Number of items: 155.
A
Abdalla, Michel and Barbosa, Manuel and Katz, Jonathan and Loss, Julian and Xu, Jiayu
(2021)
Algebraic Adversaries in the Universal Composability Framework.
Abdelnabi, Sahar and Fritz, Mario
(2021)
Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding.
Abdelnabi, Sahar and Fritz, Mario
(2021)
"What's in the box?!": Deflecting Adversarial Attacks by Randomly Deploying Adversarially-Disjoint Models.
Alamati, Navid and Branco, Pedro and Döttling, Nico and Garg, Sanjam and Hajiabadi, Mohammad and Pu, Sihang
(2021)
Laconic Private Set Intersection and Applications.
Albert, Elvira and Hähnle, Reiner and Merayo, Alicia and Steinhöfel, Dominic
(2021)
Certified Abstract Cost Analysis.
Alsoliman, Anas and Rigoni, Giulio and Levorato, Marco and Pinotti, Cristina and Tippenhauer, Nils Ole and Conti, Mauro
(2021)
COTS Drone Detection Using Video Streaming Characteristics.
B
Baelde, David and Delaune, Stephanie and Jacomme, Charlie and Koutsos, Adrien and Moreau, Solene
(2021)
An Interactive Prover for Protocol Verification in the Computational Model.
Baier, Christel and Coenen, Norine and Finkbeiner, Bernd and Funke, Florian and Jantsch, Simon and Siber, Julian
(2021)
Causality-Based Game Solving.
Barbieri, Giovanni and Conti, Mauro and Tippenhauer, Nils Ole and Turrin, Federico
(2021)
Assessing the Use of Insecure ICS Protocols via IXP Network Traffic Analysis.
Barbosa, Manuel and Barthe, Gilles and Bhargavan, Karthik and Blanchet, Bruno and Cremers, Cas and Liao, Kevin and Parno, Brian
(2021)
SoK: Computer-Aided Cryptography.
(In Press)
Bauer, Markus and Rossow, Christian
(2021)
Cali: Compiler Assisted Library Isolation.
(In Press)
Bauer, Markus and Rossow, Christian
(2021)
NoVT: Eliminating C++ Virtual Calls to Mitigate Vtable Hijacking.
(In Press)
Baumann, Christoph and Dam, Mads and Guanciale, Roberto and Nemati, Hamed
(2021)
On Compositional Information Flow Aware Refinement.
Baumeister, Jan and Coenen, Norine and Bonakdarpour, Borzoo and Finkbeiner, Bernd and Sánchez, César
(2021)
A Temporal Logic for Asynchronous Hyperproperties.
Bensmail, Julien and Fioravantes, Foivos and Mc Inerney, Fionn and Nisse, Nicolas
(2021)
The Largest Connected Subgraph Game.
Beutner, Raven and Finkbeiner, Bernd
(2021)
A Temporal Logic for Strategic Hyperproperties.
Beutner, Raven and Ong, Luke
(2021)
On Probabilistic Termination of Functional Programs
with Continuous Distributions.
Bhattacharyya, Apratim and Reino, Daniel Olmeda and Fritz, Mario and Schiele, Bernt
(2021)
Euro-PVI: Pedestrian Vehicle Interactions in Dense Urban Centers.
Bhattacharyya, Arnab and Bonnet, Édouard and Egri, László and Ghoshal, Suprovat and C. S., Karthik and Lin, Bingkai and Manurangsi, Pasin and Marx, Dániel
(2021)
Parameterized Intractability of Even Set and Shortest Vector Problem.
Journal of the ACM, 68 (3).
pp. 1-40.
ISSN 0004-5411
Biewer, Sebastian and Finkbeiner, Bernd and Hermanns, Holger and Köhl, Maximilian A. and Schnitzer, Yannik and Schwenger, Maximilian
(2021)
RTLola on Board: Testing Real Driving Emissions on your Phone.
Blum, Erica and Katz, Jonathan and Loss, Julian
(2021)
Tardigrade: An Atomic Broadcast Protocol for Arbitrary Network Conditions.
