Items where Year is 2022

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Author(s)/Creator(s) | Item Type | No Grouping
Number of items: 189.

Conference or Workshop Item (A Paper)

Abdelnabi, Sahar and Hasan, Rakibul and Fritz, Mario
(2022) Open-Domain, Content-Based, Multi-Modal Fact-Checking of Out-of-Context Images via Online Resources.
In: Conference on Computer Vision and Pattern Recognition.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Agarwal, Shubham
(2022) Helping or Hindering? How Browser Extensions Undermine Security.
In: The 29th ACM Conference on Computer and Communications Security (CCS), November 7-11, 2022, Los Angeles, U.S.A..
Conference: CCS ACM Conference on Computer and Communications Security
(In Press)

Aggarwal, Divesh and Döttling, Nico and Dujmovic, Jesko and Hajiabadi, Mohammad and Malavolta, Giulio and Obremski, Maciej
(2022) Algebraic Restriction Codes and their Applications.
In: 13th Innovations in Theoretical Computer Science Conference.
Conference: ITCS Innovations in Theoretical Computer Science

Alexandru, Andreea B. and Blum, Erica and Katz, Jonathan and Loss, Julian
(2022) State Machine Replication under Changing Network Conditions.
In: ASIACRYPT 2022, 5-9 December 2022, Taipei, Taiwan.
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security
(In Press)

Anagnostides, Ioannis and Lenzen, Christoph and Haeupler, Bernhard and Zuzic, Goran and Gouleakis, Themis
(2022) Almost Universally Optimal Distributed Laplacian Solvers via Low-Congestion Shortcuts.
In: DISC 2022.
Conference: DISC International Symposium on Distributed Computing (was WDAG)
(In Press)

Antonioli, Daniele and Tippenhauer, Nils Ole and Rasmussen, Kasper and Payer, Mathias
(2022) Blurtooth: Exploiting cross-transport key derivation in Bluetooth classic and Bluetooth low energy.
In: Proceedings of the ACM Asia Conference on Computer and Communications Security (ASIACCS).
Conference: ASIACCS ACM ASIA Conference on Computer and Communications Security

Bacho, Renas and Loss, Julian
(2022) On the Adaptive Security of the Threshold BLS Signature Scheme.
In: ACM SIGSAC Conference on Computer and Communications Security.
Conference: CCS ACM Conference on Computer and Communications Security
(In Press)

Backes, Michael and Berrang, Pascal and Hanzlik, Lucjan and Pryvalov, Ivan
(2022) A framework for constructing Single Secret Leader Election from MPC.
In: ESORICS 2022.
Conference: ESORICS European Symposium On Research In Computer Security
(In Press)

Ball, Marshall and Dachman-Soled, Dana and Loss, Julian
(2022) (Nondeterministic) Hardness vs. Non-Malleability.
In: CRYPTO.
Conference: CRYPTO Advances in Cryptology

Balliu, Alkida and Brandt, Sebastian and Chang, Yi-Jun and Olivetti, Dennis and Studený, Jan and Suomela, Jukka
(2022) Efficient Classification of Locally Checkable Problems in Regular Trees.
In: DISC 2022.
Conference: DISC International Symposium on Distributed Computing (was WDAG)
(Submitted)

Balliu, Alkida and Brandt, Sebastian and Fischer, Manuela and Latypov, Rustam and Maus, Yannic and Olivetti, Dennis and Uitto, Jara
(2022) Exponential Speedup Over Locality in MPC with Optimal Memory.
In: DISC 2022.
Conference: DISC International Symposium on Distributed Computing (was WDAG)
(Submitted)

Balliu, Alkida and Brandt, Sebastian and Kuhn, Fabian and Olivetti, Dennis
(2022) Distributed edge coloring in time polylogarithmic in Δ.
In: PODC 2022.
Conference: PODC ACM Symposium on Principles of Distributed Computing
(Submitted)

Balliu, Alkida and Brandt, Sebastian and Kuhn, Fabian and Olivetti, Dennis
(2022) Distributed ∆-Coloring Plays Hide-and-Seek.
In: STOC 2022.
Conference: STOC ACM Symposium on Theory of Computing
(Submitted)

Bauer, Markus and Grishchenko, Ilya and Rossow, Christian
(2022) TyPro: Forward CFI for C-Style Indirect Function Calls Using Type Propagation.
In: Annual Computer Security Applications Conference (ACSAC 2022), December 5-9, 2022, Austin, Texas, USA.
Conference: ACSAC Annual Computer Security Applications Conference
(In Press)

Baumeister, Jan and Finkbeiner, Bernd and Gumhold, Stefan and Schledjewski, Malte
(2022) Real-time Visualization of Stream-based Monitoring Data.
In: Runtime Verification 2022.
Conference: RV International Conference on Runtime Verification (was workshop pre 2010)
(In Press)

Bendrissou, Bachir and Gopinath, Rahul and Zeller, Andreas
(2022) "Synthesizing Input Grammars": A Replication Study.
In: PLDI 2022, June 2022, San Diego.
Conference: PLDI ACM-SIGPLAN Conference on Programming Language Design and Implementation
(In Press)

Bernhard, Lukas and Rodler, Michael and Holz, Thorsten and Davi, Lucas
(2022) xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64.
In: IEEE EuroS&P 2022, June 6-10, 2022, Genoa, Italy.
Conference: EuroS&P IEEE European Symposium on Security and Privacy

Bernhard, Lukas and Scharnowski, Tobias and Schloegel, Moritz and Blazytko, Tim and Holz, Thorsten
(2022) Jit-Picking: Differential Fuzzing of JavaScript Engines.
In: CCS 2022.
Conference: CCS ACM Conference on Computer and Communications Security

Beutner, Raven and Carral, David and Finkbeiner, Bernd and Hofmann, Jana and Krötzsch, Markus
(2022) Deciding Hyperproperties Combined with Functional Specifications.
In: 37th Annual ACM/IEEE Symposium on Logic in Computer Science.
Conference: LICS IEEE Symposium on Logic in Computer Science
(In Press)

Beutner, Raven and Finkbeiner, Bernd
(2022) Prophecy Variables for Hyperproperty Verification.
In: CSF 2022.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)
(In Press)

Beutner, Raven and Finkbeiner, Bernd
(2022) Software Verification of Hyperproperties Beyond k-Safety.
In: CAV 2022.
Conference: CAV Computer Aided Verification
(In Press)

Beutner, Raven and Ong, C.H. Luke and Zaiser, Fabian
(2022) Guaranteed Bounds for Posterior Inference in Universal Probabilistic Programming.
In: PLDI 2022, San Diego, CA, USA.
Conference: PLDI ACM-SIGPLAN Conference on Programming Language Design and Implementation
(In Press)

Beznosikov, Aleksandr and Dvurechensky, Pavel and Koloskova, Anastasia and Samokhin, Valentin and Stich, Sebastian U. and Gasnikov, Alexander
(2022) Decentralized Local Stochastic Extra-Gradient for Variational Inequalities.
In: NeurIPS, 28.11.2022-9.12.2022, New Orleans, USA.
Conference: NeurIPS Conference on Neural Information Processing Systems

