Number of items: 57.
A
Abdelnabi, Sahar and Fritz, Mario
(2023)
Fact-Saboteurs: A Taxonomy of Evidence Manipulation Attacks against Fact-Verification Systems.
(In Press)
Aghakhani, Hojjat and Schönherr, Lea and Eisenhofer, Thorsten and Kolossa, Dorothea and Holz, Thorsten and Kruegel, Christopher and Vigna, Giovanni
(2023)
VENOMAVE: Targeted Poisoning Against Speech Recognition.
Agrawal, Akanksha and Marx, Dániel and Neuen, Daniel and Slusallek, Jasper
(2023)
Computing Square Colorings on Bounded-Treewidth and Planar Graphs.
(In Press)
AlHamdan, Abdullah and Staicu, Cristian-Alexandru
(2023)
SandDriller: A Fully-Automated Approach for Testing Language-Based JavaScript Sandboxes.
B
Balliu, Alkida and Brandt, Sebastian and Kuhn, Fabian and Olivetti, Dennis
(2023)
Distributed Maximal Matching and Maximal Independent Set on Hypergraphs.
(Submitted)
Bars, Nils and Schloegel, Moritz and Scharnowski, Tobias and Schiller, Nico and Holz, Thorsten
(2023)
Fuzztruction: Using Fault Injection-based Fuzzing to Leverage Implicit Domain Knowledge.
Ben Guebila, Marouen and Wang, Tian and Lopes-Ramos, Camila M. and Fanfani, Viola and Weighill, Des and Burkholz, Rebekka and Schlauch, Daniel and Paulson, Joseph N. and Altenbuchinger, Michael and Shutta, Katherine H and Sonawane, Abhijeet R. and Lim, James and Calderer, Genis and van IJzendoorn, David G. P. and Morgan, Daniel and Marin, Alessandro and Chen, Cho-Yi and Song, Qi and Saha, Enakshi and DeMeo, Dawn L. and Padi, Megha and Platig, John and Kuijjer, Marieke and Glass, Kimberly and Quackenbush, John
(2023)
The Network Zoo: a multilingual package for the inference and analysis of gene regulatory networks.
Genome Biology, 24 (1).
ISSN 1474-7596
Bhuiyan, Masudul Hasan Masud and Parthasarathy, Adithya Srinivas and Vasilakis, Nikos and Pradel, Michael and Staicu, Cristian-Alexandru
(2023)
SecBench.js: An Executable Security Benchmark Suite for Server-Side JavaScript.
Bindel, Nina and Cremers, Cas and Zhao, Mang
(2023)
FIDO2, CTAP 2.1, and WebAuthn 2: Provable Security and Post-Quantum Instantiation.
(In Press)
Borrello, Pietro and Easdon, Catherine and Schwarzl, Martin and Czerny, Roland and Schwarz, Michael
(2023)
CustomProcessingUnit: Reverse Engineering and Customization of Intel Microcode.
Bushart, Jonas and Rossow, Christian
(2023)
Anomaly-based Filtering of Application-Layer DDoS Against DNS Authoritatives.
(Submitted)
C
Chakraborty, Dhiman and Schwarz, Michael and Bugiel, Sven
(2023)
TALUS: Reinforcing TEE Confidentiality with Cryptographic Coprocessors.
Cheval, Vincent and Cremers, Cas and Dax, Alexander and Hirschi, Lucca and Jacomme, Charlie and Kremer, Steve
(2023)
Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses.
Cremers, Cas and Dax, Alexander and Naska, Aurora
(2023)
Formal Analysis of SPDM: Security Protocol and Data Model version 1.2.
Cremers, Cas and Jacomme, Charlie and Naska, Aurora
(2023)
Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations.
(Submitted)
D
Doron-Arad, Ilan and Kulik, Ariel and Shachnai, Hadas
(2023)
An EPTAS for Budgeted Matching and Budgeted Matroid Intersection via Representative Sets.
(In Press)
Doron-Arad, Ilan and Kulik, Ariel and Shachnai, Hadas
(2023)
An EPTAS for Budgeted Matroid Independent Set.
(In Press)
E
EdalatNejad, Kasra and Raynal, Mathilde and Lueks, Wouter and Troncoso, Carmela
(2023)
Private Collection Matching Protocols.
