Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.
201929. SmartCard Workshop 2019. Tagungsband
: Waldmann, Ulrich
Conference Proceedings
2019Comparative Study of Machine Learning Methods for In-Vehicle Intrusion Detection
Berger, Ivo; Rieke, Roland; Kolomeets, Maxim; Chechulin, Andrey; Kotenko, Igor
Conference Paper
2019Darknets as Tools for Cyber Warfare
Denker, Kai; Schäfer, Marcel; Steinebach, Martin
Book Article
2019A Hardware Based Solution for Freshness of Secure Onboard Communication in Vehicles
Gürgens, Sigrid; Zelle, Daniel
Conference Paper
2019The need for steganalysis in image distribution channels
Steinebach, Martin; Liu, Huajian; Ester, Andre
Journal Article
2019Steganalysis method for detecting embedded coefficients of discrete-wavelet image transformation into high-frequency domains
Sivachev, Alexey V.; Bashmakov, Daniil A.; Mikhailishenko, Olga V.; Korobeynikov, Anatoliy G.; Rieke, Roland
Conference Paper
2019Technisierung - Technische Möglichkeiten zur Verfolgung von Arzneimittelstraftaten im Internet
Steinebach, Martin; Yannikos, York; Halvani, Oren; Pflug, Annika
Book Article
201828. SmartCard Workshop 2018. Tagungsband
: Waldmann, Ulrich
Conference Proceedings
2018Anonymous charging and billing of electric vehicles
Zelle, Daniel; Springer, Markus; Zhdanova, Maria; Krauß, Christoph
Conference Paper
2018Artificial Intelligence in IT Security
Steinebach, Martin; Waidner, Michael
Book Article
2018Authorship verification in the absence of explicit features and thresholds
Halvani, Oren; Graner, Lukas; Vogel, Inna
Conference Paper
2018Begriffsbestimmungen
Selzer, Annika
Book Article
2018Blockchain - Grundlagen und Anwendungsmöglichkeiten
Lange, Benjamin
Conference Paper
2018Blockchain and smart contracts
Schütte, Julian; Fridgen, Gilbert; Prinz, Wolfgang; Rose, Thomas; Urbach, Nils; Hoeren, Thomas; Guggenberger, Nikolas; Welzel, Christian; Holly, Steffen; Schulte, Axel; Sprenger, Philipp; Schwede, Christian; Weimert, Birgit; Otto, Boris; Dalheimer, Mathias; Wenzel, Markus; Kreutzer, Michael; Fritz, Michael; Leiner, Ulrich; Nouak, Alexander
: Prinz, Wolfgang (Ed.); Schulte, Axel T. (Ed.)
Report
2018Channel steganalysis
Steinebach, Martin; Ester, Andre; Liu, Huajian
Conference Paper
2018Concise data definition language (CDDL): A notational convention to express CBOR data structures
Birkholz, Henk; Vigano, Christoph; Bormann, Carsten
Report
2018Cross-domain authorship attribution based on compression
Halvani, Oren; Graner, Lukas
Conference Paper
2018Darum könnte die Bitcoin-Technologie ein gefährliches Sicherheitsrisiko für die ganze Wirtschaft sein
Kreutzer, Michael
Journal Article
2018Datenschutz-Folgenabschätzung
Selzer, Annika
Book Article
2018Digitale Wasserzeichen in der Kriminalistik
Waschetzki, Michael; Steinebach, Martin
Journal Article
2018Domain validation++ for MitM-resilient PKI
Brandt, Markus; Dai, Tiaxing; Klein, Amit; Shulman, Haya; Waidner, Michael
Conference Paper
2018Double Embedding Steganalysis: Steganalysis with Low False Positive Rates
Steinebach, Martin; Ester, Andre; Liu, Huajian; Zmudzinski, Sascha
Conference Paper
2018EWV Ergebnisreport (Ergebnisse des Projekts Erkennung vor Wirtschaftskriminalität und Versicherungsbetrug)
Winter, Christian; Marschall, Kevin; Herfurth, Constantin; Riedel, Oliver; Halvani, Oren; Liu, Huajian; Yannikos, York; Friedrich, Stephanie; Finzen, Jan; Kintz, Maximilian; Schneider, Andrea; Ossege, Tobias; Steinebach, Martin
: Steinebach, Martin; Roßnagel, Alexander; Hornung, Gerrit; Riedel, Oliver; Rener, Thomas; Teichert, Jochen
Report
2018FPGA-based Niederreiter cryptosystem using binary goppa codes
Wang, W.; Szefer, J.; Niederhagen, R.
