Publications
Publications of Chair of Software Systems Group
2024[ to top ]
-
Verify your Labels! Trustworthy Predictions and Datasets via Confidence Scores. in the 33rd USENIX Security Symposium (USENIX Security 2024) (2024).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
SPOQchain: Platform for Secure, Scalable, and Privacy-preserving Supply Chain Tracing and Counterfeit Protection. Thesis; Master Thesis. (2024, June).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
PUF-based Authentication in IoT against Strong Physical Adversary using Zero-Knowledge Proofs. in SafeThings (2024).
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Time-Aware Face Anti-Spoofing with Rotation Invariant Local Binary Patterns and Deep Learning. in ArXiv | arXiv:2408.14829 (2024).
- [ BibTeX ]
- [ URL ]
- [ BibSonomy-Post ]
-
FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated Learning. in ArXiv | arXiv:2312.04432v2 (2024).
- [ BibTeX ]
- [ URL ]
- [ BibSonomy-Post ]
-
ClearStamp: A Human-Visible and Robust Model-Ownership Proof based on Transposed Model Training. in the 33rd USENIX Security Symposium (USENIX Security 2024) (2024).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Triple-S: Security Scoring System for IoT Devices. in IEEE International Conference on Omni-layer Intelligent Systems (COINS) (2024).
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Automatic Adversarial Adaption for Stealthy Poisoning Attacks in Federated Learning. in the Network and Distributed System Security Symposium (NDSS) (2024).
- [ BibTeX ]
- [ BibSonomy-Post ]
-
CrowdGuard: Federated Backdoor Detection in Federated Learning. in the Network and Distributed System Security Symposium (NDSS) (2024).
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Cloud-Based Machine Learning Models as Covert Communication Channels. in the 19th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2024) (2024).
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated Learning. in the Network and Distributed System Security Symposium (NDSS) (2024).
- [ BibTeX ]
- [ BibSonomy-Post ]
-
MirageFlow: A New Bandwidth Inflation Attack on Tor. in the Network and Distributed System Security Symposium (NDSS) (2024).
- [ BibTeX ]
- [ BibSonomy-Post ]
-
SPOQchain: Platform for Secure, Scalable, and Privacy-Preserving Supply Chain Tracing and Counterfeit Protection. in ArXiv | arXiv:2408.17049 (2024).
- [ Abstract ]
- [ BibTeX ]
- [ URL ]
- [ BibSonomy-Post ]
-
Kako: Mirai’s Vaccine Using Worm-Like Propagation Methods To Immunize Devices. Thesis; Bachelor Thesis. (2024, January).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
DNNShield: Embedding Identifiers for Deep Neural Network Ownership Verification. in ArXiv | arXiv:2403.06581 (2024).
- [ Abstract ]
- [ BibTeX ]
- [ URL ]
- [ Download ]
- [ BibSonomy-Post ]
-
Large-Scale Study of Vulnerability Scanners for Ethereum Smart Contracts. in To appear in the IEEE Symposium on Security & Privacy (2024).
- [ BibTeX ]
- [ BibSonomy-Post ]
-
PUF-Based Device-to-Device Authentication in IoT without Trusted Intermediaries. Thesis; Master Thesis. (2024, February).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
2023[ to top ]
-
Gamification of Ethical Hacking Lab. Thesis; Bachelor Thesis. (2023, February).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
CROSSCON: Interoperable IoT Security Stack - The RISC-V Opportunity. in RISC-V Summit Europe, Barcelona (2023).
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Ensuring Integrity of NVMe Offloaded Data in Large-Scale Machine Learning. Thesis; Master Thesis. (2023, January).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Vulnerability Scanners for Ethereum Smart Contracts: A Large-Scale Study. in ArXiv | arXiv:2312.16533 (2023).
- [ BibTeX ]
- [ URL ]
- [ Download ]
- [ BibSonomy-Post ]
-
Constrained Learning for Improved Attack Resilience in Federated Learning. Thesis; Master Thesis. (2023, September).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Penetration Testing of the eSano Platform. Thesis; Bachelor Thesis. (2023, March).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
TorMult: Introducing a Novel Tor Bandwidth Inflation Attack. in ArXiv | arXiv.2307.08550 (2023).
- [ BibTeX ]
- [ URL ]
- [ BibSonomy-Post ]
-
Avoid Adversarial Adaption in Federated Learning by Multi-Metric Investigations. in ArXiv | arXiv.2306.03600 (2023).
- [ BibTeX ]
- [ URL ]
- [ Download ]
- [ BibSonomy-Post ]
-
Adversarial Training in Federated Learning using Constrained Optimization Methods. Thesis; Master Thesis. (2023, May).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning. in Network and Distributed System Security Symposium (NDSS) (2023).
