Publications
2023
Bajramovic E. , Fein C. , Frinken M. , Rösler P. , Freiling F. :LAVA: Log Authentication and Verification Algorithm 12th International Conference on IT Security Incident Management & IT Forensics (IMF 2023) (Munich, Germany , 23. May 2023 - 24. May 2023 )
Bergmann S. , Moussa D. , Brand F. , Kaup A. , Rieß C. :Frequency-Domain Analysis of Traces for the Detection of AI-based Compression International Workshop on Biometrics and Forensics 2023 (Barcelona , 19. April 2023 - 20. April 2023 )In: IEEE (ed.): 2023 International Workshop on Biometrics and Forensics (IWBF) 2023 URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2023-Bergmann-IWBF.pdf
Dewald A. , Freiling F. , Groß T. , Kniel D. , Michael R. , Rieck K. :Möglichkeiten und Grenzen KI-gestützter Analyse digitaler Spuren (2023 ), p. 43-46
Gruber J. :Identifizierung von Malware-Infrastruktur mittels verteilter Spamtrap-Systeme Sicherheit in vernetzten Systemen: 30. DFN-Konferenz (Hamburg , 8. February 2023 - 10. February 2023 )In: Albrecht Ude (ed.): Sicherheit in vernetzten Systemen: 30. DFN-Konferenz 2023
Gruber J. , Hargreaves CJ. , Freiling F. :Contamination of digital evidence: Understanding an underexposed risk In: Forensic Science International: Digital Investigation 44 (2023 ), Article No.: 301501 ISSN: 2666-2817 DOI: 10.1016/j.fsidi.2023.301501
Gruber J. , Humml M. , Schröder L. , Freiling F. :Formal Verification of Necessary and Sufficient Evidence in Forensic Event Reconstruction Digital Forensics Research Conference Europe (DFRWS EU 2023) (Bonn , 21. March 2023 - 24. March 2023 )In: Edita Bajramovic and Ricardo J. Rodríguez (ed.): Proceedings of the Digital Forensics Research Conference Europe (DFRWS EU) 2023 Open Access: https://dfrws.org/wp-content/uploads/2023/03/2023-03-20_formal-verification-of-ne-se_gruber_dfrws-proc.pdf URL: https://dfrws.org/wp-content/uploads/2023/03/2023-03-20_formal-verification-of-ne-se_gruber_dfrws-proc.pdf
Gruber J. , Voigt L. , Freiling F. :Faktoren erfolgreicher Cybercrime-Ermittlungen: Ergebnisse einer Expertenbefragung In: Kriminalistik 77 (2023 ), p. 266 - 271 ISSN: 0023-4699
Lorch B. :Reliable Machine Learning Methods in Image Forensics (Dissertation, 2023 ) URL: https://nbn-resolving.org/urn:nbn:de:bvb:29-opus4-217322
Lorch B. , Schirrmacher F. , Maier A. , Rieß C. :On the Security of the One-and-a-Half-Class Classifier for SPAM Feature-Based Image Forensics In: IEEE Transactions on Information Forensics and Security (2023 )ISSN: 1556-6013 DOI: 10.1109/TIFS.2023.3266168 URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2023-Lorch-OSO.pdf
Maier A. , Rieß C. :Zuverlässigkeit von KI in der Multimedia-Forensik In: Datenschutz und Datensicherheit (2023 )ISSN: 1614-0702 DOI: 10.1007/s11623-023-1748-2
Röckl J. , Wagenhäuser A. , Müller T. :Veto: Prohibit Outdated Edge System Software from Booting 9th International Conference on Information Systems Security and Privacy (ICISSP) (Lisbon , 22. February 2023 - 24. February 2023 )In: In Proceedings of the 9th International Conference on Information Systems Security and Privacy (ICISSP) 2023 DOI: 10.5220/0011627700003405
2022
Anantharajaiah N. , Asfour T. , Bader M. , Bauer L. , Becker J. , Bischof S. , Brand M. , Bungartz HJ. , Eichler C. , Esper K. , Falk J. , Fasfous N. , Freiling F. , Fried A. , Gerndt M. , Glaß M. , Gonzalez J. , Hannig F. , Heidorn C. , Henkel J. , Herkersdorf A. , Herzog B. , John J. , Hönig T. , Hundhausen F. , Khdr H. , Langer T. , Lenke O. , Lesniak F. , Lindermayr A. , Listl A. , Maier S. , Megow N. , Mettler M. , Müller-Gritschneder D. , Nassar H. , Paus F. , Pöppl A. , Pourmohseni B. , Rabenstein J. , Raffeck P. , Rapp M. , Rivas SN. , Sagi M. , Schirrmacher F. , Schlichtmann U. , Schmaus F. , Schröder-Preikschat W. , Schwarzer T. , Sikal MB. , Simon B. , Snelting G. , Spieck J. , Srivatsa A. , Stechele W. , Teich J. , Comprés Ureña IA. , Verbauwhede I. , Walter D. , Wild T. , Wildermann S. , Wille M. , Witterauf M. , Zhang L. :Invasive Computing FAU University Press , 2022 ISBN: 978-3-96147-571-1 DOI: 10.25593/978-3-96147-571-1
Benenson Z. , Freiling F. , Meyer-Wegener K. :Soziotechnische Einflussfaktoren auf die "digitale Souveränität" des Individuums In: Glasze, Georg; Odzuck; Eva; Staples, Ronald (ed.): Was heißt digitale Souveränität? Diskurse, Praktiken und Voraussetzungen "individueller" und "staatlicher Souveränität" im digitalen Zeitalter , Bielefeld : transcript Verlag , 2022 , p. 61 - 87 (Politik in der digitalen Gesellschaft)ISBN: 978-3-8376-5827-9 DOI: 10.14361/9783839458273
Bove D. :Secure Services for Standard RISC-V Architectures The 17th International Conference on Availability, Reliability and Security (Vienna, Austria , 23. August 2022 - 26. August 2022 )In: Association for Computing Machinery (ed.): Proceedings of the 17th International Conference on Availability, Reliability and Security 2022 DOI: 10.1145/3538969.3538998 URL: https://dl.acm.org/doi/10.1145/3538969.3538998
Bove D. :SoK: The Evolution of Trusted UI on Mobile ACM ASIACCS 2022 (Nagasaki, Japan , 31. May 2022 - 2. June 2022 )In: Association for Computing Machinery (ed.): ASIA CCS '22: Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security 2022 DOI: 10.1145/3488932.3517417 URL: https://dl.acm.org/doi/10.1145/3488932.3517417
Brieger T. , Raichur NL. , Jdidi D. , Ott F. , Feigl T. , Van Der Merwe JR. , Ruegamer A. , Felber W. :Multimodal Learning for Reliable Interference Classification in GNSS Signals Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+) (Denver, CO , 19. September 2022 - 23. September 2022 )In: Proc. Intl. Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+) 2022 DOI: 10.33012/2022.18586
Büter R. , Engst G. , Esser K. , Freiling F. , Friedrich K. , Friedrich T. , Hammer A. , Heine L. , Heinlein L. , Korn O. , Minuth C. , Müller M. , Müller N. , Reithmeier J. , Ripley N. , Schulze M. , Sievers M. , Srikhaolan C. , Zenk J. :A Comparison of Cloud Storage Technologies as Sources of Digital Evidence CS-2022-01 (2022 )ISSN: 2191-5008 Open Access: https://nbn-resolving.org/urn:nbn:de:bvb:29-opus4-210457 URL: https://nbn-resolving.org/urn:nbn:de:bvb:29-opus4-210457 (Working Paper)
Deuber D. , Gruber J. , Humml M. , Ronge V. , Scheler N. :Argumentation Schemes for Blockchain Deanonymization Sixteenth International Workshop on Juris-informatics
(JURISIN 2022) (Kyoto International Conference Center, Kyoto, Japan , 13. June 2022 - 14. June 2022 )
Dreissig F. , Röckl J. , Müller T. :Compiler-Aided Development of Trusted Enclaves with Rust 17th International Conference on Availability, Reliability and Security, ARES 2022 (Vienna, AUT , 23. August 2022 - 26. August 2022 )In: ACM International Conference Proceeding Series 2022 DOI: 10.1145/3538969.3538972
Einzinger C. , Rückert C. , Freiling F. :Datenminimierung in der Netzwerkforensik In: Datenschutz und Datensicherheit 46 (2022 ), p. 149-155 ISSN: 1614-0702 DOI: 10.1007/s11623-022-1580-0
Einzinger C. , Rückert C. , Freiling F. :Datenminimierung in der Netzwerkforensik In: Datenschutz und Datensicherheit 46 (2022 ), p. 149-155 ISSN: 1614-0702
Groß T. , Schleier T. , Müller T. :ReFuzz — Structure Aware Fuzzing of the Resilient File System (ReFS) 2022 ACM Asia Conference on Computer and Communications Security (ASIA CCS '22) (Nagasaki , 30. May 2022 - 3. June 2022 )In: Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security (ASIA CCS '22) 2022 DOI: 10.1145/3488932.3523260
Gruber J. , Brodowski D. , Freiling F. :Die polizeiliche Aufgabe und Pflicht zur digitalen Gefahrenabwehr In: Zeitschrift für das Gesamte Sicherheitsrecht 5 (2022 ), p. 171 - 176 ISSN: 2567-3823
Gruber J. , Freiling F. :Fighting Evasive Malware In: Datenschutz und Datensicherheit 46 (2022 ), p. 284-290 ISSN: 1614-0702 DOI: 10.1007/s11623-022-1604-9 URL: https://link.springer.com/article/10.1007/s11623-022-1604-9
Gruber J. , Voigt L. , Benenson Z. , Freiling F. :Foundations of cybercriminalistics: From general process models to case-specific concretizations in cybercrime investigations In: Forensic Science International: Digital Investigation 43 (2022 ), Article No.: 301438 ISSN: 2666-2817 DOI: 10.1016/j.fsidi.2022.301438 URL: https://www.sciencedirect.com/science/article/pii/S2666281722001196
Göbel T. , Maltan S. , Türr J. , Baier H. , Mann F. :ForTrace - A holistic forensic data set synthesis framework In: Forensic Science International: Digital Investigation 40 (2022 ), Article No.: 301344 ISSN: 2666-2817 DOI: 10.1016/j.fsidi.2022.301344
Hadwiger B. , Riess C. :Deep Metric Color Embeddings for Splicing Localization in Severely Degraded Images In: IEEE Transactions on Information Forensics and Security 17 (2022 ), p. 2614-2627 ISSN: 1556-6013 DOI: 10.1109/TIFS.2022.3189527 URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2022-Hadwiger-DMC.pdf
Jdidi D. , Brieger T. , Feigl T. , Contreras Franco D. , Van Der Merwe JR. , Ruegamer A. , Seitz J. , Felber W. :Unsupervised Disentanglement for Post-Identification of GNSS Interference in the Wild Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+) (Denver, CO , 19. September 2022 - 23. September 2022 )In: Proc. Intl. Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+) 2022 DOI: 10.33012/2022.18493
Jung B. , Eichler C. , Röckl J. , Schlenk R. , Hönig T. , Müller T. :Trusted Monitor: TEE-Based System Monitoring Brazilian Symposium on Computing Systems Engineering (SBESC 2022) (Fortaleza, CE, Brazil , 21. November 2022 - 24. November 2022 )In: IEEE (ed.): Brazilian Symposium on Computing Systems Engineering 2022 DOI: 10.1109/SBESC56799.2022.9964869 URL: https://ieeexplore.ieee.org/document/9964869
Koch T. , Liebezeit F. , Rieß C. , Christlein V. , Köhler T. :Exploring the Open World Using Incremental Extreme Value Machines International Conference on Pattern Recognition (ICPR) (Montréal , 21. August 2022 - 25. August 2022 )In: 2022 26th International Conference on Pattern Recognition (ICPR) 2022 DOI: 10.1109/ICPR56361.2022.9956423
Körber M. , Kalysch A. , Massonne W. , Benenson Z. :Usability of Antivirus Tools in a Threat Detection Scenario 37th IFIP International Conference on ICT Systems Security and Privacy Protection, SEC 2022 (Copenhagen, DNK , 13. June 2022 - 15. June 2022 )In: Weizhi Meng, Simone Fischer-Hübner, Christian D. Jensen (ed.): IFIP Advances in Information and Communication Technology 2022 DOI: 10.1007/978-3-031-06975-8_18
Latzo T. , Hellmich A. , Knepper A. , Hardi L. , Castello-Waldow TP. , Freiling F. , Attenberger A. :Maraudrone's Map: An Interactive Web Application for Forensic Analysis and Visualization of DJI Drone Log Data 27th Nordic Conference on Secure IT Systems (NordSec) (Reykjavic )In: SECURE IT SYSTEMS, NORDSEC 2022 , CHAM : 2022 DOI: 10.1007/978-3-031-22295-5_18
Lorch B. , Scheler N. , Riess C. :Compliance Challenges in Forensic Image Analysis Under the Artificial Intelligence Act European Signal Processing Conference (Belgrade , 29. August 2022 - 2. September 2022 ) URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2022-Lorch-AIA-EUSIPCO.pdf
Maier A. , Lorch B. , Rieß C. :Bayesian Tools for Reliable Multimedia Forensics 2022 VIII International Conference on Information Technology and Nanotechnology (ITNT) (Samara , 23. May 2022 - 27. May 2022 ) DOI: 10.1109/ITNT55410.2022.9848571 URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2022-Maier-BNN-ITNT.pdf
Maier A. , Moussa D. , Spruck A. , Seiler J. , Rieß C. :Reliability Scoring for the Recognition of Degraded License Plates 2022 18th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS) (Madrid , 29. November 2022 - 2. December 2022 ) DOI: 10.1109/AVSS56176.2022.9959390 URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2022-Maier-AVSS.pdf
Moussa D. , Hirsch G. , Rieß C. :Towards Unconstrained Audio Splicing Detection and Localization with Neural Networks The 2nd Workshop on MultiMedia FORensics in the WILD (Montréal,Québec , 21. August 2022 - 25. August 2022 ) Open Access: https://faui1-files.cs.fau.de/public/publications/mmsec/2022-Moussa-MMFORWILD.pdf URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2022-Moussa-MMFORWILD.pdf
Moussa D. , Maier A. , Spruck A. , Seiler J. , Rieß C. :Forensic License Plate Recognition with Compression-Informed Transformers IEEE International Conference on Image Processing (Bordeaux, France , 16. October 2022 - 19. October 2022 )In: IEEE (ed.): 2022 IEEE International Conference on Image Processing (ICIP) 2022 DOI: 10.1109/ICIP46576.2022.9897178 URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2022-Moussa-FLPR.pdf
Ottmann J. , Breitinger F. , Freiling F. :Defining Atomicity (and Integrity) for Snapshots of Storage in Forensic
Computing Digital Forensics Research Conference Europe (DFRWS EU) 2022 (Oxford , 29. March 2022 - 1. April 2022 )In: Proceedings of the Digital Forensics Research Conference Europe (DFRWS EU) 2022 2022 URL: https://dfrws.org/presentation/defining-atomicity-and-integrity-for-snapshots-of-storage-in-forensic-computing/