Conference Paper
2018Hybrid Image Encryption
Steinebach, Martin; Liu, Huajin; Stein, Richard; Mayer, Felix
Conference Paper
2018Implementing Joux-Vitse's crossbred algorithm for solving MQ systems over F2 on GPUs
Niederhagen, Ruben; Ning, Kai-Chun; Yang, Bo-Yin
Conference Paper
2018Implications of vulnerable internet infrastructure
Shulman, Haya
Book Article
2018Informationspflichten
Selzer, Annika
Book Article
2018Internet As a Source of Randomness
Brandt, Markus; Shulman, Haya; Waidner, Michael
Conference Paper
2018Method, computer program and system for providing a control signal for a software development environment
Eichler, Jörn; Holzinger, Philipp; Laabs, Martin; Poller, Andreas; Türpe, Sven; Weber, Heiko; Zenkoff, Albert
Patent
2018Monitoring product sales in darknet shops
Yannikos, York; Schäfer, Annika; Steinebach, Martin
Conference Paper
2018New authentication concept using certificates for big data analytic tools
Velthuis, Paul; Schäfer, Marcel; Steinebach, Martin
Conference Paper
2018Off-path attacks against PKI
Dai, Tianxiang; Shulman, Haya; Waidner, Michael
Conference Paper
2018Open source value chains for addressing security issues efficiently
Weber, Arnd; Reith, Steffen; Kuhlmann, Dirk; Kasper, Michael; Seifert, Jean-Pierre; Krauß, Christoph
Conference Paper
2018Path MTU discovery considered harmful
Göhring, Matthias; Shulman, Haya; Waidner, Michael
Conference Paper
2018Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security
Gilad, Yossi; Hlavacek, Tomas; Herzberg, Amir; Schapira, Michael; Shulman, Haya
Conference Paper
2018Performance analysis of OpenFlow based software defined wired and wireless network
Jany, M.H.R.; Islam, N.; Khondoker, R.; Habib, M.A.
Conference Paper
2018Post-quantum cryptography on FPGAs. The Niederreiter cryptosystem. Extended Abstract
Wang, Wen; Szefer, Jakub; Niederhagen, Ruben
Abstract
2018Practical experience: Methodologies for measuring route origin validation
Hlavacek, Tomas; Herzberg, Amir; Shulman, Haya; Waidner, Michael
Conference Paper
2018Privacy and data protection in the domain name system: Threats and countermeasures
Kelpen, Kevin; Simo, Hervais
Book Article
2018Privacy Preserving Forensics for JPEG Images
Steinebach, Martin; Liu, Huajian; Stein, Richard; Mayer, Felix
Conference Paper
2018A reference architecture for integrating safety and security applications on railway command and control systems
Birkholz, Henk; Zhdanova, Maria; Krauß, Christoph; Arul, Tolga; Heinrich, Markus; Katzenbeisser, Stefan; Vateva-Gurova, Tsvetoslava; Suri, Neeraj; Kuzhiyelil, Don; Schlehuber, Christian
Conference Paper
2018Rethinking the evaluation methodology of authorship verification methods
Halvani, Oren; Graner, Lukas
Conference Paper
2018Roadmap to Privacy
Winter, Christian; Schäfer, Marcel
Presentation
2018Souveränität und die IT-Wertschöpfungskette
Weber, Arnd; Reith, Steffen; Kasper, Michael; Kuhlmann, Dirk; Seifert, Jean-Pierre; Krauß, Christoph
Journal Article
2018Sovereignty in Information Technology. Security, Safety and Fair Market Access by Openness and Control of the Supply Chain
Weber, Arnd; Reith, Steffen; Kasper, Michael; Kuhlmann, Dirk; Seifert, Jean-Pierre; Krauß, Christoph
Report
2018Transfer Learning for Data Triage Applications
Mayer, Felix; Schäfer, Marcel; Steinebach, Martin
Conference Paper
2018Trust4App: Automating Trustworthiness Assessment of Mobile Applications
Habib, S.M.; Alexopoulos, N.; Islam, M.M.; Heider, J.; Marsh, S.; Mühlhäuser, M.
Conference Paper
2018Unterstützung bei Bildsichtungen durch Deep Learning
Mayer, Felix; Steinebach, Martin
Conference Paper
2018The user-centered privacy-aware control system PRICON. An interdisciplinary evaluation
Walter, Jonas; Abendroth, Bettina; Pape, Thilo von; Plappert, Christian; Zelle, Daniel; Krauß, Christoph; Gagzow, Gundula; Decke, Hendrik; Lange, Benjamin; Mauthofer, Sebastian
Conference Paper
2018Verbundprojekt. Erkennung von Wirtschaftskriminalität und Versicherungsbetrug EWV. Schlussbericht EWV
Winter, Christian
Report
2018VVV - Sicherer Zugang zu Verschlüsselungsschlüsseln
Selzer, Annika; Waldmann, Ulrich
Report
2018VVV - Vertrauenswürdige Verteilung von Verschlüsselungsschlüsseln
Selzer, Annika; Waldmann, Ulrich
Report
2018Wie lässt sich eine Manipulation von Dokumenten und Bildern erkennen?
