Items where Year is 2018

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Item Type | No Grouping
Jump to: A | B | C | D | E | F | G | H | J | K | L | M | N | O | P | R | S | T | V | W | X | Z
Number of items: 124.

A

Asghar, Muhammad Rizwan and Backes, Michael and Simeonovski, Milivoj
(2018) PRIMA: Privacy-Preserving Identity and Access Management at Internet-Scale.
In: 2018 IEEE International Conference on Communications (ICC) Kansas City, MO, USA, 20-24 May 2018.
Conference: None | Not Set

Azimi, Seyedmajid and Britz, Dominik and Engstler, Michael and Fritz, Mario and Mücklich, Frank
(2018) Advanced Steel Microstructural Classification by Deep Learning Methods.
Scientific Reports.

B

Backes, Michael and Hanzlik, Lucjan and Kluczniak, Kamil and Schneider, Jonas
(2018) Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys.
In: IACR ASIACRYPT 2018.
Conference: ASIACRYPT - International Conference on the Theory and Application of Cryptology and Information Security
(In Press)

Baumann, Christoph and Guanciale, Roberto and Nemati, Hamed and Dam, Mads
(2018) Verifying System Level Information Flow Using Confidentiality-Preserving Refinement.
In: In Submission.
Conference: S&P - IEEE Symposium on Security and Privacy
(Submitted)

Berrang, Pascal and Humbert, Mathias and Zhang, Yang and Lehmann, Irina and Eils, Roland and Backes, Michael
(2018) Dissecting Privacy Risks in Biomedical Data.
In: Proceedings of the 3rd IEEE European Symposium on Security and Privacy (Euro S&P).
Conference: EuroS&P - IEEE European Symposium on Security and Privacy

Bhattacharyya, Apratim and Fritz, Mario and Schiele, Bernt
(2018) Long-Term On-Board Prediction of People in Traffic Scenes under Uncertainty.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

Bhattacharyya, Apratim and Malinowski, Mateusz and Schiele, Bernt and Fritz, Mario
(2018) Long-Term Image Boundary Prediction.
In: Association for the Advancement of Artificial Intelligence (AAAI).
Conference: AAAI - National Conference of the American Association for Artificial Intelligence

Bhattacharyya, Apratim and Schiele, Bernt and Fritz, Mario
(2018) Accurate and Diverse Sampling of Sequences based on a “Best of Many” Sample Objective.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

Bonakdarpour, B. and Finkbeiner, Bernd
(2018) The Complexity of Monitoring Hyperproperties.
In: 2018 IEEE 31st Computer Security Foundations Symposium (CSF).
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Brahmakshatriya, Ajay and Kedia, Piyus and Nemati, Hamed and McKee, Derrick and Bhatu, Pratik and Garg, Deepak and Lal, Akash and Rastogi, Aseem
(2018) CONFLLVM: Compiler-Based Information Flow Control in Low-Level Code.
In: In Submission.
Conference: EuroS&P - IEEE European Symposium on Security and Privacy
(Submitted)

Brakerski, Zvika and Döttling, Nico
(2018) Two-Message Statistically Sender-Private OT from LWE.
In: TCC (2).
Conference: TCC - Theory of Cryptography Conference

Brengel, Michael and Rossow, Christian
(2018) Identifying Key Leakage of Bitcoin Users.
In: Proceedings of the Symposium on Research in Attacks, Intrusions and Defenses (RAID).
Conference: RAID - International Symposium on Recent Advances in Intrusion Detection
(In Press)

Brengel, Michael and Rossow, Christian
(2018) MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps.
In: Proceedings of the Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA).
Conference: None | Not Set

Buchwald, Sebastian and Fried, Andreas and Hack, Sebastian
(2018) Synthesizing an instruction selection rule library from semantic specifications.
In: Proceedings of the 2018 International Symposium on Code Generation and Optimization, CGO 2018, Vösendorf / Vienna, Austria, February 24-28, 2018.
Conference: CGO - International Symposium on Code Generation and Optimization

Budhathoki, Kailash and Boley, Mario and Vreeken, Jilles
(2018) Rule Discovery for Exploratory Causal Reasoning.
In: Proceedings of the NeurIPS 2018 workshop on Causal Learning.
Conference: NIPS - Advances in Neural Information Processing Systems

Budhathoki, Kailash and Vreeken, Jilles
(2018) Accurate Causal Inference on Discrete Data.
In: Proceedings of the IEEE International Conference on Data Mining (ICDM'18).
Conference: ICDM - IEEE International Conference on Data Mining

Budhathoki, Kailash and Vreeken, Jilles
(2018) Causal Inference on Event Sequences.
In: Proceedings of the 2018 SIAM International Conference on Data Mining, SDM 2018, May 3-5, 2018, San Diego Marriott Mission Valley, San Diego, CA, USA..
Conference: SDM - SIAM International Conference on Data Mining

Budhathoki, Kailash and Vreeken, Jilles
(2018) Origo: Causal Inference by Compression.
Knowledge and Information Systems, 56 (2). pp. 285-307.