Quintero J. , Railean A. :Users' Privacy Concerns and Attitudes towards Usage-based Insurance: An Empirical Approach 8th International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS) In: VEHITS: PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON VEHICLE TECHNOLOGY AND INTELLIGENT TRANSPORT SYSTEMS , SETUBAL : 2022 DOI: 10.5220/0011044000003191
Raichur NL. , Brieger T. , Jdidi D. , Feigl T. , Van Der Merwe JR. , Ghimire B. , Ott F. , Ruegamer A. , Felber W. :Machine Learning-assisted GNSS Interference Monitoring through Crowdsourcing Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+) (Denver, CO , 19. September 2022 - 23. September 2022 )In: Proc. Intl. Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+) 2022 DOI: 10.33012/2022.18492
Riess C. :Physical Integrity DOI: 10.1007/978-981-16-7621-5_9
Schilling J. , Mueller T. :VANDALIR: Vulnerability Analyses Based on Datalog and LLVM-IR 19th International Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA) (Cagliari )In: DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2022 , CHAM : 2022 DOI: 10.1007/978-3-031-09484-2_6
Schneider J. , Düsel L. , Lorch B. , Drafz J. , Freiling F. :Prudent design principles for digital tampering experiments DFRWS EU 2022 (Oxford , 29. March 2022 - 31. March 2022 )In: Elsevier (ed.): Forensic Science International: Digital Investigation 2022 DOI: 10.1016/j.fsidi.2022.301334 URL: https://www.sciencedirect.com/science/article/pii/S2666281722000038
Schneider J. , Eichhorn M. , Freiling F. :Ambiguous File System Partitions DFRWS USA 2022 (On the Internet , 11. July 2022 - 14. July 2022 )In: Elsevier (ed.): Forensic Science International: Digital Investigation 2022 DOI: 10.1016/j.fsidi.2022.301399 URL: https://www.sciencedirect.com/science/article/pii/S2666281722000804
2021
Busch M. , Nicolai F. , Fleischer F. , Rückert C. , Safferling C. , Freiling F. :Make Remote Forensic Investigations Forensic Again: Increasing the Evidential Value of Remote Forensic Investigations 11th EAI International Conference on Digital Forensics & Cyber Crime (Boston, MA, USA , 15. October 2020 - 16. October 2020 )In: Sanjay Goel; Pavel Gladyshev; Daryl Johnson; Makan Pourzandi; Suryadipta Majumdar (ed.): Digital Forensics and Cyber Crime , Cham, Schweiz : 2021 DOI: 10.1007/978-3-030-68734-2
Davari A. , Islam S. , Seehaus T. , Hartmann A. , Braun M. , Maier A. , Christlein V. :On Mathews Correlation Coefficient and Improved Distance Map Loss for Automatic Glacier Calving Front Segmentation in SAR Imagery In: IEEE Transactions on Geoscience and Remote Sensing (2021 ), p. 1-12 ISSN: 0196-2892 DOI: 10.1109/TGRS.2021.3115883 URL: https://arxiv.org/abs/2102.08312
Davari A. , Islam S. , Seehaus T. , Hartmann A. , Maier A. , Christlein V. :On Mathews Correlation Coefficient and Improved Distance Map Loss for Automatic Glacier Calving Front Segmentation in SAR Imagery In: IEEE Transactions on Geoscience and Remote Sensing (2021 )ISSN: 0196-2892 DOI: 10.1109/TGRS.2021.3115883 URL: https://ieeexplore.ieee.org/abstract/document/9563069?casa_token=BWqHgVWnLLIAAAAA:P-LK6bxKBOnHCNlMedOSEGucnMnB7KYgd4JWINQNvaG82XcLpOsLJsd3Kqk2LzGPjRWq3dsEZ4o
Deitsch S. , Buerhop-Lutz C. , Sovetkin E. , Steland A. , Gallwitz F. , Maier A. , Rieß C. :Segmentation of Photovoltaic Module Cells in Uncalibrated Electroluminescence Images In: Machine Vision and Applications 32 (2021 ), Article No.: 84 ISSN: 1432-1769 DOI: 10.1007/s00138-021-01191-9 URL: https://arxiv.org/pdf/1806.06530.pdf (Techreport)
Dietrich-Sussner R. , Davari A. , Seehaus T. , Braun M. , Christlein V. , Maier A. , Rieß C. :Synthetic Glacier SAR Image Generation from Arbitrary Masks Using Pix2Pix Algorithm 2021 IEEE International Geoscience and Remote Sensing Symposium IGARSS (Brussels , 11. July 2021 - 16. July 2021 ) DOI: 10.1109/IGARSS47720.2021.9553853 URL: https://arxiv.org/abs/2101.03252
Faust F. , Thierry A. , Müller T. , Freiling F. :Selective Imaging of File System Data on Live Systems In: Forensic Science International: Digital Investigation 36 (2021 )ISSN: 2666-2817 DOI: 10.1016/j.fsidi.2021.301115
Freiling F. (ed.):Proceedings of the 2021 Joint Workshop of the German Research Training Groups in Computer Science. May 31–June 1, 2021 Erlangen : 2021 DOI: 10.25593/opus4-fau-16426
Groß T. , Busch M. , Müller T. :One key to rule them all: Recovering the master key from RAM to break Android's file-based encryption DFRWS EU 2021 (Cyberspace , 29. March 2021 - 1. April 2021 )In: Proceedings of the Eighth Annual DFRWS Europe 2021 DOI: 10.1016/j.fsidi.2021.301113
Hadwiger B. , Rieß C. :The Forchheim Image Database for Camera Identification in the Wild Multimedia Forensics in the Wild (MMForWild 2020) (Mailand , 10. January 2021 - 15. January 2021 ) URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2021-Hadwiger-FDB.pdf
Hartmann A. , Davari A. , Seehaus T. , Braun M. , Maier A. , Christlein V. :Bayesian U-Net for Segmenting Glaciers in Sar Imagery 2021 IEEE International Geoscience and Remote Sensing Symposium IGARSS (Brussels , 11. July 2021 - 16. July 2021 ) DOI: 10.1109/IGARSS47720.2021.9554292 URL: https://arxiv.org/abs/2101.03249
Holzmann M. , Davari A. , Seehaus T. , Braun M. , Maier A. , Christlein V. :Glacier Calving Front Segmentation Using Attention U-Net 2021 IEEE International Symposium on Geoscience and Remote Sensing (IGARSS) (Brussels , 11. July 2021 - 16. July 2021 ) DOI: 10.1109/IGARSS47720.2021.9555067 URL: https://arxiv.org/abs/2101.03247
Kaiser P. , Schirrmacher F. , Lorch B. , Rieß C. :Learning to Decipher License Plates in Severely Degraded Images MultiMedia FORensics in the WILD (, 11. January 2021 - 11. January 2021 )In: Pattern Recognition. ICPR International Workshops and Challenges. ICPR 2021 2021 DOI: 10.1007/978-3-030-68780-9_43 URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2021-Schirrmacher-LTD.pdf
Latzo T. :Efficient Fingerprint Matching for Forensic Event Reconstruction In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series , Cham : Springer , 2021 , p. 98-120 (Digital Forensics and Cyber Crime. ICDF2C 2020)ISBN: 9783030687335 DOI: 10.1007/978-3-030-68734-2_6
Latzo T. , Hantke F. , Kotschi L. , Freiling F. :Bringing Forensic Readiness to Modern Computer Firmware Digital Forensics Research Conference Europe (DFRWS EU) 2021 (Virtual , 29. March 2021 - 1. April 2021 )In: Proceedings of the Digital Forensics Reesearch Conference Europe (DFRWS EU) 2021 2021 Open Access: https://dfrws.org/wp-content/uploads/2021/03/Bringing-Forensic-Readiness-to-Modern-Computer-Firmware.pdf
Latzo T. , Schulze M. , Freiling F. :Leveraging Intel DCI for Memory Forensics Digital Forensics Research Conference USA (DFRWS US) 2021 (Virtual , 12. July 2021 - 15. July 2021 )In: Proceedings of the Digital Forensics Research Conference USA (DFRWS US) 2021 Open Access: https://dfrws.org/wp-content/uploads/2021/05/2021_USA_paper-leveraging_intel_dci_for_memory_forensics.pdf
Lorch B. , Schirrmacher F. , Maier A. , Rieß C. :Reliable Camera Model Identification Using Sparse Gaussian Processes In: IEEE Signal Processing Letters (2021 ), p. 912-916 ISSN: 1070-9908 DOI: 10.1109/LSP.2021.3070206 URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2021-Lorch-GPC.pdf
Menges F. , Latzo T. , Vielberth M. , Sobola S. , Pöhls HC. , Taubmann B. , Köstler J. , Puchta A. , Freiling F. , Reiser HP. , Pernul G. :Towards GDPR-compliant data processing in modern SIEM systems In: Computers & Security 103 (2021 ), Article No.: 102165 ISSN: 0167-4048 DOI: 10.1016/j.cose.2020.102165
Moussa D. , Maier A. , Schirrmacher F. , Rieß C. :Sequence-based Recognition of License Plates with Severe Out-of-Distribution Degradations The 19th International Conference on Computer Analysis of Images and Patterns (Virtual Conference , 27. September 2021 - 1. October 2021 )In: Springer, Cham (ed.): Computer Analysis of Images and Patterns 2021 DOI: 10.1007/978-3-030-89131-2_16 URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2021-Moussa-SRLP.pdf
Ottmann J. , Pollach J. , Scheler N. , Schneider J. , Rückert C. , Freiling F. :Zur Blackbox-Problematik im Bereich Mobilfunkforensik In: Datenschutz und Datensicherheit 45 (2021 ), p. 546-552 ISSN: 1614-0702 DOI: 10.1007/s11623-021-1487-1
Pan J. , Maier A. , Lorch B. , Rieß C. :Reliable Camera Model Identification Through Uncertainty Estimation IEEE International Workshop on Biometrics and Forensics (, 6. May 2021 - 7. May 2021 ) DOI: 10.1109/IWBF50991.2021.9465097 URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2021-Pan-IWBF.pdf
Reinhardt D. , Müller T. :Welcome Message from ARES Program Committee Co-Chairs 16th International Conference on Availability, Reliability and Security, ARES 2021 (Virtual, Online, AUT , 17. August 2021 - 20. August 2021 )In: ACM International Conference Proceeding Series 2021 DOI: 10.1145/3465481.fm
Riess C. :Möglichkeiten und Grenzen bei der Ermittlung von Wahrheit mit Maschinellem Lernen In: C. Schicha, I. Stapf, S. Sell (ed.): Medien und Wahrheit - Medienethische Perspektiven auf Desinformation, Lügen und "Fake News" , Nomos , 2021 , p. 341-358
Röckl J. , Protsenko M. , Huber M. , Müller T. , Freiling F. :Advanced System Resiliency Based on Virtualization Techniques for IoT Devices ACSAC: Annual Computer Security Applications Conference (Virtual Event , 6. December 2021 - 10. December 2021 ) DOI: 10.1145/3485832.3485836
Schneider J. , Lautner I. , Moussa D. , Wolf J. , Scheler N. , Freiling F. , Haasnoot J. , Henseler H. , Malik S. , Morgenstern H. , Westman M. :In Search of Lost Data: A Study of Flash Sanitization Practices DFRWS EU 2021 (Cyberspace , 29. March 2021 - 1. April 2021 )In: Proceedings of the Digital Forensics Research Conference Europe (DFRWS EU) 2021 2021 Open Access: https://dfrws.org/presentation/in-search-of-lost-data-a-study-of-flash-sanitization-practices/ URL: https://dfrws.org/presentation/in-search-of-lost-data-a-study-of-flash-sanitization-practices/
Schwab P. , Röckl J. , Langohr M. , Meyer-Wegener K. :Performance Evaluation of Policy-Based SQL Query Classification for Data-Privacy Compliance In: Datenbank-Spektrum (2021 )ISSN: 1618-2162 DOI: 10.1007/s13222-021-00385-9 URL: https://link.springer.com/article/10.1007/s13222-021-00385-9
Schwinn L. , Nguyen A. , Raab R. , Zanca D. , Eskofier B. , Tenbrinck D. , Burger M. :Dynamically Sampled Nonlocal Gradients for Stronger Adversarial Attacks International Joint Conference on Neural Networks (IJCNN) (Online , 18. July 2021 - 22. July 2021 )
Schwinn L. , Raab R. , Nguyen A. , Zanca D. , Eskofier B. :Exploring Misclassifications of Robust Neural Networks to Enhance Adversarial Attacks URL: https://arxiv.org/abs/2105.10304
Spruck A. , Hawesch M. , Maier A. , Rieß C. , Seiler J. , Kaup A. :3D Rendering Framework for Data Augmentation in Optical Character Recognition 2021 International Symposium on Signals, Circuits and Systems (ISSCS) (Iasi, Romania (virtual) , 15. July 2021 - 16. July 2021 )In: ISSCS 2021 - International Symposium on Signals, Circuits and Systems 2021 DOI: 10.1109/ISSCS52333.2021.9497438 URL: https://arxiv.org/abs/2209.14970
Villar-Corrales A. , Schirrmacher F. , Rieß C. :Deep Learning Architectural Designs for Super-Resolution of Noisy Images In: ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2021 DOI: 10.1109/ICASSP39728.2021.9414733
2020
Busch M. , Dirsch K. :Finding 1-Day Vulnerabilities in Trusted Applications using Selective Symbolic Execution Workshop on Binary Analysis Research (BAR) 2020 (San Diego, CA , 23. February 2020 - 23. February 2020 ) DOI: 10.14722/bar.2020.23014
Busch M. , Westphal J. , Müller T. :Unearthing the TrustedCore: A critical review on huawei's trusted execution environment 14th USENIX Workshop on Offensive Technologies, WOOT 2020, co-located with USENIX Security 2020 (, 11. April 2020 )In: WOOT 2020 - 14th USENIX Workshop on Offensive Technologies, co-located with USENIX Security 2020 2020
Felsner L. , Käppler S. , Maier A. , Riess C. :Truncation Correction for X-ray Phase-Contrast Region-of-Interest Tomography In: IEEE Transactions on Computational Imaging (2020 ), p. 625 - 639 ISSN: 2333-9403 DOI: 10.1109/TCI.2020.2964217
Felsner L. , Würfl T. , Syben-Leisner C. , Roser P. , Preuhs A. , Maier A. , Riess C. :Reconstruction of Voxels with Position- and Angle-Dependent Weightings The 6th International Conference on Image Formation in X-Ray Computed Tomography (Online meeting , 3. August 2020 - 7. August 2020 )
Fleischer F. , Busch M. , Kuhrt P. :Memory corruption attacks within Android TEEs: A case study based on OP-TEE 15th International Conference on Availability, Reliability and Security, ARES 2020 (Online , 25. August 2020 - 28. August 2020 )In: ACM International Conference Proceeding Series 2020 DOI: 10.1145/3407023.3407072
Groß T. , Dirauf R. , Freiling F. :Systematic Analysis of Browser History Evidence 13th International Conference on Systematic Approaches to Digital Forensic Engineering (SADFE) (New York , 15. May 2020 - 15. May 2020 )In: IEEE (ed.): 2020 13th International Conference on Systematic Approaches to Digital Forensic Engineering (SADFE) 2020 DOI: 10.1109/SADFE51007.2020.00010