Steinebach, Martin; Winter, Christian
Journal Article
2018XMSS and Embedded Systems. XMSS Hardware Accelerators for RISC-V
Wang, Wen; Jungk, Bernhard; Wälde, Julian; Deng, Shuwen; Gupta, Naina; Szefer, Jakob; Niederhagen, Ruben
Journal Article
201727. SIT-SmartCard Workshop 2017
: Waldmann, Ulrich
Conference Proceedings
2017Addressing Industry 4.0 Security by Software-Defined Networking
Khondoker, Rahamatullah; Larbig, Pedro; Scheuermann, Dirk; Weber, Frank; Bayarou, Kpatcha
Book Article
2017Alle reden über Blockchain
Grimm, Rüdiger; Heinemann, Andreas
Journal Article
2017Analyse extremistischer Bestrebungen in sozialen Netzwerken
Böckler, Nils; Groß, Eva; Allwinn, Mirko; Dörr, Günter; Igel, Christoph; Jarolimek, Stefan; Pflug, Annika; Steinebach, Martin; Hoffmann, Jens; Weber, Kristin; Eppert, Kerstin; Roth, Viktoria; Zick, Andreas
Journal Article
2017Analysis of parser specification languages for the network intrusion detection in industrial systems
Bhardwaj, Shubham
: Khondoker, Rahamatullah; Waidner, Michael
Master Thesis
2017Anforderungsanalyse für Selbstdatenschutz im vernetzten Fahrzeug
Sinner, Nadine; Plappert, Christian; Mauthofer, Sebastian; Zelle, Daniel; Krauß, Christoph; Walter, Jonas; Abendroth, Bettina; Robrahn, Rasmus; Zwingelberg, Harald; Pape, Thilo von; Gasch, Niko; Springborn, Florian; Verdezki, Tanja
Report
2017Angreifermodell für Selbstdatenschutz im vernetzten Fahrzeug
Sinner, Nadine; Zelle, Daniel; Robrahn, Rasmus
Report
2017Architekturkonzept für Selbstdatenschutz im vernetzten Fahrzeug
Enzmann, Matthias; Lange, Benjamin; Mauthofer, Sebastian; Plappert, Christian; Zelle, Daniel
Report
2017Are we there yet? On RPKI's deployment and security
Gilad, Yossi; Cohen, Avichai; Herzberg, Amir; Schapira, Michael; Shulman, Haya
Conference Paper
2017Authentication-bypass vulnerabilities in SOHO routers
Rotenberg, Nadav; Shulman, Haya; Waidner, Michael; Zeltser, Benjamin
Conference Paper
2017Author clustering using compression-based dissimilarity scores: Notebook for PAN at CLEF 2017
Halvani, O.; Graner, L.
Conference Paper
2017Authorship verification based on compression-models
Halvani, Oren; Winter, Christian; Graner, Lukas
Report
2017Automated security analysis of virtualized infrastructures
Bleikertz, Sören
: Waidner, Michael; Groß, Thomas
Dissertation
2017Automatic detection of incorrect SSL API usages for native iOS applications
Tröger, Michael
: Waidner, Michael; Rückriegel, Christian; Huber, Stephan
Master Thesis
2017Automatic detection of JavaScript libraries in hybrid apps
Rahman, Mohammad Masudur
: Waidner, Michael; Heider, Jens
Master Thesis
2017Automatisierte Aufdeckung von Versicherungsbetrug
Steinebach, Martin; Winter, Christian; Halvani, Oren; Liu, Huaijan
Journal Article
2017Autorschaftsattribution im Big Data Kontext
Weigand, Stephan
: Halvani, Oren; Steinebach, Martin
Bachelor Thesis
2017Behavior analysis for safety and security in automotive systems
Rieke, Roland; Seidemann, Marc; Kengni Talla, Elise; Zelle, Daniel; Seeger, Bernhard
Conference Paper
2017Benefits of combining forensic image creation and file carving
Yannikos, York; Steinebach, Martin; Rettig, Michael
Conference Paper
2017Bilder und die mögliche Manipulation von Nachrichten
Steinebach, Martin
Journal Article
2017Blockchain und Smart Contracts
Schütte, Julian; Fridgen, Gilbert; Prinz, Wolfgang; Rose, Thomas; Urbach, Nils; Hoeren, Thomas; Guggenberger, Nikolas; Welzel, Christian; Holly, Steffen; Schulte, Axel; Sprenger, Philipp; Schwede, Christian; Weimert, Birgit; Otto, Boris; Dalheimer, Mathias; Wenzel, Markus; Kreutzer, Michael; Fritz, Michael; Leiner, Ulrich; Nouak, Alexander
: Prinz, Wolfgang (ed.); Schulte, Axel T. (ed.)
