Items where Division is "Michael Backes (InfSec)" and Year is 2014

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Author(s)/Creator(s) | Item Type | No Grouping
Number of items: 26.

Backes, Michael and Bendun, Fabian and Choudhury, Ashish and Kate, Aniket
(2014) Asynchronous MPC with a Strict Honest Majority Using Non-equivocation.
In: ACM Symposium on Principles of Distributed Computing 2014.
Conference: PODC ACM Symposium on Principles of Distributed Computing

Backes, Michael and Bugiel, Sven and Derr, Erik and Hammer, Christian
(2014) Taking Android App Vetting to the Next Level with Path-sensitive Value Analysis.
Technical Report. UNSPECIFIED.
(Unpublished)

Backes, Michael and Bugiel, Sven and Gerling, Sebastian
(2014) Scippa: System-Centric IPC Provenance on Android.
In: In Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC'14).
Conference: ACSAC Annual Computer Security Applications Conference

Backes, Michael and Bugiel, Sven and Gerling, Sebastian and Styp-Rekowsky, Philipp von
(2014) Android Security Framework: Extensible Multi-Layered Access Control on Android.
In: In Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC'14).
Conference: ACSAC Annual Computer Security Applications Conference

Backes, Michael and Clark, Jeremy and Kate, Aniket and Simeonovski, Milivoj and Druschel, Peter
(2014) BackRef: Accountability in Anonymous Communication Networks.
In: Applied Cryptography and Network Security.

Backes, Michael and Dagdelen, Özgür and Fischlin, Marc and Gajek, Sebastian and Meiser, Sebastian and Schröder, Dominique
(2014) Operational Signature Schemes.
IACR Cryptology ePrint Archive, 2014. p. 820.

Backes, Michael and Gerling, Rainer W. and Gerling, Sebastian and Nürnberger, Stefan and Schröder, Dominique and Simkin, Mark
(2014) WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP.
In: 12th International Conference on Applied Cryptography and Network Security (ACNS 2014).

Backes, Michael and Gerling, Sebastian and Lorenz, Stefan and Lukas, Stephan
(2014) X-pire 2.0 - A User-Controlled Expiration Date and Copy Protection Mechanism.
In: 29th ACM Symposium on Applied Computing (SAC 2014).

Backes, Michael and Grimm, Niklas and Kate, Aniket
(2014) Lime: Data Lineage in the Malicious Environment.
In: Proceedings of 10th International Workshopon Security and Trust Management (STM).

Backes, Michael and Holz, Thorsten and Kollenda, Benjamin and Koppe, Philipp and Nürnberger, Stefan and Pewny, Jannik
(2014) You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code.
In: Proceedings of the 21st ACM conference on Computer and Communications Security (ACM CCS '14).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Hriţcu, Cătălin and Maffei, Matteo
(2014) Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations.
Journal of Computer Security, 22 (2). pp. 301-353.

Backes, Michael and Kate, Aniket and Meiser, Sebastian and Mohammadi, Esfandiar
(2014) (Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection.
In: Proceedings of the 21st ACM Conference on Computer and Communications Security (ACM CCS '14).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Manoharan, Praveen and Mohammadi, Esfandiar
(2014) TUC: Time-sensitive and Modular Analysis of Anonymous Communication.
In: Proceedings of the of the 27th IEEE Computer Security Foundations Symposium (CSF '14).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Backes, Michael and Mohammadi, Esfandiar and Ruffing, Tim
(2014) Computational Soundness Results for ProVerif - Bridging the Gap from Trace Properties to Uniformity.
In: Proceedings of the 3rd Conference on Principles of Security and Trust (POST).

Backes, Michael and Nürnberger, Stefan
(2014) Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing.
In: Proceedings of the 23rd USENIX Security Symposium (USENIX '14).
Conference: USENIX-Security Usenix Security Symposium

Brachmann, Niklas
(2014) Evaluating the Effectiveness of In-app DRM Systems for Android.
Bachelors thesis, Saarland University.

Derr, Erik
(2014) Verifying the Internet Access of Android Applications.
Masters thesis, Saarland University.

Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2014) Differentially Private Data Aggregation with Optimal Utility.
UNSPECIFIED
.

Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2014) Differentially Private Data Aggregation with Optimal Utility.
In: 30th Annual Computer Security Applications Conference (ACSAC).
Conference: ACSAC Annual Computer Security Applications Conference

Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2014) Privacy-preserving Data Aggregation with Optimal Utility Using Arithmetic SMC -- Extended Abstract.
In: Workshop on Usable and Efficient Secure Multiparty Computation -- Satellite Event of ESORICS.

Endner-Dühr, Frederic
(2014) Application-level Firewall in Stock Android.
Bachelors thesis, Saarland University.

Frey, Tobias
(2014) System Centric IPC Call Chains for Android.
Bachelors thesis, Saarland University.

Perlov, Artem
(2014) Identifying the Optimal Permission Set of Android Applications.
Bachelors thesis, Saarland University.

Reischuk, Raphael M.
(2014) Declarative Design and Enforcement for Secure Cloud Applications.
Doctoral thesis, Saarland University.

Schweig, Marc
(2014) Developing a RiskScore for Android Applications.
Bachelors thesis, Saarland University.

Simeonovski, Milivoj
(2014) Poster: Quasi-ID: In fact, I am a human.
In: Proceedings of the 21st ACM Conference on Computer and Communications Security (ACM CCS '14).
Conference: CCS ACM Conference on Computer and Communications Security

This list was generated on Fri Oct 11 15:59:22 2024 CEST.