Number of items: 205.
Conference or Workshop Item (A Paper)
Abdelnabi, Sahar and Hasan, Rakibul and Fritz, Mario
(2022)
Open-Domain, Content-Based, Multi-Modal Fact-Checking of Out-of-Context Images via Online Resources.
Agarwal, Shubham
(2022)
Helping or Hindering? How Browser Extensions Undermine Security.
(In Press)
Aggarwal, Divesh and Döttling, Nico and Dujmovic, Jesko and Hajiabadi, Mohammad and Malavolta, Giulio and Obremski, Maciej
(2022)
Algebraic Restriction Codes and their Applications.
Alexandru, Andreea B. and Blum, Erica and Katz, Jonathan and Loss, Julian
(2022)
State Machine Replication under Changing Network Conditions.
(In Press)
Allcock, Jonathan and Hamoudi, Yassine and Joux, Antoine and Klingelhöfer, Felix and Santha, Miklos
(2022)
Classical and Quantum Algorithms for Variants of
Subset-Sum via Dynamic Programming.
Anagnostides, Ioannis and Lenzen, Christoph and Haeupler, Bernhard and Zuzic, Goran and Gouleakis, Themis
(2022)
Almost Universally Optimal Distributed Laplacian Solvers via Low-Congestion Shortcuts.
(In Press)
Antonioli, Daniele and Tippenhauer, Nils Ole and Rasmussen, Kasper and Payer, Mathias
(2022)
Blurtooth: Exploiting cross-transport key derivation in Bluetooth classic and Bluetooth low energy.
Bacho, Renas and Loss, Julian
(2022)
On the Adaptive Security of the Threshold BLS Signature Scheme.
(In Press)
Backes, Michael and Berrang, Pascal and Hanzlik, Lucjan and Pryvalov, Ivan
(2022)
A framework for constructing Single Secret Leader Election from MPC.
(In Press)
Ball, Marshall and Dachman-Soled, Dana and Loss, Julian
(2022)
(Nondeterministic) Hardness vs. Non-Malleability.
Balliu, Alkida and Brandt, Sebastian and Chang, Yi-Jun and Olivetti, Dennis and Studený, Jan and Suomela, Jukka
(2022)
Efficient Classification of Locally Checkable Problems in Regular Trees.
(Submitted)
Balliu, Alkida and Brandt, Sebastian and Fischer, Manuela and Latypov, Rustam and Maus, Yannic and Olivetti, Dennis and Uitto, Jara
(2022)
Exponential Speedup Over Locality in MPC with Optimal Memory.
(Submitted)
Balliu, Alkida and Brandt, Sebastian and Kuhn, Fabian and Olivetti, Dennis
(2022)
Distributed edge coloring in time polylogarithmic in Δ.
(Submitted)
Balliu, Alkida and Brandt, Sebastian and Kuhn, Fabian and Olivetti, Dennis
(2022)
Distributed ∆-Coloring Plays Hide-and-Seek.
(Submitted)
Bauer, Markus and Grishchenko, Ilya and Rossow, Christian
(2022)
TyPro: Forward CFI for C-Style Indirect Function Calls Using Type Propagation.
(In Press)
Baumeister, Jan and Finkbeiner, Bernd and Gumhold, Stefan and Schledjewski, Malte
(2022)
Real-time Visualization of Stream-based Monitoring Data.
(In Press)
Bendrissou, Bachir and Gopinath, Rahul and Zeller, Andreas
(2022)
"Synthesizing Input Grammars": A Replication Study.
(In Press)
Bernhard, Lukas and Rodler, Michael and Holz, Thorsten and Davi, Lucas
(2022)
xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64.
Bernhard, Lukas and Scharnowski, Tobias and Schloegel, Moritz and Blazytko, Tim and Holz, Thorsten
(2022)
Jit-Picking: Differential Fuzzing of JavaScript Engines.
Beutner, Raven and Carral, David and Finkbeiner, Bernd and Hofmann, Jana and Krötzsch, Markus
(2022)
Deciding Hyperproperties Combined with Functional Specifications.
(In Press)
Beutner, Raven and Finkbeiner, Bernd
(2022)
Prophecy Variables for Hyperproperty Verification.
(In Press)
Beutner, Raven and Finkbeiner, Bernd
(2022)
Software Verification of Hyperproperties Beyond k-Safety.
(In Press)
Beutner, Raven and Ong, C.H. Luke and Zaiser, Fabian
(2022)
Guaranteed Bounds for Posterior Inference in Universal Probabilistic Programming.
(In Press)
Beznosikov, Aleksandr and Dvurechensky, Pavel and Koloskova, Anastasia and Samokhin, Valentin and Stich, Sebastian U. and Gasnikov, Alexander
(2022)
Decentralized Local Stochastic Extra-Gradient for Variational Inequalities.
Bhangale, Amey and Liu-Zhang, Chen-Da and Loss, Julian and Nayak, Kartik
(2022)
Efficient Adaptively-Secure Byzantine Agreement for Long Messages.