Proceedings on Privacy Enhancing Technologies (PoPETs).
(In Press)
Eisele, Max and Ebert, Daniel and Huth, Christopher and Zeller, Andreas
(2023)
Fuzzing Embedded Systems Using Debug Interfaces.
(In Press)
Esiyok, Ilkan and Berrang, Pascal and Cohn-Gordon, Katriel and Künnemann, Robert
(2023)
Accountable Javascript Code Delivery.
F
Fassl, Matthias and Krombholz, Katharina
(2023)
Why I Can't Authenticate --- Understanding the Low Adoption of Authentication Ceremonies with Autoethnography.
Focke, Jacob and Marx, Dániel and Mc Inerney, Fionn and Neuen, Daniel and Sankar, Govind and Schepper, Philipp and Wellnitz, Philip
(2023)
Tight Complexity Bounds for Counting Generalized Dominating Sets in Bounded-Treewidth Graphs.
(In Press)
Fourné, Marcel and Wermke, Dominik and Enck, William and Fahl, Sascha and Acar, Yasemin
(2023)
It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security.
G
Gegenhuber, Gabriel Karl and Mayer, Wilfried and Weippl, Edgar and Dabrowski, Adrian
(2023)
MobileAtlas: Geographically Decoupled Measurements in Cellular Networks for Security and Privacy Research.
(In Press)
Gerhardt, Dañiel and Ponticello, Alexander and Dabrowski, Adrian and Krombholz, Katharina
(2023)
Investigating Verification Behavior and Perceptions of Visual Digital Certificates.
Gerlach, Lukas and Weber, Daniel and Zhang, Ruiyi and Schwarz, Michael
(2023)
A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs.
Ghorbani Lyastani, Sanam and Bugiel, Sven and Backes, Michael
(2023)
A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites.
Guthoff, Carolyn and Anell, Simon and Hainzinger, Johann and Dabrowski, Adrian and Krombholz, Katharina
(2023)
Perceptions of Distributed Ledger Technology Key Management - An Interview Study with Finance Professionals.
H
Hantke, Florian and Calzavara, Stefano and Wilhelm, Moritz and Rabitti, Alvise and Stock, Ben
(2023)
You Call This Archaeology? Evaluating Web Archives for Reproducible Web Security Measurements.
Hasan, Rakibul and Weil, Rebecca and Siegel, Rudolf and Krombholz, Katharina
(2023)
A Psychometric Scale to Measure Individuals’ Value of Other People’s Privacy (VOPP).
Heim, Philippe and Dimitrova, Rayna
(2023)
Taming Large Bounds in Synthesis from Bounded-Liveness Specifications.
(In Press)
K
Khodayari, Soheil and Pellegrino, Giancarlo
(2023)
It's (DOM) Clobbering Time: Attack Techniques, Prevalence, and Defenses.
(Submitted)
L
Li, Zheng and Yu, Ning and Salem, Ahmed and Backes, Michael and Fritz, Mario and Zhang, Yang
(2023)
UnGANable: Defending Against GAN-based Face Manipulation.
M
Mammadov, Tural
(2023)
Learning Program Models from Generated Inputs.
(In Press)
Morio, Kevin and Esiyok, Ilkan and Jackson, Dennis and Künnemann, Robert
(2023)
Automated Security Analysis of Exposure Notification Systems.
(In Press)
O
Ortloff, Anna-Marie and Fassl, Matthias and Ponticello, Alexander and Martius, Florin and Mertens, Anna and Krombholz, Katharina and Smith, Matthew
(2023)
Different Researchers, Different Results? Analyzing the Influence of Researcher Experience and Data Type During Qualitative Analysis of an Interview and Survey Study on Security Advice.
Q
Qu, Yiting and He, Xinlei and Pierson, Shannon and Backes, Michael and Zhang, Yang and Zannettou, Savvas
(2023)
On the Evolution of (Hateful) Memes by Means of Multimodal Contrastive Learning.
R
Rasifard, Hamed and Gopinath, Rahul and Backes, Michael and Nemati, Hamed
(2023)
SEAL: Capability-Based Access Control for Data-Analytic Scenarios.