Hantke F. , Dewald A. :How can data from fitness trackers be obtained and analyzed with a forensic approach? 5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020 (, 7. September 2020 - 11. September 2020 )In: Proceedings - 5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020 2020 DOI: 10.1109/EuroSPW51379.2020.00073
Hofmann F. , Freiling F. :Personalisierte Preise und das Datenschutzrecht. Anforderungen an die datenschutzrechtliche Einwilligung In: Zeitschrift für Datenschutz (2020 ), p. 331-335 ISSN: 2192-5593
Kalysch A. :Android Application Hardening: Attack Surface Reduction and IP Protection Mechanisms (Dissertation, 2020 ) URL: https://opus4.kobv.de/opus4-fau/frontdoor/index/index/docId/14149
Kalysch A. , Deutel M. , Müller T. :Template-based Android inter-process communication fuzzing ARES '20: The 15th International Conference on Availability, Reliability and Security (Virtual Event, Dublin, Ireland , 25. August 2020 - 28. August 2020 )In: Melanie Volkamer, Christian Wressnegger (ed.): Proceedings of the 15th International Conference on Availability, Reliability and Security , New York, United States : 2020 DOI: 10.1145/3407023.3407052 URL: https://dl.acm.org/doi/10.1145/3407023.3407052
Kalysch A. , Schilling J. , Müller T. :On the Evolution of Security Issues in Android App Versions In: Jianying Zhou, Mauro Conti, Chuadhry Mujeeb Ahmed, Man Ho Au, Lejla Batina, Zhou Li, Jingqiang Lin, Eleonora Losiouk, Bo Luo, Suryadipta Majumdar, Weizhi Meng, Martín Ochoa, Stjepan Picek, Georgios Portokalidis, Cong Wang, Kehuan Zhang (ed.): ACNS: International Conference on Applied Cryptography and Network Security , Cham, Switzerland : Springer Nature Switzerland AG , 2020 , p. 523 - 541 (Lecture Notes in Computer Science)ISBN: 978-3-030-61637-3 DOI: 10.1007/978-3-030-61638-0_29 URL: https://link.springer.com/chapter/10.1007/978-3-030-61638-0_29
Latzo T. , Brost J. , Freiling F. :BMCLeech: Introducing Stealthy Memory Forensics to BMC In: Forensic Science International: Digital Investigation 32 (2020 )ISSN: 2666-2817 DOI: 10.1016/j.fsidi.2020.300919
Lorch B. , Maier A. , Riess C. :Reliable JPEG Forensics via Model Uncertainty IEEE International Workshop on Information Forensics and Security (online , 6. December 2020 - 11. December 2020 ) URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2020-Lorch-BLR.pdf
Maier A. , Lorch B. , Riess C. :Toward Reliable Models For Authenticating Multimedia Content: Detecting Resampling Artifacts With Bayesian Neural Networks IEEE International Conference on Image Processing (, 25. October 2020 - 28. October 2020 ) URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2020-Maier-BNN.pdf
Maier D. , Erb H. , Mullan P. , Haupert V. :Camera Fingerprinting Authentication Revisited RAID 2020 (Donostia / San Sebastian , 14. October 2020 - 16. October 2020 )In: International Symposium on Research in Attacks, Intrusions and Defenses , Cham, Switzerland : 2020
Matern F. , Riess C. , Stamminger M. :Depth Map Fingerprinting and Splicing Detection ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (Barcelona , 4. May 2020 - 8. May 2020 )In: ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2020 DOI: 10.1109/ICASSP40776.2020.9052979
Morgner P. , Mai C. , Koschate-Fischer N. , Freiling F. , Benenson Z. :Security Update Labels: Establishing Economic Incentives for Security Patching of IoT Consumer Products 41st IEEE Symposium on Security and Privacy (S&P) (San Francisco, CA , 18. May 2020 - 20. May 2020 )In: IEEE (ed.): Proceedings of the IEEE Symposium on Security and Privacy (S&P), May 2020 2020 DOI: 10.1109/SP40000.2020.00021 URL: https://www.computer.org/csdl/proceedings-article/sp/2020/349700a346/1j2LfHnkRPy
Mullan P. , Riess C. , Freiling F. :Towards Open-Set Forensic Source Grouping on JPEG Header Information In: Forensic Science International: Digital Investigation 32 (2020 )ISSN: 2666-2817 DOI: 10.1016/j.fsidi.2020.300916
Müller N. , Müller T. , Freiling F. :Urheberrecht ./. Sicherheitsanalyse SICHERHEIT 2020 In: Reinhardt, D., Langweg, H., Witt, B. C., Fischer, M (ed.): SICHERHEIT 2020 , Bonn : 2020 DOI: 10.18420/sicherheit2020_08 URL: https://dl.gi.de/handle/20.500.12116/31793
Palutke R. , Block F. , Reichenberger P. , Stripeika D. :Hiding Process Memory Via Anti-Forensic Techniques In: Forensic Science International: Digital Investigation 33 (2020 )ISSN: 2666-2817 DOI: 10.1016/j.fsidi.2020.301012
Palutke R. , Ruderich S. , Wild M. , Freiling F. :HyperLeech: Stealthy System Virtualization with Minimal Target Impact through DMA-Based Hypervisor Injection 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020) (San Sebastian , 14. October 2020 - 16. October 2020 )In: USENIX (ed.): Proceedings of the 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020) 2020 Open Access: https://www.usenix.org/system/files/raid20-palutke.pdf URL: https://www.usenix.org/system/files/raid20-palutke.pdf
Prade P. , Groß T. , Dewald A. :Forensic Analysis of the Resilient File System (ReFS) Version 3.4 DFRWS 2020 EU (Oxford, United Kingdom , 3. June 2020 - 5. June 2020 )In: Proceedings of the Seventh Annual DFRWS Europe 2020 DOI: 10.1016/j.fsidi.2020.300915
Pugliese G. , Rieß C. , Gassmann F. , Benenson Z. :Long-Term Observation on Browser Fingerprinting: Users’ Trackability and Perspective In: Sciendo (ed.): Proceedings on Privacy Enhancing Technologies (PoPETs), Volume 2020: Issue 2 2020 DOI: 10.2478/popets-2020-0041 URL: https://content.sciendo.com/view/journals/popets/2020/2/article-p558.xml
Schirrmacher F. , Lorch B. , Stimpel B. , Köhler T. , Riess C. :SR²: Super-Resolution With Structure-Aware Reconstruction 2020 IEEE International Conference on Image Processing (ICIP) (Online , 25. October 2020 - 28. October 2020 ) DOI: 10.1109/ICIP40778.2020.9191253 URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2020-Schirrmacher-SR2.pdf
Schirrmacher F. , Riess C. , Köhler T. :Adaptive Quantile Sparse Image (AQuaSI) Prior for Inverse Imaging Problems In: IEEE Transactions on Computational Imaging 6 (2020 ), p. 503--517 ISSN: 2333-9403 DOI: 10.1109/TCI.2019.2956888 URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2020-Schirrmacher-AQS.pdf
Schneider J. , Milius S. , Deifel HP. , Freiling F. :Unifying Metadata-Based Storage Reconstruction and Carving with LAYR DFRWS 2020 USA (Virtual , 20. July 2020 - 24. July 2020 )In: Elsevier (ed.): Forensic Science International: Digital Investigation 2020 DOI: 10.1016/j.fsidi.2020.301006 URL: https://www.sciencedirect.com/science/article/pii/S2666281720302559
Schneider J. , Wolf J. , Freiling F. :Tampering with digital evidence is hard: The case of main memory images DFRWS EU 2020 (Virtual , 25. March 2020 - 28. March 2020 )In: Elsevier (ed.): Forensic Science International: Digital Investigation 2020 DOI: 10.1016/j.fsidi.2020.300924 URL: https://www.sciencedirect.com/science/article/pii/S2666281720300196
Spensky C. , MacHiry A. , Busch M. , Leach K. , Housley R. , Kruegel C. , Vigna G. :TRUST.IO: Protecting Physical Interfaces on Cyber-physical Systems 2020 IEEE Conference on Communications and Network Security, CNS 2020 (ONLINE , 29. June 2020 - 1. July 2020 )In: 2020 IEEE Conference on Communications and Network Security, CNS 2020 2020 DOI: 10.1109/CNS48642.2020.9162246
2019
Abdullah L. , Freiling F. , Quintero J. , Benenson Z. :Sealed computation: Abstract requirements for mechanisms to support trustworthy cloud computing 4th International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2018 and 2nd International Workshop on Security and Privacy Requirements Engineering, SECPRE 2018 held in conjunction with 23rd European Symposium on Research in Computer Security, ESORICS 2018 (Barcelona , 6. September 2018 - 7. September 2018 )In: Frédéric Cuppens, Nora Cuppens, Christos Kalloniatis, Sokratis K. Katsikas, Costas Lambrinoudakis, John Mylopoulos, Annie Antón, Stefanos Gritzalis (ed.): Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2019 DOI: 10.1007/978-3-030-12786-2_9
Abdullah L. , Hahn S. , Freiling F. :Achieving consistency of software updates against strong attackers 3rd Central European Cybersecurity Conference, CECC 2019 (Munich , 14. November 2019 - 15. November 2019 )In: ACM International Conference Proceeding Series 2019 DOI: 10.1145/3360664.3360670
Abdullah L. , Quintero J. :Sealed computation: a mechanism to support privacy-aware trustworthy cloud service In: Information and Computer Security (2019 )ISSN: 2056-4961 DOI: 10.1108/ICS-11-2018-0133
Armknecht F. , Benenson Z. , Morgner P. , Müller C. , Riess C. :Privacy implications of room climate data In: Journal of Computer Security 27 (2019 ), p. 113-136 ISSN: 0926-227X DOI: 10.3233/JCS-181133 URL: https://content.iospress.com/articles/journal-of-computer-security/jcs181133
Bajramovic E. , Gupta D. , Guo Y. , Waedt K. , Bajramovic A. :Security challenges and best practices for iiot 49. Jahrestagung der Gesellschaft fur Informatik: 50 Jahre Gesellschaft fur Informatik - Informatik fur Gesellschaft, INFORMATIK 2019 - 49th Annual Meeting of the German Informatics Society: 50 years of the German Informatics Society - Computer Science for Society, INFORMATICS 2019 (Kassel , 23. September 2019 - 26. September 2019 )In: Claude Draude, Martin Lange, Bernhard Sick (ed.): Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI) 2019 DOI: 10.18420/inf2019_ws28
Benenson Z. , Berger F. , Cherepantsev A. , Datsevich S. , Do L. , Eckert M. , Elsberger T. , Freiling F. , Frinken M. , Glameyer H. , Hafner S. , Hagenhoff S. , Hammer A. , Hammerl S. , Hantke F. , Heindorf F. , Henninger M. , Höfer D. , Kuhrt P. , Lattka M. , Leis T. , Leubner C. , Leyrer K. , Lindenmeier C. , Del Medico K. , Moussa D. , Nissen M. , Öz A. , Ottmann J. , Reif K. , Ripley N. , Roth A. , Schilling J. , Schleicher R. , Schulz D. , Stephan M. , Volkert C. , Wehner M. , Wild M. , Wirth J. , Wolf J. , Wunder J. , Zlatanovic J. :Analyse verbreiteter Anwendungen zum Lesen von elektronischen Büchern CS-2019-06 (2019 ) Open Access: http://nbn-resolving.de/urn:nbn:de:bvb:29-opus4-125519 URL: http://nbn-resolving.de/urn:nbn:de:bvb:29-opus4-125519 (Working Paper)
Block F. , Dewald A. :Windows Memory Forensics: Detecting (Un)Intentionally Hidden Injected Code by Examining Page Table Entries In: Digital Investigation 29 (2019 ), p. S3-S12 ISSN: 1742-2876 DOI: 10.1016/j.diin.2019.04.008
Bopp J. , Ludwig V. , Seifert M. , Pelzer G. , Maier A. , Anton G. , Riess C. :Simulation study on X-ray phase contrast imaging with dual-phase gratings In: International Journal of Computer Assisted Radiology and Surgery 14 (2019 ), p. 3-10 ISSN: 1861-6410 DOI: 10.1007/s11548-018-1872-x URL: https://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2018/Bopp18-SSO.pdf
Botacin M. , Kalysch A. , Grégio A. :The Internet Banking [in]Security Spiral: Past, Present, and Future of Online Banking Protection Mechanisms based on a Brazilian case study Conference on Availability, Reliability and Security (Canterbury, United Kingdom , 26. August 2019 - 29. August 2019 )In: Edgar Weippl, SBA Research, Austria
A Min Tjoa, TU Vienna, Austria (ed.): Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019) (ARES ’19) , New York, (NY), USA : 2019 DOI: 10.1145/3339252.3340103
Bove D. , Kalysch A. :In pursuit of a secure UI: The cycle of breaking and fixing Android’s UI In: it - Information Technology Methods and Applications of Informatics and Information Technology (2019 )ISSN: 1611-2776 DOI: 10.1515/itit-2018-0023
Bove D. , Müller T. :Investigating Characteristics of Attacks on Public Cloud Systems 6th IEEE International Conference on Cyber Security and Cloud Computing (Paris , 21. June 2019 - 23. June 2019 )In: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud) 2019 DOI: 10.1109/CSCloud/EdgeCom.2019.00-13 URL: https://ieeexplore.ieee.org/document/8854036
Busch M. , Schlenk R. , Heckel H. :TEEMO: Trusted peripheral monitoring for optical networks and beyond 4th Workshop on System Software for Trusted Execution, SysTEX 2019 (Huntsville, ON , 27. October 2019 )In: Proceedings of the 4th Workshop on System Software for Trusted Execution, SysTEX 2019 2019 DOI: 10.1145/3342559.3365339
Davari A. , Özkan HC. , Maier A. , Rieß C. :Fast and Efficient Limited Data Hyperspectral Remote Sensing Image Classification via GMM-Based Synthetic Samples In: IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 12 (2019 ), p. 2107-2120 ISSN: 1939-1404 DOI: 10.1109/JSTARS.2019.2916495 URL: https://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2019/Davari_JSTARS_2019.pdf
Felsner L. , Hu S. , Ludwig V. , Anton G. , Maier A. , Rieß C. :On the Characteristics of Helical 3-D X-ray Dark-field Imaging Bildverarbeitung für die Medizin (BVM 2019) (Lübeck , 17. March 2019 - 19. March 2019 ) URL: https://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2019/Felsner19-OTC.pdf
Felsner L. , Hu S. , Maier A. , Bopp J. , Ludwig V. , Anton G. , Riess C. :A 3-D Projection Model for X-ray Dark-field Imaging In: Scientific Reports 9 (2019 )ISSN: 2045-2322 Open Access: https://www.nature.com/articles/s41598-019-45708-9