(In Press)
Bieringer, Lukas and Grosse, Kathrin and Backes, Michael and Biggio, Battista and Krombholz, Katharina
(2022)
Industrial practitioners' mental models of adversarial machine learning.
Binkhorst, Veroniek and Fiebig, Tobias and Krombholz, Katharina and Pieters, Wolter and Labunets, Katsiaryna
(2022)
Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context.
Borrello, Pietro and Kogler, Andreas and Schwarzl, Martin and Lipp, Moritz and Gruss, Daniel and Schwarz, Michael
(2022)
ÆPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture.
Brakerski, Zvika and Branco, Pedro and Döttling, Nico and Pu, Sihang
(2022)
Batch-OT with Optimal Rate.
Brakerski, Zvika and Döttling, Nico and Garg, Sanjam and Malavolta, Giulio
(2022)
Factoring and Pairings Are Not Necessary for IO:
Circular-Secure LWE Suffices.
Branco, Pedro and Döttling, Nico and Dujmovic, Jesko
(2022)
Rate-1 Incompressible Encryption from Standard Assumptions.
Branco, Pedro and Döttling, Nico and Mateus, Paulo
(2022)
Two-Round Oblivious Linear Evaluation from Learning with Errors.
Branco, Pedro and Döttling, Nico and Wohnig, Stella
(2022)
Universal Ring Signatures in the Standard Model.
Brandt, Sebastian and Chang, Yi-Jun and Grebı́k, Jan and Grunau, Christoph and Rozhoň, Václav and Vidnyánszky, Zoltán
(2022)
Local Problems on Trees from the Perspectives of Distributed Algorithms, Finitary Factors, and Descriptive Combinatorics.
(In Press)
Bringmann, Karl and Kisfaludi-Bak, Sándor and Künnemann, Marvin and Marx, Dániel and Nusser, André
(2022)
Dynamic Time Warping Under Translation: Approximation Guided by Space-Filling Curves.
Bund, Johannes and Lenzen, Christoph and Medina, Moti
(2022)
Small Hazard-Free Transducers.
(In Press)
Burkholz, Rebekka
(2022)
Convolutional and Residual Networks Provably Contain Lottery Tickets.
Burkholz, Rebekka
(2022)
Most Activation Functions Can Win the Lottery Without Excessive Depth.
Burkholz, Rebekka and Laha, Nilanjana and Mukherjee, Rajarshi and Gotovos, Alkis
(2022)
On the Existence of Universal Lottery Tickets.
Böhle, Moritz and Fritz, Mario and Schiele, Bernt
(2022)
B-Cos Networks: Alignment Is All We Need for Interpretability.
Can Esmer, Baris and Kulik, Ariel and Marx, Dániel and Neuen, Daniel and Sharma, Roohani
(2022)
Faster Exponential-Time Approximation Algorithms Using Approximate Monotone Local Search.
Chairattana-Apirom, Rutchathon and Wagner, Benedikt and Hanzlik, Lucjan and Loss, Julian and Lysyanskaya, Anna
(2022)
PI-Cut-Choo and Friends: Compact Blind Signatures via Parallel Instance Cut-and-Choose and More.
(In Press)
Chalopin, Jérémie and Chepoi, Victor and Mc Inerney, Fionn and Ratel, Sébastien and Vaxès, Yann
(2022)
Sample Compression Schemes for Balls in Graphs.
Chattopadhyay, Soumya and Jha, Ashwin and Nandi, Mridul
(2022)
Towards Tight Security Bounds for OMAC, XCBC and TMAC.
(Submitted)
Chen, Dingfan and Kerkouche, Raouf and Fritz, Mario
(2022)
Private Set Generation with Discriminative Information.
Chen, Dingfan and Yu, Ning and Fritz, Mario
(2022)
RelaxLoss: Defending Membership Inference Attacks without Losing Utility.
Chen, Min and Zhang, Zhikun and Wang, Tianhao and Backes, Michael and Humbert, Mathias and Zhang, Yang
(2022)
Graph Unlearning.
(In Press)
Chen, Yufei and Shen, Chao and Shen, Yun and Wang, Cong and Zhang, Yang
(2022)
Amplifying Membership Exposure via Data Poisoning.
Chen, Yufei and Shen, Chao and Wang, Cong and Zhang, Yang
(2022)
Teacher Model Fingerprinting Attacks Against Transfer Learning.
Cheval, Vincent and Jacomme, Charlie and Kremer, Steve and Künnemann, Robert
(2022)
SAPIC+: protocol verifiers of the world, unite!
(In Press)
Chistikov, Dmitry and Majumdar, Rupak and Schepper, Philipp
(2022)
Subcubic certificates for CFL reachability.
Choi, Wonhyuk and Finkbeiner, Bernd and Piskac, Ruzica and Santolucito, Mark
(2022)
Can Reactive Synthesis and Syntax-Guided Synthesis Be Friends?
Cloosters, Tobias and Willbold, Johannes and Holz, Thorsten and Davi, Lucas
(2022)
SGXFuzz: Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing.
