Number of items: 133.
Conference or Workshop Item (A Paper)
Abate, Carmine and Blanco, Roberto and Garg, Deepak and Hritcu, Catalin and Patrignani, Marco and Thibault, Jeremy
(2019)
Journey Beyond Full Abstraction: Exploring Robust Property Preservation for Secure Compilation.
Aggarwal, Divesh and Döttling, Nico and Nielsen, Jesper Buus and Obremski, Maciej and Purwanto, Erick
(2019)
Continuous Non-Malleable Codes in the 8-Split-State Model.
Alam, Aftab and Krombholz, Katharina and Bugiel, Sven
(2019)
Poster: Let History not Repeat Itself (this Time) - Tackling WebAuthn Developer Issues Early On.
Antonioli, Daniele and Tippenhauer, Nils Ole and Rasmussen, Kasper
(2019)
Nearby Threats: Reversing, Analyzing, and Attacking Google’s 'Nearby Connections' on Android.
Antonioli, Daniele and Tippenhauer, Nils Ole and Rasmussen, Kasper Bonne
(2019)
The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR.
Backes, Michael and Döttling, Nico and Hanzlik, Lucjan and Kluczniak, Kamil and Schneider, Jonas
(2019)
Ring Signatures: Logarithmic Size, No Setup -- from Standard Assumptions.
Backes, Michael and Hanzlik, Lucjan and Herzberg, Amir and Kate, Aniket and Pryvalov, Ivan
(2019)
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup.
(In Press)
Backes, Michael and Hanzlik, Lucjan and Schneider-Bensch, Jonas
(2019)
Membership Privacy for Fully Dynamic Group Signatures.
Beutner, Raven and Finkbeiner, Bernd and Hecking-Harbusch, Jesko
(2019)
Translating Asynchronous Games for Distributed
Synthesis.
Bhattacharyya, Apratim and Fritz, Mario and Schiele, Bernt
(2019)
Bayesian Prediction of Future Street Scenes using Synthetic Likelihoods.
Bloem, Roderick and Jacobs, Swen and Vizel, Yakir
(2019)
Efficient Information-Flow Verification under Speculative Execution.
(In Press)
Bonakdarpour, Borzoo and Finkbeiner, Bernd
(2019)
Program Repair for Hyperproperties.
Brahmakshatriya, Ajay and Kedia, Piyus and Nemati, Hamed and McKee, Derrick and Bhatu, Pratik and Garg, Deepak and Lal, Akash and Rastogi, Aseem
(2019)
ConfLLVM: A Compiler for Enforcing Data Confidentiality in Low-Level Code.
Brakerski, Zvika and Döttling, Nico and Garg, Sanjam and Malavolta, Giulio
(2019)
Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles.
(In Press)
Breitenbacher, Dominik and Homoliak, Ivan and Aung, Yan Lin and Tippenhauer, Nils Ole and Elovici, Yuval
(2019)
HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices.
Cascudo, Ignacio and Damgård, Ivan and David, Bernardo and Döttling, Nico and Dowsley, Rafael and Giacomelli, Irene
(2019)
Efficient UC Commitment Extension with Homomorphism for Free (and Applications).
(In Press)
Chakraborty, Dhiman and Bugiel, Sven
(2019)
Poster: simFIDO – FIDO2 User Authentication with simTPM.
Chakraborty, Dhiman and Bugiel, Sven and Jha, Atul Ananad
(2019)
Poster: TGX: Secure SGX enclave management
using TPM.
Chakraborty, Dhiman and Hammer, Christian and Bugiel, Sven
(2019)
Secure Multi-Execution in Android.
Chakraborty, Dhiman and Hanzlik, Lucjan and Bugiel, Sven
(2019)
simTPM: User-centric TPM for Mobile Devices.
Christi, Arpit and Groce, Alex and Gopinath, Rahul
(2019)
Evaluating Fault Localization for Resource Adaptation via Test-Based Software Modification.
Coenen, Norine and Finkbeiner, Bernd and Hahn, Christopher and Hofmann, Jana
(2019)
The Hierarchy of Hyperlogics.
Coenen, Norine and Finkbeiner, Bernd and Sanchez, Cesar and Tentrup, Leander
(2019)
Verifying Hyperliveness.
Cohn-Gordon, Katriel and Cremers, Cas and Gjøsteen, Kristian and Jacobsen, Hakon and Jager, Tibor
(2019)
Highly Efficient Key Exchange Protocols with Optimal Tightness: Enabling real-world deployments with theoretically sound parameters.
