Items where Year is 2019

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Author(s)/Creator(s) | Item Type | No Grouping
Number of items: 133.

Abate, Carmine and Blanco, Roberto and Garg, Deepak and Hritcu, Catalin and Patrignani, Marco and Thibault, Jeremy
(2019) Journey Beyond Full Abstraction: Exploring Robust Property Preservation for Secure Compilation.
In: csf.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Aggarwal, Divesh and Döttling, Nico and Nielsen, Jesper Buus and Obremski, Maciej and Purwanto, Erick
(2019) Continuous Non-Malleable Codes in the 8-Split-State Model.
In: EUROCRYPT.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Alam, Aftab and Krombholz, Katharina and Bugiel, Sven
(2019) Poster: Let History not Repeat Itself (this Time) - Tackling WebAuthn Developer Issues Early On.
In: ACM SIGSAC Conference on Computer and Communications Security.
Conference: CCS ACM Conference on Computer and Communications Security

Antonioli, Daniele and Tippenhauer, Nils Ole and Rasmussen, Kasper
(2019) Nearby Threats: Reversing, Analyzing, and Attacking Google’s 'Nearby Connections' on Android.
In: Proceedings of the Network and Distributed System Security Symposium (NDSS).
Conference: NDSS Network and Distributed System Security Symposium

Antonioli, Daniele and Tippenhauer, Nils Ole and Rasmussen, Kasper Bonne
(2019) The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR.
In: Usenix Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Backes, Michael and Döttling, Nico and Hanzlik, Lucjan and Kluczniak, Kamil and Schneider, Jonas
(2019) Ring Signatures: Logarithmic Size, No Setup -- from Standard Assumptions.
In: IACR Eurocrypt 2019.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Backes, Michael and Hanzlik, Lucjan and Herzberg, Amir and Kate, Aniket and Pryvalov, Ivan
(2019) Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup.
In: PKC 2019.
Conference: PKC International Conference on Practice and Theory in Public Key Cryptography
(In Press)

Backes, Michael and Hanzlik, Lucjan and Schneider-Bensch, Jonas
(2019) Membership Privacy for Fully Dynamic Group Signatures.
In: ACM CCS 2019.
Conference: CCS ACM Conference on Computer and Communications Security

Baumeister, Jan and Finkbeiner, Bernd and Schwenger, Maximilian and Torfah, Hazem
(2019) FPGA Stream-Monitoring of Real-time Properties.
ACM Trans. Embed. Comput. Syst., 18 (5s). 88:1-88:24.

Beutner, Raven and Finkbeiner, Bernd and Hecking-Harbusch, Jesko
(2019) Translating Asynchronous Games for Distributed Synthesis.
In: 30th International Conference on Concurrency Theory, CONCUR 2019.
Conference: CONCUR International Conference on Concurrency Theory

Bhattacharyya, Apratim and Fritz, Mario and Schiele, Bernt
(2019) Bayesian Prediction of Future Street Scenes using Synthetic Likelihoods.
In: International Conference on Representation Learning (ICLR).
Conference: ICLR International Conference on Learning Representations

Blaskiewicz, Przemyslaw and Hanzlik, Lucjan and Kluczniak, Kamil and Krzywiecki, Lukasz and Kutylowski, Miroslaw and Slowik, Marcin and Wszola, Marta
(2019) Pseudonymous Signature Schemes.
In: Advances in Cyber Security. Springer, Singapore, pp. 185-255. ISBN 78-981-13-1483-4

Bloem, Roderick and Jacobs, Swen and Vizel, Yakir
(2019) Efficient Information-Flow Verification under Speculative Execution.
In: ATVA 2019, International Symposium on Automated Technology for Verification and Analysis, 27-31 Oct 2019, Taipei City, Taiwan.
Conference: ATVA International Symposium on Automated Technology for Verification and Analysis
(In Press)

Bonakdarpour, Borzoo and Finkbeiner, Bernd
(2019) Program Repair for Hyperproperties.
In: Automated Technology for Verification and Analysis - 17th International Symposium, ATVA 2019, Taipei, Taiwan, October 28-31, 2019, Proceedings.
Conference: ATVA International Symposium on Automated Technology for Verification and Analysis

Brahmakshatriya, Ajay and Kedia, Piyus and Nemati, Hamed and McKee, Derrick and Bhatu, Pratik and Garg, Deepak and Lal, Akash and Rastogi, Aseem
(2019) ConfLLVM: A Compiler for Enforcing Data Confidentiality in Low-Level Code.
In: Proceedings of the Fourteenth EuroSys Conference 2019, March 25-28, 2019, Dresden, Germany.
Conference: EuroSys Eurosys Conference

Brakerski, Zvika and Döttling, Nico and Garg, Sanjam and Malavolta, Giulio
(2019) Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles.
In: TCC 2019.
Conference: TCC Theory of Cryptography Conference
(In Press)

