Items where Year is 2018

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Author(s)/Creator(s) | Item Type | No Grouping
Number of items: 131.

Asghar, Muhammad Rizwan and Backes, Michael and Simeonovski, Milivoj
(2018) PRIMA: Privacy-Preserving Identity and Access Management at Internet-Scale.
In: 2018 IEEE International Conference on Communications (ICC) Kansas City, MO, USA, 20-24 May 2018.
Conference: ICC IEEE International Conference on Communications

Azimi, Seyedmajid and Britz, Dominik and Engstler, Michael and Fritz, Mario and Mücklich, Frank
(2018) Advanced Steel Microstructural Classification by Deep Learning Methods.
Scientific Reports, 8. ISSN 2045-2322

Backes, Michael and Hanzlik, Lucjan and Kluczniak, Kamil and Schneider, Jonas
(2018) Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys.
In: IACR ASIACRYPT 2018.
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security
(In Press)

Basin, David and Cremers, Cas and Kim, Tiffany Hyun-Jin and Perrig, Adrian and Sasse, Ralf and Szalachowski, Pavel
(2018) Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure.
IEEE Transactions on Dependable and Secure Computing, 15 (3). pp. 393-408.

Basin, David and Cremers, Cas and Meadows, Catherine A.
(2018) Model Checking Security Protocols.
In: Handbook of Model Checking. Springer International Publishing, pp. 727-762. ISBN 978-3-319-10574-1

Baumann, Christoph and Guanciale, Roberto and Nemati, Hamed and Dam, Mads
(2018) Verifying System Level Information Flow Using Confidentiality-Preserving Refinement.
In: In Submission.
Conference: SP IEEE Symposium on Security and Privacy
(Submitted)

Berrang, Pascal and Humbert, Mathias and Zhang, Yang and Lehmann, Irina and Eils, Roland and Backes, Michael
(2018) Dissecting Privacy Risks in Biomedical Data.
In: IEEE European Symposium on Security and Privacy.
Conference: EuroS&P IEEE European Symposium on Security and Privacy

Bhattacharyya, Apratim and Fritz, Mario and Schiele, Bernt
(2018) Long-Term On-Board Prediction of People in Traffic Scenes under Uncertainty.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Bhattacharyya, Apratim and Malinowski, Mateusz and Schiele, Bernt and Fritz, Mario
(2018) Long-Term Image Boundary Prediction.
In: Association for the Advancement of Artificial Intelligence (AAAI).
Conference: AAAI National Conference of the American Association for Artificial Intelligence

Bhattacharyya, Apratim and Schiele, Bernt and Fritz, Mario
(2018) Accurate and Diverse Sampling of Sequences Based on a “Best of Many” Sample Objective.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Bonakdarpour, B. and Finkbeiner, Bernd
(2018) The Complexity of Monitoring Hyperproperties.
In: 2018 IEEE 31st Computer Security Foundations Symposium (CSF).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Borges, Nataniel P. and Hotzkow, Jenny and Zeller, Andreas
(2018) DroidMate-2: A Platform for Android Test Generation.
In: The 33rd ACM/IEEE International Conference on Automated Software Engineering, Montpellier, France.
Conference: ASE Automated Software Engineering Conference

Brahmakshatriya, Ajay and Kedia, Piyus and Nemati, Hamed and McKee, Derrick and Bhatu, Pratik and Garg, Deepak and Lal, Akash and Rastogi, Aseem
(2018) CONFLLVM: Compiler-Based Information Flow Control in Low-Level Code.
In: In Submission.
Conference: EuroS&P IEEE European Symposium on Security and Privacy
(Submitted)

Brakerski, Zvika and Döttling, Nico
(2018) Two-Message Statistically Sender-Private OT from LWE.
In: TCC (2).
Conference: TCC Theory of Cryptography Conference

Brengel, Michael and Rossow, Christian
(2018) Identifying Key Leakage of Bitcoin Users.
In: Proceedings of the Symposium on Research in Attacks, Intrusions and Defenses (RAID).
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)
(In Press)

Brengel, Michael and Rossow, Christian
(2018) MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps.
In: Proceedings of the Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA).
Conference: DIMVA GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment

Buchwald, Sebastian and Fried, Andreas and Hack, Sebastian
(2018) Synthesizing an instruction selection rule library from semantic specifications.
In: Proceedings of the 2018 International Symposium on Code Generation and Optimization, CGO 2018, Vösendorf / Vienna, Austria, February 24-28, 2018.
Conference: CGO International Symposium on Code Generation and Optimization

Budhathoki, Kailash and Boley, Mario and Vreeken, Jilles
(2018) Rule Discovery for Exploratory Causal Reasoning.
In: NeurIPS 2018 workshop on Causal Learning.
Conference: NeurIPS Conference on Neural Information Processing Systems

Budhathoki, Kailash and Vreeken, Jilles
(2018) Accurate Causal Inference on Discrete Data.
In: IEEE International Conference on Data Mining (ICDM'18).
Conference: ICDM IEEE International Conference on Data Mining

Budhathoki, Kailash and Vreeken, Jilles
(2018) Causal Inference on Event Sequences.
In: SIAM International Conference on Data Mining.
Conference: SDM SIAM International Conference on Data Mining

Budhathoki, Kailash and Vreeken, Jilles
(2018) Origo: Causal Inference by Compression.
Knowledge and Information Systems, 56 (2). pp. 285-307.