(In Press)
Cremers, Cas and Dehnel-Wild, Martin
(2019)
Component-Based Formal Analysis of 5G-AKA: Channel Assumptions and Session Confusion.
(In Press)
Cremers, Cas and Hirschi, Lucca
(2019)
Improving Automated Symbolic Analysis of Ballot Secrecy for E-voting Protocols: A Method Based on Sufficient Conditions.
Cremers, Cas and Jackson, Dennis
(2019)
Prime, Order Please! Revisiting Small Subgroup and Invalid Curve Attacks on Protocols using Diffie-Hellman.
Dawoud, Abdallah and Bugiel, Sven
(2019)
DroidCap: OS Support for Capability-based Permissions in Android.
Dax, Alexander and Tangermann, Sven and Künnemann, Robert and Backes, Michael
(2019)
How to wrap it up - A formally verified proposal for the use of authenticated wrapping in PKCS#11.
(In Press)
Degott, Christian and Pereira Borges Jr., Nataniel and Zeller, Andreas
(2019)
Learning User Interface Element Interactions.
Dimitrova, Rayna and Finkbeiner, Bernd and Torfah, Hazem
(2019)
Approximate Automata for Omega-Regular Languages.
Dimitrova, Rayna and Finkbeiner, Bernd and Torfah, Hazem
(2019)
Synthesizing Approximate Implementations for Unrealizable Specifications.
Döttling, Nico and Garg, Sanjam and Goyal, Vipul and Malavolta, Giulio
(2019)
Laconic Conditional Disclosure of Secrets and Applications.
(In Press)
Döttling, Nico and Garg, Sanjam and Hajiabadi, Mohammad and Liu, Kevin and Malavolta, Giulio
(2019)
Rate-1 Trapdoor Functions from the Diffie-Hellman Problem.
(In Press)
Döttling, Nico and Garg, Sanjam and Ishai, Yuval and Malavolta, Giulio and Mour, Tamer and Ostrovsky, Rafail
(2019)
Trapdoor Hash Functions and Their Applications.
Döttling, Nico and Lai, Russell and Malavolta, Giulio
(2019)
Incremental Proofs of Sequential Work.
(Unpublished)
Eskandarian, Saba and Cogan, Jonathan and Birnbaum, Sawyer and Brandon, Peh Chang Wei and Franke, Dillon and Fraser, Forest and Garcia, Gaspar and Gong, Eric and Nguyen, Hung T. and Sethi, Taresh K. and Subbiah, Vishal and Backes, Michael and Pellegrino, Giancarlo and Boneh, Dan
(2019)
Fidelius: Protecting User Secrets from Compromised Browsers.
Fass, Aurore and Backes, Michael and Stock, Ben
(2019)
HideNoSeek: Camouflaging Malicious JavaScript in Benign ASTs.
Fass, Aurore and Backes, Michael and Stock, Ben
(2019)
JStap: A Static Pre-Filter for Malicious JavaScript Detection.
Faymonville, Peter and Finkbeiner, Bernd and Schledjewski, Malte and Schwenger, Maximilian and Stenger, Marvin and Tentrup, Leander and Torfah, Hazem
(2019)
StreamLAB: Stream-based Monitoring of Cyber-Physical Systems.
Faymonville, Peter and Finkbeiner, Bernd and Schledjewski, Malte and Schwenger, Maximilian and Tentrup, Leander and Torfah, Hazem
(2019)
Real-time Stream Monitoring with StreamLAB.
Finkbeiner, Bernd and Gieseking, Manuel and Olderog, Ernst-Rüdiger and Hecking-Harbusch, Jesko
(2019)
Model Checking Data Flows in Concurrent Network Updates.
Finkbeiner, Bernd and Haas, Lennart and Torfah, Hazem
(2019)
Canonical Representations of k-Safety Hyperproperties.
Finkbeiner, Bernd and Klein, Felix and Piskac, Ruzica and Santolucito, Mark
(2019)
Synthesizing functional reactive programs.
Finkbeiner, Bernd and Klein, Felix and Piskac, Ruzica and Santolucito, Mark
(2019)
Temporal Stream Logic: Synthesis beyond the Bools.
Fischer, Jonas and Vreeken, Jilles
(2019)
Sets of Robust Rules, and How to Find Them.
