Publications
Publications of Chair of Software Systems Group
2023[ to top ]
-
Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning in To appear at the Network and Distributed System Security Symposium (NDSS) (2023).
- [ BibTeX ]
- [ BibSonomy-Post ]
-
AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms in To appear at the Network and Distributed System Security Symposium (NDSS) (2023).
- [ BibTeX ]
- [ BibSonomy-Post ]
2022[ to top ]
-
FedCRI: Federated Mobile Cyber-Risk Intelligence in The Network and Distributed System Security Symposium (NDSS) (2022).
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
SCRAPS: Scalable Collective Remote Attestation for Pub-Sub IoT Networks with Untrusted Proxy Verifier. in USENIX Security (2022).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
An Experience Report on the Suitability of a Distributed Group Encryption Scheme for an IoT Use Case in IEEE 95th Vehicular Technology Conference (VTC) (2022).
- [ BibTeX ]
- [ BibSonomy-Post ]
-
Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations in ACM Transactions on Privacy and Security (TOPS) (2022).
- [ BibTeX ]
- [ BibSonomy-Post ]
-
Ransomware Detection in Databases through Dynamic Analysis of Query Sequences in IEEE Conference on Communications and Network Security (CNS) (2022).
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
A Survey on Secure Group Communication Schemes with Focus on IoT Communication in IEEE Access (2022).
- [ BibTeX ]
- [ URL ]
- [ BibSonomy-Post ]
-
Close the Gate: Detecting Backdoored Models in Federated Learning based on Client-Side Deep Layer Output Analysis in ArXiv | arXiv:2210.07714 (2022).
- [ BibTeX ]
- [ URL ]
- [ BibSonomy-Post ]
-
Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations in Cryptology ePrint Archive, Report 2022/875 (2022). (2022/875)
- [ BibTeX ]
- [ URL ]
- [ BibSonomy-Post ]
-
SCRAPS: Scalable Collective Remote Attestation for Pub-Sub IoT Networks with Untrusted Proxy Verifier (2022). (Vol. USENIX Security ’22)Coming Soon
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Towards a Cryptography Benchmark: A View on Attribute Based Encryption Schemes in 2022 5th Conference on Cloud and Internet of Things (CIoT) (2022).
- [ BibTeX ]
- [ BibSonomy-Post ]
-
Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges in Cryptology ePrint Archive (2022).
- [ BibTeX ]
- [ URL ]
- [ BibSonomy-Post ]
-
Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges. in IEEE Transactions on Emerging Topics in Computing (2022).
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Digital contact Tracing solutions: Promises, Pitfalls and Challenges. in ArXiv I arXiv 2202.06698v2 (October 2022) (2022).
- [ BibTeX ]
- [ URL ]
- [ BibSonomy-Post ]
2021[ to top ]
-
RIP StrandHogg: A Practical StrandHogg Attack Detection Method on Android in 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec) (2021).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Performance Evaluation for a Post-Quantum Public-Key Cryptosystem in IEEE 40th International Performance Computing and Communications Conference (IPCCC) (2021).
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Benchmarking of Pre- and Post-Quantum Group Encryption Schemes with Focus on IoT in IEEE 40th International Performance Computing and Communications Conference (IPCCC) (2021).
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Increasing Security in Satellite Networks in 72nd International Astronautical Congress (IAC) (2021).
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Vision: Challenges & Opportunities. in Vision Paper of the Private AI Collaborative Research Institute (2021).
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Security Analysis of UniNow App Thesis; University of Würzburg. (2021, June).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Towards a Group Encryption Scheme Benchmark: A View on Centralized Schemes with focus on IoT in ACM/SPEC International Conference on Performance Engineering (ICPE) (2021).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Intrusion Detection Using Machine Learning in Databases Thesis; University of Würzburg. (2021, April).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
ESCORT: Ethereum Smart COntRacTs Vulnerability Detection using Deep Neural Network and Transfer Learning in ArXiv | arXiv:2103.12607v1 (2021).
