Items where Author is "Backes, Michael"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 256.

Article

Grosse, Kathrin and Trost, Thomas A. and Mosbach, Marius and Backes, Michael
(2019) Adversarial Initialization - when your network performs the way I want -.
ArXiv e-prints.

Backes, Michael and Hanzlik, Lucjan and Herzberg, Amir and Kate, Aniket and Pryvalov, Ivan
(2019) Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup.
Proceedings of the 22nd edition of the International Conference on Practice and Theory of Public Key Cryptography (PKC 2019).
(In Press)

Backes, Michael and Döttling, Nico and Hanzlik, Lucjan and Kluczniak, Kamil
(2019) Ring Signatures: Logarithmic Size, No Setup -- from Standard Assumptions.
EUROCRYPT.
(Unpublished)

Grosse, Kathrin and Pfaff, David and Smith, Michael Thomas and Backes, Michael
(2018) The Limitations of Model Uncertainty in Adversarial Settings.
ArXiv e-prints.

Hanzlik, Lucjan and Zhang, Yang and Grosse, Kathrin and Salem, Ahmed and Augustin, Max and Backes, Michael and Fritz, Mario
(2018) MLCapsule: Guarded Offline Deployment of Machine Learning as a Service.
Arxive.
(Submitted)

Grosse, Kathrin and Smith, Michael Thomas and Backes, Michael
(2018) Killing Three Birds with one Gaussian Process: Analyzing Attack Vectors on Classification.
ArXiv e-prints.
(Submitted)

Shirazi, Fatemeh and Simeonovski, Milivoj and Asghar, Muhammad Rizwan and Backes, Michael and Díaz, Claudia
(2018) A Survey on Routing in Anonymous Communication Protocols.
ACM Computing Surveys (CSUR), 51 (3). pp. 1-39. ISSN 0360-0300

Speicher, Patrick and Steinmetz, Marcel and Künnemann, Robert and Simeonovski, Milivoj and Pellegrino, Giancarlo and Hoffmann, Jörg and Backes, Michael
(2018) Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure (full version).
Extended Version of EuroS&P 2018 Paper.

Acar, Yasemin and Backes, Michael and Fahl, Sascha and Kim, Doowon and Mazurek, Michelle L. and Stransky, Christian
(2017) How Internet Resources Might Be Helping You Develop Faster but Less Securely.
IEEE Security & Privacy.

Zhang, Yang and Humbert, Mathias and Surma, Bartlomiej and Manoharan, Praveen and Vreeken, Jilles and Backes, Michael
(2017) CTRL+Z: Recovering Anonymized Social Graphs.
CoRR, abs/17.

Grosse, Kathrin and Manoharan, Praveen and Papernot, Nicolas and Backes, Michael and McDaniel, Patrick
(2017) On the (Statistical) Detection of Adversarial Examples.
CoRR, abs/17.
(Submitted)

Backes, Michael and Hoffmann, Jörg and Künnemann, Robert and Speicher, Patrick and Steinmetz, Marcel
(2017) Simulated Penetration Testing and Mitigation Analysis.
CoRR, abs/17.

Ghorbani Lyastani, Sanam and Schilling, Michael and Fahl, Sascha and Bugiel, Sven and Backes, Michael
(2017) Studying the Impact of Managers on Password Strength and Reuse.
CoRR, abs/17.

Backes, Michael and Manoharan, Praveen and Grosse, Kathrin and Papernot, Nicolas
(2016) Adversarial Perturbations Against Deep Neural Networks for Malware Classification.
The Computing Research Repository (CoRR), abs/16.

Shirazi, Fatemeh and Simeonovski, Milivoj and Asghar, Muhammad Rizwan and Backes, Michael and Díaz, Claudia
(2016) A Survey on Routing in Anonymous Communication Protocols.
The Computing Research Repository (CoRR), abs/16.

Backes, Michael and Bugiel, Sven and Schranz, Oliver and Styp-Rekowsky, Philipp von
(2016) Boxify: Bringing Full-Fledged App Sandboxing to Stock Android.
USENIX ;login:, 41 (2). pp. 16-21.

Backes, Michael and Berrang, Pascal and Manoharan, Praveen
(2015) How well do you blend into the crowd? - d-convergence: A novel paradigm for quantifying privacy in the age of Big-Data.
CoRR, abs/15.

Backes, Michael and Grimm, Niklas and Kate, Aniket
(2015) Data Lineage in Malicious Environments.
IEEE Transactions on Dependable and Secure Computing, 13 (2). 178 - 191. ISSN 1545-5971

Simeonovski, Milivoj and Bendun, Fabian and Asghar, Muhammad Rizwan and Backes, Michael and Marnau, Ninja and Druschel, Peter
(2015) Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
CoRR, abs/15.

Simeonovski, Milivoj and Bendun, Fabian and Asghar, Muhammad Rizwan and Backes, Michael and Marnau, Ninja and Druschel, Peter
(2015) Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
IACR Cryptology ePrint Archive, 2015. p. 592.

Backes, Michael and Köpf, Boris
(2015) Quantifying Information Flow in Cryptographic Systems.
Mathematical Structures in Computer Science.

Backes, Michael and Hriţcu, Cătălin and Maffei, Matteo
(2014) Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations.
Journal of Computer Security, 22 (2). pp. 301-353.

Backes, Michael and Dagdelen, Özgür and Fischlin, Marc and Gajek, Sebastian and Meiser, Sebastian and Schröder, Dominique
(2014) Operational Signature Schemes.
IACR Cryptology ePrint Archive, 2014. p. 820.

Backes, Michael and Hriţcu, Cătălin and Maffei, Matteo
(2013) Union, Intersection, and Refinement Types and Reasoning About Type Disjointness for Secure Protocol Implementations.
Special issue of the Journal of Computer Security (JCS) for TOSCA-SecCo.

Backes, Michael and Meiser, Sebastian and Schröder, Dominique
(2013) Highly Controlled, Fine-grained Delegation of Signing Capabilities.
IACR Cryptology ePrint Archive, 2013. p. 408.

Backes, Michael and Clark, Jeremy and Druschel, Peter and Kate, Aniket and Simeonovski, Milivoj
(2013) Introducing Accountability to Anonymity Networks.
CoRR, abs/13.

Backes, Michael and Cervesato, Iliano and Jaggard, Aaron D and Scedrov, Andre and Tsay, Joe-Kai
(2011) Cryptographically sound security proofs for basic and public-key Kerberos.
International Journal of Information Security, 10 (2). pp. 107-134.

Backes, Michael and Gerling, Sebastian and Styp-Rekowsky, Philipp von
(2011) A Local Cross-Site Scripting Attack against Android Phones.

Backes, Michael and Unruh, Dominique
(2010) Computational Soundness of Symbolic Zero-Knowledge Proofs.
Journal of Computer Security, 18 (6). pp. 1077-1155.

Backes, Michael and Dürmuth, Markus and Hofheinz, Dennis and Küsters, Ralf
(2008) Conditional Reactive Simulatability.
International Journal of Information Security, 7 (2). pp. 155-169.

Backes, Michael and Pfitzmann, Birgit and Scedrov, Andre
(2008) Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles.
Journal of Computer Security (JCS).

Backes, Michael and Pfitzmann, Birgit
(2008) Limits of the BRSIM/UC soundness of Dolev-Yao-style XOR.
International Journal of Information Security, 7 (1). pp. 33-54.

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2007) The Reactive Simulatability Framework for Asynchronous Systems.
Information and Computation.

Backes, Michael and Datta, Anupam and Derek, Ante and Mitchell, John C. and Turuani, Mathieu
(2006) Compositional Analysis of Contract Signing Protocols.
Theoretical Computer Science, 367 (1-2). pp. 33-56.