Report
2017Can security become a routine? A study of organizational change in an agile software development group
Poller, Andreas; Kocksch, Laura; Türpe, Sven; Epp, Felix; Kinder-Kurlanda, Katharina
Conference Paper
2017Chancen und Risiken des Einsatzes digitaler Bildforensik - Aufdeckung und Beweisbarkeit von Versicherungsbetrug aus rechtlicher, technischer und psychologischer Sicht
Marschall, Kevin; Herfurth, Constantin; Winter, Christian; Allwinn, Mirko
Journal Article
2017Concise software identifiers
Birkholz, Henk; Fitzgerald-McKay, Jessica; Schmidt, Charles; Waltermire, David
Report
2017Counting in the dark: DNS caches discovery and enumeration in the internet
Klein, Amit; Shulman, Haya; Waidner, Michael
Conference Paper
2017Database anonymization: Data utility and privacy leakage in generalization and microaggregation
Pasha, Jamal
: Waidner, Michael; Schäfer, Marcel
Master Thesis
2017Digital watermarking for verification of perception-based integrity of audio data
Zmudzinski, Sascha
: Waidner, Michael; Steinebach, Martin
Dissertation
2017Dynamic secure remote control for industrie 4.0
Damle, Sonal
: Khondoker, Rahamatullah; Larbig, Pedro; Waidner, Michael
Master Thesis
2017Effiziente Einbettung von Wasserzeichen in Ebooks
Bugert, Simon
: Liu, Huajian; Steinebach, Martin
Bachelor Thesis
2017Emission statt Transaktion: Weshalb das klassische Datenschutzparadigma nicht mehr funktioniert
Türpe, Sven; Geuter, Jürgen; Poller, Andreas
Book Article
2017Ensemble-basierte Autorenschaftsverifikation
Lang, Gerit
: Halvani, Oren; Steinebach, Martin
Bachelor Thesis
2017Entwicklung eines Datenschutzkompetenzmodells
Grimm, Rüdiger; Hug, Alexander
Conference Paper
2017Erhöhung der Sicherheit und des Datenschutzes für Smart-TV Konsumenten mit Hilfe eines Intrusion Prevention Systems
Dingerdissen, Jan
: Waidner, Michael
Bachelor Thesis
2017Erleichterung durch neuronale Netze
Steinebach, Martin; Mayer, Felix
Journal Article
2017Erweiterung eines statischen Datenflussanalyse-Tools für Java und Android um native Code Analyse
Hofmann, Matthias
: Waidner, Michael; Arzt, Steven
Bachelor Thesis
2017Forensic Image Inspection Assisted by Deep Learning
Steinebach, Martin; Mayer, Felix
Conference Paper
2017FPGA-based key generator for the Niederreiter cryptosystem using binary goppa codes
Wang, Wen; Szefer, Jakub; Niederhagen, Ruben
Conference Paper
2017A framework for network intrusion detection on open platform communications unified architecture
Bortoli, Tomas
: Larbig, Pedro; Weber, Frank; Khondoker, Rahamatullah; Waidner, Michael; Massacci, Fabio
Master Thesis
2017Guide for building an ECC pki
Moskowitz, Robert; Birkholz, Henk; Xia, Liang
Report
2017Hardening Javas Access Control by Abolishing Implicit Privilege Elevation
Holzinger, Philipp; Hermann, Ben; Lerch, Johannes; Bodden, Eric; Mezini. Mira
Conference Paper
2017Improving mobile-malware investigations with static and dynamic code analysis techniques
Rasthofer, Siegfried
: Bodden, Eric; Zeller, Andreas; Mezini, Mira
Dissertation
2017An Information Model for the Monitoring of Network Security Functions (NSF)
Xia, Liang; Zhang, Dacheng; Wu, Yi; Kumar, Rakesh; Lohiya, Anil; Birkholz, Henk
Report
2017Integration and performance analysis of OrchSec architecture
Bhandari, Prakash
: Khondoker, Rahamatullah; Trick, Ulrich; Lehmann, Armin
Master Thesis
2017Internet-wide study of DNS cache injections
Klein, A.; Shulman, H.; Waidner, M.
Conference Paper
2017An Introduction to Data Analytics for Software Security
Ben Othmane, L.; Brucker, A.D.; Dashevskyi, S.; Tsalovski, P.
Book Article
2017IT-Risikomanagement für Produktionssysteme - Basis zur Gestaltung sicherer Fertigungsprozesse
Kraft, Reiner; Stöwer, Mechthild
Book Article
2017IT-Risikomanagement im Produktionsumfeld - Herausforderungen und Lösungsansätze
Kraft, Rainer; Stöwer, Mechthild
Journal Article
2017IT-Sicherheitsaudits im Bereich der industriellen Produktion
Stöwer, Mechthild; Kraft, Reiner
Book Article
2017Lokale partielle Verschlüsselung von Gesichtern in JPEG-Bildern
Stein, Richard
: Steinebach, Martin; Waidner, Michael
Master Thesis
2017A machine-learning approach to automatically identify app categories based on Android binaries
Miltenberger, Marc
: Waidner, Michael; Rasthofer, Siegfried
Master Thesis
2017Making malory behave maliciously: Targeted fuzzing of android execution environments
Rasthofer, Siegfried; Arzt, Steven; Triller, Stefan; Pradel, Michael
Journal Article, Conference Paper
2017Managing security work in scrum: Tensions and challenges
Türpe, Sven; Poller, Andreas
Conference Paper
2017MP3 partial encryption for DRM
Steinebach, Martin; Berchtold, Waldemar
Conference Paper
2017On designing and implementing a framework for increasing transperency over mobile device traffic metadata
Conrad, Bernd
: Waidner, Michael
Master Thesis
2017On the usefulness of compression models for authorship verification
Halvani, Oren; Winter, C.; Graner, L.