Gassmann F. , Benenson Z. , Landwirth R. :Communication as a threat Users' reactions to email and Facebook messages with suspicious links In: Österreichische Zeitschrift für Soziologie 44 (2019 ), p. 135-155 ISSN: 1011-0070 DOI: 10.1007/s11614-019-00351-6
Groß T. , Ahmadova M. , Müller T. :Analyzing android’s file-based encryption: Information leakage through unencrypted metadata International Workshop on Security of Mobile Applications (IWSMA 2019) (Canterbury, United Kingdom , 26. August 2019 - 29. August 2019 )In: Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019) 2019 DOI: 10.1145/3339252.3340340
Hadwiger B. , Baracchi D. , Piva A. , Riess C. :Towards learned color representations for image splicing detection International Conference on Acoustics, Speech, and Signal Processing (Brighton , 12. May 2019 - 17. May 2019 )In: 2019 IEEE International Conference on Acoustics, Speech, and Signal Processing Proceedings 2019
Haupert V. :Sicherheit mobiler Bankgeschäfte zwischen Innovation und Regulierung (Dissertation, 2019 ) URL: https://nbn-resolving.de/urn:nbn:de:bvb:29-opus4-113211
Haupert V. , Gabert S. :How to Attack PSD2 Internet Banking FC 2019 (Saint Peter Basseterre , 12. February 2019 - 22. September 2019 )In: Financial Cryptography and Data Security 2019 , Cham, Switzerland : 2019
Haupert V. , Gabert S. :Short Paper: How to Attack PSD2 Internet Banking 23rd International Conference on Financial Cryptography and Data Security, FC 2019 (St. Kitts , 18. February 2019 - 22. February 2019 )In: Ian Goldberg, Tyler Moore (ed.): Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2019 DOI: 10.1007/978-3-030-32101-7_15
Haupert V. , Gabert S. :Where to Look for What You See Is What You Sign? User Confusion in Transaction Security ESORICS 2019 (Luxemburg , 23. September 2019 - 27. September 2019 )In: Kazue Sako, Steve Schneider, Peter Ryan (ed.): 24th European Symposium on Research in Computer Security , Cham, Switzerland : 2019 DOI: 10.1007/978-3-030-29959-0_21
Latzo T. , Freiling F. :Characterizing the Limitations of Forensic Event Reconstruction Based on Log Files 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (Rotorua, New Zealand , 5. August 2019 - 8. August 2019 ) DOI: 10.1109/TrustCom/BigDataSE.2019.00069
Latzo T. , Palutke R. , Freiling F. :A universal taxonomy and survey of forensic memory acquisition techniques In: Digital Investigation (2019 ), p. 56-69 ISSN: 1742-2876 DOI: 10.1016/j.diin.2019.01.001
Lorch B. , Agarwal S. , Farid H. :Forensic Reconstruction of Severely Degraded License Plates IS&T Electronic Imaging (Burlingame, CA , 13. January 2019 - 16. January 2019 )In: Society for Imaging Science & Technology (ed.): Electronic Imaging 2019 DOI: 10.2352/issn.2470-1173.2019.5.mwsf-529 URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2019-Lorch-LP.pdf
Lorch B. , Riess C. :Image Forensics from Chroma Subsampling of High-Quality JPEG Images ACM Workshop on Information Hiding and Multimedia Security (Paris , 3. July 2019 - 5. July 2019 ) URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2019-Lorch-IFC.pdf
Matern F. , Riess C. , Stamminger M. :Exploiting Visual Artifacts to Expose Deepfakes and Face Manipulations Workshop on Image and Video Forensics (Waikoloa Village, HI , 11. January 2019 - 11. January 2019 )In: IEEE Workshop on Applications in Computer Vision 2019 URL: https://faui1-files.cs.fau.de/public/mmsec/pub/matern_ivfws_2019_face_artifacts.pdf
Matern F. , Riess C. , Stamminger M. :Gradient-Based Illumination Description for Image Forgery Detection In: IEEE Transactions on Information Forensics and Security (2019 )ISSN: 1556-6013 DOI: 10.1109/TIFS.2019.2935913 URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2019-Matern-GBI.pdf
Morgner P. :Security and Privacy in the Internet of Things: Technical and Economic Perspectives (Dissertation, 2019 ) URL: http://nbn-resolving.de/urn:nbn:de:bvb:29-opus4-112070
Mullan P. , Riess C. , Freiling F. :Forensic source identification using JPEG image headers: The case of smartphones In: Digital Investigation 28 (2019 ), p. S68-S76 ISSN: 1742-2876 DOI: 10.1016/j.diin.2019.01.016
Mullan P. , Rieß C. , Freiling F. :Forensic Source Identification using JPEG Image Headers: The Case of Smartphones DFRWS EU (Oslo , 24. April 2019 - 26. April 2019 )In: Digital Investigation 2019
Palutke R. , Neubaum A. , Götzfried J. :SEVGuard: Protecting User Mode Applications using Secure Encrypted Virtualization SecureComm (Orlando , 23. October 2019 - 25. October 2019 )In: SecureComm 2019 Proceedings , New York City, United States of America : 2019
Prade P. , Groß T. , Dewald A. :Forensic Analysis of the Resilient File System (ReFS) Version 3.4 (2019 )ISSN: 2191-5008 DOI: 10.25593/issn.2191-5008/CS-2019-05 URL: https://opus4.kobv.de/opus4-fau/files/12526/refs_report.pdf (Techreport)
Prechtel D. , Groß T. , Müller T. :Evaluating Spread of 'Gasless Send' in Ethereum Smart Contracts 2nd International Workshop on Blockchains and Smart Contracts (BSC) (1 Calle Mar Mediterráneo, Maspalomas, Gran Canaria, 35100, Spain , 24. June 2019 - 26. June 2019 )In: IEEE (ed.): 10th IFIP International Conference on New Technologies, Mobility & Security (NTMS 2019) 2019
Prokosch HU. , Schüttler C. , Schraudt M. , Öfelein M. , Maier C. :Digital patient communication: Improving the hospital-patient relationship In: Healthcare of the Future - Bridging the Information Gap , IOS Press , 2019 , p. 3-9 (Studies in Health Technology and Informatics, Vol.259) DOI: 10.3233/978-1-61499-961-4-3
Quintero J. , Benenson Z. :Understanding usability and user acceptance of usage-based insurance from users' view 2nd International Conference on Machine Learning and Machine Intelligence, MLMI 2019 (Jakarta , 18. September 2019 - 20. September 2019 )In: ACM International Conference Proceeding Series 2019 DOI: 10.1145/3366750.3366759
Reinfelder L. , Landwirth R. , Benenson Z. :Security Managers Are Not the Enemy Either In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems , ACM , 2019 , p. 1-7 DOI: 10.1145/3290605.3300663
Riess C. :Täuschend echt: Die Erzeugung von digitalen Bildfälschungen und ihre Erkennung In: Rudolph Freiburg (ed.): Täuschungen - Erlanger Universitätstage 2018 , Erlangen : FAU University Press , 2019 , p. 95-113 (FAU Forschungen, Reihe A, Geisteswissenschaften, Vol.14)ISBN: 978-3-96147-221-5 DOI: 10.25593/978-3-96147-222-2 URL: https://faui1-files.cs.fau.de/public/publications/mmsec/2019-Riess-TEE.pdf
Roessler A. , Cozzolino D. , Verdoliva L. , Riess C. , Thies J. , Niessner M. :FaceForensics plus plus : Learning to Detect Manipulated Facial Images IEEE/CVF International Conference on Computer Vision (ICCV) (Seoul , 27. October 2019 - 2. November 2019 )In: 2019 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2019) , LOS ALAMITOS : 2019 DOI: 10.1109/ICCV.2019.00009
Roessler A. , Cozzolino D. , Verdoliva L. , Rieß C. , Thies J. , Niessner M. :FaceForensics++: Learning to Detect Manipulated Facial Images (2019 ) Open Access: https://arxiv.org/pdf/1901.08971.pdf URL: https://arxiv.org/pdf/1901.08971.pdf (Techreport)
Schiller J. , Freiling F. , Benenson Z. , Massonne W. :Berufsbegleitendes Studieren an Universitäten - Ein Zukunftsfeld für die IT-Sicherheit In: Informatik-Spektrum 42 (2019 ), p. 38-47 ISSN: 0170-6012 DOI: 10.1007/s00287-019-01145-6
Schorradt S. , Bajramovic E. , Freiling F. :On the feasibility of secure logging for industrial control systems using blockchain 3rd Central European Cybersecurity Conference, CECC 2019 (Munich , 14. November 2019 - 15. November 2019 )In: ACM International Conference Proceeding Series 2019 DOI: 10.1145/3360664.3360668
Watson V. , Bajramovic E. , Bejiga M. , Waedt K. :Designing Trustworthy Monitoring Systems: Forensic Readiness for Safety and Security 12th International Conference on Reliability, Maintainability, and Safety, ICRMS 2018 (Shanghai , 17. October 2018 - 19. October 2018 )In: Proceedings - 12th International Conference on Reliability, Maintainability, and Safety, ICRMS 2018 2019 DOI: 10.1109/ICRMS.2018.00038
2018
Afonso V. , Kalysch A. , Müller T. , Oliveira D. , Grégio A. , De Geus PL. :Lumus: Dynamically Uncovering Evasive Android Applications ISC 2018 (Guildford, UK , 9. September 2018 - 12. September 2018 )In: Liqun Chen, Mark Manulis, Steve Schneider (ed.): Information Security - 21th International Conference , Guildford, UK : 2018 DOI: 10.1007/978-3-319-99136-8_3 URL: https://link.springer.com/chapter/10.1007/978-3-319-99136-8_3
Bopp J. , Felsner L. , Hu S. , Käppler S. , Riess C. :X-ray Phase Contrast: Research on a Future Imaging Modality Cham : Springer , 2018 (Lecture Notes in Computer Science book series (LNCS), Vol.11111 LNCS)ISBN: 978-3-319-96519-2 DOI: 10.1007/978-3-319-96520-8_9
Bopp J. , Felsner L. , Hu S. , Käppler S. , Riess C. :X-ray Phase Contrast: Research on a Future Imaging Modality In: Medical Imaging Systems - An Introductory Guide , 2018 , p. 191--205 DOI: 10.1007/978-3-319-96520-8_9
Bopp J. , Gallersdörfer M. , Ludwig V. , Seifert M. , Maier A. , Anton G. , Riess C. :Phasenkontrast Röntgen mit 2 Phasengittern und medizinisch relevanten Detektoren Bildverarbeitung für die Medizin 2018 - Algorithmen - Systeme - Anwendungen (Erlangen , 11. March 2018 - 13. March 2018 )In: Proceedings des Workshops Bildverarbeitung für die Medizin 2018 - Algorithmen - Systeme - Anwendungen 2018 DOI: 10.1007/978-3-662-56537-7_50
Cozzolino D. , Thies J. , Roessler A. , Riess C. , Niessner M. , Verdoliva L. :ForensicTransfer: Weakly-supervised Domain Adaptation for Forgery Detection (2018 ), Article No.: arXiv:1812.02510 Open Access: https://arxiv.org/pdf/1812.02510 URL: https://arxiv.org/pdf/1812.02510 (Techreport)
Davari A. , Aptoula E. , Yanikoglu B. , Maier A. , Riess C. :GMM-based Synthetic Samples for Classification of Hyperspectral Images with Limited Training Data In: IEEE Geoscience and Remote Sensing Letters 15 (2018 ), p. 942-946 ISSN: 1545-598X DOI: 10.1109/LGRS.2018.2817361 URL: https://arxiv.org/pdf/1712.04778.pdf
Davari A. , Sakaltras N. , Haeberle A. , Vesal S. , Christlein V. , Maier A. , Riess C. :Hyper-Hue and EMAP on Hyperspectral Images for Supervised Layer Decomposition of Old Master Drawings International Conference on Image Processing (ICIP) (Athens, Greece , 7. October 2018 - 10. October 2018 )In: International Conference on Image Processing (ICIP) 2018 DOI: 10.1109/ICIP.2018.8451768 URL: http://arxiv.org/abs/1801.09472 (Techreport)
Davari A. , Özkan HC. , Maier A. , Riess C. :Fast Sample Generation with Variational Bayesian for Limited Data Hyperspectral Image Classification IEEE International Geoscience and Remote Sensing Symposium (Valencia , 22. July 2018 - 27. July 2018 )In: IEEE International Geoscience and Remote Sensing Symposium 2018 DOI: 10.1109/IGARSS.2018.8517643 URL: https://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2018/Davari18-FSG.pdf
Felsner L. , Berger M. , Käppler S. , Bopp J. , Ludwig V. , Weber T. , Pelzer G. , Michel T. , Maier A. , Anton G. , Riess C. :Phase-Sensitive Region-of-Interest Computed Tomography 21st International Conference on Medical Image Computing and Computer Assisted Intervention, MICCAI 2018 (Granada , 17. September 2018 - 19. September 2018 )In: 21st International Conference on Medical Image Computing and Computer Assisted Intervention 2018 DOI: 10.1007/978-3-030-00928-1_16 URL: https://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2018/Felsner18-PRC.pdf
Freiling F. , Bajramovic E. :Principles of Secure Logging for Safekeeping Digital Evidence 11th International Conference on IT Security Incident Management & IT Forensics (IMF 2018) (Hamburg )In: IEEE Computer Society (ed.): 2018 11th International Conference on IT Security Incident Management & IT Forensics (IMF) 2018 DOI: 10.1109/IMF.2018.00012
Freiling F. , Groß T. , Latzo T. , Müller T. , Palutke R. :Advances in Forensic Data Acquisition In: IEEE Design & Test 35 (2018 ), p. 1-12 ISSN: 2168-2356 DOI: 10.1109/MDAT.2018.2862366
Freiling F. , Hösch L. :Controlled experiments in digital evidence tampering In: Digital Investigation 24S (2018 ), p. S83-S92 ISSN: 1742-2876 DOI: 10.1016/j.diin.2018.01.011 URL: http://dfrws.org/conferences/dfrws-eu-2018/sessions/controlled-experiments-digital-evidence-tampering
Freiling F. , Safferling C. , Rückert C. :Quellen-TKÜ und Online-Durchsuchung als neue Maßnahmen für die Strafverfolgung: Rechtliche und technische Herausforderungen In: Juristische Rundschau 1 (2018 ), p. 9-22 ISSN: 0022-6920
Fürsattel P. , Placht S. , Maier A. , Riess C. :Geometric primitive refinement for structured light cameras In: Machine Vision and Applications 29 (2018 ), p. 313-327 ISSN: 1432-1769 DOI: 10.1007/s00138-017-0901-z