Geier, Gideon and Heim, Philippe and Klein, Felix and Finkbeiner, Bernd
(2019)
Syntroids: Synthesizing a Game for FPGAs using Temporal Logic Specifications.
Ghaeini, Hamid Reza and Chan, Matthew and Bahmani, Raad and Brasser, Ferdinand and Garcia, Luis and Zhou, Jianying and Sadeghi, Ahmad-Reza and Tippenhauer, Nils Ole and Zonouz, Saman
(2019)
PAtt: Physics-based Attestation of Control Systems.
Ghaeini, Hamid Reza and Tippenhauer, Nils Ole and Zhou, Jianying
(2019)
Zero Residual Attacks on Industrial Control Systems and Stateful Countermeasures.
Giraldo, Jairo and Urbina, David and Cárdenas, Alvaro A. and Tippenhauer, Nils Ole
(2019)
Hide and Seek: An Architecture for Improving Attack-Visibility in Industrial Control Systems.
Hagestedt, Inken and Zhang, Yang and Humbert, Mathias and Berrang, Pascal and Haixu, Tang and XiaoFeng, Wang and Backes, Michael
(2019)
MBeacon: Privacy-Preserving Beacons for DNA Methylation Data.
Havrikov, Nikolas and Zeller, Andreas
(2019)
Systematically Covering Input Structure.
Hecking-Harbusch, Jesko and Metzger, Niklas
(2019)
Efficient Trace Encodings of Bounded Synthesis for Asynchronous Distributed Systems.
Heule, Marijn J.H. and Kiesl, Benjamin and Biere, Armin
(2019)
Encoding Redundancy for Satisfaction-Driven Clause Learning.
Huang, Jie and Pereira Borges Jr., Nataniel and Bugiel, Sven and Backes, Michael
(2019)
Up-To-Crash: Evaluating Third-Party Library Updatability on Android.
Iacovazzi, Alfonso and Frassinelli, Daniel and Elovici, Yuval
(2019)
The DUSTER Attack: Tor Onion Service Attribution Based on Flow Watermarking with Track Hiding.
Jackson, Dennis and Cremers, Cas and Cohn-Gordon, Katriel and Sasse, Ralf
(2019)
Seems Legit: Automated Analysis of Subtle Attacks on Protocols that use Signatures.
(In Press)
Jia, Jinyuan and Salem, Ahmed and Backes, Michael and Gong, Neil Zhenqiang and Zhang, Yang
(2019)
MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples.
Kalofolias, Janis and Boley, Mario and Vreeken, Jilles
(2019)
Discovering Robustly Connected Subgraphs with Simple Descriptions.
Kalofolias, Janis and Boley, Mario and Vreeken, Jilles
(2019)
Discovering Robustly Connected Subgraphs with Simple Descriptions.
Kalofolias, Janis and Boley, Mario and Vreeken, Jilles
(2019)
Discovering Robustly Connected Subgraphs with Simple Descriptions.
Kaltenpoth, David and Vreeken, Jilles
(2019)
We Are Not Your Real Parents: Telling Causal from Confounded using MDL.
Kampmann, Alexander and Zeller, Andreas
(2019)
Carving Parameterized Unit Tests.
Ke, Qiuhong and Fritz, Mario and Schiele, Bernt
(2019)
Time-Conditioned Action Anticipation in One Shot.
Kiesl, Benjamin and Heule, Marijn J.H. and Biere, Armin
(2019)
Truth Assignments as Conditional Autarkies.
Kiesl, Benjamin and Seidl, Martina
(2019)
QRAT Polynomially Simulates \forall-Exp+Res.
(In Press)
Krombholz, Katharina and Busse, Karoline and Pfeffer, Katharina and Smith, Matthew and von Zezschwitz, Emanuel
(2019)
"If HTTPS Were Secure, I Wouldn't Need 2FA" - End User and Administrator Mental Models of HTTPS.
Kutylowski, Miroslaw and Lemiesz, Jakub and Slowik, Marta and Slowik, Marcin and Kluczniak, Kamil and Gebala, Maciej
(2019)
GDPR-Compliant Reputation System Based on Self-certifying Domain Signatures.
Künnemann, Robert and Esiyok, Ilkan and Backes, Michael
(2019)
Automated Verification of Accountability in Security Protocols.
(In Press)
Künnemann, Robert and Garg, Deepak and Backes, Michael
(2019)
Causality & Control flow.