Backes, Michael
(2006) Real-or-Random Key Secrecy of the Otway-Rees Protocol via a Symbolic Security Proof.
Electronic Notes in Theoretical Computer Science (ENTCS), 155. pp. 111-145.

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2005) Reactively Secure Signature Schemes.
International Journal of Information Security (IJIS), 4 (4). pp. 242-252.

Backes, Michael and Pfitzmann, Birgit
(2005) Relating Symbolic and Cryptographic Secrecy.
IEEE Transactions on Dependable and Secure Computing (TDSC), 2 (2). pp. 109-123.

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2005) Symmetric Authentication Within a Simulatable Cryptographic Library.
International Journal of Information Security (IJIS), 4 (3). pp. 135-154.

Backes, Michael
(2005) Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions.
Journal of Logic and Algebraic Programming (JLAP), 2. pp. 157-188.

Backes, Michael and Pfitzmann, Birgit
(2004) Computational Probabilistic Non-Interference.
International Journal of Information Security (IJIS), 3 (1). pp. 42-60.

Backes, Michael and Pfitzmann, Birgit
(2004) A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol.
IEEE Journal on Selected Areas of Computing (JSAC), 22 (10). pp. 2075-2086.

Backes, Michael and Pfitzmann, Birgit and Steiner, Michael and Waidner, Michael
(2004) Polynomial Liveness.
Journal of Computer Security, 12 (3-4). pp. 589-617.

Backes, Michael
(2002) Factorization of Univariate Polynomials.

Backes, Michael
(2002) New Number-Theoretic Assumptions in Cryptography (in german).

Book Section

Backes, Michael and Meiser, Sebastian and Schröder, Dominique
(2016) Delegatable Functional Signatures.
In: UNSPECIFIED Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 357-386. ISBN 978-3-662-49384-7

Backes, Michael and Berrang, Pascal and Manoharan, Praveen
(2016) From Zoos to Safaris - From Closed-World Enforcement to Open-World Assessment of Privacy.
In: UNSPECIFIED Springer International Publishing, Cham, pp. 87-138. ISBN 978-3-319-43005-8

Backes, Michael and Gerling, Sebastian and Hammer, Christian and Maffei, Matteo and Styp-Rekowsky, Philipp von
(2013) AppGuard - Enforcing User Requirements on Android Apps.
In: Tools and Algorithms for the Construction and Analysis of Systems. Springer, pp. 545-550.

Styp-Rekowsky, Philipp von and Gerling, Sebastian and Backes, Michael and Hammer, Christian
(2013) Callee-site Rewriting of Sealed System Libraries.
In: Engineering Secure Software and Systems. Springer, pp. 33-41.

Backes, Michael and Dürmuth, Markus
(2007) Enterprise Privacy Policies and Languages.
In: UNSPECIFIED Elsevier.

Backes, Michael and Dürmuth, Markus
(2007) Enterprise Privacy Policies and Languages.
In: UNSPECIFIED Elsevier.

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2004) Justifying a Dolev-Yao Model under Active Attacks.
In: UNSPECIFIED Lecture Notes in Computer Science, 3655 . Springer, pp. 1-42.

Monograph

Hanzlik, Lucjan and Zhang, Yang and Grosse, Kathrin and Salem, Ahmed and Augustin, Max and Backes, Michael and Fritz, Mario
(2018) MLCapsule: Guarded Offline Deployment of Machine Learning as a Service.
Technical Report. Arxiv.

Backes, Michael and Bugiel, Sven and Derr, Erik and Hammer, Christian
(2014) Taking Android App Vetting to the Next Level with Path-sensitive Value Analysis.
Technical Report. UNSPECIFIED.
(Unpublished)

Backes, Michael and Gerling, Sebastian and Hammer, Christian and Maffei, Matteo and Styp-Rekowsky, Philipp von
(2013) AppGuard - Fine-grained Policy Enforcement for Untrusted Android Applications.
Technical Report. UNSPECIFIED.
(Unpublished)

Backes, Michael and Gerling, Sebastian and Hammer, Christian and Maffei, Matteo and Styp-Rekowsky, Philipp von
(2012) AppGuard - Real-time Policy Enforcement for Third-Party Applications.
Technical Report. UNSPECIFIED.
(Unpublished)

Backes, Julian and Backes, Michael and Dürmuth, Markus and Lorenz, Stefan and Gerling, Sebastian
(2011) X-pire! - A digital expiration date for images in social networks.
Technical Report. UNSPECIFIED.

Conference or Workshop Item

Nguyen, Duc Cuong and Derr, Erik and Backes, Michael and Bugiel, Sven
(2019) Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security & Privacy.
In: Proceedings of the IEEE Symposium on Security & Privacy, May 2019, May 2019, San Francisco, CA, USA.
Conference: S&P - IEEE Symposium on Security and Privacy

Eskandarian, Saba and Cogan, Jonathan and Birnbaum, Sawyer and Brandon, Peh Chang Wei and Franke, Dillon and Fraser, Forest and Garcia, Gaspar and Gong, Eric and Nguyen, Hung T. and Sethi, Taresh K. and Subbiah, Vishal and Backes, Michael and Pellegrino, Giancarlo and Boneh, Dan
(2019) Fidelius: Protecting User Secrets from Compromised Browsers.
In: S&P 2019.
Conference: S&P - IEEE Symposium on Security and Privacy

Hagestedt, Inken and Zhang, Yang and Humbert, Mathias and Berrang, Pascal and Haixu, Tang and XiaoFeng, Wang and Backes, Michael
(2019) MBeacon: Privacy-Preserving Beacons for DNA Methylation Data.
In: 26th Annual Network and Distributed System Security Symposium (NDSS 2019).
Conference: NDSS - Network and Distributed System Security Symposium

Salem, Ahmed and Zhang, Yang and Humbert, Mathias and Berrang, Pascal and Fritz, Mario and Backes, Michael
(2019) ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models.
In: 26th Annual Network and Distributed System Security Symposium (NDSS 2019).
Conference: NDSS - Network and Distributed System Security Symposium

Ghorbani Lyastani, Sanam and Schilling, Michael and Fahl, Sascha and Backes, Michael and Bugiel, Sven
(2018) Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse.
In: 27th USENIX Security Symposium (USENIX Security 18).
Conference: USENIX-Security - Usenix Security Symposium

Fass, Aurore and Krawczyk, Robert and Backes, Michael and Stock, Ben
(2018) JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript.
In: Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA '18).
Conference: None | Not Set

Xu, Meng and Qian, Chenxiong and Lu, Kangjie and Backes, Michael and Kim, Taesoo
(2018) Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels.
In: In Proceedings of the 39th IEEE Symposium on Security and Privacy (Oakland). San Francisco, CA, May 2018..
Conference: S&P - IEEE Symposium on Security and Privacy

Stock, Ben and Pellegrino, Giancarlo and Li, Frank and Backes, Michael and Rossow, Christian
(2018) Didn’t You Hear Me? — Towards More Successful Web Vulnerability Notifications.
In: Proceedings of the 25th Annual Symposium on Network and Distributed System Security (NDSS '18)..
Conference: NDSS - Network and Distributed System Security Symposium

Berrang, Pascal and Humbert, Mathias and Zhang, Yang and Lehmann, Irina and Eils, Roland and Backes, Michael
(2018) Dissecting Privacy Risks in Biomedical Data.
In: Proceedings of the 3rd IEEE European Symposium on Security and Privacy (Euro S&P).
Conference: EuroS&P - IEEE European Symposium on Security and Privacy

Speicher, Patrick and Steinmetz, Marcel and Künnemann, Robert and Simeonovski, Milivoj and Pellegrino, Giancarlo and Hoffmann, Jörg and Backes, Michael
(2018) Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure.
In: 2018 IEEE European Symposium on Security and Privacy, EuroS&P 2018, London, United Kingdom, April 24-26, 2018.
Conference: EuroS&P - IEEE European Symposium on Security and Privacy

