Items where Author is "Backes, Michael"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 309.

Conference or Workshop Item (A Paper)

Wang, Haiming and Zhang, Zhikun and Wang, Tianhao and He, Shibo and Backes, Michael and Chen, Jiming and Zhang, Yang
(2023) PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov Model.
In: USENIX Security Symposium 2023.
Conference: USENIX-Security Usenix Security Symposium

Li, Zheng and Yu, Ning and Salem, Ahmed and Backes, Michael and Fritz, Mario and Zhang, Yang
(2023) UnGANable: Defending Against GAN-based Face Manipulation.
In: USENIX Security.
Conference: USENIX-Security Usenix Security Symposium

Staicu, Cristian-Alexandru and Rahaman, Sazzadur and Kiss, Ágnes and Backes, Michael
(2023) Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages.
In: USENIX Security Symposium 2023.
Conference: USENIX-Security Usenix Security Symposium

Li, Zheng and Liu, Yiyong and He, Xinlei and Yu, Ning and Backes, Michael and Zhang, Yang
(2022) Auditing Membership Leakages of Multi-Exit Networks.
In: CCS 2022.
Conference: CCS ACM Conference on Computer and Communications Security

Shen, Yun and Han, Yufei and Zhang, Zhikun and Chen, Min and Yu, Ting and Backes, Michael and Zhang, Yang and Stringhini, Gianluca
(2022) Finding MNEMON: Reviving Memories of Node Embeddings.
In: The 29th ACM Conference on Computer and Communications Security (CCS), November 7-11, 2022, Los Angeles, U.S.A..
Conference: CCS ACM Conference on Computer and Communications Security
(In Press)

Nguyen, Trung Tin and Backes, Michael and Stock, Ben
(2022) Freely Given Consent? Studying Consent Notice of Third-Party Tracking and Its Violations of GDPR in Android Apps.
In: The 29th ACM Conference on Computer and Communications Security (CCS), November 7-11, 2022, Los Angeles, U.S.A..
Conference: CCS ACM Conference on Computer and Communications Security
(In Press)

Chen, Min and Zhang, Zhikun and Wang, Tianhao and Backes, Michael and Humbert, Mathias and Zhang, Yang
(2022) Graph Unlearning.
In: ACM SIGSAC Conference on Computer and Communications Security, November 7-11, 2022, Los Angeles, U.S.A..
Conference: CCS ACM Conference on Computer and Communications Security
(In Press)

Liu, Yiyong and Zhao, Zhengyu and Backes, Michael and Zhang, Yang
(2022) Membership Inference Attacks by Exploiting Loss Trajectory.
In: CCS 2022.
Conference: CCS ACM Conference on Computer and Communications Security

Huang, Hai and Zhang, Zhikun and Shen, Yun and Backes, Michael and Li, Qi and Zhang, Yang
(2022) On the Privacy Risks of Cell-Based NAS Architectures.
In: CCS 2022.
Conference: CCS ACM Conference on Computer and Communications Security

Si, Wai Man and Backes, Michael and Blackburn, Jeremy and De Cristofaro, Emiliano and Stringhini, Gianluca and Zannettou, Savvas and Zhang, Yang
(2022) Why So Toxic? Measuring and Triggering Toxic Behavior in Open-Domain Chatbots.
In: CCS 2022.
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Berrang, Pascal and Hanzlik, Lucjan and Pryvalov, Ivan
(2022) A framework for constructing Single Secret Leader Election from MPC.
In: ESORICS 2022.
Conference: ESORICS European Symposium On Research In Computer Security
(In Press)

Liu, Yugeng and Wen, Rui and He, Xinlei and Salem, Ahmed and Zhang, Zhikun and Backes, Michael and De Cristofaro, Emiliano and Fritz, Mario and Zhang, Yang
(2022) ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models.
In: USENIX Security Symposium (USENIX Security), 2022..
Conference: USENIX-Security Usenix Security Symposium
(In Press)

Zhang, Zhikun and Chen, Min and Backes, Michael and Shen, Yun and Zhang, Yang
(2022) Inference Attacks Against Graph Neural Networks.
In: 31st USENIX Security Symposium, August 10-12, 2022, Boston, MA, USA.
Conference: USENIX-Security Usenix Security Symposium

Bieringer, Lukas and Grosse, Kathrin and Backes, Michael and Biggio, Battista and Krombholz, Katharina
(2022) Industrial practitioners' mental models of adversarial machine learning.
In: USENIX Symposium on Usable Privacy and Security (SOUPS) 2022, 7-9. August, 2022, Boston, MA, USA.
Conference: SOUPS Symposium On Usable Privacy and Security

Salem, Ahmed and Wen, Rui and Backes, Michael and Ma, Shiqing and Zhang, Yang
(2022) Dynamic Backdoor Attacks Against Machine Learning Models.
In: EuroS&P 2022.
Conference: EuroS&P IEEE European Symposium on Security and Privacy

Shen, Xinyue and He, Xinlei and Backes, Michael and Blackburn, Jeremy and Zannettou, Savvas and Zhang, Yang
(2022) On Xing Tian and the Perseverance of Anti-China Sentiment Online.
In: ICWSM 2022.
Conference: ICWSM International Conference on Web and Social Media

Salem, Ahmed and Backes, Michael and Zhang, Yang
(2022) Get a Model! Model Hijacking Attack Against Machine Learning Models.
In: NDSS 2022, 24 - 28 April 2022, San Diego, California.
Conference: NDSS Network and Distributed System Security Symposium

Chen, Min and Zhang, Zhikun and Wang, Tianhao and Backes, Michael and Humbert, Mathias and Zhang, Yang
(2021) When Machine Unlearning Jeopardizes Privacy.
In: ACM SIGSAC Conference on Computer and Communications Security.
Conference: CCS ACM Conference on Computer and Communications Security

Roth, Sebastian and Gröber, Lea and Backes, Michael and Krombholz, Katharina and Stock, Ben
(2021) 12 Angry Developers – A Qualitative Study on Developers’ Struggles with CSP.
In: ACM CCS 2021.
Conference: CCS ACM Conference on Computer and Communications Security

Fass, Aurore and Somé, Dolière Francis and Backes, Michael and Stock, Ben
(2021) DoubleX: Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale.
In: ACM CCS 2021.
Conference: CCS ACM Conference on Computer and Communications Security

Huang, Jie and Backes, Michael and Bugiel, Sven
(2021) A11y and Privacy don’t have to be mutually exclusive: Constraining Accessibility Service Misuse on Android.
In: 30th USENIX Security Symposium (USENIX Security 21).
Conference: USENIX-Security Usenix Security Symposium
(In Press)

Elbitar, Yusra and Schilling, Michael and Nguyen, Trung Tin and Backes, Michael and Bugiel, Sven
(2021) Explanation Beats Context: The Effect of Timing & Rationales on Users’ Runtime Permission Decisions.
In: USENIX Security '21.
Conference: USENIX-Security Usenix Security Symposium

Zhang, Zhikun and Wang, Tianhao and Honorio, Jean and Li, Ninghui and Backes, Michael and He, Shibo and Chen, Jiming and Zhang, Yang
(2021) PrivSyn: Differentially Private Data Synthesis.
In: USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

He, Xinlei and Jia, Jinyuan and Gong, Neil Zhenqiang and Backes, Michael and Zhang, Yang
(2021) Stealing Links from Graph Neural Networks.
In: USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Nguyen, Trung Tin and Backes, Michael and Marnau, Ninja and Stock, Ben
(2021) Share First, Ask Later (or Never?) - Studying Violations of GDPR's Explicit Consent in Android Apps.
In: USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Oltrogge, Marten and Huaman, Nicolas and Amft, Sabrina and Acar, Yasemin and Backes, Michael and Fahl, Sascha
(2021) Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications.
In: 30th USENIX Security Symposium (USENIX Security 21).
Conference: USENIX-Security Usenix Security Symposium
(In Press)

Künnemann, Robert and Garg, Deepak and Backes, Michael
(2021) Accountability in the Decentralised-Adversary Setting.
In: CSF 2021.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)
(In Press)

Hanzlik, Lucjan and Zhang, Yang and Grosse, Kathrin and Salem, Ahmed and Augustin, Maximilian and Backes, Michael and Fritz, Mario
(2021) MLCapsule: Guarded Offline Deployment of Machine Learning as a Service.
In: 2021 IEEE CVPR Workshop on Fair, Data Efficient and Trusted Computer Vision.
Conference: ECCV European Conference on Computer Vision

Nguyen, Trung Tin and Nguyen, Duc Cuong and Schilling, Michael and Wang, Gang and Backes, Michael
(2021) Measuring User Perception for Detecting Unexpected Access to Sensitive Resource in Mobile Apps.
In: 2021 ACM Asia Conference on Computer and Communications Security (ASIA CCS ’21).
Conference: ASIACCS ACM ASIA Conference on Computer and Communications Security
(Submitted)

Moog, Marvin and Demmel, Markus and Backes, Michael and Fass, Aurore
(2021) Statically Detecting JavaScript Obfuscation and Minification Techniques in the Wild.
In: IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2021).
Conference: DSN IEEE/IFIP International Conference on Dependable Systems and Networks

Grosse, Kathrin and Backes, Michael
(2021) Do winning tickets exist before DNN training?
In: SDM21.
Conference: SDM SIAM International Conference on Data Mining