(In Press)
Li, Zheng and Hu, Chengyu and Guo, Shanqing and Zhang, Yang
(2019)
How to Prove Your Model Belongs to You: A Blind-Watermark based Framework to Protect Intellectual Property of DNN.
Mandros, Panagiotis and Boley, Mario and Vreeken, Jilles
(2019)
Discovering Reliable Correlations in Categorical Data.
Mandros, Panagiotis and Boley, Mario and Vreeken, Jilles
(2019)
Discovering Reliable Dependencies from Data: Hardness and Improved Algorithms (Extended Abstract).
Marx, Alexander and Vreeken, Jilles
(2019)
Approximating Algorithmic Conditional Independence for Discrete Data.
Marx, Alexander and Vreeken, Jilles
(2019)
Identifiability of Cause and Effect using Regularized Regression.
Marx, Alexander and Vreeken, Jilles
(2019)
Testing Conditional Independence on Discrete Data using Stochastic Complexity.
Mathis, Björn and Gopinath, Rahul and Mera, Michaël and Kampmann, Alexander and Höschele, Matthias and Zeller, Andreas
(2019)
Parser-Directed Fuzzing.
(In Press)
Maximov, Maxim and Leal-Taixe, Laura and Fritz, Mario and Ritschel, Tobias
(2019)
Deep Appearance Maps.
Musch, Marius and Steffens, Marius and Roth, Sebastian and Stock, Ben and Johns, Martin
(2019)
ScriptProtect: Mitigating Unsafe Third-Party JavaScript Practices.
Naseri, Mohammad and Pereira Borges Jr., Nataniel and Zeller, Andreas and Rouvoy, Romain
(2019)
AccessiLeaks: Investigating Privacy Leaks Exposed by the Android Accessibility Service.
Nguyen, Duc Cuong and Derr, Erik and Backes, Michael and Bugiel, Sven
(2019)
Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security & Privacy.
Orekondy, Tribhuvanesh and Schiele, Bernt and Fritz, Mario
(2019)
Knockoff Nets: Stealing Functionality of Black-Box Models.
Patrignani, Marco and Garg, Deepak
(2019)
Robustly Safe Compilation.
Pereira Borges Jr., Nataniel and Zeller, Andreas
(2019)
Why does this App need this Data? Automatic Tightening of Resource Access.
Rahman, Tahleen and Surma, Bartlomiej and Backes, Michael and Zhang, Yang
(2019)
Fairwalk: Towards Fair Graph Embedding.
Salem, Ahmed and Zhang, Yang and Humbert, Mathias and Berrang, Pascal and Fritz, Mario and Backes, Michael
(2019)
ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models.
Saran, Divyam and Vreeken, Jilles
(2019)
Summarizing Dynamic Graphs using MDL.
Sattar, Hosnieh and Pons-Moll, Gerard and Fritz, Mario
(2019)
Fashion is Taking Shape: Understanding Clothing Preference Based on Body Shape From Online Sources.
Shetty, Rakshith and Schiele, Bernt and Fritz, Mario
(2019)
Not Using the Car to See the Sidewalk: Quantifying and Controlling the Effects of Context in Classification and Segmentation.
Speicher, Patrick and Steinmetz, Marcel and Hoffmann, Jörg and Backes, Michael and Künnemann, Robert
(2019)
Towards Automated Network Mitigation Analysis.
Speicher, Patrick and Steinmetz, Marcel and Hoffmann, Jörg and Backes, Michael and Künnemann, Robert
(2019)
Towards Automated Network Mitigation Analysis (extended version).
Steffens, Marius and Rossow, Christian and Johns, Martin and Stock, Ben
(2019)
Don’t Trust The Locals: Investigating the Prevalence of Persistent Client-Side Cross-Site Scripting in the Wild.
Steil, Julian and Hagestedt, Inken and Huang, Michael Xuelin and Bulling, Andreas
(2019)
Privacy-aware eye tracking using differential privacy.
Steinmetz, Marcel and Torralba, Àlvaro
(2019)
Bridging the Gap Between Abstractions and Critical-Path Heuristics via Hypergraphs.
Suchan, Alexander and von Zezschwitz, Emanuel and Krombholz, Katharina
(2019)
Stop to Unlock - Improving the Security of Android Unlock Patterns.
Tambe, Amit and Aung, Yan Lin and Sridharan, Ragav and Ochoa, Martin and Tippenhauer, Nils Ole and Shabtai, Asaf and Elovici, Yuval
(2019)
Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots.