Breitenbacher, Dominik and Homoliak, Ivan and Aung, Yan Lin and Tippenhauer, Nils Ole and Elovici, Yuval
(2019) HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices.
In: AsiaCCS.
Conference: ASIACCS ACM ASIA Conference on Computer and Communications Security

Brox, Thomas and Bruhn, Andrés and Fritz, Mario
(2019) Pattern Recognition - 40th German Conference, GCPR 2018, Stuttgart, Germany, October 9-12, 2018, Proceedings.
Lecture Notes in Computer Science, 11269 . Springer. ISBN 978-3-030-12938-5

Cascudo, Ignacio and Damgård, Ivan and David, Bernardo and Döttling, Nico and Dowsley, Rafael and Giacomelli, Irene
(2019) Efficient UC Commitment Extension with Homomorphism for Free (and Applications).
In: ASIACRYPT 2019.
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security
(In Press)

Chakraborty, Dhiman and Bugiel, Sven
(2019) Poster: simFIDO – FIDO2 User Authentication with simTPM.
In: CCS 19, 11/11/2019 - 15/11/2019, London, UK.
Conference: CCS ACM Conference on Computer and Communications Security

Chakraborty, Dhiman and Bugiel, Sven and Jha, Atul Ananad
(2019) Poster: TGX: Secure SGX enclave management using TPM.
In: NDSS Symposium 2019, February 24-27, 2019, San Diego, CA, USA.
Conference: NDSS Network and Distributed System Security Symposium

Chakraborty, Dhiman and Hammer, Christian and Bugiel, Sven
(2019) Secure Multi-Execution in Android.
In: 34th ACM/SIGAPP Symposium On Applied Computing.
Conference: SAC ACM Symposium on Applied Computing

Chakraborty, Dhiman and Hanzlik, Lucjan and Bugiel, Sven
(2019) simTPM: User-centric TPM for Mobile Devices.
In: Usenix Security Symposium, Santa Clara, CA, USA.
Conference: USENIX-Security Usenix Security Symposium

Chakraborty, Dhiman and Hanzlik, Lucjan and Bugiel, Sven
(2019) simTPM: User-centric TPM for Mobile Devices (Technical Report).
arxiv.org.

Chattopadhyay, Sudipta and Beck, Moritz and Rezine, Ahmed and Zeller, Andreas
(2019) Quantifying the Information Leakage in Cache Attacks via Symbolic Execution.
ACM Trans. Embed. Comput. Syst., 18 (1).

Christi, Arpit and Groce, Alex and Gopinath, Rahul
(2019) Evaluating Fault Localization for Resource Adaptation via Test-Based Software Modification.
In: Software Quality, Reliability, and Security (QRS).
Conference: QRS Software Quality, Reliability, and Security (was International Conference on Quality Software, QSIC, that merged with SERE 2015)

Coenen, Norine and Finkbeiner, Bernd and Hahn, Christopher and Hofmann, Jana
(2019) The Hierarchy of Hyperlogics.
In: IEEE Symposium on Logic in Computer Science, LICS.
Conference: LICS IEEE Symposium on Logic in Computer Science

Coenen, Norine and Finkbeiner, Bernd and Sanchez, Cesar and Tentrup, Leander
(2019) Verifying Hyperliveness.
In: Computer Aided Verification - 31th International Conference, CAV.
Conference: CAV Computer Aided Verification

Cohn-Gordon, Katriel and Cremers, Cas and Gjøsteen, Kristian and Jacobsen, Hakon and Jager, Tibor
(2019) Highly Efficient Key Exchange Protocols with Optimal Tightness: Enabling real-world deployments with theoretically sound parameters.
In: 39th International Cryptology Conference (CRYPTO 2019), August 18-22, 2019, Santa Barbara.
Conference: CRYPTO Advances in Cryptology
(In Press)

Cremers, Cas and Dehnel-Wild, Martin
(2019) Component-Based Formal Analysis of 5G-AKA: Channel Assumptions and Session Confusion.
In: Network and Distributed Systems Security (NDSS) Symposium 2019, 24-27 February 2019, San Diego, CA, USA.
Conference: NDSS Network and Distributed System Security Symposium
(In Press)

Cremers, Cas and Dehnel-Wild, Martin and Milner, Kevin
(2019) Secure Authentication in the Grid: A Formal Analysis of DNP3 SAv5.
Journal of Computer Security, 27 (2). pp. 203-232.

