, Patrick
(2017)
Adversarial Examples for Malware Detection.
Pellegrino, Giancarlo and Johns, Martin and Koch, Simon and Backes, Michael and Rossow, Christian
(2017)
Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs.
Derr, Erik and Bugiel, Sven and Fahl, Sascha and Acar, Yasemin and Backes, Michael
(2017)
Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android.
Backes, Michael and Bugiel, Sven and von Styp-Rekowsky, Philipp and Wißfeld, Marvin
(2017)
Seamless In-App Ad Blocking on Stock Android.
Nguyen, Duc Cuong and Wermke, Dominik and Acar, Yasemin and Backes, Michael and Weir, Charles Alexander Forbes and Fahl, Sascha
(2017)
A Stitch in Time: Supporting Android Developers in Writing Secure Code.
Backes, Michael and Berrang, Pascal and Humbert, Mathias and Shen, Xiaoyu and Wolf, Verena
(2016)
Simulating the Large-Scale Erosion of Genomic Privacy Over Time.
Backes, Michael and Künnemann, Robert and Mohammadi, Esfandiar
(2016)
Computational Soundness for Dalvik Bytecode.
Schneider, Jonas and Fleischhacker, Nils and Schröder, Dominique and Backes, Michael
(2016)
Efficient Cryptographic Password Hardening Services From Partially Oblivious Commitments.
Krupp, Johannes and Backes, Michael and Rossow, Christian
(2016)
Identifying the Scan and Attack Infrastructures behind Amplification DDoS attacks.
Backes, Michael and Berrang, Pascal and Humbert, Mathias and Manoharan, Praveen
(2016)
Membership Privacy in MicroRNA-based Studies.
Backes, Michael and Berrang, Pascal and Goga, Oana and Gummadi, Krishna P. and Manoharan, Praveen
(2016)
On Profile Linkability despite Anonymity in Social Media Systems.
Backes, Michael and Bugiel, Sven and Derr, Erik
(2016)
Reliable Third-Party Library Detection in Android and its Security Applications.
Backes, Michael and Holz, Thorsten and Rossow, Christian and Rytilahti, Teemu and Simeonovski, Milivoj and Stock, Ben
(2016)
On the Feasibility of TTL-based Filtering for DRDoS Mitigation.
Stock, Ben and Pellegrino, Giancarlo and Rossow, Christian and Johns, Martin and Backes, Michael
(2016)
Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification.
Backes, Michael and Bugiel, Sven and Derr, Erik and McDaniel, Patrick and Octeau, Damien and Weisgerber, Sebastian
(2016)
On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis.
Backes, Michael and Berrang, Pascal and Hecksteden, Anne and Humbert, Mathias and Keller, Andreas and Meyer, Tim
(2016)
Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles.
Maisuradze, Giorgi and Backes, Michael and Rossow, Christian
(2016)
What Cannot be Read, Cannot be Leveraged? Revisiting Assumptions of JIT-ROP Defenses.
Brengel, Michael and Backes, Michael and Rossow, Christian
(2016)
Detecting Hardware-Assisted Virtualization.
Backes, Michael and Bugiel, Sven and Derr, Erik and Gerling, Sebastian and Hammer, Christian
(2016)
R-Droid: Leveraging Android App Analysis with Static Slice Optimization.
Götzfried, Johannes and Müller, Tilo and Drescher, Gabor and Nürnberger, Stefan and Backes, Michael
(2016)
RamCrypt: Kernel-based Address Space Encryption for User-mode Processes.
Acar, Yasemin and Backes, Michael and Bugiel, Sven and Fahl, Sascha and McDaniel, Patrick and Smith, Matthew
(2016)
SoK: Lessons Learned From Android Security Research For Appified Software Platforms.
Acar, Yasemin and Backes, Michael and Fahl, Sascha and Kim, Doowon and Mazurek, Michelle and Stransky, Christian
(2016)
You Get Where You're Looking For: The Impact Of Information Sources On Code Security.
Backes, Michael and Hammer, Christian and Pfaff, David and Skoruppa, Malte
(2016)
Implementation-level Analysis of the JavaScript Helios Voting Client.
Lu, Kangjie and Backes, Michael and Nürnberger, Stefan and Lee, Wenke
(2016)
How to Make ASLR Win the Clone Wars: Runtime Re-Randomization.
Backes, Michael and Herzberg, Amir and Kate, Aniket and Pryvalov, Ivan
(2016)
Anonymous RAM.
Backes, Michael and Bugiel, Sven and Huang, Jie and Schranz, Oliver
(2016)
POSTER: The ART of App Compartmentalization.
Yokoyama, Akira and Ishii, Kou and Tanabe, Rui and Papa, Yinmin and Yoshioka, Katsunari and Matsumoto, Tsutomu and Kasama, Takahiro and Inoue, Daisuke and Brengel, Michael and Backes, Michael and Rossow, Christian
(2016)
SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion.
Stock, Ben and Pellegrino, Giancarlo and Rossow, Christian and Johns, Martin and Backes, Michael
(2016)
POSTER: Mapping the Landscape of Large-Scale Vulnerability Notifications.