Branco, Pedro and Döttling, Nico and Pu, Sihang
(2021)
Multiparty Cardinality Testing for Threshold Private Intersection.
Brendel, Jacqueline and Cremers, Cas and Jackson, Dennis and Zhao, Mang
(2021)
The Provable Security of Ed25519: Theory and Practice.
(In Press)
Brengel, Michael and Rossow, Christian
(2021)
YarIx: Scalable YARA-based Malware Intelligence.
Budhathoki, Kailash and Boley, Mario and Vreeken, Jilles
(2021)
Discovering reliable causal rules.
Buiras, Pablo and Nemati, Hamed and Lindner, Andreas and Guanciale, Roberto
(2021)
Validation of Side-Channel Models via Observation Refinement.
Böhle, Moritz and Fritz, Mario and Schiele, Bernt
(2021)
Convolutional Dynamic Alignment Networks for Interpretable Classifications.
C
Calzavara, Stefano and Urban, Tobias and Tatang, Dennis and Steffens, Marius and Stock, Ben
(2021)
Reining in the Web's Inconsistencies with Site Policy.
Canella, Claudio and Werner, Mario and Gruss, Daniel and Schwarz, Michael
(2021)
Automating Seccomp Filter Generation for Linux Applications.
Chakraborti, Avik and Datta, Nilanjan and Jha, Ashwin and Mancillas-Lopez, Cuauhtemoc and Nandi, Mridul
(2021)
Light-OCB: Parallel Lightweight Authenticated Cipher with Full Security.
Chakraborti, Avik and Datta, Nilanjan and Jha, Ashwin and Mancillas-Lopez, Cuauhtemoc and Nandi, Mridul
(2021)
tHyENA: Making HyENA Even Smaller.
Chakraborti, Avik and Datta, Nilanjan and Jha, Ashwin and Mancillas-Lopez, Cuauhtemoc and Nandi, Mridul and Sasaki, Yu
(2021)
Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher.
Chakraborty, Bishwajit and Chattopadhyay, Soumya and Jha, Ashwin and Nandi, Mridul
(2021)
On Length Independent Security Bounds for the PMAC Family.
IACR Transactions on Symmetric Cryptology, 2021 (2).
pp. 423-445.
Chardouvelis, Orestis and Döttling, Nico and Malavolta, Giulio
(2021)
Rate-1 Quantum Fully Homomorphic Encryption.
Chattopadhyay, Soumya and Jha, Ashwin and Nandi, Mridul
(2021)
Fine-tuning the ISO/IEC Standard Lightmac.
(Submitted)
Chen, Min and Zhang, Zhikun and Wang, Tianhao and Backes, Michael and Humbert, Mathias and Zhang, Yang
(2021)
When Machine Unlearning Jeopardizes Privacy.
Chen, Xiaoyi and Salem, Ahmed and Chen, Dingfan and Backes, Michael and Ma, Shiqing and Shen, Qingni and Wu, Zhonghai and Zhang, Yang
(2021)
BadNL: Backdoor Attacks against NLP Models with Semantic-preserving Improvements.
Coenen, Norine and Finkbeiner, Bernd and Hahn, Christopher and Hofmann, Jana and Schillo, Yannick
(2021)
Runtime Enforcement of Hyperproperties.
Cogliati, Benoît-Michel and Ethan, Jordan and Lallemand, Virginie and Lee, Byeonghak and Lee, Jooyoung and Minier, Marine
(2021)
CTET+: A Beyond-Birthday-Bound Secure
Tweakable Enciphering Scheme Using a Single
Pseudorandom Permutation.
IACR Transactions on Symmetric Cryptology, 2021 (4).
ISSN 2519-173X
Cohen-Addad, Vincent and De Verdière, Éric Colin and Marx, Dániel and De Mesmay, Arnaud
(2021)
Almost Tight Lower Bounds for Hard Cutting Problems in Embedded Graphs.
Journal of the ACM, 68 (4).
pp. 1-26.
ISSN 0004-5411
Cohen-Addad, Vincent and Klein, Philip N. and Marx, Dániel and Wheeler, Archer and Wolfram, Christopher
(2021)
On the Computational Tractability of a Geographic Clustering Problem Arising in Redistricting.