Bhangale, Amey and Liu-Zhang, Chen-Da and Loss, Julian and Nayak, Kartik
(2022) Efficient Adaptively-Secure Byzantine Agreement for Long Messages.
In: ASIACRYPT 2022, 5-9 December 2022, Taipei, Taiwan.
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security
(In Press)

Bieringer, Lukas and Grosse, Kathrin and Backes, Michael and Biggio, Battista and Krombholz, Katharina
(2022) Industrial practitioners' mental models of adversarial machine learning.
In: USENIX Symposium on Usable Privacy and Security (SOUPS) 2022, 7-9. August, 2022, Boston, MA, USA.
Conference: SOUPS Symposium On Usable Privacy and Security

Binkhorst, Veroniek and Fiebig, Tobias and Krombholz, Katharina and Pieters, Wolter and Labunets, Katsiaryna
(2022) Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context.
In: 31st USENIX Security Symposium, Boston, MA, USA.
Conference: USENIX-Security Usenix Security Symposium

Borrello, Pietro and Kogler, Andreas and Schwarzl, Martin and Lipp, Moritz and Gruss, Daniel and Schwarz, Michael
(2022) ÆPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture.
In: USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Brakerski, Zvika and Branco, Pedro and Döttling, Nico and Pu, Sihang
(2022) Batch-OT with Optimal Rate.
In: EUROCRYPT.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Brandt, Sebastian and Chang, Yi-Jun and Grebı́k, Jan and Grunau, Christoph and Rozhoň, Václav and Vidnyánszky, Zoltán
(2022) Local Problems on Trees from the Perspectives of Distributed Algorithms, Finitary Factors, and Descriptive Combinatorics.
In: 13th Innovations in Theoretical Computer Science Conference.
Conference: ITCS Innovations in Theoretical Computer Science
(In Press)

Bringmann, Karl and Kisfaludi-Bak, Sándor and Künnemann, Marvin and Marx, Dániel and Nusser, André
(2022) Dynamic Time Warping Under Translation: Approximation Guided by Space-Filling Curves.
In: 38th International Symposium on Computational Geometry (SoCG 2022).
Conference: SEA International Symposium on Experimental Algorithms

Bund, Johannes and Lenzen, Christoph and Medina, Moti
(2022) Small Hazard-Free Transducers.
In: 13th Innovations in Theoretical Computer Science (ITCS).
Conference: ITCS Innovations in Theoretical Computer Science
(In Press)

Burkholz, Rebekka
(2022) Convolutional and Residual Networks Provably Contain Lottery Tickets.
In: International Conference on Machine Learning (ICML), 17.07.2022-23.07.2022, Baltimore.
Conference: ICML International Conference on Machine Learning

Burkholz, Rebekka
(2022) Most Activation Functions Can Win the Lottery Without Excessive Depth.
In: NeurIPS 2022.
Conference: NeurIPS Conference on Neural Information Processing Systems

Burkholz, Rebekka and Laha, Nilanjana and Mukherjee, Rajarshi and Gotovos, Alkis
(2022) On the Existence of Universal Lottery Tickets.
In: The Tenth International Conference on Learning Representations, 25-29 Apr 2022, virtual.
Conference: ICLR International Conference on Learning Representations

Böhle, Moritz and Fritz, Mario and Schiele, Bernt
(2022) B-Cos Networks: Alignment Is All We Need for Interpretability.
In: Conference on Computer Vision and Pattern Recognition, 21-24.06.2022, New Orleans, Louisiena, USA.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Can Esmer, Baris and Kulik, Ariel and Marx, Dániel and Neuen, Daniel and Sharma, Roohani
(2022) Faster Exponential-Time Approximation Algorithms Using Approximate Monotone Local Search.
In: 30th Annual European Symposium on Algorithms (ESA 2022).
Conference: ESA European Symposium on Algorithms

Chairattana-Apirom, Rutchathon and Wagner, Benedikt and Hanzlik, Lucjan and Loss, Julian and Lysyanskaya, Anna
(2022) PI-Cut-Choo and Friends: Compact Blind Signatures via Parallel Instance Cut-and-Choose and More.
In: Crypto 2022.
Conference: CRYPTO Advances in Cryptology
(In Press)

Chalopin, Jérémie and Chepoi, Victor and Mc Inerney, Fionn and Ratel, Sébastien and Vaxès, Yann
(2022) Sample Compression Schemes for Balls in Graphs.
In: MFCS 2022.
Conference: MFCS International Symposium on Mathematical Foundations of Computer Science

Chattopadhyay, Soumya and Jha, Ashwin and Nandi, Mridul
(2022) Towards Tight Security Bounds for OMAC, XCBC and TMAC.
In: ASIACRYPT 2022, 5-9 December 2022, Taipei, Taiwan.
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security
(Submitted)

Chen, Dingfan and Kerkouche, Raouf and Fritz, Mario
(2022) Private Set Generation with Discriminative Information.
In: Thirty-sixth Conference on Neural Information Processing Systems, New Orleans, Louisiena, USA.
Conference: NeurIPS Conference on Neural Information Processing Systems
(In Press)

Chen, Dingfan and Yu, Ning and Fritz, Mario
(2022) RelaxLoss: Defending Membership Inference Attacks without Losing Utility.
In: The Tenth International Conference on Learning Representations.
Conference: ICLR International Conference on Learning Representations

Chen, Min and Zhang, Zhikun and Wang, Tianhao and Backes, Michael and Humbert, Mathias and Zhang, Yang
(2022) Graph Unlearning.
In: ACM SIGSAC Conference on Computer and Communications Security, November 7-11, 2022, Los Angeles, U.S.A..
Conference: CCS ACM Conference on Computer and Communications Security
(In Press)

Chen, Yufei and Shen, Chao and Shen, Yun and Wang, Cong and Zhang, Yang
(2022) Amplifying Membership Exposure via Data Poisoning.
In: NeurIPS 2022.
Conference: NeurIPS Conference on Neural Information Processing Systems

Chen, Yufei and Shen, Chao and Wang, Cong and Zhang, Yang
(2022) Teacher Model Fingerprinting Attacks Against Transfer Learning.
In: USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Cheval, Vincent and Jacomme, Charlie and Kremer, Steve and Künnemann, Robert
(2022) SAPIC+: protocol verifiers of the world, unite!
In: USENIX Security Symposium (USENIX Security), 2022..
Conference: USENIX-Security Usenix Security Symposium
(In Press)

Chistikov, Dmitry and Majumdar, Rupak and Schepper, Philipp
(2022) Subcubic certificates for CFL reachability.
In: POPL 2022.
Conference: POPL ACM-SIGACT Symposium on Principles of Programming Languages

