Items where Year is 2018

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Author(s)/Creator(s) | Item Type | No Grouping
Number of items: 131.

Asghar, Muhammad Rizwan and Backes, Michael and Simeonovski, Milivoj
(2018) PRIMA: Privacy-Preserving Identity and Access Management at Internet-Scale.
In: 2018 IEEE International Conference on Communications (ICC) Kansas City, MO, USA, 20-24 May 2018.
Conference: ICC IEEE International Conference on Communications

Azimi, Seyedmajid and Britz, Dominik and Engstler, Michael and Fritz, Mario and Mücklich, Frank
(2018) Advanced Steel Microstructural Classification by Deep Learning Methods.
Scientific Reports, 8. ISSN 2045-2322

Backes, Michael and Hanzlik, Lucjan and Kluczniak, Kamil and Schneider, Jonas
(2018) Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys.
In: IACR ASIACRYPT 2018.
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security
(In Press)

Basin, David and Cremers, Cas and Kim, Tiffany Hyun-Jin and Perrig, Adrian and Sasse, Ralf and Szalachowski, Pavel
(2018) Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure.
IEEE Transactions on Dependable and Secure Computing, 15 (3). pp. 393-408.

Basin, David and Cremers, Cas and Meadows, Catherine A.
(2018) Model Checking Security Protocols.
In: Handbook of Model Checking. Springer International Publishing, pp. 727-762. ISBN 978-3-319-10574-1

Baumann, Christoph and Guanciale, Roberto and Nemati, Hamed and Dam, Mads
(2018) Verifying System Level Information Flow Using Confidentiality-Preserving Refinement.
In: In Submission.
Conference: SP IEEE Symposium on Security and Privacy
(Submitted)

Berrang, Pascal and Humbert, Mathias and Zhang, Yang and Lehmann, Irina and Eils, Roland and Backes, Michael
(2018) Dissecting Privacy Risks in Biomedical Data.
In: IEEE European Symposium on Security and Privacy.
Conference: EuroS&P IEEE European Symposium on Security and Privacy

Bhattacharyya, Apratim and Fritz, Mario and Schiele, Bernt
(2018) Long-Term On-Board Prediction of People in Traffic Scenes under Uncertainty.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Bhattacharyya, Apratim and Malinowski, Mateusz and Schiele, Bernt and Fritz, Mario
(2018) Long-Term Image Boundary Prediction.
In: Association for the Advancement of Artificial Intelligence (AAAI).
Conference: AAAI National Conference of the American Association for Artificial Intelligence

Bhattacharyya, Apratim and Schiele, Bernt and Fritz, Mario
(2018) Accurate and Diverse Sampling of Sequences Based on a “Best of Many” Sample Objective.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Bonakdarpour, B. and Finkbeiner, Bernd
(2018) The Complexity of Monitoring Hyperproperties.
In: 2018 IEEE 31st Computer Security Foundations Symposium (CSF).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Borges, Nataniel P. and Hotzkow, Jenny and Zeller, Andreas
(2018) DroidMate-2: A Platform for Android Test Generation.
In: The 33rd ACM/IEEE International Conference on Automated Software Engineering, Montpellier, France.
Conference: ASE Automated Software Engineering Conference

Brahmakshatriya, Ajay and Kedia, Piyus and Nemati, Hamed and McKee, Derrick and Bhatu, Pratik and Garg, Deepak and Lal, Akash and Rastogi, Aseem
(2018) CONFLLVM: Compiler-Based Information Flow Control in Low-Level Code.
In: In Submission.
Conference: EuroS&P IEEE European Symposium on Security and Privacy
(Submitted)

Brakerski, Zvika and Döttling, Nico
(2018) Two-Message Statistically Sender-Private OT from LWE.
In: TCC (2).
Conference: TCC Theory of Cryptography Conference

Brengel, Michael and Rossow, Christian
(2018) Identifying Key Leakage of Bitcoin Users.
In: Proceedings of the Symposium on Research in Attacks, Intrusions and Defenses (RAID).
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)
(In Press)

Brengel, Michael and Rossow, Christian
(2018) MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps.
In: Proceedings of the Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA).
Conference: DIMVA GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment

Buchwald, Sebastian and Fried, Andreas and Hack, Sebastian
(2018) Synthesizing an instruction selection rule library from semantic specifications.
In: Proceedings of the 2018 International Symposium on Code Generation and Optimization, CGO 2018, Vösendorf / Vienna, Austria, February 24-28, 2018.
Conference: CGO International Symposium on Code Generation and Optimization

Budhathoki, Kailash and Boley, Mario and Vreeken, Jilles
(2018) Rule Discovery for Exploratory Causal Reasoning.
In: NeurIPS 2018 workshop on Causal Learning.
Conference: NeurIPS Conference on Neural Information Processing Systems

Budhathoki, Kailash and Vreeken, Jilles
(2018) Accurate Causal Inference on Discrete Data.
In: IEEE International Conference on Data Mining (ICDM'18).
Conference: ICDM IEEE International Conference on Data Mining

Budhathoki, Kailash and Vreeken, Jilles
(2018) Causal Inference on Event Sequences.
In: SIAM International Conference on Data Mining.
Conference: SDM SIAM International Conference on Data Mining

Budhathoki, Kailash and Vreeken, Jilles
(2018) Origo: Causal Inference by Compression.
Knowledge and Information Systems, 56 (2). pp. 285-307.