Gascon H. , Ullrich S. , Stritter B. , Rieck K. :Reading Between the Lines: Content-Agnostic Detection of Spear-Phishing Emails Research in Attacks, Intrusions, and Defenses - 21st International Symposium, RAID 2018 (Heraklion, Crete, Greece , 10. September 2018 - 12. September 2018 )In: Michael Bailey, Thorsten Holz, Manolis Stamatogiannakis, Sotiris Ioannidis (ed.): Research in Attacks, Intrusions, and Defenses - 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings 2018
Gupta D. , Bajramovic E. , Parekh M. , Waedt K. :Cyber Threat Scenarios for Electrical Systems of Nuclear Power Plants 26th International Conference on Nuclear Engineering (ICONE-26) (London , 22. July 2018 - 26. July 2018 )In: PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE ON NUCLEAR ENGINEERING, 2018, VOL 9 , NEW YORK : 2018
Götzfried J. :RAM-Schranke: RAM-Verschlüsselung bei AMD und Intel 10/2018 (2018 ), p. 174-179 URL: https://heise.de/-4028190 (Zeitungsartikel)
Götzfried J. :Trusted Systems in Untrusted Environments: Protecting against Strong Attackers (Dissertation, 2018 ) URL: https://nbn-resolving.org/urn:nbn:de:bvb:29-opus4-91150
Haupert V. , Maier D. , Schneider N. , Kirsch J. , Müller T. :Honey, I Shrunk Your App Security: The State of Android App Hardening DIMVA 2018 (Paris , 28. June 2018 - 29. June 2018 )In: Giuffrida Cristiano, Bardin Sébastien, Blanc Gregory (ed.): Detection of Intrusions and Malware, and Vulnerability Assessment , Cham, Switzerland : 2018 DOI: 10.1007/978-3-319-93411-2_4 URL: https://www.cs1.tf.fau.de/nomorp
Haupert V. , Müller T. :On App-based Matrix Code Authentication in Online Banking ICISSP 2018 (Funchal, Madeira , 22. January 2018 - 24. January 2018 )In: Furnell Steven, Mori Paolo, Camp Olivier (ed.): Proceedings of the 4th International Conference on Information Systems Security and Privacy , Setúbal : 2018 DOI: 10.5220/0006650501490160 URL: https://www1.cs.fau.de/appAuth
Haupert V. , Pugliese G. :Ich sehe was, das du nicht siehst: Die Realität von Mobilebanking zwischen allgemeinen und rechtlichen Anforderungen Sicherheit, Schutz und Zuverlässigkeit (Konstanz , 25. April 2018 - 27. April 2018 )In: Langweg, Hanno ; Meier, Michael ; Witt, Bernhard C. ; Reinhardt, Delphine (ed.): Konferenzband der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) , Bonn : 2018 DOI: 10.18420/sicherheit2018_13
Horn F. , Leghissa M. , Käppler S. , Pelzer G. , Rieger J. , Seifert M. , Wandner J. , Weber T. , Michel T. , Riess C. , Anton G. :Implementation of a Talbot-Lau Interferometer in a Clinical-like C-Arm Setup: A Feasibility Study In: Scientific Reports 8 (2018 ), Article No.: 2325 ISSN: 2045-2322 DOI: 10.1038/s41598-018-19482-z URL: https://www.nature.com/articles/s41598-018-19482-z
Hu S. , Felsner L. , Maier A. , Ludwig V. , Anton G. , Riess C. :A 3-D Projection Model for X-ray Dark-field Imaging (2018 ), Article No.: arXiv:1811.04457 Open Access: https://arxiv.org/pdf/1811.04457 URL: https://arxiv.org/pdf/1811.04457 (Techreport)
Hänsch N. , Schankin A. , Protsenko M. , Freiling F. , Benenson Z. :Programming Experience Might Not Help in Comprehending Obfuscated Source Code Efficiently SOUPS 2018 (Baltimore, MD, USA )In: Proceedings of the Fourteenth Symposium on Usable Privacy and Security 2018
Kalysch A. , Bove D. , Müller T. :How Android’s UI Security is Undermined by Accessibility ROOTS' 18 (Vienna , 29. November 2018 - 30. November 2018 )In: Proceedings of the 2nd Reversing and Offensive-oriented Trends Symposium , New York, NY, USA : 2018 DOI: 10.1145/3289595.3289597 URL: https://dl.acm.org/citation.cfm?id=3289597
Kalysch A. , Milisterfer O. , Protsenko M. , Müller T. :Tackling Android's Native Library Malware with Robust, Efficient and Accurate Similarity Measures International Conference on Availability, Reliability and Security Proceedings 2018 (Hamburg, Germany , 27. August 2018 - 30. August 2018 )In: ACM (ed.): Proceedings of the 13th International Conference on Availability, Reliability and Security , Hamburg : 2018 DOI: 10.1145/3230833.3232828 URL: http://doi.acm.org/10.1145/3230833.3232828
Kraus M. , Haupert V. :The Swift Language from a Reverse Engineering Perspective ROOTS (Vienna , 29. November 2018 - 30. November 2018 )In: Proceedings of the 2nd Reversing and Offensive-oriented Trends Symposium , New York, NY, USA : 2018 DOI: 10.1145/3289595.3289599 URL: https://github.com/maltek/swift-frida
Käppler S. , Maier A. , Riess C. :Differential Tomography: Influence of Sensitivity Direction and Noise-suppressing Windows 5th International Conference on Image Formation in X-ray Computed Tomography (CT-Meeting) In: Proceedings of the 5th International Conference on Image Formation in X-ray Computed Tomography (CT-Meeting) 2018
Köhler T. , Bätz M. , Naderi Boldaji F. , Kaup A. , Maier A. , Riess C. :Bridging the Simulated-to-Real Gap: Benchmarking Super-Resolution on Real Data (2018 ), Article No.: arXiv:1809.06420 Open Access: https://arxiv.org/pdf/1809.06420 URL: https://arxiv.org/pdf/1809.06420 (Techreport)
Lazard T. , Götzfried J. , Müller T. , Santinelli G. , Lefebvre V. :TEEshift: Protecting Code Confidentiality by Selectively Shifting Functions into TEEs SysTEX'18 (Toronto, ON, Canada )In: 3rd Workshop on System Software for Trusted Execution 2018 DOI: 10.1145/3268935.3268938 URL: https://www1.cs.fau.de/teeshift
Lefebvre V. , Santinelli G. , Müller T. , Götzfried J. :Universal Trusted Execution Environments for Securing SDN/NFV Operations International Conference on Availability, Reliability and Security (Hamburg, Germany )In: SBA Research (ed.): ARES 2018: International Conference on Availability, Reliability and Security , Hamburg : 2018 DOI: 10.1145/3230833.3233256
Maene P. , Götzfried J. , Müller T. , de Clercq R. , Freiling F. , Verbauwhede I. :Atlas: Application Confidentiality in Compromised Embedded Systems In: IEEE Transactions on Dependable and Secure Computing (2018 )ISSN: 1545-5971 DOI: 10.1109/TDSC.2018.2858257
Maier A. , Syben-Leisner C. , Lasser T. , Riess C. :A Gentle Introduction to Deep Learning in Medical Image Processing (2018 ), Article No.: arXiv:1810.05401 Open Access: https://arxiv.org/pdf/1810.05401 URL: https://arxiv.org/pdf/1810.05401 (Techreport)
Menges F. , Böhm F. , Vielberth M. , Puchta A. , Taubmann B. , Rakotondravony N. , Latzo T. :Introducing DINGfest: An architecture for next generation SIEM systems Jahrestagung des Fachbereichs Sicherheit - Schutz und Zuverlässigkeit der Gesellschaft für Informatik (Konstanz )In: SICHERHEIT 2018 , Bonn : 2018
Morgner P. , Benenson Z. :Exploring Security Economics in IoT Standardization Efforts NDSS-DISS (San Diego, CA, USA )In: Proceedings 2018 NDSS Workshop on Decentralized IoT Security and Standards (DISS) 2018 DOI: 10.14722/diss.2018.23009 URL: https://www.ndss-symposium.org/wp-content/uploads/2018/07/diss2018_9_Morgner_paper.pdf
Morgner P. , Freiling F. , Benenson Z. :Opinion: Security Lifetime Labels -- Overcoming Information Asymmetry in Security of IoT Consumer Products WiSec'18 (Stockholm, Sweden , 18. June 2018 - 20. June 2018 )In: Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'18) 2018 DOI: 10.1145/3212480.3212486 URL: https://dl.acm.org/citation.cfm?id=3212486
Morgner P. , Pfennig S. , Salzner D. , Benenson Z. :Malicious IoT Implants: Tampering with Serial Communication over the Internet RAID 2018 (Heraklion, Crete, Greece )In: Proceedings of the 21st International Symposium on Research in Attacks, Intrusions, and Defenses (RAID 2018) 2018 DOI: 10.1007/978-3-030-00470-5_25 URL: https://www1.cs.fau.de/filepool/publications/raid2018-malicious-iot-implants.pdf
Nemetz S. , Schmitt S. , Freiling F. :A standardized corpus for SQLite database forensics In: Digital Investigation 24S (2018 ), p. S121-S130 ISSN: 1742-2876 DOI: 10.1016/j.diin.2018.01.015 URL: http://dfrws.org/conferences/dfrws-eu-2018/sessions/standardized-corpus-sqlite-database-forensics
Palutke R. , Freiling F. :Styx: Countering robust memory acquisition In: Digital Investigation 24S (2018 ), p. S18-S28 ISSN: 1742-2876 DOI: 10.1016/j.diin.2018.01.004 URL: http://dfrws.org/conferences/dfrws-eu-2018/sessions/styx-countering-robust-memory-acquisition
Ploner S. , Riess C. , Schottenhamml J. , Moult EM. , Waheed NK. , Fujimoto JG. , Maier A. :A Joint Probabilistic Model for Speckle Variance, Amplitude Decorrelation and Interframe Variance (IFV) Optical Coherence Tomography Angiography Bildverarbeitung für die Medizin 2018 - Algorithmen - Systeme - Anwendungen (Erlangen , 11. March 2018 - 13. March 2018 )In: Proceedings des Workshops Bildverarbeitung für die Medizin 2018 - Algorithmen - Systeme - Anwendungen 2018 DOI: 10.1007/978-3-662-56537-7_37
Polleit P. , Spreitzenbarth M. :Defeating the Secrets of OTP Apps 11th International Conference on IT Security Incident Management & IT Forensics (IMF 2018) (Hamburg )In: IEEE Computer Society (ed.): Proceedings of the 11th International Conference on IT Security Incident Management & IT Forensics , Los Alamitos, CA, USA : 2018 DOI: 10.1109/IMF.2018.00013 URL: https://faui1-files.cs.fau.de/public/publications/Spreitzenbarth-Polleit-IMF-2018-Defeating_OTP.pdf
Reinfelder L. , Schankin A. , Russ S. , Benenson Z. :An Inquiry into Perception and Usage of Smartphone Permission Models 15th International Conference on Trust, Privacy and Security in Digital Business (TrustBus) (Regensburg , 5. September 2018 - 6. September 2018 )In: TrustBus Conference Proceedings , CHAM : 2018 DOI: 10.1007/978-3-319-98385-1_2
Roessler A. , Cozzolino D. , Verdoliva L. , Riess C. , Thies J. , Niessner M. :FaceForensics: A Large-scale Video Dataset for Forgery Detection in Human Faces abs/1803.09179 (2018 ) URL: http://arxiv.org/abs/1803.09179 (Techreport)
Schirrmacher F. , Köhler T. , Riess C. :Adaptive Quantile Sparse Image (AQuaSI) Prior for Inverse Imaging Problems abs/1804.02152 (2018 ) URL: http://arxiv.org/abs/1804.02152 (Techreport)
Schmitt S. :Introducing Anti-Forensics to SQLite Corpora and Tool Testing International Conference on IT Security Incident Management & IT Forensics (IMF 2018) (Hamburg, Germany )In: Proceedings of the 11th International Conference on IT Security Incident Management & IT Forensics , Los Alamitos, CA, USA : 2018
Seuffert J. , Stamminger M. , Riess C. :Towards Forensic Exploitation of 3-D Lighting Environments in Practice Sicherheit 2018 (Konstanz , 25. April 2018 - 27. April 2018 )In: Beiträge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft fü}r Informatik e.V. (GI) 2018 DOI: 10.18420/sicherheit2018_12
Stadlinger J. , Block F. , Dewald A. :Linux Memory Forensics: Expanding Rekall Userland Investigation 11th International Conference on IT Security Incident Management & IT Forensics (IMF 2018) (Hamburg )In: IEEE Computer Society (ed.): 2018 11th International Conference on IT Security Incident Management & IT Forensics (IMF) 2018 DOI: 10.1109/IMF.2018.00010
Watson V. , Bajramovic E. , Lou X. , Waedt K. :EXAMPLE OF GRADED AND LIFECYCLE PHASE-SPECIFIC SECURITY CONTROLS FOR NUCLEAR I&C AND EPS USE CASES 26th International Conference on Nuclear Engineering (ICONE-26) (London , 22. July 2018 - 26. July 2018 )In: PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE ON NUCLEAR ENGINEERING, 2018, VOL 5 , NEW YORK : 2018
Wirth M. , Gradl S. , Poimann D. , Richer R. , Ottmann J. , Eskofier B. :Exploring the Feasibility of EMG Based Interaction for Assessing Cognitive Capacity in Virtual Reality 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBC 2018 (Honolulu, HI, USA , 18. July 2018 - 21. July 2018 )In: Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS 2018 DOI: 10.1109/EMBC.2018.8513213
Wirth M. , Gradl S. , Sembdner J. , Kuhrt S. , Eskofier B. :Evaluation of Interaction Techniques for a Virtual Reality Reading Room in Diagnostic Radiology 31st Annual ACM Symposium on User Interface Software and Technology (UIST) (Berlin , 14. October 2018 - 17. October 2018 )In: UIST 2018: PROCEEDINGS OF THE 31ST ANNUAL ACM SYMPOSIUM ON USER INTERFACE SOFTWARE AND TECHNOLOGY , NEW YORK : 2018 DOI: 10.1145/3242587.3242636
Zieger A. , Freiling F. , Kossakowski KP. :The β-Time-to-Compromise Metric for Practical Cyber Security Risk Estimation 11th International Conference on IT Security Incident Management & IT Forensics (IMF 2018) (Hamburg )In: IEEE Computer Society (ed.): 2018 11th International Conference on IT Security Incident Management & IT Forensics 2018 DOI: 10.1109/IMF.2018.00017
Übler D. , Götzfried J. , Müller T. :Secure Remote Computation using Intel SGX Sicherheit, Schutz und Zuverlässigkeit (Konstanz )In: Sicherheit 2018 , Bonn : 2018 DOI: 10.18420/sicherheit2018_16
2017
Benenson Z. , Gassmann F. , Landwirth R. :Unpacking Spear Phishing Susceptibility Financial Cryptography and Data Security Workshops In: Targeted Attacks , Malta : 2017
Berger M. , Xia Y. , Aichinger W. , Mentl K. , Unberath M. , Aichert A. , Riess C. , Hornegger J. , Fahrig R. , Maier A. :Motion Compensation for Cone-Beam CT using Fourier Consistency Conditions In: Physics in Medicine and Biology 62 (2017 ), p. 7181-7215 ISSN: 0031-9155 DOI: 10.1088/1361-6560/aa8129 URL: https://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2017/Berger17-MCF.pdf