Backes, Michael and Meiser, Sebastian and Slowik, Marcin
(2015)
Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms Against Structural Attacks.
Rossow, Christian and Mohammadi, Esfandiar and Backes, Michael and Meiser, Sebastian and Koch, Simon
(2015)
POSTER: In the Net of the Spider - Measuring the Anonymity-Impact of Network-level Adversaries Against Tor.
Backes, Michael and Schranz, Oliver and Styp-Rekowsky, Philipp von
(2015)
POSTER: Towards Compiler-Assisted Taint Tracking on the Android Runtime (ART).
Backes, Michael and Bugiel, Sven and Hammer, Christian and Schranz, Oliver and Styp-Rekowsky, Philipp von
(2015)
Boxify: Full-fledged App Sandboxing for Stock Android.
Mohammadi, Esfandiar and Bendun, Fabian and Pecina, Kim and Maffei, Matteo and Backes, Michael
(2015)
Symbolic Malleable Zero-knowledge Proofs.
Simeonovski, Milivoj and Bendun, Fabian and Asghar, Muhammad Rizwan and Backes, Michael and Marnau, Ninja and Druschel, Peter
(2015)
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
Backes, Michael and Barbosa, Manuel and Fiore, Dario and Reischuk, Raphael M.
(2015)
ADSNARK: Nearly-Practical Privacy-Preserving Proofs on Authenticated Data.
Backes, Michael and Bendun, Fabian and Hoffmann, Jörg and Marnau, Ninja
(2015)
PriCL: Creating a Precedent. A Framework for Reasoning about Privacy Case Law.
Backes, Michael and Gagné, Martin and Thyagarajan, Sri Aravinda Krishnan
(2015)
Fully Secure Inner-Product Proxy Re-Encryption with constant size Ciphertext.
Backes, Michael and Mohammadi, Esfandiar and Ruffing, Tim
(2015)
Computational Soundness for Interactive Primitves.
Backes, Michael and Kate, Aniket and Meiser, Sebastian and Ruffing, Tim
(2015)
Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources.
Backes, Michael and Bugiel, Sven and Gerling, Sebastian and Styp-Rekowsky, Philipp von
(2014)
Android Security Framework: Extensible Multi-Layered Access Control on Android.
Backes, Michael and Bugiel, Sven and Gerling, Sebastian
(2014)
Scippa: System-Centric IPC Provenance on Android.
Backes, Michael and Kate, Aniket and Meiser, Sebastian and Mohammadi, Esfandiar
(2014)
(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection.
Backes, Michael and Holz, Thorsten and Kollenda, Benjamin and Koppe, Philipp and Nürnberger, Stefan and Pewny, Jannik
(2014)
You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code.
Backes, Michael and Grimm, Niklas and Kate, Aniket
(2014)
Lime: Data Lineage in the Malicious Environment.
Backes, Michael and Nürnberger, Stefan
(2014)
Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing.
Backes, Michael and Manoharan, Praveen and Mohammadi, Esfandiar
(2014)
TUC: Time-sensitive and Modular Analysis of Anonymous Communication.
Backes, Michael and Bendun, Fabian and Choudhury, Ashish and Kate, Aniket
(2014)
Asynchronous MPC with a Strict Honest Majority Using Non-equivocation.
Backes, Michael and Gerling, Rainer W. and Gerling, Sebastian and Nürnberger, Stefan and Schröder, Dominique and Simkin, Mark
(2014)
WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP.
Backes, Michael and Clark, Jeremy and Kate, Aniket and Simeonovski, Milivoj and Druschel, Peter
(2014)
BackRef: Accountability in Anonymous Communication Networks.
Backes, Michael and Gerling, Sebastian and Lorenz, Stefan and Lukas, Stephan
(2014)
X-pire 2.0 - A User-Controlled Expiration Date and Copy Protection Mechanism.
Backes, Michael and Mohammadi, Esfandiar and Ruffing, Tim
(2014)
Computational Soundness Results for ProVerif - Bridging the Gap from Trace Properties to Uniformity.
Backes, Michael and Gagné, Martin and Skoruppa, Malte
(2013)
Using Mobile Device Communication to Strengthen e-Voting Protocols.
Backes, Michael and Fiore, Dario and Reischuk, Raphael M.
(2013)
Verifiable Delegation of Computation on Outsourced Data.
Backes, Michael and Gerling, Sebastian and Hammer, Christian and Maffei, Matteo and Styp-Rekowsky, Philipp von
(2013)
AppGuard – Fine-grained Policy Enforcement for Untrusted Android Applications.
Backes, Michael and Meiser, Sebastian
(2013)
Differentially Private Smart Metering with Battery Recharging.
Backes, Michael and Kate, Aniket and Manoharan, Praveen and Meiser, Sebastian and Mohammadi, Esfandiar
(2013)
AnoA: A Framework For Analyzing Anonymous Communication Protocols.
Backes, Michael and Bendun, Fabian and Unruh, Dominique
(2013)
Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized Verification.