Asghar, Muhammad Rizwan and Backes, Michael and Simeonovski, Milivoj
(2018) PRIMA: Privacy-Preserving Identity and Access Management at Internet-Scale.
In: 2018 IEEE International Conference on Communications (ICC) Kansas City, MO, USA, 20-24 May 2018.
Conference: None | Not Set

Salem, Ahmed and Berrang, Pascal and Humbert, Mathias and Backes, Michael
(2018) Privacy-Preserving Similar Patient Queries for Combined Biomedical Data.
In: The 19th Privacy Enhancing Technologies Symposium (PETS).
Conference: None | Not Set
(In Press)

Oltrogge, Marten and Derr, Erik and Stransky, Christian and Acar, Yasemin and Fahl, Sascha and Rossow, Christian and Pellegrino, Giancarlo and Bugiel, Sven and Backes, Michael
(2018) The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators.
In: 39th IEEE Symposium on Security and Privacy (SP '18).
Conference: S&P - IEEE Symposium on Security and Privacy

Backes, Michael and Hanzlik, Lucjan and Kluczniak, Kamil and Schneider, Jonas
(2018) Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys.
In: IACR ASIACRYPT 2018.
Conference: ASIACRYPT - International Conference on the Theory and Application of Cryptology and Information Security
(In Press)

Speicher, Patrick and Steinmetz, Marcel and Backes, Michael and Hoffmann, Jörg and Künnemann, Robert
(2018) Stackelberg Planning: Towards Effective Leader-Follower State Space Search.
In: The Thirty-Second AAAI Conference on Artificial Intelligence (AAAI-18), New Orleans, Louisiana, USA.
Conference: AAAI - National Conference of the American Association for Artificial Intelligence

Zhang, Yang and Humbert, Mathias and Rahman, Tahleen and Li, Cheng-Te and Pang, Jun and Backes, Michael
(2018) Tagvisor: A Privacy Advisor for Sharing Hashtags.
In: Proceedings of the Web Conference 2018 (WWW).
Conference: WWW - International World Wide Web Conference

Krupp, Johannes and Karami, Mohammad and Rossow, Christian and McCoy, Damon and Backes, Michael
(2017) Linking Amplification DDoS Attacks to Booter Services.
In: International Symposium on Research in Attacks, Intrusions, and Defenses, September 18-20, 2017, Atlanta, GA, USA.
Conference: RAID - International Symposium on Recent Advances in Intrusion Detection

Backes, Michael and Gomez-Rodriguez, Manuel and Manoharan, Praveen and Surma, Bartlomiej
(2017) Reconciling Privacy and Utility in Continuous-Time Diffusion Networks.
In: Proceedings of the 30th IEEE Computer Security Foundations Symposium (CSF '17).
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Stransky, Christian and Acar, Yasemin and Nguyen, Duc Cuong and Wermke, Dominik and Redmiles, Elissa M. and Kim, Doowon and Backes, Michael and Garfinkel, Simson and Mazurek, Michelle and Fahl, Sascha
(2017) Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers.
In: Proceedings of the 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET '17).
Conference: None | Not Set

Backes, Michael and Berrang, Pascal and Bieg, Matthias and Elis, Roland and Herrmann, Carl and Humbert, Mathias and Lehmann, Irina
(2017) Identifying Personal DNA Methylation Profiles by Genotype Inference.
In: Proceedings of the 38th IEEE Symposium on Security and Privacy (S&P).
Conference: S&P - IEEE Symposium on Security and Privacy

Acar, Yasemin and Backes, Michael and Fahl, Sascha and Garfinkel, Simson and Kim, Doowon and Mazurek, Michelle and Stransky, Christian
(2017) Comparing the Usability of Cryptographic APIs.
In: 38th IEEE Symposium on Security and Privacy (S&P '17).
Conference: S&P - IEEE Symposium on Security and Privacy

Fischer, Felix and Böttinger, Konstantin and Xiao, Huang and Stransky, Christian and Acar, Yasemin and Backes, Michael and Fahl, Sascha
(2017) Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security.
In: 38th IEEE Symposium on Security and Privacy (S&P '17).
Conference: S&P - IEEE Symposium on Security and Privacy

Backes, Michael and Bugiel, Sven and Schranz, Oliver and Styp-Rekowsky, Philipp von and Weisgerber, Sebastian
(2017) ARTist: The Android Runtime Instrumentation and Security Toolkit.
In: Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17).
Conference: EuroS&P - IEEE European Symposium on Security and Privacy

Backes, Michael and Rieck, Konrad and Skoruppa, Malte and Stock, Ben and Yamaguchi, Fabian
(2017) Efficient and Flexible Discovery of PHP Application Vulnerabilities.
In: Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17).
Conference: EuroS&P - IEEE European Symposium on Security and Privacy

Backes, Michael and Nauman, Mohammad
(2017) LUNA: Quantifying and Leveraging Uncertainty in Android Malware Analysis through Bayesian Machine Learning.
In: Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17).
Conference: EuroS&P - IEEE European Symposium on Security and Privacy

Backes, Michael and Dreier, Jannik and Kremer, Steve and Künnemann, Robert
(2017) A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and its Application to Fair Exchange.
In: Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17).
Conference: EuroS&P - IEEE European Symposium on Security and Privacy

Simeonovski, Milivoj and Pellegrino, Giancarlo and Rossow, Christian and Backes, Michael
(2017) Who Controls the Internet? Analyzing Global Threats using Property Graph Traversals.
In: Proc. of the 26rd International Conference on World Wide Web (WWW 2017).
Conference: WWW - International World Wide Web Conference

Maisuradze, Giorgi and Backes, Michael and Rossow, Christian
(2017) Dachshund: Digging for and Securing (Non-)Blinded Constants in JIT Code.
In: Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17).
Conference: NDSS - Network and Distributed System Security Symposium

Lu, Kangjie and Walter, Marie-Therese and Pfaff, David and Nürnberger, Stefan and Lee, Wenke and Backes, Michael
(2017) Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying.
In: Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17).
Conference: NDSS - Network and Distributed System Security Symposium

Stock, Ben and Johns, Martin and Steffens, Marius and Backes, Michael
(2017) How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security.
In: Proceedings of the 26th USENIX Security Symposium (USENIX Security '17).
Conference: USENIX-Security - Usenix Security Symposium

Huang, Jie and Schranz, Oliver and Bugiel, Sven and Backes, Michael
(2017) The ART of App Compartmentalization: Compiler-based Library Privilege Separation on Stock Android.
In: Proceedings of the 24th ACM Conference on Computer and Communication Security (CCS'17).
Conference: CCS - ACM Conference on Computer and Communications Security

Grosse, Kathrin and Papernot, Nicolas and Manoharan, Praveen and Backes, Michael and McDaniel, Patrick
(2017) Adversarial Examples for Malware Detection.
In: Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II.
Conference: ESORICS - European Symposium On Research In Computer Security

Pellegrino, Giancarlo and Johns, Martin and Koch, Simon and Backes, Michael and Rossow, Christian
(2017) Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs.
In: Proceedings of the 24th ACM Conference on Computer and Communication Security (CCS'17).
Conference: CCS - ACM Conference on Computer and Communications Security

Derr, Erik and Bugiel, Sven and Fahl, Sascha and Acar, Yasemin and Backes, Michael
(2017) Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android.
In: Proceedings of the 24th ACM Conference on Computer and Communication Security (CCS'17).
Conference: CCS - ACM Conference on Computer and Communications Security

Backes, Michael and Bugiel, Sven and von Styp-Rekowsky, Philipp and Wißfeld, Marvin
(2017) Seamless In-App Ad Blocking on Stock Android.
In: Mobile Security Technologies (MOST) 2017 Workshop.
Conference: None | Not Set