Choi, Wonhyuk and Finkbeiner, Bernd and Piskac, Ruzica and Santolucito, Mark
(2022) Can Reactive Synthesis and Syntax-Guided Synthesis Be Friends?
In: 43rd ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI).
Conference: PLDI ACM-SIGPLAN Conference on Programming Language Design and Implementation

Cloosters, Tobias and Willbold, Johannes and Holz, Thorsten and Davi, Lucas
(2022) SGXFuzz: Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing.
In: USENIX Security Symposium (USENIX Security), 2022..
Conference: USENIX-Security Usenix Security Symposium

Coenen, Norine and Dachselt, Raimund and Finkbeiner, Bernd and Frenkel, Hadar and Hahn, Christopher and Horak, Tom and Metzger, Niklas and Siber, Julian
(2022) Explaining Hyperproperty Violations.
In: 34th International Conference on Computer Aided Verification (CAV 22).
Conference: CAV Computer Aided Verification
(Submitted)

Coenen, Norine and Finkbeiner, Bernd and Frenkel, Hadar and Hahn, Christopher and Metzger, Niklas and Siber, Julian
(2022) Temporal Causality in Reactive Systems.
In: ATVA 2022.
Conference: ATVA International Symposium on Automated Technology for Verification and Analysis
(In Press)

Cong, Tianshuo and He, Xinlei and Zhang, Yang
(2022) SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders.
In: CCS 2022.
Conference: CCS ACM Conference on Computer and Communications Security

Coupette, Corinna and Dalleiger, Sebastian and Vreeken, Jilles
(2022) Differentially Describing Groups of Graphs.
In: AAAI Conference on Artificial Intelligence.
Conference: AAAI National Conference of the American Association for Artificial Intelligence

Cremers, Cas and Fontaine, Caroline and Jacomme, Charlie
(2022) A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols.
In: 43rd IEEE Symposium on Security and Privacy..
Conference: SP IEEE Symposium on Security and Privacy

Cremers, Cas and Jacomme, Charlie and Lukert, Philip
(2022) Subterm-based proof techniques for improving the automation and scope of security protocol analysis.
In: CSF 2023, July 10 - 14, 2023, Dubrovnik, Croatia.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Cremers, Cas and Naor, Moni and Paz, Shahar and Ronen, Eyal
(2022) CHIP and CRISP: Protecting All Parties Against Compromise through Identity-Binding PAKEs.
In: CRYPTO 2022.
Conference: CRYPTO Advances in Cryptology

Dalleiger, Sebastian and Vreeken, Jilles
(2022) Discovering Significant Patterns under Sequential False Discovery Control.
In: ACM SIGKDD Conference on Knowledge Discovery and Data Mining.
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Dalleiger, Sebastian and Vreeken, Jilles
(2022) Efficiently Factorizing Boolean Matrices using Proximal Gradient Descent.
In: Advances in Neural Information Processing Systems.
Conference: NeurIPS Conference on Neural Information Processing Systems

Demir, Nurullah and Große-Kampmann, Matteo and Urban, Tobias and Wresnegger, Christian and Holz, Thorsten and Pohlmann, Norbert
(2022) Reproducibility and Replicability of Web Measurement Studies.
In: TheWebConf 2022.
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Doron-Arad, Ilan and Kulik, Ariel and Shachnai, Hadas
(2022) An EPTAS for Budgeted Matroid Independent Set.
In: SIAM Symposium on Simplicity in Algorithms (SOSA23).
Conference: UNSPECIFIED
(In Press)

Döttling, Nico and Dujmovic, Jesko
(2022) Maliciously Circuit-Private FHE from Information-Theoretic Principles.
In: 3rd Conference on Information-Theoretic Cryptography (ITC 2022), Boston, MA, USA.
Conference: UNSPECIFIED

Easdon, Catherine and Schwarz, Michael and Schwarzl, Martin and Gruss, Daniel
(2022) Rapid Prototyping for Microarchitectural Attacks.
In: 31st USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Erba, Alessandro and Müller, Anne and Tippenhauer, Nils Ole
(2022) Security Analysis of Vendor Implementations of the OPC UA Protocol for Industrial Control Systems.
In: 4th Workshop on CPS & IoT Security and Privacy (CPSIoTSec '22), November 7, 2022, Los Angeles, CA, USA.
Conference: UNSPECIFIED

Erba, Alessandro and Tippenhauer, Nils Ole
(2022) Assessing Model-free Anomaly Detection in Industrial Control Systems Against Generic Concealment Attacks.
In: Proceedings of the Annual Computer Security Applications Conference (ACSAC).
Conference: ACSAC Annual Computer Security Applications Conference

Esmer, Baris Can and Kulik, Ariel and Marx, Dániel and Schepper, Philipp and Węgrzycki, Karol
(2022) Computing Generalized Convolutions Faster Than Brute Force.
In: 17th International Symposium on Parameterized and Exact Computation (IPEC 2022).
Conference: IPEC International Symposium on Parameterized and Exact Computation (was IWPEC pre 2004)
(In Press)

Esmer, Baris Can and Kulik, Ariel and Marx, Dániel and Schepper, Philipp and Węgrzycki, Karol
(2022) Computing Generalized Convolutions Faster Than Brute Force.
In: 17th International Symposium on Parameterized and Exact Computation (IPEC 2022).
Conference: IPEC International Symposium on Parameterized and Exact Computation (was IWPEC pre 2004)
(In Press)

Esmer, Baris Can and Nakos, Vasileios
(2022) On (1+ϵ)-Approximate Block Sparse Recovery.
In: ISIT 2022.
Conference: ISIT IEEE International Symposium on Information Theory
(Submitted)

Fabian, Xaver and Guarnieri, Marco and Patrignani, Marco
(2022) Automatic Detection of Speculative Execution Combinations.
In: CCS 2022, 7-11 Nov 2022, Los Angeles, CA, USA.
Conference: CCS ACM Conference on Computer and Communications Security
(In Press)

Fassl, Matthias and Anell, Simon and Houy, Sabine and Lindorfer, Martina and Krombholz, Katharina
(2022) Comparing User Perceptions of Anti-Stalkerware Apps with the Technical Reality.
In: The Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), Boston, MA, USA.
Conference: SOUPS Symposium On Usable Privacy and Security

Feneuil, Thibauld and Joux, Antoine and Rivain, Matthieu
(2022) Syndrome Decoding in the Head: Shorter Signatures from Zero-Knowledge Proofs.
In: Crypto 2022.
Conference: CRYPTO Advances in Cryptology

Finkbeiner, Bernd and Gieseking, Manuel and Hecking-Harbusch, Jesko and Olderog, Ernst-Rüdiger
(2022) Global Winning Conditions in Synthesis of Distributed Systems with Causal Memory.
In: 30th EACSL Annual Conference on Computer Science Logic (CSL 2022).
Conference: CSL Annual Conference on Computer Science Logic

Finkbeiner, Bernd and Heim, Philippe and Passing, Noemi
(2022) Temporal Stream Logic modulo Theories.
In: ETAPS 2022, Apr 2022, Munich.
Conference: FOSSACS Foundations of Software Science and Computational Structures

