Items where Year is 2018

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Item Type | No Grouping
Jump to: A | B | C | D | E | F | G | H | J | K | L | M | N | O | R | S | T | V | W | X | Z
Number of items: 80.

A

Asghar, Muhammad Rizwan and Backes, Michael and Simeonovski, Milivoj
(2018) PRIMA: Privacy-Preserving Identity and Access Management at Internet-Scale.
In: 2018 IEEE International Conference on Communications (ICC) Kansas City, MO, USA, 20-24 May 2018.
Conference: None | Not Set

Azimi, Seyedmajid and Britz, Dominik and Engstler, Michael and Fritz, Mario and Mücklich, Frank
(2018) Advanced Steel Microstructural Classification by Deep Learning Methods.
Scientific Reports.

B

Backes, Michael and Hanzlik, Lucjan and Kluczniak, Kamil and Schneider, Jonas
(2018) Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys.
In: IACR ASIACRYPT 2018.
Conference: ASIACRYPT - International Conference on the Theory and Application of Cryptology and Information Security
(In Press)

Baumann, Christoph and Guanciale, Roberto and Nemati, Hamed and Dam, Mads
(2018) Verifying System Level Information Flow Using Confidentiality-Preserving Refinement.
In: In Submission.
Conference: S&P - IEEE Symposium on Security and Privacy
(Submitted)

Berrang, Pascal and Humbert, Mathias and Zhang, Yang and Lehmann, Irina and Eils, Roland and Backes, Michael
(2018) Dissecting Privacy Risks in Biomedical Data.
In: Proceedings of the 3rd IEEE European Symposium on Security and Privacy (Euro S&P).
Conference: EuroS&P - IEEE European Symposium on Security and Privacy

Bhattacharyya, Apratim and Fritz, Mario and Schiele, Bernt
(2018) Long-Term On-Board Prediction of People in Traffic Scenes under Uncertainty.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

Bhattacharyya, Apratim and Malinowski, Mateusz and Schiele, Bernt and Fritz, Mario
(2018) Long-Term Image Boundary Prediction.
In: Association for the Advancement of Artificial Intelligence (AAAI).
Conference: AAAI - National Conference of the American Association for Artificial Intelligence

Bhattacharyya, Apratim and Schiele, Bernt and Fritz, Mario
(2018) Accurate and Diverse Sampling of Sequences based on a “Best of Many” Sample Objective.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

Brahmakshatriya, Ajay and Kedia, Piyus and Nemati, Hamed and McKee, Derrick and Bhatu, Pratik and Garg, Deepak and Lal, Akash and Rastogi, Aseem
(2018) CONFLLVM: Compiler-Based Information Flow Control in Low-Level Code.
In: In Submission.
Conference: EuroS&P - IEEE European Symposium on Security and Privacy
(Submitted)

Brengel, Michael and Rossow, Christian
(2018) Identifying Key Leakage of Bitcoin Users.
In: Proceedings of the Symposium on Research in Attacks, Intrusions and Defenses (RAID).
Conference: RAID - International Symposium on Recent Advances in Intrusion Detection
(In Press)

Brengel, Michael and Rossow, Christian
(2018) MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps.
In: Proceedings of the Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA).
Conference: None | Not Set

Buchwald, Sebastian and Fried, Andreas and Hack, Sebastian
(2018) Synthesizing an instruction selection rule library from semantic specifications.
In: Proceedings of the 2018 International Symposium on Code Generation and Optimization, CGO 2018, Vösendorf / Vienna, Austria, February 24-28, 2018.
Conference: CGO - International Symposium on Code Generation and Optimization

Bushart, Jonas
(2018) Optimizing Recurrent Pulsing Attacks using Application-Layer Amplification of Open DNS Resolvers.
In: 12th USENIX Workshop on Offensive Technologies (WOOT 18).
Conference: None | Not Set

Bushart, Jonas and Rossow, Christian
(2018) DNS Unchained: Amplified Application-Layer DoS Attacks Against DNS Authoritatives.
In: Proceedings of the 21th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
Conference: RAID - International Symposium on Recent Advances in Intrusion Detection

Böhme, Marcel and Soremekun, Ezekiel O. and Chattopadhyay, Sudipta and Ugherughe, Emamurho and Zeller, Andreas
(2018) Wo ist der Fehler und wie wird er behoben? Ein Experiment mit Softwareentwicklern.
In: Software Engineering (SE) 2018.
Conference: None | Not Set