Bushart, Jonas
(2018) Optimizing Recurrent Pulsing Attacks using Application-Layer Amplification of Open DNS Resolvers.
In: 12th USENIX Workshop on Offensive Technologies (WOOT 18).
Conference: WOOT USENIX Workshop on Offensive Technologies

Bushart, Jonas and Rossow, Christian
(2018) DNS Unchained: Amplified Application-Layer DoS Attacks Against DNS Authoritatives.
In: Proceedings of the 21th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Böhme, Marcel and Soremekun, Ezekiel and Chattopadhyay, Sudipta and Ugherughe, Emamurho and Zeller, Andreas
(2018) Wo ist der Fehler und wie wird er behoben? Ein Experiment mit Softwareentwicklern.
In: Software Engineering (SE) 2018.

Chowdhury, Sreyasi Nag and Tandon, Niket and Ferhatosmanoglu, Hakan and Weikum, Gerhard
(2018) VISIR: Visual and Semantic Image Label Refinement.
In: Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining, WSDM 2018, Marina Del Rey, CA, USA, February 5-9, 2018.
Conference: WSDM ACM International Conference on Web Search and Data Mining

Cohn-Gordon, Katriel and Cremers, Cas and Garratt, Luke and Millican, Jon and Milner, Kevin
(2018) On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees.
In: ACM CCS 2018, 15-19 Oct 2018, Toronto, Canada.
Conference: CCS ACM Conference on Computer and Communications Security

Dawoud, Abdallah
(2018) OS Support For Capabilities In Android.
Masters thesis, Saarland University.

Dietrich, Aljoscha and Leibenger, Dominik and Sorge, Christoph
(2018) Sicherheit und Datenschutz im Smart Grid – rechtliche Anforderungen und technische Lösungen.
In: Tagungsband des 21. Internationalen Rechtsinformatik Symposions IRIS 2018: Proceedings of the 21th International Legal Informatics Symposium IRIS 2018.
(In Press)

Dietrich, Aljoscha and Sorge, Christoph
(2018) Rechtliche Aspekte von Cloud Computing in der Finanz- und Versicherungswirtschaft.
In: Tagungsband des 21. Internationalen Rechtsinformatik Symposions IRIS 2018: Proceedings of the 21th International Legal Informatics Symposium IRIS 2018.

Dietrich, Constanze and Krombholz, Katharina and Borgolte, Kevin and Fiebig, Tobias
(2018) Investigating System Operators' Perspective on Security Misconfigurations.
In: 25th ACM Conference on Computer and Communications Security.
Conference: CCS ACM Conference on Computer and Communications Security

Döttling, Nico and Garg, Sanjam and Gupta, Divya and Miao, Peihan and Mukherjee, Pratyay
(2018) Obfuscation from Low Noise Multilinear Maps.
In: INDOCRYPT.
Conference: INDOCRYPT International Conference on Cryptology in India

Döttling, Nico and Garg, Sanjam and Hajiabadi, Mohammad and Masny, Daniel
(2018) New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes.
In: PKC.
Conference: PKC International Conference on Practice and Theory in Public Key Cryptography

Elnikety, Eslam and Garg, Deepak and Druschel, Peter
(2018) Shai: Enforcing Data-Specific Policies with Near-Zero Runtime Overhead.
CoRR, abs/18.

Fakhreddine, Aymen and Tippenhauer, Nils Ole and Giustiniano, Domenico
(2018) Design and Large-Scale Evaluation of WiFi Proximity Metrics.
In: Proceedings of European Wireless.
Conference: UNSPECIFIED

Fass, Aurore and Krawczyk, Robert and Backes, Michael and Stock, Ben
(2018) JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript.
In: Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA '18).
Conference: DIMVA GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment

Feltz, Michèle and Cremers, Cas
(2018) Strengthening the Security of Authenticated Key Exchange against Bad Randomness.
Designs, Codes and Cryptography, 86 (3). pp. 481-516.