Finkbeiner, Bernd and Mallik, Kaushik and Passing, Noemi and Schledjewski, Malte and Schmuck, Anne-Kathrin
(2022) BOCoSy: Small but Powerful Symbolic Output-Feedback Control.
In: 25th ACM International Conference on Hybrid Systems: Computation and Control.
Conference: HSCC ACM International Conference on Hybrid Systems: Computation and Control

Finkbeiner, Bernd and Metzger, Niklas and Moses, Yoram
(2022) Information Flow Guided Synthesis.
In: 34th International Conference on Computer Aided Verification (CAV 22), August 7-10, 2022, Haifa, Israel.
Conference: CAV Computer Aided Verification
(Unpublished)

Finkbeiner, Bernd and Passing, Noemi
(2022) Synthesizing Dominant Strategies for Liveness.
In: 42nd IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science.
Conference: FST&TCS Foundations of Software Technology and Theoretical Computer Science
(In Press)

Fischer, Jonas and Burkholz, Rebekka
(2022) Plant 'n' Seek: Can You Find the Winning Ticket?
In: The Tenth International Conference on Learning Representations.
Conference: ICLR International Conference on Learning Representations

Fisman, Dana and Frenkel, Hadar and Zilles, Sandra
(2022) Inferring Symbolic Automata.
In: CSL.
Conference: CSL Annual Conference on Computer Science Logic

Focke, Jacob and Goldberg, Leslie Ann and Roth, Marc and Živný, Stanislav
(2022) Approximately Counting Answers to Conjunctive Queries with Disequalities and Negations.
In: PODS '22.
Conference: PODS ACM SIGMOD-SIGACT-SIGART Conference on Principles of Database Systems

Focke, Jacob and Marx, Dániel and Rzążewski, Paweł
(2022) Counting list homomorphisms from graphs of bounded treewidth: tight complexity bounds.
In: SODA 2022 - ACM/SIAM Symposium on Discrete Algorithms.
Conference: SODA ACM/SIAM Symposium on Discrete Algorithms

Focke, Jacob and Roth, Marc
(2022) Counting Small Induced Subgraphs with Hereditary Properties.
In: STOC 2022.
Conference: STOC ACM Symposium on Theory of Computing

Frei, Marc and Kwon, Jonghoon and Seyedali, Tabaeiaghdaei and Wyss, Marc and Lenzen, Christoph and Perrig, Adrian
(2022) G-SINC: Global Synchronization Infrastructure for Network Clocks.
In: SRDS 2022.
Conference: SRDS Symposium on Reliable Distributed Systems

Galby, Esther and Khazaliya, Liana and Mc Inerney, Fionn and Sharma, Roohani and Tale, Prafullkumar
(2022) Metric Dimension Parameterized by Feedback Vertex Set and Other Structural Parameters.
In: MFCS 2022.
Conference: MFCS International Symposium on Mathematical Foundations of Computer Science

Galby, Esther and Marx, Dániel and Schepper, Philipp and Sharma, Roohani and Tale, Prafullkumar
(2022) Domination and Cut Problems on Chordal Graphs with Bounded Leafage.
In: 17th International Symposium on Parameterized and Exact Computation (IPEC 2022).
Conference: IPEC International Symposium on Parameterized and Exact Computation (was IWPEC pre 2004)
(In Press)

Galby, Esther and Marx, Dániel and Schepper, Philipp and Sharma, Roohani and Tale, Prafullkumar
(2022) Parameterized Complexity of Weighted Multicut in Trees.
In: 48th International Workshop on Graph-Theoretic Concepts in Computer Science (WG2022).
Conference: WG International Workshop on Graph-Theoretic Concepts in Computer Science

Geisler, Simon and Sommer, Johanna and Schuchardt, Jan and Bojchevski, Aleksandar and Günnemann, Stephan
(2022) Generalization of Neural Combinatorial Solvers Through the Lens of Adversarial Robustness.
In: ICLR.
Conference: ICLR International Conference on Learning Representations

Giner, Lukas and Kogler, Andreas and Canella, Claudio and Schwarz, Michael and Gruss, Daniel
(2022) Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX.
In: 31st USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Grunau, Christoph and Rozhoň, Václav and Brandt, Sebastian
(2022) The landscape of distributed complexities on trees and beyond.
In: PODC 2022.
Conference: PODC ACM Symposium on Principles of Distributed Computing
(Submitted)

Gupta, Abhilash and Gopinath, Rahul and Zeller, Andreas
(2022) CLIFuzzer: Mining Grammars for Command-Line Invocations.
In: ESEC/FSE 2022, Singapore.
Conference: ESEC/FSE European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (formerly listed as ESEC)

Gutfleisch, Marco and Klemmer, Jan H. and Busch, Niklas and Acar, Yasemin and Sasse, M. Angela and Fahl, Sascha
(2022) How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study.
In: 43rd IEEE Symposium on Security and Privacy (S&P '22).
Conference: SP IEEE Symposium on Security and Privacy

Hamid Reza, Ghaeini and Nils Ole, Tippenhauer
(2022) Smooth Transition of Vehicles' Maximum Speed for Lane Detection based on Computer Vision.
In: 2022 IEEE 96th Vehicular Technology Conference, 26-29 Sep 2022, London and Beijing.
Conference: VTC IEEE Vehicular Technology Conference
(In Press)

Han, Yi and Chan, Matthew and Aref, Zahra and Tippenhauer, Nils Ole and Zonouz, Saman
(2022) Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow Monitoring.
In: USENIX Security Symposium (USENIX Security).
Conference: USENIX-Security Usenix Security Symposium

Hantke, Florian and Stock, Ben
(2022) HTML Violations and Where to Find Them: A Longitudinal Analysis of Specification Violations in HTML.
In: ACM Internet Measurement Conference.
Conference: IMC Internet Measurement Conference

Hanzlik, Lucjan and Kluczniak, Kamil
(2022) Explainable Arguments.
In: FC 2022.
Conference: FC Financial Cryptography and Data Security Conference
(In Press)

Hasan, Rakibul and Fritz, Mario
(2022) Understanding Utility and Privacy of Demographic Data in Education Technology by Causal Analysis and Adversarial-Censoring.
In: Privacy Enhancing Technologies.
Conference: PETS Privacy Enhancing Technologies Symposium (was International Workshop of Privacy Enhancing Technologies)

Hasan, Rakibul and Siegel, Rudolf and Weil, Rebecca and Krombholz, Katharina
(2022) Developing a Psychometric Scale to Measure One’s Valuation of Other People’s Privacy.
In: Eighteenth Symposium on Usable Privacy and Security, 08.08 - 09.08.2022, Boston, MA.
Conference: SOUPS Symposium On Usable Privacy and Security

Hedderich, M and Fischer, Jonas and Klakow, Dietrich and Vreeken, Jilles
(2022) Label-Descriptive Patterns and their Application to Characterizing Classification Errors.
In: International Conference on Machine Learning (ICML).
Conference: ICML International Conference on Machine Learning