C

Chowdhury, Sreyasi Nag and Tandon, Niket and Ferhatosmanoglu, Hakan and Weikum, Gerhard
(2018) VISIR: Visual and Semantic Image Label Refinement.
In: Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining, WSDM 2018, Marina Del Rey, CA, USA, February 5-9, 2018.
Conference: WSDM - ACM International Conference on Web Search and Data Mining

Cohn-Gordon, Katriel and Cremers, Cas and Garratt, Luke and Millican, Jon and Milnber, Kevin
(2018) On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees.
(In Press)

Cremers, Cas and Dehnel-Wild, Martin and Milner, Kevin
(2018) Secure Authentication in the Grid: A Formal Analysis of DNP3 SAv5.
Journal of Computer Security.
(In Press)

D

Dietrich, Aljoscha and Leibenger, Dominik and Sorge, Christoph
(2018) Sicherheit und Datenschutz im Smart Grid – rechtliche Anforderungen und technische Lösungen.
In: Tagungsband des 21. Internationalen Rechtsinformatik Symposions IRIS 2018: Proceedings of the 21th International Legal Informatics Symposium IRIS 2018.
Conference: None | Not Set
(In Press)

Dietrich, Aljoscha and Sorge, Christoph
(2018) Rechtliche Aspekte von Cloud Computing in der Finanz- und Versicherungswirtschaft.
In: Tagungsband des 21. Internationalen Rechtsinformatik Symposions IRIS 2018: Proceedings of the 21th International Legal Informatics Symposium IRIS 2018.
Conference: None | Not Set

Dietrich, Constanze and Krombholz, Katharina and Borgolte, Kevin and Fiebig, Tobias
(2018) Investigating System Operators' Perspective on Security Misconfigurations.
In: 25th ACM Conference on Computer and Communications Security.
Conference: CCS - ACM Conference on Computer and Communications Security

E

Elnikety, Eslam and Garg, Deepak and Druschel, Peter
(2018) Shai: Enforcing Data-Specific Policies with Near-Zero Runtime Overhead.
CoRR, abs/18.

F

Fass, Aurore and Krawczyk, Robert and Backes, Michael and Stock, Ben
(2018) JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript.
In: Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA '18).
Conference: None | Not Set

Fleischhacker, Nils and Krupp, Johannes and Malavolta, Giulio and Schneider, Jonas and Schröder, Dominique and Simkin, Mark
(2018) Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys.
IET Information Security, 12 (3). pp. 166-183. ISSN 1751-8709

G

Gambi, Alessio and Bell, Jonathan and Zeller, Andreas
(2018) Practical Test Dependency Detection.
In: Proceedings of the 2018 IEEE Conference on Software Testing, Validation and Verification.
Conference: ICST - International Conference on Software Testing, Verification and Validation

Garg, Jugal and Hoefer, Martin and Mehlhorn, Kurt
(2018) Approximating the Nash Social Welfare with Budget-Additive Valuations.
In: SODA '18 Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms.
Conference: SODA - ACM/SIAM Symposium on Discrete Algorithms

Georgoulis, Stamatios and Rematas, Konstantinos and Ritschel, Tobias and Gavves, Efstratios and Fritz, Mario and Gool, Luc Van and Tuytelaars, Tinne
(2018) Reflectance and Natural Illumination from Single-Material Specular Objects Using Deep Learning.
Transactions on Pattern Analysis and Machine Intelligence (TPAMI).

Gerling, Sebastian and Marnau, Ninja and Sorge, Christoph
(2018) Stellungnahme gegenüber dem Landtag des Saarlandes zum Thema „Stand und Entwicklungsperspektiven der Telemedizin im Saarland“.
CISPA
.

Ghorbani Lyastani, Sanam and Schilling, Michael and Fahl, Sascha and Backes, Michael and Bugiel, Sven
(2018) Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse.
In: 27th USENIX Security Symposium (USENIX Security 18).
Conference: USENIX-Security - Usenix Security Symposium

Giechaskiel, Ilias and Cremers, Cas and Rasmussen, Kasper B.
(2018) When the Crypto in Cryptocurrencies Breaks: Bitcoin Security under Broken Primitives.
IEEE Security & Privacy.

Gnad, Daniel and Hoffmann, Jörg
(2018) Star-topology decoupled state space search.
Artif. Intell., 257. 24–60.