Backes, Michael and Doychev, Goran and Köpf, Boris
(2013)
Preventing Side-Channel Leaks in Web Traffic: A Formal Approach.
Backes, Michael and Kate, Aniket and Manoharan, Praveen and Meiser, Sebastian and Mohammadi, Esfandiar
(2013)
AnoA: A Framework for Analyzing Anonymous Communication Protocols.
Backes, Michael and Datta, Amit and Kate, Aniket
(2013)
Asynchronous Computational VSS with Reduced Communication Complexity.
Styp-Rekowsky, Philipp von and Gerling, Sebastian and Backes, Michael and Hammer, Christian
(2013)
Idea: Callee-Site Rewriting of Sealed System Libraries.
Backes, Michael and Fiore, Dario and Mohammadi, Esfandiar
(2013)
Privacy-Preserving Accountable Computation.
Backes, Michael and Malik, Ankit and Unruh, Dominique
(2012)
Computational Soundness without Protocol Restrictions.
Backes, Michael and Kate, Aniket and Mohammadi, Esfandiar
(2012)
Ace: An Efficient Key-Exchange Protocol for Onion Routing.
Backes, Michael and Bendun, Fabian and Kate, Aniket
(2012)
Brief announcement: distributed cryptography using trinc.
Backes, Michael and Barthe, Gilles and Berg, Matthias and Grégoire, Benjamin and Kunz, César and Skoruppa, Malte and Béguelin, Santiago Zanella
(2012)
Verified Security of Merkle-Damgård.
Backes, Michael and Kate, Aniket and Maffei, Matteo and Pecina, Kim
(2012)
ObliviAd: Provably Secure and Practical Online Behavioral Advertising.
Backes, Michael and Maffei, Matteo and Pecina, Kim
(2012)
Automated Synthesis of Secure Distributed Applications.
Backes, Michael and Goldberg, Ian and Kate, Aniket and Toft, Tomas
(2012)
Adding query privacy to robust DHTs.
Backes, Michael and Bendun, Fabian and Unruh, Dominique
(2012)
Computational Soundness of Symbolic Zero-knowledge Proofs: Weaker Assumptions and Mechanized Verification.
(Unpublished)
Mainberger, Markus and Backes, Michael and Berg, Matthias and Weickert, Joachim
(2012)
Diffusion-Based Image Compression in Steganography.
Backes, Michael and Busenius, Alex and Hriţcu, Cătălin
(2012)
On the Development and Formalization of an Extensible Code Generator for Real Life Security Protocols.
Backes, Michael and Kate, Aniket and Goldberg, Ian and Mohammadi, Esfandiar
(2012)
Provably Secure and Practical Onion Routing.
Reischuk, Raphael M. and Backes, Michael and Gehrke, Johannes
(2012)
SAFE Extensibility of Data-Driven Web Applications.
Backes, Michael and Maffei, Matteo and Pecina, Kim
(2011)
A Security API for Distributed Social Networks.
Backes, Michael and Hriţcu, Cătălin and Tarrach, Thorsten
(2011)
Automatically Verifying Typing Constraints for a Data Processing Language.
Backes, Michael and Kate, Aniket and Patra, Arpita
(2011)
Computational Verifiable Secret Sharing Revisited.
Backes, Michael and Maffei, Matteo and Pecina, Kim and Reischuk, Raphael M.
(2011)
G2C: Cryptographic Protocols from Goal-Driven Specifications.
Backes, Michael and Berg, Matthias and Köpf, Boris
(2011)
Non-Uniform Distributions in Quantitative Information-Flow.
Backes, Michael and Maffei, Matteo and Pecina, Kim
(2011)
Securing social networks.
Backes, Michael and Hriţcu, Cătălin and Maffei, Matteo
(2011)
Union and Intersection Types for Secure Protocol Implementations.
Backes, Michael and Dürmuth, Markus and Gerling, Sebastian and Pinkal, Manfred and Sporleder, Caroline
(2010)
Acoustic Side-Channel Attacks of Printers.
Backes, Michael and Lorenz, Stefan and Maffei, Matteo and Pecina, Kim
(2010)
Anonymity and Trust in Distributed Systems.
Backes, Michael and Lorenz, Stefan and Maffei, Matteo and Pecina, Kim
(2010)
Anonymous Webs of Trust.
Backes, Michael and Maffei, Matteo and Mohammadi, Esfandiar
(2010)
Computationally Sound Abstraction and Verification of Secure Multi-Party Computations.
Backes, Michael and Maffei, Matteo and Unruh, Dominique
(2010)
Computationally Sound Verification of Source Code.
Backes, Michael and Ciobotaru, Oana and Krohmer, Anton
(2010)
RatFish: A File Sharing Protocol Provably Secure Against Rational Users.
Backes, Michael and Doychev, Goran and Dürmuth, Markus and Köpf, Boris
(2010)
Speaker Recognition in Encrypted Voice-over-IP Traffic.
Backes, Michael and Grochulla, Martin and Hriţcu, Cătălin and Maffei, Matteo
(2009)
Achieving Security Despite Compromise Using Zero-knowledge.