Nguyen, Duc Cuong and Wermke, Dominik and Acar, Yasemin and Backes, Michael and Weir, Charles Alexander Forbes and Fahl, Sascha
(2017) A Stitch in Time: Supporting Android Developers in Writing Secure Code.
In: Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS '17).
Conference: CCS - ACM Conference on Computer and Communications Security

Backes, Michael and Humbert, Mathias and Pang, Jun and Zhang, Yang
(2017) walk2friends: Inferring Social Links from Mobility Profiles.
In: Proceedings of the 24th ACM Conference on Computer and Communication Security (CCS'17).
Conference: CCS - ACM Conference on Computer and Communications Security

Backes, Michael and Berrang, Pascal and Humbert, Mathias and Shen, Xiaoyu and Wolf, Verena
(2016) Simulating the Large-Scale Erosion of Genomic Privacy Over Time.
In: Proceedings of the 3rd International Workshop on Genome Privacy and Security (GenoPri'16).
Conference: None | Not Set

Backes, Michael and Künnemann, Robert and Mohammadi, Esfandiar
(2016) Computational Soundness for Dalvik Bytecode.
In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS'16).
Conference: CCS - ACM Conference on Computer and Communications Security

Schneider, Jonas and Fleischhacker, Nils and Schröder, Dominique and Backes, Michael
(2016) Efficient Cryptographic Password Hardening Services From Partially Oblivious Commitments.
In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16 ).
Conference: CCS - ACM Conference on Computer and Communications Security

Krupp, Johannes and Backes, Michael and Rossow, Christian
(2016) Identifying the Scan and Attack Infrastructures behind Amplification DDoS attacks.
In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16).
Conference: CCS - ACM Conference on Computer and Communications Security

Backes, Michael and Berrang, Pascal and Humbert, Mathias and Manoharan, Praveen
(2016) Membership Privacy in MicroRNA-based Studies.
In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16).
Conference: CCS - ACM Conference on Computer and Communications Security

Backes, Michael and Berrang, Pascal and Goga, Oana and Gummadi, Krishna P. and Manoharan, Praveen
(2016) On Profile Linkability despite Anonymity in Social Media Systems.
In: Proceedings of the 2016 ACM Workshop on Privacy in the Electronic Society (WPES).
Conference: None | Not Set

Backes, Michael and Bugiel, Sven and Derr, Erik
(2016) Reliable Third-Party Library Detection in Android and its Security Applications.
In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16).
Conference: CCS - ACM Conference on Computer and Communications Security

Backes, Michael and Holz, Thorsten and Rossow, Christian and Rytilahti, Teemu and Simeonovski, Milivoj and Stock, Ben
(2016) On the Feasibility of TTL-based Filtering for DRDoS Mitigation.
In: RAID 2016, 19th International Symposium on Research in Attacks, Intrusions and Defenses.
Conference: RAID - International Symposium on Recent Advances in Intrusion Detection

Stock, Ben and Pellegrino, Giancarlo and Rossow, Christian and Johns, Martin and Backes, Michael
(2016) Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security - Usenix Security Symposium

Backes, Michael and Bugiel, Sven and Derr, Erik and McDaniel, Patrick and Octeau, Damien and Weisgerber, Sebastian
(2016) On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security - Usenix Security Symposium

Backes, Michael and Berrang, Pascal and Hecksteden, Anne and Humbert, Mathias and Keller, Andreas and Meyer, Tim
(2016) Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security - Usenix Security Symposium

Maisuradze, Giorgi and Backes, Michael and Rossow, Christian
(2016) What Cannot be Read, Cannot be Leveraged? Revisiting Assumptions of JIT-ROP Defenses.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security - Usenix Security Symposium

Brengel, Michael and Backes, Michael and Rossow, Christian
(2016) Detecting Hardware-Assisted Virtualization.
In: Detection of Intrusions and Malware, and Vulnerability Assessment: 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings.
Conference: None | Not Set

Backes, Michael and Bugiel, Sven and Derr, Erik and Gerling, Sebastian and Hammer, Christian
(2016) R-Droid: Leveraging Android App Analysis with Static Slice Optimization.
In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security.
Conference: None | Not Set

Götzfried, Johannes and Müller, Tilo and Drescher, Gabor and Nürnberger, Stefan and Backes, Michael
(2016) RamCrypt: Kernel-based Address Space Encryption for User-mode Processes.
In: ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIACCS).
Conference: None | Not Set

Acar, Yasemin and Backes, Michael and Bugiel, Sven and Fahl, Sascha and McDaniel, Patrick and Smith, Matthew
(2016) SoK: Lessons Learned From Android Security Research For Appified Software Platforms.
In: 37th IEEE Symposium on Security and Privacy (S&P '16).
Conference: S&P - IEEE Symposium on Security and Privacy

Acar, Yasemin and Backes, Michael and Fahl, Sascha and Kim, Doowon and Mazurek, Michelle and Stransky, Christian
(2016) You Get Where You're Looking For: The Impact Of Information Sources On Code Security.
In: 37th IEEE Symposium on Security and Privacy (S&P '16).
Conference: S&P - IEEE Symposium on Security and Privacy

Backes, Michael and Hammer, Christian and Pfaff, David and Skoruppa, Malte
(2016) Implementation-level Analysis of the JavaScript Helios Voting Client.
In: Proceedings of the 31st Annual ACM Symposium on Applied Computing - SAC 2016.
Conference: None | Not Set

Lu, Kangjie and Backes, Michael and Nürnberger, Stefan and Lee, Wenke
(2016) How to Make ASLR Win the Clone Wars: Runtime Re-Randomization.
In: Proceedings of the 23rd Annual Symposium on Network and Distributed System Security (NDSS '16).
Conference: NDSS - Network and Distributed System Security Symposium

Backes, Michael and Herzberg, Amir and Kate, Aniket and Pryvalov, Ivan
(2016) Anonymous RAM.
In: 21st European Symposium on Research in Computer Security (ESORICS).
Conference: ESORICS - European Symposium On Research In Computer Security

Backes, Michael and Bugiel, Sven and Huang, Jie and Schranz, Oliver
(2016) POSTER: The ART of App Compartmentalization.
In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16 ).
Conference: CCS - ACM Conference on Computer and Communications Security

Yokoyama, Akira and Ishii, Kou and Tanabe, Rui and Papa, Yinmin and Yoshioka, Katsunari and Matsumoto, Tsutomu and Kasama, Takahiro and Inoue, Daisuke and Brengel, Michael and Backes, Michael and Rossow, Christian
(2016) SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion.
In: Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings.
Conference: RAID - International Symposium on Recent Advances in Intrusion Detection

Stock, Ben and Pellegrino, Giancarlo and Rossow, Christian and Johns, Martin and Backes, Michael
(2016) POSTER: Mapping the Landscape of Large-Scale Vulnerability Notifications.
In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016.
Conference: CCS - ACM Conference on Computer and Communications Security

Backes, Michael and Meiser, Sebastian and Slowik, Marcin
(2015) Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms Against Structural Attacks.
In: Proceedings on Privacy Enhancing Technologies.
Conference: None | Not Set

Rossow, Christian and Mohammadi, Esfandiar and Backes, Michael and Meiser, Sebastian and Koch, Simon
(2015) POSTER: In the Net of the Spider - Measuring the Anonymity-Impact of Network-level Adversaries Against Tor.
In: Proceedings of the 22nd ACM conference on Computer and Communications Security (ACM CCS '15).
Conference: CCS - ACM Conference on Computer and Communications Security