Coenen, Norine and Dachselt, Raimund and Finkbeiner, Bernd and Frenkel, Hadar and Hahn, Christopher and Horak, Tom and Metzger, Niklas and Siber, Julian
(2022)
Explaining Hyperproperty Violations.
(Submitted)
Coenen, Norine and Finkbeiner, Bernd and Frenkel, Hadar and Hahn, Christopher and Metzger, Niklas and Siber, Julian
(2022)
Temporal Causality in Reactive Systems.
(In Press)
Cong, Tianshuo and He, Xinlei and Zhang, Yang
(2022)
SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders.
Coupette, Corinna and Dalleiger, Sebastian and Vreeken, Jilles
(2022)
Differentially Describing Groups of Graphs.
Cremers, Cas and Fontaine, Caroline and Jacomme, Charlie
(2022)
A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols.
Cremers, Cas and Jacomme, Charlie and Lukert, Philip
(2022)
Subterm-based proof techniques for improving the automation and scope of security protocol analysis.
Cremers, Cas and Naor, Moni and Paz, Shahar and Ronen, Eyal
(2022)
CHIP and CRISP: Protecting All Parties Against Compromise through Identity-Binding PAKEs.
Dalleiger, Sebastian and Vreeken, Jilles
(2022)
Discovering Significant Patterns under Sequential False Discovery Control.
Dalleiger, Sebastian and Vreeken, Jilles
(2022)
Efficiently Factorizing Boolean Matrices using Proximal Gradient Descent.
Demir, Nurullah and Große-Kampmann, Matteo and Urban, Tobias and Wresnegger, Christian and Holz, Thorsten and Pohlmann, Norbert
(2022)
Reproducibility and Replicability of Web Measurement Studies.
Dodwadmath, Akshay and Stich, Sebastian U.
(2022)
Preserving privacy with PATE for heterogeneous data.
Döttling, Nico and Dujmovic, Jesko
(2022)
Maliciously Circuit-Private FHE from Information-Theoretic Principles.
Döttling, Nico and Garg, Sanjam and Wang, Mingyuan
(2022)
IBE with Incompressible Master Secret and Small Identity Secrets.
Döttling, Nico and Goyal, Vipul and Malavolta, Giulio and Raizes, Justin
(2022)
Interaction-Preserving Compilers for Secure Computation.
Easdon, Catherine and Schwarz, Michael and Schwarzl, Martin and Gruss, Daniel
(2022)
Rapid Prototyping for Microarchitectural Attacks.
Eisele, Max
(2022)
Debugger-driven Embedded Fuzzing.
Eldefrawy, Karim and Loss, Julian and Terner, Ben
(2022)
How Byzantine is a Send Corruption?
Erba, Alessandro and Müller, Anne and Tippenhauer, Nils Ole
(2022)
Security Analysis of Vendor Implementations of the OPC UA Protocol for Industrial Control Systems.
Erba, Alessandro and Tippenhauer, Nils Ole
(2022)
Assessing Model-free Anomaly Detection in Industrial Control Systems Against Generic Concealment Attacks.
Esmer, Baris Can and Kulik, Ariel and Marx, Dániel and Schepper, Philipp and Węgrzycki, Karol
(2022)
Computing Generalized Convolutions Faster Than Brute Force.
(In Press)
Esmer, Baris Can and Nakos, Vasileios
(2022)
On (1+ϵ)-Approximate Block Sparse Recovery.
(Submitted)
Fabian, Xaver and Guarnieri, Marco and Patrignani, Marco
(2022)
Automatic Detection of Speculative Execution Combinations.
(In Press)
Fassl, Matthias and Anell, Simon and Houy, Sabine and Lindorfer, Martina and Krombholz, Katharina
(2022)
Comparing User Perceptions of Anti-Stalkerware Apps with the Technical Reality.
Feneuil, Thibauld and Joux, Antoine and Rivain, Matthieu
(2022)
Syndrome Decoding in the Head: Shorter Signatures from Zero-Knowledge Proofs.
Finkbeiner, Bernd and Gieseking, Manuel and Hecking-Harbusch, Jesko and Olderog, Ernst-Rüdiger
(2022)
Global Winning Conditions in Synthesis of Distributed Systems with Causal Memory.
Finkbeiner, Bernd and Heim, Philippe and Passing, Noemi
(2022)
Temporal Stream Logic modulo Theories.
Finkbeiner, Bernd and Mallik, Kaushik and Passing, Noemi and Schledjewski, Malte and Schmuck, Anne-Kathrin
(2022)
BOCoSy: Small but Powerful Symbolic Output-Feedback Control.
Finkbeiner, Bernd and Metzger, Niklas and Moses, Yoram
(2022)
Information Flow Guided Synthesis.
(Unpublished)
Finkbeiner, Bernd and Passing, Noemi
(2022)
Synthesizing Dominant Strategies for Liveness.
(In Press)
Fischer, Jonas and Burkholz, Rebekka
(2022)
Plant 'n' Seek: Can You Find the Winning Ticket?