(In Press)
Tiefenau, Christian and von Zezschwitz, Emanuel and Häring, Maximilian and Krombholz, Katharina and Smith, Matthew
(2019)
A Usability Evaluation of Let's Encrypt and Certbot: Usable Security Done Right.
Tramèr, Florian and Dupré, Pascal and Gili, Rusak and Pellegrino, Giancarlo and Boneh, Dan
(2019)
AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning.
Vreeken, Jilles and Yamanishi, Kenji
(2019)
Modern MDL meets Data Mining Insights, Theory, and Practice.
Walla, Sebastian and Rossow, Christian
(2019)
MALPITY: Automatic Identification and Exploitation of Tarpit Vulnerabilities in Malware.
(In Press)
Yu, Ning and Davis, Larry and Fritz, Mario
(2019)
Attributing Fake Images to GANs: Learning and Analyzing GAN Fingerprints.
Zhang, Yang
(2019)
Language in Our Time: An Empirical Analysis of Hashtags.
Zhao, Qingchuan and Zuo, Chaoshun and Pellegrino, Giancarlo and Zhiqiang, Li
(2019)
Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services.
van Schaik, Stephan and Milburn, Alyssa and Österlund, Sebastian and Frigo, Pietro and Maisuradze, Giorgi and Razavi, Kaveh and Bos, Herbert and Giuffrida, Cristiano
(2019)
RIDL: Rogue In-flight Data Load.
Article
Baumeister, Jan and Finkbeiner, Bernd and Schwenger, Maximilian and Torfah, Hazem
(2019)
FPGA Stream-Monitoring of Real-time Properties.
ACM Trans. Embed. Comput. Syst., 18 (5s).
88:1-88:24.
Chakraborty, Dhiman and Hanzlik, Lucjan and Bugiel, Sven
(2019)
simTPM: User-centric TPM for Mobile Devices (Technical Report).
arxiv.org.
Chattopadhyay, Sudipta and Beck, Moritz and Rezine, Ahmed and Zeller, Andreas
(2019)
Quantifying the Information Leakage in Cache Attacks via Symbolic Execution.
ACM Trans. Embed. Comput. Syst., 18 (1).
Cremers, Cas and Dehnel-Wild, Martin and Milner, Kevin
(2019)
Secure Authentication in the Grid: A Formal Analysis of DNP3 SAv5.
Journal of Computer Security, 27 (2).
pp. 203-232.
Finkbeiner, Bernd and Hahn, Christopher and Stenger, Marvin and Tentrup, Leander
(2019)
Monitoring hyperproperties.
Formal Methods Syst. Des., 54 (3).
pp. 336-363.
Grosse, Kathrin and Trost, Thomas A. and Mosbach, Marius and Backes, Michael
(2019)
Adversarial Initialization - when your network performs the way I want -.
ArXiv e-prints.
Hanzlik, Lucjan and Kluczniak, Kamil and Kutylowski, Miroslaw
(2019)
CTRL-PACE: Controlled Randomness for e-Passport Password Authentication.
Fundamenta Informaticae.
Hessel, Stefan and Möllers, Frederik
(2019)
Gute Vorsätze für 2019: Die DSGVO verstehen und umsetzen.
Forum der Psychotherapeutenkammer des Saarlandes (72).
pp. 8-11.
Heule, Marijn J.H. and Kiesl, Benjamin and Biere, Armin
(2019)
Strong Extension-Free Proof Systems.
Journal of Automated Reasoning.
ISSN 0168-7433
Jacobs, Swen and Sakr, Mouhammad
(2019)
A symbolic algorithm for lazy synthesis of eager strategies.
Acta Informatica.
ISSN 1432-0525
Kluczniak, Kamil and Wang, Jianfeng and Chen, Xiaofeng and Kutylowski, Miroslaw
(2019)
Multi-device anonymous authentication.
International Journal of Information Security.
Marnau, Ninja
(2019)
Überwachung by Design.
Privacy in Germany (PinG) Journal, 2019/2.
ISSN 2197-1862
(In Press)
Marx, Alexander and Vreeken, Jilles
(2019)
Telling Cause from Effect by Local and Global Regression.
Knowledge and Information Systems.
(In Press)
Mirzaie, Nahal and Faghih, Fathiyeh and Jacobs, Swen and Bonakdarpour, Borzoo
(2019)
Parameterized synthesis of self-stabilizing protocols in symmetric networks.
