• Skip navigation
  • Skip to navigation
  • Skip to the bottom
Simulate organization breadcrumb open Simulate organization breadcrumb close
Friedrich-Alexander-Universität IT Security Infrastructures Lab
  • FAUTo the central FAU website
  1. Friedrich-Alexander-Universität
  2. Technische Fakultät
  3. Department Informatik
Suche öffnen
  • Campo
  • StudOn
  • FAUdir
  • Jobs
  • Map
  • Help
  1. Friedrich-Alexander-Universität
  2. Technische Fakultät
  3. Department Informatik
Friedrich-Alexander-Universität IT Security Infrastructures Lab
Navigation Navigation close
  • Research
    • Forensic Computing Group
    • Human Factors in Security and Privacy Group
    • Multimedia Security
    • Security Education Development Group
    • System Security Group
    • Information Security Group
    • Archive
    • Funded Projects
    • Publications
    Portal Research
  • Lab
    • Staff & Research Groups
    • Alumni
    • Partners
    • FAU i1 Webshop
    Portal Lab
  • Teaching
    • Courses
    • General Information regarding Teaching/Courses
    • Notes on Examinations
    • eTeaching
    • Theses
    • Writing a Thesis at Informatik 1
    Portal Teaching
  • How to reach us
  1. Home
  2. Research
  3. Publications

Publications

In page navigation: Research
  • Forensic Computing Group
  • Human Factors in Security and Privacy Group
  • Information Security Group
  • Multimedia Security
  • Security Education Development Group
  • System Security Group
  • Archive
  • Funded Projects
  • Publications
    • Technische Berichte in Digitaler Forensik

Publications

2025

  • Lindenmeier C., Gebhard S., Röckl J., Freiling F.:
    CCKex: High Bandwidth Covert Channels over Encrypted Network Traffic
    29th Nordic Conference (NordSec 2024) (Karlstad, 6. November 2024 - 7. November 2024)
    In: Secure IT Systems, Cham: 2025
    DOI: 10.1007/978-3-031-79007-2_20
  • Moussa D., Hirsch G., Rieß C.:
    EnvId: A Metric Learning Approach for Forensic Few-Shot Identification of Unseen Environments
    In: IEEE Transactions on Information Forensics and Security 20 (2025), p. 2281-2296
    ISSN: 1556-6013
    DOI: 10.1109/TIFS.2025.3541534
    URL: https://arxiv.org/pdf/2405.02119
  • Voigt L., Freiling F., Hargreaves CJ.:
    A metrics-based look at disk images: Insights and applications
    In: Forensic Science International: Digital Investigation 52 (2025), p. 301874
    ISSN: 2666-2817
    DOI: 10.1016/j.fsidi.2025.301874

2024

  • Aksoy A., Kesdoǧan D.:
    Detecting Corruptive Noise Rounds for Statistical Disclosure Attacks
    9th International Conference on Computer Science and Engineering, UBMK 2024 (Antalya, 26. October 2024 - 28. October 2024)
    In: Esref Adali (ed.): 2024 9th International Conference on Computer Science and Engineering (UBMK) 2024
    DOI: 10.1109/UBMK63289.2024.10773533
  • Bergmann S., Moussa D., Brand F., Kaup A., Rieß C.:
    Forensic analysis of AI-compression traces in spatial and frequency domain
    In: Pattern Recognition Letters (2024)
    ISSN: 0167-8655
    Open Access: https://www.sciencedirect.com/science/article/pii/S0167865524000503
    URL: https://www.sciencedirect.com/science/article/pii/S0167865524000503
  • Bove D.:
    A Large-Scale Study on the Prevalence and Usage of TEE-based Features on Android
    ARES '24 (Vienna, 30. July 2024 - 2. August 2024)
    In: Proceedings of the 19th International Conference on Availability, Reliability and Security, New York: 2024
    DOI: 10.1145/3664476.3664486
  • Bove D.:
    Trust In Your Pockets: On the Security of Mobile Devices through Trusted Computing (Dissertation, 2024)
    DOI: 10.25593/open-fau-510
  • Crasselt J., Pugliese G.:
    Started Off Local, Now We’re in the Cloud: Forensic Examination of the Amazon Echo Show 15 Smart Display
    Digital Forensics Research Conference USA (DFRWS USA 2024) (Baton Rouge, Louisiana, 9. July 2024 - 12. July 2024)
    DOI: 10.48550/arXiv.2408.15768
    URL: https://dfrws.org/wp-content/uploads/2024/07/dfrws-usa-2024-echo-show-15.pdf
  • Dreier LM., Vanini C., Hargreaves CJ., Breitinger F., Freiling F.:
    Beyond timestamps: Integrating implicit timing information into digital forensic timelines
    In: Forensic Science International: Digital Investigation 49 (2024), Article No.: 301755
    ISSN: 2666-2817
    DOI: 10.1016/j.fsidi.2024.301755
    URL: https://www.sciencedirect.com/science/article/pii/S266628172400074X
  • Ebbers S., Gense S., Bakkouch M., Freiling F., Schinzel S.:
    Grand theft API: A forensic analysis of vehicle cloud data
    In: Forensic Science International: Digital Investigation 48 (2024), Article No.: 301691
    ISSN: 2666-2817
    DOI: 10.1016/j.fsidi.2023.301691
  • Eckhardt D., Freiling F., Herrmann D., Katzenbeisser S., Pöhls HC.:
    Sicherheit in der Digitalisierung des Alltags: Definition eines ethnografisch-informatischen Forschungsfeldes für die Lösung alltäglicher Sicherheitsprobleme
    Sicherheit 2024 (Worms, 9. April 2024 - 11. April 2024)
    In: Sicherheit 2024. Sicherheit, Schutz und Zuverlässigkeit, Bonn: 2024
    DOI: 10.18420/sicherheit2024_007
    URL: https://dl.gi.de/server/api/core/bitstreams/e21ba581-6eda-40c0-9947-16c384430892/content
  • Eichhorn M., Pugliese G.:
    Do You “Relay” Want to Give Me Away? – Forensic Cues of Smart Relays and Their IoT Companion Apps
    In: Forensic Science International: Digital Investigation 50 (2024), p. 1-10
    ISSN: 2666-2817
    DOI: 10.1016/j.fsidi.2024.301810
    URL: https://www.sciencedirect.com/science/article/pii/S2666281724001343
  • Eichhorn M., Schneider J., Pugliese G.:
    Well Played, Suspect! – Forensic Examination of the Handheld Gaming Console “Steam Deck”
    DFRWS EU 2024 (Zaragoza, 19. March 2024 - 22. March 2024)
    DOI: 10.1016/j.fsidi.2023.301688
    URL: https://www.sciencedirect.com/science/article/pii/S266628172300207X
  • Eichler C., Röckl J., Jung B., Schlenk R., Müller T., Hönig T.:
    Profiling with trust: system monitoring from trusted execution environments
    In: Design Automation For Embedded Systems (2024)
    ISSN: 0929-5585
    DOI: 10.1007/s10617-024-09283-1
  • Gruber J.:
    The Cyber-traceological Model: A Model-based View of the Cybercriminalistic Task
    Digital Forensics Research Conference APAC (DFRWS APAC 2024) (Brisbane, 22. October 2024 - 24. October 2024)
    In: Raymond Chan and Mariya Shafat and Leslie Sikos (ed.): Proceedings of the Digital Forensics Research Conference Asia Pacific (DFRWS APAC) 2024
    Open Access: https://dfrws.org/wp-content/uploads/2024/10/the-cyber-traceological-model-a-model-based-view-of-the-cybercriminalistic-task.pdf
    URL: https://dfrws.org/wp-content/uploads/2024/10/the-cyber-traceological-model-a-model-based-view-of-the-cybercriminalistic-task.pdf
  • Hammer A., Cerny C., Jung C., Eichenmüller C., Freiling F.:
    Increasing Street Credibility: Cartography-aware Forensic Analysis of GNSS Trace Validity
    13th International Conference on IT Security Incident Management & IT Forensics
    In: Proceedings of the 13th International Conference on IT Security Incident Management & IT Forensics 2024
    DOI: 10.1145/3688809
  • Hammer A., Geus J., Nicolai F., Schütz P., Fein C., Freiling F.:
    Fit for Forensics: Taxonomy and Common Model for Forensic Analysis of Fitness Trackers
    13th International Conference on IT Security Incident Management & IT Forensics
    In: Proceedings of the 13th International Conference on IT Security Incident Management & IT Forensics 2024
    DOI: 10.1145/3687271
  • Hoffmann J., Haupert V.:
    Exklusivität der Apple Wallet: Missbrauch oder Sicherheitsgewinn?
    In: Recht der Zahlungsdienste (2024), p. 36-43
    ISSN: 2699-1969
    URL: https://www.ruw.de/suche/rdz/Exklusivit-der-App-Wal-Missbra-ode-Sicherheitsgew-930b939342f4893c0d8cdc9ffdbe02e8
  • Lindenmeier C., Gruber J., Freiling F.:
    InvesTEE: A TEE-supported Framework for Lawful Remote Forensic Investigations
    In: Digital Threats: Research and Practice (2024)
    ISSN: 2576-5337
    DOI: 10.1145/3680294
  • Lindenmeier C., Hammer A., Gruber J., Röckl J., Freiling F.:
    Key extraction-based lawful access to encrypted data: Taxonomy and survey
    In: Forensic Science International: Digital Investigation 50 (2024), Article No.: 301796
    ISSN: 2666-2817
    DOI: 10.1016/j.fsidi.2024.301796
  • Lindenmeier C., Payer M., Busch M.:
    EL3XIR: Fuzzing COTS Secure Monitors
    33rd USENIX Security Symposium (Philadelphia, 14. August 2024 - 16. August 2024)
    In: Balzarotti D, Xu W (ed.): Proceedings of the 33rd USENIX Security Symposium 2024
    Open Access: https://www.usenix.org/conference/usenixsecurity24/presentation/lindenmeier
    URL: https://www.usenix.org/conference/usenixsecurity24/presentation/lindenmeier
  • Lindenmeier C., Schulze SM., Röckl J., Busch M.:
    SyncEmu: Enabling Dynamic Analysis of Stateful Trusted Applications
    9th IEEE European Symposium on Security and Privacy Workshops - EUROS&PW 2024 (Vienna, 8. July 2024 - 12. July 2024)
    In: 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) 2024
    DOI: 10.1109/EuroSPW61312.2024.00024
  • Mader B., Eichenmüller C., Pugliese G., Eckhardt D., Benenson Z.:
    I Blame Apple in Part for My False Expectations: An Autoethnographic Study of Apple’s Lockdown Mode in iOS
    (2024)
    DOI: 10.48550/arXiv.2411.13249
    URL: https://arxiv.org/abs/2411.13249
    (online publication)
  • Maier A., Rieß C.:
    Reliable Out-of-Distribution Recognition of Synthetic Images
    In: Journal of Imaging 10 (2024)
    ISSN: 2313-433X
    DOI: 10.3390/jimaging10050110
  • Moussa D., Bergmann S., Rieß C.:
    Unmasking Neural Codecs: Forensic Identification of AI-compressed Speech
    Interspeech 2024 (Kos, 1. September 2024 - 5. September 2024)
    In: ISCA (ed.): Proc. Interspeech 2024 2024
    DOI: 10.21437/Interspeech.2024-1652
    URL: https://www.isca-archive.org/interspeech_2024/moussa24_interspeech.html#
  • Moussa D., Huber L., Hirsch G., Rieß C.:
    Now ForReal: Towards Practical Forensic Room Identification with Real-World Audio Data
    16th IEEE International Workshop on Information Forensics and Security, WIFS 2024 (Rome, 2. December 2024 - 5. December 2024)
    In: Proceedings - 16th IEEE International Workshop on Information Forensics and Security, WIFS 2024 2024
    DOI: 10.1109/WIFS61860.2024.10810676
    URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2024-Moussa-WIFS.pdf
  • Palutke R., Ruderich S., Wild M., Hacker J., Konrad J., Freiling F.:
    HyperLeech: Stealthy System Analysis with Minimal Target Impact through DMA-Based Hypervisor Injection
    (2024)
    URL: https://open.fau.de/handle/openfau/30871
    (Techreport)
  • Rieß C.:
    Dreams and Drama of Applied Image Forensics
    12th ACM Information Hiding and Multimedia Security Workshop, IH and MMSec 2024 (Baiona, ESP, 24. June 2024 - 26. June 2024)
    In: IH MMSec 2024 - Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security 2024
    DOI: 10.1145/3658664.3663549
  • Rodriguez Salas D., Rieß C., Martín Vicario C., Taubmann O., Ditt H., Schwab S., Dörfler A.:
    Analysing Variables for 90-Day Functional-Outcome Prediction of Endovascular Thrombectomy
    28th Annual Conference on Medical Image Understanding and Analysis (Manchester, 24. July 2024 - 26. September 2024)
    In: Moi Hoon Yap, Connah Kendrick, Ardhendu Behera, Timothy Cootes, Reyer Zwiggelaar (ed.): Medical Image Understanding and Analysis. 28th Annual Conference, MIUA 2024, Manchester, UK, July 24–26, 2024, Proceedings, Part II, Cham: 2024
    DOI: 10.1007/978-3-031-66958-3_15
  • Rzepka L., Ottmann J., Freiling F., Baier H.:
    Causal Inconsistencies Are Normal in Windows Memory Dumps (Too)
    In: Digital Threats: Research and Practice 5 (2024), Article No.: 3680293
    ISSN: 2576-5337
    DOI: 10.1145/3680293
  • Röckl J., Bernsdorf N., Müller T.:
    TeeFilter: High-Assurance Network Filtering Engine for High-End IoT and Edge Devices based on TEEs
    ACM AsiaCCS 2024: 19th ACM Asia Conference on Computer and Communications Security (Singapore, 1. July 2024 - 5. July 2024)
    In: Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, New York, NY: 2024
    DOI: 10.1145/3634737.3637643
  • Röckl J., Lindenmeier C., Schulze SM., Müller T.:
    Conditional Network Availability: Enhancing Connectivity Guarantees for TEE-Based Services
    9th IEEE European Symposium on Security and Privacy Workshops - EUROS&PW 2024 (Vienna, 8. July 2024 - 12. July 2024)
    In: 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) 2024
    DOI: 10.1109/EuroSPW61312.2024.00030
  • Savchenko E., Ottmann J., Freiling F.:
    In the time loop: Data remanence in main memory of virtual machines
    In: Forensic Science International: Digital Investigation 49 (2024), Article No.: 301758
    ISSN: 2666-2817
    DOI: 10.1016/j.fsidi.2024.301758
  • Schneider J., Eichhorn M., Dreier LM., Hargreaves CJ.:
    Applying digital stratigraphy to the problem of recycled storage media
    DFRWS USA 2024 (Baton Rouge, 9. July 2024 - 12. July 2024)
    In: Elsevier (ed.): Forensic Science International: Digital Investigation 2024
    DOI: 10.1016/j.fsidi.2024.301761
    URL: https://www.sciencedirect.com/science/article/pii/S2666281724000805
  • Schulze SM., Lindenmeier C., Röckl J.:
    BarriCCAde: Isolating Closed-Source Drivers with ARM CCA
    9th IEEE European Symposium on Security and Privacy Workshops - EUROS&PW 2024 (Vienna, 8. July 2024 - 12. July 2024)
    In: 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) 2024
    DOI: 10.1109/EuroSPW61312.2024.00033
  • Schulze SM., Lindenmeier C., Röckl J., Freiling F.:
    IlluminaTEE: Effective Man-At-The-End Attacks from within ARM TrustZone
    CheckMATE '24 (Salt Lake City, UT, 14. October 2024 - 18. October 2024)
    In: Schrittwieser S, Ianni M (ed.): CheckMATE '24: Proceedings of the 2024 Workshop on Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks 2024
    DOI: 10.1145/3689934.3690838
  • Stachak M., Geus J., Pugliese G., Freiling F.:
    Nyon Unchained: Forensic Analysis of Bosch’s eBike Board Computers
    Digital Forensics Research Conference Europe (DFRWS EU) (Zaragoza, 19. March 2024 - 22. March 2024)
    In: Digital Forensics Research Conference Europe (DFRWS EU) 2024
    Open Access: https://dfrws.org/wp-content/uploads/2024/03/Nyon-Unchained-Forensic-Analysis-of-Boschs-eBike-Board-Computer_2024.pdf
  • Uhlenbrock L., Cozzolino D., Moussa D., Verdoliva L., Riess C.:
    Did You Note My Palette? Unveiling Synthetic Images Through Color Statistics
    ACM Workshop on Information Hiding and Multimedia Security (Baiona, 24. June 2024 - 26. June 2024)
    In: Association for Computing Machinery (ed.): Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security 2024
    DOI: 10.1145/3658664.3659652
  • Uhlenbrock L., Moussa D., Simmler M., Canova G., Riess C.:
    Synthetische Bilddaten vor Gericht
    In: Datenschutz und Datensicherheit (2024)
    ISSN: 1614-0702
  • Voigt L., Freiling F., Hargreaves CJ.:
    Re-imagen: Generating coherent background activity in synthetic scenario-based forensic datasets using large language models
    In: Forensic Science International: Digital Investigation 50 (2024), p. 301805
    ISSN: 2666-2817
    DOI: 10.1016/j.fsidi.2024.301805
  • Weinberger L., Eichenmüller C., Gassmann F., Pugliese G., Benenson Z.:
    Used, Avoided, Restricted? Perceptions, Behavior, and Changes in Video Conferencing of German-speaking Users During and After the Pandemic
    European Symposium on Usable Security (EuroUSEC 2024) (Karlstad, 30. September 2024 - 1. October 2024)
    In: Proceedings of the 2024 European Symposium on Usable Security, New York, NY, USA: 2024
    DOI: 10.1145/3688459.3688478
  • Wunder J., Aurich J., Benenson Z.:
    From Chaos to Consistency: The Role of CSAF in Streamlining Security Advisories
    The 2024 European Symposium on Usable Security (Karlstad University, 30. September 2024 - 1. October 2024)
    DOI: 10.1145/3688459.3688463
  • Wunder J., Corona A., Hammer A., Benenson Z.:
    On NVD Users’ Attitudes, Experiences, Hopes and Hurdles
    In: Digital Threats: Research and Practice (2024)
    ISSN: 2576-5337
    DOI: 10.1145/3688806
  • Wunder J., Kurtz A., Eichenmüller C., Gassmann F., Benenson Z.:
    Shedding Light on CVSS Scoring Inconsistencies: A User-Centric Study on Evaluating Widespread Security Vulnerabilities
    45th IEEE Symposium on Security and Privacy, SP 2024 (San Francisco, CA, 20. May 2024 - 23. May 2024)
    In: 2024 IEEE Symposium on Security and Privacy (SP), New York City: 2024
    DOI: 10.1109/SP54263.2024.00058

2023

  • Aksoy A., Kesdogan D.:
    Effect of Group Based Synchronization on User Anonymity in Mix Networks
    18th International Conference on Availability, Reliability and Security, ARES 2023 (Benevento, ITA, 29. August 2023 - 1. September 2023)
    In: ACM International Conference Proceeding Series 2023
    DOI: 10.1145/3600160.3604998
  • Bajramovic E., Fein C., Frinken M., Rösler P., Freiling F.:
    LAVA: Log Authentication and Verification Algorithm
    12th International Conference on IT Security Incident Management & IT Forensics (IMF 2023) (Munich, Germany, 23. May 2023 - 24. May 2023)
    DOI: 10.1145/3609233
  • Bergmann S., Moussa D., Brand F., Kaup A., Rieß C.:
    Frequency-Domain Analysis of Traces for the Detection of AI-based Compression
    International Workshop on Biometrics and Forensics 2023 (Barcelona, 19. April 2023 - 20. April 2023)
    In: IEEE (ed.): 2023 International Workshop on Biometrics and Forensics (IWBF) 2023
    DOI: 10.1109/iwbf57495.2023.10157489
    URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2023-Bergmann-IWBF.pdf
  • Block F.:
    Windows memory forensics: Identification of (malicious) modifications in memory-mapped image files
    In: Forensic Science International: Digital Investigation 45 (2023), Article No.: 301561
    ISSN: 2666-2817
    DOI: 10.1016/j.fsidi.2023.301561
  • Bove D., Funk J.:
    Basic Secure Services for Standard RISC-V Architectures
    In: Computers & Security 133 (2023), Article No.: 103415
    ISSN: 0167-4048
    DOI: 10.1016/j.cose.2023.103415
    URL: https://authors.elsevier.com/a/1hZ8Rc43v0a1t
  • Bumiller F., Eichenmüller C., Benenson Z.:
    "You're not smart enough for it. You can't do it anyway." - Experiences and Coping Strategies of Female System Administrators
    2023 CHI Conference on Human Factors in Computing Systems, CHI 2023 (Hamburg, DEU, 23. April 2023 - 28. April 2023)
    In: Conference on Human Factors in Computing Systems - Proceedings 2023
    DOI: 10.1145/3544549.3585648
  • Dewald A., Freiling F., Groß T., Kniel D., Michael R., Rieck K.:
    Möglichkeiten und Grenzen KI-gestützter Analyse digitaler Spuren
    (2023), p. 43-46
  • Eckhardt D., Freiling F., Herrmann D., Katzenbeisser S., Pöhls HC.:
    Sicherheit in der Digitalisierung des Alltags: Definition eines ethnografisch-informatischen Forschungsfeldes für die Lösung alltäglicher Sicherheitsprobleme
    (2023)
    DOI: 10.15475/sidial.2023
    URL: https://opus4.kobv.de/opus4-uni-passau/frontdoor/index/index/docId/1372
    (Techreport)
  • Freiling F.:
    Zum Umgang mit Erkenntnissen der IT-Sicherheitsforschung
    In: Sebastian Golla, Dominik Brodowski (ed.): IT-Sicherheitsforschung und IT-Strafrecht, Tübingen: Mohr Siebeck, 2023, p. 21-33
    ISBN: 978-3-16-162179-6

