Items where Year is 2020

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Author(s)/Creator(s) | Item Type | No Grouping
Jump to: A | B | C | D | E | F | G | H | J | K | L | M | N | O | P | R | S | T | V | W | Y | Z
Number of items: 138.

A

Abate, Carmine and Blanco, Roberto and Ciobaca, Stefan and Durier, Adrien and Garg, Deepak and Hritcu, Catalin and Patrignani, Marco and Tanter, Éric and Thibault, Jérémy
(2020) Trace-Relating Compiler Correctness and Secure Compilation.
In: Programming Languages and Systems.
Conference: ESOP European Symposium on Programming

Abdelnabi, Sahar and Krombholz, Katharina and Fritz, Mario
(2020) VisualPhishNet: Zero-Day Phishing Website Detection by Visual Similarity.
In: ACM Conference on Computer and Communications Security (CCS).
Conference: CCS ACM Conference on Computer and Communications Security

Agarwal, Vedika and Shetty, Rakshith and Fritz, Mario
(2020) Towards Causal VQA: Revealing and Reducing Spurious Correlations by Invariant and Covariant Semantic Editing.
In: IEEE Conference on Computer Vision and Pattern Recognition.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Akhmetzyanova, Liliya and Cremers, Cas and Garratt, Luke and Smyshlyaev, Stanislav and Sullivan, Nick
(2020) Limiting the impact of unreliable randomness in deployed security protocols.
In: 33rd IEEE Computer Security Foundations Symposium, June 22-25, 2020.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Anell, Simon and Gröber, Lea and Krombholz, Katharina
(2020) End User and Expert Perceptions of Threats and Potential Countermeasures.
In: 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
Conference: EuroUSEC The European Workshop on Usable Security

Antonioli, Daniele and Tippenhauer, Nils Ole and Rasmussen, Kasper
(2020) BIAS: Bluetooth Impersonation AttackS.
In: Proceedings of the IEEE Symposium on Security and Privacy (S&P).
Conference: SP IEEE Symposium on Security and Privacy

Antonioli, Daniele and Tippenhauer, Nils Ole and Rasmussen, Kasper
(2020) Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy.
ACM Transactions on Privacy and Security. ISSN 2471-2566

B

Baumeister, Jan and Finkbeiner, Bernd and Kruse, Matthis and Schwenger, Maximilian
(2020) Automatic Optimizations for Stream-based Monitoring Languages.
In: 20th International Conference on Runtime Verification, 06-09 October 2020.
Conference: RV International Conference on Runtime Verification (was workshop pre 2010)
(In Press)

Baumeister, Jan and Finkbeiner, Bernd and Schirmer, Sebastian and Schwenger, Maximilian and Torens, Christoph
(2020) RTLola Cleared for Take-Off: Monitoring Autonomous Aircraft.
In: Computer Aided Verification - 32nd International Conference, CAV 2020, Los Angeles, CA, USA, July 21-24, 2020, Proceedings, Part II.
Conference: CAV Computer Aided Verification

Baumeister, Tom and Finkbeiner, Bernd and Torfah, Hazem
(2020) Explainable Reactive Synthesis.
In: Automated Technology for Verification and Analysis.
Conference: ATVA International Symposium on Automated Technology for Verification and Analysis

Belth, Caleb and Zheng, X and Vreeken, Jilles and Koutra, Danai
(2020) What is Normal, What is Strange, and What is Missing in an Knowledge Graph.
In: The Web Conference.
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Benz, Manuel and Kristensen, Erik Krogh and Luo, Linghui and Pereira Borges Jr., Nataniel and Bodden, Eric and Zeller, Andreas
(2020) Heaps’n’Leaks: How Heap Snapshots Improve Android Taint Analysis.
In: ICSE 2020: Proceedings of the International Conference on Software Engineering.
Conference: ICSE International Conference on Software Engineering

Bhattacharyya, Apratim and Mahajan, Shweta and Fritz, Mario and Schiele, Bernt and Roth, Stefan
(2020) Normalizing Flows with Multi-scale Autoregressive Priors.
In: IEEE Conference on Computer Vision and Pattern Recognition.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Bhattacharyya, Apratim and Straehle, Christoph-Nikolas and Fritz, Mario and Schiele, Bernt
(2020) Haar Wavelet based Block Autoregressive Flows for Trajectories.
In: German Conference on Pattern Recognition (GCPR).
Conference: GCPR German Conference on Pattern Recognition

Bieringer, Lukas
(2020) Stellungnahme zur Anhörung der Enquêtekommission „Digitalisierung im Saarland“ zur wirtschaftlichen Entwicklung im Zuge der Digitalisierung.
Lukas Bieringer
.

