Publications 
                                        					   	
                                                 
                   
                        2025 Abdullah L. Freiling F. Schröder D. :Increasing the Resilience of Secure Multiparty Computation Using Security Modules IEEE Transactions on Dependable and Secure Computing 2025 )ISSN: 1545-5971 10.1109/TDSC.2025.3552670 Aksoy A. , Kesdogan D. :Enhancing Noise Estimation for Statistical Disclosure Attacks Using the Artificial Bee Colony Algorithm 29th Nordic Conference on Secure IT Systems, NordSec 2024  (Karlstad 6. November 2024  - 7. November 2024 )In: Leonardo Horn Iwaya, Liina Kamm, Leonardo Martucci, Tobias Pulls (ed.):  Secure IT Systems. 29th Nordic Conference, NordSec 2024 Karlstad, Sweden, November 6–7, 2024 Proceedings , Cham 2025  10.1007/978-3-031-79007-2_23 Lindenmeier C. Gebhard S. , Röckl J. Freiling F. CCKex: High Bandwidth Covert Channels over Encrypted Network Traffic 29th Nordic Conference (NordSec 2024)  (Karlstad 6. November 2024  - 7. November 2024 )In: Secure IT Systems , Cham 2025  10.1007/978-3-031-79007-2_20 Moussa D. Hirsch G. , Rieß C. :EnvId: A Metric Learning Approach for Forensic Few-Shot Identification of Unseen Environments IEEE Transactions on Information Forensics and Security 20 2025 ), p. 2281-2296 ISSN: 1556-6013 10.1109/TIFS.2025.3541534 https://arxiv.org/pdf/2405.02119 Pohl N. , Voigt L. Hargreaves CJ. , Fein C. , Freiling F. DiskForge: Timestomping on Disk Images for Educational Benefit Digital Threats: Research and Practice 2025 ), Article No.: 3748265 ISSN: 2576-5337 10.1145/3748265 Rohleder M. , Yao M. , Fan F. , Bayer S. , Maier A. , Kreher B. , Wang B. :Experimental Evaluation of Metal Artifact Avoidance and Reduction for Anterior Cervical Discectomy and Fusion Surgery Medical Imaging 2025: Physics of Medical Imaging  (San Diego, CA, USA 17. February 2025  - 21. February 2025 )In: John M. Sabol, Ke Li, Shiva Abbaszadeh (ed.):  Progress in Biomedical Optics and Imaging - Proceedings of SPIE  2025  10.1117/12.3046299 Rzepka L. , Ottmann J. Stoykova R. , Freiling F. Baier H. :A scenario-based quality assessment of memory acquisition tools and its investigative implications Forensic Science International: Digital Investigation 52 2025 ), Article No.: 301868 ISSN: 2666-2817 10.1016/j.fsidi.2025.301868 Röckl J. Schulze SM. , Funk J. Bernsdorf N. , Müller T. Safeguarding Data from Deprecated System Software: A Resilient Boot Architecture for Edge Devices Leveraging TEEs 9th International Conference, ICISSP 2023  (Lissabon 22. February 2023  - 24. February 2023 )10.1007/978-3-031-89518-0_4 Schneider J. Fukami A. , Lautner I. Eichhorn M. Moussa D. Wolf J. , Scheler N. , Deuber D. , Freiling F. Haasnoot J. , Henseler H. , Malik S. , Morgenstern H. , Westman M. :Poor Sanitization Practices and Questionable Digital Evidence: a Comprehensive Study of Scope and Impact of Recycled NAND Flash Chips IEEE Transactions on Dependable and Secure Computing 2025 )ISSN: 1545-5971 10.1109/TDSC.2025.3579237 Uhlenbrock L. Bergmann S. Riess C. Latent Landscapes: Topology of the CLIP Feature Space for Synthetic Image Detection European Signal Processing Conference (EUSIPCO)  (Isola Delle Femmine, Sizilien 8. September 2025  - 12. September 2025 )Voigt L. Freiling F. Hargreaves CJ. :A metrics-based look at disk images: Insights and applications Forensic Science International: Digital Investigation 52 2025 ), p. 301874 ISSN: 2666-2817 10.1016/j.fsidi.2025.301874 Wunder J. Wash R. , Renaud K. , Oliveira DA. , Benenson Z. Achieving Resilience: Data Loss and Recovery on Devices for Personal Use in Three Countries 2025 CHI Conference on Human Factors in Computing Systems, CHI 2025  (Yokohama, JPN 26. April 2025  - 1. May 2025 )In: Conference on Human Factors in Computing Systems - Proceedings  2025  10.1145/3706598.3714202 2024 Aksoy A. , Kesdogan D. :Enhanced Closed-Loop Control Anonymity Protection Model with Inactive Period Feedback 17th International Conference on Information Security and Cryptology, ISCTurkiye 2024  (Ankara 16. October 2024  - 17. October 2024 )In: Ali Aydin Selcuk, Seref Sagiroglu, Oguz Yayla, Cihangir Tezcan (ed.):  2024 17th International Conference on Information Security and Cryptology (ISCTürkiye)  2024  10.1109/ISCTrkiye64784.2024.10779244 Aksoy A. , Kesdoǧan D. :Detecting Corruptive Noise Rounds for Statistical Disclosure Attacks 9th International Conference on Computer Science and Engineering, UBMK 2024  (Antalya 26. October 2024  - 28. October 2024 )In: Esref Adali (ed.):  2024 9th International Conference on Computer Science and Engineering (UBMK)  2024  10.1109/UBMK63289.2024.10773533 Bergmann S. Moussa D. Brand F. , Kaup A. , Rieß C. :Forensic analysis of AI-compression traces in spatial and frequency domain Pattern Recognition Letters 2024 )ISSN: 0167-8655 https://www.sciencedirect.com/science/article/pii/S0167865524000503 https://www.sciencedirect.com/science/article/pii/S0167865524000503 Bove D. A Large-Scale Study on the Prevalence and Usage of TEE-based Features on Android ARES '24  (Vienna 30. July 2024  - 2. August 2024 )In: Proceedings of the 19th International Conference on Availability, Reliability and Security , New York 2024  10.1145/3664476.3664486 Bove D. Trust In Your Pockets: On the Security of Mobile Devices through Trusted Computing 2024 )10.25593/open-fau-510 Crasselt J. , Pugliese G. Started Off Local, Now We’re in the Cloud: Forensic Examination of the Amazon Echo Show 15 Smart Display Digital Forensics Research Conference USA (DFRWS USA 2024)  (Baton Rouge, Louisiana 9. July 2024  - 12. July 2024 )10.48550/arXiv.2408.15768 https://dfrws.org/wp-content/uploads/2024/07/dfrws-usa-2024-echo-show-15.pdf Dreier LM. , Vanini C. , Hargreaves CJ. , Breitinger F. , Freiling F. Beyond timestamps: Integrating implicit timing information into digital forensic timelines Forensic Science International: Digital Investigation 49 2024 ), Article No.: 301755 ISSN: 2666-2817 10.1016/j.fsidi.2024.301755 https://www.sciencedirect.com/science/article/pii/S266628172400074X Ebbers S. Gense S. , Bakkouch M. , Freiling F. Schinzel S. :Grand theft API: A forensic analysis of vehicle cloud data Forensic Science International: Digital Investigation 48 2024 ), Article No.: 301691 ISSN: 2666-2817 10.1016/j.fsidi.2023.301691 Eckhardt D. , Freiling F. Herrmann D. , Katzenbeisser S. , Pöhls HC. :Sicherheit in der Digitalisierung des Alltags: Definition eines ethnografisch-informatischen Forschungsfeldes für die Lösung alltäglicher Sicherheitsprobleme Sicherheit 2024  (Worms 9. April 2024  - 11. April 2024 )In: Sicherheit 2024. Sicherheit, Schutz und Zuverlässigkeit , Bonn 2024  10.18420/sicherheit2024_007 https://dl.gi.de/server/api/core/bitstreams/e21ba581-6eda-40c0-9947-16c384430892/content Eichhorn M. Pugliese G. Do You “Relay” Want to Give Me Away? – Forensic Cues of Smart Relays and Their IoT Companion Apps Forensic Science International: Digital Investigation 50 2024 ), p. 1-10 ISSN: 2666-2817 10.1016/j.fsidi.2024.301810 https://www.sciencedirect.com/science/article/pii/S2666281724001343 Eichhorn M. Schneider J. Pugliese G. Well Played, Suspect! – Forensic Examination of the Handheld Gaming Console “Steam Deck” DFRWS EU 2024  (Zaragoza 19. March 2024  - 22. March 2024 )10.1016/j.fsidi.2023.301688 https://www.sciencedirect.com/science/article/pii/S266628172300207X Eichler C. , Röckl J. Jung B. , Schlenk R. , Müller T. Hönig T. :Profiling with trust: system monitoring from trusted execution environments Design Automation For Embedded Systems 2024 )ISSN: 0929-5585 10.1007/s10617-024-09283-1 Gruber J. Freiling F. The Cyber-traceological Model: A Model-based View of the Cybercriminalistic Task Digital Forensics Research Conference APAC (DFRWS APAC 2024)  (Brisbane 22. October 2024  - 24. October 2024 )In: Raymond Chan and Mariya Shafat and Leslie Sikos (ed.):  Proceedings of the Digital Forensics Research Conference Asia Pacific (DFRWS APAC)  2024  https://dfrws.org/wp-content/uploads/2024/10/the-cyber-traceological-model-a-model-based-view-of-the-cybercriminalistic-task.pdf Hammer A. Cerny C. , Jung C. , Eichenmüller C. Freiling F. Increasing Street Credibility: Cartography-aware Forensic Analysis of GNSS Trace Validity 13th International Conference on IT Security Incident Management & IT Forensics In: Proceedings of the 13th International Conference on IT Security Incident Management & IT Forensics  2024  10.1145/3688809 Hammer A. Geus J. Nicolai F. , Schütz P. , Fein C. , Freiling F. Fit for Forensics: Taxonomy and Common Model for Forensic Analysis of Fitness Trackers 13th International Conference on IT Security Incident Management & IT Forensics In: Proceedings of the 13th International Conference on IT Security Incident Management & IT Forensics  2024  10.1145/3687271 Hoffmann J. , Haupert V. Exklusivität der Apple Wallet: Missbrauch oder Sicherheitsgewinn? Recht der Zahlungsdienste 2024 ), p. 36-43 ISSN: 2699-1969 https://www.ruw.de/suche/rdz/Exklusivit-der-App-Wal-Missbra-ode-Sicherheitsgew-930b939342f4893c0d8cdc9ffdbe02e8 Lindenmeier C. Gruber J. Freiling F. InvesTEE: A TEE-supported Framework for Lawful Remote Forensic Investigations Digital Threats: Research and Practice 2024 )ISSN: 2576-5337 10.1145/3680294 Lindenmeier C. Hammer A. Gruber J. Röckl J. Freiling F. Key extraction-based lawful access to encrypted data: Taxonomy and survey Forensic Science International: Digital Investigation 50 2024 ), Article No.: 301796 ISSN: 2666-2817 10.1016/j.fsidi.2024.301796 Lindenmeier C. Payer M. , Busch M. EL3XIR: Fuzzing COTS Secure Monitors 33rd USENIX Security Symposium  (Philadelphia 14. August 2024  - 16. August 2024 )In: Balzarotti D, Xu W (ed.):  Proceedings of the 33rd USENIX Security Symposium  2024  https://www.usenix.org/conference/usenixsecurity24/presentation/lindenmeier https://www.usenix.org/conference/usenixsecurity24/presentation/lindenmeier Lindenmeier C. Schulze SM. , Röckl J. Busch M. SyncEmu: Enabling Dynamic Analysis of Stateful Trusted Applications 9th IEEE European Symposium on Security and Privacy Workshops - EUROS&PW 2024  (Vienna 8. July 2024  - 12. July 2024 )In: 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)  2024  10.1109/EuroSPW61312.2024.00024 Mader B. Eichenmüller C. Pugliese G. Eckhardt D. , Benenson Z. I Blame Apple in Part for My False Expectations: An Autoethnographic Study of Apple’s Lockdown Mode in iOS 2024 )10.48550/arXiv.2411.13249 https://arxiv.org/abs/2411.13249 Maier A. Rieß C. :Reliable Out-of-Distribution Recognition of Synthetic Images Journal of Imaging 10 2024 )ISSN: 2313-433X 10.3390/jimaging10050110 Moussa D. Bergmann S. Rieß C. :Unmasking Neural Codecs: Forensic Identification of AI-compressed Speech Interspeech 2024  (Kos 1. September 2024  - 5. September 2024 )In: ISCA (ed.):  Proc. Interspeech 2024  2024  10.21437/Interspeech.2024-1652 https://www.isca-archive.org/interspeech_2024/moussa24_interspeech.html# Moussa D. Huber L. , Hirsch G. , Rieß C. :Now ForReal: Towards Practical Forensic Room Identification with Real-World Audio Data 16th IEEE International Workshop on Information Forensics and Security, WIFS 2024  (Rome 2. December 2024  - 5. December 2024 )In: Proceedings - 16th IEEE International Workshop on Information Forensics and Security, WIFS 2024  2024  10.1109/WIFS61860.2024.10810676 https://faui1-files.cs.fau.de/public/publications/mmsec/2024-Moussa-WIFS.pdf Palutke R. Ruderich S. , Wild M. , Hacker J. , Konrad J. , Freiling F. HyperLeech: Stealthy System Analysis with Minimal Target Impact through DMA-Based Hypervisor Injection 2024 )https://open.fau.de/handle/openfau/30871 Rieß C. :Dreams and Drama of Applied Image Forensics 12th ACM Information Hiding and Multimedia Security Workshop, IH and MMSec 2024  (Baiona, ESP 24. June 2024  - 26. June 2024 )In: IH MMSec 2024 - Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security  2024  10.1145/3658664.3663549 Rodriguez Salas D. Rieß C. , Martín Vicario C. , Taubmann O. , Ditt H. , Schwab S. , Dörfler A. :Analysing Variables for 90-Day Functional-Outcome Prediction of Endovascular Thrombectomy 28th Annual Conference on Medical Image Understanding and Analysis  (Manchester 24. July 2024  - 26. September 2024 )In: Moi Hoon Yap, Connah Kendrick, Ardhendu Behera, Timothy Cootes, Reyer Zwiggelaar (ed.):  Medical Image Understanding and Analysis. 28th Annual Conference, MIUA 2024, Manchester, UK, July 24–26, 2024, Proceedings, Part II , Cham 2024  10.1007/978-3-031-66958-3_15 Rzepka L. , Ottmann J. Freiling F. Baier H. :Causal Inconsistencies Are Normal in Windows Memory Dumps (Too) Digital Threats: Research and Practice 5 2024 ), Article No.: 3680293 ISSN: 2576-5337 10.1145/3680293 Röckl J. Bernsdorf N. , Müller T. TeeFilter: High-Assurance Network Filtering Engine for High-End IoT and Edge Devices based on TEEs ACM AsiaCCS 2024: 19th ACM Asia Conference on Computer and Communications Security  (Singapore 1. July 2024  - 5. July 2024 )In: Proceedings of the 19th ACM Asia Conference on Computer and Communications Security , New York, NY 2024  10.1145/3634737.3637643 Röckl J. Lindenmeier C. Schulze SM. , Müller T. Conditional Network Availability: Enhancing Connectivity Guarantees for TEE-Based Services 9th IEEE European Symposium on Security and Privacy Workshops - EUROS&PW 2024  (Vienna 8. July 2024  - 12. July 2024 )In: 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)  2024  10.1109/EuroSPW61312.2024.00030 Savchenko E. Ottmann J. Freiling F. In the time loop: Data remanence in main memory of virtual machines Forensic Science International: Digital Investigation 49 2024 ), Article No.: 301758 ISSN: 2666-2817 10.1016/j.fsidi.2024.301758 Schiller K. Adamsky F. , Eichenmüller C. Reimert M. , Benenson Z. Employees’ Attitudes towards Phishing Simulations: “It’s like when a child reaches onto the hot hob” 31st ACM SIGSAC Conference on Computer and Communications Security, CCS 2024  (Salt Lake City, UT 14. October 2024  - 18. October 2024 )In: CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security  2024  10.1145/3658644.3690212 Schneider J. Eichhorn M. Dreier LM. , Hargreaves CJ. :Applying digital stratigraphy to the problem of recycled storage media DFRWS USA 2024  (Baton Rouge 9. July 2024  - 12. July 2024 )In: Elsevier (ed.):  Forensic Science International: Digital Investigation  2024  10.1016/j.fsidi.2024.301761 https://www.sciencedirect.com/science/article/pii/S2666281724000805 Schulze SM. , Lindenmeier C. Röckl J. BarriCCAde: Isolating Closed-Source Drivers with ARM CCA 9th IEEE European Symposium on Security and Privacy Workshops - EUROS&PW 2024  (Vienna 8. July 2024  - 12. July 2024 )In: 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)  2024  10.1109/EuroSPW61312.2024.00033 Schulze SM. , Lindenmeier C. Röckl J. Freiling F. IlluminaTEE: Effective Man-At-The-End Attacks from within ARM TrustZone CheckMATE '24  (Salt Lake City, UT 14. October 2024  - 18. October 2024 )In: Schrittwieser S, Ianni M (ed.):  CheckMATE '24: Proceedings of the 2024 Workshop on Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks  2024  10.1145/3689934.3690838 Stachak M. , Geus J. Pugliese G. Freiling F. Nyon Unchained: Forensic Analysis of Bosch’s eBike Board Computers Digital Forensics Research Conference Europe (DFRWS EU)  (Zaragoza 19. March 2024  - 22. March 2024 )In: Digital Forensics Research Conference Europe (DFRWS EU)  2024  https://dfrws.org/wp-content/uploads/2024/03/Nyon-Unchained-Forensic-Analysis-of-Boschs-eBike-Board-Computer_2024.pdf Uhlenbrock L. Cozzolino D. , Moussa D. Verdoliva L. , Riess C. Did You Note My Palette? Unveiling Synthetic Images Through Color Statistics ACM Workshop on Information Hiding and Multimedia Security  (Baiona 24. June 2024  - 26. June 2024 )In: Association for Computing Machinery (ed.):  Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security  2024  10.1145/3658664.3659652 Uhlenbrock L. Moussa D. Simmler M. , Canova G. , Riess C. Synthetische Bilddaten vor Gericht Datenschutz und Datensicherheit 2024 )ISSN: 1614-0702 Voigt L. Freiling F. Hargreaves CJ. :Re-imagen: Generating coherent background activity in synthetic scenario-based forensic datasets using large language models Forensic Science International: Digital Investigation 50 2024 ), p. 301805 ISSN: 2666-2817 10.1016/j.fsidi.2024.301805 Weinberger L. Eichenmüller C. Gassmann F. , Pugliese G. Benenson Z. Used, Avoided, Restricted? Perceptions, Behavior, and Changes in Video Conferencing of German-speaking Users During and After the Pandemic European Symposium on Usable Security (EuroUSEC 2024)  (Karlstad 30. September 2024  - 1. October 2024 )In: Proceedings of the 2024 European Symposium on Usable Security , New York, NY, USA 2024  10.1145/3688459.3688478 Wunder J. Aurich J. , Benenson Z. From Chaos to Consistency: The Role of CSAF in Streamlining Security Advisories The 2024 European Symposium on Usable Security  (Karlstad University 30. September 2024  - 1. October 2024 )10.1145/3688459.3688463 Wunder J. Corona A. , Hammer A. Benenson Z. On NVD Users’ Attitudes, Experiences, Hopes and Hurdles Digital Threats: Research and Practice 2024 )ISSN: 2576-5337 10.1145/3688806 Wunder J. Kurtz A. Eichenmüller C. Gassmann F. , Benenson Z. Shedding Light on CVSS Scoring Inconsistencies: A User-Centric Study on Evaluating Widespread Security Vulnerabilities 45th IEEE Symposium on Security and Privacy, SP 2024  (San Francisco, CA 20. May 2024  - 23. May 2024 )In: 2024 IEEE Symposium on Security and Privacy (SP) , New York City 2024  10.1109/SP54263.2024.00058 2023 Aksoy A. , Kesdogan D. :Effect of Group Based Synchronization on User Anonymity in Mix Networks 18th International Conference on Availability, Reliability and Security, ARES 2023  (Benevento, ITA 29. August 2023  - 1. September 2023 )In: ACM International Conference Proceeding Series  2023  10.1145/3600160.3604998 Bajramovic E. Fein C. , Frinken M. , Rösler P. , Freiling F. LAVA: Log Authentication and Verification Algorithm 12th International Conference on IT Security Incident Management & IT Forensics (IMF 2023)  (Munich, Germany 23. May 2023  - 24. May 2023 )10.1145/3609233 Bergmann S. Moussa D. Brand F. , Kaup A. , Rieß C. :Frequency-Domain Analysis of Traces for the Detection of AI-based Compression International Workshop on Biometrics and Forensics 2023  (Barcelona 19. April 2023  - 20. April 2023 )In: IEEE (ed.):  2023 International Workshop on Biometrics and Forensics (IWBF)  2023  10.1109/iwbf57495.2023.10157489 https://faui1-files.cs.fau.de/public/publications/mmsec/2023-Bergmann-IWBF.pdf Block F. Windows memory forensics: Identification of (malicious) modifications in memory-mapped image files Forensic Science International: Digital Investigation 45 2023 ), Article No.: 301561 ISSN: 2666-2817 10.1016/j.fsidi.2023.301561 Bove D. Funk J. Basic Secure Services for Standard RISC-V Architectures Computers & Security 133 2023 ), Article No.: 103415 ISSN: 0167-4048 10.1016/j.cose.2023.103415 https://authors.elsevier.com/a/1hZ8Rc43v0a1t Bumiller F. Eichenmüller C. Benenson Z. "You're not smart enough for it. You can't do it anyway." - Experiences and Coping Strategies of Female System Administrators 2023 CHI Conference on Human Factors in Computing Systems, CHI 2023  (Hamburg, DEU 23. April 2023  - 28. April 2023 )In: Conference on Human Factors in Computing Systems - Proceedings  2023  10.1145/3544549.3585648 Dewald A. Freiling F. Groß T. Kniel D. , Michael R. , Rieck K. :Möglichkeiten und Grenzen KI-gestützter Analyse digitaler Spuren 2023 ), p. 43-46 Eckhardt D. , Freiling F. Herrmann D. , Katzenbeisser S. , Pöhls HC. :Sicherheit in der Digitalisierung des Alltags: Definition eines ethnografisch-informatischen Forschungsfeldes für die Lösung alltäglicher Sicherheitsprobleme 2023 )10.15475/sidial.2023 https://opus4.kobv.de/opus4-uni-passau/frontdoor/index/index/docId/1372 Freiling F. Zum Umgang mit Erkenntnissen der IT-Sicherheitsforschung In: Sebastian Golla, Dominik Brodowski (ed.):  IT-Sicherheitsforschung und IT-Strafrecht Tübingen Mohr Siebeck 2023 , p. 21-33 ISBN: 978-3-16-162179-6  10.1628/978-3-16-162184-0 Geus J. Ottmann J. Freiling F. Systematic Evaluation of Forensic Data Acquisition using Smartphone Local Backup Digital Forensics Research Conference USA (DFRWS USA) 2023  (Baltimore, MD 9. July 2023  - 12. July 2023 )In: Proceedings of the Digital Forensics Research Conference USA (DFRWS USA) 2023  2023  Gruber J. Identifizierung von Malware-Infrastruktur mittels verteilter Spamtrap-Systeme Sicherheit in vernetzten Systemen: 30. DFN-Konferenz  (Hamburg 8. February 2023  - 10. February 2023 )In: Albrecht Ude (ed.):  Sicherheit in vernetzten Systemen: 30. DFN-Konferenz  2023  Gruber J. Hargreaves CJ. , Freiling F. Contamination of digital evidence: Understanding an underexposed risk Forensic Science International: Digital Investigation 44 2023 ), Article No.: 301501 ISSN: 2666-2817 10.1016/j.fsidi.2023.301501 Gruber J. Humml M. :A Formal Treatment of Expressiveness and Relevance of Digital Evidence Digital Threats: Research and Practice 2023 )ISSN: 2576-5337 10.1145/3608485 Gruber J. Humml M. , Schröder L. , Freiling F. Formal Verification of Necessary and Sufficient Evidence in Forensic Event Reconstruction Digital Forensics Research Conference Europe (DFRWS EU 2023)  (Bonn 21. March 2023  - 24. March 2023 )In: Edita Bajramovic and Ricardo J. Rodríguez (ed.):  Proceedings of the Digital Forensics Research Conference Europe (DFRWS EU)  2023  https://dfrws.org/wp-content/uploads/2023/03/2023-03-20_formal-verification-of-ne-se_gruber_dfrws-proc.pdf https://dfrws.org/wp-content/uploads/2023/03/2023-03-20_formal-verification-of-ne-se_gruber_dfrws-proc.pdf Gruber J. Voigt L. Freiling F. Faktoren erfolgreicher Cybercrime-Ermittlungen: Ergebnisse einer Expertenbefragung Kriminalistik 77 2023 ), p. 266 - 271 ISSN: 0023-4699 Hammer A. Ohlig M. , Geus J. Freiling F. A Functional Classification of Forensic Access to Storage and its Legal Implications 12th International Conference on IT Security Incident Management & IT Forensics  (Munich 23. May 2023  - 24. May 2023 )In: Proceedings of the 12th International Conference on IT Security Incident Management & IT Forensics  2023  10.1145/3609231 Joshaghani M. , Davari A. , Nejati Hatamian F. , Maier A. , Riess C. Bayesian Convolutional Neural Networks for Limited Data Hyperspectral Remote Sensing Image Classification IEEE Geoscience and Remote Sensing Letters 20 2023 ), Article No.: 5506305 ISSN: 1545-598X 10.1109/LGRS.2023.3287504 Koch T. Rieß C. , Köhler T. :LORD: Leveraging Open-Set Recognition with Unknown Data International Conference on Computer Vision Workshop (ICCVW)  (Paris 2. October 2023  - 6. October 2023 )In: 2023 IEEE/CVF International Conference on Computer Vision Workshops (ICCVW)  2023  10.1109/ICCVW60793.2023.00473 https://faui1-files.cs.fau.de/public/publications/mmsec/2023-Koch-ICCVW.pdf Lorch B. Reliable Machine Learning Methods in Image Forensics 2023 )https://nbn-resolving.org/urn:nbn:de:bvb:29-opus4-217322 Lorch B. Schirrmacher F. Maier A. Rieß C. :On the Security of the One-and-a-Half-Class Classifier for SPAM Feature-Based Image Forensics IEEE Transactions on Information Forensics and Security 2023 )ISSN: 1556-6013 10.1109/TIFS.2023.3266168 https://faui1-files.cs.fau.de/public/publications/mmsec/2023-Lorch-OSO.pdf Maier A. Rieß C. :Zuverlässigkeit von KI in der Multimedia-Forensik Datenschutz und Datensicherheit 2023 )ISSN: 1614-0702 10.1007/s11623-023-1748-2 Moussa D. Hirsch G. , Wankerl S. , Rieß C. :Point to the Hidden: Exposing Speech Audio Splicing via Signal Pointer Nets Interspeech 2023,  24th Annual Conference of the International Speech Communication Association  (Dublin 20. August 2023  - 24. August 2023 )In: ISCA (ed.):  Proc. INTERSPEECH 2023  2023  10.21437/Interspeech.2023-996 https://faui1-files.cs.fau.de/public/publications/mmsec/2023-Moussa-Interspeech.pdf Ottmann J. Breitinger F. , Freiling F. An Experimental Assessment of Inconsistencies in Memory Forensics ACM Transactions on Privacy and Security 27 2023 ), Article No.: 2 ISSN: 2471-2566 10.1145/3628600 Ottmann J. Cengiz Ü. , Breitinger F. , Freiling F. As if Time Had Stopped – Checking Memory Dumps for Quasi-Instantaneous Consistency Digital Forensics Research Conference USA (DFRWS USA) 2023  (Baltimore, MD 9. July 2023  - 12. July 2023 )In: Proceedings of the Digital Forensics Research Conference USA (DFRWS USA) 2023  2023  Quintero J. Karaseva V. Gassmann F. , Benenson Z. User Acceptance Factors of Usage-Based Insurance 6th International Conference on Intelligent Traffic and Transportation, ICITT 2022  (Paris, FRA 25. September 2022  - 27. September 2022 )In: Mahmoud Shafik (ed.):  Advances in Transdisciplinary Engineering  2023  10.3233/ATDE230018 Röckl J. Wagenhäuser A. , Müller T. Veto: Prohibit Outdated Edge System Software from Booting 9th International Conference on Information Systems Security and Privacy (ICISSP)  (Lisbon 22. February 2023  - 24. February 2023 )In: In Proceedings of the 9th International Conference on Information Systems Security and Privacy (ICISSP)  2023  10.5220/0011627700003405 Rückert C. , Meyer-Wegener K. , Safferling C. , Freiling F. Messengerdienst-Nachrichten als Beweismittel im Strafverfahren – am Beispiel der Auswertung von WhatsApp-Chats Juristische Rundschau 2023 2023 ), p. 366-378 ISSN: 0022-6920 10.1515/juru-2023-2051 Schiller K. Adamsky F. , Benenson Z. Towards an Empirical Study to Determine the Effectiveness of Support Systems against E-Mail Phishing Attacks 2023 CHI Conference on Human Factors in Computing Systems, CHI 2023  (Hamburg, DEU 23. April 2023  - 28. April 2023 )In: Conference on Human Factors in Computing Systems - Proceedings  2023  10.1145/3544549.3585658 Schirrmacher F. Lorch B. Maier A. Riess C. Benchmarking Probabilistic Deep Learning Methods for License Plate Recognition IEEE Transactions on Intelligent Transportation Systems 2023 ), p. 1-14 ISSN: 1524-9050 10.1109/TITS.2023.3278533 Schneider J. On the Trustworthiness of Digital Evidence and How It Can Be Established 2023 )10.25593/open-fau-103 Weinberger L. Eichenmüller C. Benenson Z. Interplay of Security, Privacy and Usability in Videoconferencing 2023 CHI Conference on Human Factors in Computing Systems, CHI 2023  (Hamburg, DEU 23. April 2023  - 28. April 2023 )In: Conference on Human Factors in Computing Systems - Proceedings  2023  10.1145/3544549.3585683 2022 Anantharajaiah N. , Asfour T. , Bader M. , Bauer L. , Becker J. , Bischof S. , Brand M. , Bungartz HJ. , Eichler C. , Esper K. , Falk J. , Fasfous N. , Freiling F. Fried A. , Gerndt M. , Glaß M. , Gonzalez J. , Hannig F. , Heidorn C. , Henkel J. , Herkersdorf A. , Herzog B. , John J. , Hönig T. , Hundhausen F. , Khdr H. , Langer T. , Lenke O. , Lesniak F. , Lindermayr A. , Listl A. , Maier S. , Megow N. , Mettler M. , Müller-Gritschneder D. , Nassar H. , Paus F. , Pöppl A. , Pourmohseni B. , Rabenstein J. , Raffeck P. , Rapp M. , Rivas SN. , Sagi M. , Schirrmacher F. Schlichtmann U. , Schmaus F. , Schröder-Preikschat W. , Schwarzer T. , Sikal MB. , Simon B. , Snelting G. , Spieck J. , Srivatsa A. , Stechele W. , Teich J. , Comprés Ureña IA. , Verbauwhede I. , Walter D. , Wild T. , Wildermann S. , Wille M. , Witterauf M. , Zhang L. :Invasive Computing FAU University Press 2022 ISBN: 978-3-96147-571-1 10.25593/978-3-96147-571-1 Benenson Z. Freiling F. Meyer-Wegener K. :Soziotechnische Einflussfaktoren auf die "digitale Souveränität" des Individuums In: Glasze, Georg; Odzuck; Eva; Staples, Ronald (ed.):  Was heißt digitale Souveränität? Diskurse, Praktiken und Voraussetzungen "individueller" und "staatlicher Souveränität" im digitalen Zeitalter Bielefeld transcript Verlag 2022 , p. 61 - 87  (Politik in der digitalen Gesellschaft)ISBN: 978-3-8376-5827-9  10.14361/9783839458273 Bove D. Secure Services for Standard RISC-V Architectures The 17th International Conference on Availability, Reliability and Security  (Vienna, Austria 23. August 2022  - 26. August 2022 )In: Association for Computing Machinery (ed.):  Proceedings of the 17th International Conference on Availability, Reliability and Security  2022  10.1145/3538969.3538998 https://dl.acm.org/doi/10.1145/3538969.3538998 Bove D. SoK: The Evolution of Trusted UI on Mobile ACM ASIACCS 2022  (Nagasaki, Japan 31. May 2022  - 2. June 2022 )In: Association for Computing Machinery (ed.):  ASIA CCS '22: Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security  2022  10.1145/3488932.3517417 https://dl.acm.org/doi/10.1145/3488932.3517417 Brieger T. , Raichur NL. , Jdidi D. , Ott F. , Feigl T. , Van Der Merwe JR. , Ruegamer A. , Felber W. :Multimodal Learning for Reliable Interference Classification in GNSS Signals Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+)  (Denver, CO 19. September 2022  - 23. September 2022 )In: Proc. Intl. Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+)  2022  10.33012/2022.18586 Büter R. , Engst G. Esser K. , Freiling F. Friedrich K. , Friedrich T. , Hammer A. Heine L. , Heinlein L. , Korn O. , Minuth C. , Müller M. , Müller N. , Reithmeier J. , Ripley N. Schulze M. Sievers M. , Srikhaolan C. , Zenk J. :A Comparison of Cloud Storage Technologies as Sources of Digital Evidence CS-2022-01 2022 )ISSN: 2191-5008 https://nbn-resolving.org/urn:nbn:de:bvb:29-opus4-210457 https://nbn-resolving.org/urn:nbn:de:bvb:29-opus4-210457 Deuber D. , Gruber J. Humml M. , Ronge V. , Scheler N. :Argumentation Schemes for Blockchain Deanonymization Sixteenth International Workshop on Juris-informatics
(JURISIN 2022)  (Kyoto International Conference Center, Kyoto, Japan 13. June 2022  - 14. June 2022 )Dreissig F. , Röckl J. Müller T. Compiler-Aided Development of Trusted Enclaves with Rust 17th International Conference on Availability, Reliability and Security, ARES 2022  (Vienna, AUT 23. August 2022  - 26. August 2022 )In: ACM International Conference Proceeding Series  2022  10.1145/3538969.3538972 Einzinger C. , Rückert C. , Freiling F. Datenminimierung in der Netzwerkforensik Datenschutz und Datensicherheit 46 2022 ), p. 149-155 ISSN: 1614-0702 10.1007/s11623-022-1580-0 Einzinger C. , Rückert C. , Freiling F. Datenminimierung in der Netzwerkforensik Datenschutz und Datensicherheit 46 2022 ), p. 149-155 ISSN: 1614-0702 10.1007/s11623-022-1580-0 Groß T. Schleier T. , Müller T. ReFuzz — Structure Aware Fuzzing of the Resilient File System (ReFS) 2022 ACM Asia Conference on Computer and Communications Security  (ASIA CCS '22)  (Nagasaki 30. May 2022  - 3. June 2022 )In: Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security (ASIA CCS '22)  2022  10.1145/3488932.3523260 Gruber J. Brodowski D. , Freiling F. Die polizeiliche Aufgabe und Pflicht zur digitalen Gefahrenabwehr Zeitschrift für das Gesamte Sicherheitsrecht 5 2022 ), p. 171 - 176 ISSN: 2567-3823 Gruber J. Freiling F. Fighting Evasive Malware Datenschutz und Datensicherheit 46 2022 ), p. 284-290 ISSN: 1614-0702 10.1007/s11623-022-1604-9 https://link.springer.com/article/10.1007/s11623-022-1604-9 Gruber J. Freiling F. Fighting Evasive Malware: How to Pass the Reverse Turing Test By Utilizing a VMI-Based Human Interaction Simulator Sicherheit, Schutz und Zuverlassigkeit: Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft fur Informatik e.V. (GI)  (Karlsruhe 5. April 2022  - 8. April 2022 )In: Christian Wressnegger, Delphine Reinhardt, Thomas Barber, Bernhard C. Witt, Daniel Arp, Zoltan Mann (ed.):  Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI)  2022  10.18420/sicherheit2022_03 Gruber J. Voigt L. Benenson Z. Freiling F. Foundations of cybercriminalistics: From general process models to case-specific concretizations in cybercrime investigations Forensic Science International: Digital Investigation 43 2022 ), Article No.: 301438 ISSN: 2666-2817 10.1016/j.fsidi.2022.301438 https://www.sciencedirect.com/science/article/pii/S2666281722001196 Göbel T. , Maltan S. , Türr J. , Baier H. , Mann F. :ForTrace - A holistic forensic data set synthesis framework Forensic Science International: Digital Investigation 40 2022 ), Article No.: 301344 ISSN: 2666-2817 10.1016/j.fsidi.2022.301344 Hadwiger B. Riess C. Deep Metric Color Embeddings for Splicing Localization in Severely Degraded Images IEEE Transactions on Information Forensics and Security 17 2022 ), p. 2614-2627 ISSN: 1556-6013 10.1109/TIFS.2022.3189527 https://faui1-files.cs.fau.de/public/publications/mmsec/2022-Hadwiger-DMC.pdf Jdidi D. , Brieger T. , Feigl T. , Contreras Franco D. , Van Der Merwe JR. , Ruegamer A. , Seitz J. , Felber W. :Unsupervised Disentanglement for Post-Identification of GNSS Interference in the Wild Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+)  (Denver, CO 19. September 2022  - 23. September 2022 )In: Proc. Intl. Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+)  2022  10.33012/2022.18493 Jung B. , Eichler C. , Röckl J. Schlenk R. , Hönig T. , Müller T. Trusted Monitor: TEE-Based System Monitoring Brazilian Symposium on Computing Systems Engineering (SBESC 2022)  (Fortaleza, CE, Brazil 21. November 2022  - 24. November 2022 )In: IEEE (ed.):  Brazilian Symposium on Computing Systems Engineering  2022  10.1109/SBESC56799.2022.9964869 https://ieeexplore.ieee.org/document/9964869 Koch T. Liebezeit F. , Rieß C. , Christlein V. , Köhler T. :Exploring the Open World Using Incremental Extreme Value Machines International Conference on Pattern Recognition (ICPR)  (Montréal 21. August 2022  - 25. August 2022 )In: 2022 26th International Conference on Pattern Recognition (ICPR)  2022  10.1109/ICPR56361.2022.9956423 https://faui1-files.cs.fau.de/public/publications/mmsec/2022-Koch-ICPR.pdf Körber M. , Kalysch A. Massonne W. Benenson Z. Usability of Antivirus Tools in a Threat Detection Scenario 37th IFIP International Conference on ICT Systems Security and Privacy Protection, SEC 2022  (Copenhagen, DNK 13. June 2022  - 15. June 2022 )In: Weizhi Meng, Simone Fischer-Hübner, Christian D. Jensen (ed.):  IFIP Advances in Information and Communication Technology  2022  10.1007/978-3-031-06975-8_18 Latzo T. Hellmich A. , Knepper A. , Hardi L. , Castello-Waldow TP. , Freiling F. Attenberger A. :Maraudrone's Map: An Interactive Web Application for Forensic Analysis and Visualization of DJI Drone Log Data 27th Nordic Conference on Secure IT Systems (NordSec)  (Reykjavic In: SECURE IT SYSTEMS, NORDSEC 2022 , CHAM 2022  10.1007/978-3-031-22295-5_18 Lorch B. Scheler N. , Riess C. Compliance Challenges in Forensic Image Analysis Under the Artificial Intelligence Act European Signal Processing Conference  (Belgrade 29. August 2022  - 2. September 2022 )10.23919/eusipco55093.2022.9909723 https://faui1-files.cs.fau.de/public/publications/mmsec/2022-Lorch-AIA-EUSIPCO.pdf Maier A. Lorch B. Rieß C. :Bayesian Tools for Reliable Multimedia Forensics 2022 VIII International Conference on Information Technology and Nanotechnology (ITNT)  (Samara 23. May 2022  - 27. May 2022 )10.1109/ITNT55410.2022.9848571 https://faui1-files.cs.fau.de/public/publications/mmsec/2022-Maier-BNN-ITNT.pdf Maier A. Moussa D. Spruck A. , Seiler J. , Rieß C. :Reliability Scoring for the Recognition of Degraded License Plates 2022 18th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)  (Madrid 29. November 2022  - 2. December 2022 )10.1109/AVSS56176.2022.9959390 https://faui1-files.cs.fau.de/public/publications/mmsec/2022-Maier-AVSS.pdf Moussa D. Hirsch G. , Rieß C. :Towards Unconstrained Audio Splicing Detection and Localization with Neural Networks The 2nd Workshop on MultiMedia FORensics in the WILD  (Montréal,Québec 21. August 2022  - 25. August 2022 )In: Springer Cham (ed.):  Pattern Recognition, Computer Vision, and Image Processing. ICPR 2022 International Workshops and Challenges.  2022  10.1007/978-3-031-37742-6 https://faui1-files.cs.fau.de/public/publications/mmsec/2022-Moussa-MMFORWILD.pdf Moussa D. Maier A. Spruck A. , Seiler J. , Rieß C. :Forensic License Plate Recognition with Compression-Informed Transformers IEEE International Conference on Image Processing  (Bordeaux, France 16. October 2022  - 19. October 2022 )In: IEEE (ed.):  2022 IEEE International Conference on Image Processing (ICIP)  2022  10.1109/ICIP46576.2022.9897178 https://faui1-files.cs.fau.de/public/publications/mmsec/2022-Moussa-FLPR.pdf Ottmann J. Breitinger F. , Freiling F. Defining Atomicity (and Integrity) for Snapshots of Storage in Forensic Computing Digital Forensics Research Conference Europe (DFRWS EU) 2022  (Oxford 29. March 2022  - 1. April 2022 )In: Proceedings of the Digital Forensics Research Conference Europe (DFRWS EU)  2022  2022  https://dfrws.org/presentation/defining-atomicity-and-integrity-for-snapshots-of-storage-in-forensic-computing/ Quintero J. Railean A. :Users' Privacy Concerns and Attitudes towards Usage-based Insurance: An Empirical Approach 8th International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS) In: VEHITS: PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON VEHICLE TECHNOLOGY AND INTELLIGENT TRANSPORT SYSTEMS , SETUBAL 2022  10.5220/0011044000003191 Raichur NL. , Brieger T. , Jdidi D. , Feigl T. , Van Der Merwe JR. , Ghimire B. , Ott F. , Ruegamer A. , Felber W. :Machine Learning-assisted GNSS Interference Monitoring through Crowdsourcing Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+)  (Denver, CO 19. September 2022  - 23. September 2022 )In: Proc. Intl. Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+)  2022  10.33012/2022.18492 Riess C. Physical Integrity 10.1007/978-981-16-7621-5_9 Schilling J. Müller T. VANDALIR: Vulnerability Analyses Based on Datalog and LLVM-IR 19th International Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA)  (Cagliari In: DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2022 , CHAM 2022  10.1007/978-3-031-09484-2_6 Schneider J. Düsel L. , Lorch B. Drafz J. , Freiling F. Prudent design principles for digital tampering experiments DFRWS EU 2022  (Oxford 29. March 2022  - 31. March 2022 )In: Elsevier (ed.):  Forensic Science International: Digital Investigation  2022  10.1016/j.fsidi.2022.301334 https://www.sciencedirect.com/science/article/pii/S2666281722000038 Schneider J. Eichhorn M. Freiling F. Ambiguous File System Partitions DFRWS USA 2022  (On the Internet 11. July 2022  - 14. July 2022 )In: Elsevier (ed.):  Forensic Science International: Digital Investigation  2022  10.1016/j.fsidi.2022.301399 https://www.sciencedirect.com/science/article/pii/S2666281722000804 2021 Busch M. Nicolai F. , Fleischer F. , Rückert C. , Safferling C. , Freiling F. Make Remote Forensic Investigations Forensic Again: Increasing the Evidential Value of Remote Forensic Investigations 11th EAI International Conference on Digital Forensics & Cyber Crime  (Boston, MA, USA 15. October 2020  - 16. October 2020 )In: Sanjay Goel; Pavel Gladyshev; Daryl Johnson; Makan Pourzandi; Suryadipta Majumdar (ed.):  Digital Forensics and Cyber Crime , Cham, Schweiz 2021  10.1007/978-3-030-68734-2 Chaudhari P. , Schirrmacher F. Maier A. , Riess C. Köhler T. :Merging-ISP: Multi-Exposure High Dynamic Range Image Signal Processing DAGM German Conference on Pattern Recognition  (virtual 28. September 2021  - 1. October 2021 )Davari A. , Islam S. , Seehaus T. , Hartmann A. , Braun M. , Maier A. , Christlein V. :On Mathews Correlation Coefficient and Improved Distance Map Loss for Automatic Glacier Calving Front Segmentation in SAR Imagery IEEE Transactions on Geoscience and Remote Sensing 2021 ), p. 1-12 ISSN: 0196-2892 10.1109/TGRS.2021.3115883 https://arxiv.org/abs/2102.08312 Deitsch S. , Buerhop-Lutz C. , Sovetkin E. , Steland A. , Gallwitz F. , Maier A. , Rieß C. :Segmentation of Photovoltaic Module Cells in Uncalibrated Electroluminescence Images Machine Vision and Applications 32 2021 ), Article No.: 84 ISSN: 1432-1769 10.1007/s00138-021-01191-9 https://arxiv.org/pdf/1806.06530.pdf Dietrich-Sussner R. , Davari A. , Seehaus T. , Braun M. , Christlein V. , Maier A. , Rieß C. :Synthetic Glacier SAR Image Generation from Arbitrary Masks Using Pix2Pix Algorithm 2021 IEEE International Geoscience and Remote Sensing Symposium IGARSS  (Brussels 11. July 2021  - 16. July 2021 )10.1109/IGARSS47720.2021.9553853 https://arxiv.org/abs/2101.03252 Djeukoua CLM. , Guiraud T. , Bajramovic E. Schindler J. , Waedt K. :Secure Unidirectional Security Gateways for Industrie 4.0 Die 51. Jahrestagung der Gesellschaft fur Informatikin, INFORMATIK 2021 - 51st Annual Conference of the German Informatics Society, INFORMATIK 2021  (Berlin 27. September 2021  - 1. October 2021 )In: Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI)  2021  Faust F. , Thierry A. , Müller T. Freiling F. Selective Imaging of File System Data on Live Systems Forensic Science International: Digital Investigation 36 2021 )ISSN: 2666-2817 10.1016/j.fsidi.2021.301115 Freiling F. Proceedings of the 2021 Joint Workshop of the German Research Training Groups in Computer Science. May 31–June 1, 2021 Erlangen 2021 10.25593/opus4-fau-16426 Groß T. Busch M. Müller T. One key to rule them all: Recovering the master key from RAM to break Android's file-based encryption DFRWS EU 2021  (Cyberspace 29. March 2021  - 1. April 2021 )In: Proceedings of the Eighth Annual DFRWS Europe  2021  10.1016/j.fsidi.2021.301113 Hadwiger B. Rieß C. :The Forchheim Image Database for Camera Identification in the Wild Multimedia Forensics in the Wild (MMForWild 2020)  (Mailand 10. January 2021  - 15. January 2021 )10.1007/978-3-030-68780-9_40 https://faui1-files.cs.fau.de/public/publications/mmsec/2021-Hadwiger-FDB.pdf Hartmann A. , Davari A. , Seehaus T. , Braun M. , Maier A. , Christlein V. :Bayesian U-Net for Segmenting Glaciers in Sar Imagery 2021 IEEE International Geoscience and Remote Sensing Symposium IGARSS  (Brussels 11. July 2021  - 16. July 2021 )10.1109/IGARSS47720.2021.9554292 https://arxiv.org/abs/2101.03249 Holzmann M. , Davari A. , Seehaus T. , Braun M. , Maier A. , Christlein V. :Glacier Calving Front Segmentation Using Attention U-Net 2021 IEEE International Symposium on Geoscience and Remote Sensing (IGARSS)  (Brussels 11. July 2021  - 16. July 2021 )10.1109/IGARSS47720.2021.9555067 https://arxiv.org/abs/2101.03247 Kaiser P. , Schirrmacher F. Lorch B. Rieß C. :Learning to Decipher License Plates in Severely Degraded Images MultiMedia FORensics in the WILD  (, 11. January 2021  - 11. January 2021 )In: Pattern Recognition. ICPR International Workshops and Challenges. ICPR 2021  2021  10.1007/978-3-030-68780-9_43 https://faui1-files.cs.fau.de/public/publications/mmsec/2021-Schirrmacher-LTD.pdf Latzo T. Efficient Fingerprint Matching for Forensic Event Reconstruction In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series Cham Springer 2021 , p. 98-120  (Digital Forensics and Cyber Crime. ICDF2C 2020)ISBN: 9783030687335  10.1007/978-3-030-68734-2_6 Latzo T. Hantke F. , Kotschi L. , Freiling F. Bringing Forensic Readiness to Modern Computer Firmware Digital Forensics Research Conference Europe (DFRWS EU) 2021  (Virtual 29. March 2021  - 1. April 2021 )In: Proceedings of the Digital Forensics Reesearch Conference Europe (DFRWS EU) 2021  2021  https://dfrws.org/wp-content/uploads/2021/03/Bringing-Forensic-Readiness-to-Modern-Computer-Firmware.pdf Latzo T. Schulze M. Freiling F. Leveraging Intel DCI for Memory Forensics Digital Forensics Research Conference USA (DFRWS US) 2021  (Virtual 12. July 2021  - 15. July 2021 )In: Proceedings of the Digital Forensics Research Conference USA (DFRWS US)  2021  https://dfrws.org/wp-content/uploads/2021/05/2021_USA_paper-leveraging_intel_dci_for_memory_forensics.pdf Lorch B. Schirrmacher F. Maier A. Rieß C. :Reliable Camera Model Identification Using Sparse Gaussian Processes IEEE Signal Processing Letters 2021 ), p. 912-916 ISSN: 1070-9908 10.1109/LSP.2021.3070206 https://faui1-files.cs.fau.de/public/publications/mmsec/2021-Lorch-GPC.pdf Menges F. , Latzo T. Vielberth M. , Sobola S. , Pöhls HC. , Taubmann B. , Köstler J. , Puchta A. , Freiling F. Reiser HP. , Pernul G. :Towards GDPR-compliant data processing in modern SIEM systems Computers & Security 103 2021 ), Article No.: 102165 ISSN: 0167-4048 10.1016/j.cose.2020.102165 Moussa D. Maier A. Schirrmacher F. Rieß C. :Sequence-based Recognition of License Plates with Severe Out-of-Distribution Degradations The 19th International Conference on Computer Analysis of Images and Patterns  (Virtual Conference 27. September 2021  - 1. October 2021 )In: Springer, Cham (ed.):  Computer Analysis of Images and Patterns  2021  10.1007/978-3-030-89131-2_16 https://faui1-files.cs.fau.de/public/publications/mmsec/2021-Moussa-SRLP.pdf Ottmann J. Pollach J. , Scheler N. , Schneider J. Rückert C. , Freiling F. Zur Blackbox-Problematik im Bereich Mobilfunkforensik Datenschutz und Datensicherheit 45 2021 ), p. 546-552 ISSN: 1614-0702 10.1007/s11623-021-1487-1 Pan J. , Maier A. Lorch B. Rieß C. :Reliable Camera Model Identification Through Uncertainty Estimation IEEE International Workshop on Biometrics and Forensics  (, 6. May 2021  - 7. May 2021 )10.1109/IWBF50991.2021.9465097 https://faui1-files.cs.fau.de/public/publications/mmsec/2021-Pan-IWBF.pdf Pugliese G. Methodik der Anwendungsforensik In: Felix Freiling und Christian Riess (ed.):  Browser- und Anwendungsforensik Hochschule Albstadt-Sigmaringen 2021 , p. 67–81  (Studienbriefe, Vol.7) Pugliese G. Praktische Anwendungsanalyse von Android-Apps In: Felix Freiling und Christian Riess (ed.):  Browser- und Anwendungsforensik Hochschule Albstadt-Sigmaringen 2021 , p. 83–100  (Studienbriefe, Vol.7) Pugliese G. Verfassen eines technischen Berichts In: Felix Freiling und Christian Riess (ed.):  Browser- und Anwendungsforensik Hochschule Albstadt-Sigmaringen 2021 , p. 101–113  (Studienbriefe, Vol.7) Reinhardt D. , Müller T. Welcome Message from ARES Program Committee Co-Chairs 16th International Conference on Availability, Reliability and Security, ARES 2021  (Virtual, Online, AUT 17. August 2021  - 20. August 2021 )In: ACM International Conference Proceeding Series  2021  10.1145/3465481.fm Riess C. Möglichkeiten und Grenzen bei der Ermittlung von Wahrheit mit Maschinellem Lernen In: C. Schicha, I. Stapf, S. Sell (ed.):  Medien und Wahrheit - Medienethische Perspektiven auf Desinformation, Lügen und "Fake News" Nomos 2021 , p. 341-358  10.5771/9783748923190-341 Roßberger M. , Aksoy A. , Kesdoğan D. :How to apply Database Anonymity Notions to Mix Networks Die 51. Jahrestagung der Gesellschaft für Informatik, INFORMATIK 2021  (Berlin 27. September 2021  - 1. October 2021 )In: Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft für Informatik (GI)  2021  Röckl J. Protsenko M. , Huber M. , Müller T. Freiling F. Advanced System Resiliency Based on Virtualization Techniques for IoT Devices ACSAC: Annual Computer Security Applications Conference  (Virtual Event 6. December 2021  - 10. December 2021 )10.1145/3485832.3485836 Schneider J. Lautner I. Moussa D. Wolf J. , Scheler N. , Freiling F. Haasnoot J. , Henseler H. , Malik S. , Morgenstern H. , Westman M. :In Search of Lost Data: A Study of Flash Sanitization Practices DFRWS EU 2021  (Cyberspace 29. March 2021  - 1. April 2021 )In: Proceedings of the Digital Forensics Research Conference Europe (DFRWS EU) 2021  2021  https://dfrws.org/presentation/in-search-of-lost-data-a-study-of-flash-sanitization-practices/ https://dfrws.org/presentation/in-search-of-lost-data-a-study-of-flash-sanitization-practices/ Schwab P. , Röckl J. Langohr M. , Meyer-Wegener K. :Performance Evaluation of Policy-Based SQL Query Classification for Data-Privacy Compliance Datenbank-Spektrum 2021 )ISSN: 1618-2162 10.1007/s13222-021-00385-9 https://link.springer.com/article/10.1007/s13222-021-00385-9 Schwinn L. , Nguyen A. , Raab R. , Zanca D. , Eskofier B. , Tenbrinck D. , Burger M. :Dynamically Sampled Nonlocal Gradients for Stronger Adversarial Attacks International Joint Conference on Neural Networks (IJCNN)  (Online 18. July 2021  - 22. July 2021 )10.1109/ijcnn52387.2021.9534190 Schwinn L. , Raab R. , Nguyen A. , Zanca D. , Eskofier B. :Exploring Misclassifications of Robust Neural Networks to Enhance Adversarial Attacks https://arxiv.org/abs/2105.10304 Spruck A. , Hawesch M. , Maier A. Rieß C. , Seiler J. , Kaup A. :3D Rendering Framework for Data Augmentation in Optical Character Recognition 2021 International Symposium on Signals, Circuits and Systems (ISSCS)  (Iasi, Romania (virtual) 15. July 2021  - 16. July 2021 )In: ISSCS 2021 - International Symposium on Signals, Circuits and Systems  2021  10.1109/ISSCS52333.2021.9497438 https://arxiv.org/abs/2209.14970 Villar-Corrales A. , Schirrmacher F. Rieß C. :Deep Learning Architectural Designs for Super-Resolution of Noisy Images In: ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)  2021  10.1109/ICASSP39728.2021.9414733 2020 Busch M. Dirsch K. :Finding 1-Day Vulnerabilities in Trusted Applications using Selective Symbolic Execution Workshop on Binary Analysis Research (BAR) 2020  (San Diego, CA 23. February 2020  - 23. February 2020 )10.14722/bar.2020.23014 Busch M. Westphal J. , Müller T. Unearthing the TrustedCore: A critical review on huawei's trusted execution environment 14th USENIX Workshop on Offensive Technologies, WOOT 2020, co-located with USENIX Security 2020  (, 11. April 2020 )In: WOOT 2020 - 14th USENIX Workshop on Offensive Technologies, co-located with USENIX Security 2020  2020  Felsner L. , Käppler S. , Maier A. , Riess C. Truncation Correction for X-ray Phase-Contrast Region-of-Interest Tomography IEEE Transactions on Computational Imaging 2020 ), p. 625 - 639 ISSN: 2333-9403 10.1109/TCI.2020.2964217 Felsner L. , Würfl T. , Syben-Leisner C. , Roser P. , Preuhs A. , Maier A. , Riess C. Reconstruction of Voxels with Position- and Angle-Dependent Weightings The 6th International Conference on Image Formation in X-Ray Computed Tomography  (Online meeting 3. August 2020  - 7. August 2020 )Fleischer F. , Busch M. Kuhrt P. :Memory corruption attacks within Android TEEs: A case study based on OP-TEE 15th International Conference on Availability, Reliability and Security, ARES 2020  (Online 25. August 2020  - 28. August 2020 )In: ACM International Conference Proceeding Series  2020  10.1145/3407023.3407072 Freiling F. Tavakoli Kolagari R. , Auernhammer K. Efficient Black-Box Search for Adversarial Examples using Relevance Masks 2020 Workshop on DYnamic and Novel Advances in Machine Learning and Intelligent Cyber Security, DYNAMICS 2020  (Lexington, MA, Virtual, Online 7. December 2020  - 7. December 2020 )In: DYNAMICS '20: Proceedings of the 2020 Workshop on DYnamic and Novel Advances in Machine Learning and Intelligent Cyber Security , New York, NY 2020  10.1145/3477997.3478013 Groß T. Dirauf R. , Freiling F. Systematic Analysis of Browser History Evidence 13th International Conference on Systematic Approaches to Digital Forensic Engineering (SADFE)  (New York 15. May 2020  - 15. May 2020 )In: IEEE (ed.):  2020 13th International Conference on Systematic Approaches to Digital Forensic Engineering (SADFE)  2020  10.1109/SADFE51007.2020.00010 Hantke F. , Dewald A. How can data from fitness trackers be obtained and analyzed with a forensic approach? 