    DOI: 10.1628/978-3-16-162184-0
  • Geus J., Ottmann J., Freiling F.:
    Systematic Evaluation of Forensic Data Acquisition using Smartphone Local Backup
    Digital Forensics Research Conference USA (DFRWS USA) 2023 (Baltimore, MD, 9. July 2023 - 12. July 2023)
    In: Proceedings of the Digital Forensics Research Conference USA (DFRWS USA) 2023 2023
  • Gruber J.:
    Identifizierung von Malware-Infrastruktur mittels verteilter Spamtrap-Systeme
    Sicherheit in vernetzten Systemen: 30. DFN-Konferenz (Hamburg, 8. February 2023 - 10. February 2023)
    In: Albrecht Ude (ed.): Sicherheit in vernetzten Systemen: 30. DFN-Konferenz 2023
  • Gruber J., Hargreaves CJ., Freiling F.:
    Contamination of digital evidence: Understanding an underexposed risk
    In: Forensic Science International: Digital Investigation 44 (2023), Article No.: 301501
    ISSN: 2666-2817
    DOI: 10.1016/j.fsidi.2023.301501
  • Gruber J., Humml M.:
    A Formal Treatment of Expressiveness and Relevance of Digital Evidence
    In: Digital Threats: Research and Practice (2023)
    ISSN: 2576-5337
    DOI: 10.1145/3608485
  • Gruber J., Humml M., Schröder L., Freiling F.:
    Formal Verification of Necessary and Sufficient Evidence in Forensic Event Reconstruction
    Digital Forensics Research Conference Europe (DFRWS EU 2023) (Bonn, 21. March 2023 - 24. March 2023)
    In: Edita Bajramovic and Ricardo J. Rodríguez (ed.): Proceedings of the Digital Forensics Research Conference Europe (DFRWS EU) 2023
    Open Access: https://dfrws.org/wp-content/uploads/2023/03/2023-03-20_formal-verification-of-ne-se_gruber_dfrws-proc.pdf
    URL: https://dfrws.org/wp-content/uploads/2023/03/2023-03-20_formal-verification-of-ne-se_gruber_dfrws-proc.pdf
  • Gruber J., Voigt L., Freiling F.:
    Faktoren erfolgreicher Cybercrime-Ermittlungen: Ergebnisse einer Expertenbefragung
    In: Kriminalistik 77 (2023), p. 266 - 271
    ISSN: 0023-4699
  • Hammer A., Ohlig M., Geus J., Freiling F.:
    A Functional Classification of Forensic Access to Storage and its Legal Implications
    12th International Conference on IT Security Incident Management & IT Forensics (Munich, 23. May 2023 - 24. May 2023)
    In: Proceedings of the 12th International Conference on IT Security Incident Management & IT Forensics 2023
    DOI: 10.1145/3609231
  • Joshaghani M., Davari A., Nejati Hatamian F., Maier A., Riess C.:
    Bayesian Convolutional Neural Networks for Limited Data Hyperspectral Remote Sensing Image Classification
    In: IEEE Geoscience and Remote Sensing Letters 20 (2023), Article No.: 5506305
    ISSN: 1545-598X
    DOI: 10.1109/LGRS.2023.3287504
  • Koch T., Rieß C., Köhler T.:
    LORD: Leveraging Open-Set Recognition with Unknown Data
    International Conference on Computer Vision Workshop (ICCVW) (Paris, 2. October 2023 - 6. October 2023)
    In: 2023 IEEE/CVF International Conference on Computer Vision Workshops (ICCVW) 2023
    DOI: 10.1109/ICCVW60793.2023.00473
    URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2023-Koch-ICCVW.pdf
  • Lorch B.:
    Reliable Machine Learning Methods in Image Forensics (Dissertation, 2023)
    URL: https://nbn-resolving.org/urn:nbn:de:bvb:29-opus4-217322
  • Lorch B., Schirrmacher F., Maier A., Rieß C.:
    On the Security of the One-and-a-Half-Class Classifier for SPAM Feature-Based Image Forensics
    In: IEEE Transactions on Information Forensics and Security (2023)
    ISSN: 1556-6013
    DOI: 10.1109/TIFS.2023.3266168
    URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2023-Lorch-OSO.pdf
  • Maier A., Rieß C.:
    Zuverlässigkeit von KI in der Multimedia-Forensik
    In: Datenschutz und Datensicherheit (2023)
    ISSN: 1614-0702
    DOI: 10.1007/s11623-023-1748-2
  • Moussa D., Hirsch G., Wankerl S., Rieß C.:
    Point to the Hidden: Exposing Speech Audio Splicing via Signal Pointer Nets
    Interspeech 2023, 24th Annual Conference of the International Speech Communication Association (Dublin, 20. August 2023 - 24. August 2023)
    In: ISCA (ed.): Proc. INTERSPEECH 2023 2023
    DOI: 10.21437/Interspeech.2023-996
    URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2023-Moussa-Interspeech.pdf
  • Ottmann J., Breitinger F., Freiling F.:
    An Experimental Assessment of Inconsistencies in Memory Forensics
    In: ACM Transactions on Privacy and Security 27 (2023), Article No.: 2
    ISSN: 2471-2566
    DOI: 10.1145/3628600
  • Ottmann J., Cengiz Ü., Breitinger F., Freiling F.:
    As if Time Had Stopped – Checking Memory Dumps for Quasi-Instantaneous Consistency
    Digital Forensics Research Conference USA (DFRWS USA) 2023 (Baltimore, MD, 9. July 2023 - 12. July 2023)
    In: Proceedings of the Digital Forensics Research Conference USA (DFRWS USA) 2023 2023
  • Quintero J., Karaseva V., Gassmann F., Benenson Z.:
    User Acceptance Factors of Usage-Based Insurance
    6th International Conference on Intelligent Traffic and Transportation, ICITT 2022 (Paris, FRA, 25. September 2022 - 27. September 2022)
    In: Mahmoud Shafik (ed.): Advances in Transdisciplinary Engineering 2023
    DOI: 10.3233/ATDE230018
  • Röckl J., Wagenhäuser A., Müller T.:
    Veto: Prohibit Outdated Edge System Software from Booting
    9th International Conference on Information Systems Security and Privacy (ICISSP) (Lisbon, 22. February 2023 - 24. February 2023)
    In: In Proceedings of the 9th International Conference on Information Systems Security and Privacy (ICISSP) 2023
    DOI: 10.5220/0011627700003405
  • Rückert C., Meyer-Wegener K., Safferling C., Freiling F.:
    Messengerdienst-Nachrichten als Beweismittel im Strafverfahren – am Beispiel der Auswertung von WhatsApp-Chats
    In: Juristische Rundschau 2023 (2023), p. 366-378
    ISSN: 0022-6920
    DOI: 10.1515/juru-2023-2051
  • Schiller K., Adamsky F., Benenson Z.:
    Towards an Empirical Study to Determine the Effectiveness of Support Systems against E-Mail Phishing Attacks
    2023 CHI Conference on Human Factors in Computing Systems, CHI 2023 (Hamburg, DEU, 23. April 2023 - 28. April 2023)
    In: Conference on Human Factors in Computing Systems - Proceedings 2023
    DOI: 10.1145/3544549.3585658
  • Schirrmacher F., Lorch B., Maier A., Riess C.:
    Benchmarking Probabilistic Deep Learning Methods for License Plate Recognition
    In: IEEE Transactions on Intelligent Transportation Systems (2023), p. 1-14
    ISSN: 1524-9050
    DOI: 10.1109/TITS.2023.3278533
  • Schneider J.:
    On the Trustworthiness of Digital Evidence and How It Can Be Established (Dissertation, 2023)
    DOI: 10.25593/open-fau-103
  • Weinberger L., Eichenmüller C., Benenson Z.:
    Interplay of Security, Privacy and Usability in Videoconferencing
    2023 CHI Conference on Human Factors in Computing Systems, CHI 2023 (Hamburg, DEU, 23. April 2023 - 28. April 2023)
    In: Conference on Human Factors in Computing Systems - Proceedings 2023
    DOI: 10.1145/3544549.3585683

2022

  • Anantharajaiah N., Asfour T., Bader M., Bauer L., Becker J., Bischof S., Brand M., Bungartz HJ., Eichler C., Esper K., Falk J., Fasfous N., Freiling F., Fried A., Gerndt M., Glaß M., Gonzalez J., Hannig F., Heidorn C., Henkel J., Herkersdorf A., Herzog B., John J., Hönig T., Hundhausen F., Khdr H., Langer T., Lenke O., Lesniak F., Lindermayr A., Listl A., Maier S., Megow N., Mettler M., Müller-Gritschneder D., Nassar H., Paus F., Pöppl A., Pourmohseni B., Rabenstein J., Raffeck P., Rapp M., Rivas SN., Sagi M., Schirrmacher F., Schlichtmann U., Schmaus F., Schröder-Preikschat W., Schwarzer T., Sikal MB., Simon B., Snelting G., Spieck J., Srivatsa A., Stechele W., Teich J., Comprés Ureña IA., Verbauwhede I., Walter D., Wild T., Wildermann S., Wille M., Witterauf M., Zhang L.:
    Invasive Computing
    FAU University Press, 2022
    ISBN: 978-3-96147-571-1
    DOI: 10.25593/978-3-96147-571-1
  • Benenson Z., Freiling F., Meyer-Wegener K.:
    Soziotechnische Einflussfaktoren auf die "digitale Souveränität" des Individuums
    In: Glasze, Georg; Odzuck; Eva; Staples, Ronald (ed.): Was heißt digitale Souveränität? Diskurse, Praktiken und Voraussetzungen "individueller" und "staatlicher Souveränität" im digitalen Zeitalter, Bielefeld: transcript Verlag, 2022, p. 61 - 87 (Politik in der digitalen Gesellschaft)
    ISBN: 978-3-8376-5827-9

    DOI: 10.14361/9783839458273
  • Bove D.:
    Secure Services for Standard RISC-V Architectures
    The 17th International Conference on Availability, Reliability and Security (Vienna, Austria, 23. August 2022 - 26. August 2022)
    In: Association for Computing Machinery (ed.): Proceedings of the 17th International Conference on Availability, Reliability and Security 2022
    DOI: 10.1145/3538969.3538998
    URL: https://dl.acm.org/doi/10.1145/3538969.3538998
  • Bove D.:
    SoK: The Evolution of Trusted UI on Mobile
    ACM ASIACCS 2022 (Nagasaki, Japan, 31. May 2022 - 2. June 2022)
    In: Association for Computing Machinery (ed.): ASIA CCS '22: Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security 2022
    DOI: 10.1145/3488932.3517417
    URL: https://dl.acm.org/doi/10.1145/3488932.3517417
  • Brieger T., Raichur NL., Jdidi D., Ott F., Feigl T., Van Der Merwe JR., Ruegamer A., Felber W.:
    Multimodal Learning for Reliable Interference Classification in GNSS Signals
    Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+) (Denver, CO, 19. September 2022 - 23. September 2022)
    In: Proc. Intl. Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+) 2022
    DOI: 10.33012/2022.18586
  • Büter R., Engst G., Esser K., Freiling F., Friedrich K., Friedrich T., Hammer A., Heine L., Heinlein L., Korn O., Minuth C., Müller M., Müller N., Reithmeier J., Ripley N., Schulze M., Sievers M., Srikhaolan C., Zenk J.:
    A Comparison of Cloud Storage Technologies as Sources of Digital Evidence
    CS-2022-01 (2022)
    ISSN: 2191-5008
    Open Access: https://nbn-resolving.org/urn:nbn:de:bvb:29-opus4-210457
    URL: https://nbn-resolving.org/urn:nbn:de:bvb:29-opus4-210457
    (Working Paper)
  • Deuber D., Gruber J., Humml M., Ronge V., Scheler N.:
    Argumentation Schemes for Blockchain Deanonymization
    Sixteenth International Workshop on Juris-informatics (JURISIN 2022) (Kyoto International Conference Center, Kyoto, Japan, 13. June 2022 - 14. June 2022)
  • Dreissig F., Röckl J., Müller T.:
    Compiler-Aided Development of Trusted Enclaves with Rust
    17th International Conference on Availability, Reliability and Security, ARES 2022 (Vienna, AUT, 23. August 2022 - 26. August 2022)
    In: ACM International Conference Proceeding Series 2022
    DOI: 10.1145/3538969.3538972
  • Einzinger C., Rückert C., Freiling F.:
    Datenminimierung in der Netzwerkforensik
    In: Datenschutz und Datensicherheit 46 (2022), p. 149-155
    ISSN: 1614-0702
    DOI: 10.1007/s11623-022-1580-0
  • Einzinger C., Rückert C., Freiling F.:
    Datenminimierung in der Netzwerkforensik
    In: Datenschutz und Datensicherheit 46 (2022), p. 149-155
    ISSN: 1614-0702
    DOI: 10.1007/s11623-022-1580-0
  • Groß T., Schleier T., Müller T.:
    ReFuzz — Structure Aware Fuzzing of the Resilient File System (ReFS)
    2022 ACM Asia Conference on Computer and Communications Security (ASIA CCS '22) (Nagasaki, 30. May 2022 - 3. June 2022)
    In: Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security (ASIA CCS '22) 2022
    DOI: 10.1145/3488932.3523260
  • Gruber J., Brodowski D., Freiling F.:
    Die polizeiliche Aufgabe und Pflicht zur digitalen Gefahrenabwehr
    In: Zeitschrift für das Gesamte Sicherheitsrecht 5 (2022), p. 171 - 176
    ISSN: 2567-3823
  • Gruber J., Freiling F.:
    Fighting Evasive Malware
    In: Datenschutz und Datensicherheit 46 (2022), p. 284-290
    ISSN: 1614-0702
    DOI: 10.1007/s11623-022-1604-9
    URL: https://link.springer.com/article/10.1007/s11623-022-1604-9
  • Gruber J., Freiling F.:
    Fighting Evasive Malware: How to Pass the Reverse Turing Test By Utilizing a VMI-Based Human Interaction Simulator
    Sicherheit, Schutz und Zuverlassigkeit: Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft fur Informatik e.V. (GI) (Karlsruhe, 5. April 2022 - 8. April 2022)
    In: Christian Wressnegger, Delphine Reinhardt, Thomas Barber, Bernhard C. Witt, Daniel Arp, Zoltan Mann (ed.): Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI) 2022
    DOI: 10.18420/sicherheit2022_03
  • Gruber J., Voigt L., Benenson Z., Freiling F.:
    Foundations of cybercriminalistics: From general process models to case-specific concretizations in cybercrime investigations
    In: Forensic Science International: Digital Investigation 43 (2022), Article No.: 301438
    ISSN: 2666-2817
    DOI: 10.1016/j.fsidi.2022.301438
    URL: https://www.sciencedirect.com/science/article/pii/S2666281722001196
  • Göbel T., Maltan S., Türr J., Baier H., Mann F.:
    ForTrace - A holistic forensic data set synthesis framework
    In: Forensic Science International: Digital Investigation 40 (2022), Article No.: 301344
    ISSN: 2666-2817
    DOI: 10.1016/j.fsidi.2022.301344
  • Hadwiger B., Riess C.:
    Deep Metric Color Embeddings for Splicing Localization in Severely Degraded Images
    In: IEEE Transactions on Information Forensics and Security 17 (2022), p. 2614-2627
    ISSN: 1556-6013
    DOI: 10.1109/TIFS.2022.3189527
    URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2022-Hadwiger-DMC.pdf
  • Jdidi D., Brieger T., Feigl T., Contreras Franco D., Van Der Merwe JR., Ruegamer A., Seitz J., Felber W.:
    Unsupervised Disentanglement for Post-Identification of GNSS Interference in the Wild
    Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+) (Denver, CO, 19. September 2022 - 23. September 2022)
    In: Proc. Intl. Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+) 2022
    DOI: 10.33012/2022.18493
  • Jung B., Eichler C., Röckl J., Schlenk R., Hönig T., Müller T.:
    Trusted Monitor: TEE-Based System Monitoring
    Brazilian Symposium on Computing Systems Engineering (SBESC 2022) (Fortaleza, CE, Brazil, 21. November 2022 - 24. November 2022)
    In: IEEE (ed.): Brazilian Symposium on Computing Systems Engineering 2022
    DOI: 10.1109/SBESC56799.2022.9964869
    URL: https://ieeexplore.ieee.org/document/9964869
  • Koch T., Liebezeit F., Rieß C., Christlein V., Köhler T.:
    Exploring the Open World Using Incremental Extreme Value Machines
    International Conference on Pattern Recognition (ICPR) (Montréal, 21. August 2022 - 25. August 2022)
    In: 2022 26th International Conference on Pattern Recognition (ICPR) 2022
    DOI: 10.1109/ICPR56361.2022.9956423
    URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2022-Koch-ICPR.pdf
  • Körber M., Kalysch A., Massonne W., Benenson Z.:
    Usability of Antivirus Tools in a Threat Detection Scenario
    37th IFIP International Conference on ICT Systems Security and Privacy Protection, SEC 2022 (Copenhagen, DNK, 13. June 2022 - 15. June 2022)
    In: Weizhi Meng, Simone Fischer-Hübner, Christian D. Jensen (ed.): IFIP Advances in Information and Communication Technology 2022
    DOI: 10.1007/978-3-031-06975-8_18
  • Latzo T., Hellmich A., Knepper A., Hardi L., Castello-Waldow TP., Freiling F., Attenberger A.:
    Maraudrone's Map: An Interactive Web Application for Forensic Analysis and Visualization of DJI Drone Log Data
    27th Nordic Conference on Secure IT Systems (NordSec) (Reykjavic)
    In: SECURE IT SYSTEMS, NORDSEC 2022, CHAM: 2022
    DOI: 10.1007/978-3-031-22295-5_18
  • Lorch B., Scheler N., Riess C.:
    Compliance Challenges in Forensic Image Analysis Under the Artificial Intelligence Act
    European Signal Processing Conference (Belgrade, 29. August 2022 - 2. September 2022)
    DOI: 10.23919/eusipco55093.2022.9909723
    URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2022-Lorch-AIA-EUSIPCO.pdf
  • Maier A., Lorch B., Rieß C.:
    Bayesian Tools for Reliable Multimedia Forensics
    2022 VIII International Conference on Information Technology and Nanotechnology (ITNT) (Samara, 23. May 2022 - 27. May 2022)
    DOI: 10.1109/ITNT55410.2022.9848571
    URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2022-Maier-BNN-ITNT.pdf
  • Maier A., Moussa D., Spruck A., Seiler J., Rieß C.:
    Reliability Scoring for the Recognition of Degraded License Plates
    2022 18th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS) (Madrid, 29. November 2022 - 2. December 2022)
    DOI: 10.1109/AVSS56176.2022.9959390
    URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2022-Maier-AVSS.pdf
  • Moussa D., Hirsch G., Rieß C.:
    Towards Unconstrained Audio Splicing Detection and Localization with Neural Networks
    The 2nd Workshop on MultiMedia FORensics in the WILD (Montréal,Québec, 21. August 2022 - 25. August 2022)
    In: Springer Cham (ed.): Pattern Recognition, Computer Vision, and Image Processing. ICPR 2022 International Workshops and Challenges. 2022
    DOI: 10.1007/978-3-031-37742-6
    URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2022-Moussa-MMFORWILD.pdf
  • Moussa D., Maier A., Spruck A., Seiler J., Rieß C.:
    Forensic License Plate Recognition with Compression-Informed Transformers
    IEEE International Conference on Image Processing (Bordeaux, France, 16. October 2022 - 19. October 2022)
    In: IEEE (ed.): 2022 IEEE International Conference on Image Processing (ICIP) 2022
    DOI: 10.1109/ICIP46576.2022.9897178
    URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2022-Moussa-FLPR.pdf
  • Ottmann J., Breitinger F., Freiling F.:
    Defining Atomicity (and Integrity) for Snapshots of Storage in Forensic Computing
    Digital Forensics Research Conference Europe (DFRWS EU) 2022 (Oxford, 29. March 2022 - 1. April 2022)
    In: Proceedings of the Digital Forensics Research Conference Europe (DFRWS EU) 2022 2022
    URL: https://dfrws.org/presentation/defining-atomicity-and-integrity-for-snapshots-of-storage-in-forensic-computing/
  • Quintero J., Railean A.:
    Users' Privacy Concerns and Attitudes towards Usage-based Insurance: An Empirical Approach
    8th International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS)
    In: VEHITS: PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON VEHICLE TECHNOLOGY AND INTELLIGENT TRANSPORT SYSTEMS, SETUBAL: 2022
    DOI: 10.5220/0011044000003191
  • Raichur NL., Brieger T., Jdidi D., Feigl T., Van Der Merwe JR., Ghimire B., Ott F., Ruegamer A., Felber W.:
    Machine Learning-assisted GNSS Interference Monitoring through Crowdsourcing
    Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+) (Denver, CO, 19. September 2022 - 23. September 2022)
    In: Proc. Intl. Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+) 2022
    DOI: 10.33012/2022.18492
  • Riess C.:
    Physical Integrity
    DOI: 10.1007/978-981-16-7621-5_9
  • Schilling J., Müller T.:
    VANDALIR: Vulnerability Analyses Based on Datalog and LLVM-IR
    19th International Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA) (Cagliari)
    In: DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2022, CHAM: 2022
    DOI: 10.1007/978-3-031-09484-2_6
  • Schneider J., Düsel L., Lorch B., Drafz J., Freiling F.:
    Prudent design principles for digital tampering experiments
    DFRWS EU 2022 (Oxford, 29. March 2022 - 31. March 2022)
    In: Elsevier (ed.): Forensic Science International: Digital Investigation 2022
    DOI: 10.1016/j.fsidi.2022.301334
    URL: https://www.sciencedirect.com/science/article/pii/S2666281722000038
  • Schneider J., Eichhorn M., Freiling F.:
    Ambiguous File System Partitions
    DFRWS USA 2022 (On the Internet, 11. July 2022 - 14. July 2022)
    In: Elsevier (ed.): Forensic Science International: Digital Investigation 2022
    DOI: 10.1016/j.fsidi.2022.301399
    URL: https://www.sciencedirect.com/science/article/pii/S2666281722000804