Bushart, Jonas
(2018) Optimizing Recurrent Pulsing Attacks using Application-Layer Amplification of Open DNS Resolvers.
In: 12th USENIX Workshop on Offensive Technologies (WOOT 18).
Conference: None | Not Set

Bushart, Jonas and Rossow, Christian
(2018) DNS Unchained: Amplified Application-Layer DoS Attacks Against DNS Authoritatives.
In: Proceedings of the 21th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
Conference: RAID - International Symposium on Recent Advances in Intrusion Detection

Böhme, Marcel and Soremekun, Ezekiel O. and Chattopadhyay, Sudipta and Ugherughe, Emamurho and Zeller, Andreas
(2018) Wo ist der Fehler und wie wird er behoben? Ein Experiment mit Softwareentwicklern.
In: Software Engineering (SE) 2018.
Conference: None | Not Set

C

Chowdhury, Sreyasi Nag and Tandon, Niket and Ferhatosmanoglu, Hakan and Weikum, Gerhard
(2018) VISIR: Visual and Semantic Image Label Refinement.
In: Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining, WSDM 2018, Marina Del Rey, CA, USA, February 5-9, 2018.
Conference: WSDM - ACM International Conference on Web Search and Data Mining

Cohn-Gordon, Katriel and Cremers, Cas and Garratt, Luke and Millican, Jon and Milnber, Kevin
(2018) On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees.
(In Press)

Cremers, Cas and Dehnel-Wild, Martin and Milner, Kevin
(2018) Secure Authentication in the Grid: A Formal Analysis of DNP3 SAv5.
Journal of Computer Security.
(In Press)

D

D\"ttling, Nico and Garg, Sanjam and Gupta, Divya and Miao, Peihan and Mukherjee, Pratyay
(2018) Obfuscation from Low Noise Multilinear Maps.
In: INDOCRYPT.

D\"ttling, Nico and Garg, Sanjam and Hajiabadi, Mohammad and Masny, Daniel
(2018) New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes.
In: Public Key Cryptography (1).

Dietrich, Aljoscha and Leibenger, Dominik and Sorge, Christoph
(2018) Sicherheit und Datenschutz im Smart Grid – rechtliche Anforderungen und technische Lösungen.
In: Tagungsband des 21. Internationalen Rechtsinformatik Symposions IRIS 2018: Proceedings of the 21th International Legal Informatics Symposium IRIS 2018.
Conference: None | Not Set
(In Press)

Dietrich, Aljoscha and Sorge, Christoph
(2018) Rechtliche Aspekte von Cloud Computing in der Finanz- und Versicherungswirtschaft.
In: Tagungsband des 21. Internationalen Rechtsinformatik Symposions IRIS 2018: Proceedings of the 21th International Legal Informatics Symposium IRIS 2018.
Conference: None | Not Set

Dietrich, Constanze and Krombholz, Katharina and Borgolte, Kevin and Fiebig, Tobias
(2018) Investigating System Operators' Perspective on Security Misconfigurations.
In: 25th ACM Conference on Computer and Communications Security.
Conference: CCS - ACM Conference on Computer and Communications Security

Döttling, Nico and Garg, Sanjam and Gupta, Divya and Miao, Peihan and Mukherjee, Pratyay
(2018) Obfuscation from Low Noise Multilinear Maps.
In: INDOCRYPT.
Conference: None | Not Set

Döttling, Nico and Garg, Sanjam and Hajiabadi, Mohammad and Masny, Daniel
(2018) New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes.
In: PKC.
Conference: None | Not Set

E

Elnikety, Eslam and Garg, Deepak and Druschel, Peter
(2018) Shai: Enforcing Data-Specific Policies with Near-Zero Runtime Overhead.
CoRR, abs/18.

F

Fakhreddine, Aymen and Tippenhauer, Nils Ole and Giustiniano, Domenico
(2018) Design and Large-Scale Evaluation of WiFi Proximity Metrics.
In: Proceedings of European Wireless.