Cremers, Cas and Hirschi, Lucca
(2019) Improving Automated Symbolic Analysis of Ballot Secrecy for E-voting Protocols: A Method Based on Sufficient Conditions.
In: 4th IEEE European Symposium on Security and Privacy, June 17-19, 2019, Stockholm.
Conference: EuroS&P IEEE European Symposium on Security and Privacy

Cremers, Cas and Jackson, Dennis
(2019) Prime, Order Please! Revisiting Small Subgroup and Invalid Curve Attacks on Protocols using Diffie-Hellman.
In: 32nd IEEE Computer Security Foundations Symposium, June 25-28, 2019, Hoboken, NJ, USA.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Dawoud, Abdallah and Bugiel, Sven
(2019) DroidCap: OS Support for Capability-based Permissions in Android.
In: NDSS Symposium 2019.
Conference: NDSS Network and Distributed System Security Symposium

Dax, Alexander and Tangermann, Sven and Künnemann, Robert and Backes, Michael
(2019) How to wrap it up - A formally verified proposal for the use of authenticated wrapping in PKCS#11.
In: Computer Security Foundations Symposium, Hobuken, NJ.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)
(In Press)

Degott, Christian and Pereira Borges Jr., Nataniel and Zeller, Andreas
(2019) Learning User Interface Element Interactions.
In: ACM SIGSOFT International Symposium on Software Testing and Analysis, July 15-19, 2019, Beijing, China.
Conference: ISSTA International Symposium on Software Testing and Analysis

Dimitrova, Rayna and Finkbeiner, Bernd and Torfah, Hazem
(2019) Approximate Automata for Omega-Regular Languages.
In: Automated Technology for Verification and Analysis - 17th International Symposium, ATVA 2019, Taipei, Taiwan, October 28-31, 2019, Proceedings.
Conference: ATVA International Symposium on Automated Technology for Verification and Analysis

Dimitrova, Rayna and Finkbeiner, Bernd and Torfah, Hazem
(2019) Synthesizing Approximate Implementations for Unrealizable Specifications.
In: Computer Aided Verification - 31th International Conference, CAV.
Conference: CAV Computer Aided Verification

Döttling, Nico and Garg, Sanjam and Goyal, Vipul and Malavolta, Giulio
(2019) Laconic Conditional Disclosure of Secrets and Applications.
In: FOCS 2019.
Conference: FOCS IEEE Symposium on Foundations of Computer Science
(In Press)

Döttling, Nico and Garg, Sanjam and Hajiabadi, Mohammad and Liu, Kevin and Malavolta, Giulio
(2019) Rate-1 Trapdoor Functions from the Diffie-Hellman Problem.
In: ASIACRYPT 2019.
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security
(In Press)

Döttling, Nico and Garg, Sanjam and Ishai, Yuval and Malavolta, Giulio and Mour, Tamer and Ostrovsky, Rafail
(2019) Trapdoor Hash Functions and Their Applications.
In: CRYPTO 2019.
Conference: CRYPTO Advances in Cryptology

Döttling, Nico and Lai, Russell and Malavolta, Giulio
(2019) Incremental Proofs of Sequential Work.
In: EUROCRYPT.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques
(Unpublished)

Eskandarian, Saba and Cogan, Jonathan and Birnbaum, Sawyer and Brandon, Peh Chang Wei and Franke, Dillon and Fraser, Forest and Garcia, Gaspar and Gong, Eric and Nguyen, Hung T. and Sethi, Taresh K. and Subbiah, Vishal and Backes, Michael and Pellegrino, Giancarlo and Boneh, Dan
(2019) Fidelius: Protecting User Secrets from Compromised Browsers.
In: S&P 2019.
Conference: SP IEEE Symposium on Security and Privacy

Fass, Aurore and Backes, Michael and Stock, Ben
(2019) HideNoSeek: Camouflaging Malicious JavaScript in Benign ASTs.
In: ACM Conference on Computer and Communications Security (CCS 2019).
Conference: CCS ACM Conference on Computer and Communications Security

Fass, Aurore and Backes, Michael and Stock, Ben
(2019) JStap: A Static Pre-Filter for Malicious JavaScript Detection.
In: Annual Computer Security Applications Conference (ACSAC 2019).
Conference: ACSAC Annual Computer Security Applications Conference

Faymonville, Peter and Finkbeiner, Bernd and Schledjewski, Malte and Schwenger, Maximilian and Stenger, Marvin and Tentrup, Leander and Torfah, Hazem
(2019) StreamLAB: Stream-based Monitoring of Cyber-Physical Systems.
In: Computer Aided Verification - 31th International Conference, CAV.
Conference: CAV Computer Aided Verification

Faymonville, Peter and Finkbeiner, Bernd and Schledjewski, Malte and Schwenger, Maximilian and Tentrup, Leander and Torfah, Hazem
(2019) Real-time Stream Monitoring with StreamLAB.
In: 4th Workshop on Monitoring and Testing of Cyber-Physical Systems.
Conference: MT-CPS WORKSHOP ON MONITORING AND TESTING OF CYBER-PHYSICAL SYSTEMS