Davari A. , Christlein V. , Vesal S. , Maier A. , Riess C. :GMM Supervectors for Limited Training Data in Hyperspectral Remote Sensing Image Classification 17th International Conference on Computer Analysis of Images and Patterns (Ystad , 22. August 2017 - 24. August 2017 )In: Proceedings of the 17th International Conference on Computer Analysis of Images and Patterns Part II 2017 DOI: 10.1007/978-3-319-64698-5_25
Davari A. , Haeberle A. , Riess C. :Sketch Layer Separation in Multi-Spectral Historical Document Images International Symposium on Digital Humanities In: International Symposium on Digital Humanities: Book of Abstracts 2017 Open Access: https://journals.lnu.se/index.php/isdh/article/download/431/378 URL: https://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2017/Davari17-IDHS-TR.pdf
Davari A. , Lindenberger T. , Haeberle A. , Christlein V. , Maier A. , Riess C. :Image Registration for the Alignment of Digitized Historical Documents abs/1712.04482 (2017 ) Open Access: https://arxiv.org/abs/1712.04482 URL: http://arxiv.org/abs/1712.04482 (Techreport)
Freiling F. , Glanzmann T. , Reiser H. :Characterizing loss of digital evidence due to abstraction layers In: Forensic Science International: Digital Investigation 20 (2017 ), p. 107-115 ISSN: 2666-2817 DOI: 10.1016/j.diin.2017.01.012
Freiling F. , Sack K. :Zur Authentizität und Integrität bei (digitalen) Beweismitteln In: Vieweg, Klaus (ed.): Festgabe Institut für Recht und Technik: Erlanger Festveranstaltungen 2011 und 2016 , Köln : Carl Heymanns Verlag , 2017 , p. 319-337 (Recht - Technik - Wirtschaft, Vol.111)ISBN: 978-3-452-28832-5 URL: https://faui1-files.cs.fau.de/public/publications/22-Freiling-Sack_RTW-111.pdf
Freiling F. , Zoubek C. :Do digital investigators have to program? A controlled experiment in digital investigation In: Digital Investigation 20S (2017 ), p. S37-S46 ISSN: 1742-2876 DOI: 10.1016/j.diin.2017.01.004
Fürsattel P. , Plank C. , Maier A. , Riess C. :Accurate laser scanner to camera calibration with application to range sensor evaluation In: IPSJ Transactions on Computer Vision and Applications 9 (2017 ), p. 21 ISSN: 1882-6695 DOI: 10.1186/s41074-017-0032-5
Fürsattel P. , Schaller C. , Maier A. , Riess C. :Distance error correction for time-of-flight cameras Automated Visual Inspection and Machine Vision II DOI: 10.1117/12.2271775
Groß T. , Müller T. :Protecting JavaScript Apps from Code Analysis SHCIS '17 (Neuchâtel, Switzerland , 19. June 2017 - 22. June 2017 )In: 4th Workshop on Security in highly connected IT systems 2017 DOI: 10.1145/3099012.3099018
Götzfried J. , Eckert M. , Schinzel S. , Müller T. :Cache Attacks on Intel SGX EuroSec'17 (Belgrade, Serbia )In: Proceedings of the Tenth European Workshop on System Security 2017 DOI: 10.1145/3065913.3065915 URL: https://www1.cs.fau.de/sgx-timing
Haupert V. , Maier D. , Müller T. :Paying the Price for Disruption: How a FinTech Allowed Account Takeover ROOTS (Vienna, Austria , 16. November 2017 - 17. November 2017 )In: Reversing and Offensive-oriented Trends Symposium , New York, NY, USA : 2017 DOI: 10.1145/3150376.3150383 URL: https://www1.cs.fau.de/n26
Haupert V. , Müller T. :Rest In Protection: A Kernel-Level Approach to Mitigate RIP Tampering ICISSP 2017 (Porto , 19. February 2017 - 21. February 2017 )In: Mori, Paolo ; Furnell, Steven ; Camp, Olivier (ed.): Proceedings of the 3rd International Conference on Information Systems Security and Privacy , Setúbal : 2017 DOI: 10.5220/0006083800250037
Hoffmann J. , Haupert V. , Freiling F. :Anscheinsbeweis und Kundenhaftung beim Online-Banking In: Zeitschrift für das gesamte Handelsrecht und Wirtschaftsrecht 181 (2017 ), p. 780-816 ISSN: 0044-2437
Horn F. , Gelse K. , Jabari S. , Hauke C. , Käppler S. , Ludwig V. , Meyer P. , Michel T. , Mohr J. , Pelzer G. , Rieger J. , Riess C. , Seifert M. , Anton G. :High-Energy X-Ray Talbot-Lau Radiography of a Human Knee In: Physics in Medicine and Biology 62 (2017 ), p. 6729-6745 ISSN: 0031-9155 DOI: 10.1088/1361-6560/aa7721 URL: http://iopscience.iop.org/article/10.1088/1361-6560/aa7721/
Kalysch A. , Götzfried J. , Müller T. :VMAttack: Deobfuscating Virtualization-Based Packed Binaries ARES'17 (Reggio Calabria, Italy , 29. August 2017 - 1. September 2017 )In: 12th International Conference on Availability, Reliability and Security 2017 DOI: 10.1145/3098954.3098995 URL: https://dl.acm.org/citation.cfm?doid=3098954.3098995
Käppler S. , Rieger J. , Pelzer G. , Horn F. , Michel T. , Maier A. , Anton G. , Riess C. :Improved Reconstruction of Phase-Stepping Data for Talbot-Lau X-Ray Imaging In: Journal of Medical Imaging 4 (2017 ), Article No.: 034005 ISSN: 2329-4310 DOI: 10.1117/1.JMI.4.3.034005 URL: https://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2017/Kaeppler17-IRO.pdf
Käppler S. , Seifert M. , Horn F. , Pelzer G. , Rieger J. , Michel T. , Maier A. , Anton G. , Riess C. :Talbot-Lau X-ray phase contrast for tiling-based acquisitions without reference scanning In: Medical Physics 44 (2017 ), p. 1886-1898 ISSN: 0094-2405 DOI: 10.1002/mp.12200
Köhler T. , Bätz M. , Naderi Boldaji F. , Kaup A. , Maier A. , Riess C. :Benchmarking Super-Resolution Algorithms on Real Data abs/1709.04881 (2017 ) Open Access: https://arxiv.org/abs/1709.04881 URL: http://arxiv.org/abs/1709.04881 (Techreport)
Lorch B. , Vaillant G. , Baumgartner C. , Bai W. , Rueckert D. , Maier A. :Automated Detection of Motion Artefacts in MR Imaging Using Decision Forests. In: Journal of Medical Engineering 2017 (2017 ), Article No.: 4501647 ISSN: 2314-5129 DOI: 10.1155/2017/4501647
Maene P. , Götzfried J. , de Clercq R. , Müller T. , Freiling F. , Verbauwhede I. :Hardware-Based Trusted Computing Architectures for Isolation and Attestation In: IEEE Transactions on Computers (2017 )ISSN: 0018-9340 DOI: 10.1109/TC.2017.2647955
Morgner P. , Mattejat S. , Benenson Z. , Müller C. , Armknecht F. :Insecure to the Touch: Attacking ZigBee 3.0 via Touchlink Commissioning WiSec'17 (Boston, MA )In: Proceedings of the 10th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec'17) 2017 DOI: 10.1145/3098243.3098254 URL: https://www1.cs.fau.de/filepool/publications/wisec2017_touchlink.pdf
Morgner P. , Müller C. , Ring M. , Eskofier B. , Riess C. , Armknecht F. , Benenson Z. :Privacy Implications of Room Climate Data In: Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS 2017) 2017 DOI: 10.1007/978-3-319-66399-9_18 URL: https://faui1-files.cs.fau.de/filepool/publications/esorics2017_privacy_room_climate.pdf
Mullan P. , Cozzolino D. , Verdoliva L. , Riess C. :Residual-based forensic comparison of video sequences IEEE International Conference on Image Processing (Beijing , 17. September 2017 - 20. September 2017 )In: IEEE International Conference on Image Processing 2017 DOI: 10.1109/ICIP.2017.8296533
Noorman J. , Van Bulck J. , Muhlberg JT. , Piessens F. , Maene P. , Preneel B. , Verbauwhede I. , Götzfried J. , Müller T. , Freiling F. :Sancus 2.0: A Low-Cost Security Architecture for IoT Devices In: ACM Transactions on Privacy and Security 20 (2017 ), Article No.: 7 ISSN: 2471-2566 DOI: 10.1145/3079763 URL: http://doi.acm.org/10.1145/3079763
Reinfelder L. , Benenson Z. :Exploring Security Processes in Organizations: the Case of Smartphones MuC Workshop Usable Security and Privacy (Regensburg )In: Mensch und Computer (MuC) 2017 - Workshopband 2017 DOI: 10.18420/muc2017-ws05-0403 URL: http://dl.mensch-und-computer.de/handle/123456789/5361
Riess C. :Illumination analysis in physics-based image forensics: A joint discussion of illumination direction and color 28th Tyrrhenian International Workshop on Digital Communications, TIWDC 2017 DOI: 10.1007/978-3-319-67639-5_9
de Clercq R. , Götzfried J. , Übler D. , Maene P. , Verbauwhede I. :SOFIA: Software and Control Flow Integrity Architecture In: Computers & Security 68 (2017 ), p. 16-35 ISSN: 0167-4048 DOI: 10.1016/j.cose.2017.03.013
2016
Armknecht F. , Benenson Z. , Morgner P. , Müller C. :On the Security of the ZigBee Light Link Touchlink Commissioning Procedure International Workshop on Security, Privacy and Reliability of Smart Buildings (Bonn )In: International Workshop on Security, Privacy and Reliability of Smart Buildings 2016 URL: https://dl.gi.de/bitstream/handle/20.500.12116/874/229.pdf
Bauer J. , Freiling F. :Towards Cycle-Accurate Emulation of Cortex-M Code to Detect Timing Side Channels ARES (Salzburg )In: 11th International Conference on Availability, Reliability and Security 2016
Bauer J. , Gruhn M. , Freiling F. :Lest We Forget: Cold-Boot Attacks on Scrambled DDR3 Memory In: Digital Investigation 16 (2016 ), p. 65-74 ISSN: 1742-2876 DOI: 10.1016/j.diin.2016.01.009 URL: https://www.dfrws.org/conferences/dfrws-eu-2016/sessions/lest-we-forget-cold-boot-attacks-scrambled-ddr3-memory
Bauer J. , Schinzel S. , Freiling F. , Dewald A. :Information Leakage behind the Curtain: Abusing Anti-EMI Features for Covert Communication IEEE International Symposium on Hardware Oriented Security and Trust (McLean, VA, USA , 3. May 2016 - 5. May 2016 )In: Proceedings of HOST 2016 2016 DOI: 10.1109/HST.2016.7495570
Drescher G. , Erhardt C. , Freiling F. , Götzfried J. , Lohmann D. , Maene P. , Müller T. , Verbauwhede I. , Weichslgartner A. , Wildermann S. :Providing security on demand using invasive computing In: it - Information Technology 58 (2016 ), p. 281-295 ISSN: 1611-2776 DOI: 10.1515/itit-2016-0032
Freiling F. :Staatliche Spähsoftware zur Strafverfolgung In: Informatik-Spektrum 39 (2016 ), p. 203-209 ISSN: 0170-6012 DOI: 10.1007/s00287-015-0912-y
Gruhn M. , Freiling F. :Evaluating Atomicity, and Integrity of Correct Memory Acquisition Methods In: Digital Investigation 16 (2016 ), p. 1-10 ISSN: 1742-2876 DOI: 10.1016/j.diin.2016.01.003 URL: http://www.dfrws.org/2016eu/proceedings/DFRWS-EU-2016-1.pdf
Götzfried J. , Dörr N. , Palutke R. , Müller T. :HyperCrypt: Hypervisor-based Encryption of Kernel and User Space ARES'16 (Salzburg, Austria , 31. August 2016 - 2. September 2016 )In: 11th International Conference on Availability, Reliability and Security 2016 DOI: 10.1109/ARES.2016.13 URL: https://www1.cs.fau.de/hypercrypt
Götzfried J. , Müller T. , Drescher G. , Nürnberger S. , Backes M. :RamCrypt: Kernel-based Address Space Encryption for User-mode Processes ASIACCS'16 (Xi'an, China )In: 11th ACM Asia Conference on Computer and Communications Security , New York : 2016 DOI: 10.1145/2897845.2897924 URL: https://www1.cs.fau.de/ramcrypt
Haupert V. , Müller T. :Auf dem Weg verTAN: Über die Sicherheit App-basierter TAN-Verfahren Sicherheit, Schutz und Zuverlässigkeit (Bonn , 5. April 2016 - 7. April 2016 )In: Meier Michael, Reinhardt Delphine, Wendzel Steffen (ed.): Konferenzband der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) , Bonn : 2016 Open Access: https://dl.gi.de/handle/20.500.12116/859 URL: https://www1.cs.fau.de/appTAN
Kurtz A. , Gascon H. , Becker T. , Rieck K. , Freiling F. :Fingerprinting Mobile Devices Using Personalized Configurations In: Proceedings on Privacy Enhancing Technologies (2016 ), p. 4-19 ISSN: 2299-0984
Morgner P. , Mattejat S. , Benenson Z. :All Your Bulbs Are Belong to Us: Investigating the Current State of Security in Connected Lighting Systems (2016 ) URL: https://arxiv.org/abs/1608.03732 (Techreport)
Richter L. , Götzfried J. , Müller T. :Isolating Operating System Components with Intel SGX SysTEX'16 (Trento, Italy )In: 1st Workshop on System Software for Trusted Execution 2016 DOI: 10.1145/3007788.3007796 URL: https://www1.cs.fau.de/sgx-kernel
Seifert M. , Käppler S. , Hauke C. , Horn F. , Pelzer G. , Rieger J. , Michel T. , Riess C. , Anton G. :Optimisation of Image Reconstruction for Phase-Contrast X-Ray Talbot-Lau Imaging with regard to Mechanical Robustness In: Physics in Medicine and Biology 61 (2016 ), p. 6441-6464 ISSN: 0031-9155 DOI: 10.1088/0031-9155/61/17/6441 URL: http://iopscience.iop.org/article/10.1088/0031-9155/61/17/6441/meta
Stritter B. , Freiling F. , König H. , Rietz R. , Ullrich S. , von Gernler A. , Erlacher F. , Dressler F. :Cleaning up Web 2.0's Security Mess-at Least Partly In: IEEE Security & Privacy 14 (2016 ), p. 48-57 ISSN: 1540-7993 DOI: 10.1109/MSP.2016.31
Sänger J. , Hänsch N. , Glass B. , Benenson Z. , Landwirth R. , Sasse AM. :Look Before You Leap: Improving the Users Ability to Detect Fraud in Electronic Marketplaces CHI 2016 In: SIGCHI Conference on Human Factors in Computing Systems , San Jose, CA, USA : 2016 URL: https://www1.informatik.uni-erlangen.de/filepool/publications/zina/look-beore-you-leap-chi16.pdf
Weichslgartner A. , Wildermann S. , Götzfried J. , Freiling F. , Glaß M. , Teich J. :Design-Time/Run-Time Mapping of Security-Critical Applications in Heterogeneous MPSoCs 19th International Workshop on Software and Compilers for Embedded Systems (SCOPES) (St. Goar , 23. May 2016 - 25. May 2016 )In: In Proceedings of the 19th International Workshop on Software and Compilers for Embedded Systems (SCOPES) 2016 DOI: 10.1145/2906363.2906370