Grimm, Niklas and Maillard, Kenji and Fournet, Cédric and Hritcu, Catalin and Maffei, Matteo and Protzenko, Jonathan and Ramananandro, Tahina and Rastogi, Aseem and Swamy, Nikhil and Béguelin, Santiago Zanella
(2018) A monadic framework for relational verification: applied to information security, program equivalence, and optimizations.
In: Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and Proofs, CPP 2018, Los Angeles, CA, USA, January 8-9, 2018.
Conference: None | Not Set

Grosse, Kathrin and Smith, Michael Thomas and Backes, Michael
(2018) Killing Three Birds with one Gaussian Process: Analyzing Attack Vectors on Classification.
ArXiv e-prints.
(Submitted)

H

He, Yang and Fritz, Mario and Schiele, Bernt
(2018) Diverse Conditional Image Generation by Stochastic Regression with Latent Drop-Out Codes.
In: European Conference on Computer Vision (ECCV).
Conference: ECCV - European Conference on Computer Vision

Hessel, Stefan
(2018) Zum Stand der vernetzten Dinge: Die Probleme mit der IT-Sicherheit bei Smart Toys.
In: Tagungsband des 21. Internationalen Rechtsinformatik Symposions IRIS 2018.

J

Jacobs, Swen and Sakr, Mouhammad
(2018) Analyzing Guarded Protocols: Better Cutoffs, More Systems, More Expressivity.
In: Verification, Model Checking, and Abstract Interpretation - 19th International Conference, VMCAI 2018, Proceedings.
Conference: None | Not Set

Jacobs, Swen and Sakr, Mouhammad
(2018) A Symbolic Algorithm for Lazy Synthesis of Eager Strategies.
In: International Symposium on Automated Technology for Verification and Analysis (ATVA), October 7-10, 2018, Los Angeles.
Conference: ATVA - International Symposium on Automated Technology for Verification and Analysis
(In Press)

Jung, Ralf and Jourdan, Jacques-Henri and Krebbers, Robbert and Dreyer, Derek
(2018) RustBelt: securing the foundations of the rust programming language.
PACMPL, 2 (POPL). 66:1–66:34.

K

Kawohl, Claudia and Krämer, Annika and Marnau, Ninja
(2018) Datenschutz durch Technikgestaltung für Genomdaten.
DSRI Herbstakademie Tagungsband 2018.

Kim, Jooyeon and Tabibian, Behzad and Oh, Alice and Schölkopf, Bernhard and Gomez-Rodriguez, Manuel
(2018) Leveraging the Crowd to Detect and Reduce the Spread of Fake News and Misinformation.
In: Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining, WSDM 2018, Marina Del Rey, CA, USA, February 5-9, 2018.
Conference: WSDM - ACM International Conference on Web Search and Data Mining

Kokologiannakis, Michalis and Lahav, Ori and Sagonas, Konstantinos and Vafeiadis, Viktor
(2018) Effective stateless model checking for C/C++ concurrency.
PACMPL, 2 (POPL). 17:1–17:32.

Koprowski, Przemyslaw and Mehlhorn, Kurt and Ray, Saurabh
(2018) Corrigendum to "Faster algorithms for computing Hong's bound on absolute positiveness".
Journal of Symbolic Computation, 87. 238–241.
(Submitted)

Krupp, Johannes and Rossow, Christian
(2018) teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts.
In: 27th USENIX Security Symposium (USENIX Security 18), 15-17 Aug 2018, Baltimore MD.
Conference: USENIX-Security - Usenix Security Symposium

Krüger, Jochen and Sorge, Christoph and Vogelgesang, Stephanie
(2018) IT-Forscher als potentielle Straftäter? – IT-Sicherheitsforschung zwischen Wissenschaftsfreiheit und Strafrecht.
In: Tagungsband des 21. Internationalen Rechtsinformatik Symposions IRIS 2018: Proceedings of the 21th International Legal Informatics Symposium IRIS 2018.
Conference: None | Not Set
(In Press)

L

Lee, Hojoon and Song, Chihyun and Kang, Brent Byunghoon
(2018) Lord of the x86 Rings: A Portable User Mode Privilege Separation Architecture on x86.
In: ACM CCS 2018, 15-19 Oct 2018, Toronto, Canada.
Conference: CCS - ACM Conference on Computer and Communications Security
(Submitted)

M

Ma, Liqian and Sun, Qianru and Georgoulis, Stamatios and Gool, Luc Van and Schiele, Bernt and Fritz, Mario
(2018) Disentangled Person Image Generation.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

Maisuradze, Giorgi and Rossow, Christian
(2018) Ret2Spec: Speculative Execution Using Return Stack Buffers.
In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 15-19 Oct 2018, Toronto, Canada.
Conference: CCS - ACM Conference on Computer and Communications Security

Maisuradze, Giorgi and Rossow, Christian
(2018) Speculose: Analyzing the Security Implications of Speculative Execution in CPUs.
CoRR, abs/18.