Birtel, Benedikt and Rossow, Christian
(2020) Slitheen++: Stealth TLS-based Decoy Routing.
In: FOCI'20, August 2020.
Conference: FOCI USENIX Workshop on Free and Open Communications on the Internet

Bonakdarpour, B. and Finkbeiner, B.
(2020) Controller Synthesis for Hyperproperties.
In: 2020 IEEE 33rd Computer Security Foundations Symposium (CSF).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Brakerski, Zvika and Branco, Pedro and Döttling, Nico and Garg, Sanjam and Malavolta, Giulio
(2020) Constant Ciphertext-Rate Non-committing Encryption from Standard Assumptions.
In: Theory of Cryptography - 18th International Conference.
Conference: TCC Theory of Cryptography Conference

Brakerski, Zvika and Döttling, Nico
(2020) Hardness of LWE on General Entropic Distribution.
In: Eurocrypt 2020.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Brakerski, Zvika and Döttling, Nico
(2020) Lossiness and Entropic Hardness for Ring-LWE.
In: Theory of Cryptography - 18th International Conference.
Conference: TCC Theory of Cryptography Conference

Brakerski, Zvika and Döttling, Nico and Garg, Sanjam and Malavolta, Giulio
(2020) Candidate iO from Homomorphic Encryption Schemes.
In: EUROCRYPT.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques
(In Press)

Brendel, Jacqueline and Fischlin, Marc and Günther, Felix and Janson, Christian and Stebila, Douglas
(2020) Towards Post-Quantum Security for Signal's X3DH Handshake.
In: SAC 2020, Oct 19-23, 2020.
Conference: SAC Selected Areas in Cryptography
(In Press)

Brengel, Michael and Rossow, Christian
(2020) xOSSig: Leveraging OS Diversity to Automatically Extract Malware Code Signatures.
In: Botconf, Dec 1-4, 2020, (online).
Conference: UNSPECIFIED

Budhathoki, Kailash
(2020) Causal Inference on Discrete Data.
Doctoral thesis, Saarland University.

Bushart, Jonas and Rossow, Christian
(2020) Padding Ain’t Enough: Assessing the Privacy Guarantees of Encrypted DNS.
In: 10th USENIX Workshop on Free and Open Communications on the Internet, 2020-08-11.
Conference: FOCI USENIX Workshop on Free and Open Communications on the Internet

Busse, Karoline and Tahaei, Mohammad and Krombholz, Katharina and von Zezschwitz, Emanuel and Smith, Matthew and Tian, Jing and Xu, Wenyuan
(2020) Cash, Cards or Cryptocurrencies? A Study of Payment Culture in Four Countries.
In: 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
Conference: EuroUSEC The European Workshop on Usable Security

C

Calciati, Paolo and Kuznetsov, Konstantin and Gorla, Alessandra and Zeller, Andreas
(2020) Automatically Granted Permissions in Android apps: An Empirical Study on their Prevalence and on the Potential Threats for Privacy.
In: MSR 2020.
Conference: MSR IEEE International Working Conference on Mining Software Repositories

Calzavara, Stefano and Roth, Sebastian and Rabitti, Alvise and Backes, Michael and Stock, Ben
(2020) A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web.
In: Proceedings of the 29th USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Chen, Dingfan and Orekondy, Tribhuvanesh and Fritz, Mario
(2020) GS-WGAN: A Gradient-Sanitized Approach for Learning Differentially Private Generators.
In: 34th Conference on Neural Information Processing Systems (NeurIPS 2020).
Conference: NeurIPS Conference on Neural Information Processing Systems

Chen, Dingfan and Yu, Ning and Zhang, Yang and Fritz, Mario
(2020) GAN-Leaks: A Taxonomy of Membership Inference Attacks against Generative Models.
In: ACM Conference on Computer and Communications Security (CCS).
Conference: CCS ACM Conference on Computer and Communications Security

Chen, Yiqun T and Gopinath, Rahul and Tadakamalla, Anita and Ernst, Michael D and Holmes, Reid and Fraser, Gordon and Ammann, Paul and Just, Rene
(2020) Revisiting the Relationship Between Fault Detection,Test Adequacy Criteria, and Test Set Size.
In: The 35th IEEE/ACM International Conference on Automated Software Engineering..
Conference: ASE Automated Software Engineering Conference

Chou, Edward and Tramer, Florian and Pellegrino, Giancarlo
(2020) SentiNet: Detecting Localized Universal Attack Against Deep Learning Systems.
In: 3rd Deep Learning and Security Workshop (DLS 2020), May 21, 2020, All-digital.
Conference: IEEE SPW IEEE Symposium on Security and Privacy Workshops

Coenen, Norine and Finkbeiner, Bernd and Hahn, Christopher and Hofmann, Jana
(2020) The Hierarchy of Hyperlogics: A Knowledge Reasoning Perspective.
UNSPECIFIED, International Conference on Principles of Knowledge Representation and Reasoning (KR)
.