Backes, Michael and Schranz, Oliver and Styp-Rekowsky, Philipp von
(2015) POSTER: Towards Compiler-Assisted Taint Tracking on the Android Runtime (ART).
In: Proceedings of the 22nd ACM conference on Computer and Communications Security (ACM CCS '15).
Conference: CCS - ACM Conference on Computer and Communications Security

Backes, Michael and Bugiel, Sven and Hammer, Christian and Schranz, Oliver and Styp-Rekowsky, Philipp von
(2015) Boxify: Full-fledged App Sandboxing for Stock Android.
In: Proceedings of the 24th USENIX Security Symposium (USENIX '15).
Conference: USENIX-Security - Usenix Security Symposium

Mohammadi, Esfandiar and Bendun, Fabian and Pecina, Kim and Maffei, Matteo and Backes, Michael
(2015) Symbolic Malleable Zero-knowledge Proofs.
In: Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF '15).
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Simeonovski, Milivoj and Bendun, Fabian and Asghar, Muhammad Rizwan and Backes, Michael and Marnau, Ninja and Druschel, Peter
(2015) Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
In: 13th International Conference on Applied Cryptography and Network Security (ACNS).
Conference: None | Not Set

Backes, Michael and Barbosa, Manuel and Fiore, Dario and Reischuk, Raphael M.
(2015) ADSNARK: Nearly-Practical Privacy-Preserving Proofs on Authenticated Data.
In: Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P).
Conference: S&P - IEEE Symposium on Security and Privacy

Backes, Michael and Bendun, Fabian and Hoffmann, Jörg and Marnau, Ninja
(2015) PriCL: Creating a Precedent. A Framework for Reasoning about Privacy Case Law.
In: Proceedings of the 4th Conference on Principles of Security and Trust (POST).
Conference: None | Not Set

Backes, Michael and Gagné, Martin and Thyagarajan, Sri Aravinda Krishnan
(2015) Fully Secure Inner-Product Proxy Re-Encryption with constant size Ciphertext.
In: ACM ASIACCS Security in Cloud Computing Workshop 2015.
Conference: None | Not Set

Backes, Michael and Mohammadi, Esfandiar and Ruffing, Tim
(2015) Computational Soundness for Interactive Primitves.
In: Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS'15).
Conference: ESORICS - European Symposium On Research In Computer Security

Backes, Michael and Kate, Aniket and Meiser, Sebastian and Ruffing, Tim
(2015) Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources.
In: Proceedings of the 13th International Conference on Applied Cryptography and Network Security (ACNS'15).
Conference: None | Not Set

Backes, Michael and Bugiel, Sven and Gerling, Sebastian and Styp-Rekowsky, Philipp von
(2014) Android Security Framework: Extensible Multi-Layered Access Control on Android.
In: In Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC'14).
Conference: ACSAC - Annual Computer Security Applications Conference

Backes, Michael and Bugiel, Sven and Gerling, Sebastian
(2014) Scippa: System-Centric IPC Provenance on Android.
In: In Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC'14).
Conference: ACSAC - Annual Computer Security Applications Conference

Backes, Michael and Kate, Aniket and Meiser, Sebastian and Mohammadi, Esfandiar
(2014) (Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection.
In: Proceedings of the 21st ACM Conference on Computer and Communications Security (ACM CCS '14).
Conference: CCS - ACM Conference on Computer and Communications Security

Backes, Michael and Holz, Thorsten and Kollenda, Benjamin and Koppe, Philipp and Nürnberger, Stefan and Pewny, Jannik
(2014) You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code.
In: Proceedings of the 21st ACM conference on Computer and Communications Security (ACM CCS '14).
Conference: CCS - ACM Conference on Computer and Communications Security

Backes, Michael and Grimm, Niklas and Kate, Aniket
(2014) Lime: Data Lineage in the Malicious Environment.
In: Proceedings of 10th International Workshopon Security and Trust Management (STM).
Conference: None | Not Set

Backes, Michael and Nürnberger, Stefan
(2014) Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing.
In: Proceedings of the 23rd USENIX Security Symposium (USENIX '14).
Conference: USENIX-Security - Usenix Security Symposium

Backes, Michael and Manoharan, Praveen and Mohammadi, Esfandiar
(2014) TUC: Time-sensitive and Modular Analysis of Anonymous Communication.
In: Proceedings of the of the 27th IEEE Computer Security Foundations Symposium (CSF '14).
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Backes, Michael and Bendun, Fabian and Choudhury, Ashish and Kate, Aniket
(2014) Asynchronous MPC with a Strict Honest Majority Using Non-equivocation.
In: ACM Symposium on Principles of Distributed Computing 2014.
Conference: PODC - ACM Symposium on Principles of Distributed Computing

Backes, Michael and Gerling, Rainer W. and Gerling, Sebastian and Nürnberger, Stefan and Schröder, Dominique and Simkin, Mark
(2014) WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP.
In: 12th International Conference on Applied Cryptography and Network Security (ACNS 2014).
Conference: None | Not Set

Backes, Michael and Clark, Jeremy and Kate, Aniket and Simeonovski, Milivoj and Druschel, Peter
(2014) BackRef: Accountability in Anonymous Communication Networks.
In: Applied Cryptography and Network Security.
Conference: None | Not Set

Backes, Michael and Gerling, Sebastian and Lorenz, Stefan and Lukas, Stephan
(2014) X-pire 2.0 - A User-Controlled Expiration Date and Copy Protection Mechanism.
In: 29th ACM Symposium on Applied Computing (SAC 2014).
Conference: None | Not Set

Backes, Michael and Mohammadi, Esfandiar and Ruffing, Tim
(2014) Computational Soundness Results for ProVerif - Bridging the Gap from Trace Properties to Uniformity.
In: Proceedings of the 3rd Conference on Principles of Security and Trust (POST).
Conference: None | Not Set

Backes, Michael and Gagné, Martin and Skoruppa, Malte
(2013) Using Mobile Device Communication to Strengthen e-Voting Protocols.
In: Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society - WPES 2013.
Conference: None | Not Set

Backes, Michael and Fiore, Dario and Reischuk, Raphael M.
(2013) Verifiable Delegation of Computation on Outsourced Data.
In: Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS '11).
Conference: CCS - ACM Conference on Computer and Communications Security

Backes, Michael and Gerling, Sebastian and Hammer, Christian and Maffei, Matteo and Styp-Rekowsky, Philipp von
(2013) AppGuard – Fine-grained Policy Enforcement for Untrusted Android Applications.
In: 8th International Workshop on Data Privacy Management (DPM'13).
Conference: None | Not Set

Backes, Michael and Meiser, Sebastian
(2013) Differentially Private Smart Metering with Battery Recharging.
In: Proceedings of the 8th International Workshop on Data Privacy Managemant (DPM 2013).
Conference: None | Not Set

Backes, Michael and Kate, Aniket and Manoharan, Praveen and Meiser, Sebastian and Mohammadi, Esfandiar
(2013) AnoA: A Framework For Analyzing Anonymous Communication Protocols.
In: Proceedings of the 26th IEEE Computer Security Foundations Symposium (CSF '13).
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Backes, Michael and Bendun, Fabian and Unruh, Dominique
(2013) Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized Verification.
In: Principles of Security and Trust 2013.
Conference: None | Not Set

Backes, Michael and Doychev, Goran and Köpf, Boris
(2013) Preventing Side-Channel Leaks in Web Traffic: A Formal Approach.
In: Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS '13).
Conference: NDSS - Network and Distributed System Security Symposium

Backes, Michael and Kate, Aniket and Manoharan, Praveen and Meiser, Sebastian and Mohammadi, Esfandiar
(2013) AnoA: A Framework for Analyzing Anonymous Communication Protocols.
In: 6th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs).
Conference: None | Not Set