Backes, Michael and Hamerlik, Marek and Linari, Alessandro and Maffei, Matteo and Tryfonopoulos, Christos and Weikum, Gerhard
(2009)
Anonymity and Censorship Resistance in Unstructured Overlay Networks.
Backes, Michael and Hamerlik, Lech Marek and Linari, Alessandro and Maffei, Matteo and Tryfonopoulos, Christos and Weikum, Gerhard
(2009)
Anonymous and Censorship-resistant Content-sharing in Unstructured Overlays.
Backes, Michael and Köpf, Boris and Rybalchenko, Andrey
(2009)
Automatic Discovery and Quantification of Information Leaks.
Backes, Michael and Druschel, Peter and Haeberlen, Andreas and Unruh, Dominique
(2009)
CSAR: A practical and provable technique to make randomized systems accountable.
Backes, Michael and Hofheinz, Dennis and Unruh, Dominique
(2009)
CoSP: a general framework for computational soundness proofs.
Backes, Michael and Maffei, Matteo
(2009)
Design and Verification of Anonymous Trust Protocols.
Backes, Michael and Chen, Tongbo and Dürmuth, Markus and Lensch, Hendrik and Welk, Martin
(2009)
Tempest in a Teapot: Compromising Reflections Revisited.
Backes, Michael and Hriţcu, Cătălin and Maffei, Matteo
(2008)
Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-calculus.
Backes, Michael and Hamerlik, Lech Marek and Linari, Alessandro and Maffei, Matteo and Tryfonopoulos, Christos and Weikum, Gerhard
(2008)
Brief Announcement: Anonymous and Censorship-resistant Content-sharing in Unstructured Overlays.
Backes, Michael and Lorenz, Stefan and Maffei, Matteo and Pecina, Kim
(2008)
CASPA: Causality-based Abstraction for Security Protocol Analysis.
Backes, Michael and Dürmuth, Markus and Unruh, Dominique
(2008)
Compromising Reflections or How to Read LCD Monitors Around the Corner.
Backes, Michael and Unruh, Dominique
(2008)
Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers.
Backes, Michael and Berg, Matthias and Unruh, Dominique
(2008)
A Formal Language for Cryptographic Pseudocode.
Backes, Michael and Köpf, Boris
(2008)
Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks.
Backes, Michael and Unruh, Dominique
(2008)
Limits of Constructive Security Proofs.
Backes, Michael and Dürmuth, Markus and Unruh, Dominique
(2008)
OAEP is Secure Under Key-dependent Messages.
Backes, Michael and Maffei, Matteo and Hriţcu, Cătălin
(2008)
Type-checking zero-knowledge.
Backes, Michael and Maffei, Matteo and Unruh, Dominique
(2008)
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol.
Backes, Michael and Cortesi, Agostino and Focardi, Riccardo and Maffei, Matteo
(2007)
A Calculus of Challenges and Responses.
Backes, Michael and Cortesi, Agostino and Maffei, Matteo
(2007)
Causality-based Abstraction of Multiplicity in Security Protocols.
Backes, Michael and Dürmuth, Markus and Unruh, Dominique
(2007)
Information Flow in the Peer-Reviewing Process (extended abstract).
Backes, Michael and Pfitzmann, Birgit and Scedrov, Andre
(2007)
Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles.
Backes, Michael and Dürmuth, Markus and Küsters, Ralf
(2007)
On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography.
Backes, Michael and Müller-Quade, Jörn and Unruh, Dominique
(2007)
On the Necessity of Rewinding in Secure Multiparty Computation.
Backes, Michael and Laud, Peeter
(2006)
Computationally Sound Secrecy Proofs by Mechanized Flow Analysis.
Backes, Michael and Dürmuth, Markus and Hofheinz, Dennis and Küsters, Ralf
(2006)
Conditional Reactive Simulatability.
Backes, Michael and Cervesato, Iliano and Jaggard, Aaron D and Scedrov, Andre and Tsay, Joe-Kai
(2006)
Cryptographically Sound Security Proofs for Basic and Public-key Kerberos.
Sprenger, Christoph and Backes, Michael and Basin, David and Pfitzmann, Birgit and Waidner, Michael
(2006)
Cryptographically Sound Theorem Proving.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2006)
Formal Methods and Cryptography.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2006)
Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes.
Backes, Michael and Pfitzmann, Birgit
(2006)
On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol.
Backes, Michael and Cachin, Christian and Oprea, Alina
(2006)
Secure Key-Updating for Lazy Revocation.
Backes, Michael and Mödersheim, Sebastian and Pfitzmann, Birgit and Vigano, Luca
(2006)
Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario.
Backes, Michael and Camenisch, Jan and Sommer, Dieter
(2005)
Anonymous yet accountable access control.
Backes, Michael and Datta, Anupam and Derek, Ante and Mitchell, John C. and Turuani, Mathieu
(2005)
Compositional Analysis of Contract Signing Protocols.
Backes, Michael and Dürmuth, Markus
(2005)
A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System.