2021

  • Busch M., Nicolai F., Fleischer F., Rückert C., Safferling C., Freiling F.:
    Make Remote Forensic Investigations Forensic Again: Increasing the Evidential Value of Remote Forensic Investigations
    11th EAI International Conference on Digital Forensics & Cyber Crime (Boston, MA, USA, 15. October 2020 - 16. October 2020)
    In: Sanjay Goel; Pavel Gladyshev; Daryl Johnson; Makan Pourzandi; Suryadipta Majumdar (ed.): Digital Forensics and Cyber Crime, Cham, Schweiz: 2021
    DOI: 10.1007/978-3-030-68734-2
  • Chaudhari P., Schirrmacher F., Maier A., Riess C., Köhler T.:
    Merging-ISP: Multi-Exposure High Dynamic Range Image Signal Processing
    DAGM German Conference on Pattern Recognition (virtual, 28. September 2021 - 1. October 2021)
  • Davari A., Islam S., Seehaus T., Hartmann A., Braun M., Maier A., Christlein V.:
    On Mathews Correlation Coefficient and Improved Distance Map Loss for Automatic Glacier Calving Front Segmentation in SAR Imagery
    In: IEEE Transactions on Geoscience and Remote Sensing (2021), p. 1-12
    ISSN: 0196-2892
    DOI: 10.1109/TGRS.2021.3115883
    URL: https://arxiv.org/abs/2102.08312
  • Deitsch S., Buerhop-Lutz C., Sovetkin E., Steland A., Gallwitz F., Maier A., Rieß C.:
    Segmentation of Photovoltaic Module Cells in Uncalibrated Electroluminescence Images
    In: Machine Vision and Applications 32 (2021), Article No.: 84
    ISSN: 1432-1769
    DOI: 10.1007/s00138-021-01191-9
    URL: https://arxiv.org/pdf/1806.06530.pdf
    (Techreport)
  • Dietrich-Sussner R., Davari A., Seehaus T., Braun M., Christlein V., Maier A., Rieß C.:
    Synthetic Glacier SAR Image Generation from Arbitrary Masks Using Pix2Pix Algorithm
    2021 IEEE International Geoscience and Remote Sensing Symposium IGARSS (Brussels, 11. July 2021 - 16. July 2021)
    DOI: 10.1109/IGARSS47720.2021.9553853
    URL: https://arxiv.org/abs/2101.03252
  • Faust F., Thierry A., Müller T., Freiling F.:
    Selective Imaging of File System Data on Live Systems
    In: Forensic Science International: Digital Investigation 36 (2021)
    ISSN: 2666-2817
    DOI: 10.1016/j.fsidi.2021.301115
  • Freiling F. (ed.):
    Proceedings of the 2021 Joint Workshop of the German Research Training Groups in Computer Science. May 31–June 1, 2021
    Erlangen: 2021
    DOI: 10.25593/opus4-fau-16426
  • Groß T., Busch M., Müller T.:
    One key to rule them all: Recovering the master key from RAM to break Android's file-based encryption
    DFRWS EU 2021 (Cyberspace, 29. March 2021 - 1. April 2021)
    In: Proceedings of the Eighth Annual DFRWS Europe 2021
    DOI: 10.1016/j.fsidi.2021.301113
  • Hadwiger B., Rieß C.:
    The Forchheim Image Database for Camera Identification in the Wild
    Multimedia Forensics in the Wild (MMForWild 2020) (Mailand, 10. January 2021 - 15. January 2021)
    DOI: 10.1007/978-3-030-68780-9_40
    URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2021-Hadwiger-FDB.pdf
  • Hartmann A., Davari A., Seehaus T., Braun M., Maier A., Christlein V.:
    Bayesian U-Net for Segmenting Glaciers in Sar Imagery
    2021 IEEE International Geoscience and Remote Sensing Symposium IGARSS (Brussels, 11. July 2021 - 16. July 2021)
    DOI: 10.1109/IGARSS47720.2021.9554292
    URL: https://arxiv.org/abs/2101.03249
  • Holzmann M., Davari A., Seehaus T., Braun M., Maier A., Christlein V.:
    Glacier Calving Front Segmentation Using Attention U-Net
    2021 IEEE International Symposium on Geoscience and Remote Sensing (IGARSS) (Brussels, 11. July 2021 - 16. July 2021)
    DOI: 10.1109/IGARSS47720.2021.9555067
    URL: https://arxiv.org/abs/2101.03247
  • Kaiser P., Schirrmacher F., Lorch B., Rieß C.:
    Learning to Decipher License Plates in Severely Degraded Images
    MultiMedia FORensics in the WILD (, 11. January 2021 - 11. January 2021)
    In: Pattern Recognition. ICPR International Workshops and Challenges. ICPR 2021 2021
    DOI: 10.1007/978-3-030-68780-9_43
    URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2021-Schirrmacher-LTD.pdf
  • Latzo T.:
    Efficient Fingerprint Matching for Forensic Event Reconstruction
    In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series, Cham: Springer, 2021, p. 98-120 (Digital Forensics and Cyber Crime. ICDF2C 2020)
    ISBN: 9783030687335

    DOI: 10.1007/978-3-030-68734-2_6
  • Latzo T., Hantke F., Kotschi L., Freiling F.:
    Bringing Forensic Readiness to Modern Computer Firmware
    Digital Forensics Research Conference Europe (DFRWS EU) 2021 (Virtual, 29. March 2021 - 1. April 2021)
    In: Proceedings of the Digital Forensics Reesearch Conference Europe (DFRWS EU) 2021 2021
    Open Access: https://dfrws.org/wp-content/uploads/2021/03/Bringing-Forensic-Readiness-to-Modern-Computer-Firmware.pdf
  • Latzo T., Schulze M., Freiling F.:
    Leveraging Intel DCI for Memory Forensics
    Digital Forensics Research Conference USA (DFRWS US) 2021 (Virtual, 12. July 2021 - 15. July 2021)
    In: Proceedings of the Digital Forensics Research Conference USA (DFRWS US) 2021
    Open Access: https://dfrws.org/wp-content/uploads/2021/05/2021_USA_paper-leveraging_intel_dci_for_memory_forensics.pdf
  • Lorch B., Schirrmacher F., Maier A., Rieß C.:
    Reliable Camera Model Identification Using Sparse Gaussian Processes
    In: IEEE Signal Processing Letters (2021), p. 912-916
    ISSN: 1070-9908
    DOI: 10.1109/LSP.2021.3070206
    URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2021-Lorch-GPC.pdf
  • Menges F., Latzo T., Vielberth M., Sobola S., Pöhls HC., Taubmann B., Köstler J., Puchta A., Freiling F., Reiser HP., Pernul G.:
    Towards GDPR-compliant data processing in modern SIEM systems
    In: Computers & Security 103 (2021), Article No.: 102165
    ISSN: 0167-4048
    DOI: 10.1016/j.cose.2020.102165
  • Moussa D., Maier A., Schirrmacher F., Rieß C.:
    Sequence-based Recognition of License Plates with Severe Out-of-Distribution Degradations
    The 19th International Conference on Computer Analysis of Images and Patterns (Virtual Conference, 27. September 2021 - 1. October 2021)
    In: Springer, Cham (ed.): Computer Analysis of Images and Patterns 2021
    DOI: 10.1007/978-3-030-89131-2_16
    URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2021-Moussa-SRLP.pdf
  • Ottmann J., Pollach J., Scheler N., Schneider J., Rückert C., Freiling F.:
    Zur Blackbox-Problematik im Bereich Mobilfunkforensik
    In: Datenschutz und Datensicherheit 45 (2021), p. 546-552
    ISSN: 1614-0702
    DOI: 10.1007/s11623-021-1487-1
  • Pan J., Maier A., Lorch B., Rieß C.:
    Reliable Camera Model Identification Through Uncertainty Estimation
    IEEE International Workshop on Biometrics and Forensics (, 6. May 2021 - 7. May 2021)
    DOI: 10.1109/IWBF50991.2021.9465097
    URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2021-Pan-IWBF.pdf
  • Pugliese G.:
    Methodik der Anwendungsforensik
    In: Felix Freiling und Christian Riess (ed.): Browser- und Anwendungsforensik, Hochschule Albstadt-Sigmaringen, 2021, p. 67–81 (Studienbriefe, Vol.7)
  • Pugliese G.:
    Praktische Anwendungsanalyse von Android-Apps
    In: Felix Freiling und Christian Riess (ed.): Browser- und Anwendungsforensik, Hochschule Albstadt-Sigmaringen, 2021, p. 83–100 (Studienbriefe, Vol.7)
  • Pugliese G.:
    Verfassen eines technischen Berichts
    In: Felix Freiling und Christian Riess (ed.): Browser- und Anwendungsforensik, Hochschule Albstadt-Sigmaringen, 2021, p. 101–113 (Studienbriefe, Vol.7)
  • Reinhardt D., Müller T.:
    Welcome Message from ARES Program Committee Co-Chairs
    16th International Conference on Availability, Reliability and Security, ARES 2021 (Virtual, Online, AUT, 17. August 2021 - 20. August 2021)
    In: ACM International Conference Proceeding Series 2021
    DOI: 10.1145/3465481.fm
  • Riess C.:
    Möglichkeiten und Grenzen bei der Ermittlung von Wahrheit mit Maschinellem Lernen
    In: C. Schicha, I. Stapf, S. Sell (ed.): Medien und Wahrheit - Medienethische Perspektiven auf Desinformation, Lügen und "Fake News", Nomos, 2021, p. 341-358
    DOI: 10.5771/9783748923190-341
  • Roßberger M., Aksoy A., Kesdoğan D.:
    How to apply Database Anonymity Notions to Mix Networks
    Die 51. Jahrestagung der Gesellschaft für Informatik, INFORMATIK 2021 (Berlin, 27. September 2021 - 1. October 2021)
    In: Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft für Informatik (GI) 2021
  • Röckl J., Protsenko M., Huber M., Müller T., Freiling F.:
    Advanced System Resiliency Based on Virtualization Techniques for IoT Devices
    ACSAC: Annual Computer Security Applications Conference (Virtual Event, 6. December 2021 - 10. December 2021)
    DOI: 10.1145/3485832.3485836
  • Schneider J., Lautner I., Moussa D., Wolf J., Scheler N., Freiling F., Haasnoot J., Henseler H., Malik S., Morgenstern H., Westman M.:
    In Search of Lost Data: A Study of Flash Sanitization Practices
    DFRWS EU 2021 (Cyberspace, 29. March 2021 - 1. April 2021)
    In: Proceedings of the Digital Forensics Research Conference Europe (DFRWS EU) 2021 2021
    Open Access: https://dfrws.org/presentation/in-search-of-lost-data-a-study-of-flash-sanitization-practices/
    URL: https://dfrws.org/presentation/in-search-of-lost-data-a-study-of-flash-sanitization-practices/
  • Schwab P., Röckl J., Langohr M., Meyer-Wegener K.:
    Performance Evaluation of Policy-Based SQL Query Classification for Data-Privacy Compliance
    In: Datenbank-Spektrum (2021)
    ISSN: 1618-2162
    DOI: 10.1007/s13222-021-00385-9
    URL: https://link.springer.com/article/10.1007/s13222-021-00385-9
  • Schwinn L., Nguyen A., Raab R., Zanca D., Eskofier B., Tenbrinck D., Burger M.:
    Dynamically Sampled Nonlocal Gradients for Stronger Adversarial Attacks
    International Joint Conference on Neural Networks (IJCNN) (Online, 18. July 2021 - 22. July 2021)
    DOI: 10.1109/ijcnn52387.2021.9534190
  • Schwinn L., Raab R., Nguyen A., Zanca D., Eskofier B.:
    Exploring Misclassifications of Robust Neural Networks to Enhance Adversarial Attacks
    URL: https://arxiv.org/abs/2105.10304
  • Spruck A., Hawesch M., Maier A., Rieß C., Seiler J., Kaup A.:
    3D Rendering Framework for Data Augmentation in Optical Character Recognition
    2021 International Symposium on Signals, Circuits and Systems (ISSCS) (Iasi, Romania (virtual), 15. July 2021 - 16. July 2021)
    In: ISSCS 2021 - International Symposium on Signals, Circuits and Systems 2021
    DOI: 10.1109/ISSCS52333.2021.9497438
    URL: https://arxiv.org/abs/2209.14970
  • Villar-Corrales A., Schirrmacher F., Rieß C.:
    Deep Learning Architectural Designs for Super-Resolution of Noisy Images
    In: ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2021
    DOI: 10.1109/ICASSP39728.2021.9414733

2020

  • Busch M., Dirsch K.:
    Finding 1-Day Vulnerabilities in Trusted Applications using Selective Symbolic Execution
    Workshop on Binary Analysis Research (BAR) 2020 (San Diego, CA, 23. February 2020 - 23. February 2020)
    DOI: 10.14722/bar.2020.23014
  • Busch M., Westphal J., Müller T.:
    Unearthing the TrustedCore: A critical review on huawei's trusted execution environment
    14th USENIX Workshop on Offensive Technologies, WOOT 2020, co-located with USENIX Security 2020 (, 11. April 2020)
    In: WOOT 2020 - 14th USENIX Workshop on Offensive Technologies, co-located with USENIX Security 2020 2020
  • Felsner L., Käppler S., Maier A., Riess C.:
    Truncation Correction for X-ray Phase-Contrast Region-of-Interest Tomography
    In: IEEE Transactions on Computational Imaging (2020), p. 625 - 639
    ISSN: 2333-9403
    DOI: 10.1109/TCI.2020.2964217
  • Felsner L., Würfl T., Syben-Leisner C., Roser P., Preuhs A., Maier A., Riess C.:
    Reconstruction of Voxels with Position- and Angle-Dependent Weightings
    The 6th International Conference on Image Formation in X-Ray Computed Tomography (Online meeting, 3. August 2020 - 7. August 2020)
  • Fleischer F., Busch M., Kuhrt P.:
    Memory corruption attacks within Android TEEs: A case study based on OP-TEE
    15th International Conference on Availability, Reliability and Security, ARES 2020 (Online, 25. August 2020 - 28. August 2020)
    In: ACM International Conference Proceeding Series 2020
    DOI: 10.1145/3407023.3407072
  • Freiling F., Tavakoli Kolagari R., Auernhammer K.:
    Efficient Black-Box Search for Adversarial Examples using Relevance Masks
    2020 Workshop on DYnamic and Novel Advances in Machine Learning and Intelligent Cyber Security, DYNAMICS 2020 (Lexington, MA, Virtual, Online, 7. December 2020 - 7. December 2020)
    In: DYNAMICS '20: Proceedings of the 2020 Workshop on DYnamic and Novel Advances in Machine Learning and Intelligent Cyber Security, New York, NY: 2020
    DOI: 10.1145/3477997.3478013
  • Groß T., Dirauf R., Freiling F.:
    Systematic Analysis of Browser History Evidence
    13th International Conference on Systematic Approaches to Digital Forensic Engineering (SADFE) (New York, 15. May 2020 - 15. May 2020)
    In: IEEE (ed.): 2020 13th International Conference on Systematic Approaches to Digital Forensic Engineering (SADFE) 2020
    DOI: 10.1109/SADFE51007.2020.00010
  • Hantke F., Dewald A.:
    How can data from fitness trackers be obtained and analyzed with a forensic approach?
    5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020 (, 7. September 2020 - 11. September 2020)
    In: Proceedings - 5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020 2020
    DOI: 10.1109/EuroSPW51379.2020.00073
  • Hofmann F., Freiling F.:
    Personalisierte Preise und das Datenschutzrecht. Anforderungen an die datenschutzrechtliche Einwilligung
    In: Zeitschrift für Datenschutz (2020), p. 331-335
    ISSN: 2192-5593
  • Kalysch A.:
    Android Application Hardening: Attack Surface Reduction and IP Protection Mechanisms (Dissertation, 2020)
    URL: https://opus4.kobv.de/opus4-fau/frontdoor/index/index/docId/14149
  • Kalysch A., Deutel M., Müller T.:
    Template-based Android inter-process communication fuzzing
    ARES '20: The 15th International Conference on Availability, Reliability and Security (Virtual Event, Dublin, Ireland, 25. August 2020 - 28. August 2020)
    In: Melanie Volkamer, Christian Wressnegger (ed.): Proceedings of the 15th International Conference on Availability, Reliability and Security, New York, United States: 2020
    DOI: 10.1145/3407023.3407052
    URL: https://dl.acm.org/doi/10.1145/3407023.3407052
  • Kalysch A., Schilling J., Müller T.:
    On the Evolution of Security Issues in Android App Versions
    In: Jianying Zhou, Mauro Conti, Chuadhry Mujeeb Ahmed, Man Ho Au, Lejla Batina, Zhou Li, Jingqiang Lin, Eleonora Losiouk, Bo Luo, Suryadipta Majumdar, Weizhi Meng, Martín Ochoa, Stjepan Picek, Georgios Portokalidis, Cong Wang, Kehuan Zhang (ed.): ACNS: International Conference on Applied Cryptography and Network Security, Cham, Switzerland: Springer Nature Switzerland AG, 2020, p. 523 - 541 (Lecture Notes in Computer Science)
    ISBN: 978-3-030-61637-3