Coupette, Corinna and Vreeken, Jilles
(2021)
Graph Similarity Description: How Are These Graphs Similar?
Cremers, Cas and Düzlü, Samed and Fiedler, Rune and Fischlin, Marc and Janson, Christian
(2021)
BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures.
(In Press)
Cremers, Cas and Hale, Britta and Kohbrok, Konrad
(2021)
The Complexities of Healing in Secure Group Messaging: Why {Cross-Group} Effects Matter.
D
Dauer, Johann C. and Finkbeiner, Bernd and Schirmer, Sebastian
(2021)
Monitoring with Verified Guarantees.
Dawoud, Abdallah and Bugiel, Sven
(2021)
Bringing Balance to the Force: Dynamic Analysis of the Android Application Framework.
Dax, Alexander and Künnemann, Robert
(2021)
On the Soundness of Infrastructure Adversaries.
Dimitrova, Rayna
(2021)
Reactive Synthesis Beyond Realizability (Invited Tutorial).
Distler, Verena and Fassl, Matthias and Habib, Hana and Krombholz, Katharina and Lenzini, Gabriele and Lallemand, Carine and Cranor, Lorrie Faith and Koenig, Vincent
(2021)
A Systematic Literature Review of Empirical Methods and Risk Representation in Usable Privacy and Security Research.
ACM Transactions on Computer-Human Interaction, 28 (6).
pp. 1-50.
ISSN 1073-0516
Du, Linkang and Zhang, Zhikun and Bai, Shaojie and Liu, Changchang and Ji, Shouling and Cheng, Peng and Chen, Jiming
(2021)
AHEAD: Adaptive Hierarchical Decomposition for Range Query under Local Differential Privacy.
Dutta, Arghya and Vreeken, Jilles and Ghiringhelli, Luca M and Bereau, Tristan
(2021)
Data-driven equation for drug-membrane permeability across drugs and membranes.
The Journal of Chemical Physics.
Döttling, Nico and Garg, Sanjam
(2021)
Identity-based Encryption from the Diffie-Hellman Assumption.
Journal of the ACM.
ISSN 0004-5411
Döttling, Nico and Hartmann, Dominik and Hofheinz, Dennis and Kiltz, Eike and Schäge, Sven and Ursu, Bogdan
(2021)
On the Impossibility of Purely Algebraic Signatures.
Döttling, Nico and Nishimaki, Ryo
(2021)
Universal Proxy Re-Encryption.
E
El-Korashy, Akram and Tsampas, Stelios and Patrignani, Marco and Devriese, Dominique and Garg, Deepak and Piessens, Frank
(2021)
CapablePtrs: Securely Compiling Partial Programs
Using the Pointers-as-Capabilities Principle.
Elbitar, Yusra and Schilling, Michael and Nguyen, Trung Tin and Backes, Michael and Bugiel, Sven
(2021)
Explanation Beats Context: The Effect of Timing & Rationales on Users’ Runtime Permission Decisions.
Eriksson, Benjamin and Pellegrino, Giancarlo and Sabelfeld, Andrei
(2021)
Black Widow: Blackbox Data-driven Web Scanning.
F
Fabian, Xaver and Chan, Koby and Patrignani, Marco
(2021)
Formal Verification of Spectres Combination.
Fass, Aurore and Somé, Dolière Francis and Backes, Michael and Stock, Ben
(2021)
DoubleX: Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale.
Fassl, Matthias and Gröber, Lea and Krombholz, Katharina
(2021)
Exploring User-Centered Security Design for Usable Authentication Ceremonies.
Fassl, Matthias and Gröber, Lea and Krombholz, Katharina
(2021)
Stop the Consent Theater.
Fassl, Matthias and Neumayr, Michaela and Schedler, Oliver and Krombholz, Katharina
(2021)
Transferring Update Behavior from Smartphones to Smart Consumer Devices.
(Submitted)
Finkbeiner, Bernd
(2021)
Model Checking Algorithms for Hyperproperties (Invited Paper).