Acta Informatica.
ISSN 1432-0525
Zhang, Xucong and Sugano, Yusuke and Fritz, Mario and Bulling, Andreas
(2019)
MPIIGaze: Real-World Dataset and Deep Appearance-Based Gaze Estimation.
Transactions on Pattern Analysis and Machine Intelligence (TPAMI).
Book Section
Blaskiewicz, Przemyslaw and Hanzlik, Lucjan and Kluczniak, Kamil and Krzywiecki, Lukasz and Kutylowski, Miroslaw and Slowik, Marcin and Wszola, Marta
(2019)
Pseudonymous Signature Schemes.
In:
Advances in Cyber Security.
Springer, Singapore, pp. 185-255.
ISBN 78-981-13-1483-4
Hessel, Stefan and Sorge, Christoph
(2019)
Saarbrücker Tabelle für Geldentschädigung bei Persönlichkeitsrechtsverletzungen.
In:
juris Praxiskommentar BGB.
Maximilian Herberger, Michael Martinek, Helmut Rüßmann, Stephan Weth, Markus Würdinger.
Marnau, Ninja
(2019)
Datenschutzrecht und Brexit.
In:
Brexit - Privat- und wirtschaftsrechtliche Folgen, 2. Aufl. (Hrsg. Kramme / Baldus / Schmidt-Kessel).
Nomos.
ISBN 978-3-8487-5438-0
(In Press)
Marnau, Ninja
(2019)
Kommentierung der §§64, 70, 71, 74 BDSG.
In:
Gola/Heckman (Hrsg.) Bundesdatenschutzgesetz, Kommentar, 13. Aufl.
C.H.Beck.
ISBN 978-3-406-72878-5
(In Press)
Marnau, Ninja and Sorge, Christoph
(2019)
From Law to Engineering: A Computer Science Perspective on Privacy & Data Protection.
In:
González-Fuster, G., van Brakel, R. and P. De Hert (forthcoming) Research Handbook on Privacy and Data Protection Law. Values, Norms and Global Politics.
Edward Elgar Publishing.
(In Press)
Oh, Seong Joon and Schiele, Bernt and Fritz, Mario
(2019)
Towards Reverse-Engineering Black-Box Neural Networks.
In:
Explainable AI: Interpreting, Explaining and Visualizing Deep Learning.
Springer, pp. 121-144.
ISBN 978-3-030-28953-9
Tippenhauer, Nils Ole
(2019)
Design and Realization of Testbeds for Security Research in the Industrial Internet of Things.
In:
Security and Privacy Trends in the Industrial Internet of Things.
Springer, Cham, pp. 287-310.
ISBN 978-3-030-12330-7
Book
Brox, Thomas and Bruhn, Andrés and Fritz, Mario
(2019)
Pattern Recognition - 40th German Conference, GCPR 2018, Stuttgart, Germany, October 9-12, 2018, Proceedings.
Lecture Notes in Computer Science, 11269
.
Springer.
ISBN 978-3-030-12938-5
Hof, Hans-Joachim and Fritz, Mario and Krauss, Christoph and Wasenmüller, Oliver
(2019)
ACM Computer Science in Cars Symposium.
Association for Computing Machinery, Kaiserslautern, Germany.
ISBN 978-1-4503-7004-2
Zeller, Andreas and Gopinath, Rahul and Böhme, Marcel and Fraser, Gordon and Holler, Christian
(2019)
The Fuzzing Book.
CISPA + Saarland University, Saarbrücken.
ISBN n/a
Other
Marnau, Ninja
(2019)
Comments on the “Draft Ethics Guidelines for Trustworthy AI” by the High-Level
Expert Group on Artificial Intelligence.
Marnau, Ninja
(2019)
Stellungnahme gegenüber dem Landtag des Freistaats Sachen in der Anhörung zur Drucksache 6/16724 „Gesetz zur Neuordnung der Informationssicherheit im Freistaat Sachsen“.
Marnau, Ninja
(2019)
Stellungnahme gegenüber dem Landtag des Saarlandes in der Anhörung zur Drucksache 16/761 „Informationssicherheitsgesetz Saarland – IT-SiG SL“ sowie Änderung weiterer Vorschriften.
Vassena, Marco and Patrignani, Marco
(2019)
Memory Safety Preservation for WebAssembly.
This list was generated on Mon Dec 2 19:44:29 2024 CET.