Chen, Xiaoyi and Salem, Ahmed and Chen, Dingfan and Backes, Michael and Ma, Shiqing and Shen, Qingni and Wu, Zhonghai and Zhang, Yang
(2021) BadNL: Backdoor Attacks against NLP Models with Semantic-preserving Improvements.
In: ACSAC 2021.
Conference: ACSAC Annual Computer Security Applications Conference

Nguyen, Duc Cuong and Derr, Erik and Backes, Michael and Bugiel, Sven
(2020) Up2Dep: Android Tool Support to Fix Insecure Code Dependencies.
In: Annual Computer Security Applications Conference (ACSAC 2020).
Conference: ACSAC Annual Computer Security Applications Conference

Tran, Nicolas and Speicher, Patrick and Künnemann, Robert and Backes, Michael and Torralba, Àlvaro and Hoffmann, Jörg
(2020) Planning in the Browser.
In: System Demonstration at the 30th International Conference on Automated Planning and Scheduling (ICAPS'20), October 2020.
Conference: ICAPS International Conference on Automated Planning and Scheduling

Hagestedt, Inken and Humbert, Mathias and Berrang, Pascal and Lehmann, Irina and Eils, Roland and Backes, Michael and Zhang, Yang
(2020) Membership Inference Against DNA Methylation Databases.
In: IEEE European Symposium on Security and Privacy.
Conference: EuroS&P IEEE European Symposium on Security and Privacy

Salem, Ahmed and Bhattacharya, Apratim and Backes, Michael and Fritz, Mario and Zhang, Yang
(2020) Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning.
In: USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Calzavara, Stefano and Roth, Sebastian and Rabitti, Alvise and Backes, Michael and Stock, Ben
(2020) A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web.
In: Proceedings of the 29th USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Roth, Sebastian and Backes, Michael and Stock, Ben
(2020) Assessing the Impact of Script Gadgets on CSP at Scale.
In: AsiaCCS 2020.
Conference: ASIACCS ACM ASIA Conference on Computer and Communications Security

Ghorbani Lyastani, Sanam and Schilling, Michael and Neumayr, Michaela and Backes, Michael and Bugiel, Sven
(2020) Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication.
In: Proceedings of the 41st IEEE Symposium on Security and Privacy.
Conference: SP IEEE Symposium on Security and Privacy

Esiyok, Ilkan and Hanzlik, Lucjan and Künnemann, Robert and Budde, Lena Marie and Backes, Michael
(2020) TrollThrottle — Raising the Cost of Astroturfing.
In: ACNS 2020, 19-22 October 2020, Rome, Italy.
Conference: ACNS International Conference on Applied Cryptography and Network Security

Zhang, Yang and Humbert, Mathias and Surma, Bartlomiej and Manoharan, Praveen and Vreeken, Jilles and Backes, Michael
(2020) Towards Plausible Graph Anonymization.
In: Annual Network and Distributed System Security Symposium.
Conference: NDSS Network and Distributed System Security Symposium

Fass, Aurore and Backes, Michael and Stock, Ben
(2019) JStap: A Static Pre-Filter for Malicious JavaScript Detection.
In: Annual Computer Security Applications Conference (ACSAC 2019).
Conference: ACSAC Annual Computer Security Applications Conference

Jia, Jinyuan and Salem, Ahmed and Backes, Michael and Gong, Neil Zhenqiang and Zhang, Yang
(2019) MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples.
In: ACM SIGSAC Conference on Computer and Communications Security.
Conference: CCS ACM Conference on Computer and Communications Security

Fass, Aurore and Backes, Michael and Stock, Ben
(2019) HideNoSeek: Camouflaging Malicious JavaScript in Benign ASTs.
In: ACM Conference on Computer and Communications Security (CCS 2019).
Conference: CCS ACM Conference on Computer and Communications Security

Rahman, Tahleen and Surma, Bartlomiej and Backes, Michael and Zhang, Yang
(2019) Fairwalk: Towards Fair Graph Embedding.
In: International Joint Conference on Artificial Intelligence.
Conference: IJCAI International Joint Conference on Artificial Intelligence

Nguyen, Duc Cuong and Derr, Erik and Backes, Michael and Bugiel, Sven
(2019) Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security & Privacy.
In: Proceedings of the IEEE Symposium on Security & Privacy, May 2019, May 2019, San Francisco, CA, USA.
Conference: SP IEEE Symposium on Security and Privacy

Eskandarian, Saba and Cogan, Jonathan and Birnbaum, Sawyer and Brandon, Peh Chang Wei and Franke, Dillon and Fraser, Forest and Garcia, Gaspar and Gong, Eric and Nguyen, Hung T. and Sethi, Taresh K. and Subbiah, Vishal and Backes, Michael and Pellegrino, Giancarlo and Boneh, Dan
(2019) Fidelius: Protecting User Secrets from Compromised Browsers.
In: S&P 2019.
Conference: SP IEEE Symposium on Security and Privacy

Hagestedt, Inken and Zhang, Yang and Humbert, Mathias and Berrang, Pascal and Haixu, Tang and XiaoFeng, Wang and Backes, Michael
(2019) MBeacon: Privacy-Preserving Beacons for DNA Methylation Data.
In: Annual Network and Distributed System Security Symposium.
Conference: NDSS Network and Distributed System Security Symposium

Salem, Ahmed and Zhang, Yang and Humbert, Mathias and Berrang, Pascal and Fritz, Mario and Backes, Michael
(2019) ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models.
In: Annual Network and Distributed System Security Symposium.
Conference: NDSS Network and Distributed System Security Symposium

Künnemann, Robert and Esiyok, Ilkan and Backes, Michael
(2019) Automated Verification of Accountability in Security Protocols.
In: Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)
(In Press)

Künnemann, Robert and Garg, Deepak and Backes, Michael
(2019) Causality & Control flow.
In: 4th Workshop on Formal Reasoning about Causation, Responsibility, & Explanations in Science & Technology.
Conference: CREST Workshop on Formal Reasoning about Causation, Responsibility, & Explanations in Science & Technology
(In Press)

Backes, Michael and Hanzlik, Lucjan and Herzberg, Amir and Kate, Aniket and Pryvalov, Ivan
(2019) Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup.
In: PKC 2019.
Conference: PKC International Conference on Practice and Theory in Public Key Cryptography
(In Press)

Dax, Alexander and Tangermann, Sven and Künnemann, Robert and Backes, Michael
(2019) How to wrap it up - A formally verified proposal for the use of authenticated wrapping in PKCS#11.
In: Computer Security Foundations Symposium, Hobuken, NJ.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)
(In Press)

Backes, Michael and Hanzlik, Lucjan and Schneider-Bensch, Jonas
(2019) Membership Privacy for Fully Dynamic Group Signatures.
In: ACM CCS 2019.
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Döttling, Nico and Hanzlik, Lucjan and Kluczniak, Kamil and Schneider, Jonas
(2019) Ring Signatures: Logarithmic Size, No Setup -- from Standard Assumptions.
In: IACR Eurocrypt 2019.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Speicher, Patrick and Steinmetz, Marcel and Hoffmann, Jörg and Backes, Michael and Künnemann, Robert
(2019) Towards Automated Network Mitigation Analysis.
In: The 34th ACM/SIGAPP Symposium On Applied Computing, Limassol, Cyprus.
Conference: SAC ACM Symposium on Applied Computing

Speicher, Patrick and Steinmetz, Marcel and Hoffmann, Jörg and Backes, Michael and Künnemann, Robert
(2019) Towards Automated Network Mitigation Analysis (extended version).
In: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing.
Conference: SAC ACM Symposium on Applied Computing

Huang, Jie and Pereira Borges Jr., Nataniel and Bugiel, Sven and Backes, Michael
(2019) Up-To-Crash: Evaluating Third-Party Library Updatability on Android.
In: 4th IEEE European Symposium on Security and Privacy.
Conference: EuroS&P IEEE European Symposium on Security and Privacy

Ghorbani Lyastani, Sanam and Schilling, Michael and Fahl, Sascha and Backes, Michael and Bugiel, Sven
(2018) Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse.
In: 27th USENIX Security Symposium (USENIX Security 18).
Conference: USENIX-Security Usenix Security Symposium

Fass, Aurore and Krawczyk, Robert and Backes, Michael and Stock, Ben
(2018) JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript.
In: Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA '18).
Conference: DIMVA GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment

Xu, Meng and Qian, Chenxiong and Lu, Kangjie and Backes, Michael and Kim, Taesoo
(2018) Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels.
In: In Proceedings of the 39th IEEE Symposium on Security and Privacy (Oakland). San Francisco, CA, May 2018..
Conference: SP IEEE Symposium on Security and Privacy

Berrang, Pascal and Humbert, Mathias and Zhang, Yang and Lehmann, Irina and Eils, Roland and Backes, Michael
(2018) Dissecting Privacy Risks in Biomedical Data.
In: IEEE European Symposium on Security and Privacy.
Conference: EuroS&P IEEE European Symposium on Security and Privacy

Zhang, Yang and Humbert, Mathias and Rahman, Tahleen and Li, Cheng-Te and Pang, Jun and Backes, Michael
(2018) Tagvisor: A Privacy Advisor for Sharing Hashtags.
In: The Web Conference.
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Stock, Ben and Pellegrino, Giancarlo and Li, Frank and Backes, Michael and Rossow, Christian
(2018) Didn’t You Hear Me? — Towards More Successful Web Vulnerability Notifications.
In: Proceedings of the 25th Annual Symposium on Network and Distributed System Security (NDSS '18)..
Conference: NDSS Network and Distributed System Security Symposium