- [ Abstract ]
- [ BibTeX ]
- [ URL ]
- [ BibSonomy-Post ]
-
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers in Network and Distributed System Security Symposium (NDSS) (2021).
- [ Abstract ]
- [ BibTeX ]
- [ URL ]
- [ Download ]
- [ BibSonomy-Post ]
-
Remote Attestation for IoT with Smart Verifier Thesis; University of Würzburg. (2021, January).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
2020[ to top ]
-
Aggregatable Remote Attestation for IoT Thesis; University of Würzburg. (2020, December).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Understanding UI attacks on Android (2020, December).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Contact Tracing by Giant Data Collectors: Opening Pandora’s Box of Threats to Privacy, Sovereignty and National Security. (2020).
- [ Abstract ]
- [ BibTeX ]
- [ URL ]
- [ Download ]
- [ BibSonomy-Post ]
-
Evaluating the Performance of a State-of-the-Art Group-oriented Encryption Scheme for Dynamic Groups in an IoT Scenario in IEEE 28th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS) (2020).Acceptance Rate: 27%
- [ Abstract ]
- [ BibTeX ]
- [ BibSonomy-Post ]
-
Testbed for Security Testing of Smart Contracts Thesis; University of Würzburg. (2020, November).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Detection of Software Vulnerabilities in Smart Contracts using Deep Learning Thesis; University of Würzburg. (2020, October).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
LegIoT: Ledgered Trust Management Platform for IoT in European Symposium on Research in Computer Security (ESORICS) (2020).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Mind the GAP: Security & Privacy Risks of Contact Tracing Apps in TrustCom, Security Track (2020).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers in Cryptology ePrint Archive, Report 2020/1119 (2020).
- [ BibTeX ]
- [ URL ]
- [ BibSonomy-Post ]
-
Evaluating the Privacy of Contact Discovery Thesis; University of Würzburg. (2020, July).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Mind the GAP: Security & Privacy Risks of Contact Tracing Apps in ArXiv | arXiv:2006.05914v2 (2020).
- [ Abstract ]
- [ BibTeX ]
- [ URL ]
- [ BibSonomy-Post ]
-
SIMPL: Secure IoT Management Platform in ITG Workshop on IT Security (ITSec) (2020).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Strategies for the Security Assessment of IoT Devices by Certification Authorities Thesis; University of Würzburg; University of Würzburg. (2020, May).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
2019[ to top ]
-
Implementation and Evaluation of a Group Encryption Scheme Thesis; University of Würzburg. (2019, December).
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
DR.SGX: Automated and Adjustable Side-Channel Protection for SGX using Data Location Randomization in Annual Computer Security Applications Conference (ACSAC) (2019).
- [ Abstract ]
- [ BibTeX ]
- [ URL ]
- [ Download ]
- [ BibSonomy-Post ]
-
Hands off my Database: Ransomware Detection in Databases through Dynamic Analysis of Query Sequences in ArXiv | arXiv:1907.06775v1 (2019).
- [ BibTeX ]
- [ URL ]
- [ BibSonomy-Post ]
2018[ to top ]
-
POSTER: Efficient and Effective Ransomware Detection in Databases in 34th Annual Computer Security Applications Conference (ACSAC) (2018).
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
SmarTor: Smarter Tor with Smart Contracts: Improving resilience of topology distribution in the Tor network. in Annual Computer Security Applications Conference (ACSAC) (2018).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Hardening Bitcoin Against Off-Topic Data Inclusion Attacks Thesis; University of Würzburg. (2018, August).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
Design of a Shared Parking System with Special Attention to Security Aspects Thesis; University of Würzburg. (2018, August).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]
-
DIMAQS - Dynamic Identification of Malicious Query Sequences Thesis; University of Würzburg. (2018, June).
- [ Abstract ]
- [ BibTeX ]
- [ Download ]
- [ BibSonomy-Post ]