Cogliati, Benoît-Michel and Jha, Ashwin and Nandi, Mridul
(2020) How to Build Optimally Secure PRFs Using Block Ciphers.
In: ASIACRYPT 2020.
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security
(In Press)

Cohn-Gordon, Katriel and Cremers, Cas and Dowling, Benjamin and Garratt, Luke and Stebila, Douglas
(2020) A Formal Security Analysis of Key Establishment in the Signal Messaging Protocol.
Journal of Cryptology.
(In Press)

Cortiñas, Carlos Tomé and Vassena, Marco and Russo, Alejandro
(2020) Securing Asynchronous Exceptions.
In: Computer Security Foundations Symposium, Hobuken, NJ.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Cremers, Cas and Fairoze, Jaiden and Kiesl, Benjamin and Naska, Aurora
(2020) Clone Detection in Secure Messaging: Improving Post-Compromise Security in Practice.
In: CCS 2020, November 09-13, 2020.
Conference: CCS ACM Conference on Computer and Communications Security
(In Press)

Cremers, Cas and Kiesl, Benjamin and Medinger, Niklas
(2020) A Formal Analysis of IEEE 802.11’s WPA2: Countering the Kracks Caused by Cracking the Counters.
In: 29th USENIX Security Symposium (USENIX Security 20), August 12–14, 2020.
Conference: USENIX-Security Usenix Security Symposium

Cueppers, Joscha and Vreeken, Jilles
(2020) Just Wait For It... Mining Sequential Patterns with Reliable Prediction Delays.
In: IEEE International Conference on Data Mining.
Conference: ICDM IEEE International Conference on Data Mining
(In Press)

D

Dalleiger, Sebastian and Vreeken, Jilles
(2020) Explainable Data Decompositions.
In: Proceedings of the AAAI Conference on Artificial Intelligence (AAAI).
Conference: AAAI National Conference of the American Association for Artificial Intelligence
(In Press)

Dalleiger, Sebastian and Vreeken, Jilles
(2020) The Relaxed Maximum Entropy Distribution and its Application to Pattern Discovery.
In: IEEE International Conference on Data Mining.
Conference: ICDM IEEE International Conference on Data Mining
(In Press)

Deuber, Dominic and Döttling, Nico and Magri, Bernardo and Malavolta, Giulio and Thyagarajan, Sri Aravinda Krishnan
(2020) Minting Mechanisms for (PoS) Blockchains.
In: ACNS.
Conference: ACNS International Conference on Applied Cryptography and Network Security

Dimitrova, Rayna and Finkbeiner, Bernd and Torfah, Hazem
(2020) Probabilistic Hyperproperties of Markov Decision Processes.
In: 18th International Symposium on Automated Technology for Verification and Analysis, ATVA 2020.
Conference: ATVA International Symposium on Automated Technology for Verification and Analysis

Durst, David and Feldman, Matthew and Huff, Dillon and Akeley, David and Daly, Ross and Bernstein, Gilbert Louis and Patrignani, Marco and Fatahalian, Kayvon and Hanrahan, Pat
(2020) Type-Directed Scheduling of Streaming Accelerators.
In: Proceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation.
Conference: PLDI ACM-SIGPLAN Conference on Programming Language Design and Implementation

Döttling, Nico and Garg, Sanjam and Hajiabadi, Mohammad and Masny, Daniel and Wichs, Daniel
(2020) Two-Round Oblivious Transfer from CDH or LPN.
In: Eurocrypt 2020.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques
(In Press)

Döttling, Nico and Garg, Sanjam and Malavolta, Giulio and Vasudevan, Prashant Nalini
(2020) Tight Verifiable Delay Functions.
In: SCN 2020.
Conference: SCN Conference on Security and Cryptography for Networks

Döttling, Nico and Malavolta, Giulio and Pu, Sihang
(2020) A Combinatorial Approach to Quantum Random Functions.
In: 26th International Conference on the Theory and Application of Cryptology and Information Security.
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security

de Berg, Mark and Bodlaender, Hans L. and Kisfaludi-Bak, Sándor and Marx, Dániel and van der Zanden, Tom C.
(2020) A Framework for Exponential-Time-Hypothesis--Tight Algorithms and Lower Bounds in Geometric Intersection Graphs.
SIAM Journal on Computing, 49 (6). pp. 1291-1331. ISSN 0097-5397

E

Erba, Alessandro and Taormina, Riccardo and Galelli, Stefano and Pogliani, Marcello and Carminati, Michele and Zanero, Stefano and Tippenhauer, Nils Ole
(2020) Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems.
In: Proceedings of the Annual Computer Security Applications Conference (ACSAC).
Conference: ACSAC Annual Computer Security Applications Conference

Esiyok, Ilkan and Hanzlik, Lucjan and Künnemann, Robert and Budde, Lena Marie and Backes, Michael
(2020) TrollThrottle — Raising the Cost of Astroturfing.
In: ACNS 2020, 19-22 October 2020, Rome, Italy.
Conference: ACNS International Conference on Applied Cryptography and Network Security

Espitau, Thomas and Joux, Antoine and Kharchenko, Natalia
(2020) On a dual/hybrid approach to small secret LWE.
In: 21st International Conference on Cryptology in India.
Conference: INDOCRYPT International Conference on Cryptology in India

F

Fass, Aurore
(2020) Studying JavaScript Security Through Static Analysis.
Doctoral thesis, Saarland University.