Fass, Aurore and Krawczyk, Robert and Backes, Michael and Stock, Ben
(2018) JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript.
In: Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA '18).
Conference: None | Not Set

Finkbeiner, Bernd and Hahn, Christopher and Hans, Tobias
(2018) MGHyper: Checking Satisfiability of HyperLTL Formulas Beyond the \exists* \forall* Fragment.
In: Automated Technology for Verification and Analysis - 16th International Symposium, ATVA 2018, Los Angeles, CA, USA, October 7-10, 2018, Proceedings.
Conference: ATVA - International Symposium on Automated Technology for Verification and Analysis

Finkbeiner, Bernd and Hahn, Christopher and Lukert, Philip and Stenger, Marvin and Tentrup, Leander
(2018) Synthesizing Reactive Systems from Hyperproperties.
In: Computer Aided Verification.
Conference: CAV - Computer Aided Verification

Finkbeiner, Bernd and Hahn, Christopher and Stenger, Marvin and Tentrup, Leander
(2018) RVHyper: A Runtime Verification Tool for Temporal Hyperproperties.
In: Tools and Algorithms for the Construction and Analysis of Systems.
Conference: TACAS - Tools and Algorithms for Construction and Analysis of Systems

Finkbeiner, Bernd and Hahn, Christopher and Torfah, Hazem
(2018) Model Checking Quantitative Hyperproperties.
In: Computer Aided Verification.
Conference: CAV - Computer Aided Verification

Fleischhacker, Nils and Krupp, Johannes and Malavolta, Giulio and Schneider, Jonas and Schröder, Dominique and Simkin, Mark
(2018) Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys.
IET Information Security, 12 (3). pp. 166-183. ISSN 1751-8709

G

Gambi, Alessio and Bell, Jonathan and Zeller, Andreas
(2018) Practical Test Dependency Detection.
In: Proceedings of the 2018 IEEE Conference on Software Testing, Validation and Verification.
Conference: ICST - International Conference on Software Testing, Verification and Validation

Garg, Jugal and Hoefer, Martin and Mehlhorn, Kurt
(2018) Approximating the Nash Social Welfare with Budget-Additive Valuations.
In: SODA '18 Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms.
Conference: SODA - ACM/SIAM Symposium on Discrete Algorithms

Georgoulis, Stamatios and Rematas, Konstantinos and Ritschel, Tobias and Gavves, Efstratios and Fritz, Mario and Gool, Luc Van and Tuytelaars, Tinne
(2018) Reflectance and Natural Illumination from Single-Material Specular Objects Using Deep Learning.
Transactions on Pattern Analysis and Machine Intelligence (TPAMI).

Gerling, Sebastian and Marnau, Ninja and Sorge, Christoph
(2018) Stellungnahme gegenüber dem Landtag des Saarlandes zum Thema „Stand und Entwicklungsperspektiven der Telemedizin im Saarland“.
CISPA
.

Gerstacker, Carsten and Klein, Felix and Finkbeiner, Bernd
(2018) Bounded Synthesis of Reactive Programs.
In: Automated Technology for Verification and Analysis - 16th International Symposium, ATVA 2018, Los Angeles, CA, USA, October 7-10, 2018, Proceedings.
Conference: ATVA - International Symposium on Automated Technology for Verification and Analysis

Ghaeini, Hamid Reza and Antonioli, Daniele and Brasser, Ferdinand and Sadeghi, Ahmad-Reza and Tippenhauer, Nils Ole
(2018) State-Aware Anomaly Detection for Industrial Control Systems.
In: Proceedings of Security Track at the ACM Symposium on Applied Computing (SAC).

Ghorbani Lyastani, Sanam and Schilling, Michael and Fahl, Sascha and Backes, Michael and Bugiel, Sven
(2018) Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse.
In: 27th USENIX Security Symposium (USENIX Security 18).
Conference: USENIX-Security - Usenix Security Symposium

Giechaskiel, Ilias and Cremers, Cas and Rasmussen, Kasper B.
(2018) When the Crypto in Cryptocurrencies Breaks: Bitcoin Security under Broken Primitives.
IEEE Security & Privacy.

Giraldo, Jairo and Urbina, David and Cardenas, Alvaro and Valente, Junia and Faisal, Mustafa and Ruths, Justin and Tippenhauer, Nils Ole and Sandberg, Henrik and Candell, Richard
(2018) A Survey of Physics-Based Attack Detection in Cyber-Physical Systems.
ACM Computing Surveys (CSUR), 1 (1).