Fisman, Dana and Frenkel, Hadar and Zilles, Sandra
(2022)
Inferring Symbolic Automata.
Focke, Jacob and Goldberg, Leslie Ann and Roth, Marc and Živný, Stanislav
(2022)
Approximately Counting Answers to Conjunctive Queries with Disequalities and Negations.
Focke, Jacob and Marx, Dániel and Rzążewski, Paweł
(2022)
Counting list homomorphisms from graphs of bounded treewidth: tight complexity bounds.
Focke, Jacob and Roth, Marc
(2022)
Counting Small Induced Subgraphs with Hereditary Properties.
Frei, Marc and Kwon, Jonghoon and Seyedali, Tabaeiaghdaei and Wyss, Marc and Lenzen, Christoph and Perrig, Adrian
(2022)
G-SINC: Global Synchronization Infrastructure for Network Clocks.
Frenkel, Hadar and Sheinvald, Sarai
(2022)
Realizable and Context-Free Hyperlanguages.
Galby, Esther and Khazaliya, Liana and Mc Inerney, Fionn and Sharma, Roohani and Tale, Prafullkumar
(2022)
Metric Dimension Parameterized by Feedback Vertex Set and Other Structural Parameters.
Galby, Esther and Marx, Dániel and Schepper, Philipp and Sharma, Roohani and Tale, Prafullkumar
(2022)
Domination and Cut Problems on Chordal Graphs with Bounded Leafage.
(In Press)
Galby, Esther and Marx, Dániel and Schepper, Philipp and Sharma, Roohani and Tale, Prafullkumar
(2022)
Parameterized Complexity of Weighted Multicut in Trees.
Geisler, Simon and Sommer, Johanna and Schuchardt, Jan and Bojchevski, Aleksandar and Günnemann, Stephan
(2022)
Generalization of Neural Combinatorial Solvers Through the Lens of Adversarial Robustness.
Giner, Lukas and Kogler, Andreas and Canella, Claudio and Schwarz, Michael and Gruss, Daniel
(2022)
Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX.
Grunau, Christoph and Rozhoň, Václav and Brandt, Sebastian
(2022)
The landscape of distributed complexities on trees and beyond.
(Submitted)
Gupta, Abhilash and Gopinath, Rahul and Zeller, Andreas
(2022)
CLIFuzzer: Mining Grammars for Command-Line Invocations.
Gutfleisch, Marco and Klemmer, Jan H. and Busch, Niklas and Acar, Yasemin and Sasse, M. Angela and Fahl, Sascha
(2022)
How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study.
Hamid Reza, Ghaeini and Nils Ole, Tippenhauer
(2022)
Smooth Transition of Vehicles' Maximum Speed for Lane Detection based on Computer Vision.
(In Press)
Han, Yi and Chan, Matthew and Aref, Zahra and Tippenhauer, Nils Ole and Zonouz, Saman
(2022)
Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow Monitoring.
Hantke, Florian and Stock, Ben
(2022)
HTML Violations and Where to Find Them: A Longitudinal Analysis of Specification Violations in HTML.
Hanzlik, Lucjan and Kluczniak, Kamil
(2022)
Explainable Arguments.
(In Press)
Hasan, Rakibul and Fritz, Mario
(2022)
Understanding Utility and Privacy of Demographic Data in Education Technology by Causal Analysis and Adversarial-Censoring.
Hasan, Rakibul and Siegel, Rudolf and Weil, Rebecca and Krombholz, Katharina
(2022)
Developing a Psychometric Scale to Measure One’s Valuation of Other People’s Privacy.
Hedderich, M and Fischer, Jonas and Klakow, Dietrich and Vreeken, Jilles
(2022)
Label-Descriptive Patterns and their Application to Characterizing Classification Errors.
Hetterich, Lorenz and Schwarz, Michael
(2022)
Branch Different - Spectre Attacks on Apple Silicon.
Huaman, Nicolas and Krause, Alexander and Wermke, Dominik and Klemmer, Jan H. and Stransky, Christian and Acar, Yasemin and Fahl, Sascha
(2022)
If You Can’t Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers.
Huang, Hai and Zhang, Zhikun and Shen, Yun and Backes, Michael and Li, Qi and Zhang, Yang
(2022)
On the Privacy Risks of Cell-Based NAS Architectures.
Ibrahim, Ahmad and Nemati, Hamed and Schlüter, Till and Tippenhauer, Nils Ole and Rossow, Christian
(2022)
Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels.
Jacobs, Swen and Sakr, Mouhammad and Völp, Marcus
(2022)
Automatic Repair and Deadlock Detection for Parameterized Systems.
(In Press)
Kalofolias, Janis and Vreeken, Jilles
(2022)
Naming the most Anomalous Cluster in Hilbert Space for Structures with Attribute Information.
Karvandi, Mohammad Sina and Gholamrezaei, MohammadHossein and Monfared, Saleh Khalaj and Meghdadizanjani, Soroush and Abbassi, Behrooz and Amini, Ali and Mortazavi, Reza and Gorgin, Saeid and Rahmati, Dara and Schwarz, Michael
(2022)
HyperDbg: Reinventing Hardware-Assisted Debugging.