Conference Paper
2017On using TLS to secure in-vehicle networks
Zelle, D.; Krauß, C.; Strauß, H.; Schmidt, K.
Conference Paper
2017One key to sign them all considered vulnerable: Evaluation of DNSSEC in the internet
Shulman, Haya; Waidner, Michael
Conference Paper
2017Photonic side channel attacks against RSA
Carmon, E.; Seifert, J.P.; Wool, A.
Conference Paper
2017Piraterieschutz und labellose Identifizierung von Bauteilen im Rahmen von Industrie 4.0
Bräuning, Marco
: Waidner, Michael (Betreuer); Scheuermann, Dirk (Betreuer)
Master Thesis
2017Positionspapier: Cybersicherheit in Deutschland
Waidner, Michael; Backes, Michael; Müller-Quade, Jörn
: Waidner, Michael
Report
2017Poster: X-ray your DNS
Klein, Amit; Kravtsov, Vladimir; Perlmuter, Alon; Shulman, Haya; Waidner, Michael
Conference Paper
2017Practical post-quantum cryptography. White Paper
Niederhagen, Ruben; Waidner, Michael
Report
2017Promoting secure Email communication and authentication
Zimmermann, Verena; Henhapl, Birgit; Gerber, Nina; Enzmann, Matthias
Conference Paper
2017Ratgeber für eine sichere zentrale Softwareverteilung
Herfert, Michael; Kunz, Thomas; Wolf, Ruben
: Waidner, Michael
Book
2017Restricted usage of anonymous credentials in vehicular ad hoc networks for misbehavior detection
Singh, A.; Fhom, H.C.S.
Journal Article
2017Das richtige Maß für Informationssicherheit
Stöwer, Mechthild
Conference Paper
2017Robustheit von Fuzzy-Hashing-Verfahren
Bretschneider, Daniel
: Waidner, Michael; Steinebach, Martin
Master Thesis
2017Rolling DICE. Lightweight remote attestation for COTS IoT hardware
Jäger, L.; Petri, R.; Fuchs, A.
Conference Paper
2017Runtime firmware product lines using TPM2.0
Fuchs, Andreas; Krauß, Christoph; Repp, Jürgen
Conference Paper
2017Schwachstellenscanner für Android Applikationen
Roth, Christopher
: Waidner, Michael; Arzt, Steven
Bachelor Thesis
2017SDN-based security policy module for Industry 4.0 remote maintenance
Papp, Katalin
: Khondoker, Rahamatullah; Weber, Frank; Larbig, Pedro; Massacci, Fabio; Waidner, Michael
Master Thesis
2017Secure communication protocol for a low-bandwidth audio channel
Berchtold, Waldemar; Lieb, Patrick; Steinebach, Martin
Conference Paper
2017Secure free-floating car sharing for offline cars
Dmitrienko, Alexandra; Plappert, Christian
Conference Paper
2017Security Automation and Continuous Monitoring (SACM) Terminology
Birkholz, Henk; Lu, Jarrett; Strassner, John; Cam-Winget, Nancy; Monville, Adam
Report
2017Security knowledge representation artifacts for creating secure IT systems
Ruiz, J.F.; Arjona, M.; Mana, A.; Rudolph, C.
Journal Article
2017Selbstdatenschutz im vernetzten Fahrzeug: Eine Datenschutzlösung unter Berücksichtigung der technischen, rechtlichen und Nutzeranforderungen
Krauß, Christoph; Pape, Thilo von; Robrahn, Rasmus; Zelle, Daniel
Journal Article
2017Smart filters for push updates - problem statement
Birkholz, Henk; Zheng, Guangying; Zhou, Tianran; Bryskin, Igor; Liu, Xufeng; Voit, Eric; Clemm, Alexander
Report
2017Smart TV privacy risks and protection measures
Ghiglieri, Marco
: Waidner, Michael; Volkamer, Melanie
Dissertation
2017The soot-based toolchain for analyzing android apps
Rasthofer, Siegfried; Arzt, Steven; Bodden, Eric
Conference Paper
2017Standortlokalisierung in modernen Smartphones - Grundlagen und aktuelle Entwicklungen
Grimm, Rüdiger; Dhein, Andreas
Journal Article
2017Static analysis of android apps: A systematic literature review
Li, L.; Bissyande, T.F.; Papadakis, M.; Rasthofer, S.; Bartel, A.; Octeau, D.; Klein, J.; Traon, L.