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
ClearMark: Intuitive and Robust Model Watermarking via Transposed Model Training. in ArXiv | arXiv:2310.16453v1 (2023).
- [ Abstract ]
- [ BibTeX ]
- [ URL ]
- [ Download ]
- [ BibSonomy-Post ]
-
MESAS: Poisoning Defense for Federated Learning Resilient against Adaptive Attackers. in ACM Conference on Computer and Communications Security (CCS) (2023).
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Penetration Testing of the eSano Platform with the focus on Patient and eCoach components. Thesis; Bachelor Thesis. (2023, July).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Metadata-based Malware Detection on Android using Machine Learning. in ArXiv | arXiv.2307.08547 (2023).
- [ BibTeX ]
- [ URL ]
- [ BibSonomy-Post ]
-
Email Discovery in Modern Applications. Thesis; Bachelor Thesis. (2023, July).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms. in Network and Distributed System Security Symposium (NDSS) (2023).
- [ BibTeX ]
- [ BibSonomy-Post ]
-
Sybil Attack in Tor - Shedding Light to the Diversity Problem in Tor. Thesis; Bachelor Thesis. (2023, August).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
G-Scan: Graph Neural Networks for Line-Level Vulnerability Identification in Smart Contracts. in arXiv:2307.08549 (2023).
- [ BibTeX ]
- [ URL ]
- [ BibSonomy-Post ]
-
Security of NVMe Offloaded Data in Large-Scale Machine Learning. in European Symposium on Research in Computer Security (ESORICS) (2023).
- [ BibTeX ]
- [ URL ]
- [ Download ]
- [ BibSonomy-Post ]
-
Vulnerability Assessment of Smart Contracts using Explainable AI Methods. Thesis; Master Thesis. (2023, January).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
2022[ to top ]
-
Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations. in ACM Transactions on Privacy and Security (TOPS) (2022).
- [ Abstract ]
- [ BibTeX ]
- [ BibSonomy-Post ]
-
Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges. in Cryptology ePrint Archive (2022).
- [ BibTeX ]
- [ URL ]
- [ BibSonomy-Post ]
-
Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges. in IEEE Transactions on Emerging Topics in Computing (2022).
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
FedCRI: Federated Mobile Cyber-Risk Intelligence. in The Network and Distributed System Security Symposium (NDSS) (2022).
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations. in Cryptology ePrint Archive, Report 2022/875 (2022). (2022/875)
- [ BibTeX ]
- [ URL ]
- [ BibSonomy-Post ]
-
Ransomware Detection in Databases through Dynamic Analysis of Query Sequences. in IEEE Conference on Communications and Network Security (CNS) (2022).
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
SCRAPS: Scalable Collective Remote Attestation for Pub-Sub IoT Networks with Untrusted Proxy Verifier (2022). (Vol. USENIX Security ’22)Coming Soon
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Towards a Cryptography Benchmark: A View on Attribute Based Encryption Schemes. in 2022 5th Conference on Cloud and Internet of Things (CIoT) (2022).
- [ BibTeX ]
- [ BibSonomy-Post ]
-
An Experience Report on the Suitability of a Distributed Group Encryption Scheme for an IoT Use Case. in IEEE 95th Vehicular Technology Conference (VTC) (2022).
- [ BibTeX ]
- [ BibSonomy-Post ]
-
A Survey on Secure Group Communication Schemes with Focus on IoT Communication. in IEEE Access (2022).
- [ BibTeX ]
- [ URL ]
- [ BibSonomy-Post ]
-
Digital contact Tracing solutions: Promises, Pitfalls and Challenges. in ArXiv I arXiv 2202.06698v2 (October 2022) (2022).
- [ BibTeX ]
- [ URL ]
- [ BibSonomy-Post ]
-
Close the Gate: Detecting Backdoored Models in Federated Learning based on Client-Side Deep Layer Output Analysis. in ArXiv | arXiv:2210.07714 (2022).
- [ BibTeX ]
- [ URL ]
- [ BibSonomy-Post ]
-
SCRAPS: Scalable Collective Remote Attestation for Pub-Sub IoT Networks with Untrusted Proxy Verifier. in USENIX Security (2022).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
2021[ to top ]
-
Remote Attestation for IoT with Smart Verifier. Thesis; Bachelor Thesis. (2021, January).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Sound Smart Contract Security Testing with Just One Tool. in CyberSec&AI 2021 (2021).
- [ BibTeX ]
- [ URL ]
- [ BibSonomy-Post ]
-
Increasing Security in Satellite Networks. in 72nd International Astronautical Congress (IAC) (2021).
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Benchmarking of Pre- and Post-Quantum Group Encryption Schemes with Focus on IoT. in IEEE 40th International Performance Computing and Communications Conference (IPCCC) (2021).