Gnad, Daniel and Hoffmann, Jörg
(2018) Star-topology decoupled state space search.
Artif. Intell., 257. 24–60.

Gopinath, Rahul and Mathis, Björn and Zeller, Andreas
(2018) If You Can't Kill a Supermutant, You Have a Problem.
In: Software Testing, Verification and Validation Workshops (ICSTW), 2018 IEEE Seventh International Conference on.
Conference: ICST - International Conference on Software Testing, Verification and Validation

Grimm, Niklas and Maillard, Kenji and Fournet, Cédric and Hritcu, Catalin and Maffei, Matteo and Protzenko, Jonathan and Ramananandro, Tahina and Rastogi, Aseem and Swamy, Nikhil and Béguelin, Santiago Zanella
(2018) A monadic framework for relational verification: applied to information security, program equivalence, and optimizations.
In: Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and Proofs, CPP 2018, Los Angeles, CA, USA, January 8-9, 2018.
Conference: None | Not Set

Grosse, Kathrin and Pfaff, David and Smith, Michael Thomas and Backes, Michael
(2018) The Limitations of Model Uncertainty in Adversarial Settings.
ArXiv e-prints.

Grosse, Kathrin and Smith, Michael Thomas and Backes, Michael
(2018) Killing Three Birds with one Gaussian Process: Analyzing Attack Vectors on Classification.
ArXiv e-prints.
(Submitted)

H

Hanzlik, Lucjan and Zhang, Yang and Grosse, Kathrin and Salem, Ahmed and Augustin, Max and Backes, Michael and Fritz, Mario
(2018) MLCapsule: Guarded Offline Deployment of Machine Learning as a Service.
Technical Report. Arxiv.

Hanzlik, Lucjan and Zhang, Yang and Grosse, Kathrin and Salem, Ahmed and Augustin, Max and Backes, Michael and Fritz, Mario
(2018) MLCapsule: Guarded Offline Deployment of Machine Learning as a Service.
Arxive.
(Submitted)

He, Yang and Fritz, Mario and Schiele, Bernt
(2018) Diverse Conditional Image Generation by Stochastic Regression with Latent Drop-Out Codes.
In: European Conference on Computer Vision (ECCV).
Conference: ECCV - European Conference on Computer Vision

Hessel, Stefan
(2018) Zum Stand der vernetzten Dinge: Die Probleme mit der IT-Sicherheit bei Smart Toys.
In: Datenschutz/LegalTech – Tagungsband des 21. Internationalen Rechtsinformatik Symposions IRIS 2018 : Data Protection/LegalTech – Proceedings of the 21st International Legal Informatics Symposium.
Conference: None | Not Set

Hessel, Stefan
(2018) Zum Stand der vernetzten Dinge: Die Probleme mit der IT-Sicherheit bei Smart Toys.
In: Tagungsband des 21. Internationalen Rechtsinformatik Symposions IRIS 2018.

Hessel, Stefan and Möllers, Frederik
(2018) Wie sicher ist das beA? – Das besondere elektronische Anwaltspostfach aus Sicht der IT-Sicherheit.
Saarländisches Anwaltsblatt (1). pp. 24-27.

J

Jacobs, Swen and Sakr, Mouhammad
(2018) Analyzing Guarded Protocols: Better Cutoffs, More Systems, More Expressivity.
In: Verification, Model Checking, and Abstract Interpretation - 19th International Conference, VMCAI 2018, Proceedings.
Conference: None | Not Set

Jacobs, Swen and Sakr, Mouhammad
(2018) A Symbolic Algorithm for Lazy Synthesis of Eager Strategies.
In: International Symposium on Automated Technology for Verification and Analysis (ATVA), October 7-10, 2018, Los Angeles.
Conference: ATVA - International Symposium on Automated Technology for Verification and Analysis
(In Press)

Jacobs, Swen and Tentrup, Leander and Zimmermann, Martin
(2018) Distributed synthesis for parameterized temporal logics.
Information and Computation, 262 (2). pp. 311-328.

Jung, Ralf and Jourdan, Jacques-Henri and Krebbers, Robbert and Dreyer, Derek
(2018) RustBelt: securing the foundations of the rust programming language.
PACMPL, 2 (POPL). 66:1–66:34.

K

Kawohl, Claudia and Krämer, Annika and Marnau, Ninja
(2018) Datenschutz durch Technikgestaltung für Genomdaten.
DSRI Herbstakademie Tagungsband 2018.