Finkbeiner, Bernd and Geier, Gideon and Passing, Noemi
(2021)
Specification Decomposition for Reactive Synthesis.
(In Press)
Finkbeiner, Bernd and Keller, Andreas and Schmidt, Jessica and Schwenger, Maximilian
(2021)
Robust Monitoring for Medical Cyber-Physical Systems.
Finkbeiner, Bernd and Klein, Felix and Metzger, Niklas
(2021)
Live Synthesis.
Finkbeiner, Bernd and Passing, Noemi
(2021)
Compositional Synthesis of Modular Systems.
(In Press)
Finkbeiner, Bernd and Schmitt, Frederik
(2021)
Künstliche Intelligenz in der Softwareentwicklung: Über die Schulter geschaut.
iX Magazin für professionelle Informationstechnik (8).
pp. 40-43.
ISSN 0935-9680
Fischer, Jonas and Olah, Anna and Vreeken, Jilles
(2021)
What’s in the Box? Exploring the Inner Life of Neural Networks with Robust Rules.
Fischer, Jonas and Vreeken, Jilles
(2021)
Differentiable Pattern Set Mining.
Focke, Jacob and Goldberg, Leslie Ann and Roth, Marc and Živný, Stanislav
(2021)
Counting Homomorphisms to K4-minor-free Graphs, modulo 2.
SIAM Journal on Discrete Mathematics, 35 (4).
pp. 2749-2814.
ISSN 0895-4801
G
Gieseking, Manuel and Hecking-Harbusch, Jesko and Yanich, Ann
(2021)
A Web Interface for Petri Nets with Transits and Petri Games.
Gopinath, Rahul and Nemati, Hamed and Zeller, Andreas
(2021)
Input Algebras.
Grosse, Kathrin and Backes, Michael
(2021)
Do winning tickets exist before DNN training?
Gröber, Lea and Fassl, Matthias and Gupta, Abhilash and Krombholz, Katharina
(2021)
Investigating Car Drivers’ Information Demand after Safety and Security Critical Incidents.
Gueron, Shay and Jha, Ashwin and Nandi, Mridul
(2021)
Revisiting the Security of COMET Authenticated Encryption Scheme.
H
Hahn, Christopher and Schmitt, Frederik and Kreber, Jens U. and Rabe, Markus Norman and Finkbeiner, Bernd
(2021)
Teaching Temporal Logics to Neural Networks.
Hajipour, Hossein and Bhattacharyya, Apratim and Staicu, Cristian-Alexandru and Fritz, Mario
(2021)
SampleFix: Learning to Generate Functionally Diverse Fixes.
Hajipour, Hossein and Bhattacharyya, Apratim and Staicu, Cristian-Alexandru and Fritz, Mario
(2021)
SampleFix: Learning to Generate Functionally Diverse Fixes.
(Submitted)
Hajipour, Hossein and Malinowski, Mateusz and Fritz, Mario
(2021)
IReEn: Iterative Reverse-Engineering of Black-Box Functions via Neural Program Synthesis.
Hanzlik, Lucjan and Slamanig, Daniel
(2021)
With a Little Help from My Friends: Constructing Practical Anonymous Credentials.
(In Press)
Hanzlik, Lucjan and Zhang, Yang and Grosse, Kathrin and Salem, Ahmed and Augustin, Maximilian and Backes, Michael and Fritz, Mario
(2021)
MLCapsule: Guarded Offline Deployment of Machine Learning as a Service.
He, Xinlei and Jia, Jinyuan and Gong, Neil Zhenqiang and Backes, Michael and Zhang, Yang
(2021)
Stealing Links from Graph Neural Networks.
He, Xinlei and Zhang, Yang
(2021)
Quantifying and Mitigating Privacy Risks of Contrastive Learning.
He, Yang and Yu, Ning and Keuper, Margret and Fritz, Mario
(2021)
Beyond the Spectrum: Detecting Deepfakes via Re-Synthesis.