Finkbeiner, Bernd and Gieseking, Manuel and Olderog, Ernst-Rüdiger and Hecking-Harbusch, Jesko
(2019) Model Checking Data Flows in Concurrent Network Updates.
In: Automated Technology for Verification and Analysis - 17th International Symposium, ATVA 2019, Taipei, Taiwan, October 28-31, 2019, Proceedings.
Conference: ATVA International Symposium on Automated Technology for Verification and Analysis

Finkbeiner, Bernd and Haas, Lennart and Torfah, Hazem
(2019) Canonical Representations of k-Safety Hyperproperties.
In: IEEE Computer Security Foundations Symposium, CSF.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Finkbeiner, Bernd and Hahn, Christopher and Stenger, Marvin and Tentrup, Leander
(2019) Monitoring hyperproperties.
Formal Methods Syst. Des., 54 (3). pp. 336-363.

Finkbeiner, Bernd and Klein, Felix and Piskac, Ruzica and Santolucito, Mark
(2019) Synthesizing functional reactive programs.
In: Proceedings of the 12th ACM SIGPLAN International Symposium on Haskell, Haskell@ICFP.
Conference: HASKELL Haskell Workshop

Finkbeiner, Bernd and Klein, Felix and Piskac, Ruzica and Santolucito, Mark
(2019) Temporal Stream Logic: Synthesis beyond the Bools.
In: Computer Aided Verification - 31th International Conference, CAV.
Conference: CAV Computer Aided Verification

Fischer, Jonas and Vreeken, Jilles
(2019) Sets of Robust Rules, and How to Find Them.
In: ECMLPKDD.
Conference: ECML PKDD European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Database (PKDD and ECML combined from 2008)

Geier, Gideon and Heim, Philippe and Klein, Felix and Finkbeiner, Bernd
(2019) Syntroids: Synthesizing a Game for FPGAs using Temporal Logic Specifications.
In: Formal Methods in Computer Aided Design, FMCAD.
Conference: FMCAD Formal Methods in Computer-Aided Design

Ghaeini, Hamid Reza and Chan, Matthew and Bahmani, Raad and Brasser, Ferdinand and Garcia, Luis and Zhou, Jianying and Sadeghi, Ahmad-Reza and Tippenhauer, Nils Ole and Zonouz, Saman
(2019) PAtt: Physics-based Attestation of Control Systems.
In: Proceedings of International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Ghaeini, Hamid Reza and Tippenhauer, Nils Ole and Zhou, Jianying
(2019) Zero Residual Attacks on Industrial Control Systems and Stateful Countermeasures.
In: International Conference on Availability, Reliability and Security (ARES).
Conference: ARES International Conference on Availability, Reliability and Security

Giraldo, Jairo and Urbina, David and Cárdenas, Alvaro A. and Tippenhauer, Nils Ole
(2019) Hide and Seek: An Architecture for Improving Attack-Visibility in Industrial Control Systems.
In: International Conference on Applied Cryptography and Network Security (ACNS).
Conference: ACNS International Conference on Applied Cryptography and Network Security

Grosse, Kathrin and Trost, Thomas A. and Mosbach, Marius and Backes, Michael
(2019) Adversarial Initialization - when your network performs the way I want -.
ArXiv e-prints.

Hagestedt, Inken and Zhang, Yang and Humbert, Mathias and Berrang, Pascal and Haixu, Tang and XiaoFeng, Wang and Backes, Michael
(2019) MBeacon: Privacy-Preserving Beacons for DNA Methylation Data.
In: Annual Network and Distributed System Security Symposium.
Conference: NDSS Network and Distributed System Security Symposium

Hanzlik, Lucjan and Kluczniak, Kamil and Kutylowski, Miroslaw
(2019) CTRL-PACE: Controlled Randomness for e-Passport Password Authentication.
Fundamenta Informaticae.

Havrikov, Nikolas and Zeller, Andreas
(2019) Systematically Covering Input Structure.
In: ASE 2019.
Conference: ASE Automated Software Engineering Conference

Hecking-Harbusch, Jesko and Metzger, Niklas
(2019) Efficient Trace Encodings of Bounded Synthesis for Asynchronous Distributed Systems.
In: UNSPECIFIED.
Conference: ATVA International Symposium on Automated Technology for Verification and Analysis

Hessel, Stefan and Möllers, Frederik
(2019) Gute Vorsätze für 2019: Die DSGVO verstehen und umsetzen.
Forum der Psychotherapeutenkammer des Saarlandes (72). pp. 8-11.

Hessel, Stefan and Sorge, Christoph
(2019) Saarbrücker Tabelle für Geldentschädigung bei Persönlichkeitsrechtsverletzungen.
In: juris Praxiskommentar BGB. Maximilian Herberger, Michael Martinek, Helmut Rüßmann, Stephan Weth, Markus Würdinger.