Kastner, Julia and Loss, Julian and Xu, Jiayu
(2022)
The Abe-Okamoto Partially Blind Signature Scheme Revisited.
(In Press)
Kastner, Julia and Loss, Julian and Xu, Jiayu
(2022)
On Pairing-Free Blind Signature Schemes in the Algebraic Group Model.
Kaur, Harjot and Amft, Sabrina and Votipka, Daniel and Acar, Yasemin and Fahl, Sascha
(2022)
Where to Recruit for Security Development Studies:
Comparing Six Software Developer Samples.
Kepkowski, Michal and Hanzlik, Lucjan and Wood, Ian D. and Kaafar, Mohamed Ali
(2022)
How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy.
(In Press)
Khodayari, Soheil and Pellegrino, Giancarlo
(2022)
The State of the SameSite: Studying the Usage, Effectiveness, and Adequacy of SameSite Cookies.
Klein, David and Barber, Thomas and Bensalim, Souphiane and Stock, Ben and Johns, Martin
(2022)
Hand Sanitizers in the Wild: A Large-scale Study of Custom JavaScript Sanitizer Functions.
Kluczniak, Kamil
(2022)
Lockable Obfuscation from Circularly Insecure Fully Homomorphic Encryption.
Kluczniak, Kamil
(2022)
NTRU-$\nu$-um: Secure Fully Homomorphic Encryption from NTRU with Small Modulus.
(In Press)
Kogler, Andreas and Gruss, Daniel and Schwarz, Michael
(2022)
Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks.
Kogler, Andreas and Weber, Daniel and Haubenwallner, Martin and Lipp, Moritz and Gruss, Daniel and Schwarz, Michael
(2022)
Finding and Exploiting CPU Features using MSR Templating.
Koloskova, Anastasia and Stich, Sebastian U. and Jaggi, Martin
(2022)
Sharper Convergence Guarantees for Asynchronous SGD for Distributed and Federated Learning.
Krupp, Johannes and Grishchenko, Ilya and Rossow, Christian
(2022)
AmpFuzz: Fuzzing for Amplification DDoS Vulnerabilities.
Kruse, Matthis and Patrignani, Marco
(2022)
Composing Secure Compilers.
Langer, Markus and Siegel, Rudolf and Schilling, Michael and Hunsicker, Tim and König, Cornelius J.
(2022)
An open door may tempt a saint: Examining situational and individual determinants of privacy-invading behavior.
Lenzen, Christoph and Loss, Julian
(2022)
Optimal Clock Synchronization with Signatures.
Lenzen, Christoph and Sheikholeslami, Sahar
(2022)
A Recursive Early-Stopping Phase King Protocol.
(Submitted)
Li, Zheng and Liu, Yiyong and He, Xinlei and Yu, Ning and Backes, Michael and Zhang, Yang
(2022)
Auditing Membership Leakages of Multi-Exit Networks.
Lipp, Moritz and Gruss, Daniel and Schwarz, Michael
(2022)
AMD Prefetch Attacks through Power and Time.
Liu, Yiyong and Zhao, Zhengyu and Backes, Michael and Zhang, Yang
(2022)
Membership Inference Attacks by Exploiting Loss Trajectory.
Liu, Yugeng and Wen, Rui and He, Xinlei and Salem, Ahmed and Zhang, Zhikun and Backes, Michael and De Cristofaro, Emiliano and Fritz, Mario and Zhang, Yang
(2022)
ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models.
Mai, Alexandra and Guelmino, Leonard and Pfeffer, Katharina and Weippl, Edgar and Krombholz, Katharina
(2022)
Mental Models of the Internet and Its Online Risks: Children and Their Parent(s).
Mai, Alexandra and Schedler, Oliver and Weippl, Edgar and Krombholz, Katharina
(2022)
Are HTTPS Configurations Still a Challenge?: Validating Theories of Administrators’ Difficulties with TLS Configurations.
Mameche, Sara and Kaltenpoth, David and Vreeken, Jilles
(2022)
Discovering Invariant and Changing Mechanisms from Data.
Marx, Alexander and Vreeken, Jilles
(2022)
Formally Justifying MDL-based Inference of Cause and Effect.
Marx, Dániel and Misra, Pranabendu and Neuen, Daniel and Tale, Prafullkumar
(2022)
A Framework for Parameterized Subexponential Algorithms for Generalized Cycle Hitting Problems on Planar Graphs.
(Submitted)
Marx, Dániel and Sankar, Govind and Schepper, Philipp
(2022)
Anti-Factor is FPT Parameterized by Treewidth and List Size (but Counting is Hard).
(In Press)
Mishchenko, Konstantin and Malinovsky, Grigory and Stich, Sebastian U. and Richtarik, Peter
(2022)
ProxSkip: Yes! Local Gradient Steps Provably Lead to Communication Acceleration! Finally!
Mohtashami, Amirkeivan and Jaggi, Martin and Stich, Sebastian U.