Journal Article
2017Survey of domain specific languages to build packet parsers for industrial protocols
Bhardwaj, Shubham; Khondoker, Rahamatullah; Larbig, Pedro; Bayarou, Kpatcha
Conference Paper
2017Eine systematische Evaluierung von Dateiformat Fuzzern zur Erkennung von Implementierungsfehlern und Verwundbarkeiten
Roth, Tobias
: Waidner, Michael; Huber, Stephan
Bachelor Thesis
2017Threats to validity in empirical software security research
Cruzes, D.S.; Ben Othmane, L.
Book Article
2017Towards enhancing the visual analysis of interdomain routing
Ulmer, Alex; Kohlhammer, Jörn; Shulman, Haya
Conference Paper
2017Towards Imperceptible Natural Language Watermarking for German
Halvani, Oren; Steinebach, Martin; Graner, Lukas
Conference Paper
2017The trouble with security requirements
Türpe, Sven
Conference Paper
2017Umfassende Sicherheit - Safety und Security im Kontext autonomer Systeme
Schneider, Daniel; Trapp, Mario; Dörr, Jörg; Dukanovic, Sinisa; Henkel, Thorsten; Khondoker, Rahamatullah; Krauß, Christoph; Mauthofer, Sebastian; Scheuermann, Dirk; Zelle, Daniel
Journal Article
2017Die vertrauenswürdige Verteilung von Verschlüsselungsschlüsseln als Hemmschuh der E-Mail-Verschlüsselung - ein Lösungsansatz
Blazy, Stephan; Gonscherowski, Susan; Kunz, Thomas; Selzer, Annika; Waldmann, Ulrich
Journal Article
2017Die Volksverschlüsselung: Förderung vertrauenswürdiger Ende-zu-Ende-Verschlüsselung durch benutzerfreundliches Schlüssel- und Zertifikatsmanagement
Spychalski, Dominik; Eckstein, Levona; Herfert, Michael; Trick, Daniel; Rubinstein, Tatjana
Conference Paper
2017Zertifikatsvalidierung im Kontext mobiler Apps
Heinrich, Alexander
: Waidner, Michael
Bachelor Thesis
2017Die Zukunft von Auftragsdatenverarbeitungskontrollen - Änderungen und Chancen durch die DSGVO
Selzer, Annika
Journal Article
2016(In-)security of smartphone anti-virus and security apps
Huber, Stephan; Rasthofer, Siegfried
Conference Paper
201626. SIT-SmartCard Workshop 2016
: Waldmann, Ulrich
Conference Proceedings
2016Access control and data separation metrics in cloud infrastructures
Jaeger, B.; Kraft, R.; Luhn, S.; Selzer, A.; Waldmann, U.
Conference Paper
2016Advanced remote firmware upgrades using TPM 2.0
Fuchs, Andreas; Krauß, Christoph; Repp, Jürgen
Conference Paper
2016Are we there yet? On RPKI's deployment and security
Gilad, Yossi; Cohen, Avichai; Herzberg, Amir; Schapira, Michael; Shulman, Haya
Journal Article
2016Authorship verification for different languages, genres and topics
Halvani, Oren; Winter, Christian; Pflug, Anika
Journal Article, Conference Paper
2016AutoSecSDNDemo: Demonstration of automated end-to-end security in software-defined networks
Khondoker, Rahamatullah; Larbig, Pedro; Senf, Daniel; Bayarou, Kpatcha; Gruschka, Nils
Conference Paper
2016Bidirectional symbolic analysis for effective branch testing
Baluda, Mauro; Denaro, Giovanni; Pezze, Mauro
Journal Article
2016Boomerang: Demand-driven flow- and context-sensitive pointer analysis for Java
Späth, J.; Quang Do, L.N.; Ali, K.; Bodden, E.
Conference Paper
2016Consumer oriented privacy preserving access control for electronic health records in the cloud
Fernando, Ruchith; Ranchal, Rohit; An, Byungchan; Ben Othmane, Lotfi; Bhargava, Bharat
Conference Paper
2016Datenschutz und Datenanalyse: Herausforderungen und Lösungsansätze
Steinebach, Martin; Krempel, Erik; Jung, Christian; Hoffmann, Mario
Journal Article
2016Delegierbare Zugriffssteuerung
Dmitrienko, Alexandra; Sadeghi, Ahmad-Reza
Patent
2016Dependency-based attacks on node.js
Pfretzschner, B.; Othmane, L. ben
Conference Paper
2016Detecting Android obfuscation techniques
Hachenberger, Julien
: Krauß, Christoph; Baier, Harald; Rasthofer, Siegfried
Master Thesis
2016DNSSEC misconfigurations in popular domains
Dai, Tianxiang; Shulman, Haya; Waidner, Michael
Conference Paper
2016Effects of image compression on ear biometrics
Rathgeb, C.; Pflug, A.; Wagner, J.; Busch, C.