5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020  (, 7. September 2020  - 11. September 2020 )In: Proceedings - 5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020  2020  10.1109/EuroSPW51379.2020.00073 Hofmann F. , Freiling F. Personalisierte Preise und das Datenschutzrecht. Anforderungen an die datenschutzrechtliche Einwilligung Zeitschrift für Datenschutz 2020 ), p. 331-335 ISSN: 2192-5593 Kalysch A. Android Application Hardening: Attack Surface Reduction and IP Protection Mechanisms 2020 )https://opus4.kobv.de/opus4-fau/frontdoor/index/index/docId/14149 Kalysch A. Deutel M. , Müller T. Template-based Android inter-process communication fuzzing ARES '20: The 15th International Conference on Availability, Reliability and Security  (Virtual Event, Dublin, Ireland 25. August 2020  - 28. August 2020 )In: Melanie Volkamer, Christian Wressnegger (ed.):  Proceedings of the 15th International Conference on Availability, Reliability and Security , New York, United States 2020  10.1145/3407023.3407052 https://dl.acm.org/doi/10.1145/3407023.3407052 Kalysch A. Schilling J. Müller T. On the Evolution of Security Issues in Android App Versions In: Jianying Zhou, Mauro Conti, Chuadhry Mujeeb Ahmed, Man Ho Au, Lejla Batina, Zhou Li, Jingqiang Lin, Eleonora Losiouk, Bo Luo, Suryadipta Majumdar, Weizhi Meng, Martín Ochoa, Stjepan Picek, Georgios Portokalidis, Cong Wang, Kehuan Zhang (ed.):  ACNS: International Conference on Applied Cryptography and Network Security Cham, Switzerland Springer Nature Switzerland AG 2020 , p. 523 - 541  (Lecture Notes in Computer Science)ISBN: 978-3-030-61637-3  10.1007/978-3-030-61638-0_29 https://link.springer.com/chapter/10.1007/978-3-030-61638-0_29 Latzo T. Brost J. , Freiling F. BMCLeech: Introducing Stealthy Memory Forensics to BMC Forensic Science International: Digital Investigation 32 2020 )ISSN: 2666-2817 10.1016/j.fsidi.2020.300919 Lorch B. Maier A. Riess C. Reliable JPEG Forensics via Model Uncertainty IEEE International Workshop on Information Forensics and Security  (online 6. December 2020  - 11. December 2020 )10.1109/wifs49906.2020.9360893 https://faui1-files.cs.fau.de/public/publications/mmsec/2020-Lorch-BLR.pdf Maier A. , Christlein V. , Breininger K. , Wuerfl T. , Unberath M. , Rieß C. :Bildanalyse In: Günther Görz, Ute Schmid, Tanya Braun (ed.):  Handbuch der Künstichen Intelligenz De Gruyter 2020 , p. 673--712  10.1515/9783110659948-015 Maier A. Lorch B. Riess C. Toward Reliable Models For Authenticating Multimedia Content: Detecting Resampling Artifacts With Bayesian Neural Networks IEEE International Conference on Image Processing  (, 25. October 2020  - 28. October 2020 )10.1109/icip40778.2020.9191121 https://faui1-files.cs.fau.de/public/publications/mmsec/2020-Maier-BNN.pdf Maier D. , Erb H. , Mullan P. Haupert V. Camera Fingerprinting Authentication Revisited RAID 2020  (Donostia / San Sebastian 14. October 2020  - 16. October 2020 )In: International Symposium on Research in Attacks, Intrusions and Defenses , Cham, Switzerland 2020  Matern F. , Riess C. Stamminger M. :Depth Map Fingerprinting and Splicing Detection ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)  (Barcelona 4. May 2020  - 8. May 2020 )In: ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)  2020  10.1109/ICASSP40776.2020.9052979 Morgner P. Mai C. , Koschate-Fischer N. , Freiling F. Benenson Z. Security Update Labels: Establishing Economic Incentives for Security Patching of IoT Consumer Products 41st IEEE Symposium on Security and Privacy (S&P)  (San Francisco, CA 18. May 2020  - 20. May 2020 )In: IEEE (ed.):  Proceedings of the IEEE Symposium on Security and Privacy (S&P), May 2020  2020  10.1109/SP40000.2020.00021 https://www.computer.org/csdl/proceedings-article/sp/2020/349700a346/1j2LfHnkRPy Mullan P. Riess C. Freiling F. Towards Open-Set Forensic Source Grouping on JPEG Header Information Forensic Science International: Digital Investigation 32 2020 )ISSN: 2666-2817 10.1016/j.fsidi.2020.300916 Müller N. , Müller T. Freiling F. Urheberrecht ./. Sicherheitsanalyse SICHERHEIT 2020 In: Reinhardt, D., Langweg, H., Witt, B. C., Fischer, M (ed.):  SICHERHEIT 2020 , Bonn 2020  10.18420/sicherheit2020_08 https://dl.gi.de/handle/20.500.12116/31793 Palutke R. Block F. Reichenberger P. , Stripeika D. :Hiding Process Memory Via Anti-Forensic Techniques Forensic Science International: Digital Investigation 33 2020 )ISSN: 2666-2817 10.1016/j.fsidi.2020.301012 Palutke R. Ruderich S. , Wild M. , Freiling F. HyperLeech: Stealthy System Virtualization with Minimal Target Impact through DMA-Based Hypervisor Injection 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020)  (San Sebastian 14. October 2020  - 16. October 2020 )In: USENIX (ed.):  Proceedings of the 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020)  2020  https://www.usenix.org/system/files/raid20-palutke.pdf https://www.usenix.org/system/files/raid20-palutke.pdf Prade P. , Groß T. Dewald A. Forensic Analysis of the Resilient File System (ReFS) Version 3.4 DFRWS 2020 EU  (Oxford, United Kingdom 3. June 2020  - 5. June 2020 )In: Proceedings of the Seventh Annual DFRWS Europe  2020  10.1016/j.fsidi.2020.300915 Pugliese G. Rieß C. , Gassmann F. , Benenson Z. Long-Term Observation on Browser Fingerprinting: Users’ Trackability and Perspective In: Sciendo (ed.):  Proceedings on Privacy Enhancing Technologies (PoPETs), Volume 2020: Issue 2  2020  10.2478/popets-2020-0041 https://petsymposium.org/popets/2020/popets-2020-0041.pdf Schirrmacher F. Lorch B. Stimpel B. , Köhler T. , Riess C. SR²: Super-Resolution With Structure-Aware Reconstruction 2020 IEEE International Conference on Image Processing (ICIP)  (Online 25. October 2020  - 28. October 2020 )10.1109/ICIP40778.2020.9191253 https://faui1-files.cs.fau.de/public/publications/mmsec/2020-Schirrmacher-SR2.pdf Schirrmacher F. Riess C. Köhler T. :Adaptive Quantile Sparse Image (AQuaSI) Prior for Inverse Imaging Problems IEEE Transactions on Computational Imaging 6 2020 ), p. 503--517 ISSN: 2333-9403 10.1109/TCI.2019.2956888 https://faui1-files.cs.fau.de/public/publications/mmsec/2020-Schirrmacher-AQS.pdf Schneider J. Milius S. , Deifel HP. , Freiling F. Unifying Metadata-Based Storage Reconstruction and Carving with LAYR DFRWS 2020 USA  (Virtual 20. July 2020  - 24. July 2020 )In: Elsevier (ed.):  Forensic Science International: Digital Investigation  2020  10.1016/j.fsidi.2020.301006 https://www.sciencedirect.com/science/article/pii/S2666281720302559 Schneider J. Wolf J. , Freiling F. Tampering with digital evidence is hard: The case of main memory images DFRWS EU 2020  (Virtual 25. March 2020  - 28. March 2020 )In: Elsevier (ed.):  Forensic Science International: Digital Investigation  2020  10.1016/j.fsidi.2020.300924 https://www.sciencedirect.com/science/article/pii/S2666281720300196 Spensky C. , MacHiry A. , Busch M. Leach K. , Housley R. , Kruegel C. , Vigna G. :TRUST.IO: Protecting Physical Interfaces on Cyber-physical Systems 2020 IEEE Conference on Communications and Network Security, CNS 2020  (ONLINE 29. June 2020  - 1. July 2020 )In: 2020 IEEE Conference on Communications and Network Security, CNS 2020  2020  10.1109/CNS48642.2020.9162246 2019 Abdullah L. Freiling F. Quintero J. Benenson Z. Sealed computation: Abstract requirements for mechanisms to support trustworthy cloud computing 4th International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2018 and 2nd International Workshop on Security and Privacy Requirements Engineering, SECPRE 2018 held in conjunction with 23rd European Symposium on Research in Computer Security, ESORICS 2018  (Barcelona 6. September 2018  - 7. September 2018 )In: Frédéric Cuppens, Nora Cuppens, Christos Kalloniatis, Sokratis K. Katsikas, Costas Lambrinoudakis, John Mylopoulos, Annie Antón, Stefanos Gritzalis (ed.):  Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)  2019  10.1007/978-3-030-12786-2_9 Abdullah L. Hahn S. , Freiling F. Achieving consistency of software updates against strong attackers 3rd Central European Cybersecurity Conference, CECC 2019  (Munich 14. November 2019  - 15. November 2019 )In: ACM International Conference Proceeding Series  2019  10.1145/3360664.3360670 Abdullah L. Quintero J. Sealed computation: a mechanism to support privacy-aware trustworthy cloud service Information and Computer Security 2019 )ISSN: 2056-4961 10.1108/ICS-11-2018-0133 Armknecht F. , Benenson Z. Morgner P. Müller C. Riess C. Privacy implications of room climate data Journal of Computer Security 27 2019 ), p. 113-136 ISSN: 0926-227X 10.3233/JCS-181133 https://content.iospress.com/articles/journal-of-computer-security/jcs181133 Bajramovic E. Gupta D. , Guo Y. , Waedt K. , Bajramovic A. :Security challenges and best practices for iiot 49. Jahrestagung der Gesellschaft fur Informatik: 50 Jahre Gesellschaft fur Informatik - Informatik fur Gesellschaft, INFORMATIK 2019 - 49th Annual Meeting of the German Informatics Society: 50 years of the German Informatics Society - Computer Science for Society, INFORMATICS 2019  (Kassel 23. September 2019  - 26. September 2019 )In: Claude Draude, Martin Lange, Bernhard Sick (ed.):  Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI)  2019  10.18420/inf2019_ws28 Benenson Z. Berger F. , Cherepantsev A. , Datsevich S. , Do L. , Eckert M. , Elsberger T. , Freiling F. Frinken M. , Glameyer H. , Hafner S. , Hagenhoff S. , Hammer A. Hammerl S. , Hantke F. , Heindorf F. , Henninger M. , Höfer D. , Kuhrt P. , Lattka M. , Leis T. , Leubner C. , Leyrer K. , Lindenmeier C. Del Medico K. , Moussa D. Nissen M. , Öz A. , Ottmann J. Reif K. , Ripley N. Roth A. , Schilling J. , Schleicher R. , Schulz D. , Stephan M. , Volkert C. , Wehner M. , Wild M. , Wirth J. , Wolf J. , Wunder J. Zlatanovic J. :Analyse verbreiteter Anwendungen zum Lesen von elektronischen Büchern CS-2019-06 2019 )http://nbn-resolving.de/urn:nbn:de:bvb:29-opus4-125519 http://nbn-resolving.de/urn:nbn:de:bvb:29-opus4-125519 Block F. Dewald A. Windows Memory Forensics: Detecting (Un)Intentionally Hidden Injected Code by Examining Page Table Entries Digital Investigation 29 2019 ), p. S3-S12 ISSN: 1742-2876 10.1016/j.diin.2019.04.008 Bopp J. , Ludwig V. , Seifert M. , Pelzer G. , Maier A. , Anton G. , Riess C. Simulation study on X-ray phase contrast imaging with dual-phase gratings International Journal of Computer Assisted Radiology and Surgery 14 2019 ), p. 3-10 ISSN: 1861-6410 10.1007/s11548-018-1872-x https://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2018/Bopp18-SSO.pdf Botacin M. , Kalysch A. Grégio A. :The Internet Banking [in]Security Spiral: Past, Present, and Future of Online Banking Protection Mechanisms based on a Brazilian case study Conference on Availability, Reliability and Security  (Canterbury, United Kingdom 26. August 2019  - 29. August 2019 )In: Edgar Weippl, SBA Research, Austria
A Min Tjoa, TU Vienna, Austria (ed.):  Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019) (ARES ’19) , New York, (NY), USA 2019  10.1145/3339252.3340103 Bove D. Kalysch A. In pursuit of a secure UI: The cycle of breaking and fixing Android’s UI it - Information Technology Methods and Applications of Informatics and Information Technology 2019 )ISSN: 1611-2776 10.1515/itit-2018-0023 Bove D. Müller T. Investigating Characteristics of Attacks on Public Cloud Systems 6th IEEE International Conference on Cyber Security and Cloud Computing  (Paris 21. June 2019  - 23. June 2019 )In: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)  2019  10.1109/CSCloud/EdgeCom.2019.00-13 https://ieeexplore.ieee.org/document/8854036 Busch M. Schlenk R. , Heckel H. :TEEMO: Trusted peripheral monitoring for optical networks and beyond 4th Workshop on System Software for Trusted Execution, SysTEX 2019  (Huntsville, ON 27. October 2019 )In: Proceedings of the 4th Workshop on System Software for Trusted Execution, SysTEX 2019  2019  10.1145/3342559.3365339 Davari A. , Özkan HC. , Maier A. , Rieß C. :Fast and Efficient Limited Data Hyperspectral Remote Sensing Image Classification via GMM-Based Synthetic Samples IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 12 2019 ), p. 2107-2120 ISSN: 1939-1404 10.1109/JSTARS.2019.2916495 https://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2019/Davari_JSTARS_2019.pdf Felsner L. , Hu S. , Ludwig V. , Anton G. , Maier A. , Rieß C. :On the Characteristics of Helical 3-D X-ray Dark-field Imaging Bildverarbeitung für die Medizin (BVM 2019)  (Lübeck 17. March 2019  - 19. March 2019 )10.1007/978-3-658-25326-4_59 https://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2019/Felsner19-OTC.pdf Felsner L. , Hu S. , Maier A. , Bopp J. , Ludwig V. , Anton G. , Riess C. A 3-D Projection Model for X-ray Dark-field Imaging Scientific Reports 9 2019 )ISSN: 2045-2322 10.1038/s41598-019-45708-9 Gassmann F. , Benenson Z. Landwirth R. :Communication as a threat Users' reactions to email and Facebook messages with suspicious links Österreichische Zeitschrift für Soziologie 44 2019 ), p. 135-155 ISSN: 1011-0070 10.1007/s11614-019-00351-6 Groß T. Ahmadova M. , Müller T. Analyzing android’s file-based encryption: Information leakage through unencrypted metadata International Workshop on Security of Mobile Applications (IWSMA 2019)  (Canterbury, United Kingdom 26. August 2019  - 29. August 2019 )In: Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019)  2019  10.1145/3339252.3340340 Hadwiger B. Baracchi D. , Piva A. , Riess C. Towards learned color representations for image splicing detection International Conference on Acoustics, Speech, and Signal Processing  (Brighton 12. May 2019  - 17. May 2019 )In: 2019 IEEE International Conference on Acoustics, Speech, and Signal Processing Proceedings  2019  10.1109/icassp.2019.8682246 Haupert V. Sicherheit mobiler Bankgeschäfte zwischen Innovation und Regulierung 2019 )https://nbn-resolving.de/urn:nbn:de:bvb:29-opus4-113211 Haupert V. Gabert S. :Short Paper: How to Attack PSD2 Internet Banking 23rd International Conference on Financial Cryptography and Data Security, FC 2019  (St. Kitts 18. February 2019  - 22. February 2019 )In: Ian Goldberg, Tyler Moore (ed.):  Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)  2019  10.1007/978-3-030-32101-7_15 Haupert V. Gabert S. :Where to Look for What You See Is What You Sign? User Confusion in Transaction Security ESORICS 2019  (Luxemburg 23. September 2019  - 27. September 2019 )In: Kazue Sako, Steve Schneider, Peter Ryan (ed.):  24th European Symposium on Research in Computer Security , Cham, Switzerland 2019  10.1007/978-3-030-29959-0_21 Latzo T. Freiling F. Characterizing the Limitations of Forensic Event Reconstruction Based on Log Files 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications  (Rotorua, New Zealand 5. August 2019  - 8. August 2019 )10.1109/TrustCom/BigDataSE.2019.00069 Latzo T. Palutke R. Freiling F. A universal taxonomy and survey of forensic memory acquisition techniques Digital Investigation 2019 ), p. 56-69 ISSN: 1742-2876 10.1016/j.diin.2019.01.001 Lorch B. Agarwal S. , Farid H. :Forensic Reconstruction of Severely Degraded License Plates IS&T Electronic Imaging  (Burlingame, CA 13. January 2019  - 16. January 2019 )In: Society for Imaging Science & Technology (ed.):  Electronic Imaging  2019  10.2352/issn.2470-1173.2019.5.mwsf-529 https://faui1-files.cs.fau.de/public/publications/mmsec/2019-Lorch-LP.pdf Lorch B. Riess C. Image Forensics from Chroma Subsampling of High-Quality JPEG Images ACM Workshop on Information Hiding and Multimedia Security  (Paris 3. July 2019  - 5. July 2019 )10.1145/3335203.3335722 https://faui1-files.cs.fau.de/public/publications/mmsec/2019-Lorch-IFC.pdf Matern F. , Riess C. Stamminger M. :Exploiting Visual Artifacts to Expose Deepfakes and Face Manipulations Workshop on Image and Video Forensics  (Waikoloa Village, HI 11. January 2019  - 11. January 2019 )In: IEEE Workshop on Applications in Computer Vision  2019  10.1109/wacvw.2019.00020 https://faui1-files.cs.fau.de/public/mmsec/pub/matern_ivfws_2019_face_artifacts.pdf Matern F. , Riess C. Stamminger M. :Gradient-Based Illumination Description for Image Forgery Detection IEEE Transactions on Information Forensics and Security 2019 )ISSN: 1556-6013 10.1109/TIFS.2019.2935913 https://faui1-files.cs.fau.de/public/publications/mmsec/2019-Matern-GBI.pdf Morgner P. Security and Privacy in the Internet of Things: Technical and Economic Perspectives 2019 )http://nbn-resolving.de/urn:nbn:de:bvb:29-opus4-112070 Mullan P. Riess C. Freiling F. Forensic source identification using JPEG image headers: The case of smartphones Digital Investigation 28 2019 ), p. S68-S76 ISSN: 1742-2876 10.1016/j.diin.2019.01.016 Mullan P. Rieß C. , Freiling F. Forensic Source Identification using JPEG Image Headers: The Case of Smartphones DFRWS EU  (Oslo 24. April 2019  - 26. April 2019 )In: Digital Investigation  2019  10.1016/j.diin.2019.01.016 Palutke R. Neubaum A. , Götzfried J. SEVGuard: Protecting User Mode Applications using Secure Encrypted Virtualization SecureComm  (Orlando 23. October 2019  - 25. October 2019 )In: SecureComm 2019 Proceedings , New York City, United States of America 2019  10.1007/978-3-030-37231-6_12 Prade P. , Groß T. Dewald A. Forensic Analysis of the Resilient File System (ReFS) Version 3.4 2019 )ISSN: 2191-5008 10.25593/issn.2191-5008/CS-2019-05 