Bushart, Jonas
(2018) Optimizing Recurrent Pulsing Attacks using Application-Layer Amplification of Open DNS Resolvers.
In: 12th USENIX Workshop on Offensive Technologies (WOOT 18).
Conference: WOOT USENIX Workshop on Offensive Technologies

Bushart, Jonas and Rossow, Christian
(2018) DNS Unchained: Amplified Application-Layer DoS Attacks Against DNS Authoritatives.
In: Proceedings of the 21th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Böhme, Marcel and Soremekun, Ezekiel and Chattopadhyay, Sudipta and Ugherughe, Emamurho and Zeller, Andreas
(2018) Wo ist der Fehler und wie wird er behoben? Ein Experiment mit Softwareentwicklern.
In: Software Engineering (SE) 2018.

Chowdhury, Sreyasi Nag and Tandon, Niket and Ferhatosmanoglu, Hakan and Weikum, Gerhard
(2018) VISIR: Visual and Semantic Image Label Refinement.
In: Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining, WSDM 2018, Marina Del Rey, CA, USA, February 5-9, 2018.
Conference: WSDM ACM International Conference on Web Search and Data Mining

Cohn-Gordon, Katriel and Cremers, Cas and Garratt, Luke and Millican, Jon and Milner, Kevin
(2018) On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees.
In: ACM CCS 2018, 15-19 Oct 2018, Toronto, Canada.
Conference: CCS ACM Conference on Computer and Communications Security

Dawoud, Abdallah
(2018) OS Support For Capabilities In Android.
Masters thesis, Saarland University.

Dietrich, Aljoscha and Leibenger, Dominik and Sorge, Christoph
(2018) Sicherheit und Datenschutz im Smart Grid – rechtliche Anforderungen und technische Lösungen.
In: Tagungsband des 21. Internationalen Rechtsinformatik Symposions IRIS 2018: Proceedings of the 21th International Legal Informatics Symposium IRIS 2018.
(In Press)

Dietrich, Aljoscha and Sorge, Christoph
(2018) Rechtliche Aspekte von Cloud Computing in der Finanz- und Versicherungswirtschaft.
In: Tagungsband des 21. Internationalen Rechtsinformatik Symposions IRIS 2018: Proceedings of the 21th International Legal Informatics Symposium IRIS 2018.

Dietrich, Constanze and Krombholz, Katharina and Borgolte, Kevin and Fiebig, Tobias
(2018) Investigating System Operators' Perspective on Security Misconfigurations.
In: 25th ACM Conference on Computer and Communications Security.
Conference: CCS ACM Conference on Computer and Communications Security

Döttling, Nico and Garg, Sanjam and Gupta, Divya and Miao, Peihan and Mukherjee, Pratyay
(2018) Obfuscation from Low Noise Multilinear Maps.
In: INDOCRYPT.
Conference: INDOCRYPT International Conference on Cryptology in India

Döttling, Nico and Garg, Sanjam and Hajiabadi, Mohammad and Masny, Daniel
(2018) New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes.
In: PKC.
Conference: PKC International Conference on Practice and Theory in Public Key Cryptography

Elnikety, Eslam and Garg, Deepak and Druschel, Peter
(2018) Shai: Enforcing Data-Specific Policies with Near-Zero Runtime Overhead.
CoRR, abs/18.

Fakhreddine, Aymen and Tippenhauer, Nils Ole and Giustiniano, Domenico
(2018) Design and Large-Scale Evaluation of WiFi Proximity Metrics.
In: Proceedings of European Wireless.
Conference: UNSPECIFIED

Fass, Aurore and Krawczyk, Robert and Backes, Michael and Stock, Ben
(2018) JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript.
In: Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA '18).
Conference: DIMVA GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment

Feltz, Michèle and Cremers, Cas
(2018) Strengthening the Security of Authenticated Key Exchange against Bad Randomness.
Designs, Codes and Cryptography, 86 (3). pp. 481-516.

Fey, G\"rschwin and Ghasempouri, Tara and Jacobs, Swen and Martino, Gianluca and Raik, Jaan and Riener, Heinz
(2018) Design Understanding: From Logic to Specification.
In: IFIP/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2018, Verona, Italy, October 8-10, 2018, 8-10 Oct 2018, Verona, Italy.