Horak, Tom and Coenen, Norine and Metzger, Niklas and Hahn, Christopher and Flemisch, Tamara and Méndez, Julián and Dimov, Dennis and Finkbeiner, Bernd and Dachselt, Raimund
(2021)
Visual Analysis of Hyperproperties for Understanding Model Checking Results.
Huaman, Nicolas and Amft, Sabrina and Oltrogge, Marten and Acar, Yasemin and Fahl, Sascha
(2021)
They Would do Better if They Worked Together: The Case of Interaction Problems Between Password Managers and Websites.
Huaman, Nicolas and von Skarczinski, Bennet and Wermke, Dominik and Stransky, Christian and Acar, Yasemin and Dreißigacker, Arne and Fahl, Sascha
(2021)
A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises.
Huang, Jie and Backes, Michael and Bugiel, Sven
(2021)
A11y and Privacy don’t have to be mutually exclusive: Constraining Accessibility Service Misuse on Android.
(In Press)
Häring, Maximilian and Gerlitz, Eva and Tiefenau, Christian and Smith, Matthew and Wermke, Dominik and Fahl, Sascha and Acar, Yasemin
(2021)
Never ever or no matter what: Investigating Adoption Intentions and Misconceptions about the Corona-Warn-App in Germany.
J
Jaber, Nouraldin and Wagner, Christopher and Jacobs, Swen and Kulkarni, Milind and Samanta, Roopsha
(2021)
QuickSilver: Modeling and Parameterized Verification for Distributed Agreement-Based Systems.
(In Press)
Jacobs, Swen and Sakr, Mouhammad
(2021)
AIGEN: Random Generation of Symbolic Transition Systems.
(In Press)
K
Kalofolias, Janis and Welke, Pascal and Vreeken, Jilles
(2021)
SUSAN: The Structural Similarity Random Walk Kernel.
Katz, Jonathan and Loss, Julian and Rosenberg, Michael
(2021)
Boosting the Security of Blind Signature Schemes.
Ke, Qiuhong and Fritz, Mario and Schiele, Bernt
(2021)
Future Moment Assessment for Action Query.
Khodayari, Soheil and Pellegrino, Giancarlo
(2021)
JAW: Studying Client-side CSRF with Hybrid Property Graphs and Declarative Traversals.
Krupp, Johannes and Rossow, Christian
(2021)
BGPeek-a-Boo: Active BGP-based Traceback for Amplification DDoS Attacks.
Kuznetsov, Konstantin and Fu, Chen and Gao, Song and Jansen, David N. and Zhang, Lijun and Zeller, Andreas
(2021)
Frontmatter: Mining Android User Interfaces at Scale.
Künnemann, Robert and Garg, Deepak and Backes, Michael
(2021)
Accountability in the Decentralised-Adversary Setting.
(In Press)
L
Lampel, Johannes and Just, Sascha and Apel, Sven and Zeller, Andreas
(2021)
When Life Gives You Oranges: Detecting and Diagnosing Intermittent Job Failures at Mozilla.
Li, Zheng and Zhang, Yang
(2021)
Membership Leakage in Label-Only Exposures.
Likaj, Xhelal and Khodayari, Soheil and Pellegrino, Giancarlo
(2021)
Where We Stand (or Fall): An Analysis of CSRF Defenses in Web Frameworks.
Lipp, Moritz and Kogler, Andreas and Oswald, David and Schwarz, Michael and Easdon, Catherine and Canella, Claudio and Gruss, Daniel
(2021)
PLATYPUS: Software-based Power Side-Channel Attacks on x86.
Liu, Yehao and Pagliardini, Matteo and Chavdarova, Tatjana and Stich, Sebastian U.
(2021)
The Peril of Popular Deep Learning Uncertainty Estimation Methods.
Lorenz, Tobias and Ruoss, Anian and Balunović, Mislav and Singh, Gagandeep and Vechev, Martin
(2021)
Robustness Certification for Point Cloud Models.
(In Press)
Losch, Max and Fritz, Mario and Schiele, Bernt
(2021)
Semantic Bottlenecks: Quantifying and Improving Inspectability of Deep Representations.
International Journal of Computer Vision (IJCV).