Kim, Jooyeon and Tabibian, Behzad and Oh, Alice and Schölkopf, Bernhard and Gomez-Rodriguez, Manuel
(2018) Leveraging the Crowd to Detect and Reduce the Spread of Fake News and Misinformation.
In: Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining, WSDM 2018, Marina Del Rey, CA, USA, February 5-9, 2018.
Conference: WSDM - ACM International Conference on Web Search and Data Mining

Kokologiannakis, Michalis and Lahav, Ori and Sagonas, Konstantinos and Vafeiadis, Viktor
(2018) Effective stateless model checking for C/C++ concurrency.
PACMPL, 2 (POPL). 17:1–17:32.

Koprowski, Przemyslaw and Mehlhorn, Kurt and Ray, Saurabh
(2018) Corrigendum to "Faster algorithms for computing Hong's bound on absolute positiveness".
Journal of Symbolic Computation, 87. 238–241.
(Submitted)

Krombholz, Katharina and Dabrowski, Adrian and Purgathofer, Peter and Weippl, Edgar
(2018) Poster: The Petri Dish Attack - Guessing Secrets Based on Bacterial Growth.
In: NDSS 2018.
Conference: NDSS - Network and Distributed System Security Symposium

Krupp, Johannes and Rossow, Christian
(2018) teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts.
In: 27th USENIX Security Symposium (USENIX Security 18), 15-17 Aug 2018, Baltimore MD.
Conference: USENIX-Security - Usenix Security Symposium

Krüger, Jochen and Sorge, Christoph and Vogelgesang, Stephanie
(2018) IT-Forscher als potentielle Straftäter? – IT-Sicherheitsforschung zwischen Wissenschaftsfreiheit und Strafrecht.
In: Tagungsband des 21. Internationalen Rechtsinformatik Symposions IRIS 2018: Proceedings of the 21th International Legal Informatics Symposium IRIS 2018.
Conference: None | Not Set
(In Press)

L

Lee, Hojoon and Song, Chihyun and Kang, Brent Byunghoon
(2018) Lord of the x86 Rings: A Portable User Mode Privilege Separation Architecture on x86.
In: ACM CCS 2018, 15-19 Oct 2018, Toronto, Canada.
Conference: CCS - ACM Conference on Computer and Communications Security
(Submitted)

List, Markus and Hornakova, Andrea and Vreeken, Jilles and Schulz, Marcel
(2018) JAMI: Fast Computation of Conditional Mutual Information for ceRNA network analysis.
Bioinformatics, 34 (17). pp. 3050-3051.

M

Ma, Liqian and Sun, Qianru and Georgoulis, Stamatios and Gool, Luc Van and Schiele, Bernt and Fritz, Mario
(2018) Disentangled Person Image Generation.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

Maisuradze, Giorgi and Rossow, Christian
(2018) Ret2Spec: Speculative Execution Using Return Stack Buffers.
In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 15-19 Oct 2018, Toronto, Canada.
Conference: CCS - ACM Conference on Computer and Communications Security

Maisuradze, Giorgi and Rossow, Christian
(2018) Speculose: Analyzing the Security Implications of Speculative Execution in CPUs.
CoRR, abs/18.

Majumdar, Rupak and Niksic, Filip
(2018) Why is random testing effective for partition tolerance bugs?
PACMPL, 2 (POPL). 46:1–46:24.

Mandros, Panagiotis and Boley, Mario and Vreeken, Jilles
(2018) Discovering Reliable Dependencies from Data: Hardness and Improved Algorithms.
In: Proceedings of the IEEE International Conference on Data Mining (ICDM'18).
Conference: ICDM - IEEE International Conference on Data Mining

Marnau, Ninja
(2018) Paris Call: Important Commitment Against The Arms Race With Cyber Weapons.
Tagesspiegel - Background Digitalisierung.

Marnau, Ninja and Berrang, Pascal and Humbert, Mathias
(2018) Anonymisierungsverfahren für genetische Daten.
Datenschutz und Datensicherheit (DuD), 2/2018. pp. 83-88.

Marx, Alexander and Vreeken, Jilles
(2018) Causal Inference on Multivariate and Mixed Type Data.
In: Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Data (ECMLPKDD).
Conference: ECML PKDD - European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Database (PKDD and ECML combined from 2008)

Marx, Alexander and Vreeken, Jilles
(2018) Stochastic Complexity for Testing Conditional Independence on Discrete Data.
In: Proceedings of the NeurIPS 2018 workshop on Causal Learning.
Conference: NIPS - Advances in Neural Information Processing Systems

Mathis, Björn and Avdiienko, Vitalii and Soremekun, Ezekiel O. and Böhme, Marcel and Zeller, Andreas
(2018) Detecting Information Flow by Mutating Input data.
In: Software Engineering (SE) 2018.
Conference: None | Not Set

Maximov, Maxim and Ritschel, Tobias and Fritz, Mario
(2018) Deep Appearance Maps.
Technical Report. UNSPECIFIED.