(2022)
Masked Training of Neural Networks with Partial Gradients.
(In Press)
Mosier, Nicholas and Lachnitt, Hanna and Nemati, Hamed and Trippel, Caroline
(2022)
Axiomatic hardware-software contracts for security.
Mujkanovic, Felix and Geisler, Simon and Günnemann, Stephan and Bojchevski, Aleksandar
(2022)
Are Defenses for Graph Neural Networks Robust?
Neuen, Daniel
(2022)
Isomorphism Testing for Graphs Excluding Small Topological Subgraphs.
(Submitted)
Nguyen, Trung Tin and Backes, Michael and Stock, Ben
(2022)
Freely Given Consent? Studying Consent Notice of Third-Party Tracking and Its Violations of GDPR in Android Apps.
(In Press)
Pan, Jiaxin and Wagner, Benedikt
(2022)
Lattice-based Signatures with Tight Adaptive Corruptions and More.
Pfeffer, Katharina and Mai, Alexandra and Weippl, Edgar and Rader, Emilee and Krombholz, Katharina
(2022)
Replication: Stories as Informal Lessons about Security.
Rahimian, Shadi and Kerkouche, Raouf and Kurth, Ina and Fritz, Mario
(2022)
Practical Challenges in Differentially-Private Federated Survival Analysis of Medical Data.
Rokicki, Thomas and Maurice, Clémentine and Schwarz, Michael
(2022)
CPU Port Contention Without SMT.
Roth, Sebastian and Calzavara, Stefano and Wilhelm, Moritz and Rabitti, Alvise and Stock, Ben
(2022)
The Security Lottery: Measuring Client-Side Web Security Inconsistencies.
Ruffing, Tim and Ronge, Viktoria and Jin, Elliott and Schneider-Bensch, Jonas and Schröder, Dominique
(2022)
ROAST: Robust Asynchronous Schnorr Threshold Signatures.
Ruth, Kimberly and Fass, Aurore and Azose, Jonathan and Pearson, Mark and Thomas, Emma and Sadowski, Caitlin and Durumeric, Zakir
(2022)
A World Wide View of Browsing the World Wide Web.
Salem, Ahmed and Backes, Michael and Zhang, Yang
(2022)
Get a Model! Model Hijacking Attack Against Machine Learning Models.
Salem, Ahmed and Wen, Rui and Backes, Michael and Ma, Shiqing and Zhang, Yang
(2022)
Dynamic Backdoor Attacks Against Machine Learning Models.
Scharnowski, Tobias and Bars, Nils and Schloegel, Moritz and Gustafson, Eric and Muench, Marius and Vigna, Giovanni and Kruegel, Christopher and Holz, Thorsten and Abbasi, Ali
(2022)
Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing.
Schloegel, Moritz and Blazytko, Tim and Contag, Moritz and Aschermann, Cornelius and Basler, Julius and Holz, Thorsten and Abbasi, Ali
(2022)
Loki: Hardening Code Obfuscation Against Automated Attacks.
Scholten, Yan and Schuchardt, Jan and Geisler, Simon and Bojchevski, Aleksandar and Günnemann, Stephan
(2022)
Randomized Message-Interception Smoothing: Gray-box Certificates for Graph Neural Networks.
Schumilo, Sergej and Aschermann, Cornelius and Jemmett, Andrea and Abbasi, Ali and Holz, Thorsten
(2022)
Nyx-Net: Network Fuzzing with Incremental Snapshots.
Schwarz, Fabian
(2022)
TrustedGateway: TEE-Assisted Routing and Firewall Enforcement Using ARM TrustZone.
(In Press)
Schwarz, Fabian and Do, Khue and Heide, Gunnar and Hanzlik, Lucjan and Rossow, Christian
(2022)
FeIDo: Recoverable FIDO2 Tokens Using Electronic IDs.
(In Press)
Schwarzl, Martin and Borrello, Pietro and Kogler, Andreas and Varda, Kenton and Schuster, Thomas and Gruss, Daniel and Schwarz, Michael
(2022)
Robust and Scalable Process Isolation against
Spectre in the Cloud.
Shen, Xinyue and He, Xinlei and Backes, Michael and Blackburn, Jeremy and Zannettou, Savvas and Zhang, Yang
(2022)
On Xing Tian and the Perseverance of Anti-China Sentiment Online.
Shen, Yun and Han, Yufei and Zhang, Zhikun and Chen, Min and Yu, Ting and Backes, Michael and Zhang, Yang and Stringhini, Gianluca
(2022)
Finding MNEMON: Reviving Memories of Node Embeddings.
(In Press)
Shen, Yun and He, Xinlei and Han, Yufei and Zhang, Yang
(2022)
Model Stealing Attacks Against Inductive Graph Neural Networks.
Si, Wai Man and Backes, Michael and Blackburn, Jeremy and De Cristofaro, Emiliano and Stringhini, Gianluca and Zannettou, Savvas and Zhang, Yang
(2022)
Why So Toxic? Measuring and Triggering Toxic Behavior in Open-Domain Chatbots.
