Number of items: 131.
Asghar, Muhammad Rizwan and Backes, Michael and Simeonovski, Milivoj
(2018)
PRIMA: Privacy-Preserving Identity and Access Management at Internet-Scale.
Azimi, Seyedmajid and Britz, Dominik and Engstler, Michael and Fritz, Mario and Mücklich, Frank
(2018)
Advanced Steel Microstructural Classification by Deep Learning Methods.
Scientific Reports, 8.
ISSN 2045-2322
Backes, Michael and Hanzlik, Lucjan and Kluczniak, Kamil and Schneider, Jonas
(2018)
Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys.
(In Press)
Basin, David and Cremers, Cas and Kim, Tiffany Hyun-Jin and Perrig, Adrian and Sasse, Ralf and Szalachowski, Pavel
(2018)
Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure.
IEEE Transactions on Dependable and Secure Computing, 15 (3).
pp. 393-408.
Basin, David and Cremers, Cas and Meadows, Catherine A.
(2018)
Model Checking Security Protocols.
In:
Handbook of Model Checking.
Springer International Publishing, pp. 727-762.
ISBN 978-3-319-10574-1
Baumann, Christoph and Guanciale, Roberto and Nemati, Hamed and Dam, Mads
(2018)
Verifying System Level Information Flow Using Confidentiality-Preserving Refinement.
(Submitted)
Berrang, Pascal and Humbert, Mathias and Zhang, Yang and Lehmann, Irina and Eils, Roland and Backes, Michael
(2018)
Dissecting Privacy Risks in Biomedical Data.
Bhattacharyya, Apratim and Fritz, Mario and Schiele, Bernt
(2018)
Long-Term On-Board Prediction of People in Traffic Scenes under Uncertainty.
Bhattacharyya, Apratim and Malinowski, Mateusz and Schiele, Bernt and Fritz, Mario
(2018)
Long-Term Image Boundary Prediction.
Bhattacharyya, Apratim and Schiele, Bernt and Fritz, Mario
(2018)
Accurate and Diverse Sampling of Sequences Based on a “Best of Many” Sample Objective.
Bonakdarpour, B. and Finkbeiner, Bernd
(2018)
The Complexity of Monitoring Hyperproperties.
Borges, Nataniel P. and Hotzkow, Jenny and Zeller, Andreas
(2018)
DroidMate-2: A Platform for Android Test Generation.
Brahmakshatriya, Ajay and Kedia, Piyus and Nemati, Hamed and McKee, Derrick and Bhatu, Pratik and Garg, Deepak and Lal, Akash and Rastogi, Aseem
(2018)
CONFLLVM: Compiler-Based Information Flow Control in Low-Level Code.
(Submitted)
Brakerski, Zvika and Döttling, Nico
(2018)
Two-Message Statistically Sender-Private OT from LWE.
Brengel, Michael and Rossow, Christian
(2018)
Identifying Key Leakage of Bitcoin Users.
(In Press)
Brengel, Michael and Rossow, Christian
(2018)
MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps.
Buchwald, Sebastian and Fried, Andreas and Hack, Sebastian
(2018)
Synthesizing an instruction selection rule library from semantic specifications.
Budhathoki, Kailash and Boley, Mario and Vreeken, Jilles
(2018)
Rule Discovery for Exploratory Causal Reasoning.
Budhathoki, Kailash and Vreeken, Jilles
(2018)
Accurate Causal Inference on Discrete Data.
Budhathoki, Kailash and Vreeken, Jilles
(2018)
Causal Inference on Event Sequences.
Budhathoki, Kailash and Vreeken, Jilles
(2018)
Origo: Causal Inference by Compression.
Knowledge and Information Systems, 56 (2).
pp. 285-307.
Bushart, Jonas
(2018)
Optimizing Recurrent Pulsing Attacks using Application-Layer Amplification of Open DNS Resolvers.
Bushart, Jonas and Rossow, Christian
(2018)
DNS Unchained: Amplified Application-Layer DoS Attacks Against DNS Authoritatives.
Böhme, Marcel and Soremekun, Ezekiel and Chattopadhyay, Sudipta and Ugherughe, Emamurho and Zeller, Andreas
(2018)
Wo ist der Fehler und wie wird er behoben?
Ein Experiment mit Softwareentwicklern.
Chowdhury, Sreyasi Nag and Tandon, Niket and Ferhatosmanoglu, Hakan and Weikum, Gerhard
(2018)
VISIR: Visual and Semantic Image Label Refinement.
Cohn-Gordon, Katriel and Cremers, Cas and Garratt, Luke and Millican, Jon and Milner, Kevin
(2018)
On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees.
Dawoud, Abdallah
(2018)
OS Support For Capabilities In Android.
Masters thesis, Saarland University.
Dietrich, Aljoscha and Leibenger, Dominik and Sorge, Christoph
(2018)
Sicherheit und Datenschutz im Smart Grid – rechtliche Anforderungen und technische Lösungen.