Hetterich, Lorenz and Schwarz, Michael
(2022) Branch Different - Spectre Attacks on Apple Silicon.
In: DIMVA.
Conference: DIMVA GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment

Huaman, Nicolas and Krause, Alexander and Wermke, Dominik and Klemmer, Jan H. and Stransky, Christian and Acar, Yasemin and Fahl, Sascha
(2022) If You Can’t Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers.
In: Eighteenth Symposium on Usable Privacy and Security, 08.08 - 09.08.2022, Boston, MA.
Conference: SOUPS Symposium On Usable Privacy and Security

Huang, Hai and Zhang, Zhikun and Shen, Yun and Backes, Michael and Li, Qi and Zhang, Yang
(2022) On the Privacy Risks of Cell-Based NAS Architectures.
In: CCS 2022.
Conference: CCS ACM Conference on Computer and Communications Security

Ibrahim, Ahmad and Nemati, Hamed and Schlüter, Till and Tippenhauer, Nils Ole and Rossow, Christian
(2022) Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels.
In: CCS 2022, 7-11 Nov 2022, Los Angeles, CA, USA.
Conference: CCS ACM Conference on Computer and Communications Security

Jacobs, Swen and Sakr, Mouhammad and Völp, Marcus
(2022) Automatic Repair and Deadlock Detection for Parameterized Systems.
In: Formal Methods in Computer-Aided Design 2022.
Conference: FMCAD Formal Methods in Computer-Aided Design
(In Press)

Kalofolias, Janis and Vreeken, Jilles
(2022) Naming the most Anomalous Cluster in Hilbert Space for Structures with Attribute Information.
In: AAAI Conference on Artificial Intelligence.
Conference: AAAI National Conference of the American Association for Artificial Intelligence

Karvandi, Mohammad Sina and Gholamrezaei, MohammadHossein and Monfared, Saleh Khalaj and Meghdadizanjani, Soroush and Abbassi, Behrooz and Amini, Ali and Mortazavi, Reza and Gorgin, Saeid and Rahmati, Dara and Schwarz, Michael
(2022) HyperDbg: Reinventing Hardware-Assisted Debugging.
In: CCS.
Conference: CCS ACM Conference on Computer and Communications Security

Kastner, Julia and Loss, Julian and Xu, Jiayu
(2022) The Abe-Okamoto Partially Blind Signature Scheme Revisited.
In: ASIACRYPT 2022, 5-9 December 2022, Taipei, Taiwan.
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security
(In Press)

Kaur, Harjot and Amft, Sabrina and Votipka, Daniel and Acar, Yasemin and Fahl, Sascha
(2022) Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples.
In: 31st USENIX Security Symposium, August 10-12, 2022, Boston, MA, USA.
Conference: USENIX-Security Usenix Security Symposium

Kepkowski, Michal and Hanzlik, Lucjan and Wood, Ian D. and Kaafar, Mohamed Ali
(2022) How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy.
In: 22nd Privacy Enhancing Technologies Symposium (PETS 2022).
Conference: PETS Privacy Enhancing Technologies Symposium (was International Workshop of Privacy Enhancing Technologies)
(In Press)

Khodayari, Soheil and Pellegrino, Giancarlo
(2022) The State of the SameSite: Studying the Usage, Effectiveness, and Adequacy of SameSite Cookies.
In: 43rd IEEE Symposium on Security and Privacy (S&P '22).
Conference: SP IEEE Symposium on Security and Privacy

Klein, David and Barber, Thomas and Bensalim, Souphiane and Stock, Ben and Johns, Martin
(2022) Hand Sanitizers in the Wild: A Large-scale Study of Custom JavaScript Sanitizer Functions.
In: IEEE European Symposium on Security and Privacy.
Conference: EuroS&P IEEE European Symposium on Security and Privacy

Kluczniak, Kamil
(2022) Lockable Obfuscation from Circularly Insecure Fully Homomorphic Encryption.
In: PKC 2022: Public-Key Cryptography.
Conference: PKC International Conference on Practice and Theory in Public Key Cryptography

Kluczniak, Kamil
(2022) NTRU-$\nu$-um: Secure Fully Homomorphic Encryption from NTRU with Small Modulus.
In: CCS 2022.
Conference: CCS ACM Conference on Computer and Communications Security
(In Press)

Kogler, Andreas and Gruss, Daniel and Schwarz, Michael
(2022) Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks.
In: 31st USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Kogler, Andreas and Weber, Daniel and Haubenwallner, Martin and Lipp, Moritz and Gruss, Daniel and Schwarz, Michael
(2022) Finding and Exploiting CPU Features using MSR Templating.
In: 43rd IEEE Symposium on Security and Privacy (S&P '22).
Conference: SP IEEE Symposium on Security and Privacy

Koloskova, Anastasia and Stich, Sebastian U. and Jaggi, Martin
(2022) Sharper Convergence Guarantees for Asynchronous SGD for Distributed and Federated Learning.
In: NeurIPS, 28.11.2022-9.12.2022, New Orleans, USA.
Conference: NeurIPS Conference on Neural Information Processing Systems

Krupp, Johannes and Grishchenko, Ilya and Rossow, Christian
(2022) AmpFuzz: Fuzzing for Amplification DDoS Vulnerabilities.
In: USENIX Security Symposium (USENIX Security), 2022..
Conference: USENIX-Security Usenix Security Symposium

Kruse, Matthis and Patrignani, Marco
(2022) Composing Secure Compilers.
In: ACM SIGPLAN Workshop on Principles of Secure Compilation, 2022, Sun 16 - Fri 28 January 2022, Philadelphia, Pennsylvania, United States.
Conference: PriSC Workshop on Principles of Secure Compilation

Lenzen, Christoph and Loss, Julian
(2022) Optimal Clock Synchronization with Signatures.
In: 2022 ACM PODC.
Conference: PODC ACM Symposium on Principles of Distributed Computing

Lenzen, Christoph and Sheikholeslami, Sahar
(2022) A Recursive Early-Stopping Phase King Protocol.
In: ACM Symposium on Principles of Distributed Computing 2022, July 25-29, 2022, Salermo, Italy.
Conference: PODC ACM Symposium on Principles of Distributed Computing
(Submitted)

Li, Zheng and Liu, Yiyong and He, Xinlei and Yu, Ning and Backes, Michael and Zhang, Yang
(2022) Auditing Membership Leakages of Multi-Exit Networks.
In: CCS 2022.
Conference: CCS ACM Conference on Computer and Communications Security

Lipp, Moritz and Gruss, Daniel and Schwarz, Michael
(2022) AMD Prefetch Attacks through Power and Time.
In: 31st USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Liu, Yiyong and Zhao, Zhengyu and Backes, Michael and Zhang, Yang
(2022) Membership Inference Attacks by Exploiting Loss Trajectory.
In: CCS 2022.
Conference: CCS ACM Conference on Computer and Communications Security