Finkbeiner, Bernd and Gieseking, Manuel and Hecking-Harbusch, Jesko and Olderog, Ernst-Rüdiger
(2020) AdamMC: A Model Checker for Petri Nets with Transits against Flow-LTL.
In: Computer Aided Verification - 32nd International Conference, CAV 2020, Los Angeles, CA, USA, July 21-24, 2020, Proceedings, Part II.
Conference: CAV Computer Aided Verification

Finkbeiner, Bernd and Gieseking, Manuel and Hecking-Harbusch, Jesko and Olderog, Ernst-Rüdiger
(2020) Model Checking Branching Properties on Petri Nets with Transits.
In: Automated Technology for Verification and Analysis - 18th International Symposium, ATVA 2020, Hanoi, Vietnam, October 19-23, 2020, Proceedings.
Conference: ATVA International Symposium on Automated Technology for Verification and Analysis

Finkbeiner, Bernd and Hahn, Christopher and Hofmann, Jana and Tentrup, Leander
(2020) Realizing Omega-regular Hyperproperties.
In: Computer Aided Verification - 32nd International Conference, CAV 2020, Los Angeles, CA, USA, July 21-24, 2020, Proceedings, Part II, 21.07.2020 - 24.07.2020, Los Angeles.
Conference: CAV Computer Aided Verification

Finkbeiner, Bernd and Hahn, Christopher and Stenger, Marvin and Tentrup, Leander
(2020) Efficient monitoring of hyperproperties using prefix trees.
International Journal on Software Tools for Technology Transfer. ISSN 1433-2779

Finkbeiner, Bernd and Oswald, Stefan and Passing, Noemi and Schwenger, Maximilian
(2020) Verified Rust Monitors for Lola Specifications.
In: RV 2020.
Conference: RV International Conference on Runtime Verification (was workshop pre 2010)

Finkbeiner, Bernd and Passing, Noemi
(2020) Dependency-based Compositional Synthesis.
In: 18th International Symposium on Automated Technology for Verification and Analysis, ATVA 2020.
Conference: ATVA International Symposium on Automated Technology for Verification and Analysis

Finkbeiner, Bernd and Schmidt, Jessica and Schwenger, Maximilian
(2020) Simplex Architecture Meets RTLola.
In: 5th Workshop on Monitoring and Testing of Cyber-Physical Systems, April 13-22 2020, Sydney.
Conference: MT-CPS WORKSHOP ON MONITORING AND TESTING OF CYBER-PHYSICAL SYSTEMS

Fischer, Jonas and Vreeken, Jilles
(2020) Discovering Succinct Pattern Sets Expressing Co-Occurrence and Mutual Exclusivity.
In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Frassinelli, Daniel and Park, Sohyeon and Nürnberger, Stefan
(2020) ≪ I Know Where You Parked Last Summer ≫ Automated Reverse Engineering and Privacy Analysis of Modern Cars.
In: S&P - IEEE Symposium on Security and Privacy.
Conference: SP IEEE Symposium on Security and Privacy

Frenkel, Hadar and Grumberg, Orna and Pasareanu, Corina and Sheinvald, Sarai
(2020) Assume, Guarantee or Repair.
In: TACAS 2020.
Conference: TACAS Tools and Algorithms for Construction and Analysis of Systems

G

Ghorbani Lyastani, Sanam and Schilling, Michael and Neumayr, Michaela and Backes, Michael and Bugiel, Sven
(2020) Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication.
In: Proceedings of the 41st IEEE Symposium on Security and Privacy.
Conference: SP IEEE Symposium on Security and Privacy

Girol, Guillaume and Hirschi, Lucca and Sasse, Ralf and Jackson, Dennis and Cremers, Cas and Basin, David
(2020) A Spectral Analysis of Noise:A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols.
In: 29th USENIX Security Symposium (USENIX Security 20), August 12–14, 2020.
Conference: USENIX-Security Usenix Security Symposium

Gopinath, Rahul and Kampmann, Alexander and Havrikov, Nikolas and Soremekun, Ezekiel and Zeller, Andreas
(2020) Abstracting Failure-Inducing Inputs.
In: ISSTA - ACM SIGSOFT International Symposium on Software Testing and Analysis, Sat 18 - Wed 22 July 2020, Virtual.
Conference: ISSTA International Symposium on Software Testing and Analysis

Gopinath, Rahul and Mathis, Björn and Zeller, Andreas
(2020) Mining Input Grammars from Dynamic Control Flow.
In: ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE), 2020-11-09, virtual.
Conference: ESEC/FSE European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (formerly listed as ESEC)

Grochowksi, Marco and Simon, Hendrik and Bohlender, Dimitri and Kowalewski, Stefan and Löcklin, Andreas and Müller, Timo and Jazdi, Nasser and Zeller, Andreas and Weyrich, Michael
(2020) Formale Methoden für rekonfigurierbare cyber-physische Systeme in der Produktion.
Automatisierungstechnik, 68 (1). ISSN 0178-2312

Grohe, Martin and Neuen, Daniel and Wiebking, Daniel
(2020) Isomorphism Testing for Graphs Excluding Small Minors.
In: 2020 IEEE 61st Annual Symposium on Foundations of Computer Science.
Conference: FOCS IEEE Symposium on Foundations of Computer Science