Backes, Michael and Datta, Amit and Kate, Aniket
(2013) Asynchronous Computational VSS with Reduced Communication Complexity.
In: Proc. of the 2013 Cryptographers' Track at the RSA Conference (CT-RSA 2013).
Conference: None | Not Set

Styp-Rekowsky, Philipp von and Gerling, Sebastian and Backes, Michael and Hammer, Christian
(2013) Idea: Callee-Site Rewriting of Sealed System Libraries.
In: International Symposium on Engineering Secure Software and Systems (ESSoS'13).
Conference: None | Not Set

Backes, Michael and Fiore, Dario and Mohammadi, Esfandiar
(2013) Privacy-Preserving Accountable Computation.
In: Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS).
Conference: ESORICS - European Symposium On Research In Computer Security

Backes, Michael and Malik, Ankit and Unruh, Dominique
(2012) Computational Soundness without Protocol Restrictions.
In: Proceedings of the 19th ACM Conference on Computer and Communication Security (CCS '12).
Conference: CCS - ACM Conference on Computer and Communications Security

Backes, Michael and Kate, Aniket and Mohammadi, Esfandiar
(2012) Ace: An Efficient Key-Exchange Protocol for Onion Routing.
In: Proceedings of the 11th ACM Workshop on Privacy in the Electronic Society (WPES).
Conference: None | Not Set

Backes, Michael and Bendun, Fabian and Kate, Aniket
(2012) Brief announcement: distributed cryptography using trinc.
In: ACM Symposium on Principles of Distributed Computing 2012.
Conference: PODC - ACM Symposium on Principles of Distributed Computing

Backes, Michael and Barthe, Gilles and Berg, Matthias and Grégoire, Benjamin and Kunz, César and Skoruppa, Malte and Béguelin, Santiago Zanella
(2012) Verified Security of Merkle-Damgård.
In: Proceedings of the 25th IEEE Computer Security Foundations Symposium - CSF 2012.
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Backes, Michael and Kate, Aniket and Maffei, Matteo and Pecina, Kim
(2012) ObliviAd: Provably Secure and Practical Online Behavioral Advertising.
In: Proceedings of the 33rd IEEE Symposium on Security and Privacy 2012 (Oakland 2012).
Conference: S&P - IEEE Symposium on Security and Privacy

Backes, Michael and Maffei, Matteo and Pecina, Kim
(2012) Automated Synthesis of Secure Distributed Applications.
In: Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS '12).
Conference: NDSS - Network and Distributed System Security Symposium

Backes, Michael and Goldberg, Ian and Kate, Aniket and Toft, Tomas
(2012) Adding query privacy to robust DHTs.
In: Proc. of the 7th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2012).
Conference: None | Not Set

Backes, Michael and Bendun, Fabian and Unruh, Dominique
(2012) Computational Soundness of Symbolic Zero-knowledge Proofs: Weaker Assumptions and Mechanized Verification.
In: Eight Workshop on Formal and Computational Cryptography (FCC 2012).
Conference: None | Not Set
(Unpublished)

Mainberger, Markus and Backes, Michael and Berg, Matthias and Weickert, Joachim
(2012) Diffusion-Based Image Compression in Steganography.
In: Proceedings of the 8th International Symposium on Visual Computing -- ISVC 2012.
Conference: None | Not Set

Backes, Michael and Busenius, Alex and Hriţcu, Cătălin
(2012) On the Development and Formalization of an Extensible Code Generator for Real Life Security Protocols.
In: Proc. 4th NASA Formal Methods Symposium (NFM 2012).
Conference: None | Not Set

Backes, Michael and Kate, Aniket and Goldberg, Ian and Mohammadi, Esfandiar
(2012) Provably Secure and Practical Onion Routing.
In: Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF).
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Reischuk, Raphael M. and Backes, Michael and Gehrke, Johannes
(2012) SAFE Extensibility of Data-Driven Web Applications.
In: WWW~'12: Proceedings of the 21st International World Wide Web Conference.
Conference: WWW - International World Wide Web Conference

Backes, Michael and Maffei, Matteo and Pecina, Kim
(2011) A Security API for Distributed Social Networks.
In: Proceedings of the Network and Distributed System Security Symposium (NDSS '11).
Conference: NDSS - Network and Distributed System Security Symposium

Backes, Michael and Hriţcu, Cătălin and Tarrach, Thorsten
(2011) Automatically Verifying Typing Constraints for a Data Processing Language.
In: Proc. 1st International Conference on Certified Programs and Proofs (CPP 2011).
Conference: None | Not Set

Backes, Michael and Kate, Aniket and Patra, Arpita
(2011) Computational Verifiable Secret Sharing Revisited.
In: Proc. 17th International Conference on the Theory and Application of Cryptology (ASIACRYPT 2011).
Conference: ASIACRYPT - International Conference on the Theory and Application of Cryptology and Information Security

Backes, Michael and Maffei, Matteo and Pecina, Kim and Reischuk, Raphael M.
(2011) G2C: Cryptographic Protocols from Goal-Driven Specifications.
In: TOSCA'11: Proceedings of the 2011 International Conference on Theory of Security and Applications (now POST), held as part of ETAPS 2011.
Conference: None | Not Set

Backes, Michael and Berg, Matthias and Köpf, Boris
(2011) Non-Uniform Distributions in Quantitative Information-Flow.
In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS).
Conference: None | Not Set

Backes, Michael and Maffei, Matteo and Pecina, Kim
(2011) Securing social networks.
In: Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, PODC 2011, San Jose, CA, USA, June 6-8, 2011.
Conference: PODC - ACM Symposium on Principles of Distributed Computing

Backes, Michael and Hriţcu, Cătălin and Maffei, Matteo
(2011) Union and Intersection Types for Secure Protocol Implementations.
In: Theory of Security and Applications - Joint Workshop, TOSCA 2011, Saarbrücken, Germany, March 31 - April 1, 2011, Revised Selected Papers.
Conference: None | Not Set

Backes, Michael and Dürmuth, Markus and Gerling, Sebastian and Pinkal, Manfred and Sporleder, Caroline
(2010) Acoustic Side-Channel Attacks of Printers.
In: Proceedings of 19th USENIX Security Symposium.
Conference: USENIX-Security - Usenix Security Symposium

Backes, Michael and Lorenz, Stefan and Maffei, Matteo and Pecina, Kim
(2010) Anonymity and Trust in Distributed Systems.
In: Proceedings of 29th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC).
Conference: PODC - ACM Symposium on Principles of Distributed Computing

Backes, Michael and Lorenz, Stefan and Maffei, Matteo and Pecina, Kim
(2010) Anonymous Webs of Trust.
In: Proceedings of 10th Privacy Enhancing Technologies Symposium (PETS).
Conference: None | Not Set

Backes, Michael and Maffei, Matteo and Mohammadi, Esfandiar
(2010) Computationally Sound Abstraction and Verification of Secure Multi-Party Computations.
In: Proceedings of the 30th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS).
Conference: None | Not Set

Backes, Michael and Maffei, Matteo and Unruh, Dominique
(2010) Computationally Sound Verification of Source Code.
In: ACM CCS 2010.
Conference: CCS - ACM Conference on Computer and Communications Security

Backes, Michael and Ciobotaru, Oana and Krohmer, Anton
(2010) RatFish: A File Sharing Protocol Provably Secure Against Rational Users.
In: Proceedings of 15th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael and Doychev, Goran and Dürmuth, Markus and Köpf, Boris
(2010) Speaker Recognition in Encrypted Voice-over-IP Traffic.
In: Proceedings of 15th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael and Grochulla, Martin and Hriţcu, Cătălin and Maffei, Matteo
(2009) Achieving Security Despite Compromise Using Zero-knowledge.
In: Proceedings of 22nd IEEE Computer Security Foundations Symposium (CSF).
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Backes, Michael and Hamerlik, Marek and Linari, Alessandro and Maffei, Matteo and Tryfonopoulos, Christos and Weikum, Gerhard
(2009) Anonymity and Censorship Resistance in Unstructured Overlay Networks.
In: On the Move to Meaningful Internet Systems: OTM 2009, Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part I.
Conference: None | Not Set

Backes, Michael and Hamerlik, Lech Marek and Linari, Alessandro and Maffei, Matteo and Tryfonopoulos, Christos and Weikum, Gerhard
(2009) Anonymous and Censorship-resistant Content-sharing in Unstructured Overlays.
In: Proceedings of OTM Conferences.
Conference: None | Not Set

Backes, Michael and Köpf, Boris and Rybalchenko, Andrey
(2009) Automatic Discovery and Quantification of Information Leaks.
In: Proceedings of 30th IEEE Symposium on Security and Privacy.

