Items where Division is "Michael Backes (InfSec)" and Year is 2015

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Author(s)/Creator(s) | Item Type | No Grouping
Number of items: 29.

Conference or Workshop Item (A Paper)

Backes, Michael and Barbosa, Manuel and Fiore, Dario and Reischuk, Raphael M.
(2015) ADSNARK: Nearly-Practical Privacy-Preserving Proofs on Authenticated Data.
In: Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P).
Conference: SP IEEE Symposium on Security and Privacy

Backes, Michael and Bendun, Fabian and Hoffmann, Jörg and Marnau, Ninja
(2015) PriCL: Creating a Precedent. A Framework for Reasoning about Privacy Case Law.
In: Proceedings of the 4th Conference on Principles of Security and Trust (POST).

Backes, Michael and Bugiel, Sven and Hammer, Christian and Schranz, Oliver and Styp-Rekowsky, Philipp von
(2015) Boxify: Full-fledged App Sandboxing for Stock Android.
In: Proceedings of the 24th USENIX Security Symposium (USENIX '15).
Conference: USENIX-Security Usenix Security Symposium

Backes, Michael and Gagné, Martin and Thyagarajan, Sri Aravinda Krishnan
(2015) Fully Secure Inner-Product Proxy Re-Encryption with constant size Ciphertext.
In: ACM ASIACCS Security in Cloud Computing Workshop 2015.

Backes, Michael and Kate, Aniket and Meiser, Sebastian and Ruffing, Tim
(2015) Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources.
In: Proceedings of the 13th International Conference on Applied Cryptography and Network Security (ACNS'15).

Backes, Michael and Meiser, Sebastian and Slowik, Marcin
(2015) Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms Against Structural Attacks.
In: Proceedings on Privacy Enhancing Technologies.

Backes, Michael and Mohammadi, Esfandiar and Ruffing, Tim
(2015) Computational Soundness for Interactive Primitves.
In: Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS'15).
Conference: ESORICS European Symposium On Research In Computer Security

Backes, Michael and Schranz, Oliver and Styp-Rekowsky, Philipp von
(2015) POSTER: Towards Compiler-Assisted Taint Tracking on the Android Runtime (ART).
In: Proceedings of the 22nd ACM conference on Computer and Communications Security (ACM CCS '15).
Conference: CCS ACM Conference on Computer and Communications Security

Mohammadi, Esfandiar and Bendun, Fabian and Pecina, Kim and Maffei, Matteo and Backes, Michael
(2015) Symbolic Malleable Zero-knowledge Proofs.
In: Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF '15).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Perl, Henning and Dechand, Sergej and Smith, Matthew and Arp, Daniel and Yamaguchi, Fabian and Rieck, Konrad and Fahl, Sascha and Acar, Yasemin
(2015) Vccfinder: Finding potential vulnerabilities in open-source projects to assist code audits.
In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security.
Conference: CCS ACM Conference on Computer and Communications Security

Rossow, Christian and Mohammadi, Esfandiar and Backes, Michael and Meiser, Sebastian and Koch, Simon
(2015) POSTER: In the Net of the Spider - Measuring the Anonymity-Impact of Network-level Adversaries Against Tor.
In: Proceedings of the 22nd ACM conference on Computer and Communications Security (ACM CCS '15).
Conference: CCS ACM Conference on Computer and Communications Security

Simeonovski, Milivoj and Bendun, Fabian and Asghar, Muhammad Rizwan and Backes, Michael and Marnau, Ninja and Druschel, Peter
(2015) Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
In: 13th International Conference on Applied Cryptography and Network Security (ACNS).

Article

Backes, Michael and Berrang, Pascal and Manoharan, Praveen
(2015) How well do you blend into the crowd? - d-convergence: A novel paradigm for quantifying privacy in the age of Big-Data.
CoRR, abs/15.

Backes, Michael and Grimm, Niklas and Kate, Aniket
(2015) Data Lineage in Malicious Environments.
IEEE Transactions on Dependable and Secure Computing, 13 (2). 178 - 191. ISSN 1545-5971

Backes, Michael and Köpf, Boris
(2015) Quantifying Information Flow in Cryptographic Systems.
Mathematical Structures in Computer Science.

Simeonovski, Milivoj and Bendun, Fabian and Asghar, Muhammad Rizwan and Backes, Michael and Marnau, Ninja and Druschel, Peter
(2015) Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
CoRR, abs/15.

Simeonovski, Milivoj and Bendun, Fabian and Asghar, Muhammad Rizwan and Backes, Michael and Marnau, Ninja and Druschel, Peter
(2015) Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
IACR Cryptology ePrint Archive, 2015. p. 592.

Thesis

Bauer, Markus
(2015) The MATOR Addon: Accessible Quantification of Tor Anonymity for the Tor Browser.
Bachelors thesis, Saarland University.

Fatz, Filip
(2015) Toward a Backward-compatible API for Defining Fine-grained App Policies on Android.
Bachelors thesis, Saarland University.

Frassinelli, Daniel
(2015) Security Analysis of Telematic and Emergency Devices in a Modern Car.
Masters thesis, Saarland University.

Koch, Simon
(2015) Correlating BGP and Traceroute Data.
Bachelors thesis, Saarland University.

Patel, Vikash
(2015) Argumentation Mining for the Sake of Privacy.
Masters thesis, Saarland University.

Schneider, Jonas
(2015) Partially Oblivious Pseudorandom Functions: A Generic Approach and an Impossibility Result.
Masters thesis, UNSPECIFIED.

Schranz, Oliver
(2015) Towards Compiler-Assisted Taint Tracking on the Android Runtime.
Masters thesis, Saarland University.

Schwarz, Fabian Frank
(2015) Security Analysis of Mobile Banking Apps.
Bachelors thesis, Saarland University.

Spier, Steffen
(2015) Cold boot attacks and the error model of DRAM modules.
Bachelors thesis, Saarland University.

Tiwari, Abishek
(2015) Applying Privacy Case Law to The Right to be Forgotten.
Masters thesis, Saarland University.

Wißfeld, Marvin
(2015) ArtHook: Callee-side Method Hook Injection on the New Android Runtime ART.
Bachelors thesis, Saarland University.

Book Section

Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2015) Achieving Optimal Utility for Distributed Differential Privacy Using SMPC.
In: UNSPECIFIED Cryptology and Information Security Series, 13 . IOS Press, 81 - 105.

This list was generated on Sat Dec 21 17:42:41 2024 CET.