Majumdar, Rupak and Niksic, Filip
(2018) Why is random testing effective for partition tolerance bugs?
PACMPL, 2 (POPL). 46:1–46:24.

Marnau, Ninja and Berrang, Pascal and Humbert, Mathias
(2018) Anonymisierungsverfahren für genetische Daten.
Datenschutz und Datensicherheit (DuD), 2/2018. pp. 83-88.

Marnau, Ninja and Sorge, Christoph
(2018) From Law to Engineering: A Computer Science Perspective on Privacy & Data Protection.
In: González-Fuster, G., van Brakel, R. and P. De Hert (forthcoming) Research Handbook on Privacy and Data Protection Law. Values, Norms and Global Politics. Edward Elgar Publishing.
(In Press)

Mathis, Björn and Avdiienko, Vitalii and Soremekun, Ezekiel O. and Böhme, Marcel and Zeller, Andreas
(2018) Detecting Information Flow by Mutating Input data.
In: Software Engineering (SE) 2018.
Conference: None | Not Set

Maximov, Maxim and Ritschel, Tobias and Fritz, Mario
(2018) Deep Appearance Maps.
["eprint_fieldopt_monograph_type_technicalreport" not defined]. UNSPECIFIED.

N

Nemati, Hamed and Baumann, Christoph and Guanciale, Roberto and Dam, Mads
(2018) Formal Verification of Integrity-Preserving Countermeasures Against Cache Storage Side-Channels.
POST 2018.

Nemati, Hamed and Baumann, Christoph and Guanciale, Roberto and Dam, Mads
(2018) Formal Verification of Integrity-Preserving Countermeasures Against Cache Storage Side-Channels.
In: Principles of Security and Trust - 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings.
Conference: None | Not Set

O

Oh, Seong Joon and Augustin, Max and Schiele, Bernt and Fritz, Mario
(2018) Whitening Black-Box Neural Networks.
In: International Conference on Learning Representations (ICLR).
Conference: None | Not Set

Oltrogge, Marten and Derr, Erik and Stransky, Christian and Acar, Yasemin and Fahl, Sascha and Rossow, Christian and Pellegrino, Giancarlo and Bugiel, Sven and Backes, Michael
(2018) The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators.
In: 39th IEEE Symposium on Security and Privacy (SP '18).
Conference: S&P - IEEE Symposium on Security and Privacy

Orekondy, Tribhuvanesh and Fritz, Mario and Schiele, Bernt
(2018) Connecting Pixels to Privacy and Utility: Automatic Redaction of Private Information in Images.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

R

Radicek, Ivan and Barthe, Gilles and Gaboardi, Marco and Garg, Deepak and Zuleger, Florian
(2018) Monadic refinements for relational cost analysis.
PACMPL, 2 (POPL). 36:1–36:32.

Rau, Andreas and Hotzkow, Jenny and Zeller, Andreas
(2018) Efficient GUI Test Generation by Learning from Tests of Other Apps.
In: Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings.
Conference: ICSE - International Conference on Software Engineering

Rau, Andreas and Hotzkow, Jenny and Zeller, Andreas
(2018) Transferring Tests Across Web Applications.
In: ICWE - International Conference for Web Engineering.
Conference: None | Not Set

S

Salem, Ahmed and Berrang, Pascal and Humbert, Mathias and Backes, Michael
(2018) Privacy-Preserving Similar Patient Queries for Combined Biomedical Data.
In: The 19th Privacy Enhancing Technologies Symposium (PETS).
Conference: None | Not Set
(In Press)

Sharma, Ankur and Schuhknecht, Felix Martin and Dittrich, Jens
(2018) The Case for Automatic Database Administration using Deep Reinforcement Learning.
ArXiv e-prints.

Shetty, Rakshith and Schiele, Bernt and Fritz, Mario
(2018) A4NT: Author Attribute Anonymity by Adversarial Training of Neural Machine Translation.
In: 27th USENIX Security Symposium (USENIX Security 18).
Conference: USENIX-Security - Usenix Security Symposium

Shirazi, Fatemeh and Simeonovski, Milivoj and Asghar, Muhammad Rizwan and Backes, Michael and Díaz, Claudia
(2018) A Survey on Routing in Anonymous Communication Protocols.
ACM Computing Surveys (CSUR), 51 (3). pp. 1-39. ISSN 0360-0300

Speicher, Patrick and Steinmetz, Marcel and Backes, Michael and Hoffmann, Jörg and Künnemann, Robert
(2018) Stackelberg Planning: Towards Effective Leader-Follower State Space Search.
In: The Thirty-Second AAAI Conference on Artificial Intelligence (AAAI-18), New Orleans, Louisiana, USA.
Conference: AAAI - National Conference of the American Association for Artificial Intelligence