Fey, G\"rschwin and Ghasempouri, Tara and Jacobs, Swen and Martino, Gianluca and Raik, Jaan and Riener, Heinz
(2018) Design Understanding: From Logic to Specification.
In: IFIP/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2018, Verona, Italy, October 8-10, 2018, 8-10 Oct 2018, Verona, Italy.

Finkbeiner, Bernd and Hahn, Christopher and Hans, Tobias
(2018) MGHyper: Checking Satisfiability of HyperLTL Formulas Beyond the \exists* \forall* Fragment.
In: Automated Technology for Verification and Analysis - 16th International Symposium, ATVA 2018, Los Angeles, CA, USA, October 7-10, 2018, Proceedings.
Conference: ATVA International Symposium on Automated Technology for Verification and Analysis

Finkbeiner, Bernd and Hahn, Christopher and Lukert, Philip and Stenger, Marvin and Tentrup, Leander
(2018) Synthesizing Reactive Systems from Hyperproperties.
In: Computer Aided Verification.
Conference: CAV Computer Aided Verification

Finkbeiner, Bernd and Hahn, Christopher and Stenger, Marvin and Tentrup, Leander
(2018) RVHyper: A Runtime Verification Tool for Temporal Hyperproperties.
In: Tools and Algorithms for the Construction and Analysis of Systems.
Conference: TACAS Tools and Algorithms for Construction and Analysis of Systems

Finkbeiner, Bernd and Hahn, Christopher and Torfah, Hazem
(2018) Model Checking Quantitative Hyperproperties.
In: Computer Aided Verification.
Conference: CAV Computer Aided Verification

Fleischhacker, Nils and Krupp, Johannes and Malavolta, Giulio and Schneider, Jonas and Schröder, Dominique and Simkin, Mark
(2018) Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys.
IET Information Security, 12 (3). pp. 166-183. ISSN 1751-8709

Frassinelli, Daniel and Gambi, Alessio and Nürnberger, Stefan and Park, Sohyeon
(2018) DRiVERSITY - Synthetic Torture Testing to Find Limits of Autonomous Driving Algorithms.
In: ACM Computer Science in Cars Conference.
Conference: CSCS ACM Computer Science in Cars Symposium

Frenkel, Hadar and Grumberg, Orna and Sheinvald, Sarai
(2018) An Automata-Theoretic Approach to Model-Checking Systems and Specifications Over Infinite Data Domains.
Journal of Automated Reasoning, 63 (4). pp. 1077-1101.

Gambi, Alessio and Bell, Jonathan and Zeller, Andreas
(2018) Practical Test Dependency Detection.
In: Proceedings of the 2018 IEEE Conference on Software Testing, Validation and Verification.
Conference: ICST International Conference on Software Testing, Verification and Validation

Garg, Jugal and Hoefer, Martin and Mehlhorn, Kurt
(2018) Approximating the Nash Social Welfare with Budget-Additive Valuations.
In: SODA '18 Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms.
Conference: SODA ACM/SIAM Symposium on Discrete Algorithms

Georgoulis, Stamatios and Rematas, Konstantinos and Ritschel, Tobias and Gavves, Efstratios and Fritz, Mario and Gool, Luc Van and Tuytelaars, Tinne
(2018) Reflectance and Natural Illumination from Single-Material Specular Objects Using Deep Learning.
Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 40 (8). pp. 1932-1947. ISSN 0162-8828

Gerling, Sebastian and Marnau, Ninja and Sorge, Christoph
(2018) Stellungnahme gegenüber dem Landtag des Saarlandes zum Thema „Stand und Entwicklungsperspektiven der Telemedizin im Saarland“.
CISPA
.

Gerstacker, Carsten and Klein, Felix and Finkbeiner, Bernd
(2018) Bounded Synthesis of Reactive Programs.
In: Automated Technology for Verification and Analysis - 16th International Symposium, ATVA 2018, Los Angeles, CA, USA, October 7-10, 2018, Proceedings.
Conference: ATVA International Symposium on Automated Technology for Verification and Analysis

Ghaeini, Hamid Reza and Antonioli, Daniele and Brasser, Ferdinand and Sadeghi, Ahmad-Reza and Tippenhauer, Nils Ole
(2018) State-Aware Anomaly Detection for Industrial Control Systems.
In: Proceedings of Security Track at the ACM Symposium on Applied Computing (SAC).
Conference: SAC ACM Symposium on Applied Computing

Ghorbani Lyastani, Sanam and Schilling, Michael and Fahl, Sascha and Backes, Michael and Bugiel, Sven
(2018) Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse.
In: 27th USENIX Security Symposium (USENIX Security 18).
Conference: USENIX-Security Usenix Security Symposium

Giechaskiel, Ilias and Cremers, Cas and Rasmussen, Kasper B.
(2018) When the Crypto in Cryptocurrencies Breaks: Bitcoin Security under Broken Primitives.
IEEE Security & Privacy.