Heule, Marijn J.H. and Kiesl, Benjamin and Biere, Armin
(2019) Encoding Redundancy for Satisfaction-Driven Clause Learning.
In: 25th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2019).
Conference: TACAS Tools and Algorithms for Construction and Analysis of Systems

Heule, Marijn J.H. and Kiesl, Benjamin and Biere, Armin
(2019) Strong Extension-Free Proof Systems.
Journal of Automated Reasoning. ISSN 0168-7433

Hof, Hans-Joachim and Fritz, Mario and Krauss, Christoph and Wasenmüller, Oliver
(2019) ACM Computer Science in Cars Symposium.
Association for Computing Machinery, Kaiserslautern, Germany. ISBN 978-1-4503-7004-2

Huang, Jie and Pereira Borges Jr., Nataniel and Bugiel, Sven and Backes, Michael
(2019) Up-To-Crash: Evaluating Third-Party Library Updatability on Android.
In: 4th IEEE European Symposium on Security and Privacy.
Conference: EuroS&P IEEE European Symposium on Security and Privacy

Iacovazzi, Alfonso and Frassinelli, Daniel and Elovici, Yuval
(2019) The DUSTER Attack: Tor Onion Service Attribution Based on Flow Watermarking with Track Hiding.
In: 22nd International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2019, Chaoyang District, Beijing, China, September 23-25, 2019..
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Jackson, Dennis and Cremers, Cas and Cohn-Gordon, Katriel and Sasse, Ralf
(2019) Seems Legit: Automated Analysis of Subtle Attacks on Protocols that use Signatures.
In: 26th ACM Conference on Computer and Communications Security, November 11th-15th, 2019, London, UK.
Conference: CCS ACM Conference on Computer and Communications Security
(In Press)

Jacobs, Swen and Sakr, Mouhammad
(2019) A symbolic algorithm for lazy synthesis of eager strategies.
Acta Informatica. ISSN 1432-0525

Jia, Jinyuan and Salem, Ahmed and Backes, Michael and Gong, Neil Zhenqiang and Zhang, Yang
(2019) MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples.
In: ACM SIGSAC Conference on Computer and Communications Security.
Conference: CCS ACM Conference on Computer and Communications Security

Kalofolias, Janis and Boley, Mario and Vreeken, Jilles
(2019) Discovering Robustly Connected Subgraphs with Simple Descriptions.
In: ACM SIGKDD Workshop on Mining and Learning from Graphs (MLG).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Kalofolias, Janis and Boley, Mario and Vreeken, Jilles
(2019) Discovering Robustly Connected Subgraphs with Simple Descriptions.
In: ECMLPKDD Workshop on Graph Embedding and Mining (GEM).
Conference: ECML PKDD European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Database (PKDD and ECML combined from 2008)

Kalofolias, Janis and Boley, Mario and Vreeken, Jilles
(2019) Discovering Robustly Connected Subgraphs with Simple Descriptions.
In: IEEE International Conference on Data Mining (ICDM).
Conference: ICDM IEEE International Conference on Data Mining

Kaltenpoth, David and Vreeken, Jilles
(2019) We Are Not Your Real Parents: Telling Causal from Confounded using MDL.
In: SIAM International Conference on Data Mining (SDM).
Conference: SDM SIAM International Conference on Data Mining

Kampmann, Alexander and Zeller, Andreas
(2019) Carving Parameterized Unit Tests.
In: 2019 IEEE/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion), May 2019, Montreal.
Conference: ICSE International Conference on Software Engineering

Ke, Qiuhong and Fritz, Mario and Schiele, Bernt
(2019) Time-Conditioned Action Anticipation in One Shot.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Kiesl, Benjamin and Heule, Marijn J.H. and Biere, Armin
(2019) Truth Assignments as Conditional Autarkies.
In: 17th International Symposium on Automated Technology for Verification and Analysis.
Conference: ATVA International Symposium on Automated Technology for Verification and Analysis

Kiesl, Benjamin and Seidl, Martina
(2019) QRAT Polynomially Simulates \forall-Exp+Res.
In: International Conference on Theory and Applications of Satisfiability Testing, July 7 - 12, Lisbon.
Conference: SAT International Conference on Theory and Applications of Satisfiability Testing
(In Press)

Kluczniak, Kamil and Wang, Jianfeng and Chen, Xiaofeng and Kutylowski, Miroslaw
(2019) Multi-device anonymous authentication.
International Journal of Information Security.