Würstlein A. , Gernoth M. , Götzfried J. , Müller T. :Exzess: Hardware-based RAM encryption against physical memory disclosure 29th International Conference on Architecture of Computing Systems, ARCS 2016 DOI: 10.1007/978-3-319-30695-7_5 URL: https://www4.cs.fau.de/~arw/exzess
2015
Anikeev M. , Freiling F. , Götzfried J. , Müller T. :Secure garbage collection: Preventing malicious data harvesting from deallocated Java objects inside the Dalvik VM In: Journal of Information Security and Applications , Amsterdam : Elsevier , 2015 DOI: 10.1016/j.jisa.2014.10.001
Bauer J. , Freiling F. :Schutz eingebetteter Systeme gegen physische Angriffe DACH Security 2015 (Bonn )In: DACH Security 2015 -- Bestandsaufnahme - Konzepte - Anwendungen - Perspektiven 2015
Benenson Z. , Girard A. , Krontiris I. :User acceptance factors for anonymous credentials: An empirical investigation WEIS (Delft, The Netherlands )In: Workshop on the Economics of Information Security 2015 URL: http://weis2015.econinfosec.org/papers/WEIS_2015_benenson.pdf
Benenson Z. , Lenzini G. , Oliveira D. , Parkin S. , Übelacker S. :Maybe Poor Johnny Really Cannot Encrypt - The Case for a Complexity Theory for Usable Security NSPW (Twente, The Netherlands )In: New Security Paradigms Workshop 2015
Brodowski D. , Freiling F. :Cyberkriminalität - Erscheinungsformen, Entwicklungslinien, Herausforderungen In: FIfF-Kommunikation (2015 ), p. 22-26 ISSN: 0938-3476
Brodowski D. , Freiling F. :Transnationale Cyberkriminalität vs. nationale Strafverfolgung: Mögliche Auswege aus einem grundsätzlichen Dilemma In: FIfF-Kommunikation (2015 ), p. 36-39 ISSN: 0938-3476
Freiling F. :Offener und verdeckter Einsatz technischer Ermittlungswerkzeuge zwischen Theorie und Praxis In: Steiger, Saskia ; Schiller, Jochen ; Gerhold, Lars (ed.): Sicherheitsforschung im Dialog , Frankfurt am Main : Peter Lang , 2015 , p. 131-144 ISBN: 978-3-631-65848-2
Freiling F. , Gruhn M. :What is essential data in digital forensic analysis? 9th International Conference on IT Security Incident Management & IT Forensics (Magdeburg )In: Proceedings of the 9th International Conference on IT Security Incident Management & IT Forensics 2015 DOI: 10.1109/IMF.2015.20
Freiling F. , Schuhr J. , Gruhn M. :What is essential data in digital forensic analysis? In: it - Information Technology 57 (2015 ), p. 376-383 ISSN: 1611-2776 DOI: 10.1515/itit-2015-0016
Götzfried J. , Hampel J. , Müller T. :Physically Secure Code and Data Storage in Autonomously Booting Systems (Short Paper) ARES'15 (Toulouse, France )In: 10th International Conference on Availability, Reliability and Security 2015 DOI: 10.1109/ARES.2015.19
Götzfried J. , Müller T. , de Clercq R. , Maene P. , Freiling F. , Verbauwhede I. :Soteria: Offline Software Protection within Low-cost Embedded Devices ACSAC'15 (Los Angeles, California, USA )In: Proceedings of the 31th Annual Computer Security Applications Conference 2015 DOI: 10.1145/2818000.2818013 URL: https://www1.cs.fau.de/soteria
Krontiris I. , Benenson Z. , Girard A. , Sabouri A. , Rannenberg K. , Schoo P. :Privacy-ABCs as a Case for Studying the Adoption of PETs by Users and Service Providers Annual Privacy Forum (Luexembourg )In: Annual Privacy Forum , Heidelberg : 2015
Lorch B. , Berger M. , Hornegger J. , Maier A. :Projection and Reconstruction-Based Noise Filtering Methods in Cone Beam CT Bildverarbeitung für die Medizin 2015 (Lübeck )In: Bildverarbeitung für die Medizin 2015 2015 URL: https://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2015/Lorch15-PAR.pdf
Morgner P. , Benenson Z. , Müller C. , Armknecht F. :Design Space of Smart Home Networks from a Security Perspective 14. GI/ITG KuVS Fachgespräch Sensornetze der GI/ITG Fachgruppe Kommunikation und Verteilte Systeme (Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU) )In: Proceedings of the 14. GI/ITG KuVS Fachgespräch Sensornetze 2015 URL: https://opus4.kobv.de/opus4-fau/files/6617/report.pdf
Mullan P. , Kanzler C. , Lorch B. , Schroeder L. , Winkler L. , Larissa L. , Riedel F. , Richer R. , Luckner C. , Leutheuser H. , Eskofier B. , Pasluosta CF. :Unobtrusive Heart Rate Estimation during Physical Exercise using Photoplethysmographic and Acceleration Data 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society EMBC ’15 (Milano )In: 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society EMBC ’15 2015
Pugliese G. :Web Tracking: Overview and Applicability in Digital Investigations In: it - Information Technology 57 (2015 ), p. 366–375 ISSN: 1611-2776 DOI: 10.1515/itit-2015-0015
Riess C. , Kirchner M. , Schoettle P. :Thinking beyond the block: block matching for copy-move forgery detection revisited SPIE Media Watermarking, Security, and Forensics (San Francisco , 9. February 2015 - 11. February 2015 )In: Media Watermarking, Security, and Forensics 2015 2015 DOI: 10.1117/12.2082789
Zhuang Y. , Freiling F. :Approximating Optimal Software Obfuscation for Android Applications 2nd Workshop on Security in Highly Connected IT Systems (SHCIS 2015) (Vienna, Austria )In: Proceedings 2nd Workshop on Security in Highly Connected IT Systems , Piscataway, NJ, USA : 2015
2014
Benenson Z. , Girard A. , Krontiris I. , Liagkou V. , Rannenberg K. , Stamatiou Y. :User Acceptance of Privacy-ABCs: An Exploratory Study HCI International 2014 (Crete, Greece , 22. June 2014 - 27. June 2014 )In: Human Aspects of Information Security, Privacy and Trust 2014 DOI: 10.1007/978-3-319-07620-1_33
Benenson Z. , Hintz N. , Girard A. , Luder A. :Susceptibility to URL-based Internet Attacks: Facebook vs. Email SESOC'14 (Budapest, Hungary , 24. March 2014 - 28. March 2014 )In: 6th IEEE International Workshop on SEcurity and SOCial Networking 2014 DOI: 10.1109/PerComW.2014.6815275
Brodowski D. , Dewald A. , Freiling F. , Kovacs S. , Rieger M. :Drei Jahre Master Online Digitale Forensik: Ergebnisse und Erfahrungen Sicherheit 2014 – Sicherheit, Schutz und Zuverlässigkeit (Wien )In: Katzenbeisser, S., Lotz, V., Weippl, E. (ed.): Sicherheit 2014 – Sicherheit, Schutz und Zuverlässigkeit , Bonn : 2014 Open Access: https://dl.gi.de/handle/20.500.12116/20059
Dewald A. , Freiling F. :From Computer Forensics to Forensic Computing: Investigators Investigate, Scientists Associate 2014 (2014 ), p. 10 ISSN: 2191-5008 Open Access: http://nbn-resolving.de/urn:nbn:de:bvb:29-opus4-47508 URL: http://nbn-resolving.de/urn:nbn:de:bvb:29-opus4-47508 (Techreport)
Freiling F. , Protsenko M. , Zhuang Y. :An Empirical Evaluation of Software Obfuscation Techniques applied to Android APKs DAPRO 2014 (Beijing, China )In: International Conference on Security and Privacy in Communication Networks 2014 DOI: 10.1007/978-3-319-23802-9_24
Freiling F. , Sack K. :Selektive Datensicherungen in der IT-Forensik In: Datenschutz und Datensicherheit 38 (2014 ), p. 112-117 ISSN: 1614-0702
Freiling F. , Saglietti F. , Grimm R. , Großpietsch KE. , Keller H. , Mottok J. , Münch I. , Rannenberg K. :Technische Sicherheit und Informationssicherheit: Unterschiede und Gemeinsamkeiten In: Informatik-Spektrum 37 (2014 ), p. 14-24 ISSN: 0170-6012 DOI: 10.1007/s00287-013-0748-2
Götzfried J. , Müller T. :Analysing Android's Full Disk Encryption Feature In: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 5 (2014 ), p. 84-100 ISSN: 2093-5374
Götzfried J. , Müller T. :Mutual Authentication and Trust Bootstrapping towards Secure Disk Encryption In: ACM Transactions on Information and System Security 17 (2014 )ISSN: 1094-9224 DOI: 10.1145/2663348 URL: https://www1.cs.fau.de/mark
Hänsch N. , Benenson Z. :Specifying IT security awareness 1st Workshop on Security in highly connected IT systems (Munich, Germany , 1. September 2014 - 4. September 2014 )In: SHCIS14 2014 DOI: 10.1109/DEXA.2014.71
Kurtz A. , Troßbach M. , Freiling F. :Snoop-it: Dynamische Analyse und Manipulation von Apple iOS Apps 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) (Wien )In: Sicherheit 2014 -- Sicherheit, Schutz und Zuverlässigkeit , Bonn : 2014
Kurtz A. , Weinlein A. , Settgast C. , Freiling F. :DiOS: Dynamic Privacy Analysis of iOS Applications (2014 ), col. 17 Open Access: https://opus4.kobv.de/opus4-fau/frontdoor/index/index/searchtype/series/id/9/start/1/rows/20/yearfq/2014/docId/4755 URL: https://opus4.kobv.de/opus4-fau/frontdoor/index/index/searchtype/series/id/9/start/1/rows/20/yearfq/2014/docId/4755 (Techreport)
Müller T. , Freiling F. :A Systematic Assessment of the Security of Full Disk Encryption In: IEEE Transactions on Dependable and Secure Computing 12 (2014 ), p. 491-503 ISSN: 1545-5971 DOI: 10.1109/TDSC.2014.2369041
Reinfelder L. , Benenson Z. , Gassmann F. :Differences between Android and iPhone users in their security and privacy awareness 11th International Conference on Trust, Privacy & Security in Digital Business - TrustBus 2014 (Munich , 2. September 2014 - 3. September 2014 )In: TrustBus 2014 DOI: 10.1007/978-3-319-09770-1_14
Zhuang Y. , Protsenko M. , Müller T. , Freiling F. :An(other) Exercise in Measuring the Strength of Source Code Obfuscation DEXA Workshops (Munich, Germany )In: 1st Workshop on Security in highly connected IT systems 2014 DOI: 10.1109/DEXA.2014.69
2013
Benenson Z. , Christin D. , De Luca A. , Fischer-Hübner S. , Heimann T. , Meyer J. :Consequence-based Privacy Decisions: a New Way to Better Privacy Management 'My Life, Shared' - Trust and Privacy in the Age of Ubiquitous Experience Sharing (Dagstuhl Seminar 13312) (Dagstuhl, Germany )In: 'My Life, Shared' - Trust and Privacy in the Age of Ubiquitous Experience Sharing (Dagstuhl Seminar 13312) , Dagstuhl, Germany : 2013 DOI: 10.4230/DagRep.3.7.74 URL: http://drops.dagstuhl.de/opus/volltexte/2013/4307
Benenson Z. , Gassmann F. , Reinfelder L. :Android and iOS users' differences concerning security and privacy CHI'13 (New York, NY, USA )In: CHI '13 Extended Abstracts on Human Factors in Computing Systems 2013 URL: http://doi.acm.org/10.1145/2468356.2468502
Benenson Z. , Krontiris I. , Rannenberg K. , Liagkou V. , Schopf A. , Schröder D. , Stamatiou Y. :Understanding and Using Anonymous Credentials Symposium On Usable Privacy and Security, Poster Session (Newcastle, UK )In: Symposium On Usable Privacy and Security, Poster Session 2013 URL: http://cups.cs.cmu.edu/soups/2013/posters/soups13_posters-final24.pdf
Benenson Z. , Reinfelder L. :Should the Users be Informed? On Differences in Risk Perception between Android and iPhone Users Workshop on Risk Perception in IT Security and Privacy (Newcastle, UK )In: Workshop on Risk Perception in IT Security and Privacy 2013 URL: http://cups.cs.cmu.edu/soups/2013/risk/soups13-risk-perception-Android-vs-iPhone.pdf
Carvalho T. , Riess C. , Angelopoulou E. , Pedrini H. , Rocha A. :Exposing Digital Image Forgeries by Illumination Color Classification In: IEEE Transactions on Information Forensics and Security 8 (2013 ), p. 1182--1194 ISSN: 1556-6013 DOI: 10.1109/TIFS.2013.2265677
Christlein V. , Riess C. , Angelopoulou E. , Evangelopoulos G. , Kakadiaris I. :The Impact of Specular Highlights on 3D-2D Face Recognition Biometric and Surveillance Technology for Human and Activity Identification X (Baltimore, MD , 2. May 2013 - 2. May 2013 )In: SPIE (ed.): Biometric and Surveillance Technology for Human and Activity Identification 2013 DOI: 10.1117/12.2019014 URL: http://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2013/Christlein13-TIO.pdf
Dewald A. , Freiling F. , Schmitt S. , Spreitzenbarth M. , Vömel S. :Systematische Probleme und Grenzen der forensischen Informatik In: Gaycken, Sandro (ed.): Jenseits von 1984: Datenschutz und Überwachung in der fortgeschrittenen Informationsgesellschaft. Eine Versachlichung , Bielefeld : Transcript-Verlag , 2013 , p. 101-117 ISBN: 3837620034
Götzfried J. , Müller T. :ARMORED: CPU-bound Encryption for Android-driven ARM Devices ARES 2013 (Regensburg , 2. September 2013 - 6. September 2013 )In: Proceedings of the 8th International Conference on Availability, Reliability and Security 2013 DOI: 10.1109/ARES.2013.23 URL: https://www1.cs.fau.de/armored
Götzfried J. , Müller T. :Fast Software Encryption with SIMD (How to speed up symmetric block ciphers with the AVX/AVX2 instruction set) EUROSEC 2013 (Prag )In: Proceedings of the Third European Workshop on System Security 2013 URL: https://www1.cs.fau.de/avx.crypto
Hintz N. , Benenson Z. :Faktoren des datenschutzbewussten Verhaltens in Facebook DACH Security 2013 (Nürnberg )In: DACH Security 2013 2013 URL: http://www.syssec.at/ds13_programm/
Kurtz A. , Freiling F. , Metz D. :Usability vs. Security: The Everlasting Trade-Off in the Context of Apple iOS Mobile Hotspots (2013 ), p. 10 ISSN: 2191-5008 Open Access: http://www.opus.ub.uni-erlangen.de/opus/frontdoor.php?source_opus=4755 URL: http://www.opus.ub.uni-erlangen.de/opus/frontdoor.php?source_opus=4755 (Techreport)
Kälber S. , Dewald A. , Freiling F. :Forensic Application-Fingerprinting based on file system Metadata 7th International Conference on IT Security Incident Management & IT Forensics (IMF) (Nuremberg , 12. March 2013 - 14. March 2013 )In: Proceedings of the 7th International Conference on IT Security Incident Management & IT Forensics 2013 DOI: 10.1109/IMF.2013.20