Backes, Michael and Cachin, Christian and Oprea, Alina
(2005)
Lazy Revocation in Cryptographic File Systems.
Backes, Michael and Pfitzmann, Birgit
(2005)
Limits of the Cryptographic Realization of Dolev-Yao-style XOR.
Backes, Michael and Hofheinz, Dennis and Müller-Quade, Jörn and Unruh, Dominique
(2005)
On Fairness in Simulatability-based Cryptographic Systems.
Backes, Michael and Cachin, Christian
(2005)
Public-Key Steganography with Active Attacks.
Backes, Michael
(2005)
Quantifying Probabilistic Information Flow in Computational Reactive Systems.
Backes, Michael and Pfitzmann, Birgit
(2005)
Relating Symbolic and Cryptographic Secrecy.
Backes, Michael and Groß, Thomas
(2005)
Tailoring the Dolev-Yao Abstraction to Web Services Realities - A Comprehensive Wish List.
Backes, Michael and Dürmuth, Markus and Steinwandt, Rainer
(2004)
An Algebra for Composing Enterprise Privacy Policies.
Backes, Michael
(2004)
A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol.
Backes, Michael and Bagga, Walid and Karjoth, Günter and Schunter, Matthias
(2004)
Efficient Comparison of Enterprise Privacy Policies.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2004)
A General Composition Theorem for Secure Reactive System.
Backes, Michael and Hofheinz, Dennis
(2004)
How to Break and Repair a Universally Composable Signature Functionality.
Backes, Michael and Waidner, Michael and Pfitzmann, Birgit
(2004)
Low-level Ideal Signatures and General Integrity Idealization.
Backes, Michael and Pfitzmann, Birgit
(2004)
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library.
Backes, Michael and Dürmuth, Markus and Karjoth, Günter
(2004)
Unification in Privacy Policy Evaluation - Translating EPAL to Prolog.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2003)
A Composable Cryptographic Library with Nested Operations.
Backes, Michael and Pfitzmann, Birgit
(2003)
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol.
Backes, Michael and Jacobi, Christian
(2003)
Cryptographically Sound and Machine-Assisted Verification of Security Protocols.
Backes, Michael and Schunter, Matthias
(2003)
From Absence of Certain Vulnerabilities towards Security Proofs - Pushing the Limits of Formal Verification.
Backes, Michael and Pfitzmann, Birgit
(2003)
Intransitive Non-Interference for Cryptographic Purposes.
Backes, Michael and Cachin, Christian and Strobl, Reto
(2003)
Proactive Secure Message Transmission in Asynchronous Networks.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2003)
Reactively Secure Signature Schemes.
Backes, Michael and Cachin, Christian
(2003)
Reliable broadcast in a computational hybrid model with Byzantine faults, crashes, and recoveries.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2003)
Security in Business Process Engineering.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2003)
Symmetric Authentication Within a Simulatable Cryptographic Library.
Backes, Michael and Pfitzmann, Birgit and Schunter, Matthias
(2003)
A Toolkit for Managing Enterprise Privacy Policies.
Backes, Michael
(2003)
Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions (Extended Abstract).
Backes, Michael and Pfitzmann, Birgit
(2002)
Computational Probabilistic Non-Interference.
Backes, Michael and Jacobi, Christian and Pfitzmann, Birgit
(2002)
Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation.
Backes, Michael and Pfitzmann, Birgit and Steiner, Michael and Waidner, Michael
(2002)
Polynomial Fairness and Liveness.
Article
Di Tizio, Giorgio and Speicher, Patrick and Simeonovski, Milivoj and Backes, Michael and Stock, Ben and Künnemann, Robert
(2022)
Pareto-Optimal Defenses for the Web Infrastructure: Theory and Practice.
ACM Transactions on Privacy and Security, 1 (1).
ISSN 2471-2566
Warnat-Herresthal, Stefanie and Schultze, Hartmut and Shastry, Krishnaprasad Lingadahalli and Manamohan, Sathyanarayanan and Mukherjee, Saikat and Garg, Vishesh and Sarveswara, Ravi and Händler, Kristian and Pickkers, Peter and Aziz, N. Ahmad and Ktena, Sofia and Tran, Florian and Bitzer, Michael and Ossowski, Stephan and Casadei, Nicolas and Herr, Christian and Petersheim, Daniel and Behrends, Uta and Kern, Fabian and Fehlmann, Tobias and Schommers, Philipp and Lehmann, Clara and Augustin, Max and Rybniker, Jan and Altmüller, Janine and Mishra, Neha and Bernardes, Joana P. and Krämer, Benjamin and Bonaguro, Lorenzo and Schulte-Schrepping, Jonas and De Domenico, Elena and Siever, Christian and Kraut, Michael and Desai, Milind and Monnet, Bruno and Saridaki, Maria and Siegel, Charles Martin and Drews, Anna and Nuesch-Germano, Melanie and Theis, Heidi and Heyckendorf, Jan and Schreiber, Stefan and Kim-Hellmuth, Sarah and Nattermann, Jacob and Skowasch, Dirk and Kurth, Ingo and Keller, Andreas and Bals, Robert and Nürnberg, Peter and Rieß, Olaf and Rosenstiel, Philip and Netea, Mihai G. and Theis, Fabian and Mukherjee, Sach and Backes, Michael and Aschenbrenner, Anna C. and Ulas, Thomas and Breteler, Monique M. B. and Giamarellos-Bourboulis, Evangelos J. and Kox, Matthijs and Becker, Matthias and Cheran, Sorin and Woodacre, Michael S. and Goh, Eng Lim and Schultze, Joachim L.