https://opus4.kobv.de/opus4-fau/files/12526/refs_report.pdf Prechtel D. , Groß T. Müller T. Evaluating Spread of 'Gasless Send' in Ethereum Smart Contracts 2nd International Workshop on Blockchains and Smart Contracts (BSC)  (1 Calle Mar Mediterráneo, Maspalomas, Gran Canaria, 35100, Spain 24. June 2019  - 26. June 2019 )In: IEEE (ed.):  10th IFIP International Conference on New Technologies, Mobility & Security (NTMS 2019)  2019  10.1109/ntms.2019.8763848 Prokosch HU. , Schüttler C. , Schraudt M. , Öfelein M. , Maier C. :Digital patient communication: Improving the hospital-patient relationship In: Healthcare of the Future - Bridging the Information Gap IOS Press 2019 , p. 3-9  (Studies in Health Technology and Informatics, Vol.259) 10.3233/978-1-61499-961-4-3 Quintero J. Benenson Z. Understanding usability and user acceptance of usage-based insurance from users' view 2nd International Conference on Machine Learning and Machine Intelligence, MLMI 2019  (Jakarta 18. September 2019  - 20. September 2019 )In: ACM International Conference Proceeding Series  2019  10.1145/3366750.3366759 Reinfelder L. Landwirth R. , Benenson Z. Security Managers Are Not the Enemy Either In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems ACM 2019 , p. 1-7  10.1145/3290605.3300663 Riess C. Täuschend echt: Die Erzeugung von digitalen Bildfälschungen und ihre Erkennung In: Rudolph Freiburg (ed.):  Täuschungen - Erlanger Universitätstage 2018 Erlangen FAU University Press 2019 , p. 95-113  (FAU Forschungen, Reihe A, Geisteswissenschaften, Vol.14)ISBN: 978-3-96147-221-5  10.25593/978-3-96147-222-2 https://faui1-files.cs.fau.de/public/publications/mmsec/2019-Riess-TEE.pdf Roessler A. , Cozzolino D. , Verdoliva L. , Riess C. Thies J. , Niessner M. :FaceForensics plus plus : Learning to Detect Manipulated Facial Images IEEE/CVF International Conference on Computer Vision (ICCV)  (Seoul 27. October 2019  - 2. November 2019 )In: 2019 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2019) , LOS ALAMITOS 2019  10.1109/ICCV.2019.00009 Roessler A. , Cozzolino D. , Verdoliva L. , Rieß C. , Thies J. , Niessner M. :FaceForensics++: Learning to Detect Manipulated Facial Images 2019 )10.1109/iccv.2019.00009 https://arxiv.org/pdf/1901.08971.pdf Schiller J. , Freiling F. Benenson Z. Massonne W. Berufsbegleitendes Studieren an Universitäten - Ein Zukunftsfeld für die IT-Sicherheit Informatik-Spektrum 42 2019 ), p. 38-47 ISSN: 0170-6012 10.1007/s00287-019-01145-6 Schorradt S. , Bajramovic E. Freiling F. On the feasibility of secure logging for industrial control systems using blockchain 3rd Central European Cybersecurity Conference, CECC 2019  (Munich 14. November 2019  - 15. November 2019 )In: ACM International Conference Proceeding Series  2019  10.1145/3360664.3360668 Watson V. , Bajramovic E. Bejiga M. , Waedt K. :Designing Trustworthy Monitoring Systems: Forensic Readiness for Safety and Security 12th International Conference on Reliability, Maintainability, and Safety, ICRMS 2018  (Shanghai 17. October 2018  - 19. October 2018 )In: Proceedings - 12th International Conference on Reliability, Maintainability, and Safety, ICRMS 2018  2019  10.1109/ICRMS.2018.00038 2018 Afonso V. , Kalysch A. Müller T. Oliveira D. , Grégio A. , De Geus PL. :Lumus: Dynamically Uncovering Evasive Android Applications ISC 2018  (Guildford, UK 9. September 2018  - 12. September 2018 )In: Liqun Chen, Mark Manulis, Steve Schneider (ed.):  Information Security - 21th International Conference , Guildford, UK 2018  10.1007/978-3-319-99136-8_3 https://link.springer.com/chapter/10.1007/978-3-319-99136-8_3 Bopp J. , Felsner L. , Hu S. , Käppler S. , Riess C. X-ray Phase Contrast: Research on a Future Imaging Modality Cham Springer 2018 ISBN: 978-3-319-96519-2 10.1007/978-3-319-96520-8_9 Bopp J. , Felsner L. , Hu S. , Käppler S. , Riess C. X-ray Phase Contrast: Research on a Future Imaging Modality In: Medical Imaging Systems - An Introductory Guide 2018 , p. 191--205  10.1007/978-3-319-96520-8_9 Bopp J. , Gallersdörfer M. , Ludwig V. , Seifert M. , Maier A. , Anton G. , Riess C. Phasenkontrast Röntgen mit 2 Phasengittern und medizinisch relevanten Detektoren Bildverarbeitung für die Medizin 2018 - Algorithmen - Systeme - Anwendungen  (Erlangen 11. March 2018  - 13. March 2018 )In: Proceedings des Workshops Bildverarbeitung für die Medizin 2018 - Algorithmen - Systeme - Anwendungen  2018  10.1007/978-3-662-56537-7_50 Cozzolino D. , Thies J. , Roessler A. , Riess C. Niessner M. , Verdoliva L. :ForensicTransfer: Weakly-supervised Domain Adaptation for Forgery Detection 2018 ), Article No.: arXiv:1812.02510 https://arxiv.org/pdf/1812.02510 https://arxiv.org/pdf/1812.02510 Davari A. , Aptoula E. , Yanikoglu B. , Maier A. , Riess C. GMM-based Synthetic Samples for Classification of Hyperspectral Images with Limited Training Data IEEE Geoscience and Remote Sensing Letters 15 2018 ), p. 942-946 ISSN: 1545-598X 10.1109/LGRS.2018.2817361 https://arxiv.org/pdf/1712.04778.pdf Davari A. , Sakaltras N. , Haeberle A. , Vesal S. , Christlein V. , Maier A. , Riess C. Hyper-Hue and EMAP on Hyperspectral Images for Supervised Layer Decomposition of Old Master Drawings International Conference on Image Processing (ICIP)  (Athens, Greece 7. October 2018  - 10. October 2018 )In: International Conference on Image Processing (ICIP)  2018  10.1109/ICIP.2018.8451768 http://arxiv.org/abs/1801.09472 Davari A. , Özkan HC. , Maier A. , Riess C. Fast Sample Generation with Variational Bayesian for Limited Data Hyperspectral Image Classification IEEE International Geoscience and Remote Sensing Symposium  (Valencia 22. July 2018  - 27. July 2018 )In: IEEE International Geoscience and Remote Sensing Symposium  2018  10.1109/IGARSS.2018.8517643 https://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2018/Davari18-FSG.pdf Felsner L. , Berger M. , Käppler S. , Bopp J. , Ludwig V. , Weber T. , Pelzer G. , Michel T. , Maier A. , Anton G. , Riess C. Phase-Sensitive Region-of-Interest Computed Tomography 21st International Conference on Medical Image Computing and Computer Assisted Intervention, MICCAI 2018  (Granada 17. September 2018  - 19. September 2018 )In: 21st International Conference on Medical Image Computing and Computer Assisted Intervention  2018  10.1007/978-3-030-00928-1_16 https://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2018/Felsner18-PRC.pdf Freiling F. Bajramovic E. Principles of Secure Logging for Safekeeping Digital Evidence 11th International Conference on IT Security Incident Management & IT Forensics (IMF 2018)  (Hamburg In: IEEE Computer Society (ed.):  2018 11th International Conference on IT Security Incident Management & IT Forensics (IMF)  2018  10.1109/IMF.2018.00012 Freiling F. Groß T. Latzo T. Müller T. Palutke R. Advances in Forensic Data Acquisition IEEE Design & Test 35 2018 ), p. 1-12 ISSN: 2168-2356 10.1109/MDAT.2018.2862366 Freiling F. Hösch L. :Controlled experiments in digital evidence tampering Digital Investigation 24S 2018 ), p. S83-S92 ISSN: 1742-2876 10.1016/j.diin.2018.01.011 http://dfrws.org/conferences/dfrws-eu-2018/sessions/controlled-experiments-digital-evidence-tampering Freiling F. Safferling C. , Rückert C. :Quellen-TKÜ und Online-Durchsuchung als neue Maßnahmen für die Strafverfolgung: Rechtliche und technische Herausforderungen Juristische Rundschau 1 2018 ), p. 9-22 ISSN: 0022-6920 10.1515/juru-2017-0104 Fürsattel P. , Placht S. , Maier A. , Riess C. Geometric primitive refinement for structured light cameras Machine Vision and Applications 29 2018 ), p. 313-327 ISSN: 1432-1769 10.1007/s00138-017-0901-z Gascon H. , Ullrich S. , Stritter B. Rieck K. :Reading Between the Lines: Content-Agnostic Detection of Spear-Phishing Emails Research in Attacks, Intrusions, and Defenses - 21st International Symposium, RAID 2018  (Heraklion, Crete, Greece 10. September 2018  - 12. September 2018 )In: Michael Bailey, Thorsten Holz, Manolis Stamatogiannakis, Sotiris Ioannidis (ed.):  Research in Attacks, Intrusions, and Defenses - 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings  2018  10.1007/978-3-030-00470-5_4 Gupta D. , Bajramovic E. Parekh M. , Waedt K. :Cyber Threat Scenarios for Electrical Systems of Nuclear Power Plants 26th International Conference on Nuclear Engineering (ICONE-26)  (London 22. July 2018  - 26. July 2018 )In: PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE ON NUCLEAR ENGINEERING, 2018, VOL 9 , NEW YORK 2018  10.1115/icone26-82411 Götzfried J. RAM-Schranke: RAM-Verschlüsselung bei AMD und Intel 10/2018 2018 ), p. 174-179 https://heise.de/-4028190 Götzfried J. Trusted Systems in Untrusted Environments: Protecting against Strong Attackers 2018 )https://nbn-resolving.org/urn:nbn:de:bvb:29-opus4-91150 Haupert V. Maier D. , Schneider N. , Kirsch J. , Müller T. Honey, I Shrunk Your App Security: The State of Android App Hardening DIMVA 2018  (Paris 28. June 2018  - 29. June 2018 )In: Giuffrida Cristiano, Bardin Sébastien, Blanc Gregory (ed.):  Detection of Intrusions and Malware, and Vulnerability Assessment , Cham, Switzerland 2018  10.1007/978-3-319-93411-2_4 https://www.cs1.tf.fau.de/nomorp Haupert V. Müller T. On App-based Matrix Code Authentication in Online Banking ICISSP 2018  (Funchal, Madeira 22. January 2018  - 24. January 2018 )In: Furnell Steven, Mori Paolo, Camp Olivier (ed.):  Proceedings of the 4th International Conference on Information Systems Security and Privacy , Setúbal 2018  10.5220/0006650501490160 https://www1.cs.fau.de/appAuth Haupert V. Pugliese G. Ich sehe was, das du nicht siehst: Die Realität von Mobilebanking zwischen allgemeinen und rechtlichen Anforderungen Sicherheit, Schutz und Zuverlässigkeit  (Konstanz 25. April 2018  - 27. April 2018 )In: Langweg, Hanno ; Meier, Michael ; Witt, Bernhard C. ; Reinhardt, Delphine (ed.):  Konferenzband der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) , Bonn 2018  10.18420/sicherheit2018_13 Horn F. , Leghissa M. , Käppler S. , Pelzer G. , Rieger J. , Seifert M. , Wandner J. , Weber T. , Michel T. , Riess C. Anton G. :Implementation of a Talbot-Lau Interferometer in a Clinical-like C-Arm Setup: A Feasibility Study Scientific Reports 8 2018 ), Article No.: 2325 ISSN: 2045-2322 10.1038/s41598-018-19482-z https://www.nature.com/articles/s41598-018-19482-z Hu S. , Felsner L. , Maier A. , Ludwig V. , Anton G. , Riess C. A 3-D Projection Model for X-ray Dark-field Imaging 2018 ), Article No.: arXiv:1811.04457 10.1038/s41598-019-45708-9 https://arxiv.org/pdf/1811.04457 Hänsch N. Schankin A. , Protsenko M. , Freiling F. Benenson Z. Programming Experience Might Not Help in Comprehending Obfuscated Source Code Efficiently SOUPS 2018  (Baltimore, MD, USA In: Proceedings of the Fourteenth Symposium on Usable Privacy and Security  2018  Kalysch A. Bove D. Müller T. How Android’s UI Security is Undermined by Accessibility ROOTS' 18  (Vienna 29. November 2018  - 30. November 2018 )In: Proceedings of the 2nd Reversing and Offensive-oriented Trends Symposium , New York, NY, USA 2018  10.1145/3289595.3289597 https://dl.acm.org/citation.cfm?id=3289597 Kalysch A. Milisterfer O. , Protsenko M. , Müller T. Tackling Android's Native Library Malware with Robust, Efficient and Accurate Similarity Measures International Conference on Availability, Reliability and Security Proceedings 2018  (Hamburg, Germany 27. August 2018  - 30. August 2018 )In: ACM (ed.):  Proceedings of the 13th International Conference on Availability, Reliability and Security , Hamburg 2018  10.1145/3230833.3232828 http://doi.acm.org/10.1145/3230833.3232828 Kraus M. , Haupert V. The Swift Language from a Reverse Engineering Perspective ROOTS  (Vienna 29. November 2018  - 30. November 2018 )In: Proceedings of the 2nd Reversing and Offensive-oriented Trends Symposium , New York, NY, USA 2018  10.1145/3289595.3289599 https://github.com/maltek/swift-frida Käppler S. , Maier A. , Riess C. Differential Tomography: Influence of Sensitivity Direction and Noise-suppressing Windows 5th International Conference on Image Formation in X-ray Computed Tomography (CT-Meeting) In: Proceedings of the 5th International Conference on Image Formation in X-ray Computed Tomography (CT-Meeting)  2018  Köhler T. , Bätz M. , Naderi Boldaji F. , Kaup A. , Maier A. , Riess C. Bridging the Simulated-to-Real Gap: Benchmarking Super-Resolution on Real Data 2018 ), Article No.: arXiv:1809.06420 https://arxiv.org/pdf/1809.06420 https://arxiv.org/pdf/1809.06420 Lazard T. , Götzfried J. Müller T. Santinelli G. , Lefebvre V. :TEEshift: Protecting Code Confidentiality by Selectively Shifting Functions into TEEs SysTEX'18  (Toronto, ON, Canada In: 3rd Workshop on System Software for Trusted Execution  2018  10.1145/3268935.3268938 https://www1.cs.fau.de/teeshift Lefebvre V. , Santinelli G. , Müller T. Götzfried J. Universal Trusted Execution Environments for Securing SDN/NFV Operations International Conference on Availability, Reliability and Security  (Hamburg, Germany In: SBA Research (ed.):  ARES 2018: International Conference on Availability, Reliability and Security , Hamburg 2018  10.1145/3230833.3233256 Maene P. Götzfried J. Müller T. de Clercq R. , Freiling F. Verbauwhede I. :Atlas: Application Confidentiality in Compromised Embedded Systems IEEE Transactions on Dependable and Secure Computing 2018 )ISSN: 1545-5971 10.1109/TDSC.2018.2858257 Maier A. , Syben-Leisner C. , Lasser T. , Riess C. A Gentle Introduction to Deep Learning in Medical Image Processing 2018 ), Article No.: arXiv:1810.05401 10.1016/j.zemedi.2018.12.003 https://arxiv.org/pdf/1810.05401 Menges F. , Böhm F. , Vielberth M. , Puchta A. , Taubmann B. , Rakotondravony N. , Latzo T. Introducing DINGfest: An architecture for next generation SIEM systems Jahrestagung des Fachbereichs Sicherheit - Schutz und Zuverlässigkeit der Gesellschaft für Informatik  (Konstanz In: SICHERHEIT 2018 , Bonn 2018  Morgner P. Benenson Z. Exploring Security Economics in IoT Standardization Efforts NDSS-DISS  (San Diego, CA, USA In: Proceedings 2018 NDSS Workshop on Decentralized IoT Security and Standards (DISS)  2018  10.14722/diss.2018.23009 https://www.ndss-symposium.org/wp-content/uploads/2018/07/diss2018_9_Morgner_paper.pdf Morgner P. Freiling F. Benenson Z. Opinion: Security Lifetime Labels -- Overcoming Information Asymmetry in Security of IoT Consumer Products WiSec'18  (Stockholm, Sweden 18. June 2018  - 20. June 2018 )In: Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'18)  2018  10.1145/3212480.3212486 https://dl.acm.org/citation.cfm?id=3212486 Morgner P. Pfennig S. , Salzner D. , Benenson Z. Malicious IoT Implants: Tampering with Serial Communication over the Internet RAID 2018  (Heraklion, Crete, Greece In: Proceedings of the 21st International Symposium on Research in Attacks, Intrusions, and Defenses (RAID 2018)  2018  10.1007/978-3-030-00470-5_25 https://www1.cs.fau.de/filepool/publications/raid2018-malicious-iot-implants.pdf Nemetz S. , Schmitt S. Freiling F. A standardized corpus for SQLite database forensics Digital Investigation 24S 2018 ), p. S121-S130 ISSN: 1742-2876 10.1016/j.diin.2018.01.015 http://dfrws.org/conferences/dfrws-eu-2018/sessions/standardized-corpus-sqlite-database-forensics Palutke R. Freiling F. Styx: Countering robust memory acquisition Digital Investigation 24S 2018 ), p. S18-S28 ISSN: 1742-2876 10.1016/j.diin.2018.01.004 http://dfrws.org/conferences/dfrws-eu-2018/sessions/styx-countering-robust-memory-acquisition Ploner S. , Riess C. Schottenhamml J. , Moult EM. , Waheed NK. , Fujimoto JG. , Maier A. :A Joint Probabilistic Model for Speckle Variance, Amplitude Decorrelation and Interframe Variance (IFV) Optical Coherence Tomography Angiography Bildverarbeitung für die Medizin 2018 - Algorithmen - Systeme - Anwendungen  (Erlangen 11. March 2018  - 13. March 2018 )In: Proceedings des Workshops Bildverarbeitung für die Medizin 2018 - Algorithmen - Systeme - Anwendungen  2018  10.1007/978-3-662-56537-7_37 Polleit P. , Spreitzenbarth M. :Defeating the Secrets of OTP Apps 11th International Conference on IT Security Incident Management & IT Forensics (IMF 2018)  (Hamburg In: IEEE Computer Society (ed.):  Proceedings of the 11th International Conference on IT Security Incident Management & IT Forensics , Los Alamitos, CA, USA 2018  10.1109/IMF.2018.00013 https://faui1-files.cs.fau.de/public/publications/Spreitzenbarth-Polleit-IMF-2018-Defeating_OTP.pdf Reinfelder L. Schankin A. , Russ S. , Benenson Z. An Inquiry into Perception and Usage of Smartphone Permission Models 15th International Conference on Trust, Privacy and Security in Digital Business (TrustBus)  (Regensburg 5. September 2018  - 6. September 2018 )In: TrustBus Conference Proceedings , CHAM 2018  10.1007/978-3-319-98385-1_2 Roessler A. , Cozzolino D. , Verdoliva L. , Riess C. Thies J. , Niessner M. :FaceForensics: A Large-scale Video Dataset for Forgery Detection in Human Faces abs/1803.09179 2018 )http://arxiv.org/abs/1803.09179 Schirrmacher F. Köhler T. , Riess C. Adaptive Quantile Sparse Image (AQuaSI) Prior for Inverse Imaging Problems abs/1804.02152 2018 )10.1109/tci.2019.2956888 http://arxiv.org/abs/1804.02152 