Giraldo, Jairo and Urbina, David and Cardenas, Alvaro and Valente, Junia and Faisal, Mustafa and Ruths, Justin and Tippenhauer, Nils Ole and Sandberg, Henrik and Candell, Richard
(2018) A Survey of Physics-Based Attack Detection in Cyber-Physical Systems.
ACM Computing Surveys (CSUR), 1 (1).

Gnad, Daniel and Hoffmann, Jörg
(2018) Star-topology decoupled state space search.
Artif. Intell., 257. 24–60.

Gopinath, Rahul and Mathis, Björn and Zeller, Andreas
(2018) If You Can't Kill a Supermutant, You Have a Problem.
In: Software Testing, Verification and Validation Workshops (ICSTW), 2018 IEEE Seventh International Conference on.
Conference: ICST International Conference on Software Testing, Verification and Validation

Grimm, Niklas and Maillard, Kenji and Fournet, Cédric and Hritcu, Catalin and Maffei, Matteo and Protzenko, Jonathan and Ramananandro, Tahina and Rastogi, Aseem and Swamy, Nikhil and Béguelin, Santiago Zanella
(2018) A monadic framework for relational verification: applied to information security, program equivalence, and optimizations.
In: Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and Proofs, CPP 2018, Los Angeles, CA, USA, January 8-9, 2018.

Grosse, Kathrin and Pfaff, David and Smith, Michael Thomas and Backes, Michael
(2018) The Limitations of Model Uncertainty in Adversarial Settings.
ArXiv e-prints.

Grosse, Kathrin and Smith, Michael Thomas and Backes, Michael
(2018) Killing Three Birds with one Gaussian Process: Analyzing Attack Vectors on Classification.
ArXiv e-prints.
(Submitted)

Hanzlik, Lucjan and Zhang, Yang and Grosse, Kathrin and Salem, Ahmed and Augustin, Max and Backes, Michael and Fritz, Mario
(2018) MLCapsule: Guarded Offline Deployment of Machine Learning as a Service.
arXiv
.

He, Yang and Fritz, Mario and Schiele, Bernt
(2018) Diverse Conditional Image Generation by Stochastic Regression with Latent Drop-Out Codes.
In: European Conference on Computer Vision (ECCV).
Conference: ECCV European Conference on Computer Vision

Hessel, Stefan
(2018) Zum Stand der vernetzten Dinge: Die Probleme mit der IT-Sicherheit bei Smart Toys.
In: Datenschutz/LegalTech – Tagungsband des 21. Internationalen Rechtsinformatik Symposions IRIS 2018 : Data Protection/LegalTech – Proceedings of the 21st International Legal Informatics Symposium.

Hessel, Stefan
(2018) Zum Stand der vernetzten Dinge: Die Probleme mit der IT-Sicherheit bei Smart Toys.
In: Tagungsband des 21. Internationalen Rechtsinformatik Symposions IRIS 2018.

Hessel, Stefan and Möllers, Frederik
(2018) Wie sicher ist das beA? – Das besondere elektronische Anwaltspostfach aus Sicht der IT-Sicherheit.
Saarländisches Anwaltsblatt (1). pp. 24-27.

Jacobs, Swen and Sakr, Mouhammad
(2018) Analyzing Guarded Protocols: Better Cutoffs, More Systems, More Expressivity.
In: Verification, Model Checking, and Abstract Interpretation - 19th International Conference, VMCAI 2018, Proceedings.
Conference: VMCAI Verification, Model Checking and Abstract Interpretation

Jacobs, Swen and Sakr, Mouhammad
(2018) A Symbolic Algorithm for Lazy Synthesis of Eager Strategies.
In: International Symposium on Automated Technology for Verification and Analysis (ATVA), October 7-10, 2018, Los Angeles.
Conference: ATVA International Symposium on Automated Technology for Verification and Analysis
(In Press)

Jacobs, Swen and Tentrup, Leander and Zimmermann, Martin
(2018) Distributed synthesis for parameterized temporal logics.
Information and Computation, 262 (2). pp. 311-328.

Jung, Ralf and Jourdan, Jacques-Henri and Krebbers, Robbert and Dreyer, Derek
(2018) RustBelt: securing the foundations of the rust programming language.
PACMPL, 2 (POPL). 66:1–66:34.

Kawohl, Claudia and Krämer, Annika and Marnau, Ninja
(2018) Datenschutz durch Technikgestaltung für Genomdaten.
DSRI Herbstakademie Tagungsband 2018.