(2021)
Swarm Learning for decentralized and confidential clinical machine learning.
Nature.
Troncoso, Carmela and Payer, Matthias and Hubaux, Jean-Pierre and Salathé, Marcel and Larus, James and Lueks, Wouter and Stadler, Theresa and Pyrgelis, Apostolos and Antonioli, Daniele and Barman, Ludovic and Chatel, Sylvain and Paterson, Kenneth G. and Capkun, Srdjan and Basin, David and Beutel, Jan and Jackson, Dennis and Roeschlin, Marc and Leu, Patrick and Preneel, Bart and Smart, Nigel and Abidin, Aysajan and Gürses, Seda and Veale, Michael and Cremers, Cas and Backes, Michael and Tippenhauer, Nils Ole and Binns, Reuben and Cattuto, Ciro and Barrat, Alain and Fiore, Dario and Barbosa, Manuel and Oliveira, Rui and Pereira, José
(2020)
Decentralized Privacy-Preserving Proximity Tracing.
IEEE Data Engineering Bulletin Volume 43, Number 2, June 2020.
pp. 36-66.
Grosse, Kathrin and Trost, Thomas A. and Mosbach, Marius and Backes, Michael
(2019)
Adversarial Initialization - when your network performs the way I want -.
ArXiv e-prints.
Grosse, Kathrin and Pfaff, David and Smith, Michael Thomas and Backes, Michael
(2018)
The Limitations of Model Uncertainty in Adversarial Settings.
ArXiv e-prints.
Grosse, Kathrin and Smith, Michael Thomas and Backes, Michael
(2018)
Killing Three Birds with one Gaussian Process:
Analyzing Attack Vectors on Classification.
ArXiv e-prints.
(Submitted)
Shirazi, Fatemeh and Simeonovski, Milivoj and Asghar, Muhammad Rizwan and Backes, Michael and Díaz, Claudia
(2018)
A Survey on Routing in Anonymous Communication Protocols.
ACM Computing Surveys, 51 (3).
pp. 1-39.
ISSN 0360-0300
Acar, Yasemin and Backes, Michael and Fahl, Sascha and Kim, Doowon and Mazurek, Michelle L. and Stransky, Christian
(2017)
How Internet Resources Might Be Helping You Develop Faster but Less Securely.
IEEE Security & Privacy.
Grosse, Kathrin and Manoharan, Praveen and Papernot, Nicolas and Backes, Michael and McDaniel, Patrick
(2017)
On the (Statistical) Detection of Adversarial Examples.
CoRR, abs/17.
(Submitted)
Backes, Michael and Hoffmann, Jörg and Künnemann, Robert and Speicher, Patrick and Steinmetz, Marcel
(2017)
Simulated Penetration Testing and Mitigation Analysis.
CoRR, abs/17.
Ghorbani Lyastani, Sanam and Schilling, Michael and Fahl, Sascha and Bugiel, Sven and Backes, Michael
(2017)
Studying the Impact of Managers on Password Strength and Reuse.
CoRR, abs/17.
Backes, Michael and Manoharan, Praveen and Grosse, Kathrin and Papernot, Nicolas
(2016)
Adversarial Perturbations Against Deep Neural Networks for Malware Classification.
The Computing Research Repository (CoRR), abs/16.
Shirazi, Fatemeh and Simeonovski, Milivoj and Asghar, Muhammad Rizwan and Backes, Michael and Díaz, Claudia
(2016)
A Survey on Routing in Anonymous Communication Protocols.
The Computing Research Repository (CoRR), abs/16.
Backes, Michael and Bugiel, Sven and Schranz, Oliver and Styp-Rekowsky, Philipp von
(2016)
Boxify: Bringing Full-Fledged App Sandboxing to Stock Android.
USENIX ;login:, 41 (2).
pp. 16-21.
Backes, Michael and Berrang, Pascal and Manoharan, Praveen
(2015)
How well do you blend into the crowd? - d-convergence: A novel paradigm for quantifying privacy in the age of Big-Data.
CoRR, abs/15.
Backes, Michael and Grimm, Niklas and Kate, Aniket
(2015)
Data Lineage in Malicious Environments.
IEEE Transactions on Dependable and Secure Computing, 13 (2).
178 - 191.
ISSN 1545-5971
Simeonovski, Milivoj and Bendun, Fabian and Asghar, Muhammad Rizwan and Backes, Michael and Marnau, Ninja and Druschel, Peter
(2015)
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
CoRR, abs/15.