Speicher, Patrick and Steinmetz, Marcel and Künnemann, Robert and Simeonovski, Milivoj and Pellegrino, Giancarlo and Hoffmann, Jörg and Backes, Michael
(2018) Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure.
In: 2018 IEEE European Symposium on Security and Privacy, EuroS&P 2018, London, United Kingdom, April 24-26, 2018.
Conference: EuroS&P IEEE European Symposium on Security and Privacy

Asghar, Muhammad Rizwan and Backes, Michael and Simeonovski, Milivoj
(2018) PRIMA: Privacy-Preserving Identity and Access Management at Internet-Scale.
In: 2018 IEEE International Conference on Communications (ICC) Kansas City, MO, USA, 20-24 May 2018.
Conference: ICC IEEE International Conference on Communications

Salem, Ahmed and Berrang, Pascal and Humbert, Mathias and Backes, Michael
(2018) Privacy-Preserving Similar Patient Queries for Combined Biomedical Data.
In: The 19th Privacy Enhancing Technologies Symposium (PETS).
Conference: PETS Privacy Enhancing Technologies Symposium (was International Workshop of Privacy Enhancing Technologies)
(In Press)

Oltrogge, Marten and Derr, Erik and Stransky, Christian and Acar, Yasemin and Fahl, Sascha and Rossow, Christian and Pellegrino, Giancarlo and Bugiel, Sven and Backes, Michael
(2018) The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators.
In: 39th IEEE Symposium on Security and Privacy (SP '18).
Conference: SP IEEE Symposium on Security and Privacy

Backes, Michael and Hanzlik, Lucjan and Kluczniak, Kamil and Schneider, Jonas
(2018) Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys.
In: IACR ASIACRYPT 2018.
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security
(In Press)

Speicher, Patrick and Steinmetz, Marcel and Backes, Michael and Hoffmann, Jörg and Künnemann, Robert
(2018) Stackelberg Planning: Towards Effective Leader-Follower State Space Search.
In: The Thirty-Second AAAI Conference on Artificial Intelligence (AAAI-18), New Orleans, Louisiana, USA.
Conference: AAAI National Conference of the American Association for Artificial Intelligence

Backes, Michael and Humbert, Mathias and Pang, Jun and Zhang, Yang
(2017) walk2friends: Inferring Social Links from Mobility Profiles.
In: ACM SIGSAC Conference on Computer and Communication Security.
Conference: CCS ACM Conference on Computer and Communications Security

Krupp, Johannes and Karami, Mohammad and Rossow, Christian and McCoy, Damon and Backes, Michael
(2017) Linking Amplification DDoS Attacks to Booter Services.
In: International Symposium on Research in Attacks, Intrusions, and Defenses, September 18-20, 2017, Atlanta, GA, USA.
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Backes, Michael and Gomez-Rodriguez, Manuel and Manoharan, Praveen and Surma, Bartlomiej
(2017) Reconciling Privacy and Utility in Continuous-Time Diffusion Networks.
In: Proceedings of the 30th IEEE Computer Security Foundations Symposium (CSF '17).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Stransky, Christian and Acar, Yasemin and Nguyen, Duc Cuong and Wermke, Dominik and Redmiles, Elissa M. and Kim, Doowon and Backes, Michael and Garfinkel, Simson and Mazurek, Michelle and Fahl, Sascha
(2017) Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers.
In: Proceedings of the 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET '17).

Backes, Michael and Berrang, Pascal and Bieg, Matthias and Elis, Roland and Herrmann, Carl and Humbert, Mathias and Lehmann, Irina
(2017) Identifying Personal DNA Methylation Profiles by Genotype Inference.
In: Proceedings of the 38th IEEE Symposium on Security and Privacy (S&P).
Conference: SP IEEE Symposium on Security and Privacy

Acar, Yasemin and Backes, Michael and Fahl, Sascha and Garfinkel, Simson and Kim, Doowon and Mazurek, Michelle and Stransky, Christian
(2017) Comparing the Usability of Cryptographic APIs.
In: 38th IEEE Symposium on Security and Privacy (S&P '17).
Conference: SP IEEE Symposium on Security and Privacy

Fischer, Felix and Böttinger, Konstantin and Xiao, Huang and Stransky, Christian and Acar, Yasemin and Backes, Michael and Fahl, Sascha
(2017) Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security.
In: 38th IEEE Symposium on Security and Privacy (S&P '17).
Conference: SP IEEE Symposium on Security and Privacy

Backes, Michael and Bugiel, Sven and Schranz, Oliver and Styp-Rekowsky, Philipp von and Weisgerber, Sebastian
(2017) ARTist: The Android Runtime Instrumentation and Security Toolkit.
In: Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17).
Conference: AMCIS Americas Conference on Information Systems

Backes, Michael and Rieck, Konrad and Skoruppa, Malte and Stock, Ben and Yamaguchi, Fabian
(2017) Efficient and Flexible Discovery of PHP Application Vulnerabilities.
In: Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17).
Conference: EuroS&P IEEE European Symposium on Security and Privacy

Backes, Michael and Nauman, Mohammad
(2017) LUNA: Quantifying and Leveraging Uncertainty in Android Malware Analysis through Bayesian Machine Learning.
In: Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17).
Conference: EuroS&P IEEE European Symposium on Security and Privacy

Backes, Michael and Dreier, Jannik and Kremer, Steve and Künnemann, Robert
(2017) A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and its Application to Fair Exchange.
In: Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17).
Conference: EuroS&P IEEE European Symposium on Security and Privacy

Simeonovski, Milivoj and Pellegrino, Giancarlo and Rossow, Christian and Backes, Michael
(2017) Who Controls the Internet? Analyzing Global Threats using Property Graph Traversals.
In: Proc. of the 26rd International Conference on World Wide Web (WWW 2017).
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Maisuradze, Giorgi and Backes, Michael and Rossow, Christian
(2017) Dachshund: Digging for and Securing (Non-)Blinded Constants in JIT Code.
In: Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17).
Conference: NDSS Network and Distributed System Security Symposium

Lu, Kangjie and Walter, Marie-Therese and Pfaff, David and Nürnberger, Stefan and Lee, Wenke and Backes, Michael
(2017) Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying.
In: Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17).
Conference: NDSS Network and Distributed System Security Symposium

Stock, Ben and Johns, Martin and Steffens, Marius and Backes, Michael
(2017) How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security.
In: Proceedings of the 26th USENIX Security Symposium (USENIX Security '17).
Conference: USENIX-Security Usenix Security Symposium

Huang, Jie and Schranz, Oliver and Bugiel, Sven and Backes, Michael
(2017) The ART of App Compartmentalization: Compiler-based Library Privilege Separation on Stock Android.
In: Proceedings of the 24th ACM Conference on Computer and Communication Security (CCS'17).
Conference: CCS ACM Conference on Computer and Communications Security

Grosse, Kathrin and Papernot, Nicolas and Manoharan, Praveen and Backes, Michael and McDaniel, Patrick
(2017) Adversarial Examples for Malware Detection.
In: Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II.
Conference: ESORICS European Symposium On Research In Computer Security

Pellegrino, Giancarlo and Johns, Martin and Koch, Simon and Backes, Michael and Rossow, Christian
(2017) Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs.
In: Proceedings of the 24th ACM Conference on Computer and Communication Security (CCS'17).
Conference: CCS ACM Conference on Computer and Communications Security

Derr, Erik and Bugiel, Sven and Fahl, Sascha and Acar, Yasemin and Backes, Michael
(2017) Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android.
In: Proceedings of the 24th ACM Conference on Computer and Communication Security (CCS'17).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Bugiel, Sven and von Styp-Rekowsky, Philipp and Wißfeld, Marvin
(2017) Seamless In-App Ad Blocking on Stock Android.
In: Mobile Security Technologies (MOST) 2017 Workshop.

Nguyen, Duc Cuong and Wermke, Dominik and Acar, Yasemin and Backes, Michael and Weir, Charles Alexander Forbes and Fahl, Sascha
(2017) A Stitch in Time: Supporting Android Developers in Writing Secure Code.
In: Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS '17).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Berrang, Pascal and Humbert, Mathias and Shen, Xiaoyu and Wolf, Verena
(2016) Simulating the Large-Scale Erosion of Genomic Privacy Over Time.
In: Proceedings of the 3rd International Workshop on Genome Privacy and Security (GenoPri'16).

Backes, Michael and Künnemann, Robert and Mohammadi, Esfandiar
(2016) Computational Soundness for Dalvik Bytecode.
In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS'16).
Conference: CCS ACM Conference on Computer and Communications Security

Schneider, Jonas and Fleischhacker, Nils and Schröder, Dominique and Backes, Michael
(2016) Efficient Cryptographic Password Hardening Services From Partially Oblivious Commitments.
In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16 ).
Conference: CCS ACM Conference on Computer and Communications Security

Krupp, Johannes and Backes, Michael and Rossow, Christian
(2016) Identifying the Scan and Attack Infrastructures behind Amplification DDoS attacks.
In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Berrang, Pascal and Humbert, Mathias and Manoharan, Praveen
(2016) Membership Privacy in MicroRNA-based Studies.
In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Berrang, Pascal and Goga, Oana and Gummadi, Krishna P. and Manoharan, Praveen
(2016) On Profile Linkability despite Anonymity in Social Media Systems.
In: Proceedings of the 2016 ACM Workshop on Privacy in the Electronic Society (WPES).