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Security Analysis of UniNow App. Thesis; Bachelor Thesis. (2021, June).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
RIP StrandHogg: A Practical StrandHogg Attack Detection Method on Android. in 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec) (2021).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Performance Evaluation for a Post-Quantum Public-Key Cryptosystem. in IEEE 40th International Performance Computing and Communications Conference (IPCCC) (2021).
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Intrusion Detection Using Machine Learning in Databases. Thesis; Master Thesis. (2021, April).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Towards a Group Encryption Scheme Benchmark: A View on Centralized Schemes with focus on IoT. in ACM/SPEC International Conference on Performance Engineering (ICPE) (2021).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
ESCORT: Ethereum Smart COntRacTs Vulnerability Detection using Deep Neural Network and Transfer Learning. in ArXiv | arXiv:2103.12607v1 (2021).
- [ Abstract ]
- [ BibTeX ]
- [ URL ]
- [ BibSonomy-Post ]
-
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers. in Network and Distributed System Security Symposium (NDSS) (2021).
- [ Abstract ]
- [ BibTeX ]
- [ URL ]
- [ Download ]
- [ BibSonomy-Post ]
-
Vision: Challenges & Opportunities. in Vision Paper of the Private AI Collaborative Research Institute (2021).
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
2020[ to top ]
-
Testbed for Security Testing of Smart Contracts. Thesis; Bachelor Thesis. (2020, November).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Contact Tracing by Giant Data Collectors: Opening Pandora’s Box of Threats to Privacy, Sovereignty and National Security. (2020).
- [ Abstract ]
- [ BibTeX ]
- [ URL ]
- [ Download ]
- [ BibSonomy-Post ]
-
LegIoT: Ledgered Trust Management Platform for IoT. in European Symposium on Research in Computer Security (ESORICS) (2020).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Evaluating the Performance of a State-of-the-Art Group-oriented Encryption Scheme for Dynamic Groups in an IoT Scenario. in IEEE 28th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS) (2020).Acceptance Rate: 27%
- [ Abstract ]
- [ BibTeX ]
- [ BibSonomy-Post ]
-
Strategies for the Security Assessment of IoT Devices by Certification Authorities. Thesis; Bachelor Thesis. (2020, May).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Evaluating the Privacy of Contact Discovery. Thesis; Master Thesis. (2020, July).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Mind the GAP: Security & Privacy Risks of Contact Tracing Apps. in TrustCom, Security Track (2020).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Mind the GAP: Security & Privacy Risks of Contact Tracing Apps. in ArXiv | arXiv:2006.05914v2 (2020).
- [ Abstract ]
- [ BibTeX ]
- [ URL ]
- [ BibSonomy-Post ]
-
Aggregatable Remote Attestation for IoT. Thesis; Bachelor Thesis. (2020, December).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers. in Cryptology ePrint Archive, Report 2020/1119 (2020).
- [ BibTeX ]
- [ URL ]
- [ BibSonomy-Post ]
-
SIMPL: Secure IoT Management Platform. in ITG Workshop on IT Security (ITSec) (2020).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Understanding UI attacks on Android. Thesis; Bachelor Thesis. (2020, December).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Detection of Software Vulnerabilities in Smart Contracts using Deep Learning. Thesis; Master Thesis. (2020, October).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
2019[ to top ]
-
DR.SGX: Automated and Adjustable Side-Channel Protection for SGX using Data Location Randomization. in Annual Computer Security Applications Conference (ACSAC) (2019).
- [ Abstract ]
- [ BibTeX ]
- [ URL ]
- [ Download ]
- [ BibSonomy-Post ]
-
Implementation and Evaluation of a Group Encryption Scheme. Thesis; Bachelor Thesis. (2019, December).
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Hands off my Database: Ransomware Detection in Databases through Dynamic Analysis of Query Sequences. in ArXiv | arXiv:1907.06775v1 (2019).
- [ BibTeX ]
- [ URL ]
- [ BibSonomy-Post ]
2018[ to top ]
-
DIMAQS - Dynamic Identification of Malicious Query Sequences. Thesis; Master Thesis. (2018, June).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
POSTER: Efficient and Effective Ransomware Detection in Databases. in 34th Annual Computer Security Applications Conference (ACSAC) (2018).
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Hardening Bitcoin Against Off-Topic Data Inclusion Attacks. Thesis; University of Würzburg. (2018, August).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Design of a Shared Parking System with Special Attention to Security Aspects. Thesis; Bachelor Thesis. (2018, August).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
SmarTor: Smarter Tor with Smart Contracts: Improving resilience of topology distribution in the Tor network. in Annual Computer Security Applications Conference (ACSAC) (2018).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]