Groß, Joschka and Torralba, Àlvaro and Fickert, Maximilian
(2020) Novel Is Not Always Better:On the Relation between Novelty and Dominance Pruning.
In: AAAI 2020.
Conference: AAAI National Conference of the American Association for Artificial Intelligence

Gunda, Spoorthy and Jain, Pallavi and Lokshtanov, Daniel and Saurabh, Saket and Tale, Prafullkumar
(2020) On the Parameterized Approximability of Contraction to Classes of Chordal Graphs.
In: Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, APPROX/RANDOM 2020, August 17-19, 2020, Virtual Conference.
Conference: APPROX International Workshop on Approximation Algorithms for Combinatorial Optimization Problems

H

Hagestedt, Inken and Humbert, Mathias and Berrang, Pascal and Lehmann, Irina and Eils, Roland and Backes, Michael and Zhang, Yang
(2020) Membership Inference Against DNA Methylation Databases.
In: IEEE European Symposium on Security and Privacy.
Conference: EuroS&P IEEE European Symposium on Security and Privacy

Hajipour, Hossein and Bhattacharyya, Apratim and Fritz, Mario
(2020) SampleFix: Learning to Correct Programs by Sampling Diverse Fixes.
In: NeurIPS Workshop on Computer-Assisted Programming.
Conference: ECCV European Conference on Computer Vision

Hajipour, Hossein and Malinowski, Mateusz and Fritz, Mario
(2020) IReEn: Iterative Reverse-Engineering of Black-Box Functions via Neural Program Synthesis.
In: NeurIPS Workshop on Computer-Assisted Programming.
Conference: ECCV European Conference on Computer Vision

Hasan, Rakibul and Crandall, David and Fritz, Mario and Kapadia, Apu
(2020) Automatically Detecting Bystanders in Photos to Reduce Privacy Risks.
In: IEEE Symposium on Security and Privacy (S&P).
Conference: SP IEEE Symposium on Security and Privacy

He, Yang and Rahimian, Shadi and Schiele, Bernt and Fritz, Mario
(2020) Segmentations-Leak: Membership Inference Attacks and Defenses in Semantic Image Segmentation.
In: European Conference on Computer Vision (ECCV).
Conference: ECCV European Conference on Computer Vision

He, Yang and Schiele, Bernt and Fritz, Mario
(2020) Synthetic Convolutional Features for Improved Semantic Segmentation.
In: Workshop on Assistive Computer Vision and Robotics at European Conference on Computer Vision (ECCV-Workshop).
Conference: ACVR International Workshop on Assistive Computer Vision and Robotics

Holmes, Josie and Brindescu, Iftekhar and Gopinath, Rahul and Zhang, He and Groce, Alex and Brindescu, Caius
(2020) Using Relative Lines of Code to Guide Automated Test Generation for Python.
ACM Transactions on Software Engineering and Methodology, 29 (4). ISSN 1049-331X

J

Jaber, Nouraldin and Jacobs, Swen and Wagner, Christopher and Kulkarni, Milind and Samanta, Roopsha
(2020) Parameterized Verification of Systems with Global Synchronization and Guards.
In: CAV 2020.
Conference: CAV Computer Aided Verification
(In Press)

Jacobs, Swen and Sakr, Mouhammad and Zimmermann, Martin
(2020) Promptness and Bounded Fairness in Concurrent and Parameterized Systems.
In: VMCAI 2020.
Conference: VMCAI Verification, Model Checking and Abstract Interpretation
(In Press)

Joux, Antoine and Espitau, Thomas
(2020) Certified Lattice Reduction.
Advances in Mathematics of Communications, 14 (1). pp. 137-159. ISSN 1930-5346

K

Kampmann, Alexander and Havrikov, Nikolas and Soremekun, Ezekiel and Zeller, Andreas
(2020) When does my Program do this? Learning Circumstances of Software Behavior.
In: ESEC/FSE 2020.
Conference: ESEC/FSE European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (formerly listed as ESEC)
(In Press)

Khosrowjerdi, Hojat and Nemati, Hamed and Meinke, Karl
(2020) Spatio-Temporal Model-Checking of Cyber-Physical Systems Using Graph Queries.
In: Tests and Proofs - 14th International Conference, TAP@STAF 2020, Bergen, Norway, June 22-23, 2020, Proceedings postponed.
Conference: TAP International Conference on Tests and Proofs

Kiesl, Benjamin and Rebola-Pardo, Adrián and Heule, Marijn J.H. and Biere, Armin
(2020) Simulating Strong Practical Proof Systems with Extended Resolution.
Journal of Automated Reasoning, 64. pp. 1247-1267. ISSN 0168-7433

Kirschner, Lukas and Soremekun, Ezekiel and Zeller, Andreas
(2020) Debugging Inputs.
In: 42nd International Conference on Software Engineering, October 5-11, 2020, Seoul, South Korea..
Conference: ICSE International Conference on Software Engineering

Kirschner, Lukas and Soremekun, Ezekiel and Zeller, Andreas
(2020) Poster: Debugging Inputs.
In: 42nd International Conference on Software Engineering Companion, October 5-11, 2020, Seoul, South Korea..
Conference: ICSE International Conference on Software Engineering
(In Press)