ISSN 1573-1405
M
Marx, Alexander and Gretton, Arthur and Mooij, Joris
(2021)
A Weaker Faithfulness Assumption based on Triple Interactions.
Marx, Alexander and Yang, Lincen and van Leeuwen, Matthijs
(2021)
Estimating Conditional Mutual Information for Discrete-Continuous Mixtures using Multi-Dimensional Adaptive Histograms.
Marx, Dániel
(2021)
Modern Lower Bound Techniques in Database Theory and Constraint Satisfaction.
Marx, Dániel and Sankar, Govind S. and Schepper, Philipp
(2021)
Degrees and Gaps: Tight Complexity Results of General Factor Problems Parameterized by Treewidth and Cutwidth.
Meiser, Gordon and Laperdrix, Pierre and Stock, Ben
(2021)
Careful Who You Trust: Studying the Pitfalls of Cross-Origin Communication.
Mian, Osman and Marx, Alexander and Vreeken, Jilles
(2021)
Discovering Fully Oriented Causal Networks.
Moog, Marvin and Demmel, Markus and Backes, Michael and Fass, Aurore
(2021)
Statically Detecting JavaScript Obfuscation and Minification Techniques in the Wild.
Morio, Kevin and Künnemann, Robert
(2021)
Verifying Accountability for Unbounded Sets of Participants.
N
Neuen, Daniel
(2021)
Isomorphism Testing Parameterized by Genus and Beyond.
Nguyen, Trung Tin and Backes, Michael and Marnau, Ninja and Stock, Ben
(2021)
Share First, Ask Later (or Never?) - Studying Violations of GDPR's Explicit Consent in Android Apps.
Nguyen, Trung Tin and Nguyen, Duc Cuong and Schilling, Michael and Wang, Gang and Backes, Michael
(2021)
Measuring User Perception for Detecting Unexpected Access to Sensitive Resource in Mobile Apps.
(Submitted)
O
Oestreich, Marie and Chen, Dingfan and Schultze, Joachim L. and Fritz, Mario and Becker, Matthias
(2021)
Privacy considerations for sharing genomics data.
EXCLI Journal Eperimental and Clinical Sciences, 20.
pp. 1243-1260.
ISSN 1611-2156
Oltrogge, Marten and Huaman, Nicolas and Amft, Sabrina and Acar, Yasemin and Backes, Michael and Fahl, Sascha
(2021)
Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications.
(In Press)
P
Patrignani, Marco and Guarnieri, Marco
(2021)
Exorcising Spectres with secure compilers.
Patrignani, Marco and Martin, Eric Mark and Devriese, Dominique
(2021)
On the Semantic Expressiveness of Recursive Types.
Petzka, Henning and Kamp, Michael and Adilova, Linara and Sminchisescu, Cristian and Boley, Mario
(2021)
Relative Flatness and Generalization.
Pfeffer, Katharina and Mai, Alexandra and Dabrowski, Adrian and Gusenbauer, Matthias and Schindler, Philipp and Weippl, Edgar and Franz, Michael and Krombholz, Katharina
(2021)
On the Usability of Authenticity Checks for Hardware Security Tokens.
Ponticello, Alexander and Fassl, Matthias and Krombholz, Katharina
(2021)
Exploring Authentication for Security-Sensitive Tasks on Smart Home Voice Assistants.
R
Rahimian, Shadi and Orekondy, Tribhuvanesh and Fritz, Mario
(2021)
Differential Privacy Defenses and Sampling Attacks for Membership Inference.
Roth, Sebastian and Gröber, Lea and Backes, Michael and Krombholz, Katharina and Stock, Ben
(2021)
12 Angry Developers – A Qualitative Study on Developers’ Struggles with CSP.
Rottenstreich, Ori and Kulik, Ariel and Joshi, Ananya and Rexford, Jennifer and Rétvári, Gábor and Menache, Daniel S
(2021)
Data Plane Cooperative Caching with Dependencies.
IEEE Transactions on Network and Service Management.