Schmitt S. Introducing Anti-Forensics to SQLite Corpora and Tool Testing International Conference on IT Security Incident Management & IT Forensics (IMF 2018)  (Hamburg, Germany In: Proceedings of the 11th International Conference on IT Security Incident Management & IT Forensics , Los Alamitos, CA, USA 2018  10.1109/imf.2018.00014 Seuffert J. , Stamminger M. , Riess C. Towards Forensic Exploitation of 3-D Lighting Environments in Practice Sicherheit 2018  (Konstanz 25. April 2018  - 27. April 2018 )In: Beiträge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft fü}r Informatik e.V. (GI)  2018  10.18420/sicherheit2018_12 Stadlinger J. , Block F. Dewald A. Linux Memory Forensics: Expanding Rekall Userland Investigation 11th International Conference on IT Security Incident Management & IT Forensics (IMF 2018)  (Hamburg In: IEEE Computer Society (ed.):  2018 11th International Conference on IT Security Incident Management & IT Forensics (IMF)  2018  10.1109/IMF.2018.00010 Watson V. , Bajramovic E. Lou X. , Waedt K. :EXAMPLE OF GRADED AND LIFECYCLE PHASE-SPECIFIC SECURITY CONTROLS FOR NUCLEAR I&C AND EPS USE CASES 26th International Conference on Nuclear Engineering (ICONE-26)  (London 22. July 2018  - 26. July 2018 )In: PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE ON NUCLEAR ENGINEERING, 2018, VOL 5 , NEW YORK 2018  10.1115/icone26-81601 Wirth M. , Gradl S. , Poimann D. , Richer R. , Ottmann J. Eskofier B. :Exploring the Feasibility of EMG Based Interaction for Assessing Cognitive Capacity in Virtual Reality 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBC 2018  (Honolulu, HI, USA 18. July 2018  - 21. July 2018 )In: Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS  2018  10.1109/EMBC.2018.8513213 Wirth M. , Gradl S. , Sembdner J. , Kuhrt S. , Eskofier B. :Evaluation of Interaction Techniques for a Virtual Reality Reading Room in Diagnostic Radiology 31st Annual ACM Symposium on User Interface Software and Technology (UIST)  (Berlin 14. October 2018  - 17. October 2018 )In: UIST 2018: PROCEEDINGS OF THE 31ST ANNUAL ACM SYMPOSIUM ON USER INTERFACE SOFTWARE AND TECHNOLOGY , NEW YORK 2018  10.1145/3242587.3242636 Zieger A. Freiling F. Kossakowski KP. :The β-Time-to-Compromise Metric for Practical Cyber Security Risk Estimation 11th International Conference on IT Security Incident Management & IT Forensics (IMF 2018)  (Hamburg In: IEEE Computer Society (ed.):  2018 11th International Conference on IT Security Incident Management & IT Forensics  2018  10.1109/IMF.2018.00017 Übler D. , Götzfried J. Müller T. Secure Remote Computation using Intel SGX Sicherheit, Schutz und Zuverlässigkeit  (Konstanz In: Sicherheit 2018 , Bonn 2018  10.18420/sicherheit2018_16 2017 Benenson Z. Gassmann F. , Landwirth R. :Unpacking Spear Phishing Susceptibility Financial Cryptography and Data Security Workshops In: Targeted Attacks , Malta 2017  Berger M. , Xia Y. , Aichinger W. , Mentl K. , Unberath M. , Aichert A. , Riess C. Hornegger J. , Fahrig R. , Maier A. :Motion Compensation for Cone-Beam CT using Fourier Consistency Conditions Physics in Medicine and Biology 62 2017 ), p. 7181-7215 ISSN: 0031-9155 10.1088/1361-6560/aa8129 https://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2017/Berger17-MCF.pdf Davari A. , Christlein V. , Vesal S. , Maier A. , Riess C. GMM Supervectors for Limited Training Data in Hyperspectral Remote Sensing Image Classification 17th International Conference on Computer Analysis of Images and Patterns  (Ystad 22. August 2017  - 24. August 2017 )In: Proceedings of the 17th International Conference on Computer Analysis of Images and Patterns Part II  2017  10.1007/978-3-319-64698-5_25 Davari A. , Haeberle A. , Riess C. Sketch Layer Separation in Multi-Spectral Historical Document Images International Symposium on Digital Humanities In: International Symposium on Digital Humanities: Book of Abstracts  2017  https://journals.lnu.se/index.php/isdh/article/download/431/378 https://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2017/Davari17-IDHS-TR.pdf Davari A. , Lindenberger T. , Haeberle A. , Christlein V. , Maier A. , Riess C. Image Registration for the Alignment of Digitized Historical Documents abs/1712.04482 2017 )https://arxiv.org/abs/1712.04482 http://arxiv.org/abs/1712.04482 Freiling F. Glanzmann T. , Reiser H. :Characterizing loss of digital evidence due to abstraction layers Forensic Science International: Digital Investigation 20 2017 ), p. 107-115 ISSN: 2666-2817 10.1016/j.diin.2017.01.012 Freiling F. Sack K. :Zur Authentizität und Integrität bei (digitalen) Beweismitteln In: Vieweg, Klaus (ed.):  Festgabe Institut für Recht und Technik: Erlanger Festveranstaltungen 2011 und 2016 Köln Carl Heymanns Verlag 2017 , p. 319-337  (Recht - Technik - Wirtschaft, Vol.111)ISBN: 978-3-452-28832-5  https://faui1-files.cs.fau.de/public/publications/22-Freiling-Sack_RTW-111.pdf Freiling F. Zoubek C. :Do digital investigators have to program? A controlled experiment in digital investigation Digital Investigation 20S 2017 ), p. S37-S46 ISSN: 1742-2876 10.1016/j.diin.2017.01.004 Fürsattel P. , Plank C. , Maier A. , Riess C. Accurate laser scanner to camera calibration with application to range sensor evaluation IPSJ Transactions on Computer Vision and Applications 9 2017 ), p. 21 ISSN: 1882-6695 10.1186/s41074-017-0032-5 Fürsattel P. , Schaller C. , Maier A. , Riess C. Distance error correction for time-of-flight cameras Automated Visual Inspection and Machine Vision II 10.1117/12.2271775 Groß T. Müller T. Protecting JavaScript Apps from Code Analysis SHCIS '17  (Neuchâtel, Switzerland 19. June 2017  - 22. June 2017 )In: 4th Workshop on Security in highly connected IT systems  2017  10.1145/3099012.3099018 Götzfried J. Eckert M. , Schinzel S. , Müller T. Cache Attacks on Intel SGX EuroSec'17  (Belgrade, Serbia In: Proceedings of the Tenth European Workshop on System Security  2017  10.1145/3065913.3065915 https://www1.cs.fau.de/sgx-timing Haupert V. Maier D. , Müller T. Paying the Price for Disruption: How a FinTech Allowed Account Takeover ROOTS  (Vienna, Austria 16. November 2017  - 17. November 2017 )In: Reversing and Offensive-oriented Trends Symposium , New York, NY, USA 2017  10.1145/3150376.3150383 https://www1.cs.fau.de/n26 Haupert V. Müller T. Rest In Protection: A Kernel-Level Approach to Mitigate RIP Tampering ICISSP 2017  (Porto 19. February 2017  - 21. February 2017 )In: Mori, Paolo ; Furnell, Steven ; Camp, Olivier (ed.):  Proceedings of the 3rd International Conference on Information Systems Security and Privacy , Setúbal 2017  10.5220/0006083800250037 Hoffmann J. , Haupert V. Freiling F. Anscheinsbeweis und Kundenhaftung beim Online-Banking Zeitschrift für das gesamte Handelsrecht und Wirtschaftsrecht 181 2017 ), p. 780-816 ISSN: 0044-2437 Horn F. , Gelse K. , Jabari S. , Hauke C. , Käppler S. , Ludwig V. , Meyer P. , Michel T. , Mohr J. , Pelzer G. , Rieger J. , Riess C. Seifert M. , Anton G. :High-Energy X-Ray Talbot-Lau Radiography of a Human Knee Physics in Medicine and Biology 62 2017 ), p. 6729-6745 ISSN: 0031-9155 10.1088/1361-6560/aa7721 http://iopscience.iop.org/article/10.1088/1361-6560/aa7721/ Kalysch A. Götzfried J. Müller T. VMAttack: Deobfuscating Virtualization-Based Packed Binaries ARES'17  (Reggio Calabria, Italy 29. August 2017  - 1. September 2017 )In: 12th International Conference on Availability, Reliability and Security  2017  10.1145/3098954.3098995 https://dl.acm.org/citation.cfm?doid=3098954.3098995 Käppler S. , Rieger J. , Pelzer G. , Horn F. , Michel T. , Maier A. , Anton G. , Riess C. Improved Reconstruction of Phase-Stepping Data for Talbot-Lau X-Ray Imaging Journal of Medical Imaging 4 2017 ), Article No.: 034005 ISSN: 2329-4310 10.1117/1.JMI.4.3.034005 https://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2017/Kaeppler17-IRO.pdf Käppler S. , Seifert M. , Horn F. , Pelzer G. , Rieger J. , Michel T. , Maier A. , Anton G. , Riess C. Talbot-Lau X-ray phase contrast for tiling-based acquisitions without reference scanning Medical Physics 44 2017 ), p. 1886-1898 ISSN: 0094-2405 10.1002/mp.12200 Köhler T. , Bätz M. , Naderi Boldaji F. , Kaup A. , Maier A. , Riess C. Benchmarking Super-Resolution Algorithms on Real Data abs/1709.04881 2017 )https://arxiv.org/abs/1709.04881 http://arxiv.org/abs/1709.04881 Lorch B. Vaillant G. , Baumgartner C. , Bai W. , Rueckert D. , Maier A. :Automated Detection of Motion Artefacts in MR Imaging Using Decision Forests. Journal of Medical Engineering 2017 2017 ), Article No.: 4501647 ISSN: 2314-5129 10.1155/2017/4501647 Maene P. Götzfried J. de Clercq R. , Müller T. Freiling F. Verbauwhede I. :Hardware-Based Trusted Computing Architectures for Isolation and Attestation IEEE Transactions on Computers 2017 )ISSN: 0018-9340 10.1109/TC.2017.2647955 Morgner P. Mattejat S. , Benenson Z. Müller C. Armknecht F. :Insecure to the Touch: Attacking ZigBee 3.0 via Touchlink Commissioning WiSec'17  (Boston, MA In: Proceedings of the 10th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec'17)  2017  10.1145/3098243.3098254 https://www1.cs.fau.de/filepool/publications/wisec2017_touchlink.pdf Morgner P. Müller C. Ring M. , Eskofier B. , Riess C. Armknecht F. , Benenson Z. Privacy Implications of Room Climate Data In: Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS 2017)  2017  10.1007/978-3-319-66399-9_18 https://faui1-files.cs.fau.de/filepool/publications/esorics2017_privacy_room_climate.pdf Mullan P. Cozzolino D. , Verdoliva L. , Riess C. Residual-based forensic comparison of video sequences IEEE International Conference on Image Processing  (Beijing 17. September 2017  - 20. September 2017 )In: IEEE International Conference on Image Processing  2017  10.1109/ICIP.2017.8296533 Noorman J. , Van Bulck J. , Muhlberg JT. , Piessens F. , Maene P. Preneel B. , Verbauwhede I. , Götzfried J. Müller T. Freiling F. Sancus 2.0: A Low-Cost Security Architecture for IoT Devices ACM Transactions on Privacy and Security 20 2017 ), Article No.: 7 ISSN: 2471-2566 10.1145/3079763 http://doi.acm.org/10.1145/3079763 Reinfelder L. Benenson Z. Exploring Security Processes in Organizations: the Case of Smartphones MuC Workshop Usable Security and Privacy  (Regensburg In: Mensch und Computer (MuC) 2017 - Workshopband  2017  10.18420/muc2017-ws05-0403 http://dl.mensch-und-computer.de/handle/123456789/5361 Riess C. Illumination analysis in physics-based image forensics: A joint discussion of illumination direction and color 28th Tyrrhenian International Workshop on Digital Communications, TIWDC 2017 10.1007/978-3-319-67639-5_9 de Clercq R. , Götzfried J. Übler D. , Maene P. Verbauwhede I. :SOFIA: Software and Control Flow Integrity Architecture Computers & Security 68 2017 ), p. 16-35 ISSN: 0167-4048 10.1016/j.cose.2017.03.013 2016 Armknecht F. , Benenson Z. Morgner P. Müller C. On the Security of the ZigBee Light Link Touchlink Commissioning Procedure International Workshop on Security, Privacy and Reliability of Smart Buildings  (Bonn In: International Workshop on Security, Privacy and Reliability of Smart Buildings  2016  https://dl.gi.de/bitstream/handle/20.500.12116/874/229.pdf Bauer J. , Freiling F. Towards Cycle-Accurate Emulation of Cortex-M Code to Detect Timing Side Channels ARES  (Salzburg In: 11th International Conference on Availability, Reliability and Security  2016  Bauer J. , Gruhn M. , Freiling F. Lest We Forget: Cold-Boot Attacks on Scrambled DDR3 Memory Digital Investigation 16 2016 ), p. 65-74 ISSN: 1742-2876 10.1016/j.diin.2016.01.009 https://www.dfrws.org/conferences/dfrws-eu-2016/sessions/lest-we-forget-cold-boot-attacks-scrambled-ddr3-memory Bauer J. , Schinzel S. , Freiling F. Dewald A. Information Leakage behind the Curtain: Abusing Anti-EMI Features for Covert Communication IEEE International Symposium on Hardware Oriented Security and Trust  (McLean, VA, USA 3. May 2016  - 5. May 2016 )In: Proceedings of HOST 2016  2016  10.1109/HST.2016.7495570 Drescher G. , Erhardt C. , Freiling F. Götzfried J. Lohmann D. , Maene P. Müller T. Verbauwhede I. , Weichslgartner A. , Wildermann S. :Providing security on demand using invasive computing it - Information Technology 58 2016 ), p. 281-295 ISSN: 1611-2776 10.1515/itit-2016-0032 Freiling F. Staatliche Spähsoftware zur Strafverfolgung Informatik-Spektrum 39 2016 ), p. 203-209 ISSN: 0170-6012 10.1007/s00287-015-0912-y Gruhn M. , Freiling F. Evaluating Atomicity, and Integrity of Correct Memory Acquisition Methods Digital Investigation 16 2016 ), p. 1-10 ISSN: 1742-2876 10.1016/j.diin.2016.01.003 http://www.dfrws.org/2016eu/proceedings/DFRWS-EU-2016-1.pdf Götzfried J. Dörr N. , Palutke R. Müller T. HyperCrypt: Hypervisor-based Encryption of Kernel and User Space ARES'16  (Salzburg, Austria 31. August 2016  - 2. September 2016 )In: 11th International Conference on Availability, Reliability and Security  2016  10.1109/ARES.2016.13 https://www1.cs.fau.de/hypercrypt Götzfried J. Müller T. Drescher G. , Nürnberger S. , Backes M. :RamCrypt: Kernel-based Address Space Encryption for User-mode Processes ASIACCS'16  (Xi'an, China In: 11th ACM Asia Conference on Computer and Communications Security , New York 2016  10.1145/2897845.2897924 https://www1.cs.fau.de/ramcrypt Haupert V. Müller T. Auf dem Weg verTAN: Über die Sicherheit App-basierter TAN-Verfahren Sicherheit, Schutz und Zuverlässigkeit  (Bonn 5. April 2016  - 7. April 2016 )In: Meier Michael, Reinhardt Delphine, Wendzel Steffen (ed.):  Konferenzband der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) , Bonn 2016  https://dl.gi.de/handle/20.500.12116/859 https://www1.cs.fau.de/appTAN Kurtz A. Gascon H. , Becker T. , Rieck K. , Freiling F. Fingerprinting Mobile Devices Using Personalized Configurations Proceedings on Privacy Enhancing Technologies 2016 ), p. 4-19 ISSN: 2299-0984 Morgner P. Mattejat S. , Benenson Z. All Your Bulbs Are Belong to Us: Investigating the Current State of Security in Connected Lighting Systems 2016 )https://arxiv.org/abs/1608.03732 Richter L. , Götzfried J. Müller T. Isolating Operating System Components with Intel SGX SysTEX'16  (Trento, Italy In: 1st Workshop on System Software for Trusted Execution  2016  10.1145/3007788.3007796 https://www1.cs.fau.de/sgx-kernel Seifert M. , Käppler S. , Hauke C. , Horn F. , Pelzer G. , Rieger J. , Michel T. , Riess C. Anton G. :Optimisation of Image Reconstruction for Phase-Contrast X-Ray Talbot-Lau Imaging with regard to Mechanical Robustness Physics in Medicine and Biology 61 2016 ), p. 6441-6464 ISSN: 0031-9155 10.1088/0031-9155/61/17/6441 http://iopscience.iop.org/article/10.1088/0031-9155/61/17/6441/meta Stritter B. Freiling F. König H. , Rietz R. , Ullrich S. , von Gernler A. , Erlacher F. , Dressler F. :Cleaning up Web 2.0's Security Mess-at Least Partly IEEE Security & Privacy 14 2016 ), p. 48-57 ISSN: 1540-7993 10.1109/MSP.2016.31 Sänger J. , Hänsch N. Glass B. , Benenson Z. Landwirth R. , Sasse AM. :Look Before You Leap: Improving the Users Ability to Detect Fraud in Electronic Marketplaces CHI 2016 In: SIGCHI Conference on Human Factors in Computing Systems , San Jose, CA, USA 2016  https://www1.informatik.uni-erlangen.de/filepool/publications/zina/look-beore-you-leap-chi16.pdf Weichslgartner A. , Wildermann S. , Götzfried J. Freiling F. Glaß M. , Teich J. :Design-Time/Run-Time Mapping of Security-Critical Applications in Heterogeneous MPSoCs 19th International Workshop on Software and Compilers for Embedded Systems (SCOPES)  (St. Goar 23. May 2016  - 25. May 2016 )In: In Proceedings of the 19th International Workshop on Software and Compilers for Embedded Systems (SCOPES)  2016  10.1145/2906363.2906370 Würstlein A. , Gernoth M. , Götzfried J. Müller T. Exzess: Hardware-based RAM encryption against physical memory disclosure 29th International Conference on Architecture of Computing Systems, ARCS 2016 10.1007/978-3-319-30695-7_5 https://www4.cs.fau.de/~arw/exzess 2015 Anikeev M. , Freiling F. Götzfried J. Müller T. Secure garbage collection: Preventing malicious data harvesting from deallocated Java objects inside the Dalvik VM In: Journal of Information Security and Applications Amsterdam Elsevier 2015  10.1016/j.jisa.2014.10.001 Bauer J. , Freiling F. Schutz eingebetteter Systeme gegen physische Angriffe DACH Security 2015  (Bonn In: DACH Security 2015 -- Bestandsaufnahme - Konzepte - Anwendungen - Perspektiven  2015  Benenson Z. Girard A. , Krontiris I. :User acceptance factors for anonymous credentials: An empirical investigation WEIS  (Delft, The Netherlands In: Workshop on the Economics of Information Security  2015  http://weis2015.econinfosec.org/papers/WEIS_2015_benenson.pdf Benenson Z. Lenzini G. , Oliveira D. , Parkin S. , Übelacker S. :Maybe Poor Johnny Really Cannot Encrypt - The Case for a Complexity Theory for Usable Security NSPW  (Twente, The Netherlands In: New Security Paradigms Workshop  2015  Brodowski D. , Freiling F. Cyberkriminalität - Erscheinungsformen, Entwicklungslinien, Herausforderungen FIfF-Kommunikation 2015 ), p. 22-26 ISSN: 0938-3476 Brodowski D. , Freiling F. Transnationale Cyberkriminalität vs. nationale Strafverfolgung: Mögliche Auswege aus einem grundsätzlichen Dilemma FIfF-Kommunikation 2015 ), p. 36-39 ISSN: 0938-3476 Freiling F. Offener und verdeckter Einsatz technischer Ermittlungswerkzeuge zwischen Theorie und Praxis In: Steiger, Saskia ; Schiller, Jochen ; Gerhold, Lars (ed.):  Sicherheitsforschung im Dialog Frankfurt am Main Peter Lang 2015 , p. 131-144 ISBN: 978-3-631-65848-2  Freiling F. Gruhn M. :What is essential data in digital forensic analysis? 