Kim, Jooyeon and Tabibian, Behzad and Oh, Alice and Schölkopf, Bernhard and Gomez-Rodriguez, Manuel
(2018) Leveraging the Crowd to Detect and Reduce the Spread of Fake News and Misinformation.
In: Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining, WSDM 2018, Marina Del Rey, CA, USA, February 5-9, 2018.
Conference: WSDM ACM International Conference on Web Search and Data Mining

Kokologiannakis, Michalis and Lahav, Ori and Sagonas, Konstantinos and Vafeiadis, Viktor
(2018) Effective stateless model checking for C/C++ concurrency.
PACMPL, 2 (POPL). 17:1–17:32.

Koprowski, Przemyslaw and Mehlhorn, Kurt and Ray, Saurabh
(2018) Corrigendum to "Faster algorithms for computing Hong's bound on absolute positiveness".
Journal of Symbolic Computation, 87. 238–241.
(Submitted)

Krombholz, Katharina and Dabrowski, Adrian and Purgathofer, Peter and Weippl, Edgar
(2018) Poster: The Petri Dish Attack - Guessing Secrets Based on Bacterial Growth.
In: NDSS 2018.

Krupp, Johannes and Rossow, Christian
(2018) teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts.
In: 27th USENIX Security Symposium (USENIX Security 18), 15-17 Aug 2018, Baltimore MD.
Conference: USENIX-Security Usenix Security Symposium

Krüger, Jochen and Sorge, Christoph and Vogelgesang, Stephanie
(2018) IT-Forscher als potentielle Straftäter? – IT-Sicherheitsforschung zwischen Wissenschaftsfreiheit und Strafrecht.
In: Tagungsband des 21. Internationalen Rechtsinformatik Symposions IRIS 2018: Proceedings of the 21th International Legal Informatics Symposium IRIS 2018.
(In Press)

Kuznetsov, Konstantin and Avdiienko, Vitalii and Gorla, Alessandra and Zeller, Andreas
(2018) Analyzing the User Interface of Android Apps.
In: MOBILESoft ’18: 5th IEEE/ACM International Conference on Mobile Software Engineering and Systems, May 27–28, Gothenburg, Sweden.
Conference: MOBILESoft@ICSE MOBILESoft@ICSE

Lee, Hojoon and Song, Chihyun and Kang, Brent Byunghoon
(2018) Lord of the x86 Rings: A Portable User Mode Privilege Separation Architecture on x86.
In: ACM CCS 2018, 15-19 Oct 2018, Toronto, Canada.
Conference: CCS ACM Conference on Computer and Communications Security
(Submitted)

List, Markus and Hornakova, Andrea and Vreeken, Jilles and Schulz, Marcel
(2018) JAMI: Fast Computation of Conditional Mutual Information for ceRNA network analysis.
Bioinformatics, 34 (17). pp. 3050-3051.

Ma, Liqian and Sun, Qianru and Georgoulis, Stamatios and Gool, Luc Van and Schiele, Bernt and Fritz, Mario
(2018) Disentangled Person Image Generation.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Maisuradze, Giorgi and Rossow, Christian
(2018) Ret2Spec: Speculative Execution Using Return Stack Buffers.
In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 15-19 Oct 2018, Toronto, Canada.
Conference: CCS ACM Conference on Computer and Communications Security

Maisuradze, Giorgi and Rossow, Christian
(2018) Speculose: Analyzing the Security Implications of Speculative Execution in CPUs.
CoRR, abs/18.

Majumdar, Rupak and Niksic, Filip
(2018) Why is random testing effective for partition tolerance bugs?
PACMPL, 2 (POPL). 46:1–46:24.

Mandros, Panagiotis and Boley, Mario and Vreeken, Jilles
(2018) Discovering Reliable Dependencies from Data: Hardness and Improved Algorithms.
In: IEEE International Conference on Data Mining (ICDM'18).
Conference: ICDM IEEE International Conference on Data Mining

Marnau, Ninja
(2018) Paris Call: Important Commitment Against The Arms Race With Cyber Weapons.
Tagesspiegel - Background Digitalisierung.

Marnau, Ninja and Berrang, Pascal and Humbert, Mathias
(2018) Anonymisierungsverfahren für genetische Daten.
Datenschutz und Datensicherheit (DuD), 2/2018. pp. 83-88.

Marx, Alexander and Vreeken, Jilles
(2018) Causal Inference on Multivariate and Mixed Type Data.
In: European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Data (ECMLPKDD).
Conference: ECML PKDD European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Database (PKDD and ECML combined from 2008)

Marx, Alexander and Vreeken, Jilles
(2018) Stochastic Complexity for Testing Conditional Independence on Discrete Data.
In: NeurIPS 2018 Workshop on Causal Learning.
Conference: NeurIPS Conference on Neural Information Processing Systems

Mathis, Björn and Avdiienko, Vitalii and Soremekun, Ezekiel and Böhme, Marcel and Zeller, Andreas
(2018) Detecting Information Flow by Mutating Input data.
In: Software Engineering (SE) 2018.
Conference: SE IASTED International Conference on Software Engineering

Maximov, Maxim and Ritschel, Tobias and Fritz, Mario
(2018) Deep Appearance Maps.
Technical Report. UNSPECIFIED.