    DOI: 10.1007/978-3-030-61638-0_29
    URL: https://link.springer.com/chapter/10.1007/978-3-030-61638-0_29
  • Latzo T., Brost J., Freiling F.:
    BMCLeech: Introducing Stealthy Memory Forensics to BMC
    In: Forensic Science International: Digital Investigation 32 (2020)
    ISSN: 2666-2817
    DOI: 10.1016/j.fsidi.2020.300919
  • Lorch B., Maier A., Riess C.:
    Reliable JPEG Forensics via Model Uncertainty
    IEEE International Workshop on Information Forensics and Security (online, 6. December 2020 - 11. December 2020)
    DOI: 10.1109/wifs49906.2020.9360893
    URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2020-Lorch-BLR.pdf
  • Maier A., Christlein V., Breininger K., Wuerfl T., Unberath M., Rieß C.:
    Bildanalyse
    In: Günther Görz, Ute Schmid, Tanya Braun (ed.): Handbuch der Künstichen Intelligenz, De Gruyter, 2020, p. 673--712
    DOI: 10.1515/9783110659948-015
  • Maier A., Lorch B., Riess C.:
    Toward Reliable Models For Authenticating Multimedia Content: Detecting Resampling Artifacts With Bayesian Neural Networks
    IEEE International Conference on Image Processing (, 25. October 2020 - 28. October 2020)
    DOI: 10.1109/icip40778.2020.9191121
    URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2020-Maier-BNN.pdf
  • Maier D., Erb H., Mullan P., Haupert V.:
    Camera Fingerprinting Authentication Revisited
    RAID 2020 (Donostia / San Sebastian, 14. October 2020 - 16. October 2020)
    In: International Symposium on Research in Attacks, Intrusions and Defenses, Cham, Switzerland: 2020
  • Matern F., Riess C., Stamminger M.:
    Depth Map Fingerprinting and Splicing Detection
    ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (Barcelona, 4. May 2020 - 8. May 2020)
    In: ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2020
    DOI: 10.1109/ICASSP40776.2020.9052979
  • Morgner P., Mai C., Koschate-Fischer N., Freiling F., Benenson Z.:
    Security Update Labels: Establishing Economic Incentives for Security Patching of IoT Consumer Products
    41st IEEE Symposium on Security and Privacy (S&P) (San Francisco, CA, 18. May 2020 - 20. May 2020)
    In: IEEE (ed.): Proceedings of the IEEE Symposium on Security and Privacy (S&P), May 2020 2020
    DOI: 10.1109/SP40000.2020.00021
    URL: https://www.computer.org/csdl/proceedings-article/sp/2020/349700a346/1j2LfHnkRPy
  • Mullan P., Riess C., Freiling F.:
    Towards Open-Set Forensic Source Grouping on JPEG Header Information
    In: Forensic Science International: Digital Investigation 32 (2020)
    ISSN: 2666-2817
    DOI: 10.1016/j.fsidi.2020.300916
  • Müller N., Müller T., Freiling F.:
    Urheberrecht ./. Sicherheitsanalyse
    SICHERHEIT 2020
    In: Reinhardt, D., Langweg, H., Witt, B. C., Fischer, M (ed.): SICHERHEIT 2020, Bonn: 2020
    DOI: 10.18420/sicherheit2020_08
    URL: https://dl.gi.de/handle/20.500.12116/31793
  • Palutke R., Block F., Reichenberger P., Stripeika D.:
    Hiding Process Memory Via Anti-Forensic Techniques
    In: Forensic Science International: Digital Investigation 33 (2020)
    ISSN: 2666-2817
    DOI: 10.1016/j.fsidi.2020.301012
  • Palutke R., Ruderich S., Wild M., Freiling F.:
    HyperLeech: Stealthy System Virtualization with Minimal Target Impact through DMA-Based Hypervisor Injection
    23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020) (San Sebastian, 14. October 2020 - 16. October 2020)
    In: USENIX (ed.): Proceedings of the 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020) 2020
    Open Access: https://www.usenix.org/system/files/raid20-palutke.pdf
    URL: https://www.usenix.org/system/files/raid20-palutke.pdf
  • Prade P., Groß T., Dewald A.:
    Forensic Analysis of the Resilient File System (ReFS) Version 3.4
    DFRWS 2020 EU (Oxford, United Kingdom, 3. June 2020 - 5. June 2020)
    In: Proceedings of the Seventh Annual DFRWS Europe 2020
    DOI: 10.1016/j.fsidi.2020.300915
  • Pugliese G., Rieß C., Gassmann F., Benenson Z.:
    Long-Term Observation on Browser Fingerprinting: Users’ Trackability and Perspective
    In: Sciendo (ed.): Proceedings on Privacy Enhancing Technologies (PoPETs), Volume 2020: Issue 2 2020
    DOI: 10.2478/popets-2020-0041
    URL: https://petsymposium.org/popets/2020/popets-2020-0041.pdf
  • Schirrmacher F., Lorch B., Stimpel B., Köhler T., Riess C.:
    SR²: Super-Resolution With Structure-Aware Reconstruction
    2020 IEEE International Conference on Image Processing (ICIP) (Online, 25. October 2020 - 28. October 2020)
    DOI: 10.1109/ICIP40778.2020.9191253
    URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2020-Schirrmacher-SR2.pdf
  • Schirrmacher F., Riess C., Köhler T.:
    Adaptive Quantile Sparse Image (AQuaSI) Prior for Inverse Imaging Problems
    In: IEEE Transactions on Computational Imaging 6 (2020), p. 503--517
    ISSN: 2333-9403
    DOI: 10.1109/TCI.2019.2956888
    URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2020-Schirrmacher-AQS.pdf
  • Schneider J., Milius S., Deifel HP., Freiling F.:
    Unifying Metadata-Based Storage Reconstruction and Carving with LAYR
    DFRWS 2020 USA (Virtual, 20. July 2020 - 24. July 2020)
    In: Elsevier (ed.): Forensic Science International: Digital Investigation 2020
    DOI: 10.1016/j.fsidi.2020.301006
    URL: https://www.sciencedirect.com/science/article/pii/S2666281720302559
  • Schneider J., Wolf J., Freiling F.:
    Tampering with digital evidence is hard: The case of main memory images
    DFRWS EU 2020 (Virtual, 25. March 2020 - 28. March 2020)
    In: Elsevier (ed.): Forensic Science International: Digital Investigation 2020
    DOI: 10.1016/j.fsidi.2020.300924
    URL: https://www.sciencedirect.com/science/article/pii/S2666281720300196
  • Spensky C., MacHiry A., Busch M., Leach K., Housley R., Kruegel C., Vigna G.:
    TRUST.IO: Protecting Physical Interfaces on Cyber-physical Systems
    2020 IEEE Conference on Communications and Network Security, CNS 2020 (ONLINE, 29. June 2020 - 1. July 2020)
    In: 2020 IEEE Conference on Communications and Network Security, CNS 2020 2020
    DOI: 10.1109/CNS48642.2020.9162246

2019

  • Abdullah L., Freiling F., Quintero J., Benenson Z.:
    Sealed computation: Abstract requirements for mechanisms to support trustworthy cloud computing
    4th International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2018 and 2nd International Workshop on Security and Privacy Requirements Engineering, SECPRE 2018 held in conjunction with 23rd European Symposium on Research in Computer Security, ESORICS 2018 (Barcelona, 6. September 2018 - 7. September 2018)
    In: Frédéric Cuppens, Nora Cuppens, Christos Kalloniatis, Sokratis K. Katsikas, Costas Lambrinoudakis, John Mylopoulos, Annie Antón, Stefanos Gritzalis (ed.): Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2019
    DOI: 10.1007/978-3-030-12786-2_9
  • Abdullah L., Hahn S., Freiling F.:
    Achieving consistency of software updates against strong attackers
    3rd Central European Cybersecurity Conference, CECC 2019 (Munich, 14. November 2019 - 15. November 2019)
    In: ACM International Conference Proceeding Series 2019
    DOI: 10.1145/3360664.3360670
  • Abdullah L., Quintero J.:
    Sealed computation: a mechanism to support privacy-aware trustworthy cloud service
    In: Information and Computer Security (2019)
    ISSN: 2056-4961
    DOI: 10.1108/ICS-11-2018-0133
  • Armknecht F., Benenson Z., Morgner P., Müller C., Riess C.:
    Privacy implications of room climate data
    In: Journal of Computer Security 27 (2019), p. 113-136
    ISSN: 0926-227X
    DOI: 10.3233/JCS-181133
    URL: https://content.iospress.com/articles/journal-of-computer-security/jcs181133
  • Bajramovic E., Gupta D., Guo Y., Waedt K., Bajramovic A.:
    Security challenges and best practices for iiot
    49. Jahrestagung der Gesellschaft fur Informatik: 50 Jahre Gesellschaft fur Informatik - Informatik fur Gesellschaft, INFORMATIK 2019 - 49th Annual Meeting of the German Informatics Society: 50 years of the German Informatics Society - Computer Science for Society, INFORMATICS 2019 (Kassel, 23. September 2019 - 26. September 2019)
    In: Claude Draude, Martin Lange, Bernhard Sick (ed.): Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI) 2019
    DOI: 10.18420/inf2019_ws28
  • Benenson Z., Berger F., Cherepantsev A., Datsevich S., Do L., Eckert M., Elsberger T., Freiling F., Frinken M., Glameyer H., Hafner S., Hagenhoff S., Hammer A., Hammerl S., Hantke F., Heindorf F., Henninger M., Höfer D., Kuhrt P., Lattka M., Leis T., Leubner C., Leyrer K., Lindenmeier C., Del Medico K., Moussa D., Nissen M., Öz A., Ottmann J., Reif K., Ripley N., Roth A., Schilling J., Schleicher R., Schulz D., Stephan M., Volkert C., Wehner M., Wild M., Wirth J., Wolf J., Wunder J., Zlatanovic J.:
    Analyse verbreiteter Anwendungen zum Lesen von elektronischen Büchern
    CS-2019-06 (2019)
    Open Access: http://nbn-resolving.de/urn:nbn:de:bvb:29-opus4-125519
    URL: http://nbn-resolving.de/urn:nbn:de:bvb:29-opus4-125519
    (Working Paper)
  • Block F., Dewald A.:
    Windows Memory Forensics: Detecting (Un)Intentionally Hidden Injected Code by Examining Page Table Entries
    In: Digital Investigation 29 (2019), p. S3-S12
    ISSN: 1742-2876
    DOI: 10.1016/j.diin.2019.04.008
  • Bopp J., Ludwig V., Seifert M., Pelzer G., Maier A., Anton G., Riess C.:
    Simulation study on X-ray phase contrast imaging with dual-phase gratings
    In: International Journal of Computer Assisted Radiology and Surgery 14 (2019), p. 3-10
    ISSN: 1861-6410
    DOI: 10.1007/s11548-018-1872-x
    URL: https://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2018/Bopp18-SSO.pdf
  • Botacin M., Kalysch A., Grégio A.:
    The Internet Banking [in]Security Spiral: Past, Present, and Future of Online Banking Protection Mechanisms based on a Brazilian case study
    Conference on Availability, Reliability and Security (Canterbury, United Kingdom, 26. August 2019 - 29. August 2019)
    In: Edgar Weippl, SBA Research, Austria A Min Tjoa, TU Vienna, Austria (ed.): Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019) (ARES ’19), New York, (NY), USA: 2019
    DOI: 10.1145/3339252.3340103
  • Bove D., Kalysch A.:
    In pursuit of a secure UI: The cycle of breaking and fixing Android’s UI
    In: it - Information Technology Methods and Applications of Informatics and Information Technology (2019)
    ISSN: 1611-2776
    DOI: 10.1515/itit-2018-0023
  • Bove D., Müller T.:
    Investigating Characteristics of Attacks on Public Cloud Systems
    6th IEEE International Conference on Cyber Security and Cloud Computing (Paris, 21. June 2019 - 23. June 2019)
    In: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud) 2019
    DOI: 10.1109/CSCloud/EdgeCom.2019.00-13
    URL: https://ieeexplore.ieee.org/document/8854036
  • Busch M., Schlenk R., Heckel H.:
    TEEMO: Trusted peripheral monitoring for optical networks and beyond
    4th Workshop on System Software for Trusted Execution, SysTEX 2019 (Huntsville, ON, 27. October 2019)
    In: Proceedings of the 4th Workshop on System Software for Trusted Execution, SysTEX 2019 2019
    DOI: 10.1145/3342559.3365339
  • Davari A., Özkan HC., Maier A., Rieß C.:
    Fast and Efficient Limited Data Hyperspectral Remote Sensing Image Classification via GMM-Based Synthetic Samples
    In: IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 12 (2019), p. 2107-2120
    ISSN: 1939-1404
    DOI: 10.1109/JSTARS.2019.2916495
    URL: https://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2019/Davari_JSTARS_2019.pdf
  • Felsner L., Hu S., Ludwig V., Anton G., Maier A., Rieß C.:
    On the Characteristics of Helical 3-D X-ray Dark-field Imaging
    Bildverarbeitung für die Medizin (BVM 2019) (Lübeck, 17. March 2019 - 19. March 2019)
    DOI: 10.1007/978-3-658-25326-4_59
    URL: https://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2019/Felsner19-OTC.pdf
  • Felsner L., Hu S., Maier A., Bopp J., Ludwig V., Anton G., Riess C.:
    A 3-D Projection Model for X-ray Dark-field Imaging
    In: Scientific Reports 9 (2019)
    ISSN: 2045-2322
    DOI: 10.1038/s41598-019-45708-9
  • Gassmann F., Benenson Z., Landwirth R.:
    Communication as a threat Users' reactions to email and Facebook messages with suspicious links
    In: Österreichische Zeitschrift für Soziologie 44 (2019), p. 135-155
    ISSN: 1011-0070
    DOI: 10.1007/s11614-019-00351-6
  • Groß T., Ahmadova M., Müller T.:
    Analyzing android’s file-based encryption: Information leakage through unencrypted metadata
    International Workshop on Security of Mobile Applications (IWSMA 2019) (Canterbury, United Kingdom, 26. August 2019 - 29. August 2019)
    In: Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019) 2019
    DOI: 10.1145/3339252.3340340
  • Hadwiger B., Baracchi D., Piva A., Riess C.:
    Towards learned color representations for image splicing detection
    International Conference on Acoustics, Speech, and Signal Processing (Brighton, 12. May 2019 - 17. May 2019)
    In: 2019 IEEE International Conference on Acoustics, Speech, and Signal Processing Proceedings 2019
    DOI: 10.1109/icassp.2019.8682246
  • Haupert V.:
    Sicherheit mobiler Bankgeschäfte zwischen Innovation und Regulierung (Dissertation, 2019)
    URL: https://nbn-resolving.de/urn:nbn:de:bvb:29-opus4-113211
  • Haupert V., Gabert S.:
    Short Paper: How to Attack PSD2 Internet Banking
    23rd International Conference on Financial Cryptography and Data Security, FC 2019 (St. Kitts, 18. February 2019 - 22. February 2019)
    In: Ian Goldberg, Tyler Moore (ed.): Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2019
    DOI: 10.1007/978-3-030-32101-7_15
  • Haupert V., Gabert S.:
    Where to Look for What You See Is What You Sign? User Confusion in Transaction Security
    ESORICS 2019 (Luxemburg, 23. September 2019 - 27. September 2019)
    In: Kazue Sako, Steve Schneider, Peter Ryan (ed.): 24th European Symposium on Research in Computer Security, Cham, Switzerland: 2019
    DOI: 10.1007/978-3-030-29959-0_21
  • Latzo T., Freiling F.:
    Characterizing the Limitations of Forensic Event Reconstruction Based on Log Files
    18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (Rotorua, New Zealand, 5. August 2019 - 8. August 2019)
    DOI: 10.1109/TrustCom/BigDataSE.2019.00069
  • Latzo T., Palutke R., Freiling F.:
    A universal taxonomy and survey of forensic memory acquisition techniques
    In: Digital Investigation (2019), p. 56-69
    ISSN: 1742-2876
    DOI: 10.1016/j.diin.2019.01.001
  • Lorch B., Agarwal S., Farid H.:
    Forensic Reconstruction of Severely Degraded License Plates
    IS&T Electronic Imaging (Burlingame, CA, 13. January 2019 - 16. January 2019)
    In: Society for Imaging Science & Technology (ed.): Electronic Imaging 2019
    DOI: 10.2352/issn.2470-1173.2019.5.mwsf-529
    URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2019-Lorch-LP.pdf
  • Lorch B., Riess C.:
    Image Forensics from Chroma Subsampling of High-Quality JPEG Images
    ACM Workshop on Information Hiding and Multimedia Security (Paris, 3. July 2019 - 5. July 2019)
    DOI: 10.1145/3335203.3335722
    URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2019-Lorch-IFC.pdf
  • Matern F., Riess C., Stamminger M.:
    Exploiting Visual Artifacts to Expose Deepfakes and Face Manipulations
    Workshop on Image and Video Forensics (Waikoloa Village, HI, 11. January 2019 - 11. January 2019)
    In: IEEE Workshop on Applications in Computer Vision 2019
    DOI: 10.1109/wacvw.2019.00020
    URL: https://faui1-files.cs.fau.de/public/mmsec/pub/matern_ivfws_2019_face_artifacts.pdf
  • Matern F., Riess C., Stamminger M.:
    Gradient-Based Illumination Description for Image Forgery Detection
    In: IEEE Transactions on Information Forensics and Security (2019)
    ISSN: 1556-6013
    DOI: 10.1109/TIFS.2019.2935913
    URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2019-Matern-GBI.pdf
  • Morgner P.:
    Security and Privacy in the Internet of Things: Technical and Economic Perspectives (Dissertation, 2019)
    URL: http://nbn-resolving.de/urn:nbn:de:bvb:29-opus4-112070
  • Mullan P., Riess C., Freiling F.:
    Forensic source identification using JPEG image headers: The case of smartphones
    In: Digital Investigation 28 (2019), p. S68-S76
    ISSN: 1742-2876
    DOI: 10.1016/j.diin.2019.01.016
  • Mullan P., Rieß C., Freiling F.:
    Forensic Source Identification using JPEG Image Headers: The Case of Smartphones
    DFRWS EU (Oslo, 24. April 2019 - 26. April 2019)
    In: Digital Investigation 2019
    DOI: 10.1016/j.diin.2019.01.016
  • Palutke R., Neubaum A., Götzfried J.:
    SEVGuard: Protecting User Mode Applications using Secure Encrypted Virtualization
    SecureComm (Orlando, 23. October 2019 - 25. October 2019)
    In: SecureComm 2019 Proceedings, New York City, United States of America: 2019
    DOI: 10.1007/978-3-030-37231-6_12
  • Prade P., Groß T., Dewald A.:
    Forensic Analysis of the Resilient File System (ReFS) Version 3.4
    (2019)
    ISSN: 2191-5008
    DOI: 10.25593/issn.2191-5008/CS-2019-05
    URL: https://opus4.kobv.de/opus4-fau/files/12526/refs_report.pdf
    (Techreport)
  • Prechtel D., Groß T., Müller T.:
    Evaluating Spread of 'Gasless Send' in Ethereum Smart Contracts
    2nd International Workshop on Blockchains and Smart Contracts (BSC) (1 Calle Mar Mediterráneo, Maspalomas, Gran Canaria, 35100, Spain, 24. June 2019 - 26. June 2019)
    In: IEEE (ed.): 10th IFIP International Conference on New Technologies, Mobility & Security (NTMS 2019) 2019
    DOI: 10.1109/ntms.2019.8763848
  • Prokosch HU., Schüttler C., Schraudt M., Öfelein M., Maier C.:
    Digital patient communication: Improving the hospital-patient relationship
    In: Healthcare of the Future - Bridging the Information Gap, IOS Press, 2019, p. 3-9 (Studies in Health Technology and Informatics, Vol.259)
    DOI: 10.3233/978-1-61499-961-4-3
  • Quintero J., Benenson Z.:
    Understanding usability and user acceptance of usage-based insurance from users' view
    2nd International Conference on Machine Learning and Machine Intelligence, MLMI 2019 (Jakarta, 18. September 2019 - 20. September 2019)
    In: ACM International Conference Proceeding Series 2019
    DOI: 10.1145/3366750.3366759
  • Reinfelder L., Landwirth R., Benenson Z.:
    Security Managers Are Not the Enemy Either
    In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, ACM, 2019, p. 1-7
    DOI: 10.1145/3290605.3300663
  • Riess C.:
    Täuschend echt: Die Erzeugung von digitalen Bildfälschungen und ihre Erkennung
    In: Rudolph Freiburg (ed.): Täuschungen - Erlanger Universitätstage 2018, Erlangen: FAU University Press, 2019, p. 95-113 (FAU Forschungen, Reihe A, Geisteswissenschaften, Vol.14)
    ISBN: 978-3-96147-221-5

    DOI: 10.25593/978-3-96147-222-2
    URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2019-Riess-TEE.pdf
  • Roessler A., Cozzolino D., Verdoliva L., Riess C., Thies J., Niessner M.:
    FaceForensics plus plus : Learning to Detect Manipulated Facial Images
    IEEE/CVF International Conference on Computer Vision (ICCV) (Seoul, 27. October 2019 - 2. November 2019)
    In: 2019 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2019), LOS ALAMITOS: 2019
    DOI: 10.1109/ICCV.2019.00009
  • Roessler A., Cozzolino D., Verdoliva L., Rieß C., Thies J., Niessner M.:
    FaceForensics++: Learning to Detect Manipulated Facial Images
    (2019)
    DOI: 10.1109/iccv.2019.00009
    URL: https://arxiv.org/pdf/1901.08971.pdf
    (Techreport)
  • Schiller J., Freiling F., Benenson Z., Massonne W.:
    Berufsbegleitendes Studieren an Universitäten - Ein Zukunftsfeld für die IT-Sicherheit
    In: Informatik-Spektrum 42 (2019), p. 38-47
    ISSN: 0170-6012
    DOI: 10.1007/s00287-019-01145-6
  • Schorradt S., Bajramovic E., Freiling F.:
    On the feasibility of secure logging for industrial control systems using blockchain
    3rd Central European Cybersecurity Conference, CECC 2019 (Munich, 14. November 2019 - 15. November 2019)
    In: ACM International Conference Proceeding Series 2019
    DOI: 10.1145/3360664.3360668
  • Watson V., Bajramovic E., Bejiga M., Waedt K.:
    Designing Trustworthy Monitoring Systems: Forensic Readiness for Safety and Security
    12th International Conference on Reliability, Maintainability, and Safety, ICRMS 2018 (Shanghai, 17. October 2018 - 19. October 2018)
    In: Proceedings - 12th International Conference on Reliability, Maintainability, and Safety, ICRMS 2018 2019
    DOI: 10.1109/ICRMS.2018.00038