Speicher, Patrick and Steinmetz, Marcel and Künnemann, Robert and Simeonovski, Milivoj and Pellegrino, Giancarlo and Hoffmann, Jörg and Backes, Michael
(2018) Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure.
In: 2018 IEEE European Symposium on Security and Privacy, EuroS&P 2018, London, United Kingdom, April 24-26, 2018.
Conference: EuroS&P - IEEE European Symposium on Security and Privacy

Speicher, Patrick and Steinmetz, Marcel and Künnemann, Robert and Simeonovski, Milivoj and Pellegrino, Giancarlo and Hoffmann, Jörg and Backes, Michael
(2018) Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure (full version).
Extended Version of EuroS&P 2018 Paper.

Speicher, Till and Ali, Muhammad and Venkatadri, Giridhari and Ribeiro, Filipe Nunes and Arvanitakis, George and Benevenuto, Fabrício and Gummadi, Krishna P. and Loiseau, Patrick and Mislove, Alan
(2018) Potential for Discrimination in Online Targeted Advertising.
In: Conference on Fairness, Accountability and Transparency, FAT 2018, 23-24 February 2018, New York, NY, USA.
Conference: None | Not Set

Stock, Ben and Pellegrino, Giancarlo and Li, Frank and Backes, Michael and Rossow, Christian
(2018) Didn’t You Hear Me? — Towards More Successful Web Vulnerability Notifications.
In: Proceedings of the 25th Annual Symposium on Network and Distributed System Security (NDSS '18)..
Conference: NDSS - Network and Distributed System Security Symposium

Sun, Qianru and Ma, Liqian and Oh, Seong Joon and Gool, Luc Van and Schiele, Bernt and Fritz, Mario
(2018) Natural and Effective Obfuscation by Head Inpainting.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

Sun, Qianru and Tewari, Ayush and Xu, Weipeng and Fritz, Mario and Theobalt, Christian and Schiele, Bernt
(2018) A Hybrid Model for Identity Obfuscation by Face Replacement.
Technical Report. UNSPECIFIED.

Sun, Qianru and Tewari, Ayush and Xu, Weipeng and Fritz, Mario and Theobalt, Christian and Schiele, Bernt
(2018) A Hybrid Model for Identity Obfuscation by Face Replacement.
In: European Conference on Computer Vision.
Conference: ECCV - European Conference on Computer Vision

T

Thanh Nguyen, Binh and Sprenger, Christoph and Cremers, Cas
(2018) Abstractions for security protocol verification.
Journal of Computer Security.
(In Press)

V

Vahldiek-Oberwanger, Anjo and Elnikety, Eslam and Garg, Deepak and Druschel, Peter
(2018) ERIM: Secure and Efficient In-process Isolation with Memory Protection Keys.
CoRR, abs/18.

W

Wermke, Dominik and Huaman, Nicolas and Acar, Yasemin and Reaves, Bradley and Traynor, Patrick and Fahl, Sascha
(2018) A Large Scale Investigation of Obfuscation Use in Google Play.
CoRR, abs/18.

X

Xu, Meng and Qian, Chenxiong and Lu, Kangjie and Backes, Michael and Kim, Taesoo
(2018) Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels.
In: In Proceedings of the 39th IEEE Symposium on Security and Privacy (Oakland). San Francisco, CA, May 2018..
Conference: S&P - IEEE Symposium on Security and Privacy

Z

Zhang, Xucong and Sugano, Yusuke and Fritz, Mario and Bulling, Andreas
(2018) MPIIGaze: Real-World Dataset and Deep Appearance-Based Gaze Estimation.
Transactions on Pattern Analysis and Machine Intelligence (TPAMI).

Zhang, Yang and Humbert, Mathias and Rahman, Tahleen and Li, Cheng-Te and Pang, Jun and Backes, Michael
(2018) Tagvisor: A Privacy Advisor for Sharing Hashtags.
In: Proceedings of the Web Conference 2018 (WWW).
Conference: WWW - International World Wide Web Conference

Zhao, Fanghua and Gao, Linan and Zhang, Yang and Wang, Zeyu and Wang, Bo and Guo, Shanqing
(2018) You Are Where You APP: An Assessment on Location Privacy of Social APPs.
In: The 29th IEEE International Symposium on Software Reliability Engineering, 15.10.2018-18.10.2018.
Conference: ISSRE - International Symposium on Software Reliability Engineering

This list was generated on Sun Nov 18 00:02:06 2018 CET.