Mirzaie, Nahal and Faghih, Fathiyeh and Jacobs, Swen and Bonakdarpour, Borzoo
(2018) Parameterized Synthesis of Self-Stabilizing Protocols in Symmetric Rings.
In: 22nd International Conference on Principles of Distributed Systems, OPODIS 2018, December 17-19, 2018, Hong Kong, China.
Conference: None | Not Set

Möllers, Frederik and Hessel, Stefan
(2018) Das Sicherheitsgutachten zum besonderen elektronischen Anwaltspostfach (beA).
Computer und Recht, 34 (7). pp. 413-417.

Münnich-Hessel, Susanne and Hessel, Stefan
(2018) Achtung, Spionage! – Wie vernetzte Spielzeuge die Privatsphäre von Kindern bedrohen.
Betrifft: Evangelischer Kindergarten (2). pp. 24-27.

N

Nemati, Hamed and Baumann, Christoph and Guanciale, Roberto and Dam, Mads
(2018) Formal Verification of Integrity-Preserving Countermeasures Against Cache Storage Side-Channels.
POST 2018.

Nemati, Hamed and Baumann, Christoph and Guanciale, Roberto and Dam, Mads
(2018) Formal Verification of Integrity-Preserving Countermeasures Against Cache Storage Side-Channels.
In: Principles of Security and Trust - 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings.
Conference: None | Not Set

O

Oh, Seong Joon and Augustin, Max and Schiele, Bernt and Fritz, Mario
(2018) Whitening Black-Box Neural Networks.
In: International Conference on Learning Representations (ICLR).
Conference: None | Not Set

Oltrogge, Marten and Derr, Erik and Stransky, Christian and Acar, Yasemin and Fahl, Sascha and Rossow, Christian and Pellegrino, Giancarlo and Bugiel, Sven and Backes, Michael
(2018) The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators.
In: 39th IEEE Symposium on Security and Privacy (SP '18).
Conference: S&P - IEEE Symposium on Security and Privacy

Orekondy, Tribhuvanesh and Fritz, Mario and Schiele, Bernt
(2018) Connecting Pixels to Privacy and Utility: Automatic Redaction of Private Information in Images.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

P

Pereira Borges Jr., Nataniel and Gómez, Maria and Zeller, Andreas
(2018) Guiding app testing with mined interaction models.
In: Proceedings of the 5th International Conference on Mobile Software Engineering and Systems.
Conference: None | Not Set

Pereira Borges Jr., Nataniel and Hotzkow, Jenny and Zeller, Andreas
(2018) DroidMate-2: A Platform for Android Test Generation.
In: Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering.
Conference: ASE - Automated Software Engineering Conference

R

Radicek, Ivan and Barthe, Gilles and Gaboardi, Marco and Garg, Deepak and Zuleger, Florian
(2018) Monadic refinements for relational cost analysis.
PACMPL, 2 (POPL). 36:1–36:32.

Rau, Andreas and Hotzkow, Jenny and Zeller, Andreas
(2018) Efficient GUI Test Generation by Learning from Tests of Other Apps.
In: Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings.
Conference: ICSE - International Conference on Software Engineering

Rau, Andreas and Hotzkow, Jenny and Zeller, Andreas
(2018) Transferring Tests Across Web Applications.
In: ICWE - International Conference for Web Engineering.
Conference: None | Not Set

S

Salem, Ahmed and Berrang, Pascal and Humbert, Mathias and Backes, Michael
(2018) Privacy-Preserving Similar Patient Queries for Combined Biomedical Data.
In: The 19th Privacy Enhancing Technologies Symposium (PETS).
Conference: None | Not Set
(In Press)

Sharma, Ankur and Schuhknecht, Felix Martin and Dittrich, Jens
(2018) The Case for Automatic Database Administration using Deep Reinforcement Learning.
ArXiv e-prints.