2018

  • Afonso V., Kalysch A., Müller T., Oliveira D., Grégio A., De Geus PL.:
    Lumus: Dynamically Uncovering Evasive Android Applications
    ISC 2018 (Guildford, UK, 9. September 2018 - 12. September 2018)
    In: Liqun Chen, Mark Manulis, Steve Schneider (ed.): Information Security - 21th International Conference, Guildford, UK: 2018
    DOI: 10.1007/978-3-319-99136-8_3
    URL: https://link.springer.com/chapter/10.1007/978-3-319-99136-8_3
  • Bopp J., Felsner L., Hu S., Käppler S., Riess C.:
    X-ray Phase Contrast: Research on a Future Imaging Modality
    Cham: Springer, 2018
    (Lecture Notes in Computer Science book series (LNCS), Vol.11111 LNCS)
    ISBN: 978-3-319-96519-2
    DOI: 10.1007/978-3-319-96520-8_9
  • Bopp J., Felsner L., Hu S., Käppler S., Riess C.:
    X-ray Phase Contrast: Research on a Future Imaging Modality
    In: Medical Imaging Systems - An Introductory Guide, 2018, p. 191--205
    DOI: 10.1007/978-3-319-96520-8_9
  • Bopp J., Gallersdörfer M., Ludwig V., Seifert M., Maier A., Anton G., Riess C.:
    Phasenkontrast Röntgen mit 2 Phasengittern und medizinisch relevanten Detektoren
    Bildverarbeitung für die Medizin 2018 - Algorithmen - Systeme - Anwendungen (Erlangen, 11. March 2018 - 13. March 2018)
    In: Proceedings des Workshops Bildverarbeitung für die Medizin 2018 - Algorithmen - Systeme - Anwendungen 2018
    DOI: 10.1007/978-3-662-56537-7_50
  • Cozzolino D., Thies J., Roessler A., Riess C., Niessner M., Verdoliva L.:
    ForensicTransfer: Weakly-supervised Domain Adaptation for Forgery Detection
    (2018), Article No.: arXiv:1812.02510
    Open Access: https://arxiv.org/pdf/1812.02510
    URL: https://arxiv.org/pdf/1812.02510
    (Techreport)
  • Davari A., Aptoula E., Yanikoglu B., Maier A., Riess C.:
    GMM-based Synthetic Samples for Classification of Hyperspectral Images with Limited Training Data
    In: IEEE Geoscience and Remote Sensing Letters 15 (2018), p. 942-946
    ISSN: 1545-598X
    DOI: 10.1109/LGRS.2018.2817361
    URL: https://arxiv.org/pdf/1712.04778.pdf
  • Davari A., Sakaltras N., Haeberle A., Vesal S., Christlein V., Maier A., Riess C.:
    Hyper-Hue and EMAP on Hyperspectral Images for Supervised Layer Decomposition of Old Master Drawings
    International Conference on Image Processing (ICIP) (Athens, Greece, 7. October 2018 - 10. October 2018)
    In: International Conference on Image Processing (ICIP) 2018
    DOI: 10.1109/ICIP.2018.8451768
    URL: http://arxiv.org/abs/1801.09472
    (Techreport)
  • Davari A., Özkan HC., Maier A., Riess C.:
    Fast Sample Generation with Variational Bayesian for Limited Data Hyperspectral Image Classification
    IEEE International Geoscience and Remote Sensing Symposium (Valencia, 22. July 2018 - 27. July 2018)
    In: IEEE International Geoscience and Remote Sensing Symposium 2018
    DOI: 10.1109/IGARSS.2018.8517643
    URL: https://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2018/Davari18-FSG.pdf
  • Felsner L., Berger M., Käppler S., Bopp J., Ludwig V., Weber T., Pelzer G., Michel T., Maier A., Anton G., Riess C.:
    Phase-Sensitive Region-of-Interest Computed Tomography
    21st International Conference on Medical Image Computing and Computer Assisted Intervention, MICCAI 2018 (Granada, 17. September 2018 - 19. September 2018)
    In: 21st International Conference on Medical Image Computing and Computer Assisted Intervention 2018
    DOI: 10.1007/978-3-030-00928-1_16
    URL: https://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2018/Felsner18-PRC.pdf
  • Freiling F., Bajramovic E.:
    Principles of Secure Logging for Safekeeping Digital Evidence
    11th International Conference on IT Security Incident Management & IT Forensics (IMF 2018) (Hamburg)
    In: IEEE Computer Society (ed.): 2018 11th International Conference on IT Security Incident Management & IT Forensics (IMF) 2018
    DOI: 10.1109/IMF.2018.00012
  • Freiling F., Groß T., Latzo T., Müller T., Palutke R.:
    Advances in Forensic Data Acquisition
    In: IEEE Design & Test 35 (2018), p. 1-12
    ISSN: 2168-2356
    DOI: 10.1109/MDAT.2018.2862366
  • Freiling F., Hösch L.:
    Controlled experiments in digital evidence tampering
    In: Digital Investigation 24S (2018), p. S83-S92
    ISSN: 1742-2876
    DOI: 10.1016/j.diin.2018.01.011
    URL: http://dfrws.org/conferences/dfrws-eu-2018/sessions/controlled-experiments-digital-evidence-tampering
  • Freiling F., Safferling C., Rückert C.:
    Quellen-TKÜ und Online-Durchsuchung als neue Maßnahmen für die Strafverfolgung: Rechtliche und technische Herausforderungen
    In: Juristische Rundschau 1 (2018), p. 9-22
    ISSN: 0022-6920
    DOI: 10.1515/juru-2017-0104
  • Fürsattel P., Placht S., Maier A., Riess C.:
    Geometric primitive refinement for structured light cameras
    In: Machine Vision and Applications 29 (2018), p. 313-327
    ISSN: 1432-1769
    DOI: 10.1007/s00138-017-0901-z
  • Gascon H., Ullrich S., Stritter B., Rieck K.:
    Reading Between the Lines: Content-Agnostic Detection of Spear-Phishing Emails
    Research in Attacks, Intrusions, and Defenses - 21st International Symposium, RAID 2018 (Heraklion, Crete, Greece, 10. September 2018 - 12. September 2018)
    In: Michael Bailey, Thorsten Holz, Manolis Stamatogiannakis, Sotiris Ioannidis (ed.): Research in Attacks, Intrusions, and Defenses - 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings 2018
    DOI: 10.1007/978-3-030-00470-5_4
  • Gupta D., Bajramovic E., Parekh M., Waedt K.:
    Cyber Threat Scenarios for Electrical Systems of Nuclear Power Plants
    26th International Conference on Nuclear Engineering (ICONE-26) (London, 22. July 2018 - 26. July 2018)
    In: PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE ON NUCLEAR ENGINEERING, 2018, VOL 9, NEW YORK: 2018
    DOI: 10.1115/icone26-82411
  • Götzfried J.:
    RAM-Schranke: RAM-Verschlüsselung bei AMD und Intel
    10/2018 (2018), p. 174-179
    URL: https://heise.de/-4028190
    (Zeitungsartikel)
  • Götzfried J.:
    Trusted Systems in Untrusted Environments: Protecting against Strong Attackers (Dissertation, 2018)
    URL: https://nbn-resolving.org/urn:nbn:de:bvb:29-opus4-91150
  • Haupert V., Maier D., Schneider N., Kirsch J., Müller T.:
    Honey, I Shrunk Your App Security: The State of Android App Hardening
    DIMVA 2018 (Paris, 28. June 2018 - 29. June 2018)
    In: Giuffrida Cristiano, Bardin Sébastien, Blanc Gregory (ed.): Detection of Intrusions and Malware, and Vulnerability Assessment, Cham, Switzerland: 2018
    DOI: 10.1007/978-3-319-93411-2_4
    URL: https://www.cs1.tf.fau.de/nomorp
  • Haupert V., Müller T.:
    On App-based Matrix Code Authentication in Online Banking
    ICISSP 2018 (Funchal, Madeira, 22. January 2018 - 24. January 2018)
    In: Furnell Steven, Mori Paolo, Camp Olivier (ed.): Proceedings of the 4th International Conference on Information Systems Security and Privacy, Setúbal: 2018
    DOI: 10.5220/0006650501490160
    URL: https://www1.cs.fau.de/appAuth
  • Haupert V., Pugliese G.:
    Ich sehe was, das du nicht siehst: Die Realität von Mobilebanking zwischen allgemeinen und rechtlichen Anforderungen
    Sicherheit, Schutz und Zuverlässigkeit (Konstanz, 25. April 2018 - 27. April 2018)
    In: Langweg, Hanno ; Meier, Michael ; Witt, Bernhard C. ; Reinhardt, Delphine (ed.): Konferenzband der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), Bonn: 2018
    DOI: 10.18420/sicherheit2018_13
  • Horn F., Leghissa M., Käppler S., Pelzer G., Rieger J., Seifert M., Wandner J., Weber T., Michel T., Riess C., Anton G.:
    Implementation of a Talbot-Lau Interferometer in a Clinical-like C-Arm Setup: A Feasibility Study
    In: Scientific Reports 8 (2018), Article No.: 2325
    ISSN: 2045-2322
    DOI: 10.1038/s41598-018-19482-z
    URL: https://www.nature.com/articles/s41598-018-19482-z
  • Hu S., Felsner L., Maier A., Ludwig V., Anton G., Riess C.:
    A 3-D Projection Model for X-ray Dark-field Imaging
    (2018), Article No.: arXiv:1811.04457
    DOI: 10.1038/s41598-019-45708-9
    URL: https://arxiv.org/pdf/1811.04457
    (Techreport)
  • Hänsch N., Schankin A., Protsenko M., Freiling F., Benenson Z.:
    Programming Experience Might Not Help in Comprehending Obfuscated Source Code Efficiently
    SOUPS 2018 (Baltimore, MD, USA)
    In: Proceedings of the Fourteenth Symposium on Usable Privacy and Security 2018
  • Kalysch A., Bove D., Müller T.:
    How Android’s UI Security is Undermined by Accessibility
    ROOTS' 18 (Vienna, 29. November 2018 - 30. November 2018)
    In: Proceedings of the 2nd Reversing and Offensive-oriented Trends Symposium, New York, NY, USA: 2018
    DOI: 10.1145/3289595.3289597
    URL: https://dl.acm.org/citation.cfm?id=3289597
  • Kalysch A., Milisterfer O., Protsenko M., Müller T.:
    Tackling Android's Native Library Malware with Robust, Efficient and Accurate Similarity Measures
    International Conference on Availability, Reliability and Security Proceedings 2018 (Hamburg, Germany, 27. August 2018 - 30. August 2018)
    In: ACM (ed.): Proceedings of the 13th International Conference on Availability, Reliability and Security, Hamburg: 2018
    DOI: 10.1145/3230833.3232828
    URL: http://doi.acm.org/10.1145/3230833.3232828
  • Kraus M., Haupert V.:
    The Swift Language from a Reverse Engineering Perspective
    ROOTS (Vienna, 29. November 2018 - 30. November 2018)
    In: Proceedings of the 2nd Reversing and Offensive-oriented Trends Symposium, New York, NY, USA: 2018
    DOI: 10.1145/3289595.3289599
    URL: https://github.com/maltek/swift-frida
  • Käppler S., Maier A., Riess C.:
    Differential Tomography: Influence of Sensitivity Direction and Noise-suppressing Windows
    5th International Conference on Image Formation in X-ray Computed Tomography (CT-Meeting)
    In: Proceedings of the 5th International Conference on Image Formation in X-ray Computed Tomography (CT-Meeting) 2018
  • Köhler T., Bätz M., Naderi Boldaji F., Kaup A., Maier A., Riess C.:
    Bridging the Simulated-to-Real Gap: Benchmarking Super-Resolution on Real Data
    (2018), Article No.: arXiv:1809.06420
    Open Access: https://arxiv.org/pdf/1809.06420
    URL: https://arxiv.org/pdf/1809.06420
    (Techreport)
  • Lazard T., Götzfried J., Müller T., Santinelli G., Lefebvre V.:
    TEEshift: Protecting Code Confidentiality by Selectively Shifting Functions into TEEs
    SysTEX'18 (Toronto, ON, Canada)
    In: 3rd Workshop on System Software for Trusted Execution 2018
    DOI: 10.1145/3268935.3268938
    URL: https://www1.cs.fau.de/teeshift
  • Lefebvre V., Santinelli G., Müller T., Götzfried J.:
    Universal Trusted Execution Environments for Securing SDN/NFV Operations
    International Conference on Availability, Reliability and Security (Hamburg, Germany)
    In: SBA Research (ed.): ARES 2018: International Conference on Availability, Reliability and Security, Hamburg: 2018
    DOI: 10.1145/3230833.3233256
  • Maene P., Götzfried J., Müller T., de Clercq R., Freiling F., Verbauwhede I.:
    Atlas: Application Confidentiality in Compromised Embedded Systems
    In: IEEE Transactions on Dependable and Secure Computing (2018)
    ISSN: 1545-5971
    DOI: 10.1109/TDSC.2018.2858257
  • Maier A., Syben-Leisner C., Lasser T., Riess C.:
    A Gentle Introduction to Deep Learning in Medical Image Processing
    (2018), Article No.: arXiv:1810.05401
    DOI: 10.1016/j.zemedi.2018.12.003
    URL: https://arxiv.org/pdf/1810.05401
    (Techreport)
  • Menges F., Böhm F., Vielberth M., Puchta A., Taubmann B., Rakotondravony N., Latzo T.:
    Introducing DINGfest: An architecture for next generation SIEM systems
    Jahrestagung des Fachbereichs Sicherheit - Schutz und Zuverlässigkeit der Gesellschaft für Informatik (Konstanz)
    In: SICHERHEIT 2018, Bonn: 2018
  • Morgner P., Benenson Z.:
    Exploring Security Economics in IoT Standardization Efforts
    NDSS-DISS (San Diego, CA, USA)
    In: Proceedings 2018 NDSS Workshop on Decentralized IoT Security and Standards (DISS) 2018
    DOI: 10.14722/diss.2018.23009
    URL: https://www.ndss-symposium.org/wp-content/uploads/2018/07/diss2018_9_Morgner_paper.pdf
  • Morgner P., Freiling F., Benenson Z.:
    Opinion: Security Lifetime Labels -- Overcoming Information Asymmetry in Security of IoT Consumer Products
    WiSec'18 (Stockholm, Sweden, 18. June 2018 - 20. June 2018)
    In: Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'18) 2018
    DOI: 10.1145/3212480.3212486
    URL: https://dl.acm.org/citation.cfm?id=3212486
  • Morgner P., Pfennig S., Salzner D., Benenson Z.:
    Malicious IoT Implants: Tampering with Serial Communication over the Internet
    RAID 2018 (Heraklion, Crete, Greece)
    In: Proceedings of the 21st International Symposium on Research in Attacks, Intrusions, and Defenses (RAID 2018) 2018
    DOI: 10.1007/978-3-030-00470-5_25
    URL: https://www1.cs.fau.de/filepool/publications/raid2018-malicious-iot-implants.pdf
  • Nemetz S., Schmitt S., Freiling F.:
    A standardized corpus for SQLite database forensics
    In: Digital Investigation 24S (2018), p. S121-S130
    ISSN: 1742-2876
    DOI: 10.1016/j.diin.2018.01.015
    URL: http://dfrws.org/conferences/dfrws-eu-2018/sessions/standardized-corpus-sqlite-database-forensics
  • Palutke R., Freiling F.:
    Styx: Countering robust memory acquisition
    In: Digital Investigation 24S (2018), p. S18-S28
    ISSN: 1742-2876
    DOI: 10.1016/j.diin.2018.01.004
    URL: http://dfrws.org/conferences/dfrws-eu-2018/sessions/styx-countering-robust-memory-acquisition
  • Ploner S., Riess C., Schottenhamml J., Moult EM., Waheed NK., Fujimoto JG., Maier A.:
    A Joint Probabilistic Model for Speckle Variance, Amplitude Decorrelation and Interframe Variance (IFV) Optical Coherence Tomography Angiography
    Bildverarbeitung für die Medizin 2018 - Algorithmen - Systeme - Anwendungen (Erlangen, 11. March 2018 - 13. March 2018)
    In: Proceedings des Workshops Bildverarbeitung für die Medizin 2018 - Algorithmen - Systeme - Anwendungen 2018
    DOI: 10.1007/978-3-662-56537-7_37
  • Polleit P., Spreitzenbarth M.:
    Defeating the Secrets of OTP Apps
    11th International Conference on IT Security Incident Management & IT Forensics (IMF 2018) (Hamburg)
    In: IEEE Computer Society (ed.): Proceedings of the 11th International Conference on IT Security Incident Management & IT Forensics, Los Alamitos, CA, USA: 2018
    DOI: 10.1109/IMF.2018.00013
    URL: https://faui1-files.cs.fau.de/public/publications/Spreitzenbarth-Polleit-IMF-2018-Defeating_OTP.pdf
  • Reinfelder L., Schankin A., Russ S., Benenson Z.:
    An Inquiry into Perception and Usage of Smartphone Permission Models
    15th International Conference on Trust, Privacy and Security in Digital Business (TrustBus) (Regensburg, 5. September 2018 - 6. September 2018)
    In: TrustBus Conference Proceedings, CHAM: 2018
    DOI: 10.1007/978-3-319-98385-1_2
  • Roessler A., Cozzolino D., Verdoliva L., Riess C., Thies J., Niessner M.:
    FaceForensics: A Large-scale Video Dataset for Forgery Detection in Human Faces
    abs/1803.09179 (2018)
    URL: http://arxiv.org/abs/1803.09179
    (Techreport)
  • Schirrmacher F., Köhler T., Riess C.:
    Adaptive Quantile Sparse Image (AQuaSI) Prior for Inverse Imaging Problems
    abs/1804.02152 (2018)
    DOI: 10.1109/tci.2019.2956888
    URL: http://arxiv.org/abs/1804.02152
    (Techreport)
  • Schmitt S.:
    Introducing Anti-Forensics to SQLite Corpora and Tool Testing
    International Conference on IT Security Incident Management & IT Forensics (IMF 2018) (Hamburg, Germany)
    In: Proceedings of the 11th International Conference on IT Security Incident Management & IT Forensics, Los Alamitos, CA, USA: 2018
    DOI: 10.1109/imf.2018.00014
  • Seuffert J., Stamminger M., Riess C.:
    Towards Forensic Exploitation of 3-D Lighting Environments in Practice
    Sicherheit 2018 (Konstanz, 25. April 2018 - 27. April 2018)
    In: Beiträge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft fü}r Informatik e.V. (GI) 2018
    DOI: 10.18420/sicherheit2018_12
  • Stadlinger J., Block F., Dewald A.:
    Linux Memory Forensics: Expanding Rekall Userland Investigation
    11th International Conference on IT Security Incident Management & IT Forensics (IMF 2018) (Hamburg)
    In: IEEE Computer Society (ed.): 2018 11th International Conference on IT Security Incident Management & IT Forensics (IMF) 2018
    DOI: 10.1109/IMF.2018.00010
  • Watson V., Bajramovic E., Lou X., Waedt K.:
    EXAMPLE OF GRADED AND LIFECYCLE PHASE-SPECIFIC SECURITY CONTROLS FOR NUCLEAR I&C AND EPS USE CASES
    26th International Conference on Nuclear Engineering (ICONE-26) (London, 22. July 2018 - 26. July 2018)
    In: PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE ON NUCLEAR ENGINEERING, 2018, VOL 5, NEW YORK: 2018
    DOI: 10.1115/icone26-81601
  • Wirth M., Gradl S., Poimann D., Richer R., Ottmann J., Eskofier B.:
    Exploring the Feasibility of EMG Based Interaction for Assessing Cognitive Capacity in Virtual Reality
    40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBC 2018 (Honolulu, HI, USA, 18. July 2018 - 21. July 2018)
    In: Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS 2018
    DOI: 10.1109/EMBC.2018.8513213
  • Wirth M., Gradl S., Sembdner J., Kuhrt S., Eskofier B.:
    Evaluation of Interaction Techniques for a Virtual Reality Reading Room in Diagnostic Radiology
    31st Annual ACM Symposium on User Interface Software and Technology (UIST) (Berlin, 14. October 2018 - 17. October 2018)
    In: UIST 2018: PROCEEDINGS OF THE 31ST ANNUAL ACM SYMPOSIUM ON USER INTERFACE SOFTWARE AND TECHNOLOGY, NEW YORK: 2018
    DOI: 10.1145/3242587.3242636
  • Zieger A., Freiling F., Kossakowski KP.:
    The β-Time-to-Compromise Metric for Practical Cyber Security Risk Estimation
    11th International Conference on IT Security Incident Management & IT Forensics (IMF 2018) (Hamburg)
    In: IEEE Computer Society (ed.): 2018 11th International Conference on IT Security Incident Management & IT Forensics 2018
    DOI: 10.1109/IMF.2018.00017
  • Übler D., Götzfried J., Müller T.:
    Secure Remote Computation using Intel SGX
    Sicherheit, Schutz und Zuverlässigkeit (Konstanz)
    In: Sicherheit 2018, Bonn: 2018
    DOI: 10.18420/sicherheit2018_16