Simeonovski, Milivoj and Bendun, Fabian and Asghar, Muhammad Rizwan and Backes, Michael and Marnau, Ninja and Druschel, Peter
(2015)
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
IACR Cryptology ePrint Archive, 2015.
p. 592.
Backes, Michael and Köpf, Boris
(2015)
Quantifying Information Flow in Cryptographic Systems.
Mathematical Structures in Computer Science.
Backes, Michael and Hriţcu, Cătălin and Maffei, Matteo
(2014)
Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations.
Journal of Computer Security, 22 (2).
pp. 301-353.
Backes, Michael and Dagdelen, Özgür and Fischlin, Marc and Gajek, Sebastian and Meiser, Sebastian and Schröder, Dominique
(2014)
Operational Signature Schemes.
IACR Cryptology ePrint Archive, 2014.
p. 820.
Backes, Michael and Hriţcu, Cătălin and Maffei, Matteo
(2013)
Union, Intersection, and Refinement Types and Reasoning About Type Disjointness for Secure Protocol Implementations.
Special issue of the Journal of Computer Security (JCS) for TOSCA-SecCo.
Backes, Michael and Meiser, Sebastian and Schröder, Dominique
(2013)
Highly Controlled, Fine-grained Delegation of Signing Capabilities.
IACR Cryptology ePrint Archive, 2013.
p. 408.
Backes, Michael and Clark, Jeremy and Druschel, Peter and Kate, Aniket and Simeonovski, Milivoj
(2013)
Introducing Accountability to Anonymity Networks.
CoRR, abs/13.
Backes, Michael and Cervesato, Iliano and Jaggard, Aaron D and Scedrov, Andre and Tsay, Joe-Kai
(2011)
Cryptographically sound security proofs for basic and public-key Kerberos.
International Journal of Information Security, 10 (2).
pp. 107-134.
Backes, Michael and Gerling, Sebastian and Styp-Rekowsky, Philipp von
(2011)
A Local Cross-Site Scripting Attack against Android Phones.
Backes, Michael and Unruh, Dominique
(2010)
Computational Soundness of Symbolic Zero-Knowledge Proofs.
Journal of Computer Security, 18 (6).
pp. 1077-1155.
Backes, Michael and Dürmuth, Markus and Hofheinz, Dennis and Küsters, Ralf
(2008)
Conditional Reactive Simulatability.
International Journal of Information Security, 7 (2).
pp. 155-169.
Backes, Michael and Pfitzmann, Birgit and Scedrov, Andre
(2008)
Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles.
Journal of Computer Security (JCS).
Backes, Michael and Pfitzmann, Birgit
(2008)
Limits of the BRSIM/UC soundness of Dolev-Yao-style XOR.
International Journal of Information Security, 7 (1).
pp. 33-54.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2007)
The Reactive Simulatability Framework for Asynchronous Systems.
Information and Computation.
Backes, Michael and Datta, Anupam and Derek, Ante and Mitchell, John C. and Turuani, Mathieu
(2006)
Compositional Analysis of Contract Signing Protocols.
Theoretical Computer Science, 367 (1-2).
pp. 33-56.
Backes, Michael
(2006)
Real-or-Random Key Secrecy of the Otway-Rees Protocol via a Symbolic Security Proof.
Electronic Notes in Theoretical Computer Science (ENTCS), 155.
pp. 111-145.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2005)
Reactively Secure Signature Schemes.
International Journal of Information Security (IJIS), 4 (4).
pp. 242-252.
Backes, Michael and Pfitzmann, Birgit
(2005)
Relating Symbolic and Cryptographic Secrecy.
IEEE Transactions on Dependable and Secure Computing (TDSC), 2 (2).
pp. 109-123.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2005)
Symmetric Authentication Within a Simulatable Cryptographic Library.
International Journal of Information Security (IJIS), 4 (3).
pp. 135-154.
Backes, Michael
(2005)
Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions.
Journal of Logic and Algebraic Programming (JLAP), 2.
pp. 157-188.
Backes, Michael and Pfitzmann, Birgit
(2004)
Computational Probabilistic Non-Interference.
International Journal of Information Security (IJIS), 3 (1).
pp. 42-60.
Backes, Michael and Pfitzmann, Birgit
(2004)
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol.
IEEE Journal on Selected Areas of Computing (JSAC), 22 (10).
pp. 2075-2086.
Backes, Michael and Pfitzmann, Birgit and Steiner, Michael and Waidner, Michael
(2004)
Polynomial Liveness.
Journal of Computer Security, 12 (3-4).
pp. 589-617.
Backes, Michael
(2002)
Factorization of Univariate Polynomials.
Backes, Michael
(2002)
New Number-Theoretic Assumptions in Cryptography (in german).
Thesis
Backes, Michael
(2002)
Cryptographically Sound Analysis of Security Protocols.
Doctoral thesis, Saarland University, Computer Science Department.
Book Section
Backes, Michael and Meiser, Sebastian and Schröder, Dominique
(2016)
Delegatable Functional Signatures.
In:
UNSPECIFIED
Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 357-386.