Backes, Michael and Bugiel, Sven and Derr, Erik
(2016) Reliable Third-Party Library Detection in Android and its Security Applications.
In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Holz, Thorsten and Rossow, Christian and Rytilahti, Teemu and Simeonovski, Milivoj and Stock, Ben
(2016) On the Feasibility of TTL-based Filtering for DRDoS Mitigation.
In: RAID 2016, 19th International Symposium on Research in Attacks, Intrusions and Defenses.
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Stock, Ben and Pellegrino, Giancarlo and Rossow, Christian and Johns, Martin and Backes, Michael
(2016) Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security Usenix Security Symposium

Backes, Michael and Bugiel, Sven and Derr, Erik and McDaniel, Patrick and Octeau, Damien and Weisgerber, Sebastian
(2016) On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security Usenix Security Symposium

Backes, Michael and Berrang, Pascal and Hecksteden, Anne and Humbert, Mathias and Keller, Andreas and Meyer, Tim
(2016) Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security Usenix Security Symposium

Maisuradze, Giorgi and Backes, Michael and Rossow, Christian
(2016) What Cannot be Read, Cannot be Leveraged? Revisiting Assumptions of JIT-ROP Defenses.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security Usenix Security Symposium

Brengel, Michael and Backes, Michael and Rossow, Christian
(2016) Detecting Hardware-Assisted Virtualization.
In: Detection of Intrusions and Malware, and Vulnerability Assessment: 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings.

Backes, Michael and Bugiel, Sven and Derr, Erik and Gerling, Sebastian and Hammer, Christian
(2016) R-Droid: Leveraging Android App Analysis with Static Slice Optimization.
In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security.

Götzfried, Johannes and Müller, Tilo and Drescher, Gabor and Nürnberger, Stefan and Backes, Michael
(2016) RamCrypt: Kernel-based Address Space Encryption for User-mode Processes.
In: ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIACCS).

Acar, Yasemin and Backes, Michael and Bugiel, Sven and Fahl, Sascha and McDaniel, Patrick and Smith, Matthew
(2016) SoK: Lessons Learned From Android Security Research For Appified Software Platforms.
In: 37th IEEE Symposium on Security and Privacy (S&P '16).
Conference: SP IEEE Symposium on Security and Privacy

Acar, Yasemin and Backes, Michael and Fahl, Sascha and Kim, Doowon and Mazurek, Michelle and Stransky, Christian
(2016) You Get Where You're Looking For: The Impact Of Information Sources On Code Security.
In: 37th IEEE Symposium on Security and Privacy (S&P '16).
Conference: SP IEEE Symposium on Security and Privacy

Backes, Michael and Hammer, Christian and Pfaff, David and Skoruppa, Malte
(2016) Implementation-level Analysis of the JavaScript Helios Voting Client.
In: Proceedings of the 31st Annual ACM Symposium on Applied Computing - SAC 2016.

Lu, Kangjie and Backes, Michael and Nürnberger, Stefan and Lee, Wenke
(2016) How to Make ASLR Win the Clone Wars: Runtime Re-Randomization.
In: Proceedings of the 23rd Annual Symposium on Network and Distributed System Security (NDSS '16).
Conference: NDSS Network and Distributed System Security Symposium

Backes, Michael and Herzberg, Amir and Kate, Aniket and Pryvalov, Ivan
(2016) Anonymous RAM.
In: 21st European Symposium on Research in Computer Security (ESORICS).
Conference: ESORICS European Symposium On Research In Computer Security

Backes, Michael and Bugiel, Sven and Huang, Jie and Schranz, Oliver
(2016) POSTER: The ART of App Compartmentalization.
In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16 ).
Conference: CCS ACM Conference on Computer and Communications Security

Yokoyama, Akira and Ishii, Kou and Tanabe, Rui and Papa, Yinmin and Yoshioka, Katsunari and Matsumoto, Tsutomu and Kasama, Takahiro and Inoue, Daisuke and Brengel, Michael and Backes, Michael and Rossow, Christian
(2016) SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion.
In: Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings.
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Stock, Ben and Pellegrino, Giancarlo and Rossow, Christian and Johns, Martin and Backes, Michael
(2016) POSTER: Mapping the Landscape of Large-Scale Vulnerability Notifications.
In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016.
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Meiser, Sebastian and Slowik, Marcin
(2015) Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms Against Structural Attacks.
In: Proceedings on Privacy Enhancing Technologies.

Rossow, Christian and Mohammadi, Esfandiar and Backes, Michael and Meiser, Sebastian and Koch, Simon
(2015) POSTER: In the Net of the Spider - Measuring the Anonymity-Impact of Network-level Adversaries Against Tor.
In: Proceedings of the 22nd ACM conference on Computer and Communications Security (ACM CCS '15).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Schranz, Oliver and Styp-Rekowsky, Philipp von
(2015) POSTER: Towards Compiler-Assisted Taint Tracking on the Android Runtime (ART).
In: Proceedings of the 22nd ACM conference on Computer and Communications Security (ACM CCS '15).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Bugiel, Sven and Hammer, Christian and Schranz, Oliver and Styp-Rekowsky, Philipp von
(2015) Boxify: Full-fledged App Sandboxing for Stock Android.
In: Proceedings of the 24th USENIX Security Symposium (USENIX '15).
Conference: USENIX-Security Usenix Security Symposium

Mohammadi, Esfandiar and Bendun, Fabian and Pecina, Kim and Maffei, Matteo and Backes, Michael
(2015) Symbolic Malleable Zero-knowledge Proofs.
In: Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF '15).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Simeonovski, Milivoj and Bendun, Fabian and Asghar, Muhammad Rizwan and Backes, Michael and Marnau, Ninja and Druschel, Peter
(2015) Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
In: 13th International Conference on Applied Cryptography and Network Security (ACNS).

Backes, Michael and Barbosa, Manuel and Fiore, Dario and Reischuk, Raphael M.
(2015) ADSNARK: Nearly-Practical Privacy-Preserving Proofs on Authenticated Data.
In: Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P).
Conference: SP IEEE Symposium on Security and Privacy

Backes, Michael and Bendun, Fabian and Hoffmann, Jörg and Marnau, Ninja
(2015) PriCL: Creating a Precedent. A Framework for Reasoning about Privacy Case Law.
In: Proceedings of the 4th Conference on Principles of Security and Trust (POST).

Backes, Michael and Gagné, Martin and Thyagarajan, Sri Aravinda Krishnan
(2015) Fully Secure Inner-Product Proxy Re-Encryption with constant size Ciphertext.
In: ACM ASIACCS Security in Cloud Computing Workshop 2015.

Backes, Michael and Mohammadi, Esfandiar and Ruffing, Tim
(2015) Computational Soundness for Interactive Primitves.
In: Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS'15).
Conference: ESORICS European Symposium On Research In Computer Security

Backes, Michael and Kate, Aniket and Meiser, Sebastian and Ruffing, Tim
(2015) Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources.
In: Proceedings of the 13th International Conference on Applied Cryptography and Network Security (ACNS'15).

Backes, Michael and Bugiel, Sven and Gerling, Sebastian and Styp-Rekowsky, Philipp von
(2014) Android Security Framework: Extensible Multi-Layered Access Control on Android.
In: In Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC'14).
Conference: ACSAC Annual Computer Security Applications Conference

Backes, Michael and Bugiel, Sven and Gerling, Sebastian
(2014) Scippa: System-Centric IPC Provenance on Android.
In: In Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC'14).
Conference: ACSAC Annual Computer Security Applications Conference

Backes, Michael and Kate, Aniket and Meiser, Sebastian and Mohammadi, Esfandiar
(2014) (Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection.
In: Proceedings of the 21st ACM Conference on Computer and Communications Security (ACM CCS '14).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Holz, Thorsten and Kollenda, Benjamin and Koppe, Philipp and Nürnberger, Stefan and Pewny, Jannik
(2014) You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code.
In: Proceedings of the 21st ACM conference on Computer and Communications Security (ACM CCS '14).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Grimm, Niklas and Kate, Aniket
(2014) Lime: Data Lineage in the Malicious Environment.
In: Proceedings of 10th International Workshopon Security and Trust Management (STM).

Backes, Michael and Nürnberger, Stefan
(2014) Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing.
In: Proceedings of the 23rd USENIX Security Symposium (USENIX '14).
Conference: USENIX-Security Usenix Security Symposium

Backes, Michael and Manoharan, Praveen and Mohammadi, Esfandiar
(2014) TUC: Time-sensitive and Modular Analysis of Anonymous Communication.
In: Proceedings of the of the 27th IEEE Computer Security Foundations Symposium (CSF '14).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Backes, Michael and Bendun, Fabian and Choudhury, Ashish and Kate, Aniket
(2014) Asynchronous MPC with a Strict Honest Majority Using Non-equivocation.
In: ACM Symposium on Principles of Distributed Computing 2014.
Conference: PODC ACM Symposium on Principles of Distributed Computing

Backes, Michael and Gerling, Rainer W. and Gerling, Sebastian and Nürnberger, Stefan and Schröder, Dominique and Simkin, Mark
(2014) WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP.
In: 12th International Conference on Applied Cryptography and Network Security (ACNS 2014).

Backes, Michael and Clark, Jeremy and Kate, Aniket and Simeonovski, Milivoj and Druschel, Peter
(2014) BackRef: Accountability in Anonymous Communication Networks.
In: Applied Cryptography and Network Security.

Backes, Michael and Gerling, Sebastian and Lorenz, Stefan and Lukas, Stephan
(2014) X-pire 2.0 - A User-Controlled Expiration Date and Copy Protection Mechanism.
In: 29th ACM Symposium on Applied Computing (SAC 2014).