Finkbeiner, Bernd and Hahn, Christopher and Hans, Tobias
(2018) MGHyper: Checking Satisfiability of HyperLTL Formulas Beyond the \exists* \forall* Fragment.
In: Automated Technology for Verification and Analysis - 16th International Symposium, ATVA 2018, Los Angeles, CA, USA, October 7-10, 2018, Proceedings.
Conference: ATVA International Symposium on Automated Technology for Verification and Analysis

Finkbeiner, Bernd and Hahn, Christopher and Lukert, Philip and Stenger, Marvin and Tentrup, Leander
(2018) Synthesizing Reactive Systems from Hyperproperties.
In: Computer Aided Verification.
Conference: CAV Computer Aided Verification

Finkbeiner, Bernd and Hahn, Christopher and Stenger, Marvin and Tentrup, Leander
(2018) RVHyper: A Runtime Verification Tool for Temporal Hyperproperties.
In: Tools and Algorithms for the Construction and Analysis of Systems.
Conference: TACAS Tools and Algorithms for Construction and Analysis of Systems

Finkbeiner, Bernd and Hahn, Christopher and Torfah, Hazem
(2018) Model Checking Quantitative Hyperproperties.
In: Computer Aided Verification.
Conference: CAV Computer Aided Verification

Fleischhacker, Nils and Krupp, Johannes and Malavolta, Giulio and Schneider, Jonas and Schröder, Dominique and Simkin, Mark
(2018) Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys.
IET Information Security, 12 (3). pp. 166-183. ISSN 1751-8709

Frassinelli, Daniel and Gambi, Alessio and Nürnberger, Stefan and Park, Sohyeon
(2018) DRiVERSITY - Synthetic Torture Testing to Find Limits of Autonomous Driving Algorithms.
In: ACM Computer Science in Cars Conference.
Conference: CSCS ACM Computer Science in Cars Symposium

Frenkel, Hadar and Grumberg, Orna and Sheinvald, Sarai
(2018) An Automata-Theoretic Approach to Model-Checking Systems and Specifications Over Infinite Data Domains.
Journal of Automated Reasoning, 63 (4). pp. 1077-1101.

Gambi, Alessio and Bell, Jonathan and Zeller, Andreas
(2018) Practical Test Dependency Detection.
In: Proceedings of the 2018 IEEE Conference on Software Testing, Validation and Verification.
Conference: ICST International Conference on Software Testing, Verification and Validation

Garg, Jugal and Hoefer, Martin and Mehlhorn, Kurt
(2018) Approximating the Nash Social Welfare with Budget-Additive Valuations.
In: SODA '18 Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms.
Conference: SODA ACM/SIAM Symposium on Discrete Algorithms

Georgoulis, Stamatios and Rematas, Konstantinos and Ritschel, Tobias and Gavves, Efstratios and Fritz, Mario and Gool, Luc Van and Tuytelaars, Tinne
(2018) Reflectance and Natural Illumination from Single-Material Specular Objects Using Deep Learning.
Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 40 (8). pp. 1932-1947. ISSN 0162-8828

Gerling, Sebastian and Marnau, Ninja and Sorge, Christoph
(2018) Stellungnahme gegenüber dem Landtag des Saarlandes zum Thema „Stand und Entwicklungsperspektiven der Telemedizin im Saarland“.
CISPA
.

Gerstacker, Carsten and Klein, Felix and Finkbeiner, Bernd
(2018) Bounded Synthesis of Reactive Programs.
In: Automated Technology for Verification and Analysis - 16th International Symposium, ATVA 2018, Los Angeles, CA, USA, October 7-10, 2018, Proceedings.
Conference: ATVA International Symposium on Automated Technology for Verification and Analysis

Ghaeini, Hamid Reza and Antonioli, Daniele and Brasser, Ferdinand and Sadeghi, Ahmad-Reza and Tippenhauer, Nils Ole
(2018) State-Aware Anomaly Detection for Industrial Control Systems.
In: Proceedings of Security Track at the ACM Symposium on Applied Computing (SAC).
Conference: SAC ACM Symposium on Applied Computing

Ghorbani Lyastani, Sanam and Schilling, Michael and Fahl, Sascha and Backes, Michael and Bugiel, Sven
(2018) Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse.
In: 27th USENIX Security Symposium (USENIX Security 18).
Conference: USENIX-Security Usenix Security Symposium

Giechaskiel, Ilias and Cremers, Cas and Rasmussen, Kasper B.
(2018) When the Crypto in Cryptocurrencies Breaks: Bitcoin Security under Broken Primitives.
IEEE Security & Privacy.

Giraldo, Jairo and Urbina, David and Cardenas, Alvaro and Valente, Junia and Faisal, Mustafa and Ruths, Justin and Tippenhauer, Nils Ole and Sandberg, Henrik and Candell, Richard
CISPA is powered by EPrints 3 which is developed by the School of Electronics and Computer Science at the University of Southampton. More information and software credits.