ISBN 978-3-662-49384-7
Backes, Michael and Berrang, Pascal and Manoharan, Praveen
(2016)
From Zoos to Safaris - From Closed-World Enforcement to Open-World Assessment of Privacy.
In:
UNSPECIFIED
Springer International Publishing, Cham, pp. 87-138.
ISBN 978-3-319-43005-8
Backes, Michael and Gerling, Sebastian and Hammer, Christian and Maffei, Matteo and Styp-Rekowsky, Philipp von
(2013)
AppGuard - Enforcing User Requirements on Android Apps.
In:
Tools and Algorithms for the Construction and Analysis of Systems.
Springer, pp. 545-550.
Styp-Rekowsky, Philipp von and Gerling, Sebastian and Backes, Michael and Hammer, Christian
(2013)
Callee-site Rewriting of Sealed System Libraries.
In:
Engineering Secure Software and Systems.
Springer, pp. 33-41.
Backes, Michael and Dürmuth, Markus
(2007)
Enterprise Privacy Policies and Languages.
In:
UNSPECIFIED
Elsevier.
Backes, Michael and Dürmuth, Markus
(2007)
Enterprise Privacy Policies and Languages.
In:
UNSPECIFIED
Elsevier.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2004)
Justifying a Dolev-Yao Model under Active Attacks.
In:
UNSPECIFIED
Lecture Notes in Computer Science, 3655
.
Springer, pp. 1-42.
Book
Backes, Michael and Gritzalis, Stefanos and Preneel, Bart and Katsikas, Sokratis K and Lopez, Javier
(2006)
Proceedings of 9th International Conference on Information Security (ISC), Samos Island, Greece.
Lecture Notes in Computer Science, 4176
.
Springer.
Backes, Michael and Scedrov, Andre
(2005)
Proceedings of 3rd International Workshop on Security and Concurrency (SecCo), affiliated with CONCUR'05, San Francisco, CA.
ENTCS.
Backes, Michael and Basin, David and Waidner, Michael
(2003)
Proceedings of 1st ACM Workshop on Formal Methods in Security Engineering (FMSE) , affiliated with ACM CCS'03, Washington D.C.
ACM.
Monograph
Backes, Michael and Bugiel, Sven and Derr, Erik and Hammer, Christian
(2014)
Taking Android App Vetting to the Next Level with Path-sensitive Value Analysis.
Technical Report.
UNSPECIFIED.
(Unpublished)
Backes, Michael and Gerling, Sebastian and Hammer, Christian and Maffei, Matteo and Styp-Rekowsky, Philipp von
(2013)
AppGuard - Fine-grained Policy Enforcement for Untrusted Android Applications.
Technical Report.
UNSPECIFIED.
(Unpublished)
Backes, Michael and Gerling, Sebastian and Hammer, Christian and Maffei, Matteo and Styp-Rekowsky, Philipp von
(2012)
AppGuard - Real-time Policy Enforcement for Third-Party Applications.
Technical Report.
UNSPECIFIED.
(Unpublished)
Backes, Julian and Backes, Michael and Dürmuth, Markus and Lorenz, Stefan and Gerling, Sebastian
(2011)
X-pire! - A digital expiration date for images in social networks.
Technical Report.
UNSPECIFIED.
Other
Hanzlik, Lucjan and Zhang, Yang and Grosse, Kathrin and Salem, Ahmed and Augustin, Max and Backes, Michael and Fritz, Mario
(2018)
MLCapsule: Guarded Offline Deployment of Machine Learning as a Service.
Speicher, Patrick and Steinmetz, Marcel and Künnemann, Robert and Simeonovski, Milivoj and Pellegrino, Giancarlo and Hoffmann, Jörg and Backes, Michael
(2018)
Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure (full version).
Backes, Michael and Dürmuth, Markus and Unruh, Dominique
(2008)
Gespiegelt / Verräterische Reflexionen: Wie Brillengläser Geheimnisse verraten.
Backes, Michael and Cortesi, Agostino and Maffei, Matteo
(2007)
Causality-based Abstraction of Multiplicity in Security Protocol Analysis.
Backes, Michael and Unruh, Dominique
(2007)
On the Security of Protocols with Logarithmic Communication Complexity.
Backes, Michael and Dürmuth, Markus and Unruh, Dominique
(2007)
Vorgetäuscht / Böse Textdokumente -- Postscript gone wild.
Backes, Michael and Laud, Peeter
(2006)
Computationally Sound Secrecy Proofs by Mechanized Flow Analysis.
(Unpublished)
Backes, Michael and Datta, Anupam and Derek, Ante and Mitchell, John C. and Ramanathan, Ajith and Scedrov, Andre
(2006)
Games and the Impossibility of Realizable Ideal Functionality.
Backes, Michael and Müller-Quade, Jörn and Unruh, Dominique
(2006)
On the Necessity of Rewinding in Secure Multiparty Computation.
Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2006)
Soundness Limits of Dolev-Yao Models.
Backes, Michael and Pfitzmann, Birgit
(2003)
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol (Extended Abstract).
This list was generated on Wed Oct 9 19:25:56 2024 CEST.