Koch, Simon and Sauer, Tim and Johns, Martin and Pellegrino, Giancarlo
(2020) Raccoon: Automated Verification of Guarded Race Conditions in Web Applications.
In: The 35th ACM/SIGAPP Symposium On Applied Computing, March 30-April 3, 2020, Brno, Czech Republic.
Conference: SAC ACM Symposium on Applied Computing

Künnemann, Robert and Nemati, Hamed
(2020) MAC-in-the-Box: Verifying a Minimalistic Hardware Design for MAC Computation.
In: Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part II.
Conference: ESORICS European Symposium On Research In Computer Security

L

Losch, Max and Fritz, Mario and Schiele, Bernt
(2020) Semantic Bottlenecks: Quantifying and Improving Inspectability of Deep Representations.
In: German Conference on Patter Recognition (GCPR).
Conference: GCPR German Conference on Pattern Recognition

M

Mai, Alexandra and Pfeffer, Katharina and Gusenbauer, Matthias and Weippl, Edgar and Krombholz, Katharina
(2020) User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach.
In: Symposium on Usable Privacy and Security (SOUPS) 2020.
Conference: SOUPS Symposium On Usable Privacy and Security

Mandros, Panagiotis and Boley, Mario and Vreeken, Jilles
(2020) Discovering Dependencies with Reliable Mutual Information.
Knowledge and Information Systems. ISSN 0219-1377

Mandros, Panagiotis and Kaltenpoth, David and Boley, Mario and Vreeken, Jilles
(2020) Discovering Functional Dependencies from Mixed-Type Data.
In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Marx, Dániel
(2020) Chordless Cycle Packing Is Fixed-Parameter Tractable.
In: ESA 2020.
Conference: ESA European Symposium on Algorithms

Marx, Dániel and Sandeep, R.B.
(2020) Incompressibility of H-Free Edge Modification Problems: Towards a Dichotomy.
In: ESA 2020.
Conference: ESA European Symposium on Algorithms

Mascle, Corto and Neider, Daniel and Schwenger, Maximilian and Tabuada, Paulo and Weinert, Alexander and Zimmermann, Martin
(2020) From LTL to rLTL Monitoring: Improved Monitorability Through Robust Semantics.
In: HSCC 2020, April 21-14 2020, Sydney, Australia.
Conference: HSCC ACM International Conference on Hybrid Systems: Computation and Control

Mathis, Björn and Gopinath, Rahul and Zeller, Andreas
(2020) Learning Input Tokens for Effective Fuzzing.
In: ISSTA - ACM SIGSOFT International Symposium on Software Testing and Analysis, Sat 18 - Wed 22 July 2020, Virtual.
Conference: ISSTA International Symposium on Software Testing and Analysis
(In Press)

Morio, Kevin and Jackson, Dennis and Vassena, Marco and Künnemann, Robert
(2020) Modular Black-box Runtime Verification of Security Protocols.
In: PLAS 2020.
Conference: PLAS Workshop on Programming Languages and Analysis for Security

N

Nemati, Hamed and Buiras, Pablo and Lindner, Andreas and Guanciale, Roberto and Jacobs, Swen
(2020) Validation of Abstract Side-Channel Models for Computer Architectures.
In: Computer Aided Verification - 32nd International Conference, CAV 2020, Los Angeles, CA, USA, July 21-24, 2020, Proceedings, Part I.
Conference: CAV Computer Aided Verification

Nguyen, Duc Cuong and Derr, Erik and Backes, Michael and Bugiel, Sven
(2020) Up2Dep: Android Tool Support to Fix Insecure Code Dependencies.
In: Annual Computer Security Applications Conference (ACSAC 2020).
Conference: ACSAC Annual Computer Security Applications Conference

O

Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt
(2020) Person Recognition in Personal Photo Collections.
IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 42 (1). pp. 203-220.

Orekondy, Tribhuvanesh and Schiele, Bernt and Fritz, Mario
(2020) Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks.
In: International Conference on Representation Learning (ICLR).
Conference: ICLR International Conference on Learning Representations

Orekondy, Tribhuvanesh and Schiele, Bernt and Fritz, Mario
(2020) Prediction Poisoning: Utility-Constrained Defenses Against Model Stealing Attacks.
In: International Conference on Representation Learning (ICLR).
Conference: ICLR International Conference on Learning Representations

P

Patrignani, Marco and Guarnieri, Marco
(2020) Exorcising Spectres with Secure Compilers.
arxiv
.