Journal Article
2016An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures
Kumar Bairagi, A.; Khondoker, R.; Islam, R.
Journal Article
2016Entwicklung einer Android NFC-Signaturkarte
Uebel, Tobias
Conference Paper
2016Evaluation of lightweight TPMs for automotive software updates over the air
Petri, Richard; Springer, Markus; Zelle, Daniel; McDonald, Ira; Fuchs, Andreas; Krauß, Christoph
Presentation
2016First-time Security Audits As a Turning Point?: Challenges for Security Practices in an Industry Software Development Team
Poller, Andreas; Kocksch, Laura; Kinder-Kurlanda, Katharina; Anhand Epp, Felix
Conference Paper
2016Fragile and authentication watermarks
Steinebach, Martin; Liu, Huajian
Book Article
2016How to do it Wrong: Smartphone Antivirus and Security Applications Under Fire
Huber, Stephan; Rasthofer, Siegfried
Presentation
2016Idea: Usable platforms for secure programming - mining unix for insight and guidelines
Türpe, Sven
Conference Paper
2016The impact of security by design on the success of open source software
Chehrazi, Golriz; Heimbach, Irina; Hinz, Oliver
Conference Paper
2016An in-depth study of more than ten years of Java exploitation
Holzinger, P.; Triller, S.; Bartel, A.; Bodden, E.
Conference Paper
2016Industrie 4.0 - Mit Sicherheit eine digitale Herausforderung - Warum IT-Sicherheit in der digitalen Transformation der Industrie ein enabling Factor sein wird
Henkel, Thorsten
Journal Article
2016Investigating users' reaction to fine-grained data requests: A market experiment
Eling, N.; Rasthofer, S.; Kolhagen, M.; Bodden, E.; Buxmann, P.
Conference Paper
2016Die Kontrolle des Umsetzungsgrades des Zugangs- und Zugriffsschutzes
Jäger, Bernd; Kraft, Reiner; Selzer, Annika; Waldmann, Ulrich
Journal Article
2016Konzept und Entwicklung eines effizienten Multilayer Fuzzing Frameworks für Android
Adam, Christian
: Krauß, Christoph
Bachelor Thesis
2016Laientaugliche Schlüsselgenerierung für die End-zu-End-Verschlüsselung
Herfert, Michael; Selzer, Annika; Waldmann, Ulrich
Journal Article
2016Malware categorization using deep learning
Varghese, Joseph
: Waidner, Michael
Master Thesis
2016Maximal stable extremal regions for robust video watermarking
Berchtold, Waldemar; Schäfer, Marcel; Steinebach, Martin
Conference Paper
2016Message from the ASSD 2016 workshop chairs
Röning, J.; Othmane, L. ben
Conference Paper
2016Method for distributing applets, and entities for distributing applets
Dmitrienko, Alexandra; Sadeghi, Ahmad-Reza
Patent
2016Minimum requirements for evaluating side-channel attack resistance of elliptic curve implementations
Kasper, Michael; Petri, Richard; Feldhusen, Dirk; Gebhardt, Max; Illies, Georg; Lochter, Manfred; Stein, Oliver; Thumser, Wolfgang; Wicke, Guntram
Report
2016NetCo: Reliable routing with unreliable routers
Feldmann, Anja; Heyder, Philipp; Kreutzer, Michael; Schmid, Stefan; Seifert, Jean-Pierre; Shulman, Haya; Thimmaraju, Kashyap; Waidner, Michael; Sieberg, Jens
Conference Paper
2016A novel attack model for collusion secure fingerprinting codes
Schäfer, Marcel; Berchtold, Waldemar; Reimers, Nils; Stark, Teetje; Steinebach, Martin
Conference Paper
2016Obfuscation combiners
Fischlin, Marc; Herzberg, Amir; Bin Noon, Hod; Shulman, Haya
Conference Paper
2016Obfuscation Combiners
Fischlin, Marc; Herzberg, Amir; Bin Noon, Hod; Shulman, Haya
Journal Article
2016Papierbasiertes Schlüssel-Backup
Sinjari, Rybien
: Waidner, Michael; Spychalski, Dominik; Herfert, Michael
Bachelor Thesis
2016Penetration tests a turning point in security practices? Organizational challenges and implications in a software development team
Türpe, Sven; Kocksch, Laura; Poller, Andreas
Conference Paper
2016Performance optimization of a software-defined networking (SDN) security architecture
Ali, Syed Faraz
: Khondoker, Rahamatullah; Keil, Ferdinand; Hofmann, Klaus
Master Thesis
2016Preventing pass-the-hash and similar impersonation attacks in enterprise infrastructures
Oberle, Alexander; Larbig, Pedro; Marx, Ronald; Weber, Frank G.; Scheuermann, Dirk; Fages, Daniel; Thomas, Fabien
Conference Paper
2016A privacy-friendly method to reward participants of online-surveys
Herfert, Michael; Lange, Benjamin; Selzer, Annika; Waldmann, Ulrich
Conference Paper
2016Program analysis for the MS .NET framework
Kußmaul, Tobias
: Bodden, Eric; Arzt, Steven
Master Thesis
2016Quality metric for 2D textures on 3D objects
Berchtold, Waldemar; Schäfer, Marcel; Wombacher, Sascha; Steinebach, Martin
Conference Paper
2016Recht und Technik: Datenschutz im Diskurs
Grimm, Rüdiger; Sorge, Christoph; Spiecker, Indra
Conference Paper
2016Referenzmodell für ein Vorgehen bei der IT-Sicherheitsanalyse
Grimm, Rüdiger; Simić-Draws, Daniela; Bräulich, Katharina; Kasten, Andreas; Meletiadou, Anastasia
Journal Article
2016Research trends in security and DDoS in SDN
Dayal, N.; Maity, P.; Srivastava, S.; Khondoker, R.