(In Press)
Dietrich, Aljoscha and Sorge, Christoph
(2018)
Rechtliche Aspekte von Cloud Computing in der Finanz- und Versicherungswirtschaft.
Dietrich, Constanze and Krombholz, Katharina and Borgolte, Kevin and Fiebig, Tobias
(2018)
Investigating System Operators' Perspective on Security Misconfigurations.
Döttling, Nico and Garg, Sanjam and Gupta, Divya and Miao, Peihan and Mukherjee, Pratyay
(2018)
Obfuscation from Low Noise Multilinear Maps.
Döttling, Nico and Garg, Sanjam and Hajiabadi, Mohammad and Masny, Daniel
(2018)
New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes.
Elnikety, Eslam and Garg, Deepak and Druschel, Peter
(2018)
Shai: Enforcing Data-Specific Policies with Near-Zero Runtime Overhead.
CoRR, abs/18.
Fakhreddine, Aymen and Tippenhauer, Nils Ole and Giustiniano, Domenico
(2018)
Design and Large-Scale Evaluation of WiFi Proximity Metrics.
Fass, Aurore and Krawczyk, Robert and Backes, Michael and Stock, Ben
(2018)
JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript.
Feltz, Michèle and Cremers, Cas
(2018)
Strengthening the Security of Authenticated Key Exchange against Bad Randomness.
Designs, Codes and Cryptography, 86 (3).
pp. 481-516.
Fey, G\"rschwin and Ghasempouri, Tara and Jacobs, Swen and Martino, Gianluca and Raik, Jaan and Riener, Heinz
(2018)
Design Understanding: From Logic to Specification.
Finkbeiner, Bernd and Hahn, Christopher and Hans, Tobias
(2018)
MGHyper: Checking Satisfiability of HyperLTL Formulas Beyond the \exists* \forall* Fragment.
Finkbeiner, Bernd and Hahn, Christopher and Lukert, Philip and Stenger, Marvin and Tentrup, Leander
(2018)
Synthesizing Reactive Systems from Hyperproperties.
Finkbeiner, Bernd and Hahn, Christopher and Stenger, Marvin and Tentrup, Leander
(2018)
RVHyper: A Runtime Verification Tool for Temporal Hyperproperties.
Finkbeiner, Bernd and Hahn, Christopher and Torfah, Hazem
(2018)
Model Checking Quantitative Hyperproperties.
Fleischhacker, Nils and Krupp, Johannes and Malavolta, Giulio and Schneider, Jonas and Schröder, Dominique and Simkin, Mark
(2018)
Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys.
IET Information Security, 12 (3).
pp. 166-183.
ISSN 1751-8709
Frassinelli, Daniel and Gambi, Alessio and Nürnberger, Stefan and Park, Sohyeon
(2018)
DRiVERSITY - Synthetic Torture Testing to Find Limits of Autonomous Driving Algorithms.
Frenkel, Hadar and Grumberg, Orna and Sheinvald, Sarai
(2018)
An Automata-Theoretic Approach to Model-Checking Systems and Specifications Over Infinite Data Domains.
Journal of Automated Reasoning, 63 (4).
pp. 1077-1101.
Gambi, Alessio and Bell, Jonathan and Zeller, Andreas
(2018)
Practical Test Dependency Detection.
Garg, Jugal and Hoefer, Martin and Mehlhorn, Kurt
(2018)
Approximating the Nash Social Welfare with Budget-Additive Valuations.
Georgoulis, Stamatios and Rematas, Konstantinos and Ritschel, Tobias and Gavves, Efstratios and Fritz, Mario and Gool, Luc Van and Tuytelaars, Tinne
(2018)
Reflectance and Natural Illumination from Single-Material Specular Objects Using Deep Learning.
Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 40 (8).
pp. 1932-1947.
ISSN 0162-8828
Gerling, Sebastian and Marnau, Ninja and Sorge, Christoph
(2018)
Stellungnahme gegenüber dem Landtag des Saarlandes zum Thema „Stand und Entwicklungsperspektiven der Telemedizin im Saarland“.
Gerstacker, Carsten and Klein, Felix and Finkbeiner, Bernd
(2018)
Bounded Synthesis of Reactive Programs.
Ghaeini, Hamid Reza and Antonioli, Daniele and Brasser, Ferdinand and Sadeghi, Ahmad-Reza and Tippenhauer, Nils Ole
(2018)
State-Aware Anomaly Detection for Industrial Control Systems.
Ghorbani Lyastani, Sanam and Schilling, Michael and Fahl, Sascha and Backes, Michael and Bugiel, Sven
(2018)
Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse.
Giechaskiel, Ilias and Cremers, Cas and Rasmussen, Kasper B.
(2018)
When the Crypto in Cryptocurrencies Breaks: Bitcoin Security under Broken Primitives.
IEEE Security & Privacy.
Giraldo, Jairo and Urbina, David and Cardenas, Alvaro and Valente, Junia and Faisal, Mustafa and Ruths, Justin and Tippenhauer, Nils Ole and Sandberg, Henrik and Candell, Richard