2017

  • Benenson Z., Gassmann F., Landwirth R.:
    Unpacking Spear Phishing Susceptibility
    Financial Cryptography and Data Security Workshops
    In: Targeted Attacks, Malta: 2017
  • Berger M., Xia Y., Aichinger W., Mentl K., Unberath M., Aichert A., Riess C., Hornegger J., Fahrig R., Maier A.:
    Motion Compensation for Cone-Beam CT using Fourier Consistency Conditions
    In: Physics in Medicine and Biology 62 (2017), p. 7181-7215
    ISSN: 0031-9155
    DOI: 10.1088/1361-6560/aa8129
    URL: https://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2017/Berger17-MCF.pdf
  • Davari A., Christlein V., Vesal S., Maier A., Riess C.:
    GMM Supervectors for Limited Training Data in Hyperspectral Remote Sensing Image Classification
    17th International Conference on Computer Analysis of Images and Patterns (Ystad, 22. August 2017 - 24. August 2017)
    In: Proceedings of the 17th International Conference on Computer Analysis of Images and Patterns Part II 2017
    DOI: 10.1007/978-3-319-64698-5_25
  • Davari A., Haeberle A., Riess C.:
    Sketch Layer Separation in Multi-Spectral Historical Document Images
    International Symposium on Digital Humanities
    In: International Symposium on Digital Humanities: Book of Abstracts 2017
    Open Access: https://journals.lnu.se/index.php/isdh/article/download/431/378
    URL: https://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2017/Davari17-IDHS-TR.pdf
  • Davari A., Lindenberger T., Haeberle A., Christlein V., Maier A., Riess C.:
    Image Registration for the Alignment of Digitized Historical Documents
    abs/1712.04482 (2017)
    Open Access: https://arxiv.org/abs/1712.04482
    URL: http://arxiv.org/abs/1712.04482
    (Techreport)
  • Freiling F., Glanzmann T., Reiser H.:
    Characterizing loss of digital evidence due to abstraction layers
    In: Forensic Science International: Digital Investigation 20 (2017), p. 107-115
    ISSN: 2666-2817
    DOI: 10.1016/j.diin.2017.01.012
  • Freiling F., Sack K.:
    Zur Authentizität und Integrität bei (digitalen) Beweismitteln
    In: Vieweg, Klaus (ed.): Festgabe Institut für Recht und Technik: Erlanger Festveranstaltungen 2011 und 2016, Köln: Carl Heymanns Verlag, 2017, p. 319-337 (Recht - Technik - Wirtschaft, Vol.111)
    ISBN: 978-3-452-28832-5

    URL: https://faui1-files.cs.fau.de/public/publications/22-Freiling-Sack_RTW-111.pdf
  • Freiling F., Zoubek C.:
    Do digital investigators have to program? A controlled experiment in digital investigation
    In: Digital Investigation 20S (2017), p. S37-S46
    ISSN: 1742-2876
    DOI: 10.1016/j.diin.2017.01.004
  • Fürsattel P., Plank C., Maier A., Riess C.:
    Accurate laser scanner to camera calibration with application to range sensor evaluation
    In: IPSJ Transactions on Computer Vision and Applications 9 (2017), p. 21
    ISSN: 1882-6695
    DOI: 10.1186/s41074-017-0032-5
  • Fürsattel P., Schaller C., Maier A., Riess C.:
    Distance error correction for time-of-flight cameras
    Automated Visual Inspection and Machine Vision II
    DOI: 10.1117/12.2271775
  • Groß T., Müller T.:
    Protecting JavaScript Apps from Code Analysis
    SHCIS '17 (Neuchâtel, Switzerland, 19. June 2017 - 22. June 2017)
    In: 4th Workshop on Security in highly connected IT systems 2017
    DOI: 10.1145/3099012.3099018
  • Götzfried J., Eckert M., Schinzel S., Müller T.:
    Cache Attacks on Intel SGX
    EuroSec'17 (Belgrade, Serbia)
    In: Proceedings of the Tenth European Workshop on System Security 2017
    DOI: 10.1145/3065913.3065915
    URL: https://www1.cs.fau.de/sgx-timing
  • Haupert V., Maier D., Müller T.:
    Paying the Price for Disruption: How a FinTech Allowed Account Takeover
    ROOTS (Vienna, Austria, 16. November 2017 - 17. November 2017)
    In: Reversing and Offensive-oriented Trends Symposium, New York, NY, USA: 2017
    DOI: 10.1145/3150376.3150383
    URL: https://www1.cs.fau.de/n26
  • Haupert V., Müller T.:
    Rest In Protection: A Kernel-Level Approach to Mitigate RIP Tampering
    ICISSP 2017 (Porto, 19. February 2017 - 21. February 2017)
    In: Mori, Paolo ; Furnell, Steven ; Camp, Olivier (ed.): Proceedings of the 3rd International Conference on Information Systems Security and Privacy, Setúbal: 2017
    DOI: 10.5220/0006083800250037
  • Hoffmann J., Haupert V., Freiling F.:
    Anscheinsbeweis und Kundenhaftung beim Online-Banking
    In: Zeitschrift für das gesamte Handelsrecht und Wirtschaftsrecht 181 (2017), p. 780-816
    ISSN: 0044-2437
  • Horn F., Gelse K., Jabari S., Hauke C., Käppler S., Ludwig V., Meyer P., Michel T., Mohr J., Pelzer G., Rieger J., Riess C., Seifert M., Anton G.:
    High-Energy X-Ray Talbot-Lau Radiography of a Human Knee
    In: Physics in Medicine and Biology 62 (2017), p. 6729-6745
    ISSN: 0031-9155
    DOI: 10.1088/1361-6560/aa7721
    URL: http://iopscience.iop.org/article/10.1088/1361-6560/aa7721/
  • Kalysch A., Götzfried J., Müller T.:
    VMAttack: Deobfuscating Virtualization-Based Packed Binaries
    ARES'17 (Reggio Calabria, Italy, 29. August 2017 - 1. September 2017)
    In: 12th International Conference on Availability, Reliability and Security 2017
    DOI: 10.1145/3098954.3098995
    URL: https://dl.acm.org/citation.cfm?doid=3098954.3098995
  • Käppler S., Rieger J., Pelzer G., Horn F., Michel T., Maier A., Anton G., Riess C.:
    Improved Reconstruction of Phase-Stepping Data for Talbot-Lau X-Ray Imaging
    In: Journal of Medical Imaging 4 (2017), Article No.: 034005
    ISSN: 2329-4310
    DOI: 10.1117/1.JMI.4.3.034005
    URL: https://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2017/Kaeppler17-IRO.pdf
  • Käppler S., Seifert M., Horn F., Pelzer G., Rieger J., Michel T., Maier A., Anton G., Riess C.:
    Talbot-Lau X-ray phase contrast for tiling-based acquisitions without reference scanning
    In: Medical Physics 44 (2017), p. 1886-1898
    ISSN: 0094-2405
    DOI: 10.1002/mp.12200
  • Köhler T., Bätz M., Naderi Boldaji F., Kaup A., Maier A., Riess C.:
    Benchmarking Super-Resolution Algorithms on Real Data
    abs/1709.04881 (2017)
    Open Access: https://arxiv.org/abs/1709.04881
    URL: http://arxiv.org/abs/1709.04881
    (Techreport)
  • Lorch B., Vaillant G., Baumgartner C., Bai W., Rueckert D., Maier A.:
    Automated Detection of Motion Artefacts in MR Imaging Using Decision Forests.
    In: Journal of Medical Engineering 2017 (2017), Article No.: 4501647
    ISSN: 2314-5129
    DOI: 10.1155/2017/4501647
  • Maene P., Götzfried J., de Clercq R., Müller T., Freiling F., Verbauwhede I.:
    Hardware-Based Trusted Computing Architectures for Isolation and Attestation
    In: IEEE Transactions on Computers (2017)
    ISSN: 0018-9340
    DOI: 10.1109/TC.2017.2647955
  • Morgner P., Mattejat S., Benenson Z., Müller C., Armknecht F.:
    Insecure to the Touch: Attacking ZigBee 3.0 via Touchlink Commissioning
    WiSec'17 (Boston, MA)
    In: Proceedings of the 10th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec'17) 2017
    DOI: 10.1145/3098243.3098254
    URL: https://www1.cs.fau.de/filepool/publications/wisec2017_touchlink.pdf
  • Morgner P., Müller C., Ring M., Eskofier B., Riess C., Armknecht F., Benenson Z.:
    Privacy Implications of Room Climate Data
    In: Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS 2017) 2017
    DOI: 10.1007/978-3-319-66399-9_18
    URL: https://faui1-files.cs.fau.de/filepool/publications/esorics2017_privacy_room_climate.pdf
  • Mullan P., Cozzolino D., Verdoliva L., Riess C.:
    Residual-based forensic comparison of video sequences
    IEEE International Conference on Image Processing (Beijing, 17. September 2017 - 20. September 2017)
    In: IEEE International Conference on Image Processing 2017
    DOI: 10.1109/ICIP.2017.8296533
  • Noorman J., Van Bulck J., Muhlberg JT., Piessens F., Maene P., Preneel B., Verbauwhede I., Götzfried J., Müller T., Freiling F.:
    Sancus 2.0: A Low-Cost Security Architecture for IoT Devices
    In: ACM Transactions on Privacy and Security 20 (2017), Article No.: 7
    ISSN: 2471-2566
    DOI: 10.1145/3079763
    URL: http://doi.acm.org/10.1145/3079763
  • Reinfelder L., Benenson Z.:
    Exploring Security Processes in Organizations: the Case of Smartphones
    MuC Workshop Usable Security and Privacy (Regensburg)
    In: Mensch und Computer (MuC) 2017 - Workshopband 2017
    DOI: 10.18420/muc2017-ws05-0403
    URL: http://dl.mensch-und-computer.de/handle/123456789/5361
  • Riess C.:
    Illumination analysis in physics-based image forensics: A joint discussion of illumination direction and color
    28th Tyrrhenian International Workshop on Digital Communications, TIWDC 2017
    DOI: 10.1007/978-3-319-67639-5_9
  • de Clercq R., Götzfried J., Übler D., Maene P., Verbauwhede I.:
    SOFIA: Software and Control Flow Integrity Architecture
    In: Computers & Security 68 (2017), p. 16-35
    ISSN: 0167-4048
    DOI: 10.1016/j.cose.2017.03.013

2016

  • Armknecht F., Benenson Z., Morgner P., Müller C.:
    On the Security of the ZigBee Light Link Touchlink Commissioning Procedure
    International Workshop on Security, Privacy and Reliability of Smart Buildings (Bonn)
    In: International Workshop on Security, Privacy and Reliability of Smart Buildings 2016
    URL: https://dl.gi.de/bitstream/handle/20.500.12116/874/229.pdf
  • Bauer J., Freiling F.:
    Towards Cycle-Accurate Emulation of Cortex-M Code to Detect Timing Side Channels
    ARES (Salzburg)
    In: 11th International Conference on Availability, Reliability and Security 2016
  • Bauer J., Gruhn M., Freiling F.:
    Lest We Forget: Cold-Boot Attacks on Scrambled DDR3 Memory
    In: Digital Investigation 16 (2016), p. 65-74
    ISSN: 1742-2876
    DOI: 10.1016/j.diin.2016.01.009
    URL: https://www.dfrws.org/conferences/dfrws-eu-2016/sessions/lest-we-forget-cold-boot-attacks-scrambled-ddr3-memory
  • Bauer J., Schinzel S., Freiling F., Dewald A.:
    Information Leakage behind the Curtain: Abusing Anti-EMI Features for Covert Communication
    IEEE International Symposium on Hardware Oriented Security and Trust (McLean, VA, USA, 3. May 2016 - 5. May 2016)
    In: Proceedings of HOST 2016 2016
    DOI: 10.1109/HST.2016.7495570
  • Drescher G., Erhardt C., Freiling F., Götzfried J., Lohmann D., Maene P., Müller T., Verbauwhede I., Weichslgartner A., Wildermann S.:
    Providing security on demand using invasive computing
    In: it - Information Technology 58 (2016), p. 281-295
    ISSN: 1611-2776
    DOI: 10.1515/itit-2016-0032
  • Freiling F.:
    Staatliche Spähsoftware zur Strafverfolgung
    In: Informatik-Spektrum 39 (2016), p. 203-209
    ISSN: 0170-6012
    DOI: 10.1007/s00287-015-0912-y
  • Gruhn M., Freiling F.:
    Evaluating Atomicity, and Integrity of Correct Memory Acquisition Methods
    In: Digital Investigation 16 (2016), p. 1-10
    ISSN: 1742-2876
    DOI: 10.1016/j.diin.2016.01.003
    URL: http://www.dfrws.org/2016eu/proceedings/DFRWS-EU-2016-1.pdf
  • Götzfried J., Dörr N., Palutke R., Müller T.:
    HyperCrypt: Hypervisor-based Encryption of Kernel and User Space
    ARES'16 (Salzburg, Austria, 31. August 2016 - 2. September 2016)
    In: 11th International Conference on Availability, Reliability and Security 2016
    DOI: 10.1109/ARES.2016.13
    URL: https://www1.cs.fau.de/hypercrypt
  • Götzfried J., Müller T., Drescher G., Nürnberger S., Backes M.:
    RamCrypt: Kernel-based Address Space Encryption for User-mode Processes
    ASIACCS'16 (Xi'an, China)
    In: 11th ACM Asia Conference on Computer and Communications Security, New York: 2016
    DOI: 10.1145/2897845.2897924
    URL: https://www1.cs.fau.de/ramcrypt
  • Haupert V., Müller T.:
    Auf dem Weg verTAN: Über die Sicherheit App-basierter TAN-Verfahren
    Sicherheit, Schutz und Zuverlässigkeit (Bonn, 5. April 2016 - 7. April 2016)
    In: Meier Michael, Reinhardt Delphine, Wendzel Steffen (ed.): Konferenzband der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), Bonn: 2016
    Open Access: https://dl.gi.de/handle/20.500.12116/859
    URL: https://www1.cs.fau.de/appTAN
  • Kurtz A., Gascon H., Becker T., Rieck K., Freiling F.:
    Fingerprinting Mobile Devices Using Personalized Configurations
    In: Proceedings on Privacy Enhancing Technologies (2016), p. 4-19
    ISSN: 2299-0984
  • Morgner P., Mattejat S., Benenson Z.:
    All Your Bulbs Are Belong to Us: Investigating the Current State of Security in Connected Lighting Systems
    (2016)
    URL: https://arxiv.org/abs/1608.03732
    (Techreport)
  • Richter L., Götzfried J., Müller T.:
    Isolating Operating System Components with Intel SGX
    SysTEX'16 (Trento, Italy)
    In: 1st Workshop on System Software for Trusted Execution 2016
    DOI: 10.1145/3007788.3007796
    URL: https://www1.cs.fau.de/sgx-kernel
  • Seifert M., Käppler S., Hauke C., Horn F., Pelzer G., Rieger J., Michel T., Riess C., Anton G.:
    Optimisation of Image Reconstruction for Phase-Contrast X-Ray Talbot-Lau Imaging with regard to Mechanical Robustness
    In: Physics in Medicine and Biology 61 (2016), p. 6441-6464
    ISSN: 0031-9155
    DOI: 10.1088/0031-9155/61/17/6441
    URL: http://iopscience.iop.org/article/10.1088/0031-9155/61/17/6441/meta
  • Stritter B., Freiling F., König H., Rietz R., Ullrich S., von Gernler A., Erlacher F., Dressler F.:
    Cleaning up Web 2.0's Security Mess-at Least Partly
    In: IEEE Security & Privacy 14 (2016), p. 48-57
    ISSN: 1540-7993
    DOI: 10.1109/MSP.2016.31
  • Sänger J., Hänsch N., Glass B., Benenson Z., Landwirth R., Sasse AM.:
    Look Before You Leap: Improving the Users’ Ability to Detect Fraud in Electronic Marketplaces
    CHI 2016
    In: SIGCHI Conference on Human Factors in Computing Systems, San Jose, CA, USA: 2016
    URL: https://www1.informatik.uni-erlangen.de/filepool/publications/zina/look-beore-you-leap-chi16.pdf
  • Weichslgartner A., Wildermann S., Götzfried J., Freiling F., Glaß M., Teich J.:
    Design-Time/Run-Time Mapping of Security-Critical Applications in Heterogeneous MPSoCs
    19th International Workshop on Software and Compilers for Embedded Systems (SCOPES) (St. Goar, 23. May 2016 - 25. May 2016)
    In: In Proceedings of the 19th International Workshop on Software and Compilers for Embedded Systems (SCOPES) 2016
    DOI: 10.1145/2906363.2906370
  • Würstlein A., Gernoth M., Götzfried J., Müller T.:
    Exzess: Hardware-based RAM encryption against physical memory disclosure
    29th International Conference on Architecture of Computing Systems, ARCS 2016
    DOI: 10.1007/978-3-319-30695-7_5
    URL: https://www4.cs.fau.de/~arw/exzess

2015

  • Anikeev M., Freiling F., Götzfried J., Müller T.:
    Secure garbage collection: Preventing malicious data harvesting from deallocated Java objects inside the Dalvik VM
    In: Journal of Information Security and Applications, Amsterdam: Elsevier, 2015
    DOI: 10.1016/j.jisa.2014.10.001
  • Bauer J., Freiling F.:
    Schutz eingebetteter Systeme gegen physische Angriffe
    DACH Security 2015 (Bonn)
    In: DACH Security 2015 -- Bestandsaufnahme - Konzepte - Anwendungen - Perspektiven 2015
  • Benenson Z., Girard A., Krontiris I.:
    User acceptance factors for anonymous credentials: An empirical investigation
    WEIS (Delft, The Netherlands)
    In: Workshop on the Economics of Information Security 2015
    URL: http://weis2015.econinfosec.org/papers/WEIS_2015_benenson.pdf
  • Benenson Z., Lenzini G., Oliveira D., Parkin S., Übelacker S.:
    Maybe Poor Johnny Really Cannot Encrypt - The Case for a Complexity Theory for Usable Security
    NSPW (Twente, The Netherlands)
    In: New Security Paradigms Workshop 2015
  • Brodowski D., Freiling F.:
    Cyberkriminalität - Erscheinungsformen, Entwicklungslinien, Herausforderungen
    In: FIfF-Kommunikation (2015), p. 22-26
    ISSN: 0938-3476
  • Brodowski D., Freiling F.:
    Transnationale Cyberkriminalität vs. nationale Strafverfolgung: Mögliche Auswege aus einem grundsätzlichen Dilemma
    In: FIfF-Kommunikation (2015), p. 36-39
    ISSN: 0938-3476
  • Freiling F.:
    Offener und verdeckter Einsatz technischer Ermittlungswerkzeuge zwischen Theorie und Praxis
    In: Steiger, Saskia ; Schiller, Jochen ; Gerhold, Lars (ed.): Sicherheitsforschung im Dialog, Frankfurt am Main: Peter Lang, 2015, p. 131-144
    ISBN: 978-3-631-65848-2
  • Freiling F., Gruhn M.:
    What is essential data in digital forensic analysis?
    9th International Conference on IT Security Incident Management & IT Forensics (Magdeburg)
    In: Proceedings of the 9th International Conference on IT Security Incident Management & IT Forensics 2015
    DOI: 10.1109/IMF.2015.20
  • Freiling F., Schuhr J., Gruhn M.:
    What is essential data in digital forensic analysis?
    In: it - Information Technology 57 (2015), p. 376-383
    ISSN: 1611-2776
    DOI: 10.1515/itit-2015-0016
  • Götzfried J., Hampel J., Müller T.:
    Physically Secure Code and Data Storage in Autonomously Booting Systems (Short Paper)
    ARES'15 (Toulouse, France)
    In: 10th International Conference on Availability, Reliability and Security 2015
    DOI: 10.1109/ARES.2015.19
  • Götzfried J., Müller T., de Clercq R., Maene P., Freiling F., Verbauwhede I.:
    Soteria: Offline Software Protection within Low-cost Embedded Devices
    ACSAC'15 (Los Angeles, California, USA)
    In: Proceedings of the 31th Annual Computer Security Applications Conference 2015
    DOI: 10.1145/2818000.2818013
    URL: https://www1.cs.fau.de/soteria
  • Krontiris I., Benenson Z., Girard A., Sabouri A., Rannenberg K., Schoo P.:
    Privacy-ABCs as a Case for Studying the Adoption of PETs by Users and Service Providers
    Annual Privacy Forum (Luexembourg)
    In: Annual Privacy Forum, Heidelberg: 2015
  • Lorch B., Berger M., Hornegger J., Maier A.:
    Projection and Reconstruction-Based Noise Filtering Methods in Cone Beam CT
    Bildverarbeitung für die Medizin 2015 (Lübeck)
    In: Bildverarbeitung für die Medizin 2015 2015
    URL: https://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2015/Lorch15-PAR.pdf
  • Morgner P., Benenson Z., Müller C., Armknecht F.:
    Design Space of Smart Home Networks from a Security Perspective
    14. GI/ITG KuVS Fachgespräch Sensornetze der GI/ITG Fachgruppe Kommunikation und Verteilte Systeme (Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU))
    In: Proceedings of the 14. GI/ITG KuVS Fachgespräch Sensornetze 2015
    URL: https://opus4.kobv.de/opus4-fau/files/6617/report.pdf
  • Mullan P., Kanzler C., Lorch B., Schroeder L., Winkler L., Larissa L., Riedel F., Richer R., Luckner C., Leutheuser H., Eskofier B., Pasluosta CF.:
    Unobtrusive Heart Rate Estimation during Physical Exercise using Photoplethysmographic and Acceleration Data
    37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society EMBC ’15 (Milano)
    In: 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society EMBC ’15 2015
  • Pugliese G.:
    Web Tracking: Overview and Applicability in Digital Investigations
    In: it - Information Technology 57 (2015), p. 366–375
    ISSN: 1611-2776
    DOI: 10.1515/itit-2015-0015
  • Riess C., Kirchner M., Schoettle P.:
    Thinking beyond the block: block matching for copy-move forgery detection revisited
    SPIE Media Watermarking, Security, and Forensics (San Francisco, 9. February 2015 - 11. February 2015)
    In: Media Watermarking, Security, and Forensics 2015 2015
    DOI: 10.1117/12.2082789
  • Zhuang Y., Freiling F.:
    Approximating Optimal Software Obfuscation for Android Applications
    2nd Workshop on Security in Highly Connected IT Systems (SHCIS 2015) (Vienna, Austria)
    In: Proceedings 2nd Workshop on Security in Highly Connected IT Systems, Piscataway, NJ, USA: 2015