Backes, Michael and Mohammadi, Esfandiar and Ruffing, Tim
(2014) Computational Soundness Results for ProVerif - Bridging the Gap from Trace Properties to Uniformity.
In: Proceedings of the 3rd Conference on Principles of Security and Trust (POST).

Backes, Michael and Gagné, Martin and Skoruppa, Malte
(2013) Using Mobile Device Communication to Strengthen e-Voting Protocols.
In: Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society - WPES 2013.

Backes, Michael and Fiore, Dario and Reischuk, Raphael M.
(2013) Verifiable Delegation of Computation on Outsourced Data.
In: Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS '11).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Gerling, Sebastian and Hammer, Christian and Maffei, Matteo and Styp-Rekowsky, Philipp von
(2013) AppGuard – Fine-grained Policy Enforcement for Untrusted Android Applications.
In: 8th International Workshop on Data Privacy Management (DPM'13).

Backes, Michael and Meiser, Sebastian
(2013) Differentially Private Smart Metering with Battery Recharging.
In: Proceedings of the 8th International Workshop on Data Privacy Managemant (DPM 2013).

Backes, Michael and Kate, Aniket and Manoharan, Praveen and Meiser, Sebastian and Mohammadi, Esfandiar
(2013) AnoA: A Framework For Analyzing Anonymous Communication Protocols.
In: Proceedings of the 26th IEEE Computer Security Foundations Symposium (CSF '13).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Backes, Michael and Bendun, Fabian and Unruh, Dominique
(2013) Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized Verification.
In: Principles of Security and Trust 2013.

Backes, Michael and Doychev, Goran and Köpf, Boris
(2013) Preventing Side-Channel Leaks in Web Traffic: A Formal Approach.
In: Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS '13).
Conference: NDSS Network and Distributed System Security Symposium

Backes, Michael and Kate, Aniket and Manoharan, Praveen and Meiser, Sebastian and Mohammadi, Esfandiar
(2013) AnoA: A Framework for Analyzing Anonymous Communication Protocols.
In: 6th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs).

Backes, Michael and Datta, Amit and Kate, Aniket
(2013) Asynchronous Computational VSS with Reduced Communication Complexity.
In: Proc. of the 2013 Cryptographers' Track at the RSA Conference (CT-RSA 2013).

Styp-Rekowsky, Philipp von and Gerling, Sebastian and Backes, Michael and Hammer, Christian
(2013) Idea: Callee-Site Rewriting of Sealed System Libraries.
In: International Symposium on Engineering Secure Software and Systems (ESSoS'13).

Backes, Michael and Fiore, Dario and Mohammadi, Esfandiar
(2013) Privacy-Preserving Accountable Computation.
In: Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS).
Conference: ESORICS European Symposium On Research In Computer Security

Backes, Michael and Malik, Ankit and Unruh, Dominique
(2012) Computational Soundness without Protocol Restrictions.
In: Proceedings of the 19th ACM Conference on Computer and Communication Security (CCS '12).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Kate, Aniket and Mohammadi, Esfandiar
(2012) Ace: An Efficient Key-Exchange Protocol for Onion Routing.
In: Proceedings of the 11th ACM Workshop on Privacy in the Electronic Society (WPES).

Backes, Michael and Bendun, Fabian and Kate, Aniket
(2012) Brief announcement: distributed cryptography using trinc.
In: ACM Symposium on Principles of Distributed Computing 2012.
Conference: PODC ACM Symposium on Principles of Distributed Computing

Backes, Michael and Barthe, Gilles and Berg, Matthias and Grégoire, Benjamin and Kunz, César and Skoruppa, Malte and Béguelin, Santiago Zanella
(2012) Verified Security of Merkle-Damgård.
In: Proceedings of the 25th IEEE Computer Security Foundations Symposium - CSF 2012.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Backes, Michael and Kate, Aniket and Maffei, Matteo and Pecina, Kim
(2012) ObliviAd: Provably Secure and Practical Online Behavioral Advertising.
In: Proceedings of the 33rd IEEE Symposium on Security and Privacy 2012 (Oakland 2012).
Conference: SP IEEE Symposium on Security and Privacy

Backes, Michael and Maffei, Matteo and Pecina, Kim
(2012) Automated Synthesis of Secure Distributed Applications.
In: Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS '12).
Conference: NDSS Network and Distributed System Security Symposium

Backes, Michael and Goldberg, Ian and Kate, Aniket and Toft, Tomas
(2012) Adding query privacy to robust DHTs.
In: Proc. of the 7th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2012).

Backes, Michael and Bendun, Fabian and Unruh, Dominique
(2012) Computational Soundness of Symbolic Zero-knowledge Proofs: Weaker Assumptions and Mechanized Verification.
In: Eight Workshop on Formal and Computational Cryptography (FCC 2012).
(Unpublished)

Mainberger, Markus and Backes, Michael and Berg, Matthias and Weickert, Joachim
(2012) Diffusion-Based Image Compression in Steganography.
In: Proceedings of the 8th International Symposium on Visual Computing -- ISVC 2012.

Backes, Michael and Busenius, Alex and Hriţcu, Cătălin
(2012) On the Development and Formalization of an Extensible Code Generator for Real Life Security Protocols.
In: Proc. 4th NASA Formal Methods Symposium (NFM 2012).

Backes, Michael and Kate, Aniket and Goldberg, Ian and Mohammadi, Esfandiar
(2012) Provably Secure and Practical Onion Routing.
In: Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Reischuk, Raphael M. and Backes, Michael and Gehrke, Johannes
(2012) SAFE Extensibility of Data-Driven Web Applications.
In: WWW~'12: Proceedings of the 21st International World Wide Web Conference.
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Backes, Michael and Maffei, Matteo and Pecina, Kim
(2011) A Security API for Distributed Social Networks.
In: Proceedings of the Network and Distributed System Security Symposium (NDSS '11).
Conference: NDSS Network and Distributed System Security Symposium

Backes, Michael and Hriţcu, Cătălin and Tarrach, Thorsten
(2011) Automatically Verifying Typing Constraints for a Data Processing Language.
In: Proc. 1st International Conference on Certified Programs and Proofs (CPP 2011).

Backes, Michael and Kate, Aniket and Patra, Arpita
(2011) Computational Verifiable Secret Sharing Revisited.
In: Proc. 17th International Conference on the Theory and Application of Cryptology (ASIACRYPT 2011).
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security

Backes, Michael and Maffei, Matteo and Pecina, Kim and Reischuk, Raphael M.
(2011) G2C: Cryptographic Protocols from Goal-Driven Specifications.
In: TOSCA'11: Proceedings of the 2011 International Conference on Theory of Security and Applications (now POST), held as part of ETAPS 2011.

Backes, Michael and Berg, Matthias and Köpf, Boris
(2011) Non-Uniform Distributions in Quantitative Information-Flow.
In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS).

Backes, Michael and Maffei, Matteo and Pecina, Kim
(2011) Securing social networks.
In: Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, PODC 2011, San Jose, CA, USA, June 6-8, 2011.
Conference: PODC ACM Symposium on Principles of Distributed Computing

Backes, Michael and Hriţcu, Cătălin and Maffei, Matteo
(2011) Union and Intersection Types for Secure Protocol Implementations.
In: Theory of Security and Applications - Joint Workshop, TOSCA 2011, Saarbrücken, Germany, March 31 - April 1, 2011, Revised Selected Papers.

Backes, Michael and Dürmuth, Markus and Gerling, Sebastian and Pinkal, Manfred and Sporleder, Caroline
(2010) Acoustic Side-Channel Attacks of Printers.
In: Proceedings of 19th USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Backes, Michael and Lorenz, Stefan and Maffei, Matteo and Pecina, Kim
(2010) Anonymity and Trust in Distributed Systems.
In: Proceedings of 29th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC).
Conference: PODC ACM Symposium on Principles of Distributed Computing

Backes, Michael and Lorenz, Stefan and Maffei, Matteo and Pecina, Kim
(2010) Anonymous Webs of Trust.
In: Proceedings of 10th Privacy Enhancing Technologies Symposium (PETS).

Backes, Michael and Maffei, Matteo and Mohammadi, Esfandiar
(2010) Computationally Sound Abstraction and Verification of Secure Multi-Party Computations.
In: Proceedings of the 30th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS).

Backes, Michael and Maffei, Matteo and Unruh, Dominique
(2010) Computationally Sound Verification of Source Code.
In: ACM CCS 2010.
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Ciobotaru, Oana and Krohmer, Anton
(2010) RatFish: A File Sharing Protocol Provably Secure Against Rational Users.
In: Proceedings of 15th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael and Doychev, Goran and Dürmuth, Markus and Köpf, Boris
(2010) Speaker Recognition in Encrypted Voice-over-IP Traffic.
In: Proceedings of 15th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael and Grochulla, Martin and Hriţcu, Cătălin and Maffei, Matteo
(2009) Achieving Security Despite Compromise Using Zero-knowledge.
In: Proceedings of 22nd IEEE Computer Security Foundations Symposium (CSF).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Backes, Michael and Hamerlik, Marek and Linari, Alessandro and Maffei, Matteo and Tryfonopoulos, Christos and Weikum, Gerhard
(2009) Anonymity and Censorship Resistance in Unstructured Overlay Networks.
In: On the Move to Meaningful Internet Systems: OTM 2009, Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part I.

Backes, Michael and Hamerlik, Lech Marek and Linari, Alessandro and Maffei, Matteo and Tryfonopoulos, Christos and Weikum, Gerhard
(2009) Anonymous and Censorship-resistant Content-sharing in Unstructured Overlays.
In: Proceedings of OTM Conferences.