9th International Conference on IT Security Incident Management & IT Forensics  (Magdeburg In: Proceedings of the 9th International Conference on IT Security Incident Management & IT Forensics  2015  10.1109/IMF.2015.20 Freiling F. Schuhr J. , Gruhn M. :What is essential data in digital forensic analysis? it - Information Technology 57 2015 ), p. 376-383 ISSN: 1611-2776 10.1515/itit-2015-0016 Götzfried J. Hampel J. , Müller T. Physically Secure Code and Data Storage in Autonomously Booting Systems (Short Paper) ARES'15  (Toulouse, France In: 10th International Conference on Availability, Reliability and Security  2015  10.1109/ARES.2015.19 Götzfried J. Müller T. de Clercq R. , Maene P. Freiling F. Verbauwhede I. :Soteria: Offline Software Protection within Low-cost Embedded Devices ACSAC'15  (Los Angeles, California, USA In: Proceedings of the 31th Annual Computer Security Applications Conference  2015  10.1145/2818000.2818013 https://www1.cs.fau.de/soteria Krontiris I. , Benenson Z. Girard A. , Sabouri A. , Rannenberg K. , Schoo P. :Privacy-ABCs as a Case for Studying the Adoption of PETs by Users and Service Providers Annual Privacy Forum  (Luexembourg In: Annual Privacy Forum , Heidelberg 2015  Lorch B. Berger M. , Hornegger J. , Maier A. :Projection and Reconstruction-Based Noise Filtering Methods in Cone Beam CT Bildverarbeitung für die Medizin 2015  (Lübeck In: Bildverarbeitung für die Medizin 2015  2015  https://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2015/Lorch15-PAR.pdf Morgner P. Benenson Z. Müller C. Armknecht F. :Design Space of Smart Home Networks from a Security Perspective 14. GI/ITG KuVS Fachgespräch Sensornetze der GI/ITG Fachgruppe Kommunikation und Verteilte Systeme  (Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU) In: Proceedings of the 14. GI/ITG KuVS Fachgespräch Sensornetze  2015  https://opus4.kobv.de/opus4-fau/files/6617/report.pdf Mullan P. Kanzler C. , Lorch B. Schroeder L. , Winkler L. , Larissa L. , Riedel F. , Richer R. , Luckner C. , Leutheuser H. , Eskofier B. , Pasluosta CF. :Unobtrusive Heart Rate Estimation during Physical Exercise using Photoplethysmographic and Acceleration Data 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society EMBC ’15  (Milano In: 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society EMBC ’15  2015  Pugliese G. Web Tracking: Overview and Applicability in Digital Investigations it - Information Technology 57 2015 ), p. 366–375 ISSN: 1611-2776 10.1515/itit-2015-0015 Riess C. Kirchner M. , Schoettle P. :Thinking beyond the block: block matching for copy-move forgery detection revisited SPIE Media Watermarking, Security, and Forensics  (San Francisco 9. February 2015  - 11. February 2015 )In: Media Watermarking, Security, and Forensics 2015  2015  10.1117/12.2082789 Zhuang Y. , Freiling F. Approximating Optimal Software Obfuscation for Android Applications 2nd Workshop on Security in Highly Connected IT Systems (SHCIS 2015)  (Vienna, Austria In: Proceedings 2nd Workshop on Security in Highly Connected IT Systems , Piscataway, NJ, USA 2015  2014 Benenson Z. Girard A. , Krontiris I. , Liagkou V. , Rannenberg K. , Stamatiou Y. :User Acceptance of Privacy-ABCs: An Exploratory Study HCI International 2014  (Crete, Greece 22. June 2014  - 27. June 2014 )In: Human Aspects of Information Security, Privacy and Trust  2014  10.1007/978-3-319-07620-1_33 Benenson Z. Hintz N. , Girard A. , Luder A. :Susceptibility to URL-based Internet Attacks: Facebook vs. Email SESOC'14  (Budapest, Hungary 24. March 2014  - 28. March 2014 )In: 6th IEEE International Workshop on SEcurity and SOCial Networking  2014  10.1109/PerComW.2014.6815275 Brodowski D. , Dewald A. Freiling F. Kovacs S. , Rieger M. :Drei Jahre Master Online Digitale Forensik: Ergebnisse und Erfahrungen Sicherheit 2014 – Sicherheit, Schutz und Zuverlässigkeit  (Wien In: Katzenbeisser, S., Lotz, V., Weippl, E. (ed.):  Sicherheit 2014 – Sicherheit, Schutz und Zuverlässigkeit , Bonn 2014  https://dl.gi.de/handle/20.500.12116/20059 Dewald A. Freiling F. From Computer Forensics to Forensic Computing: Investigators Investigate, Scientists Associate 2014 2014 ), p. 10 ISSN: 2191-5008 http://nbn-resolving.de/urn:nbn:de:bvb:29-opus4-47508 http://nbn-resolving.de/urn:nbn:de:bvb:29-opus4-47508 Freiling F. Protsenko M. , Zhuang Y. :An Empirical Evaluation of Software Obfuscation Techniques applied to Android APKs DAPRO 2014  (Beijing, China In: International Conference on Security and Privacy in Communication Networks  2014  10.1007/978-3-319-23802-9_24 Freiling F. Sack K. :Selektive Datensicherungen in der IT-Forensik Datenschutz und Datensicherheit 38 2014 ), p. 112-117 ISSN: 1614-0702 Freiling F. Saglietti F. , Grimm R. , Großpietsch KE. , Keller H. , Mottok J. , Münch I. , Rannenberg K. :Technische Sicherheit und Informationssicherheit: Unterschiede und Gemeinsamkeiten Informatik-Spektrum 37 2014 ), p. 14-24 ISSN: 0170-6012 10.1007/s00287-013-0748-2 Götzfried J. Müller T. Analysing Android's Full Disk Encryption Feature Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 5 2014 ), p. 84-100 ISSN: 2093-5374 Götzfried J. Müller T. Mutual Authentication and Trust Bootstrapping towards Secure Disk Encryption ACM Transactions on Information and System Security 17 2014 )ISSN: 1094-9224 10.1145/2663348 https://www1.cs.fau.de/mark Hänsch N. Benenson Z. Specifying IT security awareness 1st Workshop on Security in highly connected IT systems  (Munich, Germany 1. September 2014  - 4. September 2014 )In: SHCIS14  2014  10.1109/DEXA.2014.71 Kurtz A. Troßbach M. , Freiling F. Snoop-it: Dynamische Analyse und Manipulation von Apple iOS Apps 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI)  (Wien In: Sicherheit 2014 -- Sicherheit, Schutz und Zuverlässigkeit , Bonn 2014  Kurtz A. Weinlein A. , Settgast C. , Freiling F. DiOS: Dynamic Privacy Analysis of iOS Applications 2014 ), col. 17 https://opus4.kobv.de/opus4-fau/frontdoor/index/index/searchtype/series/id/9/start/1/rows/20/yearfq/2014/docId/4755 https://opus4.kobv.de/opus4-fau/frontdoor/index/index/searchtype/series/id/9/start/1/rows/20/yearfq/2014/docId/4755 Müller T. Freiling F. A Systematic Assessment of the Security of Full Disk Encryption IEEE Transactions on Dependable and Secure Computing 12 2014 ), p. 491-503 ISSN: 1545-5971 10.1109/TDSC.2014.2369041 Reinfelder L. Benenson Z. Gassmann F. :Differences between Android and iPhone users in their security and privacy awareness 11th International Conference on Trust, Privacy & Security in Digital Business - TrustBus 2014  (Munich 2. September 2014  - 3. September 2014 )In: TrustBus  2014  10.1007/978-3-319-09770-1_14 Zhuang Y. , Protsenko M. , Müller T. Freiling F. An(other) Exercise in Measuring the Strength of Source Code Obfuscation DEXA Workshops  (Munich, Germany In: 1st Workshop on Security in highly connected IT systems  2014  10.1109/DEXA.2014.69 2013 Benenson Z. Christin D. , De Luca A. , Fischer-Hübner S. , Heimann T. , Meyer J. :Consequence-based Privacy Decisions: a New Way to Better Privacy Management 'My Life, Shared' - Trust and Privacy in the Age of Ubiquitous Experience Sharing (Dagstuhl Seminar 13312)  (Dagstuhl, Germany In: 'My Life, Shared' - Trust and Privacy in the Age of Ubiquitous Experience Sharing (Dagstuhl Seminar 13312) , Dagstuhl, Germany 2013  10.4230/DagRep.3.7.74 http://drops.dagstuhl.de/opus/volltexte/2013/4307 Benenson Z. Gassmann F. , Reinfelder L. Android and iOS users' differences concerning security and privacy CHI'13  (New York, NY, USA In: CHI '13 Extended Abstracts on Human Factors in Computing Systems  2013  http://doi.acm.org/10.1145/2468356.2468502 Benenson Z. Krontiris I. , Rannenberg K. , Liagkou V. , Schopf A. , Schröder D. , Stamatiou Y. :Understanding and Using Anonymous Credentials Symposium On Usable Privacy and Security, Poster Session  (Newcastle, UK In: Symposium On Usable Privacy and Security, Poster Session  2013  http://cups.cs.cmu.edu/soups/2013/posters/soups13_posters-final24.pdf Benenson Z. Reinfelder L. Should the Users be Informed? On Differences in Risk Perception between Android and iPhone Users Workshop on Risk Perception in IT Security and Privacy  (Newcastle, UK In: Workshop on Risk Perception in IT Security and Privacy  2013  http://cups.cs.cmu.edu/soups/2013/risk/soups13-risk-perception-Android-vs-iPhone.pdf Carvalho T. , Riess C. Angelopoulou E. , Pedrini H. , Rocha A. :Exposing Digital Image Forgeries by Illumination Color Classification IEEE Transactions on Information Forensics and Security 8 2013 ), p. 1182--1194 ISSN: 1556-6013 10.1109/TIFS.2013.2265677 Christlein V. , Riess C. Angelopoulou E. , Evangelopoulos G. , Kakadiaris I. :The Impact of Specular Highlights on 3D-2D Face Recognition Biometric and Surveillance Technology for Human and Activity Identification X  (Baltimore, MD 2. May 2013  - 2. May 2013 )In: SPIE (ed.):  Biometric and Surveillance Technology for Human and Activity Identification  2013  10.1117/12.2019014 http://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2013/Christlein13-TIO.pdf Dewald A. Freiling F. Schmitt S. Spreitzenbarth M. , Vömel S. :Systematische Probleme und Grenzen der forensischen Informatik In: Gaycken, Sandro (ed.):  Jenseits von 1984: Datenschutz und Überwachung in der fortgeschrittenen Informationsgesellschaft. Eine Versachlichung Bielefeld Transcript-Verlag 2013 , p. 101-117 ISBN: 3837620034  Götzfried J. Müller T. ARMORED: CPU-bound Encryption for Android-driven ARM Devices ARES 2013  (Regensburg 2. September 2013  - 6. September 2013 )In: Proceedings of the 8th International Conference on Availability, Reliability and Security  2013  10.1109/ARES.2013.23 https://www1.cs.fau.de/armored Götzfried J. Müller T. Fast Software Encryption with SIMD (How to speed up symmetric block ciphers with the AVX/AVX2 instruction set) EUROSEC 2013  (Prag In: Proceedings of the Third European Workshop on System Security  2013  https://www1.cs.fau.de/avx.crypto Hintz N. , Benenson Z. Faktoren des datenschutzbewussten Verhaltens in Facebook DACH Security 2013  (Nürnberg In: DACH Security 2013  2013  http://www.syssec.at/ds13_programm/ Kurtz A. Freiling F. Metz D. :Usability vs. Security: The Everlasting Trade-Off in the Context of Apple iOS Mobile Hotspots 2013 ), p. 10 ISSN: 2191-5008 http://www.opus.ub.uni-erlangen.de/opus/frontdoor.php?source_opus=4755 http://www.opus.ub.uni-erlangen.de/opus/frontdoor.php?source_opus=4755 Kälber S. , Dewald A. Freiling F. Forensic Application-Fingerprinting based on file system Metadata 7th International Conference on  IT Security Incident Management & IT Forensics (IMF)  (Nuremberg 12. March 2013  - 14. March 2013 )In: Proceedings of the 7th International Conference on  IT Security Incident Management & IT Forensics  2013  10.1109/IMF.2013.20 Maier A. , Jiang Z. , Jordan JM. , Riess C. Hofmann H. , Hornegger J. :Atlas-Based Linear Volume-of-Interest (ABL-VOI) Image Correction Medical Imaging 2013: Physics of Medical Imaging  (Lake Buena Vista, FL In: SPIE (ed.):  Medical Imaging 2013: Physics of Medical Imaging  2013  10.1117/12.2006843 http://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2013/Maier13-ALV.pdf Meyer M. , Riess C. Angelopoulou E. , Evangelopoulos G. , Kakadiaris I. :Color Constancy in 3D-2D Face Recognition Biometric and Surveillance Technology for Human and Activity Identification X  (Baltimore, MD 2. May 2013  - 2. May 2013 )In: SPIE (ed.):  Biometric and Surveillance Technology for Human and Activity Identification  2013  10.1117/12.2018758 http://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2013/Meyer13-CCI.pdf Morgenstern H. , Ehlert R. , Freiling F. Frings S. , Göbel O. , Günther D. , Kiltz S. , Nedon J. , Schadt D.  (ed.):Seventh International Conference on IT Security Incident Management and IT Forensics Los Alamitos, CA 2013 ISBN: 978-1-4673-6307-5 Müller T. Spath H. , Mäckl R. , Freiling F. STARK Tamperproof Authentication to Resist Keylogging Financial Cryptography and Data Security 2013  (Okinawa, Japan 1. April 2013  - 5. April 2013 )In: Proceedings of FC2013  2013  10.1007/978-3-642-39884-1_25 Spreitzenbarth M. , Freiling F. Echtler F. , Schreck T. , Hoffmann J. :MobileSandbox: Looking Deeper into Android Applications ACM Symposium on Applied Computing 2013  (Coimbra, Portugal In: Proceedings of the 28th Symposium On Applied Computing (SAC 2013)  2013  10.1145/2480362.2480701 Stüttgen J. , Dewald A. Freiling F. Selective Imaging Revisited 7th International Conference on  IT Security Incident Management & IT Forensics (IMF)  (Nuremberg 12. March 2013  - 14. March 2013 )In: Proceedings of the 7th International Conference on  IT Security Incident Management & IT Forensics  2013  10.1109/IMF.2013.16 Wundram M. , Freiling F. Moch C. :Anti-forensics: The Next Step in Digital Forensics Tool Testing 7th International Conference on IT Security Incident Management & IT Forensics  (Nuremberg 12. March 2013  - 14. March 2013 )In: Proceedings of the 7th International Conference on IT Security Incident Management & IT Forensics  2013  10.1109/IMF.2013.17 2012 Atkinson C. , Barth F. , Gerbig R. , Freiling F. Schinzel S. , Hadasch F. , Mädche A. , Müller B. :Reducing the Incidence of Unintended, Human-Caused Information Flows in Enterprise Systems EDOC Workshops, 3M4SE  (Beijing, China 10. September 2012  - 14. September 2012 )In: Third International Workshop on Models and Model-driven Methods for Service Engineering (3M4SE 2012) , Bejing, China 2012  10.1109/EDOCW.2012.12 Benenson Z. Hintz N. , Kroll-Peters O. , Krupp M. :Attitudes to IT-Security When Using a Smartphone Symposium On Usable Privacy and Security 2012  (Washington 9. September 2012  - 12. September 2012 )In: SOUPS  2012  http://cups.cs.cmu.edu/soups/2012/program.html Benenson Z. Kroll-Peters O. , Krupp M. :Mentale Modelle der IT-Sicherheit bei der Nutzung mobiler Endgeräte Sicherheit 2012: Sicherheit, Schutz und Zuverlässigkeit  (Darmstadt In: Sicherheit 2012: Sicherheit, Schutz und Zuverlässigkeit , Bonn 2012  Bäcker M. , Dewald A. Freiling F. Schmitt S. Kriterien für die Priorisierung bei der Sicherung und Analyse digitaler Spuren Datenschutz und Datensicherheit 36 2012 ), p. 597-602 ISSN: 1614-0702 10.1007/s11623-012-0187-2 Cortinas R. , Freiling F. Ghajar-Azadanlou M. , Lafuente A. , Larrea M. , Draque Penso L. , Soraluze I. :Secure Failure Detection and Consensus in TrustedPals IEEE Transactions on Dependable and Secure Computing 9 2012 ), p. 608-623 ISSN: 1545-5971 10.1109/TDSC.2012.23 Dewald A. Freiling F. Is Computer Forensics a Forensic Science? Current Issues in IT Security 2012  (Freiburg i. Br., Germany In: Jochen Jähnke, Nicolas von zur Mühlen, Klaus Rechert, Dirk von Suchodoletz (ed.):  Proceedings of Current Issues in IT Security 2012  2012  https://www.duncker-humblot.de/buch/current-issues-in-it-security-2012-9783428138876/?page_id=0&typ=buc Dewald A. Freiling F. Schreck T. , Spreitzenbarth M. , Stüttgen J. , Vömel S. , Willems C. :Analyse und Vergleich von BckR2D2-I und II Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI)  (Darmstadt, Germany In: Neeraj Suri, Michael Waidner (ed.):  Sicherheit 2012: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI)  2012  Freiling F. Was ist eine Quellentelekommunikationsüberwachung? FIfF-Kommunikation 2012 2012 ), p. 16-17 ISSN: 0938-3476 https://faui1-files.cs.fau.de/public/publications/fiff-2012-01-qtkue-freiling.pdf Gollmann D. , Freiling F. Information Security Berlin 2012 ISBN: 978-3-642-33382-8 10.1007/978-3-642-33383-5 Hintz N. , Benenson Z. Strufe T. :Friendship in German Online Social Networks Symposium On Usable Privacy and Security 2012  (Washington In: SOUPS  2012  http://cups.cs.cmu.edu/soups/2012/ Müller T. Taubmann B. , Freiling F. TreVisor -- OS-Independent Software-Based Full Disk Encryption Secure Against Main Memory Attacks ACNS 2012  (Singapur 26. June 2012  - 29. June 2012 )In: International Conference on Applied Cryptography and Network Security  2012  10.1007/978-3-642-31284-7_5 http://www1.cs.fau.de/trevisor Riess C. Strehl V. , Wanka R. :The Spectral Relation between the Cube-Connected Cycles and the Shuffle-Exchange Network 10th Workshop on Parallel Systems and Algorithms (PASA) of the 25th Int. Conf. on Architecture of Computing Systems (ARCS)  (München In: GI (ed.):  Proc. 10th Workshop on Parallel Systems and Algorithms (PASA) of the 25th Int. Conf. on Architecture of Computing Systems (ARCS)  2012  Spreitzenbarth M. , Freiling F. Android Malware on the Rise 2012 )ISSN: 2191-5008 https://opus4.kobv.de/opus4-fau/files/2210/CS_2012_04.pdf Spreitzenbarth M. , Schmitt S. Freiling F. Comparing Sources of Location Data from Android Smartphones 8th IFIP