Krombholz, Katharina and Busse, Karoline and Pfeffer, Katharina and Smith, Matthew and von Zezschwitz, Emanuel
(2019) "If HTTPS Were Secure, I Wouldn't Need 2FA" - End User and Administrator Mental Models of HTTPS.
In: S&P 2019.
Conference: SP IEEE Symposium on Security and Privacy

Kutylowski, Miroslaw and Lemiesz, Jakub and Slowik, Marta and Slowik, Marcin and Kluczniak, Kamil and Gebala, Maciej
(2019) GDPR-Compliant Reputation System Based on Self-certifying Domain Signatures.
In: Information Security Practice and Experience Conference (ISPEC).
Conference: ISPEC Information Security Practice and Experience Conference

Künnemann, Robert and Esiyok, Ilkan and Backes, Michael
(2019) Automated Verification of Accountability in Security Protocols.
In: Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)
(In Press)

Künnemann, Robert and Garg, Deepak and Backes, Michael
(2019) Causality & Control flow.
In: 4th Workshop on Formal Reasoning about Causation, Responsibility, & Explanations in Science & Technology.
Conference: CREST Workshop on Formal Reasoning about Causation, Responsibility, & Explanations in Science & Technology
(In Press)

Li, Zheng and Hu, Chengyu and Guo, Shanqing and Zhang, Yang
(2019) How to Prove Your Model Belongs to You: A Blind-Watermark based Framework to Protect Intellectual Property of DNN.
In: Annual Computer Security Applications Conference.
Conference: ACSAC Annual Computer Security Applications Conference

Mandros, Panagiotis and Boley, Mario and Vreeken, Jilles
(2019) Discovering Reliable Correlations in Categorical Data.
In: IEEE International Conference on Data Mining (ICDM).
Conference: ICDM IEEE International Conference on Data Mining

Mandros, Panagiotis and Boley, Mario and Vreeken, Jilles
(2019) Discovering Reliable Dependencies from Data: Hardness and Improved Algorithms (Extended Abstract).
In: International Joint Conference on Artificial Intelligence (IJCAI).
Conference: IJCAI International Joint Conference on Artificial Intelligence

Marnau, Ninja
(2019) Comments on the “Draft Ethics Guidelines for Trustworthy AI” by the High-Level Expert Group on Artificial Intelligence.
European Commission AI HLEG Stakeholders' Consultation
.

Marnau, Ninja
(2019) Datenschutzrecht und Brexit.
In: Brexit - Privat- und wirtschaftsrechtliche Folgen, 2. Aufl. (Hrsg. Kramme / Baldus / Schmidt-Kessel). Nomos. ISBN 978-3-8487-5438-0
(In Press)

Marnau, Ninja
(2019) Kommentierung der §§64, 70, 71, 74 BDSG.
In: Gola/Heckman (Hrsg.) Bundesdatenschutzgesetz, Kommentar, 13. Aufl. C.H.Beck. ISBN 978-3-406-72878-5
(In Press)

Marnau, Ninja
(2019) Stellungnahme gegenüber dem Landtag des Freistaats Sachen in der Anhörung zur Drucksache 6/16724 „Gesetz zur Neuordnung der Informationssicherheit im Freistaat Sachsen“.
CISPA, Landtag des Freistaats Sachsen
.

Marnau, Ninja
(2019) Stellungnahme gegenüber dem Landtag des Saarlandes in der Anhörung zur Drucksache 16/761 „Informationssicherheitsgesetz Saarland – IT-SiG SL“ sowie Änderung weiterer Vorschriften.
CISPA, Landtag des Saarlandes
.

Marnau, Ninja
(2019) Überwachung by Design.
Privacy in Germany (PinG) Journal, 2019/2. ISSN 2197-1862
(In Press)

Marnau, Ninja and Sorge, Christoph
(2019) From Law to Engineering: A Computer Science Perspective on Privacy & Data Protection.
In: González-Fuster, G., van Brakel, R. and P. De Hert (forthcoming) Research Handbook on Privacy and Data Protection Law. Values, Norms and Global Politics. Edward Elgar Publishing.
(In Press)

Marx, Alexander and Vreeken, Jilles
(2019) Approximating Algorithmic Conditional Independence for Discrete Data.
In: First AAAI Spring Symposium Beyond Curve Fitting: Causation, Counterfactuals, and Imagination-based AI.
Conference: AAAI National Conference of the American Association for Artificial Intelligence

Marx, Alexander and Vreeken, Jilles
(2019) Identifiability of Cause and Effect using Regularized Regression.
In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Marx, Alexander and Vreeken, Jilles
(2019) Telling Cause from Effect by Local and Global Regression.
Knowledge and Information Systems.
(In Press)

Marx, Alexander and Vreeken, Jilles
(2019) Testing Conditional Independence on Discrete Data using Stochastic Complexity.
In: International Conference on Artificial Intelligence and Statistics (AISTATS).
Conference: AISTATS International Conference on Artificial Intelligence and Statistics