Liu, Yugeng and Wen, Rui and He, Xinlei and Salem, Ahmed and Zhang, Zhikun and Backes, Michael and De Cristofaro, Emiliano and Fritz, Mario and Zhang, Yang
(2022) ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models.
In: USENIX Security Symposium (USENIX Security), 2022..
Conference: USENIX-Security Usenix Security Symposium
(In Press)

Mai, Alexandra and Guelmino, Leonard and Pfeffer, Katharina and Weippl, Edgar and Krombholz, Katharina
(2022) Mental Models of the Internet and Its Online Risks: Children and Their Parent(s).
In: HCI-CPT: 4th International Conference on HCI for Cybersecurity, Privacy an Trust.
Conference: UNSPECIFIED

Mai, Alexandra and Schedler, Oliver and Weippl, Edgar and Krombholz, Katharina
(2022) Are HTTPS Configurations Still a Challenge?: Validating Theories of Administrators’ Difficulties with TLS Configurations.
In: HCI-CPT: 4th International Conference on HCI for Cybersecurity, Privacy and Trust.
Conference: UNSPECIFIED

Mameche, Sara and Kaltenpoth, David and Vreeken, Jilles
(2022) Discovering Invariant and Changing Mechanisms from Data.
In: KDD [ACM International Conference on Knowledge Discovery and Data Mining].
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Marx, Alexander and Vreeken, Jilles
(2022) Formally Justifying MDL-based Inference of Cause and Effect.
In: AAAI Workshop on Information-Theoretic Causal Inference and Discovery (ITCI'22).
Conference: AAAI National Conference of the American Association for Artificial Intelligence

Marx, Dániel and Misra, Pranabendu and Neuen, Daniel and Tale, Prafullkumar
(2022) A Framework for Parameterized Subexponential Algorithms for Generalized Cycle Hitting Problems on Planar Graphs.
In: UNSPECIFIED.
Conference: SODA ACM/SIAM Symposium on Discrete Algorithms
(Submitted)

Marx, Dániel and Sankar, Govind and Schepper, Philipp
(2022) Anti-Factor is FPT Parameterized by Treewidth and List Size (but Counting is Hard).
In: 17th International Symposium on Parameterized and Exact Computation (IPEC 2022).
Conference: IPEC International Symposium on Parameterized and Exact Computation (was IWPEC pre 2004)
(In Press)

Mishchenko, Konstantin and Malinovsky, Grigory and Stich, Sebastian U. and Richtarik, Peter
(2022) ProxSkip: Yes! Local Gradient Steps Provably Lead to Communication Acceleration! Finally!
In: International Conference on Machine Learning (ICML).
Conference: ICML International Conference on Machine Learning

Mohtashami, Amirkeivan and Jaggi, Martin and Stich, Sebastian U.
(2022) Masked Training of Neural Networks with Partial Gradients.
In: AISTATS 2022, 28 Mar - 30 Mar 2022, online.
Conference: AISTATS International Conference on Artificial Intelligence and Statistics
(In Press)

Mosier, Nicholas and Lachnitt, Hanna and Nemati, Hamed and Trippel, Caroline
(2022) Axiomatic hardware-software contracts for security.
In: The 49th International Symposium on Computer Architecture..
Conference: ISCA ACM International Symposium on Computer Architecture

Mujkanovic, Felix and Geisler, Simon and Günnemann, Stephan and Bojchevski, Aleksandar
(2022) Are Defenses for Graph Neural Networks Robust?
In: NeurIPS.
Conference: NeurIPS Conference on Neural Information Processing Systems

Neuen, Daniel
(2022) Isomorphism Testing for Graphs Excluding Small Topological Subgraphs.
In: UNSPECIFIED.
Conference: SODA ACM/SIAM Symposium on Discrete Algorithms
(Submitted)

Nguyen, Trung Tin and Backes, Michael and Stock, Ben
(2022) Freely Given Consent? Studying Consent Notice of Third-Party Tracking and Its Violations of GDPR in Android Apps.
In: The 29th ACM Conference on Computer and Communications Security (CCS), November 7-11, 2022, Los Angeles, U.S.A..
Conference: CCS ACM Conference on Computer and Communications Security
(In Press)

Pan, Jiaxin and Wagner, Benedikt
(2022) Lattice-based Signatures with Tight Adaptive Corruptions and More.
In: PKC.
Conference: PKC International Conference on Practice and Theory in Public Key Cryptography

Pfeffer, Katharina and Mai, Alexandra and Weippl, Edgar and Rader, Emilee and Krombholz, Katharina
(2022) Replication: Stories as Informal Lessons about Security.
In: USENIX Symposium on Usable Privacy and Security (SOUPS) 2022, 7-9. August, 2022, Boston, MA, USA.
Conference: SOUPS Symposium On Usable Privacy and Security

Rahimian, Shadi and Kerkouche, Raouf and Kurth, Ina and Fritz, Mario
(2022) Practical Challenges in Differentially-Private Federated Survival Analysis of Medical Data.
In: Conference on Health, Inference, and Learning, April 7-8, 2022, Virtual.
Conference: UNSPECIFIED

Rokicki, Thomas and Maurice, Clémentine and Schwarz, Michael
(2022) CPU Port Contention Without SMT.
In: ESORICS 2022.
Conference: ESORICS European Symposium On Research In Computer Security

Roth, Sebastian and Calzavara, Stefano and Wilhelm, Moritz and Rabitti, Alvise and Stock, Ben
(2022) The Security Lottery: Measuring Client-Side Web Security Inconsistencies.
In: 31st USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Ruffing, Tim and Ronge, Viktoria and Jin, Elliott and Schneider-Bensch, Jonas and Schröder, Dominique
(2022) ROAST: Robust Asynchronous Schnorr Threshold Signatures.
In: CCS 2022.
Conference: CCS ACM Conference on Computer and Communications Security

Ruth, Kimberly and Fass, Aurore and Azose, Jonathan and Pearson, Mark and Thomas, Emma and Sadowski, Caitlin and Durumeric, Zakir
(2022) A World Wide View of Browsing the World Wide Web.
In: IMC (ACM Internet Measurement Conference).
Conference: IMC ACM Internet Measurement Conference

Salem, Ahmed and Backes, Michael and Zhang, Yang
(2022) Get a Model! Model Hijacking Attack Against Machine Learning Models.
In: NDSS 2022, 24 - 28 April 2022, San Diego, California.
Conference: NDSS Network and Distributed System Security Symposium

Salem, Ahmed and Wen, Rui and Backes, Michael and Ma, Shiqing and Zhang, Yang
(2022) Dynamic Backdoor Attacks Against Machine Learning Models.
In: EuroS&P 2022.
Conference: EuroS&P IEEE European Symposium on Security and Privacy

Scharnowski, Tobias and Bars, Nils and Schloegel, Moritz and Gustafson, Eric and Muench, Marius and Vigna, Giovanni and Kruegel, Christopher and Holz, Thorsten and Abbasi, Ali
(2022) Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing.
In: 31st USENIX Security Symposium (USENIX Security 22).
Conference: USENIX-Security Usenix Security Symposium