S
Scaletta, Marco and Hähnle, Reiner and Steinhöfel, Dominic and Bubel, Richard
(2021)
Delta-based Verification of Software Product Families.
Schmidt, Florian and Marx, Alexander and Baumgarten, Nina and Hebel, Marie and Wegner, Martin and Kaulich, Manuel and Leisegang, Matthias S and Brandes, Ralf P and Göke, Jonathan and Vreeken, Jilles and Schulz, Marcel H
(2021)
Integrative analysis of epigenetics data identifies gene-specific regulatory elements.
Nucleic acids research.
Schmitt, Frederik and Hahn, Christopher and Kreber, Jens U. and Rabe, Markus N. and Finkbeiner, Bernd
(2021)
Deep Learning for Temporal Logics.
(Unpublished)
Schmitt, Frederik and Hahn, Christopher and Rabe, Markus N. and Finkbeiner, Bernd
(2021)
Neural Circuit Synthesis from Specification Patterns.
Schwarzl, Martin and Canella, Claudio and Gruss, Daniel and Schwarz, Michael
(2021)
Specfuscator: Evaluating Branch Removal as a Spectre Mitigation.
Schwarzl, Martin and Schuster, Thomas and Schwarz, Michael and Gruss, Daniel
(2021)
Speculative Dereferencing of Registers: Reviving Foreshadow.
Soremekun, Ezekiel and Kirschner, Lukas and Böhme, Marcel and Zeller, Andreas
(2021)
Locating Faults with Program Slicing: An Empirical Analysis.
Empirical Software Engineering, 26.
Steffens, Marius and Musch, Marius and Johns, Martin and Stock, Ben
(2021)
Who's Hosting the Block Party? Studying Third-Party Blockage of CSP and SRI.
Stransky, Christian and Wermke, Dominik and Schrader, Johanna and Huaman, Nicolas and Acar, Yasemin and Fehlhaber, Anna Lena and Wei, Miranda and Ur, Blase and Fahl, Sascha
(2021)
On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security.
T
Tahmasbi, Fatemeh and Schild, Leonard and Ling, Chen and Blackburn, Jeremy and Stringhini, Gianluca and Zhang, Yang and Zannettou, Savvas
(2021)
“Go eat a bat, Chang!”: On the Emergence of Sinophobic Behavior on Web Communities in the Face of COVID-19.
Tippenhauer, Nils Ole and Chen, Binbin and Mashima, Daisuke and Nicol, David M.
(2021)
vBump: Securing Ethernet-based Industrial Control System Networks with VLAN-based Traffic Aggregation.
Torralba, Àlvaro and Speicher, Patrick and Künnemann, Robert and Hoffmann, Jörg and Steinmetz, Marcel
(2021)
Faster Stackelberg Planning via Symbolic Search and Information Sharing.
V
Vasilakis, Nikos and Staicu, Cristian-Alexandru and Ntousakis, Grigoris and Kallas, Konstantinos and Karel, Ben and DeHon, André and Pradel, Michael
(2021)
Preventing Dynamic Library Compromise on Node.js via RWX-Based Privilege Reduction.
Vassena, Marco and Disselkoen, Craig and Cauligi, Sunjay and Gleissenthall, Klaus and Kici, Rami Gökhan and Jhala, Ranjit and Stefan, Deian and Tullsen, Dean
(2021)
Automatically Eliminating Speculative Leaks from Cryptographic Code with Blade.
Virtema, Jonni and Hofmann, Jana and Finkbeiner, Bernd and Kontinen, Juha and Yang, Fan
(2021)
Linear-Time Temporal Logic with Team Semantics: Expressivity and Complexity.
van der Toorn, Olivier and Krupp, Johannes and Jonker, Mattijs and van Rijswijk-Deij, Roland and Rossow, Christian and Sperotto, Anna
(2021)
ANYway: Measuring the Amplification DDoS Potential of Domains.
W
Wang, Hui-Po and Orekondy, Tribhuvanesh and Fritz, Mario
(2021)
InfoScrub: Towards Attribute Privacy by Targeted Obfuscation.