Shetty, Rakshith and Fritz, Mario and Schiele, Bernt
(2018) Adversarial Scene Editing: Automatic Object Removal from Weak Supervision.
In: Conference on Neural Information Processing Systems.
Conference: NIPS - Advances in Neural Information Processing Systems

Shetty, Rakshith and Schiele, Bernt and Fritz, Mario
(2018) A4NT: Author Attribute Anonymity by Adversarial Training of Neural Machine Translation.
In: 27th USENIX Security Symposium (USENIX Security 18).
Conference: USENIX-Security - Usenix Security Symposium

Shirazi, Fatemeh and Simeonovski, Milivoj and Asghar, Muhammad Rizwan and Backes, Michael and Díaz, Claudia
(2018) A Survey on Routing in Anonymous Communication Protocols.
ACM Computing Surveys (CSUR), 51 (3). pp. 1-39. ISSN 0360-0300

Siddiqi, Ahnaf and Tippenhauer, Nils Ole and Mashima, Daisuke and Chen, Binbin
(2018) On Practical Threat Scenario Testing in an Electric Power ICS Testbed.
In: Proceedings of the Cyber-Physical System Security Workshop (CPSS), co-located with ASIACCS.

Speicher, Patrick and Steinmetz, Marcel and Backes, Michael and Hoffmann, Jörg and Künnemann, Robert
(2018) Stackelberg Planning: Towards Effective Leader-Follower State Space Search.
In: The Thirty-Second AAAI Conference on Artificial Intelligence (AAAI-18), New Orleans, Louisiana, USA.
Conference: AAAI - National Conference of the American Association for Artificial Intelligence

Speicher, Patrick and Steinmetz, Marcel and Künnemann, Robert and Simeonovski, Milivoj and Pellegrino, Giancarlo and Hoffmann, Jörg and Backes, Michael
(2018) Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure.
In: 2018 IEEE European Symposium on Security and Privacy, EuroS&P 2018, London, United Kingdom, April 24-26, 2018.
Conference: EuroS&P - IEEE European Symposium on Security and Privacy

Speicher, Patrick and Steinmetz, Marcel and Künnemann, Robert and Simeonovski, Milivoj and Pellegrino, Giancarlo and Hoffmann, Jörg and Backes, Michael
(2018) Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure (full version).
Extended Version of EuroS&P 2018 Paper.

Speicher, Till and Ali, Muhammad and Venkatadri, Giridhari and Ribeiro, Filipe Nunes and Arvanitakis, George and Benevenuto, Fabrício and Gummadi, Krishna P. and Loiseau, Patrick and Mislove, Alan
(2018) Potential for Discrimination in Online Targeted Advertising.
In: Conference on Fairness, Accountability and Transparency, FAT 2018, 23-24 February 2018, New York, NY, USA.
Conference: None | Not Set

Sridharan, Ragav and Maiti, Rajib Ranjan and Tippenhauer, Nils Ole
(2018) WADAC: Privacy-Preserving Anomaly Detection and Attack Classification on Wireless Traffic.
In: Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec).

Stock, Ben and Pellegrino, Giancarlo and Li, Frank and Backes, Michael and Rossow, Christian
(2018) Didn’t You Hear Me? — Towards More Successful Web Vulnerability Notifications.
In: Proceedings of the 25th Annual Symposium on Network and Distributed System Security (NDSS '18)..
Conference: NDSS - Network and Distributed System Security Symposium

Sun, Qianru and Ma, Liqian and Oh, Seong Joon and Gool, Luc Van and Schiele, Bernt and Fritz, Mario
(2018) Natural and Effective Obfuscation by Head Inpainting.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

Sun, Qianru and Tewari, Ayush and Xu, Weipeng and Fritz, Mario and Theobalt, Christian and Schiele, Bernt
(2018) A Hybrid Model for Identity Obfuscation by Face Replacement.
Technical Report. UNSPECIFIED.

Sun, Qianru and Tewari, Ayush and Xu, Weipeng and Fritz, Mario and Theobalt, Christian and Schiele, Bernt
(2018) A Hybrid Model for Identity Obfuscation by Face Replacement.
In: European Conference on Computer Vision.
Conference: ECCV - European Conference on Computer Vision

T

Tanabe, Rui and Ueno, Wataru and Ishii, Kou and Yoshioka, Katsunari and Matsumoto, Tsutomu and Kasama, Takahiro and Inoue, Daisuke and Rossow, Christian
(2018) Evasive Malware via Identifier Implanting.
In: 13th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, 28-29 June 2018, Paris-Saclay.
Conference: None | Not Set