Backes, Michael and Köpf, Boris and Rybalchenko, Andrey
(2009) Automatic Discovery and Quantification of Information Leaks.
In: Proceedings of 30th IEEE Symposium on Security and Privacy.

Backes, Michael and Druschel, Peter and Haeberlen, Andreas and Unruh, Dominique
(2009) CSAR: A practical and provable technique to make randomized systems accountable.
In: NDSS 2009.
Conference: NDSS Network and Distributed System Security Symposium

Backes, Michael and Hofheinz, Dennis and Unruh, Dominique
(2009) CoSP: a general framework for computational soundness proofs.
In: Proceedings of the 16th ACM conference on Computer and communications security (CCS).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Maffei, Matteo
(2009) Design and Verification of Anonymous Trust Protocols.
In: Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers.

Backes, Michael and Chen, Tongbo and Dürmuth, Markus and Lensch, Hendrik and Welk, Martin
(2009) Tempest in a Teapot: Compromising Reflections Revisited.
In: Proceedings of 30th IEEE Symposium on Security and Privacy.

Backes, Michael and Hriţcu, Cătălin and Maffei, Matteo
(2008) Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-calculus.
In: Proceedings of 21st IEEE Computer Security Foundations Symposium (CSF).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Backes, Michael and Hamerlik, Lech Marek and Linari, Alessandro and Maffei, Matteo and Tryfonopoulos, Christos and Weikum, Gerhard
(2008) Brief Announcement: Anonymous and Censorship-resistant Content-sharing in Unstructured Overlays.
In: Proceedings of 27th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC).
Conference: PODC ACM Symposium on Principles of Distributed Computing

Backes, Michael and Lorenz, Stefan and Maffei, Matteo and Pecina, Kim
(2008) CASPA: Causality-based Abstraction for Security Protocol Analysis.
In: Proceedings of 20th International Conference on Computer Aided Verification (CAV).
Conference: CAV Computer Aided Verification

Backes, Michael and Dürmuth, Markus and Unruh, Dominique
(2008) Compromising Reflections or How to Read LCD Monitors Around the Corner.
In: IEEE Symposium on Security and Privacy, Proceedings of SSP'08.

Backes, Michael and Unruh, Dominique
(2008) Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers.
In: 21st IEEE Computer Security Foundations Symposium, CSF 2008.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Backes, Michael and Berg, Matthias and Unruh, Dominique
(2008) A Formal Language for Cryptographic Pseudocode.
In: LPAR 2008.

Backes, Michael and Köpf, Boris
(2008) Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks.
In: Proceedings of 13th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael and Unruh, Dominique
(2008) Limits of Constructive Security Proofs.
In: ASIACRYPT 2008.

Backes, Michael and Dürmuth, Markus and Unruh, Dominique
(2008) OAEP is Secure Under Key-dependent Messages.
In: ASIACRYPT 2008.

Backes, Michael and Maffei, Matteo and Hriţcu, Cătălin
(2008) Type-checking zero-knowledge.
In: Proceedings of the 15th ACM conference on Computer and communications security.
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Maffei, Matteo and Unruh, Dominique
(2008) Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol.
In: IEEE Symposium on Security and Privacy, Proceedings of SSP'08.
Conference: SP IEEE Symposium on Security and Privacy

Backes, Michael and Cortesi, Agostino and Focardi, Riccardo and Maffei, Matteo
(2007) A Calculus of Challenges and Responses.
In: Proceedings of 5th ACM Workshop on Formal Methods in Security Engineering (FMSE).

Backes, Michael and Cortesi, Agostino and Maffei, Matteo
(2007) Causality-based Abstraction of Multiplicity in Security Protocols.
In: Proceedings of 20th IEEE Computer Security Foundation Symposium (CSF).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Backes, Michael and Dürmuth, Markus and Unruh, Dominique
(2007) Information Flow in the Peer-Reviewing Process (extended abstract).
In: Proceedings of 28th IEEE Symposium on Security and Privacy (SSP).

Backes, Michael and Pfitzmann, Birgit and Scedrov, Andre
(2007) Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles.
In: Proceedings of 20th IEEE Computer Security Foundation Symposium (CSF).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Backes, Michael and Dürmuth, Markus and Küsters, Ralf
(2007) On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography.
In: Proceedings of 27th International Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS).

Backes, Michael and Müller-Quade, Jörn and Unruh, Dominique
(2007) On the Necessity of Rewinding in Secure Multiparty Computation.
In: Theory of Cryptography, Proceedings of TCC 2007.

Backes, Michael and Laud, Peeter
(2006) Computationally Sound Secrecy Proofs by Mechanized Flow Analysis.
In: Proceedings of 13th ACM Conference on Computer and Communications Security (CCS).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Dürmuth, Markus and Hofheinz, Dennis and Küsters, Ralf
(2006) Conditional Reactive Simulatability.
In: Proceedings of 11th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael and Cervesato, Iliano and Jaggard, Aaron D and Scedrov, Andre and Tsay, Joe-Kai
(2006) Cryptographically Sound Security Proofs for Basic and Public-key Kerberos.
In: Proceedings of 11th European Symposium on Research in Computer Security(ESORICS).

Sprenger, Christoph and Backes, Michael and Basin, David and Pfitzmann, Birgit and Waidner, Michael
(2006) Cryptographically Sound Theorem Proving.
In: Proceedings of 19th IEEE Computer Security Foundations Workshop (CSFW).

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2006) Formal Methods and Cryptography.
In: Proceedings of 14th International Symposium on Formal Methods (FM).

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2006) Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes.
In: Proceedings of 11th European Symposium on Research in Computer Security(ESORICS).

Backes, Michael and Pfitzmann, Birgit
(2006) On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol.
In: Proceedings of 21st IFIP International Information Security Conference (SEC).

Backes, Michael and Cachin, Christian and Oprea, Alina
(2006) Secure Key-Updating for Lazy Revocation.
In: Proceedings of 11th European Symposium on Research in Computer Security(ESORICS).

Backes, Michael and Mödersheim, Sebastian and Pfitzmann, Birgit and Vigano, Luca
(2006) Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario.
In: Proceedings of Foundations of Software Science and Computational Structures (FOSSACS).

Backes, Michael and Camenisch, Jan and Sommer, Dieter
(2005) Anonymous yet accountable access control.
In: Proceedings of 4th ACM Workshop on Privacy in the Electronic Society (WPES).

Backes, Michael and Datta, Anupam and Derek, Ante and Mitchell, John C. and Turuani, Mathieu
(2005) Compositional Analysis of Contract Signing Protocols.
In: Proceedings of 18th IEEE Computer Security Foundations Workshop (CSFW).

Backes, Michael and Dürmuth, Markus
(2005) A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System.
In: Proceedings of 18th IEEE Computer Security Foundations Workshop (CSFW).

Backes, Michael and Cachin, Christian and Oprea, Alina
(2005) Lazy Revocation in Cryptographic File Systems.
In: Proceedings of 3rd International IEEE Security in Storage Workshop (SISW).

Backes, Michael and Pfitzmann, Birgit
(2005) Limits of the Cryptographic Realization of Dolev-Yao-style XOR.
In: Proceedings of 10th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael and Hofheinz, Dennis and Müller-Quade, Jörn and Unruh, Dominique
(2005) On Fairness in Simulatability-based Cryptographic Systems.
In: 3rd ACM Workshop on Formal Methods in Security Engineering: From Specifications to Code.

Backes, Michael and Cachin, Christian
(2005) Public-Key Steganography with Active Attacks.
In: Proceedings of 2nd Theory of Cryptography Conference (TCC).

Backes, Michael
(2005) Quantifying Probabilistic Information Flow in Computational Reactive Systems.
In: Proceedings of 10th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael and Pfitzmann, Birgit
(2005) Relating Symbolic and Cryptographic Secrecy.
In: Proceedings of 26th IEEE Symposium on Security and Privacy.

Backes, Michael and Groß, Thomas
(2005) Tailoring the Dolev-Yao Abstraction to Web Services Realities - A Comprehensive Wish List.
In: Proceedings of 2005 ACM Secure Web Services Workshop (SWS).

Backes, Michael and Dürmuth, Markus and Steinwandt, Rainer
(2004) An Algebra for Composing Enterprise Privacy Policies.
In: Proceedings of 9th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael
(2004) A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol.
In: Proceedings of 9th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael and Bagga, Walid and Karjoth, Günter and Schunter, Matthias
(2004) Efficient Comparison of Enterprise Privacy Policies.
In: Proceedings of 19th ACM Symposium on Applied Computing (SAC).

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2004) A General Composition Theorem for Secure Reactive System.
In: Proceedings of 1st Theory of Cryptography Conference (TCC).

Backes, Michael and Hofheinz, Dennis
(2004) How to Break and Repair a Universally Composable Signature Functionality.
In: Proceedings of 7th Information Security Conference (ISC).

Backes, Michael and Waidner, Michael and Pfitzmann, Birgit
(2004) Low-level Ideal Signatures and General Integrity Idealization.
In: Proceedings of 7th Information Security Conference (ISC).

Backes, Michael and Pfitzmann, Birgit
(2004) Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library.
In: Proceedings of 17th IEEE Computer Security Foundations Workshop (CSFW).

Backes, Michael and Dürmuth, Markus and Karjoth, Günter
(2004) Unification in Privacy Policy Evaluation - Translating EPAL to Prolog.
In: Proceedings of 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY).