Mathis, Björn and Gopinath, Rahul and Mera, Michaël and Kampmann, Alexander and Höschele, Matthias and Zeller, Andreas
(2019) Parser-Directed Fuzzing.
In: 40th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2019), Sat 22 - Wed 26 June 2019, Phoenix, Arizona, United States.
Conference: PLDI ACM-SIGPLAN Conference on Programming Language Design and Implementation
(In Press)

Maximov, Maxim and Leal-Taixe, Laura and Fritz, Mario and Ritschel, Tobias
(2019) Deep Appearance Maps.
In: International Conference on Computer Vision (ICCV).
Conference: ICCV IEEE International Conference on Computer Vision

Mirzaie, Nahal and Faghih, Fathiyeh and Jacobs, Swen and Bonakdarpour, Borzoo
(2019) Parameterized synthesis of self-stabilizing protocols in symmetric networks.
Acta Informatica. ISSN 1432-0525

Musch, Marius and Steffens, Marius and Roth, Sebastian and Stock, Ben and Johns, Martin
(2019) ScriptProtect: Mitigating Unsafe Third-Party JavaScript Practices.
In: AsiaCCS.
Conference: ASIACCS ACM ASIA Conference on Computer and Communications Security

Naseri, Mohammad and Pereira Borges Jr., Nataniel and Zeller, Andreas and Rouvoy, Romain
(2019) AccessiLeaks: Investigating Privacy Leaks Exposed by the Android Accessibility Service.
In: PETS 2019 - The 19th Privacy Enhancing Technologies Symposium, 16-20, Stockholm, Sweden.
Conference: PETS Privacy Enhancing Technologies Symposium (was International Workshop of Privacy Enhancing Technologies)

Nguyen, Duc Cuong and Derr, Erik and Backes, Michael and Bugiel, Sven
(2019) Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security & Privacy.
In: Proceedings of the IEEE Symposium on Security & Privacy, May 2019, May 2019, San Francisco, CA, USA.
Conference: SP IEEE Symposium on Security and Privacy

Oh, Seong Joon and Schiele, Bernt and Fritz, Mario
(2019) Towards Reverse-Engineering Black-Box Neural Networks.
In: Explainable AI: Interpreting, Explaining and Visualizing Deep Learning. Springer, pp. 121-144. ISBN 978-3-030-28953-9

Orekondy, Tribhuvanesh and Schiele, Bernt and Fritz, Mario
(2019) Knockoff Nets: Stealing Functionality of Black-Box Models.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Patrignani, Marco and Garg, Deepak
(2019) Robustly Safe Compilation.
In: ESOP.
Conference: ESOP European Symposium on Programming

Pereira Borges Jr., Nataniel and Zeller, Andreas
(2019) Why does this App need this Data? Automatic Tightening of Resource Access.
In: 2019 IEEE 12th International Conference on Software Testing, Verification and Validation (ICST).
Conference: ICST International Conference on Software Testing, Verification and Validation

Rahman, Tahleen and Surma, Bartlomiej and Backes, Michael and Zhang, Yang
(2019) Fairwalk: Towards Fair Graph Embedding.
In: International Joint Conference on Artificial Intelligence.
Conference: IJCAI International Joint Conference on Artificial Intelligence

Salem, Ahmed and Zhang, Yang and Humbert, Mathias and Berrang, Pascal and Fritz, Mario and Backes, Michael
(2019) ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models.
In: Annual Network and Distributed System Security Symposium.
Conference: NDSS Network and Distributed System Security Symposium

Saran, Divyam and Vreeken, Jilles
(2019) Summarizing Dynamic Graphs using MDL.
In: ECMLPKDD Workshop on Graph Embedding and Mining (GEM).
Conference: ECML PKDD European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Database (PKDD and ECML combined from 2008)

Sattar, Hosnieh and Pons-Moll, Gerard and Fritz, Mario
(2019) Fashion is Taking Shape: Understanding Clothing Preference Based on Body Shape From Online Sources.
In: IEEE Winter Conference on Applications of Computer Vision (WACV).
Conference: WACV IEEE Workshop on Applications of Computer Vision

Shetty, Rakshith and Schiele, Bernt and Fritz, Mario
(2019) Not Using the Car to See the Sidewalk: Quantifying and Controlling the Effects of Context in Classification and Segmentation.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Speicher, Patrick and Steinmetz, Marcel and Hoffmann, Jörg and Backes, Michael and Künnemann, Robert
(2019) Towards Automated Network Mitigation Analysis.
In: The 34th ACM/SIGAPP Symposium On Applied Computing, Limassol, Cyprus.
Conference: SAC ACM Symposium on Applied Computing

Speicher, Patrick and Steinmetz, Marcel and Hoffmann, Jörg and Backes, Michael and Künnemann, Robert
(2019) Towards Automated Network Mitigation Analysis (extended version).
In: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing.
Conference: SAC ACM Symposium on Applied Computing