(In Press)
Rautenstrauch, Jannis and Pellegrino, Giancarlo and Stock, Ben
(2023)
The Leaky Web: Automated Discovery of Cross-Site Information Leaks in Browsers and the Web.
Roeschlin, Marc and Camurati, Giovanni and Brunner, Pascal and Mridula, Singh and Srdjan, Capkun
(2023)
EdgeTDC: On the Security of Time Difference of Arrival Measurements in CAN Bus Systems.
S
Schiller, Nico and Chlosta, Merlin and Schloegel, Moritz and Bars, Nils and Eisenhofer, Thorsten and Scharnowski, Tobias and Domke, Felix and Schönherr, Lea and Holz, Thorsten
(2023)
Drone Security and the Mysterious Case of DJI's DroneID.
Schwarz, Fabian and Do, Khue and Heide, Gunnar and Hanzlik, Lucjan and Rossow, Christian
(2023)
FeIDo: Recoverable FIDO2 Tokens Using Electronic IDs (Extended Version).
Technical Report.
UNSPECIFIED.
Schwarzl, Martin and Borrello, Pietro and Saileshwar, Gururaj and Müller, Hanna and Schwarz, Michael and Gruss, Daniel
(2023)
Practical Timing Side-Channel Attacks on Memory Compression.
Shcherbakov, Mikhail and Balliu, Musard and Staicu, Cristian-Alexandru
(2023)
Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js.
Smytzek, Marius
(2023)
From Input to Failure: Explaining Program Behavior via Cause-Effect Chains.
(In Press)
Staicu, Cristian-Alexandru and Rahaman, Sazzadur and Kiss, Ágnes and Backes, Michael
(2023)
Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages.
T
Thomas, Fabian and Gerlach, Lukas and Schwarz, Michael
(2023)
Hammulator: Simulate Now - Exploit Later.
U
Utz, Christine and Amft, Sabrina and Degeling, Martin and Holz, Thorsten and Fahl, Sascha and Schaub, Florian
(2023)
Privacy Rarely Considered: Exploring Considerations in the
Adoption of Third-Party Services by Websites.
Utz, Christine and Michels, Matthias and Degeling, Martin and Marnau, Ninja and Stock, Ben
(2023)
Comparing Large-Scale Privacy and Security Notifications.
(In Press)
W
Walita, Tim and Erba, Alessandro and Castellanos, John H. and Tippenhauer, Nils Ole
(2023)
Blind Concealment from Reconstruction-based Attack Detectors for Industrial Control Systems via Backdoor Attacks.
Wang, Boya and Lueks, Wouter and Sukaitis, Justinas and Graf Narbel, Vincent and Troncoso, Carmela
(2023)
Not Yet Another Digital ID: Privacy-Preserving Humanitarian Aid Distribution.
(In Press)
Wang, Haiming and Zhang, Zhikun and Wang, Tianhao and He, Shibo and Backes, Michael and Chen, Jiming and Zhang, Yang
(2023)
PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov Model.
Wermke, Dominik and Klemmer, Jan H. and Wöhler, Noah and Schmüser, Juliane and Harshini Sri Ramulu, Yasemin Acar and Fahl, Sascha
(2023)
"Always Contribute Back": A Qualitative Study on Security Challenges of the Open Source Supply Chain.
Wi, Seongil and Nguyen, Trung Tin and Kim, Jiwhan and Stock, Ben and Son, Sooel
(2023)
DiffCSP: Finding Browser Bugs in Content Security
Policy Enforcement through Differential Testing.
Willbold, Johannes and Schloegel, Moritz and Vögele, Manuel and Gerhardt, Maximilian and Holz, Thorsten and Abbasi, Ali
(2023)
Space Odyssey: An Experimental Software Security Analysis of Satellites.
Y
Yuan, Xiaojian and Chen, Kejiang and Zhang, Jie and Zhang, Weiming and Yu, Nenghai and Zhang, Yang
(2023)
Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network.
Z
Zhang, Ruiyi and Kim, Taehyun and Weber, Daniel and Schwarz, Michael
(2023)
(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels.
This list was generated on Mon Jun 5 00:02:12 2023 CEST.