Taormina, Riccardo and Galelli, Stefano and Tippenhauer, Nils Ole and Salomons, Elad and Ostfeld, Avi and Eliades, Demetrios G. and Aghashahi, Mohsen and Sundararajan, Raanju and Pourahmadi, Mohsen and Banks, M. Katherine and Brentan, B. M. and Campbell, Enrique and Lima, G. and Manzi, D. and Ayala-Cabrera, D. and Herrera, M. and Montalvo, I. and Izquierdo, J. and Luvizotto Jr, E. and Chandy, Sarin E. and Rasekh, Amin and Barker, Zachary A. and Campbell, Bruce and Shafiee, M. Ehsan and Giacomoni, Marcio and Gatsis, Nikolaos and Taha, Ahmad and Abokifa, Ahmed A. and Haddad, Kelsey and Lo, Cynthia S. and Biswas, Pratim and Pasha M. Fayzul , Bijay and Somasundaram, Saravanakumar Lakshmanan and Housh, Mashor and Ohar, Ziv
(2018) The Battle Of The Attack Detection Algorithms: Disclosing Cyber Attacks On Water Distribution Networks.
Journal of Water Resources Planning and Management, 144 (8).

Thanh Nguyen, Binh and Sprenger, Christoph and Cremers, Cas
(2018) Abstractions for security protocol verification.
Journal of Computer Security.
(In Press)

Tretschk, Edgar and Oh, Seong Joon and Fritz, Mario
(2018) Sequential Attacks on Agents for Long-Term Adversarial Goals.
In: 2. ACM Computer Science in Cars Symposium -- Future Challenges in Artificial Intelligence & Security for Autonomous Vehicles.
Conference: None | Not Set
(In Press)

V

Vahldiek-Oberwanger, Anjo and Elnikety, Eslam and Garg, Deepak and Druschel, Peter
(2018) ERIM: Secure and Efficient In-process Isolation with Memory Protection Keys.
CoRR, abs/18.

W

Wagner, Misha and Basevi, Hector and Shetty, Rakshith and Li, Wenbin and Malinowski, Mateusz and Fritz, Mario and Leonardis, Ales
(2018) Answering Visual What-If Questions: From Actions to Predicted Scene Descriptions.
In: Visual Learning and Embodied Agents in Simulation Environments Workshop at European Conference on Computer Vision.
Conference: None | Not Set

Wang, Xueou and Hou, Xiaolu and Rios, Ruben and Hallgren, Per and Tippenhauer, Nils Ole and Ochoa, Martín
(2018) Location Proximity Attacks against Mobile Targets: Analytical Bounds and Attacker Strategies.
In: Proceedings of the European Symposium on Research in Computer Security (ESORICS).

Wermke, Dominik and Huaman, Nicolas and Acar, Yasemin and Reaves, Bradley and Traynor, Patrick and Fahl, Sascha
(2018) A Large Scale Investigation of Obfuscation Use in Google Play.
CoRR, abs/18.

Wu, Hao and Ning, Y and Chakraborty, P and Vreeken, Jilles and Tatti, Nikolaj and Ramakrishnan, Naren
(2018) Generating Realistic Synthetic Population Datasets.
ACM Transactions on Knowledge Discovery and Data Mining, 12 (4). pp. 1-45.

X

Xu, Meng and Qian, Chenxiong and Lu, Kangjie and Backes, Michael and Kim, Taesoo
(2018) Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels.
In: In Proceedings of the 39th IEEE Symposium on Security and Privacy (Oakland). San Francisco, CA, May 2018..
Conference: S&P - IEEE Symposium on Security and Privacy

Z

Zhang, Xucong and Sugano, Yusuke and Fritz, Mario and Bulling, Andreas
(2018) MPIIGaze: Real-World Dataset and Deep Appearance-Based Gaze Estimation.
Transactions on Pattern Analysis and Machine Intelligence (TPAMI).

Zhang, Yang and Humbert, Mathias and Rahman, Tahleen and Li, Cheng-Te and Pang, Jun and Backes, Michael
(2018) Tagvisor: A Privacy Advisor for Sharing Hashtags.
In: Proceedings of the Web Conference 2018 (WWW).
Conference: WWW - International World Wide Web Conference

Zhao, Fanghua and Gao, Linan and Zhang, Yang and Wang, Zeyu and Wang, Bo and Guo, Shanqing
(2018) You Are Where You APP: An Assessment on Location Privacy of Social APPs.
In: The 29th IEEE International Symposium on Software Reliability Engineering, 15.10.2018-18.10.2018.
Conference: ISSRE - International Symposium on Software Reliability Engineering

This list was generated on Mon Sep 16 00:02:20 2019 CEST.