Steffens, Marius and Rossow, Christian and Johns, Martin and Stock, Ben
(2019) Don’t Trust The Locals: Investigating the Prevalence of Persistent Client-Side Cross-Site Scripting in the Wild.
In: NDSS Symposium 2019.
Conference: NDSS Network and Distributed System Security Symposium

Steil, Julian and Hagestedt, Inken and Huang, Michael Xuelin and Bulling, Andreas
(2019) Privacy-aware eye tracking using differential privacy.
In: Proceedings of the 11th ACM Symposium on Eye Tracking Research & Applications, ETRA 2019, Denver , CO, USA, June 25-28, 2019.
Conference: ETRA ACM Symposium on Eye Tracking Research & Applications

Steinmetz, Marcel and Torralba, Àlvaro
(2019) Bridging the Gap Between Abstractions and Critical-Path Heuristics via Hypergraphs.
In: Proceedings of the 29th International Conference on Automated Planning and Scheduling (ICAPS'19), Berkeley, CA, USA, 2019..
Conference: ICAPS International Conference on Automated Planning and Scheduling

Suchan, Alexander and von Zezschwitz, Emanuel and Krombholz, Katharina
(2019) Stop to Unlock - Improving the Security of Android Unlock Patterns.
In: Workshop on Usable Security and Privacy (USEC) 2019.
Conference: USEC Usable Security and Privacy

Tambe, Amit and Aung, Yan Lin and Sridharan, Ragav and Ochoa, Martin and Tippenhauer, Nils Ole and Shabtai, Asaf and Elovici, Yuval
(2019) Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots.
In: ACM Conference on Data and Application Security and Privacy (CODASPY).
Conference: CODASPY ACM Conference on Data and Application Security and Privacy
(In Press)

Tiefenau, Christian and von Zezschwitz, Emanuel and Häring, Maximilian and Krombholz, Katharina and Smith, Matthew
(2019) A Usability Evaluation of Let's Encrypt and Certbot: Usable Security Done Right.
In: CCS 19, London, UK.
Conference: CCS ACM Conference on Computer and Communications Security

Tippenhauer, Nils Ole
(2019) Design and Realization of Testbeds for Security Research in the Industrial Internet of Things.
In: Security and Privacy Trends in the Industrial Internet of Things. Springer, Cham, pp. 287-310. ISBN 978-3-030-12330-7

Tramèr, Florian and Dupré, Pascal and Gili, Rusak and Pellegrino, Giancarlo and Boneh, Dan
(2019) AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning.
In: CCS 19.
Conference: CCS ACM Conference on Computer and Communications Security

Vassena, Marco and Patrignani, Marco
(2019) Memory Safety Preservation for WebAssembly.
arxiv
.

Vreeken, Jilles and Yamanishi, Kenji
(2019) Modern MDL meets Data Mining Insights, Theory, and Practice.
In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Walla, Sebastian and Rossow, Christian
(2019) MALPITY: Automatic Identification and Exploitation of Tarpit Vulnerabilities in Malware.
In: 4th IEEE European Symposium on Security and Privacy, 17-19 June 2019, Stockholm, Sweden.
Conference: EuroS&P IEEE European Symposium on Security and Privacy
(In Press)

Yu, Ning and Davis, Larry and Fritz, Mario
(2019) Attributing Fake Images to GANs: Learning and Analyzing GAN Fingerprints.
In: International Conference on Computer Vision (ICCV).
Conference: ICCV IEEE International Conference on Computer Vision

Zeller, Andreas and Gopinath, Rahul and Böhme, Marcel and Fraser, Gordon and Holler, Christian
(2019) The Fuzzing Book.
CISPA + Saarland University, Saarbrücken. ISBN n/a

Zhang, Xucong and Sugano, Yusuke and Fritz, Mario and Bulling, Andreas
(2019) MPIIGaze: Real-World Dataset and Deep Appearance-Based Gaze Estimation.
Transactions on Pattern Analysis and Machine Intelligence (TPAMI).

Zhang, Yang
(2019) Language in Our Time: An Empirical Analysis of Hashtags.
In: The Web Conference.
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Zhao, Qingchuan and Zuo, Chaoshun and Pellegrino, Giancarlo and Zhiqiang, Li
(2019) Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services.
In: NDSS Symposium 2019.
Conference: NDSS Network and Distributed System Security Symposium

van Schaik, Stephan and Milburn, Alyssa and Österlund, Sebastian and Frigo, Pietro and Maisuradze, Giorgi and Razavi, Kaveh and Bos, Herbert and Giuffrida, Cristiano
(2019) RIDL: Rogue In-flight Data Load.
In: 40th IEEE Symposium on Security and Privacy, 20-22 May 2019, San Francisco, USA.
Conference: SP IEEE Symposium on Security and Privacy

This list was generated on Thu Nov 21 06:22:50 2024 CET.