Singh, Mridula and Roeschlin, Marc and Ranganathan, Aanjhan and Capkun, Srdjan
(2022)
V-Range: Enabling Secure Ranging in 5G Wireless Networks.
(In Press)
Smytzek, Marius and Zeller, Andreas
(2022)
SFLKit: A Workbench for Statistical Fault Localization.
(In Press)
Steinhöfel, Dominic and Zeller, Andreas
(2022)
Input Invariants.
Stolz, Peter and Roth, Sebastian and Stock, Ben
(2022)
To hash or not to hash: A security assessment of CSP’s unsafe-hashes expression.
Stransky, Christian and Wiese, Oliver and Roth, Volker and Acar, Yasemin and Fahl, Sascha
(2022)
27 Years and 81 Million Opportunities Later: Investigating the Use of Email Encryption for an Entire University.
Tang, Dang and Duong, Dung Hoang and Joux, Antoine and Plantard, Thomas and Qiao, Youming and Susilo, Willy
(2022)
Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms.
Trampert, Leon and Rossow, Christian and Schwarz, Michael
(2022)
Browser-based CPU Fingerprinting.
(In Press)
Tsimos, Georgios and Loss, Julian and Papamanthou, Charalampos
(2022)
Gossiping for Communication-Efficient Broadcast.
(In Press)
Wang, Hui-Po and Stich, Sebastian U. and He, Yang and Fritz, Mario
(2022)
ProgFed: Effective, Communication, and Computation Efficient Federated Learning by Progressive Training.
Wermke, Dominik and Wöhler, Noah and Klemmer, Jan H. and Fourné, Marcel and Acar, Yasemin and Fahl, Sascha
(2022)
Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects.
Wiegand, Boris and Klakow, Dietrich and Vreeken, Jilles
(2022)
Discovering Interpretable Data-to-Sequence Generators.
Wüst, Karl and Kostiainen, Kari and Delius, Noah and Capkun, Srdjan
(2022)
Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy-Preserving Regulation.
Xu, Sascha and Mian, Osman and Vreeken, Jilles
(2022)
Inferring Cause and Effect in the Presence of Heteroscedastic Noise.
Yu, Ning and Skripniuk, Vladislav and Chen, Dingfan and Davis, Larry S. and Fritz, Mario
(2022)
Responsible Disclosure of Generative Models Using Scalable Fingerprinting.
Zhang, Zhikun and Chen, Min and Backes, Michael and Shen, Yun and Zhang, Yang
(2022)
Inference Attacks Against Graph Neural Networks.
Zhou, Junhao and Chen, Yufei and Shen, Chao and Zhang, Yang
(2022)
Property Inference Attacks Against GANs.
Article
Balliu, Alkida and Brandt, Sebastian and Chang, Yi-Jun and Olivetti, Dennis and Studený, Jan and Suomela, Jukka and Tereshchenko, Aleksandr
(2022)
Locally Checkable Problems in Rooted Trees.
Distributed Computing.
ISSN 0178-2770
Basin, David and Cremers, Cas and Dreier, Jannik and Sasse, Ralf
(2022)
Tamarin: Verification of Large-Scale, Real-World, Cryptographic Protocols.
IEEE Security and Privacy.
ISSN 1540-7993
Ben Guebila, Marouen and Weighill, Deborah and Lopes-Ramos, Camila M. and Burkholz, Rebekka and Pop, Romana T. and Palepu, Kalyan and Shapoval, Mia and Fagny, Maud and Schlauch, Daniel and Glass, Kimberly and Altenbuchinger, Michael and Kuijjer, Marieke and Platig, John and Quackenbush, John
(2022)
An online notebook resource for reproducible inference, analysis and publication of gene regulatory networks.
Nature Methods.
ISSN 1548-7091
Bensmail, Julien and Fioravantes, Foivos and Mc Inerney, Fionn and Nisse, Nicolas
(2022)
The Largest Connected Subgraph Game.
Algorithmica, 84 (9).
pp. 2533-2555.
ISSN 0178-4617
Bensmail, Julien and Mc Inerney, Fionn
(2022)
On a vertex-capturing game.
Theoretical Computer Science, 923.
pp. 27-46.
ISSN 0304-3975
Bharadwaj, Suda and Dimitrova, Rayna and Quattrociocchi, Jesse and Topcu, Ufuk
(2022)
Synthesis of Strategies for Autonomous Surveillance on Adversarial Targets.
Robotics and Autonomous Systems, 153.
ISSN 0921-8890
Biewer, Sebastian and Dimitrova, Rayna and Fries, Michael and Gazda, Maciej and Heinze, Thomas and Hermanns, Holger and Mousavi, Mohammad Reza
(2022)
Conformance Relations and Hyperproperties for Doping Detection in Time and Space.
Logical Methods in Computer Science, 18 (1).
Cueppers, Joscha and Kalofolias, Janis and Vreeken, Jilles
(2022)
Omen: discovering sequential patterns with reliable prediction delays.
Knowledge and Information Systems.