Mirzaie, Nahal and Faghih, Fathiyeh and Jacobs, Swen and Bonakdarpour, Borzoo
(2018) Parameterized Synthesis of Self-Stabilizing Protocols in Symmetric Rings.
In: 22nd International Conference on Principles of Distributed Systems, OPODIS 2018, December 17-19, 2018, Hong Kong, China.
Conference: OPODIS International Conference on Principles of Distributed Systems

Möllers, Frederik and Hessel, Stefan
(2018) Das Sicherheitsgutachten zum besonderen elektronischen Anwaltspostfach (beA).
Computer und Recht, 34 (7). pp. 413-417.

Münnich-Hessel, Susanne and Hessel, Stefan
(2018) Achtung, Spionage! – Wie vernetzte Spielzeuge die Privatsphäre von Kindern bedrohen.
Betrifft: Evangelischer Kindergarten (2). pp. 24-27.

Nemati, Hamed and Baumann, Christoph and Guanciale, Roberto and Dam, Mads
(2018) Formal Verification of Integrity-Preserving Countermeasures Against Cache Storage Side-Channels.
POST 2018.

Nemati, Hamed and Baumann, Christoph and Guanciale, Roberto and Dam, Mads
(2018) Formal Verification of Integrity-Preserving Countermeasures Against Cache Storage Side-Channels.
In: Principles of Security and Trust - 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings.
Conference: POST International Conference on Principles of Security and Trust

Oh, Seong Joon and Augustin, Max and Schiele, Bernt and Fritz, Mario
(2018) Towards Reverse-Engineering Black-Box Neural Networks.
In: International Conference on Learning Representations (ICLR).
Conference: ICLR International Conference on Learning Representations

Oltrogge, Marten and Derr, Erik and Stransky, Christian and Acar, Yasemin and Fahl, Sascha and Rossow, Christian and Pellegrino, Giancarlo and Bugiel, Sven and Backes, Michael
(2018) The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators.
In: 39th IEEE Symposium on Security and Privacy (SP '18).
Conference: SP IEEE Symposium on Security and Privacy

Orekondy, Tribhuvanesh and Fritz, Mario and Schiele, Bernt
(2018) Connecting Pixels to Privacy and Utility: Automatic Redaction of Private Information in Images.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Pereira Borges Jr., Nataniel and Gómez, Maria and Zeller, Andreas
(2018) Guiding app testing with mined interaction models.
In: Proceedings of the 5th International Conference on Mobile Software Engineering and Systems.
Conference: MOBILESoft@ICSE MOBILESoft@ICSE

Pereira Borges Jr., Nataniel and Hotzkow, Jenny and Zeller, Andreas
(2018) DroidMate-2: A Platform for Android Test Generation.
In: Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering.
Conference: ASE Automated Software Engineering Conference

Radicek, Ivan and Barthe, Gilles and Gaboardi, Marco and Garg, Deepak and Zuleger, Florian
(2018) Monadic refinements for relational cost analysis.
PACMPL, 2 (POPL). 36:1–36:32.

Rau, Andreas and Hotzkow, Jenny and Zeller, Andreas
(2018) Efficient GUI Test Generation by Learning from Tests of Other Apps.
In: Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings.
Conference: ICSE International Conference on Software Engineering

Rau, Andreas and Hotzkow, Jenny and Zeller, Andreas
(2018) Transferring Tests Across Web Applications.
In: ICWE - International Conference for Web Engineering.
Conference: ICWE International Conference on Web Engineering

Salem, Ahmed and Berrang, Pascal and Humbert, Mathias and Backes, Michael
(2018) Privacy-Preserving Similar Patient Queries for Combined Biomedical Data.
In: The 19th Privacy Enhancing Technologies Symposium (PETS).
Conference: PETS Privacy Enhancing Technologies Symposium (was International Workshop of Privacy Enhancing Technologies)
(In Press)

Sharma, Ankur and Schuhknecht, Felix Martin and Dittrich, Jens
(2018) The Case for Automatic Database Administration using Deep Reinforcement Learning.
ArXiv e-prints.