Schlögel, Moritz and Blazytko, Tim and Contag, Moritz and Aschermann, Cornelius and Basler, Julius and Holz, Thorsten and Abbasi, Ali
(2022) Loki: Hardening Code Obfuscation Against Automated Attacks.
In: USENIX Security Symposium (USENIX Security), 2022..
Conference: USENIX-Security Usenix Security Symposium

Scholten, Yan and Schuchardt, Jan and Geisler, Simon and Bojchevski, Aleksandar and Günnemann, Stephan
(2022) Randomized Message-Interception Smoothing: Gray-box Certificates for Graph Neural Networks.
In: NeurIPS.
Conference: NeurIPS Conference on Neural Information Processing Systems

Schumilo, Sergej and Aschermann, Cornelius and Jemmett, Andrea and Abbasi, Ali and Holz, Thorsten
(2022) Nyx-Net: Network Fuzzing with Incremental Snapshots.
In: EuroSys 2022, April 5-8, 2022, Rennes, France.
Conference: EuroSys Eurosys Conference

Schwarz, Fabian
(2022) TrustedGateway: TEE-Assisted Routing and Firewall Enforcement Using ARM TrustZone.
In: 25th International Symposium on Research in Attacks, Intrusions and Defenses, 26-28 Oct 2022, Limassol, Cyprus.
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)
(In Press)

Schwarz, Fabian and Do, Khue and Heide, Gunnar and Hanzlik, Lucjan and Rossow, Christian
(2022) FeIDo: Recoverable FIDO2 Tokens Using Electronic IDs.
In: 29th ACM Conference on Computer and Communications Security (CCS), 7-11 Nov 2022, Los Angeles, U.S.A..
Conference: CCS ACM Conference on Computer and Communications Security
(In Press)

Schwarzl, Martin and Borrello, Pietro and Kogler, Andreas and Varda, Kenton and Schuster, Thomas and Gruss, Daniel and Schwarz, Michael
(2022) Robust and Scalable Process Isolation against Spectre in the Cloud.
In: ESORICS.
Conference: ESORICS European Symposium On Research In Computer Security

Shen, Xinyue and He, Xinlei and Backes, Michael and Blackburn, Jeremy and Zannettou, Savvas and Zhang, Yang
(2022) On Xing Tian and the Perseverance of Anti-China Sentiment Online.
In: ICWSM 2022.
Conference: ICWSM International Conference on Web and Social Media

Shen, Yun and Han, Yufei and Zhang, Zhikun and Chen, Min and Yu, Ting and Backes, Michael and Zhang, Yang and Stringhini, Gianluca
(2022) Finding MNEMON: Reviving Memories of Node Embeddings.
In: The 29th ACM Conference on Computer and Communications Security (CCS), November 7-11, 2022, Los Angeles, U.S.A..
Conference: CCS ACM Conference on Computer and Communications Security
(In Press)

Shen, Yun and He, Xinlei and Han, Yufei and Zhang, Yang
(2022) Model Stealing Attacks Against Inductive Graph Neural Networks.
In: S&P 2022.
Conference: SP IEEE Symposium on Security and Privacy

Si, Wai Man and Backes, Michael and Blackburn, Jeremy and De Cristofaro, Emiliano and Stringhini, Gianluca and Zannettou, Savvas and Zhang, Yang
(2022) Why So Toxic? Measuring and Triggering Toxic Behavior in Open-Domain Chatbots.
In: CCS 2022.
Conference: CCS ACM Conference on Computer and Communications Security

Singh, Mridula and Roeschlin, Marc and Ranganathan, Aanjhan and Capkun, Srdjan
(2022) V-Range: Enabling Secure Ranging in 5G Wireless Networks.
In: NDSS 2022, 24 - 28 April 2022, San Diego, California.
Conference: NDSS Network and Distributed System Security Symposium
(In Press)

Smytzek, Marius and Zeller, Andreas
(2022) SFLKit: A Workbench for Statistical Fault Localization.
In: ESEC/FSE 2022.
Conference: ESEC/FSE European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (formerly listed as ESEC)
(In Press)

Steinhöfel, Dominic and Zeller, Andreas
(2022) Input Invariants.
In: Technical Track, 2022.
Conference: ESEC/FSE European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (formerly listed as ESEC)

Stolz, Peter and Roth, Sebastian and Stock, Ben
(2022) To hash or not to hash: A security assessment of CSP’s unsafe-hashes expression.
In: SecWeb Workshop, May 26, 2022, San Francisco.
Conference: IEEE SPW IEEE Symposium on Security and Privacy Workshops

Stransky, Christian and Wiese, Oliver and Roth, Volker and Acar, Yasemin and Fahl, Sascha
(2022) 27 Years and 81 Million Opportunities Later: Investigating the Use of Email Encryption for an Entire University.
In: 43rd IEEE Symposium on Security and Privacy.
Conference: SP IEEE Symposium on Security and Privacy

Tang, Dang and Duong, Dung Hoang and Joux, Antoine and Plantard, Thomas and Qiao, Youming and Susilo, Willy
(2022) Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms.
In: Eurocrypt'2022.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Trampert, Leon and Rossow, Christian and Schwarz, Michael
(2022) Browser-based CPU Fingerprinting.
In: 27th European Symposium on Research in Computer Security (ESORICS) 2022, 26-30 Sep 2022, Copenhagen, Denmark.
Conference: ESORICS European Symposium On Research In Computer Security
(In Press)

Tsimos, Georgios and Loss, Julian and Papamanthou, Charalampos
(2022) Gossiping for Communication-Efficient Broadcast.
In: CRYPTO 2022.
Conference: CRYPTO Advances in Cryptology
(In Press)

Wang, Hui-Po and Stich, Sebastian U. and He, Yang and Fritz, Mario
(2022) ProgFed: Effective, Communication, and Computation Efficient Federated Learning by Progressive Training.
In: International Conference on Machine Learning (ICML), 19.7.2022 - 21.7.2022, Baltimore, USA.
Conference: ICML International Conference on Machine Learning

Wermke, Dominik and Wöhler, Noah and Klemmer, Jan H. and Fourné, Marcel and Acar, Yasemin and Fahl, Sascha
(2022) Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects.
In: 43rd IEEE Symposium on Security and Privacy.
Conference: SP IEEE Symposium on Security and Privacy

Wiegand, Boris and Klakow, Dietrich and Vreeken, Jilles
(2022) Discovering Interpretable Data-to-Sequence Generators.
In: AAAI Conference on Artificial Intelligence.
Conference: AAAI National Conference of the American Association for Artificial Intelligence

Wüst, Karl and Kostiainen, Kari and Delius, Noah and Capkun, Srdjan
(2022) Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy-Preserving Regulation.
In: 29th ACM Conference on Computer and Communications Security (CCS), 7-11 Nov 2022, Los Angeles, U.S.A..
Conference: CCS ACM Conference on Computer and Communications Security