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2003) A Composable Cryptographic Library with Nested Operations.
In: Proceedings of 10th ACM Conference on Computer and Communications Security (CCS).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Pfitzmann, Birgit
(2003) A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol.
In: Proceedings of 23rd Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS).

Backes, Michael and Jacobi, Christian
(2003) Cryptographically Sound and Machine-Assisted Verification of Security Protocols.
In: Proceedings of 20th International Symposium on Theoretical Aspects of Computer Science (STACS).

Backes, Michael and Schunter, Matthias
(2003) From Absence of Certain Vulnerabilities towards Security Proofs - Pushing the Limits of Formal Verification.
In: Proceedings of the 10th ACM Workshop on New Security Paradigms (NSPW).

Backes, Michael and Pfitzmann, Birgit
(2003) Intransitive Non-Interference for Cryptographic Purposes.
In: Proceedings of 24th IEEE Symposium on Security and Privacy.

Backes, Michael and Cachin, Christian and Strobl, Reto
(2003) Proactive Secure Message Transmission in Asynchronous Networks.
In: Proceedings of 22nd ACM Symposium on Principles of Distributed Computing (PODC).

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2003) Reactively Secure Signature Schemes.
In: Proceedings of 6th Information Security Conference (ISC).

Backes, Michael and Cachin, Christian
(2003) Reliable broadcast in a computational hybrid model with Byzantine faults, crashes, and recoveries.
In: Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN).

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2003) Security in Business Process Engineering.
In: Proceedings of 2003 International Conference on Business Process Management.

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2003) Symmetric Authentication Within a Simulatable Cryptographic Library.
In: Proceedings of 8th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael and Pfitzmann, Birgit and Schunter, Matthias
(2003) A Toolkit for Managing Enterprise Privacy Policies.
In: Proceedings of 8th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael
(2003) Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions (Extended Abstract).
In: Proceedings of 14th International Conference on Concurrency Theory (CONCUR).

Backes, Michael and Pfitzmann, Birgit
(2002) Computational Probabilistic Non-Interference.
In: Proceedings of 7th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael and Jacobi, Christian and Pfitzmann, Birgit
(2002) Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation.
In: Proceedings of 11th International Symposium on Formal Methods Europe (FME).

Backes, Michael and Pfitzmann, Birgit and Steiner, Michael and Waidner, Michael
(2002) Polynomial Fairness and Liveness.
In: Proceedings of 15th IEEE Computer Security Foundations Workshop (CSFW).

Article

Di Tizio, Giorgio and Speicher, Patrick and Simeonovski, Milivoj and Backes, Michael and Stock, Ben and Künnemann, Robert
(2022) Pareto-Optimal Defenses for the Web Infrastructure: Theory and Practice.
ACM Transactions on Privacy and Security, 1 (1). ISSN 2471-2566

Warnat-Herresthal, Stefanie and Schultze, Hartmut and Shastry, Krishnaprasad Lingadahalli and Manamohan, Sathyanarayanan and Mukherjee, Saikat and Garg, Vishesh and Sarveswara, Ravi and Händler, Kristian and Pickkers, Peter and Aziz, N. Ahmad and Ktena, Sofia and Tran, Florian and Bitzer, Michael and Ossowski, Stephan and Casadei, Nicolas and Herr, Christian and Petersheim, Daniel and Behrends, Uta and Kern, Fabian and Fehlmann, Tobias and Schommers, Philipp and Lehmann, Clara and Augustin, Max and Rybniker, Jan and Altmüller, Janine and Mishra, Neha and Bernardes, Joana P. and Krämer, Benjamin and Bonaguro, Lorenzo and Schulte-Schrepping, Jonas and De Domenico, Elena and Siever, Christian and Kraut, Michael and Desai, Milind and Monnet, Bruno and Saridaki, Maria and Siegel, Charles Martin and Drews, Anna and Nuesch-Germano, Melanie and Theis, Heidi and Heyckendorf, Jan and Schreiber, Stefan and Kim-Hellmuth, Sarah and Nattermann, Jacob and Skowasch, Dirk and Kurth, Ingo and Keller, Andreas and Bals, Robert and Nürnberg, Peter and Rieß, Olaf and Rosenstiel, Philip and Netea, Mihai G. and Theis, Fabian and Mukherjee, Sach and Backes, Michael and Aschenbrenner, Anna C. and Ulas, Thomas and Breteler, Monique M. B. and Giamarellos-Bourboulis, Evangelos J. and Kox, Matthijs and Becker, Matthias and Cheran, Sorin and Woodacre, Michael S. and Goh, Eng Lim and Schultze, Joachim L.
(2021) Swarm Learning for decentralized and confidential clinical machine learning.
Nature.

Troncoso, Carmela and Payer, Matthias and Hubaux, Jean-Pierre and Salathé, Marcel and Larus, James and Lueks, Wouter and Stadler, Theresa and Pyrgelis, Apostolos and Antonioli, Daniele and Barman, Ludovic and Chatel, Sylvain and Paterson, Kenneth G. and Capkun, Srdjan and Basin, David and Beutel, Jan and Jackson, Dennis and Roeschlin, Marc and Leu, Patrick and Preneel, Bart and Smart, Nigel and Abidin, Aysajan and Gürses, Seda and Veale, Michael and Cremers, Cas and Backes, Michael and Tippenhauer, Nils Ole and Binns, Reuben and Cattuto, Ciro and Barrat, Alain and Fiore, Dario and Barbosa, Manuel and Oliveira, Rui and Pereira, José
(2020) Decentralized Privacy-Preserving Proximity Tracing.
IEEE Data Engineering Bulletin Volume 43, Number 2, June 2020. pp. 36-66.

Grosse, Kathrin and Trost, Thomas A. and Mosbach, Marius and Backes, Michael
(2019) Adversarial Initialization - when your network performs the way I want -.
ArXiv e-prints.

Grosse, Kathrin and Pfaff, David and Smith, Michael Thomas and Backes, Michael
(2018) The Limitations of Model Uncertainty in Adversarial Settings.
ArXiv e-prints.

Grosse, Kathrin and Smith, Michael Thomas and Backes, Michael
(2018) Killing Three Birds with one Gaussian Process: Analyzing Attack Vectors on Classification.
ArXiv e-prints.
(Submitted)

Shirazi, Fatemeh and Simeonovski, Milivoj and Asghar, Muhammad Rizwan and Backes, Michael and Díaz, Claudia
(2018) A Survey on Routing in Anonymous Communication Protocols.
ACM Computing Surveys, 51 (3). pp. 1-39. ISSN 0360-0300

Acar, Yasemin and Backes, Michael and Fahl, Sascha and Kim, Doowon and Mazurek, Michelle L. and Stransky, Christian
(2017) How Internet Resources Might Be Helping You Develop Faster but Less Securely.
IEEE Security & Privacy.

Grosse, Kathrin and Manoharan, Praveen and Papernot, Nicolas and Backes, Michael and McDaniel, Patrick
(2017) On the (Statistical) Detection of Adversarial Examples.
CoRR, abs/17.
(Submitted)

Backes, Michael and Hoffmann, Jörg and Künnemann, Robert and Speicher, Patrick and Steinmetz, Marcel
(2017) Simulated Penetration Testing and Mitigation Analysis.
CoRR, abs/17.

Ghorbani Lyastani, Sanam and Schilling, Michael and Fahl, Sascha and Bugiel, Sven and Backes, Michael
(2017) Studying the Impact of Managers on Password Strength and Reuse.
CoRR, abs/17.

Backes, Michael and Manoharan, Praveen and Grosse, Kathrin and Papernot, Nicolas
(2016) Adversarial Perturbations Against Deep Neural Networks for Malware Classification.
The Computing Research Repository (CoRR), abs/16.

Shirazi, Fatemeh and Simeonovski, Milivoj and Asghar, Muhammad Rizwan and Backes, Michael and Díaz, Claudia
(2016) A Survey on Routing in Anonymous Communication Protocols.
The Computing Research Repository (CoRR), abs/16.

Backes, Michael and Bugiel, Sven and Schranz, Oliver and Styp-Rekowsky, Philipp von
(2016) Boxify: Bringing Full-Fledged App Sandboxing to Stock Android.
USENIX ;login:, 41 (2). pp. 16-21.

Backes, Michael and Berrang, Pascal and Manoharan, Praveen
(2015) How well do you blend into the crowd? - d-convergence: A novel paradigm for quantifying privacy in the age of Big-Data.
CoRR, abs/15.

Backes, Michael and Grimm, Niklas and Kate, Aniket
(2015) Data Lineage in Malicious Environments.
IEEE Transactions on Dependable and Secure Computing, 13 (2). 178 - 191. ISSN 1545-5971

Simeonovski, Milivoj and Bendun, Fabian and Asghar, Muhammad Rizwan and Backes, Michael and Marnau, Ninja and Druschel, Peter
(2015) Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
CoRR, abs/15.

Simeonovski, Milivoj and Bendun, Fabian and Asghar, Muhammad Rizwan and Backes, Michael and Marnau, Ninja and Druschel, Peter
(2015) Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
IACR Cryptology ePrint Archive, 2015. p. 592.

Backes, Michael and Köpf, Boris
(2015) Quantifying Information Flow in Cryptographic Systems.
Mathematical Structures in Computer Science.

Backes, Michael and Hriţcu, Cătălin and Maffei, Matteo
(2014) Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations.
Journal of Computer Security, 22 (2). pp. 301-353.

Backes, Michael and Dagdelen, Özgür and Fischlin, Marc and Gajek, Sebastian and Meiser, Sebastian and Schröder, Dominique
(2014) Operational Signature Schemes.
IACR Cryptology ePrint Archive, 2014. p. 820.