Shetty, Rakshith and Fritz, Mario and Schiele, Bernt
(2018) Adversarial Scene Editing: Automatic Object Removal from Weak Supervision.
In: Conference on Neural Information Processing Systems.
Conference: NeurIPS Conference on Neural Information Processing Systems

Shetty, Rakshith and Schiele, Bernt and Fritz, Mario
(2018) A4NT: Author Attribute Anonymity by Adversarial Training of Neural Machine Translation.
In: 27th USENIX Security Symposium (USENIX Security 18).
Conference: USENIX-Security Usenix Security Symposium

Shirazi, Fatemeh and Simeonovski, Milivoj and Asghar, Muhammad Rizwan and Backes, Michael and Díaz, Claudia
(2018) A Survey on Routing in Anonymous Communication Protocols.
ACM Computing Surveys, 51 (3). pp. 1-39. ISSN 0360-0300

Siddiqi, Ahnaf and Tippenhauer, Nils Ole and Mashima, Daisuke and Chen, Binbin
(2018) On Practical Threat Scenario Testing in an Electric Power ICS Testbed.
In: Proceedings of the Cyber-Physical System Security Workshop (CPSS), co-located with ASIACCS.
Conference: UNSPECIFIED

Speicher, Patrick and Steinmetz, Marcel and Backes, Michael and Hoffmann, Jörg and Künnemann, Robert
(2018) Stackelberg Planning: Towards Effective Leader-Follower State Space Search.
In: The Thirty-Second AAAI Conference on Artificial Intelligence (AAAI-18), New Orleans, Louisiana, USA.
Conference: AAAI National Conference of the American Association for Artificial Intelligence

Speicher, Patrick and Steinmetz, Marcel and Künnemann, Robert and Simeonovski, Milivoj and Pellegrino, Giancarlo and Hoffmann, Jörg and Backes, Michael
(2018) Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure.
In: 2018 IEEE European Symposium on Security and Privacy, EuroS&P 2018, London, United Kingdom, April 24-26, 2018.
Conference: EuroS&P IEEE European Symposium on Security and Privacy

Speicher, Patrick and Steinmetz, Marcel and Künnemann, Robert and Simeonovski, Milivoj and Pellegrino, Giancarlo and Hoffmann, Jörg and Backes, Michael
(2018) Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure (full version).
CISPA
.

Speicher, Till and Ali, Muhammad and Venkatadri, Giridhari and Ribeiro, Filipe Nunes and Arvanitakis, George and Benevenuto, Fabrício and Gummadi, Krishna P. and Loiseau, Patrick and Mislove, Alan
(2018) Potential for Discrimination in Online Targeted Advertising.
In: Conference on Fairness, Accountability and Transparency, FAT 2018, 23-24 February 2018, New York, NY, USA.

Sridharan, Ragav and Maiti, Rajib Ranjan and Tippenhauer, Nils Ole
(2018) WADAC: Privacy-Preserving Anomaly Detection and Attack Classification on Wireless Traffic.
In: Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec).
Conference: UNSPECIFIED

Stock, Ben and Pellegrino, Giancarlo and Li, Frank and Backes, Michael and Rossow, Christian
(2018) Didn’t You Hear Me? — Towards More Successful Web Vulnerability Notifications.
In: Proceedings of the 25th Annual Symposium on Network and Distributed System Security (NDSS '18)..
Conference: NDSS Network and Distributed System Security Symposium

Sun, Qianru and Ma, Liqian and Oh, Seong Joon and Gool, Luc Van and Schiele, Bernt and Fritz, Mario
(2018) Natural and Effective Obfuscation by Head Inpainting.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Sun, Qianru and Tewari, Ayush and Xu, Weipeng and Fritz, Mario and Theobalt, Christian and Schiele, Bernt
(2018) A Hybrid Model for Identity Obfuscation by Face Replacement.
Technical Report. UNSPECIFIED.

Sun, Qianru and Tewari, Ayush and Xu, Weipeng and Fritz, Mario and Theobalt, Christian and Schiele, Bernt
(2018) A Hybrid Model for Identity Obfuscation by Face Replacement.
In: European Conference on Computer Vision.
Conference: ECCV European Conference on Computer Vision

Tanabe, Rui and Ueno, Wataru and Ishii, Kou and Yoshioka, Katsunari and Matsumoto, Tsutomu and Kasama, Takahiro and Inoue, Daisuke and Rossow, Christian
(2018) Evasive Malware via Identifier Implanting.
In: 13th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, 28-29 June 2018, Paris-Saclay.
Conference: DIMVA GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment

Taormina, Riccardo and Galelli, Stefano and Tippenhauer, Nils Ole and Salomons, Elad and Ostfeld, Avi and Eliades, Demetrios G. and Aghashahi, Mohsen and Sundararajan, Raanju and Pourahmadi, Mohsen and Banks, M. Katherine and Brentan, B. M. and Campbell, Enrique and Lima, G. and Manzi, D. and Ayala-Cabrera, D. and Herrera, M. and Montalvo, I. and Izquierdo, J. and Luvizotto Jr, E. and Chandy, Sarin E. and Rasekh, Amin and Barker, Zachary A. and Campbell, Bruce and Shafiee, M. Ehsan and Giacomoni, Marcio and Gatsis, Nikolaos and Taha, Ahmad and Abokifa, Ahmed A. and Haddad, Kelsey and Lo, Cynthia S. and Biswas, Pratim and Pasha M. Fayzul , Bijay and Somasundaram, Saravanakumar Lakshmanan and Housh, Mashor and Ohar, Ziv
(2018) The Battle Of The Attack Detection Algorithms: Disclosing Cyber Attacks On Water Distribution Networks.
Journal of Water Resources Planning and Management, 144 (8).

Thanh Nguyen, Binh and Sprenger, Christoph and Cremers, Cas
(2018) Abstractions for security protocol verification.
Journal of Computer Security.
(In Press)

Tretschk, Edgar and Oh, Seong Joon and Fritz, Mario
(2018) Sequential Attacks on Agents for Long-Term Adversarial Goals.
In: 2. ACM Computer Science in Cars Symposium -- Future Challenges in Artificial Intelligence & Security for Autonomous Vehicles.
Conference: CSCS ACM Computer Science in Cars Symposium
(In Press)

Vahldiek-Oberwanger, Anjo and Elnikety, Eslam and Garg, Deepak and Druschel, Peter
(2018) ERIM: Secure and Efficient In-process Isolation with Memory Protection Keys.
CoRR, abs/18.

Wagner, Misha and Basevi, Hector and Shetty, Rakshith and Li, Wenbin and Malinowski, Mateusz and Fritz, Mario and Leonardis, Ales
(2018) Answering Visual What-If Questions: From Actions to Predicted Scene Descriptions.
In: Visual Learning and Embodied Agents in Simulation Environments Workshop at European Conference on Computer Vision.
Conference: ECCV European Conference on Computer Vision

Wang, Xueou and Hou, Xiaolu and Rios, Ruben and Hallgren, Per and Tippenhauer, Nils Ole and Ochoa, Martín
(2018) Location Proximity Attacks against Mobile Targets: Analytical Bounds and Attacker Strategies.
In: Proceedings of the European Symposium on Research in Computer Security (ESORICS).
Conference: ESORICS European Symposium On Research In Computer Security

Wermke, Dominik and Huaman, Nicolas and Acar, Yasemin and Reaves, Bradley and Traynor, Patrick and Fahl, Sascha
(2018) A Large Scale Investigation of Obfuscation Use in Google Play.
CoRR, abs/18.

Wu, Hao and Ning, Y and Chakraborty, P and Vreeken, Jilles and Tatti, Nikolaj and Ramakrishnan, Naren
(2018) Generating Realistic Synthetic Population Datasets.
ACM Transactions on Knowledge Discovery and Data Mining, 12 (4). pp. 1-45.

Xian, Yongqin and Lorenz, Tobias and Schiele, Bernt and Akata, Zeynep
(2018) Feature Generating Networks for Zero-Shot Learning.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 19-21 June 2018, Salt Lake City, USA.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Xu, Meng and Qian, Chenxiong and Lu, Kangjie and Backes, Michael and Kim, Taesoo
(2018) Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels.
In: In Proceedings of the 39th IEEE Symposium on Security and Privacy (Oakland). San Francisco, CA, May 2018..
Conference: SP IEEE Symposium on Security and Privacy

Yu, Jiangshan and Ryan, Mark and Cremers, Cas
(2018) DECIM: Detecting Endpoint Compromise In Messaging.
IEEE Transactions on Information Forensics and Security, 13 (1). pp. 106-118.

Zhang, Xucong and Sugano, Yusuke and Fritz, Mario and Bulling, Andreas
(2018) MPIIGaze: Real-World Dataset and Deep Appearance-Based Gaze Estimation.
Transactions on Pattern Analysis and Machine Intelligence (TPAMI).

Zhang, Yang and Humbert, Mathias and Rahman, Tahleen and Li, Cheng-Te and Pang, Jun and Backes, Michael
(2018) Tagvisor: A Privacy Advisor for Sharing Hashtags.
In: The Web Conference.
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Zhao, Fanghua and Gao, Linan and Zhang, Yang and Wang, Zeyu and Wang, Bo and Guo, Shanqing
(2018) You Are Where You APP: An Assessment on Location Privacy of Social APPs.
In: IEEE International Symposium on Software Reliability Engineering, 15.10.2018-18.10.2018.
Conference: ISSRE International Symposium on Software Reliability Engineering

This list was generated on Thu Mar 28 12:27:25 2024 CET.