Patrignani, Marco and Wahby, Riad S. and Künnemann, Robert
(2020) Universal Composability is Secure Compilation.
In: PriSC 2020 - co-located with POPL.
Conference: PriSC Workshop on Principles of Secure Compilation

Penerath, Frederic and Mandros, Panagiotis and Vreeken, Jilles
(2020) Discovering Approximate Functional Dependencies using Smoothed Mutual Information.
In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

R

Reen, Gaganjeet Singh and Rossow, Christian
(2020) DPIFuzz: A Differential Fuzzing Frameworkto Detect DPI Elusion Strategies for QUIC.
In: Annual Computer Security Applications Conference (ACSAC 2020).
Conference: ACSAC Annual Computer Security Applications Conference

Roth, Sebastian and Backes, Michael and Stock, Ben
(2020) Assessing the Impact of Script Gadgets on CSP at Scale.
In: AsiaCCS 2020.
Conference: ASIACCS ACM ASIA Conference on Computer and Communications Security

Roth, Sebastian and Barron, Timothy and Calzavara, Stefano and Nikiforakis, Nick and Stock, Ben
(2020) Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies.
In: NDSS 2020.
Conference: NDSS Network and Distributed System Security Symposium

S

Sala, Massimiliano and Sogiorno, Domenica and Taufer, Daniele
(2020) A Small Subgroup Attack on Bitcoin Address Generation.
Mathematics, 8 (10). ISSN 2227-7390

Salem, Ahmed and Bhattacharya, Apratim and Backes, Michael and Fritz, Mario and Zhang, Yang
(2020) Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning.
In: USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Sattar, Hosnieh and Krombholz, Katharina and Pons-Moll, Gerard and Fritz, Mario
(2020) Body Shape Privacy in Images: Understanding Privacy and Preventing Automatic Shape Extraction.
In: Workshop on The Bright and Dark Sides of Computer Vision: Challenges and Opportunities for Privacy and Security CVCOPS at European Conference on Computer Vision (ECCV-W).
Conference: ECCV European Conference on Computer Vision

Sattara, Hosnieh and Fritz, Mario and Bulling, Andreas
(2020) Deep gaze pooling: Inferring and visually decoding search intents from human gaze fixations.
Neurocomputing, 387. pp. 369-382. ISSN 0925-2312

Saurabh, Saket and Tale, Prafullkumar
(2020) On the Parameterized Complexity of Maximum Degree Contraction Problem.
In: 15th International Symposium on Parameterized and Exact Computation (IPEC 2020).
Conference: IPEC International Symposium on Parameterized and Exact Computation (was IWPEC pre 2004)

Schepper, Philipp
(2020) Fine-Grained Complexity of Regular Expression Pattern Matching and Membership.
In: European Symposium on Algorithms.
Conference: ESA European Symposium on Algorithms

Schlüter, Till and Lemke-Rust, Kerstin
(2020) Differential Analysis and Fingerprinting of ZombieLoads on Block Ciphers.
In: Conference on Smart Card Research and Advanced Applications (CARDIS).
Conference: CARDIS Smart Card Research and Advanced Application Conference

Schwarz, Fabian and Rossow, Christian
(2020) SENG, the SGX-Enforcing Network Gateway: Authorizing Communication from Shielded Clients.
In: 29th USENIX Security Symposium (USENIX Security 20).
Conference: USENIX-Security Usenix Security Symposium

Schwenger, Maximilian
(2020) Let’s not Trust Experience Blindly: Formal Monitoring of Humans and other CPS.
Masters thesis, Saarland University.

Schwenger, Maximilian
(2020) Monitoring Cyber-Physical Systems: From Design to Integration.
In: RV 2020.
Conference: RV International Conference on Runtime Verification (was workshop pre 2010)

Seidl, Helmut and Müller, Christian and Finkbeiner, Bernd
(2020) How to Win First-Order Safety Games.
In: Verification, Model Checking, and Abstract Interpretation.
Conference: VMCAI Verification, Model Checking and Abstract Interpretation

Sharma, Saurabh and Yu, Ning and Fritz, Mario and Schiele, Bernt
(2020) Long-Tailed Recognition Using Class-Balanced Experts.
In: German Conference on Pattern Recognition (GCPR).
Conference: GCPR German Conference on Pattern Recognition

Shetty, Rakshith and Fritz, Mario and Schiele, Bernt
(2020) Towards Automated Testing and Robustification by Semantic Adversarial Data Generation.
In: European Conference on Computer Vision (ECCV).
Conference: ECCV European Conference on Computer Vision

Steffens, Marius and Stock, Ben
(2020) PMForce: Systematically Analyzing PostMessage Handlers at Scale.
In: ACM CCS 2020.
Conference: CCS ACM Conference on Computer and Communications Security

Stivala, Giada and Pellegrino, Giancarlo
(2020) Deceptive Previews: A Study of the Link Preview Trustworthiness in Social Platforms.
In: 27th Annual Network and Distributed System Security symposium, February 2020, San Diego.
Conference: NDSS Network and Distributed System Security Symposium

Sudhodanan, Avinash and Khodayari, Soheil and Caballero, Juan
(2020) Cross-Origin State Inference (COSI) Attacks: Leaking Web Site States through XS-Leaks.
In: NDSS 2020, 23 – 26 February 2020, San Diego, California.
Conference: NDSS Network and Distributed System Security Symposium

Sutton, Christopher and Boley, Mario and Ghiringhelli, Luca M. and Rupp, Matthias and Vreeken, Jilles and Scheffler, Matthias
(2020) Identifying Domains of Applicability of Machine Learning Models for Materials Science.
Nature Communications. ISSN 2041-1723