ISSN 0219-1377
Di Tizio, Giorgio and Speicher, Patrick and Simeonovski, Milivoj and Backes, Michael and Stock, Ben and Künnemann, Robert
(2022)
Pareto-Optimal Defenses for the Web Infrastructure: Theory and Practice.
ACM Transactions on Privacy and Security, 1 (1).
ISSN 2471-2566
Finkbeiner, Bernd and Fränzle, Martin and Kohn, Florian and Kröger, Paul
(2022)
A Truly Robust Signal Temporal Logic: Monitoring Safety Properties of Interacting Cyber-Physical Systems under Uncertain Observation.
Algorithms, 15 (4).
Finkbeiner, Bernd and Geier, Gideon and Passing, Noemi
(2022)
Specification decomposition for reactive synthesis.
Innovations in Systems and Software Engineering.
Finkbeiner, Bernd and Klein, Felix and Metzger, Niklas
(2022)
Live synthesis.
Innovations in Systems and Software Engineering.
ISSN 1614-5046
Finkbeiner, Bernd and Passing, Noemi
(2022)
Compositional synthesis of modular systems.
Innovations in Systems and Software Engineering.
Frenkel, Hadar and Grumberg, Orna and Pasareanu, Corina and Sheinvald, Sarai
(2022)
Assume, Guarantee or Repair - A Regular Framework for Non Regular Properties.
International Journal on Software Tools for Technology Transfer.
ISSN 1433-2779
Havrikov, Nikolas and Kampmann, Alexander and Zeller, Andreas
(2022)
From Input Coverage to Code Coverage:
Systematically Covering Input Structure with k-Paths.
ACM Transactions on Software Engineering and Methodology.
ISSN 1049-331X
(Submitted)
Jha, Ashwin and Nandi, Mridul
(2022)
A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF.
Entropy, 24 (4).
pp. 462-496.
ISSN 1099-4300
Joux, Antoine and Pierrot, Cécile
(2022)
Algorithmic aspects of elliptic bases in finite field discrete logarithm algorithms.
Advances in Mathematics of Communications.
ISSN 1930-5346
Marx, Dániel and Sandeep, R.B.
(2022)
Incompressibility of H-free edge modification problems: Towards a dichotomy.
Journal of Computer and System Sciences, 125.
pp. 25-58.
ISSN 00220000
Sala, Massimiliano and Taufer, Daniele
(2022)
A survey on the group of points arising from elliptic curves with a Weierstrass model over a ring.
International Journal of Group Theory.
ISSN 2251-7669
(In Press)
Schönherr, Lea and Golla, Maximilian and Eisenhofer, Thorsten and Wiele, Jan and Kolossa, Dorothea and Holz, Thorsten
(2022)
Exploring accidental triggers of smart speakers.
Computer Speech & Language.
ISSN 0885-2308
(In Press)
Shutta, Katherine H and Weighill, Deborah and Burkholz, Rebekka and Ben Guebila, Marouen and DeMeo, Dawn L and Zacharias, Helena U and Quackenbush, John and Altenbuchinger, Michael
(2022)
DRAGON: Determining Regulatory Associations using Graphical models on multi-Omic Networks.
Nucleic Acids Research.
ISSN 0305-1048
Troncoso, Carmela and Bogdanov, Dan and Bugnion, Edouard and Chatel, Sylva and Cremers, Cas and Gürses, Seda and Hubaux, Jean-Pierre and Jackson, Dennis and Larus, James and Lueks, Wouter and Oliveira, Rui and Payer, Mathias and Preneel, Bart and Pyrgelis, Apostolos and Salathé, Marcel and Stadler, Theresa and Veale, Michael
(2022)
Deploying decentralized, privacy-preserving proximity tracing.
Communications of the ACM, 65 (9).
ISSN 0001-0782
Wang, Xueou and Hou, Xiaolu and Rios, Ruben and Tippenhauer, Nils Ole and Ochoa, Martín
(2022)
Constrained Proximity Attacks on Mobile Targets.
ACM Trans. Priv. Secur., 25 (2).
Book Section
Fuegger, Matthias and Lenzen, Christoph and Schmid, Ulrich
(2022)
On Specifications and Proofs of Timed Circuits.
In:
Principles of Systems Design - Essays Dedicated to Thomas A. Henzinger on the Occasion of His 60th Birthday.
Springer, pp. 1-24.
ISBN 978-3-031-22337-2
Guanciale, Roberto and Baumann, Christoph and Buiras, Pablo and Dam, Mads and Nemati, Hamed
(2022)
A Case Study in Information Flow Refinement for Low Level Systems.
In:
The Logic of Software. A Tasting Menu of Formal Methods.
Springer International Publishing, pp. 54-79.
ISBN 978-3-031-08166-8
Other
Frenkel, Hadar and Grumberg, Orna and Rothenberg, Bat-Chen and Sheinvald, Sarai
(2022)
Automated Program Repair Using Formal Verification Techniques.
This list was generated on Sat Nov 23 00:26:10 2024 CET.