Backes, Michael and Hriţcu, Cătălin and Maffei, Matteo
(2013) Union, Intersection, and Refinement Types and Reasoning About Type Disjointness for Secure Protocol Implementations.
Special issue of the Journal of Computer Security (JCS) for TOSCA-SecCo.

Backes, Michael and Meiser, Sebastian and Schröder, Dominique
(2013) Highly Controlled, Fine-grained Delegation of Signing Capabilities.
IACR Cryptology ePrint Archive, 2013. p. 408.

Backes, Michael and Clark, Jeremy and Druschel, Peter and Kate, Aniket and Simeonovski, Milivoj
(2013) Introducing Accountability to Anonymity Networks.
CoRR, abs/13.

Backes, Michael and Cervesato, Iliano and Jaggard, Aaron D and Scedrov, Andre and Tsay, Joe-Kai
(2011) Cryptographically sound security proofs for basic and public-key Kerberos.
International Journal of Information Security, 10 (2). pp. 107-134.

Backes, Michael and Gerling, Sebastian and Styp-Rekowsky, Philipp von
(2011) A Local Cross-Site Scripting Attack against Android Phones.

Backes, Michael and Unruh, Dominique
(2010) Computational Soundness of Symbolic Zero-Knowledge Proofs.
Journal of Computer Security, 18 (6). pp. 1077-1155.

Backes, Michael and Dürmuth, Markus and Hofheinz, Dennis and Küsters, Ralf
(2008) Conditional Reactive Simulatability.
International Journal of Information Security, 7 (2). pp. 155-169.

Backes, Michael and Pfitzmann, Birgit and Scedrov, Andre
(2008) Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles.
Journal of Computer Security (JCS).

Backes, Michael and Pfitzmann, Birgit
(2008) Limits of the BRSIM/UC soundness of Dolev-Yao-style XOR.
International Journal of Information Security, 7 (1). pp. 33-54.

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2007) The Reactive Simulatability Framework for Asynchronous Systems.
Information and Computation.

Backes, Michael and Datta, Anupam and Derek, Ante and Mitchell, John C. and Turuani, Mathieu
(2006) Compositional Analysis of Contract Signing Protocols.
Theoretical Computer Science, 367 (1-2). pp. 33-56.

Backes, Michael
(2006) Real-or-Random Key Secrecy of the Otway-Rees Protocol via a Symbolic Security Proof.
Electronic Notes in Theoretical Computer Science (ENTCS), 155. pp. 111-145.

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2005) Reactively Secure Signature Schemes.
International Journal of Information Security (IJIS), 4 (4). pp. 242-252.

Backes, Michael and Pfitzmann, Birgit
(2005) Relating Symbolic and Cryptographic Secrecy.
IEEE Transactions on Dependable and Secure Computing (TDSC), 2 (2). pp. 109-123.

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2005) Symmetric Authentication Within a Simulatable Cryptographic Library.
International Journal of Information Security (IJIS), 4 (3). pp. 135-154.

Backes, Michael
(2005) Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions.
Journal of Logic and Algebraic Programming (JLAP), 2. pp. 157-188.

Backes, Michael and Pfitzmann, Birgit
(2004) Computational Probabilistic Non-Interference.
International Journal of Information Security (IJIS), 3 (1). pp. 42-60.

Backes, Michael and Pfitzmann, Birgit
(2004) A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol.
IEEE Journal on Selected Areas of Computing (JSAC), 22 (10). pp. 2075-2086.

Backes, Michael and Pfitzmann, Birgit and Steiner, Michael and Waidner, Michael
(2004) Polynomial Liveness.
Journal of Computer Security, 12 (3-4). pp. 589-617.

Backes, Michael
(2002) Factorization of Univariate Polynomials.

Backes, Michael
(2002) New Number-Theoretic Assumptions in Cryptography (in german).

Thesis

Backes, Michael
(2002) Cryptographically Sound Analysis of Security Protocols.
Doctoral thesis, Saarland University, Computer Science Department.

Book Section

Backes, Michael and Meiser, Sebastian and Schröder, Dominique
(2016) Delegatable Functional Signatures.
In: UNSPECIFIED Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 357-386. ISBN 978-3-662-49384-7

Backes, Michael and Berrang, Pascal and Manoharan, Praveen
(2016) From Zoos to Safaris - From Closed-World Enforcement to Open-World Assessment of Privacy.
In: UNSPECIFIED Springer International Publishing, Cham, pp. 87-138. ISBN 978-3-319-43005-8

Backes, Michael and Gerling, Sebastian and Hammer, Christian and Maffei, Matteo and Styp-Rekowsky, Philipp von
(2013) AppGuard - Enforcing User Requirements on Android Apps.
In: Tools and Algorithms for the Construction and Analysis of Systems. Springer, pp. 545-550.

Styp-Rekowsky, Philipp von and Gerling, Sebastian and Backes, Michael and Hammer, Christian
(2013) Callee-site Rewriting of Sealed System Libraries.
In: Engineering Secure Software and Systems. Springer, pp. 33-41.

Backes, Michael and Dürmuth, Markus
(2007) Enterprise Privacy Policies and Languages.
In: UNSPECIFIED Elsevier.

Backes, Michael and Dürmuth, Markus
(2007) Enterprise Privacy Policies and Languages.
In: UNSPECIFIED Elsevier.

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2004) Justifying a Dolev-Yao Model under Active Attacks.
In: UNSPECIFIED Lecture Notes in Computer Science, 3655 . Springer, pp. 1-42.

Book

Backes, Michael and Gritzalis, Stefanos and Preneel, Bart and Katsikas, Sokratis K and Lopez, Javier
(2006) Proceedings of 9th International Conference on Information Security (ISC), Samos Island, Greece.
Lecture Notes in Computer Science, 4176 . Springer.

Backes, Michael and Scedrov, Andre
(2005) Proceedings of 3rd International Workshop on Security and Concurrency (SecCo), affiliated with CONCUR'05, San Francisco, CA.
ENTCS.

Backes, Michael and Basin, David and Waidner, Michael
(2003) Proceedings of 1st ACM Workshop on Formal Methods in Security Engineering (FMSE) , affiliated with ACM CCS'03, Washington D.C.
ACM.

Monograph

Backes, Michael and Bugiel, Sven and Derr, Erik and Hammer, Christian
(2014) Taking Android App Vetting to the Next Level with Path-sensitive Value Analysis.
Technical Report. UNSPECIFIED.
(Unpublished)

Backes, Michael and Gerling, Sebastian and Hammer, Christian and Maffei, Matteo and Styp-Rekowsky, Philipp von
(2013) AppGuard - Fine-grained Policy Enforcement for Untrusted Android Applications.
Technical Report. UNSPECIFIED.
(Unpublished)

Backes, Michael and Gerling, Sebastian and Hammer, Christian and Maffei, Matteo and Styp-Rekowsky, Philipp von
(2012) AppGuard - Real-time Policy Enforcement for Third-Party Applications.
Technical Report. UNSPECIFIED.
(Unpublished)

Backes, Julian and Backes, Michael and Dürmuth, Markus and Lorenz, Stefan and Gerling, Sebastian
(2011) X-pire! - A digital expiration date for images in social networks.
Technical Report. UNSPECIFIED.

Other

Hanzlik, Lucjan and Zhang, Yang and Grosse, Kathrin and Salem, Ahmed and Augustin, Max and Backes, Michael and Fritz, Mario
(2018) MLCapsule: Guarded Offline Deployment of Machine Learning as a Service.
arXiv
.

Speicher, Patrick and Steinmetz, Marcel and Künnemann, Robert and Simeonovski, Milivoj and Pellegrino, Giancarlo and Hoffmann, Jörg and Backes, Michael
(2018) Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure (full version).
CISPA
.

Backes, Michael and Dürmuth, Markus and Unruh, Dominique
(2008) Gespiegelt / Verräterische Reflexionen: Wie Brillengläser Geheimnisse verraten.
Heise Verlag, Hannover
.

Backes, Michael and Cortesi, Agostino and Maffei, Matteo
(2007) Causality-based Abstraction of Multiplicity in Security Protocol Analysis.
UNSPECIFIED
.

Backes, Michael and Unruh, Dominique
(2007) On the Security of Protocols with Logarithmic Communication Complexity.
UNSPECIFIED
.

Backes, Michael and Dürmuth, Markus and Unruh, Dominique
(2007) Vorgetäuscht / Böse Textdokumente -- Postscript gone wild.
Heise Verlag, Hannover
.

Backes, Michael and Laud, Peeter
(2006) Computationally Sound Secrecy Proofs by Mechanized Flow Analysis.
UNSPECIFIED
.
(Unpublished)

Backes, Michael and Datta, Anupam and Derek, Ante and Mitchell, John C. and Ramanathan, Ajith and Scedrov, Andre
(2006) Games and the Impossibility of Realizable Ideal Functionality.
UNSPECIFIED
.

Backes, Michael and Müller-Quade, Jörn and Unruh, Dominique
(2006) On the Necessity of Rewinding in Secure Multiparty Computation.
UNSPECIFIED
.

Backes, Michael and Pfitzmann, Birgit and Waidner, Michael
(2006) Soundness Limits of Dolev-Yao Models.
UNSPECIFIED
.

Backes, Michael and Pfitzmann, Birgit
(2003) A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol (Extended Abstract).
UNSPECIFIED
.

This list was generated on Sat Dec 3 00:03:39 2022 CET.