WG 11.9 International Conference on Digital Forensics  (Pretoria In: 8th Annual IFIP WG 11.9 International Conference on Digital Forensics  2012  10.1007/978-3-642-33962-2_10 Spreitzenbarth M. , Schmitt S. Freiling F. Comparing Sources of Location Data from Android Smartphones In: Peterson, Bert ; Shenoi, Sujeet (ed.):  Advances in  Digital Forensics VIII New York Springer Verlag 2012 , p. 143-157 ISBN: 9783642339615  10.1007/978-3-642-33962-2_10 Vömel S. , Freiling F. Correctness, Atomicity, and Integrity: Defining Criteria for Forensically-Sound Memory Acquisition Digital Investigation 9 2012 ), p. 125-137 ISSN: 1742-2876 10.1016/j.diin.2012.04.005 Willems C. , Freiling F. Reverse Code Engineering - State of the Art and Countermeasures it - Information Technology 54 2012 ), p. 53-64 ISSN: 1611-2776 10.1524/itit.2012.0664 Zimmermann C. , Spreitzenbarth M. , Schmitt S. Freiling F. Forensic Analysis of YAFFS2 GI Sicherheit 2012  (Darmstadt, Germany In: Proceedings of GI Sicherheit 2012  2012  https://dl.gi.de/handle/20.500.12116/18263 https://dl.gi.de/handle/20.500.12116/18263 2011 Brodowski D. , Freiling F. Cyberkriminalität, Computerstrafrecht und die digitale Schattenwirtschaft 2011 ISBN: 978-3-929619-66-9 http://www.sicherheit-forschung.de/schriftenreihe/sr_v_v/sr_4.pdf Dewald A. Freiling F. Forensische Informatik Norderstedt Books on Demand 2011 ISBN: 978-3-8423-7947-3 http://www.bod.de/index.php?id=296&objk_id=572434 Dewald A. Freiling F. Schreck T. , Spreitzenbarth M. , Stüttgen J. , Vömel S. , Willems C. :Analyse und Vergleich von BckR2D2-I und II CS-2011,8 2011 ), p. 12 http://www.opus.ub.uni-erlangen.de/opus/volltexte/2012/3036/ http://www.opus.ub.uni-erlangen.de/opus/volltexte/2012/3036/ Dewald A. Freiling F. Weber T. :Design and Implementation of a Documentation Tool for interactive Commandline Sessions Sixth International Conference on IT Security Incident Management and IT Forensics  (Stuttgart 10.1109/IMF.2011.17 Engelberth M. , Freiling F. Göbel J. , Gorecki C. , Holz T. , Hund R. , Trinius P. , Willems C. :Das Internet-Malware-Analyse-System (InMAS) Datenschutz und Datensicherheit 35 2011 ), p. 247-252 ISSN: 1614-0702 Freiling F. Kuznetsov P. , Guerraoui R. :The Failure Detector Abstraction ACM Computing Surveys 43 2011 ), p. 1-9 ISSN: 0360-0300 10.1145/1883612.1883616 Freiling F. Schmitt S. Spreitzenbarth M. :Forensic Analysis of Smartphones: The Android Data Extractor Lite (ADEL) The 2011 ADFSL Conference on Digital Forensics, Security and Law  (Richmond, Virginia In: Conference on Digital Forensics, Security and Law  2011  Freiling F. Soraluze I. , Larrea M. , Lafuente A. , Cortinas R. :Communication-efficient failure detection and consensus in omission environments Information Processing Letters 111 2011 ), p. 262-268 ISSN: 0020-0190 10.1016/j.ipl.2010.12.008 Gorecki C. , Freiling F. Kührer M. , Holz T. :TrumanBox: Improving Dynamic Malware Analysis by Emulating the Internet Stabilization, Safety, and Security of Distributed Systems  (Grenoble 10. October 2011  - 12. October 2011 )In: Proceedings of the 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems , Berlin 2011  10.1007/978-3-642-24550-3_17 Knaus A. , Stüttgen J. , Göbel J. , Engelberth M. , Freiling F. Säuberung eines infizierten Windows-Betriebssystems auf Basis von Malware-Analyse-Berichten Informatik 2011  (Berlin In: GI-Edition-Lecture Notes in Informatics  2011  https://dl.gi.de/handle/20.500.12116/18838 https://dl.gi.de/handle/20.500.12116/18838 Müller T. Freiling F. Dewald A. TRESOR Runs Encryption Securely Outside RAM 20th USENIX Security Symposium  (San Francisco, CA In: Proceedings of the 20th USENIX Security Symposium  2011  http://usenix.org/events/sec11/tech/full_papers/Muller.pdf http://www1.cs.fau.de/tresor Vömel S. , Freiling F. A Survey of Main Memory Acquisition and Analysis Techniques for the Windows Operating System Digital Investigation 8 2011 ), p. 3-22 ISSN: 1742-2876 10.1016/j.diin.2011.06.002 2010 Benenson Z. Freiling F. Bestehorn M. , Böhm K. , Buchmann E. , Jawurek M. :Query Dissemination in Sensor Networks - Predicting Reachability and Energy Consumption Ad Hoc & Sensor Wireless Networks In: Ad Hoc & Sensor Wireless Networks Vol. 9 , Philadelphia 2010  http://www.ipd.uni-karlsruhe.de/~buchmann/pdfs/bestehorn09qdiss-predicting.pdf Benenson Z. Freiling F. Blaß EO. :Attacker models for wireless sensor networks it - Information Technology 2010 ), p. 320-324 ISSN: 1611-2776 10.1524/itit.2010.0609 Christlein V. , Riess C. Angelopoulou E. :On rotation invariance in copy-move forgery detection IEEE International Workshop on Information Forensics and Security  (Seattle 12. December 2010  - 15. December 2010 )In: 2010 IEEE International Workshop on Information Forensics and Security  2010  10.1109/WIFS.2010.5711472 Dewald A. Holz T. , Freiling F. ADSandbox: Sandboxing JavaScript to fight Malicious Websites ACM Symposium on Applied Computing (SAC)  (Sierre, Switzerland 22. March 2010  - 26. March 2010 )In: Proceedings of the 2010 ACM Symposium on Applied Computing  2010  10.1145/1774088.1774482 http://doi.acm.org/10.1145/1774088.1774482 Freiling F. Schmitt S. Bäcker M. :Selektion vor der Sicherung: Methoden zur effizienten forensischen Sicherung von digitalen Speichermedien Datenschutz und Datensicherheit 2/2010 2010 ), p. 80-85 ISSN: 1614-0702 10.1007/s11623-010-0040-4 Müller T. Dewald A. Freiling F. AESSE: A Cold-boot Resistant Implementation of AES EUROSEC 2010  (Paris 13. April 2010  - 13. April 2010 )In: Proceedings of the Third European Workshop on System Security  2010  10.1145/1752046.1752053 http://eurosys2010-dev.sigops-france.fr/workshops/EuroSec2010/p42-muller.pdf Vömel S. , Holz T. , Freiling F. I'd Like to Pay with Your Visa Card : An Illustration of Illicit Online Trading Activity in the Underground Economy 2010 )https://ub-madoc.bib.uni-mannheim.de/3048/ https://ub-madoc.bib.uni-mannheim.de/3048/ 2009 Benenson Z. Dewald A. Freiling F. Presence, Intervention, Insertion: Unifying Attack and Failure Models in Wireless Sensor Networks 2009 ), p. 10 http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.163.3740&rep=rep1&type=pdf Benenson Z. Werner F. :Formally Verified Authenticated Query Dissemination in Sensor Networks International Symposium on Performance Evaluation of Computer and Telecommunication Systems 2009, SPECTS 2009, Part of the 2009 Summer Simulation Multiconference, SummerSim 2009  (Istanbul 13. July 2009  - 16. July 2009 )In: IEEE International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS) , Istanbul 2009  Böhme R. , Freiling F. Gloe T. , Kirchner M. :Multimedia-Forensik als Teildisziplin der digitalen Forensik GI-Workshop Multimedia-Forensik  (Lübeck 28. September 2009  - 2. October 2009 )In: GI-Workshop Multimedia-Forensik , Lübeck 2009  https://dl.gi.de/handle/20.500.12116/31114 https://dl.gi.de/handle/20.500.12116/31114 Freiling F. Vom Wert offensiver Methoden. Ein Blick auf IT-Sicherheit aus Angreiferperspektive Datenschutz und Datensicherheit 33 2009 ), p. 214-217 ISSN: 1614-0702 Freiling F. Zur Nutzung von Verkehrsdaten im Rahmen der Vorratsdatenspeicherung 2009 )https://madoc.bib.uni-mannheim.de/2360/ https://madoc.bib.uni-mannheim.de/2360/ Freiling F. Böhme R. , Gloe T. , Kirchner M. :Multimedia Forensics is not Computer Forensics Proceedings of the 3rd International Workshop on Computational Forensics  (The Hague 13. August 2009  - 14. August 2009 )In: Proceedings of the 3rd International Workshop on Computational Forensics , The Hague, Netherlands 2009  10.1007/978-3-642-03521-0_9 Freiling F. Delporte-Gallet C. , Fauconnier H. , Tielmann A. , Kilic M. :Message-efficient omission-tolerant consensus with limited synchrony Proc. 14th IEEE Workshop on Dependable Parallel, Distributed and Network-Centric Systems  (Rome 23. May 2009  - 29. May 2009 )In: Proc. 14th IEEE Workshop on Dependable Parallel, Distributed and Network-Centric Systems , Rome, Italy 2009  10.1109/IPDPS.2009.5160899 Freiling F. Heinson D. :Probleme des Verkehrsdatenbegriffs im Rahmen der Vorratsdatenspeicherung Datenschutz und Datensicherheit 33 2009 ), p. 547-552 ISSN: 1614-0702 10.1007/s11623-009-0141-0 Freiling F. Holz T. , Engelberth M. :Learning More About the Underground Economy: A Case-Study of Keyloggers and Dropzones 14th European Symposium on Research in Computer Security  (Saint-Malo, France 21. September 2009  - 23. September 2009 )In: 14th European Symposium on Research in Computer Security  2009  10.1007/978-3-642-04444-1_1 http://pi1.informatik.uni-mannheim.de/filepool/publications/UE-dropzones-esorics09.pdf Freiling F. Lambertz C. , Majster-Cederbaum M. :Modular Consensus Algorithms for the Crash-Recovery Model International Workshop on Reliability, Availability, and Security  (Hiroshima, Japan 8. December 2009  - 11. December 2009 )In: International Conference on Parallel and Distributed Computing, Applications and Technologies  2009  10.1109/PDCAT.2009.50 Hund R. , Holz T. , Freiling F. Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms 18th USENIX Security Symposium  (Montreal, Canada In: 18th USENIX Security Symposium  2009  http://www.usenix.org/events/sec09/tech/full_papers/hund.pdf Krontiris I. , Benenson Z. Freiling F. Thanassis G. , Dimitriou T. :Cooperative Intrusion Detection in Wireless Sensor Networks 6th European Conference on Wireless Sensor Networks  (Cork, Ireland 11. February 2009  - 13. February 2009 )In: Proceedings of the 6th European Conference on Wireless Sensor Networks , Berlin, Heidelberg 2009  10.1007/978-3-642-00224-3_17 Mink M. , Freiling F. Liegl M. Datenschutz in digital-forensischen Lehrveranstaltungen Datenschutz und Datensicherheit 33 2009 ), p. 222–227 ISSN: 1614-0702 10.1007/s11623-009-0055-x Mittal N. , Phaneesh KL. , Freiling F. Safe termination detection in an asynchronous distributed system when processes may crash and recover Theoretical Computer Science 410 2009 ), p. 614-628 ISSN: 0304-3975 10.1016/j.tcs.2008.10.011 Moch C. , Freiling F. The Forensic Image Generator Generator Proceedings of the Fifth International Conference on Incident Management and Forensics  (Stuttgart, Germany In: Proceedings of the Fifth International Conference on Incident Management and Forensics , Stuttgart, Germany 2009  10.1109/IMF.2009.8 Riess C. Jordan JM. , Angelopoulou E. :A Common Framework for Ambient Illumination in the Dichromatic Reflectance Model 2009 IEEE 12th International Conference on Computer Vision Workshops, ICCV Workshops 2009  (Kyoto 4. October 2009  - 4. October 2009 )In: IEEE (ed.):  IEEE 12th International Conference on Computer Vision Workshops  2009  10.1109/ICCVW.2009.5457519 http://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2009/Riess09-ACF.pdf Trinius P. , Holz T. , Göbel J. , Freiling F. Visual Analysis of Malware Behavior (Short paper) 6th International Workshop on Visualization for Cyber Security In: 6th International Workshop on Visualization for Cyber Security , Atlantic City, NJ, USA 2009  Wilke J. , Blaß EO. , Freiling F. Zitterbart M. :A framework for probabilistic, authentic aggregation in wireless sensor networks Praxis der Informationsverarbeitung und Kommunikation 32 2009 ), p. 116-126 ISSN: 1865-8342 Wilke J. , Zitterbart M. , Benenson Z. Freiling F. Authentic Query Dissemination and Data Aggregation in Wireless Sensor Networks In: Networked Sensing Systems (INSS), Demo Session , Pittsburgh, PA 2009  2008 Benenson Z. Access control in wireless sensor networks 2008 )Benenson Z. Bestehorn M. , Buchmann E. , Freiling F. Jawurek M. :Query Dissemination with Predictable Reachability and Energy Usage in Sensor Networks 7th International Conference on Ad-hoc, Mobile and Wireless Networks, ADHOC-NOW 2008  (Sophia-Antipolis 10. September 2008  - 12. September 2008 )In: Ad-hoc, Mobile and Wireless Networks, 7th International Conference (ADHOC-NOW) , Sophia-Antipolis, France 2008  10.1007/978-3-540-85209-4_22 Benenson Z. Cholewinski PM. , Freiling F. Vulnerabilities and attacks in wireless sensor networks In: Wireless Sensors Networks Security Amsterdam IOS Press 2008 , p. 22-43  (Cryptology & Information Security Series (CIS)) Eusgeld I. , Freiling F. Reussner R.  (ed.):Dependability Metrics: Advanced Lectures [result from a Dagstuhl seminar, October 30 - November 1, 2005] Berlin 2008 ISBN: 978-3-540-68946-1 Eusgeld I. , Freiling F. Reussner R.  (ed.):Dependability Metrics 2008 ISBN: 978-3-540-68946-1 10.1007/978-3-540-68947-8 2007 Benenson Z. Lower Bounds In: Algorithms for Sensor and Ad Hoc Networks, Advanced Lectures Heidelberg Springer-verlag 2007 , p. 117-130  (LNCS 4621)ISBN: 9783540749905  Benenson Z. Cholewinski PM. , Freiling F. Advanced Evasive Data Storage in Sensor Networks 8th International Conference on Mobile Data Management, MDM 2007  (Mannheim 7. May 2007  - 11. May 2007 )In: MDM (8th International Conference on Mobile Data Management) , Mannheim 2007  10.1109/MDM.2007.29 Brust MR. , Andronache A. , Rothkugel S. , Benenson Z. Topology-based Clusterhead Candidate Selection in Wireless Ad-hoc and Sensor Networks 2007 2nd International Conference on Communication System Software and Middleware and Workshops, COMSWARE 2007  (Bangalore 7. January 2007  - 12. January 2007 )In: COMSWARE (Second International Conference on COMmunication System softWAre and MiddlewaRE) , Bangalore, India 2007  10.1109/COMSWA.2007.382475 Danner D. , Kaufhold C. , Kranz P. , Müller R. , Pfaller S. , Riess C. Angelopoulou E. :FAUBOT: Purposeful Navigation of a Robot in a Simulated Environment CiberMouse Contest at IEEE Real-Time Systems Symposium  (Tucson, AZ 3. December 2007  - 6. December 2007 )In: 28th IEEE International Real-Time Systems Symposium (RTSS 2007)  2007  Riess C. Wanka R. :Periodic Load Balancing on the N-Cycle: Analytical and Experimental Evaluation 13th International Euro-Par Conference  (Rennes 28. August 2007  - 31. August 2007 )In: Proceedings of the 13th International Euro-Par Conference  2007  10.1007/978-3-540-74466-5_86 2006 Achtzehn A. , Benenson Z. Rohner C. :Implementing Agreement Protocols in Sensor Networks In: MASS Workshops (3rd International Conference on Mobile Adhoc and Sensor Systems , Vancouver, Canada 2006  Becher A. , Benenson Z. Dornseif M. :Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks 3rd International Conference on Security in Pervasive Computing, SPC 2006  (York 18. April 2006  - 21. April 2006 )In: Security in Pervasive Computing (SPC), Third International Conference , York, UK 2006  10.1007/11734666_9 Benenson Z. Freiling F. Hammerschmidt E. , Lucks S. , Pimenidis L. :Authenticated Query Flooding in Sensor Networks In: IFIP SEC , Karlstad, Sweden 2006  10.1007/0-387-33406-8_4 Benenson Z. Freiling F. Holz T. , Kesdogan D. , Draque Penso L. :Safety, Liveness, and Information Flow: Dependability Revisited In: ARCS Workshops (19th International Conference on Architecture of Computing Systems) , Frankfurt am Main 2006  Benenson Z. Freiling F. Pfitzmann B. , Rohner C. , Waidner M. :Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks 3rd European Workshop on Security and Privacy in Ad Hoc and Sensor Networks, ESAS 2006  (Hamburg 20. September 2006  - 21. September 2006 )In: ESAS (Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop) , Hamburg 2006  10.1007/11964254_15 Fort M. , Freiling F. Draque Penso L. , Benenson Z. Kesdogan D. :TrustedPals: Secure Multiparty Computation Implemented with Smart Cards 11th European Symposium on Research in Computer Security, ESORICS 2006  (Hamburg 18. September 2006  - 20. September 2006 )In: Computer Security - {ESORICS} 2006, 11th European Symposium on Research in Computer Security , Hamburg 2006  2005 Benenson Z. Authenticated Queries in Sensor Networks Second European Workshop on Security and Privacy in Ad-hoc and Sensor Networks, ESAS 2005  (Visegrad 13. July 2005  - 14. July 2005 )In: 2nd European Workshop on Security and Privacy in Ad-hoc and Sensor Networks (ESAS) , Visegrad, Hungary 2005  10.1007/11601494_5 Benenson Z. Cholewinski PM. , Freiling F. Simple Evasive Data Storage in Sensor Networks In: International Conference on Parallel and Distributed Computing Systems, PDCS , Phoenix, AZ, USA 2005  Benenson Z. Freiling F. Kesdogan D. :An algorithmic framework for robust access control in wireless sensor networks 2nd European Workshop onWireless Sensor Networks, EWSN 2005  (Istanbul 31. January 2005  - 2. February 2005 )In: EWSN 2005 , Istanbul 2005  10.1109/EWSN.2005.1462007 Benenson Z. Gedicke N. , Raivio O. :Realizing Robust User Authentication in Sensor Networks In: REALWSN , Stockholm 2005  Benenson Z. Gärtner FC. , Kesdogan D. :Secure Multi-Party Computation with Security Modules SICHERHEIT 2005 - Sicherheit - Schutz und Zuverlassigkeit, Beitrage der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft fur Informatik e.V. (GI)- 2nd Annual Meeting of the Department of Security of the Society for Informatics - Security  (Regensburg 5. April 2005  - 8. April 2005 )In: Sicherheit 2005 , Regensburg 2005  Benenson Z. Kühn U. , Lucks S. :Cryptographic Attack Metrics In: Dependability Metrics LNCS Springer 2005 , p. 133-156 ISBN: 978-3-540-68946-1  2004