2014

  • Benenson Z., Girard A., Krontiris I., Liagkou V., Rannenberg K., Stamatiou Y.:
    User Acceptance of Privacy-ABCs: An Exploratory Study
    HCI International 2014 (Crete, Greece, 22. June 2014 - 27. June 2014)
    In: Human Aspects of Information Security, Privacy and Trust 2014
    DOI: 10.1007/978-3-319-07620-1_33
  • Benenson Z., Hintz N., Girard A., Luder A.:
    Susceptibility to URL-based Internet Attacks: Facebook vs. Email
    SESOC'14 (Budapest, Hungary, 24. March 2014 - 28. March 2014)
    In: 6th IEEE International Workshop on SEcurity and SOCial Networking 2014
    DOI: 10.1109/PerComW.2014.6815275
  • Brodowski D., Dewald A., Freiling F., Kovacs S., Rieger M.:
    Drei Jahre Master Online Digitale Forensik: Ergebnisse und Erfahrungen
    Sicherheit 2014 – Sicherheit, Schutz und Zuverlässigkeit (Wien)
    In: Katzenbeisser, S., Lotz, V., Weippl, E. (ed.): Sicherheit 2014 – Sicherheit, Schutz und Zuverlässigkeit, Bonn: 2014
    Open Access: https://dl.gi.de/handle/20.500.12116/20059
  • Dewald A., Freiling F.:
    From Computer Forensics to Forensic Computing: Investigators Investigate, Scientists Associate
    2014 (2014), p. 10
    ISSN: 2191-5008
    Open Access: http://nbn-resolving.de/urn:nbn:de:bvb:29-opus4-47508
    URL: http://nbn-resolving.de/urn:nbn:de:bvb:29-opus4-47508
    (Techreport)
  • Freiling F., Protsenko M., Zhuang Y.:
    An Empirical Evaluation of Software Obfuscation Techniques applied to Android APKs
    DAPRO 2014 (Beijing, China)
    In: International Conference on Security and Privacy in Communication Networks 2014
    DOI: 10.1007/978-3-319-23802-9_24
  • Freiling F., Sack K.:
    Selektive Datensicherungen in der IT-Forensik
    In: Datenschutz und Datensicherheit 38 (2014), p. 112-117
    ISSN: 1614-0702
  • Freiling F., Saglietti F., Grimm R., Großpietsch KE., Keller H., Mottok J., Münch I., Rannenberg K.:
    Technische Sicherheit und Informationssicherheit: Unterschiede und Gemeinsamkeiten
    In: Informatik-Spektrum 37 (2014), p. 14-24
    ISSN: 0170-6012
    DOI: 10.1007/s00287-013-0748-2
  • Götzfried J., Müller T.:
    Analysing Android's Full Disk Encryption Feature
    In: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 5 (2014), p. 84-100
    ISSN: 2093-5374
  • Götzfried J., Müller T.:
    Mutual Authentication and Trust Bootstrapping towards Secure Disk Encryption
    In: ACM Transactions on Information and System Security 17 (2014)
    ISSN: 1094-9224
    DOI: 10.1145/2663348
    URL: https://www1.cs.fau.de/mark
  • Hänsch N., Benenson Z.:
    Specifying IT security awareness
    1st Workshop on Security in highly connected IT systems (Munich, Germany, 1. September 2014 - 4. September 2014)
    In: SHCIS’14 2014
    DOI: 10.1109/DEXA.2014.71
  • Kurtz A., Troßbach M., Freiling F.:
    Snoop-it: Dynamische Analyse und Manipulation von Apple iOS Apps
    7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) (Wien)
    In: Sicherheit 2014 -- Sicherheit, Schutz und Zuverlässigkeit, Bonn: 2014
  • Kurtz A., Weinlein A., Settgast C., Freiling F.:
    DiOS: Dynamic Privacy Analysis of iOS Applications
    (2014), col. 17
    Open Access: https://opus4.kobv.de/opus4-fau/frontdoor/index/index/searchtype/series/id/9/start/1/rows/20/yearfq/2014/docId/4755
    URL: https://opus4.kobv.de/opus4-fau/frontdoor/index/index/searchtype/series/id/9/start/1/rows/20/yearfq/2014/docId/4755
    (Techreport)
  • Müller T., Freiling F.:
    A Systematic Assessment of the Security of Full Disk Encryption
    In: IEEE Transactions on Dependable and Secure Computing 12 (2014), p. 491-503
    ISSN: 1545-5971
    DOI: 10.1109/TDSC.2014.2369041
  • Reinfelder L., Benenson Z., Gassmann F.:
    Differences between Android and iPhone users in their security and privacy awareness
    11th International Conference on Trust, Privacy & Security in Digital Business - TrustBus 2014 (Munich, 2. September 2014 - 3. September 2014)
    In: TrustBus 2014
    DOI: 10.1007/978-3-319-09770-1_14
  • Zhuang Y., Protsenko M., Müller T., Freiling F.:
    An(other) Exercise in Measuring the Strength of Source Code Obfuscation
    DEXA Workshops (Munich, Germany)
    In: 1st Workshop on Security in highly connected IT systems 2014
    DOI: 10.1109/DEXA.2014.69

2013

  • Benenson Z., Christin D., De Luca A., Fischer-Hübner S., Heimann T., Meyer J.:
    Consequence-based Privacy Decisions: a New Way to Better Privacy Management
    'My Life, Shared' - Trust and Privacy in the Age of Ubiquitous Experience Sharing (Dagstuhl Seminar 13312) (Dagstuhl, Germany)
    In: 'My Life, Shared' - Trust and Privacy in the Age of Ubiquitous Experience Sharing (Dagstuhl Seminar 13312), Dagstuhl, Germany: 2013
    DOI: 10.4230/DagRep.3.7.74
    URL: http://drops.dagstuhl.de/opus/volltexte/2013/4307
  • Benenson Z., Gassmann F., Reinfelder L.:
    Android and iOS users' differences concerning security and privacy
    CHI'13 (New York, NY, USA)
    In: CHI '13 Extended Abstracts on Human Factors in Computing Systems 2013
    URL: http://doi.acm.org/10.1145/2468356.2468502
  • Benenson Z., Krontiris I., Rannenberg K., Liagkou V., Schopf A., Schröder D., Stamatiou Y.:
    Understanding and Using Anonymous Credentials
    Symposium On Usable Privacy and Security, Poster Session (Newcastle, UK)
    In: Symposium On Usable Privacy and Security, Poster Session 2013
    URL: http://cups.cs.cmu.edu/soups/2013/posters/soups13_posters-final24.pdf
  • Benenson Z., Reinfelder L.:
    Should the Users be Informed? On Differences in Risk Perception between Android and iPhone Users
    Workshop on Risk Perception in IT Security and Privacy (Newcastle, UK)
    In: Workshop on Risk Perception in IT Security and Privacy 2013
    URL: http://cups.cs.cmu.edu/soups/2013/risk/soups13-risk-perception-Android-vs-iPhone.pdf
  • Carvalho T., Riess C., Angelopoulou E., Pedrini H., Rocha A.:
    Exposing Digital Image Forgeries by Illumination Color Classification
    In: IEEE Transactions on Information Forensics and Security 8 (2013), p. 1182--1194
    ISSN: 1556-6013
    DOI: 10.1109/TIFS.2013.2265677
  • Christlein V., Riess C., Angelopoulou E., Evangelopoulos G., Kakadiaris I.:
    The Impact of Specular Highlights on 3D-2D Face Recognition
    Biometric and Surveillance Technology for Human and Activity Identification X (Baltimore, MD, 2. May 2013 - 2. May 2013)
    In: SPIE (ed.): Biometric and Surveillance Technology for Human and Activity Identification 2013
    DOI: 10.1117/12.2019014
    URL: http://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2013/Christlein13-TIO.pdf
  • Dewald A., Freiling F., Schmitt S., Spreitzenbarth M., Vömel S.:
    Systematische Probleme und Grenzen der forensischen Informatik
    In: Gaycken, Sandro (ed.): Jenseits von 1984: Datenschutz und Überwachung in der fortgeschrittenen Informationsgesellschaft. Eine Versachlichung, Bielefeld: Transcript-Verlag, 2013, p. 101-117
    ISBN: 3837620034
  • Götzfried J., Müller T.:
    ARMORED: CPU-bound Encryption for Android-driven ARM Devices
    ARES 2013 (Regensburg, 2. September 2013 - 6. September 2013)
    In: Proceedings of the 8th International Conference on Availability, Reliability and Security 2013
    DOI: 10.1109/ARES.2013.23
    URL: https://www1.cs.fau.de/armored
  • Götzfried J., Müller T.:
    Fast Software Encryption with SIMD (How to speed up symmetric block ciphers with the AVX/AVX2 instruction set)
    EUROSEC 2013 (Prag)
    In: Proceedings of the Third European Workshop on System Security 2013
    URL: https://www1.cs.fau.de/avx.crypto
  • Hintz N., Benenson Z.:
    Faktoren des datenschutzbewussten Verhaltens in Facebook
    DACH Security 2013 (Nürnberg)
    In: DACH Security 2013 2013
    URL: http://www.syssec.at/ds13_programm/
  • Kurtz A., Freiling F., Metz D.:
    Usability vs. Security: The Everlasting Trade-Off in the Context of Apple iOS Mobile Hotspots
    (2013), p. 10
    ISSN: 2191-5008
    Open Access: http://www.opus.ub.uni-erlangen.de/opus/frontdoor.php?source_opus=4755
    URL: http://www.opus.ub.uni-erlangen.de/opus/frontdoor.php?source_opus=4755
    (Techreport)
  • Kälber S., Dewald A., Freiling F.:
    Forensic Application-Fingerprinting based on file system Metadata
    7th International Conference on IT Security Incident Management & IT Forensics (IMF) (Nuremberg, 12. March 2013 - 14. March 2013)
    In: Proceedings of the 7th International Conference on IT Security Incident Management & IT Forensics 2013
    DOI: 10.1109/IMF.2013.20
  • Maier A., Jiang Z., Jordan JM., Riess C., Hofmann H., Hornegger J.:
    Atlas-Based Linear Volume-of-Interest (ABL-VOI) Image Correction
    Medical Imaging 2013: Physics of Medical Imaging (Lake Buena Vista, FL)
    In: SPIE (ed.): Medical Imaging 2013: Physics of Medical Imaging 2013
    DOI: 10.1117/12.2006843
    URL: http://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2013/Maier13-ALV.pdf
  • Meyer M., Riess C., Angelopoulou E., Evangelopoulos G., Kakadiaris I.:
    Color Constancy in 3D-2D Face Recognition
    Biometric and Surveillance Technology for Human and Activity Identification X (Baltimore, MD, 2. May 2013 - 2. May 2013)
    In: SPIE (ed.): Biometric and Surveillance Technology for Human and Activity Identification 2013
    DOI: 10.1117/12.2018758
    URL: http://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2013/Meyer13-CCI.pdf
  • Morgenstern H., Ehlert R., Freiling F., Frings S., Göbel O., Günther D., Kiltz S., Nedon J., Schadt D. (ed.):
    Seventh International Conference on IT Security Incident Management and IT Forensics
    Los Alamitos, CA: 2013
    ISBN: 978-1-4673-6307-5
  • Müller T., Spath H., Mäckl R., Freiling F.:
    STARK Tamperproof Authentication to Resist Keylogging
    Financial Cryptography and Data Security 2013 (Okinawa, Japan, 1. April 2013 - 5. April 2013)
    In: Proceedings of FC2013 2013
    DOI: 10.1007/978-3-642-39884-1_25
  • Spreitzenbarth M., Freiling F., Echtler F., Schreck T., Hoffmann J.:
    MobileSandbox: Looking Deeper into Android Applications
    ACM Symposium on Applied Computing 2013 (Coimbra, Portugal)
    In: Proceedings of the 28th Symposium On Applied Computing (SAC 2013) 2013
    DOI: 10.1145/2480362.2480701
  • Stüttgen J., Dewald A., Freiling F.:
    Selective Imaging Revisited
    7th International Conference on IT Security Incident Management & IT Forensics (IMF) (Nuremberg, 12. March 2013 - 14. March 2013)
    In: Proceedings of the 7th International Conference on IT Security Incident Management & IT Forensics 2013
    DOI: 10.1109/IMF.2013.16
  • Wundram M., Freiling F., Moch C.:
    Anti-forensics: The Next Step in Digital Forensics Tool Testing
    7th International Conference on IT Security Incident Management & IT Forensics (Nuremberg, 12. March 2013 - 14. March 2013)
    In: Proceedings of the 7th International Conference on IT Security Incident Management & IT Forensics 2013
    DOI: 10.1109/IMF.2013.17

2012

  • Atkinson C., Barth F., Gerbig R., Freiling F., Schinzel S., Hadasch F., Mädche A., Müller B.:
    Reducing the Incidence of Unintended, Human-Caused Information Flows in Enterprise Systems
    EDOC Workshops, 3M4SE (Beijing, China, 10. September 2012 - 14. September 2012)
    In: Third International Workshop on Models and Model-driven Methods for Service Engineering (3M4SE 2012), Bejing, China: 2012
    DOI: 10.1109/EDOCW.2012.12
  • Benenson Z., Hintz N., Kroll-Peters O., Krupp M.:
    Attitudes to IT-Security When Using a Smartphone
    Symposium On Usable Privacy and Security 2012 (Washington, 9. September 2012 - 12. September 2012)
    In: SOUPS 2012
    URL: http://cups.cs.cmu.edu/soups/2012/program.html
  • Benenson Z., Kroll-Peters O., Krupp M.:
    Mentale Modelle der IT-Sicherheit bei der Nutzung mobiler Endgeräte
    Sicherheit 2012: Sicherheit, Schutz und Zuverlässigkeit (Darmstadt)
    In: Sicherheit 2012: Sicherheit, Schutz und Zuverlässigkeit, Bonn: 2012
  • Bäcker M., Dewald A., Freiling F., Schmitt S.:
    Kriterien für die Priorisierung bei der Sicherung und Analyse digitaler Spuren
    In: Datenschutz und Datensicherheit 36 (2012), p. 597-602
    ISSN: 1614-0702
    DOI: 10.1007/s11623-012-0187-2
  • Cortinas R., Freiling F., Ghajar-Azadanlou M., Lafuente A., Larrea M., Draque Penso L., Soraluze I.:
    Secure Failure Detection and Consensus in TrustedPals
    In: IEEE Transactions on Dependable and Secure Computing 9 (2012), p. 608-623
    ISSN: 1545-5971
    DOI: 10.1109/TDSC.2012.23
  • Dewald A., Freiling F.:
    Is Computer Forensics a Forensic Science?
    Current Issues in IT Security 2012 (Freiburg i. Br., Germany)
    In: Jochen Jähnke, Nicolas von zur Mühlen, Klaus Rechert, Dirk von Suchodoletz (ed.): Proceedings of Current Issues in IT Security 2012 2012
    URL: https://www.duncker-humblot.de/buch/current-issues-in-it-security-2012-9783428138876/?page_id=0&typ=buc
  • Dewald A., Freiling F., Schreck T., Spreitzenbarth M., Stüttgen J., Vömel S., Willems C.:
    Analyse und Vergleich von BckR2D2-I und II
    Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) (Darmstadt, Germany)
    In: Neeraj Suri, Michael Waidner (ed.): Sicherheit 2012: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) 2012
  • Freiling F.:
    Was ist eine Quellentelekommunikationsüberwachung?
    In: FIfF-Kommunikation 2012 (2012), p. 16-17
    ISSN: 0938-3476
    URL: https://faui1-files.cs.fau.de/public/publications/fiff-2012-01-qtkue-freiling.pdf
  • Gollmann D., Freiling F. (ed.):
    Information Security
    Berlin: 2012
    (Lecture Notes in Computer Science, Vol. 7483)
    ISBN: 978-3-642-33382-8
    DOI: 10.1007/978-3-642-33383-5
  • Hintz N., Benenson Z., Strufe T.:
    Friendship in German Online Social Networks
    Symposium On Usable Privacy and Security 2012 (Washington)
    In: SOUPS 2012
    URL: http://cups.cs.cmu.edu/soups/2012/
  • Müller T., Taubmann B., Freiling F.:
    TreVisor -- OS-Independent Software-Based Full Disk Encryption Secure Against Main Memory Attacks
    ACNS 2012 (Singapur, 26. June 2012 - 29. June 2012)
    In: International Conference on Applied Cryptography and Network Security 2012
    DOI: 10.1007/978-3-642-31284-7_5
    URL: http://www1.cs.fau.de/trevisor
  • Riess C., Strehl V., Wanka R.:
    The Spectral Relation between the Cube-Connected Cycles and the Shuffle-Exchange Network
    10th Workshop on Parallel Systems and Algorithms (PASA) of the 25th Int. Conf. on Architecture of Computing Systems (ARCS) (München)
    In: GI (ed.): Proc. 10th Workshop on Parallel Systems and Algorithms (PASA) of the 25th Int. Conf. on Architecture of Computing Systems (ARCS) 2012
  • Spreitzenbarth M., Freiling F.:
    Android Malware on the Rise
    (2012)
    ISSN: 2191-5008
    URL: https://opus4.kobv.de/opus4-fau/files/2210/CS_2012_04.pdf
    (Techreport)
  • Spreitzenbarth M., Schmitt S., Freiling F.:
    Comparing Sources of Location Data from Android Smartphones
    8th IFIP WG 11.9 International Conference on Digital Forensics (Pretoria)
    In: 8th Annual IFIP WG 11.9 International Conference on Digital Forensics 2012
    DOI: 10.1007/978-3-642-33962-2_10
  • Spreitzenbarth M., Schmitt S., Freiling F.:
    Comparing Sources of Location Data from Android Smartphones
    In: Peterson, Bert ; Shenoi, Sujeet (ed.): Advances in Digital Forensics VIII, New York: Springer Verlag, 2012, p. 143-157
    ISBN: 9783642339615

    DOI: 10.1007/978-3-642-33962-2_10
  • Vömel S., Freiling F.:
    Correctness, Atomicity, and Integrity: Defining Criteria for Forensically-Sound Memory Acquisition
    In: Digital Investigation 9 (2012), p. 125-137
    ISSN: 1742-2876
    DOI: 10.1016/j.diin.2012.04.005
  • Willems C., Freiling F.:
    Reverse Code Engineering - State of the Art and Countermeasures
    In: it - Information Technology 54 (2012), p. 53-64
    ISSN: 1611-2776
    DOI: 10.1524/itit.2012.0664
  • Zimmermann C., Spreitzenbarth M., Schmitt S., Freiling F.:
    Forensic Analysis of YAFFS2
    GI Sicherheit 2012 (Darmstadt, Germany)
    In: Proceedings of GI Sicherheit 2012 2012
    Open Access: https://dl.gi.de/handle/20.500.12116/18263
    URL: https://dl.gi.de/handle/20.500.12116/18263