Backes, Michael and Druschel, Peter and Haeberlen, Andreas and Unruh, Dominique
(2009) CSAR: A practical and provable technique to make randomized systems accountable.
In: NDSS 2009.
Conference: NDSS - Network and Distributed System Security Symposium

Backes, Michael and Hofheinz, Dennis and Unruh, Dominique
(2009) CoSP: a general framework for computational soundness proofs.
In: Proceedings of the 16th ACM conference on Computer and communications security (CCS).
Conference: CCS - ACM Conference on Computer and Communications Security

Backes, Michael and Maffei, Matteo
(2009) Design and Verification of Anonymous Trust Protocols.
In: Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers.
Conference: None | Not Set

Backes, Michael and Chen, Tongbo and Dürmuth, Markus and Lensch, Hendrik and Welk, Martin
(2009) Tempest in a Teapot: Compromising Reflections Revisited.
In: Proceedings of 30th IEEE Symposium on Security and Privacy.

Backes, Michael and Hriţcu, Cătălin and Maffei, Matteo
(2008) Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-calculus.
In: Proceedings of 21st IEEE Computer Security Foundations Symposium (CSF).
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Backes, Michael and Hamerlik, Lech Marek and Linari, Alessandro and Maffei, Matteo and Tryfonopoulos, Christos and Weikum, Gerhard
(2008) Brief Announcement: Anonymous and Censorship-resistant Content-sharing in Unstructured Overlays.
In: Proceedings of 27th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC).
Conference: PODC - ACM Symposium on Principles of Distributed Computing

Backes, Michael and Lorenz, Stefan and Maffei, Matteo and Pecina, Kim
(2008) CASPA: Causality-based Abstraction for Security Protocol Analysis.
In: Proceedings of 20th International Conference on Computer Aided Verification (CAV).
Conference: CAV - Computer Aided Verification

Backes, Michael and Dürmuth, Markus and Unruh, Dominique
(2008) Compromising Reflections or How to Read LCD Monitors Around the Corner.
In: IEEE Symposium on Security and Privacy, Proceedings of SSP'08.

Backes, Michael and Unruh, Dominique
(2008) Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers.
In: 21st IEEE Computer Security Foundations Symposium, CSF 2008.
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Backes, Michael and Berg, Matthias and Unruh, Dominique
(2008) A Formal Language for Cryptographic Pseudocode.
In: LPAR 2008.

Backes, Michael and Köpf, Boris
(2008) Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks.
In: Proceedings of 13th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael and Unruh, Dominique
(2008) Limits of Constructive Security Proofs.
In: ASIACRYPT 2008.

Backes, Michael and Dürmuth, Markus and Unruh, Dominique
(2008) OAEP is Secure Under Key-dependent Messages.
In: ASIACRYPT 2008.

Backes, Michael and Maffei, Matteo and Hriţcu, Cătălin
(2008) Type-checking zero-knowledge.
In: Proceedings of the 15th ACM conference on Computer and communications security.
Conference: CCS - ACM Conference on Computer and Communications Security

Backes, Michael and Maffei, Matteo and Unruh, Dominique
(2008) Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol.
In: IEEE Symposium on Security and Privacy, Proceedings of SSP'08.
Conference: S&P - IEEE Symposium on Security and Privacy

Backes, Michael and Cortesi, Agostino and Focardi, Riccardo and Maffei, Matteo
(2007) A Calculus of Challenges and Responses.
In: Proceedings of 5th ACM Workshop on Formal Methods in Security Engineering (FMSE).
Conference: None | Not Set

Backes, Michael and Cortesi, Agostino and Maffei, Matteo
(2007) Causality-based Abstraction of Multiplicity in Security Protocols.
In: Proceedings of 20th IEEE Computer Security Foundation Symposium (CSF).
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Backes, Michael and Dürmuth, Markus and Unruh, Dominique
(2007) Information Flow in the Peer-Reviewing Process (extended abstract).
In: Proceedings of 28th IEEE Symposium on Security and Privacy (SSP).

Backes, Michael and Pfitzmann, Birgit and Scedrov, Andre
(2007) Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles.
In: Proceedings of 20th IEEE Computer Security Foundation Symposium (CSF).
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Backes, Michael and Dürmuth, Markus and Küsters, Ralf
(2007) On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography.
In: Proceedings of 27th International Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS).

Backes, Michael and Müller-Quade, Jörn and Unruh, Dominique
(2007) On the Necessity of Rewinding in Secure Multiparty Computation.
In: Theory of Cryptography, Proceedings of TCC 2007.

Backes, Michael and Laud, Peeter
(2006) Computationally Sound Secrecy Proofs by Mechanized Flow Analysis.
In: Proceedings of 13th ACM Conference on Computer and Communications Security (CCS).
Conference: CCS - ACM Conference on Computer and Communications Security

Backes, Michael and Dürmuth, Markus and Hofheinz, Dennis and Küsters, Ralf
(2006) Conditional Reactive Simulatability.
In: Proceedings of 11th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael and Cervesato, Iliano and Jaggard, Aaron D and Scedrov, Andre and Tsay, Joe-Kai
(2006) Cryptographically Sound Security Proofs for Basic and Public-key Kerberos.
In: Proceedings of 11th European Symposium on Research in Computer Security(ESORICS).

Sprenger, Christoph and Backes, Michael and Basin, David and Pfitzmann, Birgit and Waidner, Michael
(2006) Cryptographically Sound Theorem Proving.
In: Proceedings of 19th IEEE Computer Security Foundations Workshop (CSFW).

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2006) Formal Methods and Cryptography.
In: Proceedings of 14th International Symposium on Formal Methods (FM).

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2006) Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes.
In: Proceedings of 11th European Symposium on Research in Computer Security(ESORICS).

Backes, Michael and Pfitzmann, Birgit
(2006) On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol.
In: Proceedings of 21st IFIP International Information Security Conference (SEC).

Backes, Michael and Cachin, Christian and Oprea, Alina
(2006) Secure Key-Updating for Lazy Revocation.
In: Proceedings of 11th European Symposium on Research in Computer Security(ESORICS).

Backes, Michael and Mödersheim, Sebastian and Pfitzmann, Birgit and Vigano, Luca
(2006) Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario.
In: Proceedings of Foundations of Software Science and Computational Structures (FOSSACS).

Backes, Michael and Camenisch, Jan and Sommer, Dieter
(2005) Anonymous yet accountable access control.
In: Proceedings of 4th ACM Workshop on Privacy in the Electronic Society (WPES).

Backes, Michael and Datta, Anupam and Derek, Ante and Mitchell, John C. and Turuani, Mathieu
(2005) Compositional Analysis of Contract Signing Protocols.
In: Proceedings of 18th IEEE Computer Security Foundations Workshop (CSFW).

Backes, Michael and Dürmuth, Markus
(2005) A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System.
In: Proceedings of 18th IEEE Computer Security Foundations Workshop (CSFW).