T

Thyagarajan, Sri Aravinda Krishnan and Bhat, Adithya and Malavolta, Giulio and Nico, Döttling and Kate, Aniket and Schröder, Dominique
(2020) Verifiable Timed Signatures Made Practical.
In: CCS 2020.
Conference: CCS ACM Conference on Computer and Communications Security

Tiefenau, Christian and Häring, Maximilian and Krombholz, Katharina and von Zezschwitz, Emanuel
(2020) Security, Availability, and Multiple Information Sources: Exploring Update Behavior of System Administrators.
In: Symposium on Usable Privacy and Security (SOUPS) 2020.
Conference: SOUPS Symposium On Usable Privacy and Security

Tran, Nicolas and Speicher, Patrick and Künnemann, Robert and Backes, Michael and Torralba, Àlvaro and Hoffmann, Jörg
(2020) Planning in the Browser.
In: System Demonstration at the 30th International Conference on Automated Planning and Scheduling (ICAPS'20), October 2020.
Conference: ICAPS International Conference on Automated Planning and Scheduling

Troncoso, Carmela and Payer, Matthias and Hubaux, Jean-Pierre and Salathé, Marcel and Larus, James and Lueks, Wouter and Stadler, Theresa and Pyrgelis, Apostolos and Antonioli, Daniele and Barman, Ludovic and Chatel, Sylvain and Paterson, Kenneth G. and Capkun, Srdjan and Basin, David and Beutel, Jan and Jackson, Dennis and Roeschlin, Marc and Leu, Patrick and Preneel, Bart and Smart, Nigel and Abidin, Aysajan and Gürses, Seda and Veale, Michael and Cremers, Cas and Backes, Michael and Tippenhauer, Nils Ole and Binns, Reuben and Cattuto, Ciro and Barrat, Alain and Fiore, Dario and Barbosa, Manuel and Oliveira, Rui and Pereira, José
(2020) Decentralized Privacy-Preserving Proximity Tracing.
IEEE Data Engineering Bulletin Volume 43, Number 2, June 2020. pp. 36-66.

Turrin, Federico and Erba, Alessandro and Tippenhauer, Nils Ole and Conti, Mauro
(2020) A Statistical Analysis Framework for ICS Process Datasets.
In: Proceedings of the Joint Workshop on CPS&IoT Security and Privacy (CPSIOTSEC’20).
Conference: ECCV European Conference on Computer Vision

V

Vassena, Marco and Patrignani, Marco
(2020) Memory Safety Preservation for WebAssembly.
UNSPECIFIED
.

W

Wan, Gerry and Izhikevich, Liz and Adrian, David and Yoshioka, Katsunari and Holz, Ralph and Rossow, Christian and Durumeric, Zakir
(2020) On the Origin of Scanning: The Impact of Location on Internet-Wide Scans.
In: 2020 ACM SIGCOMM Internet Measurement Conference, October 27-29, 2020, Virtual Event.
Conference: IMC Internet Measurement Conference

Wang, Jiawei and Li, Li and Zeller, Andreas
(2020) Better Code, Better Sharing: On the Need of Analyzing Jupyter Notebooks.
In: 2020 IEEE/ACM 42nd International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER).
Conference: ICSE International Conference on Software Engineering

Wanwarang, Tanapuch and Pereira Borges Jr., Nataniel and Bettscheider, Leon and Zeller, Andreas
(2020) Testing Apps With Real-World Inputs.
In: 1st IEEE/ACM International Conference on Automation of Software Test, May 25-26, 2020, Seoul, South Korea.
Conference: AST Automation of Software Test
(In Press)

Wen, Rui and Yu, Yu and Xie, Xiang and Zhang, Yang
(2020) LEAF: A Faster Secure Search Algorithm via Localization, Extraction, and Reconstruction.
In: ACM SIGSAC Conference on Computer and Communications Security.
Conference: CCS ACM Conference on Computer and Communications Security

Y

Yu, Ning and Li, Ke and Zhou, Peng and Malik, Jitendra and Davis, Larry S. and Fritz, Mario
(2020) Inclusive GAN: Improving Data and Minority Coverage in Generative Models.
In: European Conference on Computer Vision (ECCV).
Conference: ECCV European Conference on Computer Vision

Yu, Ning and Skripniuk, Vladislav and Abdelnabi, Sahar and Fritz, Mario
(2020) Artificial Fingerprinting for Generative Models: Rooting Deepfake Attribution in Training Data.
UNSPECIFIED
.

Z

Zhang, Yang and Humbert, Mathias and Surma, Bartlomiej and Manoharan, Praveen and Vreeken, Jilles and Backes, Michael
(2020) Towards Plausible Graph Anonymization.
In: Annual Network and Distributed System Security Symposium.
Conference: NDSS Network and Distributed System Security Symposium

Zhao, Qingchuan and Zuo, Chaoshun and Brendan, Dolan-Gavitt and Pellegrino, Giancarlo and Lin, Zhiqiang
(2020) Automatic Uncovering of Hidden Behaviors from Input Validation in Mobile Apps.
In: IEEE Symposium on Security and Privacy.
Conference: SP IEEE Symposium on Security and Privacy

This list was generated on Sat Dec 21 13:01:31 2024 CET.