Wang, Hui-Po and Yu, Ning and Fritz, Mario
(2021)
Hijack-GAN: Unintended-Use of Pretrained, Black-Box GANs.
Wang, Jiawei and Li, Li and Zeller, Andreas
(2021)
Restoring Execution Environments of Jupyter Notebooks.
Wang, Tianhao and Chen, Joann Qiongna and Zhang, Zhikun and Su, Dong and Cheng, Yueqiang and Li, Zhou and Li, Ninghui and Jha, Somesh
(2021)
Continuous Release of Data Streams under both Centralized and Local Differential Privacy.
Warnat-Herresthal, Stefanie and Schultze, Hartmut and Shastry, Krishnaprasad Lingadahalli and Manamohan, Sathyanarayanan and Mukherjee, Saikat and Garg, Vishesh and Sarveswara, Ravi and Händler, Kristian and Pickkers, Peter and Aziz, N. Ahmad and Ktena, Sofia and Tran, Florian and Bitzer, Michael and Ossowski, Stephan and Casadei, Nicolas and Herr, Christian and Petersheim, Daniel and Behrends, Uta and Kern, Fabian and Fehlmann, Tobias and Schommers, Philipp and Lehmann, Clara and Augustin, Max and Rybniker, Jan and Altmüller, Janine and Mishra, Neha and Bernardes, Joana P. and Krämer, Benjamin and Bonaguro, Lorenzo and Schulte-Schrepping, Jonas and De Domenico, Elena and Siever, Christian and Kraut, Michael and Desai, Milind and Monnet, Bruno and Saridaki, Maria and Siegel, Charles Martin and Drews, Anna and Nuesch-Germano, Melanie and Theis, Heidi and Heyckendorf, Jan and Schreiber, Stefan and Kim-Hellmuth, Sarah and Nattermann, Jacob and Skowasch, Dirk and Kurth, Ingo and Keller, Andreas and Bals, Robert and Nürnberg, Peter and Rieß, Olaf and Rosenstiel, Philip and Netea, Mihai G. and Theis, Fabian and Mukherjee, Sach and Backes, Michael and Aschenbrenner, Anna C. and Ulas, Thomas and Breteler, Monique M. B. and Giamarellos-Bourboulis, Evangelos J. and Kox, Matthijs and Becker, Matthias and Cheran, Sorin and Woodacre, Michael S. and Goh, Eng Lim and Schultze, Joachim L.
(2021)
Swarm Learning for decentralized and confidential clinical machine learning.
Nature.
Weber, Daniel and Ibrahim, Ahmad and Nemati, Hamed and Schwarz, Michael and Rossow, Christian
(2021)
Osiris: Automated Discovery of Microarchitectural Side Channels.
(In Press)
Wiegand, Boris and Klakow, Dietrich and Vreeken, Jilles
(2021)
Mining Easily Understandable Models from Complex Event Logs.
Wu, Jianliang and Wu, Ruoyu and Antonioli, Daniele and Payer, Mathias and Tippenhauer, Nils Ole and Xu, Dongyan and Tian, Dave (Jing) and Bianchi, Antonio
(2021)
LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks.
Y
Yu, Ning and Liu, Guilin and Dundar, Aysegul and Tao, Andrew and Catanzaro, Bryan and Davis, Larry and Fritz, Mario
(2021)
Dual Contrastive Loss and Attention for GANs.
Yu, Ning and Skripniuk, Vladislav and Abdelnabi, Sahar and Fritz, Mario
(2021)
Artificial Fingerprinting for Generative Models: Rooting Deepfake Attribution in Training Data.
Z
Zhang, Minxing and Ren, Zhaochun and Wang, Zihan and Ren, Pengjie and Chen, Zhumin and Hu, Pengfei and Zhang, Yang
(2021)
Membership Inference Attacks Against Recommender Systems.
Zhang, Zhikun and Wang, Tianhao and Honorio, Jean and Li, Ninghui and Backes, Michael and He, Shibo and Chen, Jiming and Zhang, Yang
(2021)
PrivSyn: Differentially Private Data Synthesis.
This list was generated on Wed Oct 9 20:39:21 2024 CEST.