Xu, Sascha and Mian, Osman and Vreeken, Jilles
(2022) Inferring Cause and Effect in the Presence of Heteroscedastic Noise.
In: ICML.
Conference: ICML International Conference on Machine Learning

Yu, Ning and Skripniuk, Vladislav and Chen, Dingfan and Davis, Larry S. and Fritz, Mario
(2022) Responsible Disclosure of Generative Models Using Scalable Fingerprinting.
In: The Tenth International Conference on Learning Representations, Virtual.
Conference: ICLR International Conference on Learning Representations

Zhang, Zhikun and Chen, Min and Backes, Michael and Shen, Yun and Zhang, Yang
(2022) Inference Attacks Against Graph Neural Networks.
In: 31st USENIX Security Symposium, August 10-12, 2022, Boston, MA, USA.
Conference: USENIX-Security Usenix Security Symposium

Zhou, Junhao and Chen, Yufei and Shen, Chao and Zhang, Yang
(2022) Property Inference Attacks Against GANs.
In: NDSS 2022, 24 - 28 April 2022, San Diego, California.
Conference: NDSS Network and Distributed System Security Symposium

Article

Balliu, Alkida and Brandt, Sebastian and Chang, Yi-Jun and Olivetti, Dennis and Studený, Jan and Suomela, Jukka and Tereshchenko, Aleksandr
(2022) Locally Checkable Problems in Rooted Trees.
Distributed Computing. ISSN 0178-2770

Ben Guebila, Marouen and Weighill, Deborah and Lopes-Ramos, Camila M. and Burkholz, Rebekka and Pop, Romana T. and Palepu, Kalyan and Shapoval, Mia and Fagny, Maud and Schlauch, Daniel and Glass, Kimberly and Altenbuchinger, Michael and Kuijjer, Marieke and Platig, John and Quackenbush, John
(2022) An online notebook resource for reproducible inference, analysis and publication of gene regulatory networks.
Nature Methods. ISSN 1548-7091

Bensmail, Julien and Fioravantes, Foivos and Mc Inerney, Fionn and Nisse, Nicolas
(2022) The Largest Connected Subgraph Game.
Algorithmica, 84 (9). pp. 2533-2555. ISSN 0178-4617

Bensmail, Julien and Mc Inerney, Fionn
(2022) On a vertex-capturing game.
Theoretical Computer Science, 923. pp. 27-46. ISSN 0304-3975

Bharadwaj, Suda and Dimitrova, Rayna and Quattrociocchi, Jesse and Topcu, Ufuk
(2022) Synthesis of Strategies for Autonomous Surveillance on Adversarial Targets.
Robotics and Autonomous Systems, 153. ISSN 0921-8890

Biewer, Sebastian and Dimitrova, Rayna and Fries, Michael and Gazda, Maciej and Heinze, Thomas and Hermanns, Holger and Mousavi, Mohammad Reza
(2022) Conformance Relations and Hyperproperties for Doping Detection in Time and Space.
Logical Methods in Computer Science, 18 (1).

Cueppers, Joscha and Kalofolias, Janis and Vreeken, Jilles
(2022) Omen: discovering sequential patterns with reliable prediction delays.
Knowledge and Information Systems. ISSN 0219-1377

Di Tizio, Giorgio and Speicher, Patrick and Simeonovski, Milivoj and Backes, Michael and Stock, Ben and Künnemann, Robert
(2022) Pareto-Optimal Defenses for the Web Infrastructure: Theory and Practice.
ACM Transactions on Privacy and Security, 1 (1). ISSN 2471-2566

Finkbeiner, Bernd and Fränzle, Martin and Kohn, Florian and Kröger, Paul
(2022) A Truly Robust Signal Temporal Logic: Monitoring Safety Properties of Interacting Cyber-Physical Systems under Uncertain Observation.
Algorithms, 15 (4).

Finkbeiner, Bernd and Geier, Gideon and Passing, Noemi
(2022) Specification decomposition for reactive synthesis.
Innovations in Systems and Software Engineering.

Finkbeiner, Bernd and Klein, Felix and Metzger, Niklas
(2022) Live synthesis.
Innovations in Systems and Software Engineering. ISSN 1614-5046

Finkbeiner, Bernd and Passing, Noemi
(2022) Compositional synthesis of modular systems.
Innovations in Systems and Software Engineering.

Frenkel, Hadar and Grumberg, Orna and Pasareanu, Corina and Sheinvald, Sarai
(2022) Assume, Guarantee or Repair - A Regular Framework for Non Regular Properties.
International Journal on Software Tools for Technology Transfer. ISSN 1433-2779

Havrikov, Nikolas and Kampmann, Alexander and Zeller, Andreas
(2022) From Input Coverage to Code Coverage: Systematically Covering Input Structure with k-Paths.
ACM Transactions on Software Engineering and Methodology. ISSN 1049-331X
(Submitted)

Jha, Ashwin and Nandi, Mridul
(2022) A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF.
Entropy, 24 (4). pp. 462-496. ISSN 1099-4300

Joux, Antoine and Pierrot, Cécile
(2022) Algorithmic aspects of elliptic bases in finite field discrete logarithm algorithms.
Advances in Mathematics of Communications. ISSN 1930-5346

Marx, Dániel and Sandeep, R.B.
(2022) Incompressibility of H-free edge modification problems: Towards a dichotomy.
Journal of Computer and System Sciences, 125. pp. 25-58. ISSN 00220000

Sala, Massimiliano and Taufer, Daniele
(2022) A survey on the group of points arising from elliptic curves with a Weierstrass model over a ring.
International Journal of Group Theory. ISSN 2251-7669
(In Press)

Troncoso, Carmela and Bogdanov, Dan and Bugnion, Edouard and Chatel, Sylva and Cremers, Cas and Gürses, Seda and Hubaux, Jean-Pierre and Jackson, Dennis and Larus, James and Lueks, Wouter and Oliveira, Rui and Payer, Mathias and Preneel, Bart and Pyrgelis, Apostolos and Salathé, Marcel and Stadler, Theresa and Veale, Michael
(2022) Deploying decentralized, privacy-preserving proximity tracing.
Communications of the ACM, 65 (9). ISSN 0001-0782

Wang, Xueou and Hou, Xiaolu and Rios, Ruben and Tippenhauer, Nils Ole and Ochoa, Martín
(2022) Constrained Proximity Attacks on Mobile Targets.
ACM Trans. Priv. Secur., 25 (2).

Book Section

Guanciale, Roberto and Baumann, Christoph and Buiras, Pablo and Dam, Mads and Nemati, Hamed
(2022) A Case Study in Information Flow Refinement for Low Level Systems.
In: The Logic of Software. A Tasting Menu of Formal Methods. Springer International Publishing, pp. 54-79. ISBN 978-3-031-08166-8

This list was generated on Thu Dec 8 00:02:06 2022 CET.