Journal Article
2016Rethinking security for internet routing
Lychev, R.; Schapira, M.; Goldberg, S.
Journal Article
2016Reverse engineering Android Apps with CodeInspect
Rasthofer, S.; Arzt, S.; Miltenberger, M.; Bodden, E.
Conference Paper
2016SDN testing and debugging tools: A survey
Nde, G.N.; Khondoker, R.
Conference Paper
2016SDN-basiertes dynamisches Firewalling
Hanel, Daniel
: Braun, Michael; Frömmer, Björn; Larbig, Pedro; Khondoker, Rahamatullah
Bachelor Thesis
2016SecDevOps: Is it a marketing buzzword? Mapping research on security in DevOps
Mohan, V.; Ben Othmane, L.
Conference Paper
2016Secure time synchronization for network functions virtualization (NFV)
Klingel, David
: Khondoker, Rahamatullah
Master Thesis
2016Securing industrial legacy system communication through interconnected embedded plug-in devices
Heigl, Michael; Fuchs, Andreas; Grzemba, Andreas; Aman, Martin
Conference Paper
2016Security analysis of approaches to integrate middleboxes into software defined networks
Eggert, T.; Khondoker, R.
Conference Paper
2016Security analysis of OpenDayLight, ONOS, RoseMary and RYU SDN controllers
Arbettu, Ramachandra Kamath; Khondoker, Rahamatullah; Bayarou, Kpatcha; Weber, Frank
Conference Paper
2016Security in industrie 4.0 - Challenges and solutions for the fourth industrial revolution
Waidner, M.; Kasper, M.
Conference Paper
2016Security patterns modeling and formalization for pattern-based development of secure software systems
Hamid, Brahim; Gürgens, Sigi; Fuchs, Andreas
Journal Article
2016Selbstdatenschutz in Zeiten von massenhafter E-Mail-Überwachung
Hefert, Michael; Selzer, Annika; Waldmann, Ulrich
Journal Article
2016Simple photonic emission attack with reduced data complexity
Carmon, E.; Seifert, J.-P.; Wool, A.
Conference Paper
2016Smart-TV und Privatheit
Ghiglieri, Marco; Hansen, Marit; Nebel, Maxi; Pörschke, Julia V.; Fhom, Hervais S.
: Zoche, Peter (Hrsg.)
Report
2016Static analysis on native android libraries for detecting implementation flaws and reflective API calls
Roskosch, Philipp
: Waidner, Michael
Master Thesis
2016Stratum filtering: Cloud-based detection of attack sources
Herzberg, Amir; Shulman, Haya; Waidner, Michael
Conference Paper
2016Die teilautomatisierte Verifizierung der getrennten Verarbeitung in der Cloud
Jäger, Bernd; Kraft, Reiner; Selzer, Annika; Waldmann, Ulrich
Journal Article
2016Towards automated aim determination of a social media group: A survey as baseline
Wogatzke, Christian
: Khondoker, Rahamatullah
Term paper
2016Towards automated measurements of internet's naming infrastructure
Borgwart, Andreas; Shulman, Haya; Waidner, Michael
Conference Paper
2016Towards cross-platform cross-language analysis with soot
Arzt, S.; Kussmaul, T.; Bodden, E.
Conference Paper
2016Towards efficient security assurance for incremental software development the case of zen cart application
Ali, A.; Othmane, L. ben
Conference Paper
2016Towards privacy-preserving Mobile Location Analytics
Gassen, M.; Fhom, H.S.
Conference Paper
2016Trust establishment in cooperating cyber-physical systems
Rein, A.; Rieke, R.; Jäger, M.; Kuntze, N.; Coppolino, L.
Conference Paper
2016Version specific recognition of libraries in binaries for identifying vulnerabilities caused by these using the example of ARM-32
Wittmann, Andreas
: Waidner, Michael
Master Thesis
2016Wie geht es nach dem Safe Harbor Urteil der EuGH weiter?
Herfert, Michael; Selzer, Annika; Waldmann, Ulrich
Journal Article