2011

  • Brodowski D., Freiling F.:
    Cyberkriminalität, Computerstrafrecht und die digitale Schattenwirtschaft
    Berlin, 2011
    (Schriftenreihe Öffentliche Sicherheit)
    ISBN: 978-3-929619-66-9
    URL: http://www.sicherheit-forschung.de/schriftenreihe/sr_v_v/sr_4.pdf
  • Dewald A., Freiling F.:
    Forensische Informatik
    Norderstedt: Books on Demand, 2011
    ISBN: 978-3-8423-7947-3
    URL: http://www.bod.de/index.php?id=296&objk_id=572434
  • Dewald A., Freiling F., Schreck T., Spreitzenbarth M., Stüttgen J., Vömel S., Willems C.:
    Analyse und Vergleich von BckR2D2-I und II
    CS-2011,8 (2011), p. 12
    Open Access: http://www.opus.ub.uni-erlangen.de/opus/volltexte/2012/3036/
    URL: http://www.opus.ub.uni-erlangen.de/opus/volltexte/2012/3036/
    (Techreport)
  • Dewald A., Freiling F., Weber T.:
    Design and Implementation of a Documentation Tool for interactive Commandline Sessions
    Sixth International Conference on IT Security Incident Management and IT Forensics (Stuttgart)
    DOI: 10.1109/IMF.2011.17
  • Engelberth M., Freiling F., Göbel J., Gorecki C., Holz T., Hund R., Trinius P., Willems C.:
    Das Internet-Malware-Analyse-System (InMAS)
    In: Datenschutz und Datensicherheit 35 (2011), p. 247-252
    ISSN: 1614-0702
  • Freiling F., Kuznetsov P., Guerraoui R.:
    The Failure Detector Abstraction
    In: ACM Computing Surveys 43 (2011), p. 1-9
    ISSN: 0360-0300
    DOI: 10.1145/1883612.1883616
  • Freiling F., Schmitt S., Spreitzenbarth M.:
    Forensic Analysis of Smartphones: The Android Data Extractor Lite (ADEL)
    The 2011 ADFSL Conference on Digital Forensics, Security and Law (Richmond, Virginia)
    In: Conference on Digital Forensics, Security and Law 2011
  • Freiling F., Soraluze I., Larrea M., Lafuente A., Cortinas R.:
    Communication-efficient failure detection and consensus in omission environments
    In: Information Processing Letters 111 (2011), p. 262-268
    ISSN: 0020-0190
    DOI: 10.1016/j.ipl.2010.12.008
  • Gorecki C., Freiling F., Kührer M., Holz T.:
    TrumanBox: Improving Dynamic Malware Analysis by Emulating the Internet
    Stabilization, Safety, and Security of Distributed Systems (Grenoble, 10. October 2011 - 12. October 2011)
    In: Proceedings of the 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems, Berlin: 2011
    DOI: 10.1007/978-3-642-24550-3_17
  • Knaus A., Stüttgen J., Göbel J., Engelberth M., Freiling F.:
    Säuberung eines infizierten Windows-Betriebssystems auf Basis von Malware-Analyse-Berichten
    Informatik 2011 (Berlin)
    In: GI-Edition-Lecture Notes in Informatics 2011
    Open Access: https://dl.gi.de/handle/20.500.12116/18838
    URL: https://dl.gi.de/handle/20.500.12116/18838
  • Müller T., Freiling F., Dewald A.:
    TRESOR Runs Encryption Securely Outside RAM
    20th USENIX Security Symposium (San Francisco, CA)
    In: Proceedings of the 20th USENIX Security Symposium 2011
    Open Access: http://usenix.org/events/sec11/tech/full_papers/Muller.pdf
    URL: http://www1.cs.fau.de/tresor
  • Vömel S., Freiling F.:
    A Survey of Main Memory Acquisition and Analysis Techniques for the Windows Operating System
    In: Digital Investigation 8 (2011), p. 3-22
    ISSN: 1742-2876
    DOI: 10.1016/j.diin.2011.06.002

2010

  • Benenson Z., Freiling F., Bestehorn M., Böhm K., Buchmann E., Jawurek M.:
    Query Dissemination in Sensor Networks - Predicting Reachability and Energy Consumption
    Ad Hoc & Sensor Wireless Networks
    In: Ad Hoc & Sensor Wireless Networks Vol. 9, Philadelphia: 2010
    URL: http://www.ipd.uni-karlsruhe.de/~buchmann/pdfs/bestehorn09qdiss-predicting.pdf
  • Benenson Z., Freiling F., Blaß EO.:
    Attacker models for wireless sensor networks
    In: it - Information Technology (2010), p. 320-324
    ISSN: 1611-2776
    DOI: 10.1524/itit.2010.0609
  • Christlein V., Riess C., Angelopoulou E.:
    On rotation invariance in copy-move forgery detection
    IEEE International Workshop on Information Forensics and Security (Seattle, 12. December 2010 - 15. December 2010)
    In: 2010 IEEE International Workshop on Information Forensics and Security 2010
    DOI: 10.1109/WIFS.2010.5711472
  • Dewald A., Holz T., Freiling F.:
    ADSandbox: Sandboxing JavaScript to fight Malicious Websites
    ACM Symposium on Applied Computing (SAC) (Sierre, Switzerland, 22. March 2010 - 26. March 2010)
    In: Proceedings of the 2010 ACM Symposium on Applied Computing 2010
    DOI: 10.1145/1774088.1774482
    URL: http://doi.acm.org/10.1145/1774088.1774482
  • Freiling F., Schmitt S., Bäcker M.:
    Selektion vor der Sicherung: Methoden zur effizienten forensischen Sicherung von digitalen Speichermedien
    In: Datenschutz und Datensicherheit 2/2010 (2010), p. 80-85
    ISSN: 1614-0702
    DOI: 10.1007/s11623-010-0040-4
  • Müller T., Dewald A., Freiling F.:
    AESSE: A Cold-boot Resistant Implementation of AES
    EUROSEC 2010 (Paris, 13. April 2010 - 13. April 2010)
    In: Proceedings of the Third European Workshop on System Security 2010
    DOI: 10.1145/1752046.1752053
    URL: http://eurosys2010-dev.sigops-france.fr/workshops/EuroSec2010/p42-muller.pdf
  • Vömel S., Holz T., Freiling F.:
    I'd Like to Pay with Your Visa Card : An Illustration of Illicit Online Trading Activity in the Underground Economy
    (2010)
    Open Access: https://ub-madoc.bib.uni-mannheim.de/3048/
    URL: https://ub-madoc.bib.uni-mannheim.de/3048/
    (Techreport)

2009

  • Benenson Z., Dewald A., Freiling F.:
    Presence, Intervention, Insertion: Unifying Attack and Failure Models in Wireless Sensor Networks
    (2009), p. 10
    URL: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.163.3740&rep=rep1&type=pdf
    (Techreport)
  • Benenson Z., Werner F.:
    Formally Verified Authenticated Query Dissemination in Sensor Networks
    International Symposium on Performance Evaluation of Computer and Telecommunication Systems 2009, SPECTS 2009, Part of the 2009 Summer Simulation Multiconference, SummerSim 2009 (Istanbul, 13. July 2009 - 16. July 2009)
    In: IEEE International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS), Istanbul: 2009
  • Böhme R., Freiling F., Gloe T., Kirchner M.:
    Multimedia-Forensik als Teildisziplin der digitalen Forensik
    GI-Workshop Multimedia-Forensik (Lübeck, 28. September 2009 - 2. October 2009)
    In: GI-Workshop Multimedia-Forensik, Lübeck: 2009
    Open Access: https://dl.gi.de/handle/20.500.12116/31114
    URL: https://dl.gi.de/handle/20.500.12116/31114
  • Freiling F.:
    Vom Wert offensiver Methoden. Ein Blick auf IT-Sicherheit aus Angreiferperspektive
    In: Datenschutz und Datensicherheit 33 (2009), p. 214-217
    ISSN: 1614-0702
  • Freiling F.:
    Zur Nutzung von Verkehrsdaten im Rahmen der Vorratsdatenspeicherung
    (2009)
    Open Access: https://madoc.bib.uni-mannheim.de/2360/
    URL: https://madoc.bib.uni-mannheim.de/2360/
    (Techreport)
  • Freiling F., Böhme R., Gloe T., Kirchner M.:
    Multimedia Forensics is not Computer Forensics
    Proceedings of the 3rd International Workshop on Computational Forensics (The Hague, 13. August 2009 - 14. August 2009)
    In: Proceedings of the 3rd International Workshop on Computational Forensics, The Hague, Netherlands: 2009
    DOI: 10.1007/978-3-642-03521-0_9
  • Freiling F., Delporte-Gallet C., Fauconnier H., Tielmann A., Kilic M.:
    Message-efficient omission-tolerant consensus with limited synchrony
    Proc. 14th IEEE Workshop on Dependable Parallel, Distributed and Network-Centric Systems (Rome, 23. May 2009 - 29. May 2009)
    In: Proc. 14th IEEE Workshop on Dependable Parallel, Distributed and Network-Centric Systems, Rome, Italy: 2009
    DOI: 10.1109/IPDPS.2009.5160899
  • Freiling F., Heinson D.:
    Probleme des Verkehrsdatenbegriffs im Rahmen der Vorratsdatenspeicherung
    In: Datenschutz und Datensicherheit 33 (2009), p. 547-552
    ISSN: 1614-0702
    DOI: 10.1007/s11623-009-0141-0
  • Freiling F., Holz T., Engelberth M.:
    Learning More About the Underground Economy: A Case-Study of Keyloggers and Dropzones
    14th European Symposium on Research in Computer Security (Saint-Malo, France, 21. September 2009 - 23. September 2009)
    In: 14th European Symposium on Research in Computer Security 2009
    DOI: 10.1007/978-3-642-04444-1_1
    URL: http://pi1.informatik.uni-mannheim.de/filepool/publications/UE-dropzones-esorics09.pdf
  • Freiling F., Lambertz C., Majster-Cederbaum M.:
    Modular Consensus Algorithms for the Crash-Recovery Model
    International Workshop on Reliability, Availability, and Security (Hiroshima, Japan, 8. December 2009 - 11. December 2009)
    In: International Conference on Parallel and Distributed Computing, Applications and Technologies 2009
    DOI: 10.1109/PDCAT.2009.50
  • Hund R., Holz T., Freiling F.:
    Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms
    18th USENIX Security Symposium (Montreal, Canada)
    In: 18th USENIX Security Symposium 2009
    Open Access: http://www.usenix.org/events/sec09/tech/full_papers/hund.pdf
  • Krontiris I., Benenson Z., Freiling F., Thanassis G., Dimitriou T.:
    Cooperative Intrusion Detection in Wireless Sensor Networks
    6th European Conference on Wireless Sensor Networks (Cork, Ireland, 11. February 2009 - 13. February 2009)
    In: Proceedings of the 6th European Conference on Wireless Sensor Networks, Berlin, Heidelberg: 2009
    DOI: 10.1007/978-3-642-00224-3_17
  • Mink M., Freiling F., Liegl M.:
    Datenschutz in digital-forensischen Lehrveranstaltungen
    In: Datenschutz und Datensicherheit 33 (2009), p. 222–227
    ISSN: 1614-0702
    DOI: 10.1007/s11623-009-0055-x
  • Mittal N., Phaneesh KL., Freiling F.:
    Safe termination detection in an asynchronous distributed system when processes may crash and recover
    In: Theoretical Computer Science 410 (2009), p. 614-628
    ISSN: 0304-3975
    DOI: 10.1016/j.tcs.2008.10.011
  • Moch C., Freiling F.:
    The Forensic Image Generator Generator
    Proceedings of the Fifth International Conference on Incident Management and Forensics (Stuttgart, Germany)
    In: Proceedings of the Fifth International Conference on Incident Management and Forensics, Stuttgart, Germany: 2009
    DOI: 10.1109/IMF.2009.8
  • Riess C., Jordan JM., Angelopoulou E.:
    A Common Framework for Ambient Illumination in the Dichromatic Reflectance Model
    2009 IEEE 12th International Conference on Computer Vision Workshops, ICCV Workshops 2009 (Kyoto, 4. October 2009 - 4. October 2009)
    In: IEEE (ed.): IEEE 12th International Conference on Computer Vision Workshops 2009
    DOI: 10.1109/ICCVW.2009.5457519
    URL: http://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2009/Riess09-ACF.pdf
  • Trinius P., Holz T., Göbel J., Freiling F.:
    Visual Analysis of Malware Behavior (Short paper)
    6th International Workshop on Visualization for Cyber Security
    In: 6th International Workshop on Visualization for Cyber Security, Atlantic City, NJ, USA: 2009
  • Wilke J., Blaß EO., Freiling F., Zitterbart M.:
    A framework for probabilistic, authentic aggregation in wireless sensor networks
    In: Praxis der Informationsverarbeitung und Kommunikation 32 (2009), p. 116-126
    ISSN: 1865-8342
  • Wilke J., Zitterbart M., Benenson Z., Freiling F.:
    Authentic Query Dissemination and Data Aggregation in Wireless Sensor Networks
    In: Networked Sensing Systems (INSS), Demo Session, Pittsburgh, PA: 2009

2008

  • Benenson Z.:
    Access control in wireless sensor networks (Dissertation, 2008)
  • Benenson Z., Bestehorn M., Buchmann E., Freiling F., Jawurek M.:
    Query Dissemination with Predictable Reachability and Energy Usage in Sensor Networks
    7th International Conference on Ad-hoc, Mobile and Wireless Networks, ADHOC-NOW 2008 (Sophia-Antipolis, 10. September 2008 - 12. September 2008)
    In: Ad-hoc, Mobile and Wireless Networks, 7th International Conference (ADHOC-NOW), Sophia-Antipolis, France: 2008
    DOI: 10.1007/978-3-540-85209-4_22
  • Benenson Z., Cholewinski PM., Freiling F.:
    Vulnerabilities and attacks in wireless sensor networks
    In: Wireless Sensors Networks Security, Amsterdam: IOS Press, 2008, p. 22-43 (Cryptology & Information Security Series (CIS))
  • Eusgeld I., Freiling F., Reussner R. (ed.):
    Dependability Metrics: Advanced Lectures [result from a Dagstuhl seminar, October 30 - November 1, 2005]
    Berlin: 2008
    (Lecture Notes in Computer Science, Vol. 4909)
    ISBN: 978-3-540-68946-1
  • Eusgeld I., Freiling F., Reussner R. (ed.):
    Dependability Metrics
    2008
    (Lecture Notes in Computer Science)
    ISBN: 978-3-540-68946-1
    DOI: 10.1007/978-3-540-68947-8
    (Techreport)

2007

  • Benenson Z.:
    Lower Bounds
    In: Algorithms for Sensor and Ad Hoc Networks, Advanced Lectures, Heidelberg: Springer-verlag, 2007, p. 117-130 (LNCS 4621)
    ISBN: 9783540749905
  • Benenson Z., Cholewinski PM., Freiling F.:
    Advanced Evasive Data Storage in Sensor Networks
    8th International Conference on Mobile Data Management, MDM 2007 (Mannheim, 7. May 2007 - 11. May 2007)
    In: MDM (8th International Conference on Mobile Data Management), Mannheim: 2007
    DOI: 10.1109/MDM.2007.29
  • Brust MR., Andronache A., Rothkugel S., Benenson Z.:
    Topology-based Clusterhead Candidate Selection in Wireless Ad-hoc and Sensor Networks
    2007 2nd International Conference on Communication System Software and Middleware and Workshops, COMSWARE 2007 (Bangalore, 7. January 2007 - 12. January 2007)
    In: COMSWARE (Second International Conference on COMmunication System softWAre and MiddlewaRE), Bangalore, India: 2007
    DOI: 10.1109/COMSWA.2007.382475
  • Danner D., Kaufhold C., Kranz P., Müller R., Pfaller S., Riess C., Angelopoulou E.:
    FAUBOT: Purposeful Navigation of a Robot in a Simulated Environment
    CiberMouse Contest at IEEE Real-Time Systems Symposium (Tucson, AZ, 3. December 2007 - 6. December 2007)
    In: 28th IEEE International Real-Time Systems Symposium (RTSS 2007) 2007
    (anderer)
  • Riess C., Wanka R.:
    Periodic Load Balancing on the N-Cycle: Analytical and Experimental Evaluation
    13th International Euro-Par Conference (Rennes, 28. August 2007 - 31. August 2007)
    In: Proceedings of the 13th International Euro-Par Conference 2007
    DOI: 10.1007/978-3-540-74466-5_86

2006

  • Achtzehn A., Benenson Z., Rohner C.:
    Implementing Agreement Protocols in Sensor Networks
    In: MASS Workshops (3rd International Conference on Mobile Adhoc and Sensor Systems, Vancouver, Canada: 2006
  • Becher A., Benenson Z., Dornseif M.:
    Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks
    3rd International Conference on Security in Pervasive Computing, SPC 2006 (York, 18. April 2006 - 21. April 2006)
    In: Security in Pervasive Computing (SPC), Third International Conference, York, UK: 2006
    DOI: 10.1007/11734666_9
  • Benenson Z., Freiling F., Hammerschmidt E., Lucks S., Pimenidis L.:
    Authenticated Query Flooding in Sensor Networks
    In: IFIP SEC, Karlstad, Sweden: 2006
    DOI: 10.1007/0-387-33406-8_4
  • Benenson Z., Freiling F., Holz T., Kesdogan D., Draque Penso L.:
    Safety, Liveness, and Information Flow: Dependability Revisited
    In: ARCS Workshops (19th International Conference on Architecture of Computing Systems), Frankfurt am Main: 2006
  • Benenson Z., Freiling F., Pfitzmann B., Rohner C., Waidner M.:
    Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks
    3rd European Workshop on Security and Privacy in Ad Hoc and Sensor Networks, ESAS 2006 (Hamburg, 20. September 2006 - 21. September 2006)
    In: ESAS (Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop), Hamburg: 2006
    DOI: 10.1007/11964254_15
  • Fort M., Freiling F., Draque Penso L., Benenson Z., Kesdogan D.:
    TrustedPals: Secure Multiparty Computation Implemented with Smart Cards
    11th European Symposium on Research in Computer Security, ESORICS 2006 (Hamburg, 18. September 2006 - 20. September 2006)
    In: Computer Security - {ESORICS} 2006, 11th European Symposium on Research in Computer Security, Hamburg: 2006

2005

  • Benenson Z.:
    Authenticated Queries in Sensor Networks
    Second European Workshop on Security and Privacy in Ad-hoc and Sensor Networks, ESAS 2005 (Visegrad, 13. July 2005 - 14. July 2005)
    In: 2nd European Workshop on Security and Privacy in Ad-hoc and Sensor Networks (ESAS), Visegrad, Hungary: 2005
    DOI: 10.1007/11601494_5
  • Benenson Z., Cholewinski PM., Freiling F.:
    Simple Evasive Data Storage in Sensor Networks
    In: International Conference on Parallel and Distributed Computing Systems, PDCS, Phoenix, AZ, USA: 2005
  • Benenson Z., Freiling F., Kesdogan D.:
    An algorithmic framework for robust access control in wireless sensor networks
    2nd European Workshop onWireless Sensor Networks, EWSN 2005 (Istanbul, 31. January 2005 - 2. February 2005)
    In: EWSN 2005, Istanbul: 2005
    DOI: 10.1109/EWSN.2005.1462007
  • Benenson Z., Gedicke N., Raivio O.:
    Realizing Robust User Authentication in Sensor Networks
    In: REALWSN, Stockholm: 2005
  • Benenson Z., Gärtner FC., Kesdogan D.:
    Secure Multi-Party Computation with Security Modules
    SICHERHEIT 2005 - Sicherheit - Schutz und Zuverlassigkeit, Beitrage der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft fur Informatik e.V. (GI)- 2nd Annual Meeting of the Department of Security of the Society for Informatics - Security (Regensburg, 5. April 2005 - 8. April 2005)
    In: Sicherheit 2005, Regensburg: 2005
  • Benenson Z., Kühn U., Lucks S.:
    Cryptographic Attack Metrics
    In: Dependability Metrics, LNCS: Springer, 2005, p. 133-156
    ISBN: 978-3-540-68946-1

2004

  • Benenson Z., Gärtner FC., Kesdogan D.:
    User Authentication in Sensor Networks
    In: INFORMATIK 2004 - Informatik verbindet, Ulm: 2004
Lehrstuhl für Informatik 1
Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU)

Martensstrasse 3
91058 Erlangen
  • Impressum
  • Datenschutz
  • Barrierefreiheit
  • Facebook
  • RSS Feed
  • Twitter
  • Xing
Up