Backes, Michael and Cachin, Christian and Oprea, Alina
(2005) Lazy Revocation in Cryptographic File Systems.
In: Proceedings of 3rd International IEEE Security in Storage Workshop (SISW).

Backes, Michael and Pfitzmann, Birgit
(2005) Limits of the Cryptographic Realization of Dolev-Yao-style XOR.
In: Proceedings of 10th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael and Hofheinz, Dennis and Müller-Quade, Jörn and Unruh, Dominique
(2005) On Fairness in Simulatability-based Cryptographic Systems.
In: 3rd ACM Workshop on Formal Methods in Security Engineering: From Specifications to Code.

Backes, Michael and Cachin, Christian
(2005) Public-Key Steganography with Active Attacks.
In: Proceedings of 2nd Theory of Cryptography Conference (TCC).

Backes, Michael
(2005) Quantifying Probabilistic Information Flow in Computational Reactive Systems.
In: Proceedings of 10th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael and Pfitzmann, Birgit
(2005) Relating Symbolic and Cryptographic Secrecy.
In: Proceedings of 26th IEEE Symposium on Security and Privacy.

Backes, Michael and Groß, Thomas
(2005) Tailoring the Dolev-Yao Abstraction to Web Services Realities - A Comprehensive Wish List.
In: Proceedings of 2005 ACM Secure Web Services Workshop (SWS).
Conference: None | Not Set

Backes, Michael and Dürmuth, Markus and Steinwandt, Rainer
(2004) An Algebra for Composing Enterprise Privacy Policies.
In: Proceedings of 9th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael
(2004) A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol.
In: Proceedings of 9th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael and Bagga, Walid and Karjoth, Günter and Schunter, Matthias
(2004) Efficient Comparison of Enterprise Privacy Policies.
In: Proceedings of 19th ACM Symposium on Applied Computing (SAC).

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2004) A General Composition Theorem for Secure Reactive System.
In: Proceedings of 1st Theory of Cryptography Conference (TCC).

Backes, Michael and Hofheinz, Dennis
(2004) How to Break and Repair a Universally Composable Signature Functionality.
In: Proceedings of 7th Information Security Conference (ISC).

Backes, Michael and Waidner, Michael and Pfitzmann, Birgit
(2004) Low-level Ideal Signatures and General Integrity Idealization.
In: Proceedings of 7th Information Security Conference (ISC).

Backes, Michael and Pfitzmann, Birgit
(2004) Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library.
In: Proceedings of 17th IEEE Computer Security Foundations Workshop (CSFW).

Backes, Michael and Dürmuth, Markus and Karjoth, Günter
(2004) Unification in Privacy Policy Evaluation - Translating EPAL to Prolog.
In: Proceedings of 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY).

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2003) A Composable Cryptographic Library with Nested Operations.
In: Proceedings of 10th ACM Conference on Computer and Communications Security (CCS).
Conference: CCS - ACM Conference on Computer and Communications Security

Backes, Michael and Pfitzmann, Birgit
(2003) A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol.
In: Proceedings of 23rd Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS).

Backes, Michael and Jacobi, Christian
(2003) Cryptographically Sound and Machine-Assisted Verification of Security Protocols.
In: Proceedings of 20th International Symposium on Theoretical Aspects of Computer Science (STACS).

Backes, Michael and Schunter, Matthias
(2003) From Absence of Certain Vulnerabilities towards Security Proofs - Pushing the Limits of Formal Verification.
In: Proceedings of the 10th ACM Workshop on New Security Paradigms (NSPW).

Backes, Michael and Pfitzmann, Birgit
(2003) Intransitive Non-Interference for Cryptographic Purposes.
In: Proceedings of 24th IEEE Symposium on Security and Privacy.

Backes, Michael and Cachin, Christian and Strobl, Reto
(2003) Proactive Secure Message Transmission in Asynchronous Networks.
In: Proceedings of 22nd ACM Symposium on Principles of Distributed Computing (PODC).

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2003) Reactively Secure Signature Schemes.
In: Proceedings of 6th Information Security Conference (ISC).

Backes, Michael and Cachin, Christian
(2003) Reliable broadcast in a computational hybrid model with Byzantine faults, crashes, and recoveries.
In: Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN).

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2003) Security in Business Process Engineering.
In: Proceedings of 2003 International Conference on Business Process Management.

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2003) Symmetric Authentication Within a Simulatable Cryptographic Library.
In: Proceedings of 8th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael and Pfitzmann, Birgit and Schunter, Matthias
(2003) A Toolkit for Managing Enterprise Privacy Policies.
In: Proceedings of 8th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael
(2003) Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions (Extended Abstract).
In: Proceedings of 14th International Conference on Concurrency Theory (CONCUR).

Backes, Michael and Pfitzmann, Birgit
(2002) Computational Probabilistic Non-Interference.
In: Proceedings of 7th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael and Jacobi, Christian and Pfitzmann, Birgit
(2002) Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation.
In: Proceedings of 11th International Symposium on Formal Methods Europe (FME).

Backes, Michael and Pfitzmann, Birgit and Steiner, Michael and Waidner, Michael
(2002) Polynomial Fairness and Liveness.
In: Proceedings of 15th IEEE Computer Security Foundations Workshop (CSFW).

Book

Backes, Michael and Gritzalis, Stefanos and Preneel, Bart and Katsikas, Sokratis K and Lopez, Javier
(2006) Proceedings of 9th International Conference on Information Security (ISC), Samos Island, Greece.
Lecture Notes in Computer Science, 4176 . Springer.

Backes, Michael and Scedrov, Andre
(2005) Proceedings of 3rd International Workshop on Security and Concurrency (SecCo), affiliated with CONCUR'05, San Francisco, CA.
ENTCS.

Backes, Michael and Basin, David and Waidner, Michael
(2003) Proceedings of 1st ACM Workshop on Formal Methods in Security Engineering (FMSE) , affiliated with ACM CCS'03, Washington D.C.
ACM.

Thesis

Backes, Michael
(2002) Cryptographically Sound Analysis of Security Protocols.
Doctoral thesis, Saarland University, Computer Science Department.

Other

Backes, Michael and Dürmuth, Markus and Unruh, Dominique
(2008) Gespiegelt / Verräterische Reflexionen: Wie Brillengläser Geheimnisse verraten.
Heise Verlag, Hannover
.

Backes, Michael and Cortesi, Agostino and Maffei, Matteo
(2007) Causality-based Abstraction of Multiplicity in Security Protocol Analysis.
UNSPECIFIED
.

Backes, Michael and Unruh, Dominique
(2007) On the Security of Protocols with Logarithmic Communication Complexity.
UNSPECIFIED
.

Backes, Michael and Dürmuth, Markus and Unruh, Dominique
(2007) Vorgetäuscht / Böse Textdokumente -- Postscript gone wild.
Heise Verlag, Hannover
.

Backes, Michael and Laud, Peeter
(2006) Computationally Sound Secrecy Proofs by Mechanized Flow Analysis.
UNSPECIFIED
.
(Unpublished)

Backes, Michael and Datta, Anupam and Derek, Ante and Mitchell, John C. and Ramanathan, Ajith and Scedrov, Andre
(2006) Games and the Impossibility of Realizable Ideal Functionality.
UNSPECIFIED
.

Backes, Michael and Müller-Quade, Jörn and Unruh, Dominique
(2006) On the Necessity of Rewinding in Secure Multiparty Computation.
UNSPECIFIED
.

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2006) Soundness Limits of Dolev-Yao Models.
UNSPECIFIED
.

Backes, Michael and Pfitzmann, Birgit
(2003) A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol (Extended Abstract).
UNSPECIFIED
.

This list was generated on Mon Apr 22 00:03:20 2019 CEST.