Maier A. , Jiang Z. , Jordan JM. , Riess C. , Hofmann H. , Hornegger J. :Atlas-Based Linear Volume-of-Interest (ABL-VOI) Image Correction Medical Imaging 2013: Physics of Medical Imaging (Lake Buena Vista, FL )In: SPIE (ed.): Medical Imaging 2013: Physics of Medical Imaging 2013 DOI: 10.1117/12.2006843 URL: http://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2013/Maier13-ALV.pdf
Meyer M. , Riess C. , Angelopoulou E. , Evangelopoulos G. , Kakadiaris I. :Color Constancy in 3D-2D Face Recognition Biometric and Surveillance Technology for Human and Activity Identification X (Baltimore, MD , 2. May 2013 - 2. May 2013 )In: SPIE (ed.): Biometric and Surveillance Technology for Human and Activity Identification 2013 DOI: 10.1117/12.2018758 URL: http://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2013/Meyer13-CCI.pdf
Morgenstern H. , Ehlert R. , Freiling F. , Frings S. , Göbel O. , Günther D. , Kiltz S. , Nedon J. , Schadt D. (ed.):Seventh International Conference on IT Security Incident Management and IT Forensics Los Alamitos, CA : 2013 ISBN: 978-1-4673-6307-5
Müller T. , Spath H. , Mäckl R. , Freiling F. :STARK Tamperproof Authentication to Resist Keylogging Financial Cryptography and Data Security 2013 (Okinawa, Japan , 1. April 2013 - 5. April 2013 )In: Proceedings of FC2013 2013 DOI: 10.1007/978-3-642-39884-1_25
Spreitzenbarth M. , Freiling F. , Echtler F. , Schreck T. , Hoffmann J. :MobileSandbox: Looking Deeper into Android Applications ACM Symposium on Applied Computing 2013 (Coimbra, Portugal )In: Proceedings of the 28th Symposium On Applied Computing (SAC 2013) 2013 DOI: 10.1145/2480362.2480701
Stüttgen J. , Dewald A. , Freiling F. :Selective Imaging Revisited 7th International Conference on IT Security Incident Management & IT Forensics (IMF) (Nuremberg , 12. March 2013 - 14. March 2013 )In: Proceedings of the 7th International Conference on IT Security Incident Management & IT Forensics 2013 DOI: 10.1109/IMF.2013.16
Wundram M. , Freiling F. , Moch C. :Anti-forensics: The Next Step in Digital Forensics Tool Testing 7th International Conference on IT Security Incident Management & IT Forensics (Nuremberg , 12. March 2013 - 14. March 2013 )In: Proceedings of the 7th International Conference on IT Security Incident Management & IT Forensics 2013 DOI: 10.1109/IMF.2013.17
2012
Atkinson C. , Barth F. , Gerbig R. , Freiling F. , Schinzel S. , Hadasch F. , Mädche A. , Müller B. :Reducing the Incidence of Unintended, Human-Caused Information Flows in Enterprise Systems EDOC Workshops, 3M4SE (Beijing, China , 10. September 2012 - 14. September 2012 )In: Third International Workshop on Models and Model-driven Methods for Service Engineering (3M4SE 2012) , Bejing, China : 2012 DOI: 10.1109/EDOCW.2012.12
Benenson Z. , Hintz N. , Kroll-Peters O. , Krupp M. :Attitudes to IT-Security When Using a Smartphone Symposium On Usable Privacy and Security 2012 (Washington , 9. September 2012 - 12. September 2012 )In: SOUPS 2012 URL: http://cups.cs.cmu.edu/soups/2012/program.html
Benenson Z. , Kroll-Peters O. , Krupp M. :Mentale Modelle der IT-Sicherheit bei der Nutzung mobiler Endgeräte Sicherheit 2012: Sicherheit, Schutz und Zuverlässigkeit (Darmstadt )In: Sicherheit 2012: Sicherheit, Schutz und Zuverlässigkeit , Bonn : 2012
Bäcker M. , Dewald A. , Freiling F. , Schmitt S. :Kriterien für die Priorisierung bei der Sicherung und Analyse digitaler Spuren In: Datenschutz und Datensicherheit 36 (2012 ), p. 597-602 ISSN: 1614-0702 DOI: 10.1007/s11623-012-0187-2
Cortinas R. , Freiling F. , Ghajar-Azadanlou M. , Lafuente A. , Larrea M. , Draque Penso L. , Soraluze I. :Secure Failure Detection and Consensus in TrustedPals In: IEEE Transactions on Dependable and Secure Computing 9 (2012 ), p. 608-623 ISSN: 1545-5971 DOI: 10.1109/TDSC.2012.23
Dewald A. , Freiling F. :Is Computer Forensics a Forensic Science? Current Issues in IT Security 2012 (Freiburg i. Br., Germany )In: Jochen Jähnke, Nicolas von zur Mühlen, Klaus Rechert, Dirk von Suchodoletz (ed.): Proceedings of Current Issues in IT Security 2012 2012 URL: https://www.duncker-humblot.de/buch/current-issues-in-it-security-2012-9783428138876/?page_id=0&typ=buc
Dewald A. , Freiling F. , Schreck T. , Spreitzenbarth M. , Stüttgen J. , Vömel S. , Willems C. :Analyse und Vergleich von BckR2D2-I und II Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) (Darmstadt, Germany )In: Neeraj Suri, Michael Waidner (ed.): Sicherheit 2012: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) 2012
Freiling F. :Was ist eine Quellentelekommunikationsüberwachung? In: FIfF-Kommunikation 2012 (2012 ), p. 16-17 ISSN: 0938-3476 URL: https://faui1-files.cs.fau.de/public/publications/fiff-2012-01-qtkue-freiling.pdf
Gollmann D. , Freiling F. (ed.):Information Security Berlin : 2012 (Lecture Notes in Computer Science, Vol. 7483)ISBN: 978-3-642-33382-8 DOI: 10.1007/978-3-642-33383-5
Hintz N. , Benenson Z. , Strufe T. :Friendship in German Online Social Networks Symposium On Usable Privacy and Security 2012 (Washington )In: SOUPS 2012 URL: http://cups.cs.cmu.edu/soups/2012/
Müller T. , Taubmann B. , Freiling F. :TreVisor -- OS-Independent Software-Based Full Disk Encryption Secure Against Main Memory Attacks ACNS 2012 (Singapur , 26. June 2012 - 29. June 2012 )In: International Conference on Applied Cryptography and Network Security 2012 DOI: 10.1007/978-3-642-31284-7_5 URL: http://www1.cs.fau.de/trevisor
Riess C. , Strehl V. , Wanka R. :The Spectral Relation between the Cube-Connected Cycles and the Shuffle-Exchange Network 10th Workshop on Parallel Systems and Algorithms (PASA) of the 25th Int. Conf. on Architecture of Computing Systems (ARCS) (München )In: GI (ed.): Proc. 10th Workshop on Parallel Systems and Algorithms (PASA) of the 25th Int. Conf. on Architecture of Computing Systems (ARCS) 2012
Spreitzenbarth M. , Freiling F. :Android Malware on the Rise (2012 )ISSN: 2191-5008 URL: https://opus4.kobv.de/opus4-fau/files/2210/CS_2012_04.pdf (Techreport)
Spreitzenbarth M. , Schmitt S. , Freiling F. :Comparing Sources of Location Data from Android Smartphones 8th IFIP WG 11.9 International Conference on Digital Forensics (Pretoria )In: 8th Annual IFIP WG 11.9 International Conference on Digital Forensics 2012 DOI: 10.1007/978-3-642-33962-2_10
Spreitzenbarth M. , Schmitt S. , Freiling F. :Comparing Sources of Location Data from Android Smartphones In: Peterson, Bert ; Shenoi, Sujeet (ed.): Advances in Digital Forensics VIII , New York : Springer Verlag , 2012 , p. 143-157 ISBN: 9783642339615 DOI: 10.1007/978-3-642-33962-2_10
Vömel S. , Freiling F. :Correctness, Atomicity, and Integrity: Defining Criteria for Forensically-Sound Memory Acquisition In: Digital Investigation 9 (2012 ), p. 125-137 ISSN: 1742-2876 DOI: 10.1016/j.diin.2012.04.005
Willems C. , Freiling F. :Reverse Code Engineering - State of the Art and Countermeasures In: it - Information Technology 54 (2012 ), p. 53-64 ISSN: 1611-2776 DOI: 10.1524/itit.2012.0664
Zimmermann C. , Spreitzenbarth M. , Schmitt S. , Freiling F. :Forensic Analysis of YAFFS2 GI Sicherheit 2012 (Darmstadt, Germany )In: Proceedings of GI Sicherheit 2012 2012 Open Access: https://dl.gi.de/handle/20.500.12116/18263 URL: https://dl.gi.de/handle/20.500.12116/18263
2011
Brodowski D. , Freiling F. :Cyberkriminalität, Computerstrafrecht und die digitale Schattenwirtschaft Berlin, 2011 (Schriftenreihe Öffentliche Sicherheit)ISBN: 978-3-929619-66-9 URL: http://www.sicherheit-forschung.de/schriftenreihe/sr_v_v/sr_4.pdf
Dewald A. , Freiling F. :Forensische Informatik Norderstedt : Books on Demand , 2011 ISBN: 978-3-8423-7947-3 URL: http://www.bod.de/index.php?id=296&objk_id=572434
Dewald A. , Freiling F. , Schreck T. , Spreitzenbarth M. , Stüttgen J. , Vömel S. , Willems C. :Analyse und Vergleich von BckR2D2-I und II CS-2011,8 (2011 ), p. 12 Open Access: http://www.opus.ub.uni-erlangen.de/opus/volltexte/2012/3036/ URL: http://www.opus.ub.uni-erlangen.de/opus/volltexte/2012/3036/ (Techreport)
Dewald A. , Freiling F. , Weber T. :Design and Implementation of a Documentation Tool for interactive Commandline Sessions Sixth International Conference on IT Security Incident Management and IT Forensics (Stuttgart ) DOI: 10.1109/IMF.2011.17
Engelberth M. , Freiling F. , Göbel J. , Gorecki C. , Holz T. , Hund R. , Trinius P. , Willems C. :Das Internet-Malware-Analyse-System (InMAS) In: Datenschutz und Datensicherheit 35 (2011 ), p. 247-252 ISSN: 1614-0702
Freiling F. , Kuznetsov P. , Guerraoui R. :The Failure Detector Abstraction In: ACM Computing Surveys 43 (2011 ), p. 1-9 ISSN: 0360-0300 DOI: 10.1145/1883612.1883616
Freiling F. , Schmitt S. , Spreitzenbarth M. :Forensic Analysis of Smartphones: The Android Data Extractor Lite (ADEL) The 2011 ADFSL Conference on Digital Forensics, Security and Law (Richmond, Virginia )In: Conference on Digital Forensics, Security and Law 2011
Freiling F. , Soraluze I. , Larrea M. , Lafuente A. , Cortinas R. :Communication-efficient failure detection and consensus in omission environments In: Information Processing Letters 111 (2011 ), p. 262-268 ISSN: 0020-0190 DOI: 10.1016/j.ipl.2010.12.008
Gorecki C. , Freiling F. , Kührer M. , Holz T. :TrumanBox: Improving Dynamic Malware Analysis by Emulating the Internet Stabilization, Safety, and Security of Distributed Systems (Grenoble , 10. October 2011 - 12. October 2011 )In: Proceedings of the 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems , Berlin : 2011 DOI: 10.1007/978-3-642-24550-3_17
Knaus A. , Stüttgen J. , Göbel J. , Engelberth M. , Freiling F. :Säuberung eines infizierten Windows-Betriebssystems auf Basis von Malware-Analyse-Berichten Informatik 2011 (Berlin )In: GI-Edition-Lecture Notes in Informatics 2011 Open Access: https://dl.gi.de/handle/20.500.12116/18838 URL: https://dl.gi.de/handle/20.500.12116/18838
Müller T. , Freiling F. , Dewald A. :TRESOR Runs Encryption Securely Outside RAM 20th USENIX Security Symposium (San Francisco, CA )In: Proceedings of the 20th USENIX Security Symposium 2011 Open Access: http://usenix.org/events/sec11/tech/full_papers/Muller.pdf URL: http://www1.cs.fau.de/tresor
Vömel S. , Freiling F. :A Survey of Main Memory Acquisition and Analysis Techniques for the Windows Operating System In: Digital Investigation 8 (2011 ), p. 3-22 ISSN: 1742-2876 DOI: 10.1016/j.diin.2011.06.002
2010
Benenson Z. , Freiling F. , Bestehorn M. , Böhm K. , Buchmann E. , Jawurek M. :Query Dissemination in Sensor Networks - Predicting Reachability and Energy Consumption Ad Hoc & Sensor Wireless Networks In: Ad Hoc & Sensor Wireless Networks Vol. 9 , Philadelphia : 2010 URL: http://www.ipd.uni-karlsruhe.de/~buchmann/pdfs/bestehorn09qdiss-predicting.pdf
Benenson Z. , Freiling F. , Blaß EO. :Attacker models for wireless sensor networks In: it - Information Technology (2010 ), p. 320-324 ISSN: 1611-2776 DOI: 10.1524/itit.2010.0609
Christlein V. , Riess C. , Angelopoulou E. :On rotation invariance in copy-move forgery detection IEEE International Workshop on Information Forensics and Security (Seattle , 12. December 2010 - 15. December 2010 )In: 2010 IEEE International Workshop on Information Forensics and Security 2010 DOI: 10.1109/WIFS.2010.5711472
Dewald A. , Holz T. , Freiling F. :ADSandbox: Sandboxing JavaScript to fight Malicious Websites ACM Symposium on Applied Computing (SAC) (Sierre, Switzerland , 22. March 2010 - 26. March 2010 )In: Proceedings of the 2010 ACM Symposium on Applied Computing 2010 DOI: 10.1145/1774088.1774482 URL: http://doi.acm.org/10.1145/1774088.1774482
Freiling F. , Schmitt S. , Bäcker M. :Selektion vor der Sicherung: Methoden zur effizienten forensischen Sicherung von digitalen Speichermedien In: Datenschutz und Datensicherheit 2/2010 (2010 ), p. 80-85 ISSN: 1614-0702 DOI: 10.1007/s11623-010-0040-4
Müller T. , Dewald A. , Freiling F. :AESSE: A Cold-boot Resistant Implementation of AES EUROSEC 2010 (Paris , 13. April 2010 - 13. April 2010 )In: Proceedings of the Third European Workshop on System Security 2010 DOI: 10.1145/1752046.1752053 URL: http://eurosys2010-dev.sigops-france.fr/workshops/EuroSec2010/p42-muller.pdf
Vömel S. , Holz T. , Freiling F. :I'd Like to Pay with Your Visa Card : An Illustration of Illicit Online Trading Activity in the Underground Economy (2010 ) Open Access: https://ub-madoc.bib.uni-mannheim.de/3048/ URL: https://ub-madoc.bib.uni-mannheim.de/3048/ (Techreport)
2009
Benenson Z. , Dewald A. , Freiling F. :Presence, Intervention, Insertion: Unifying Attack and Failure Models in Wireless Sensor Networks (2009 ), p. 10 URL: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.163.3740&rep=rep1&type=pdf (Techreport)
Benenson Z. , Werner F. :Formally Verified Authenticated Query Dissemination in Sensor Networks International Symposium on Performance Evaluation of Computer and Telecommunication Systems 2009, SPECTS 2009, Part of the 2009 Summer Simulation Multiconference, SummerSim 2009 (Istanbul , 13. July 2009 - 16. July 2009 )In: IEEE International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS) , Istanbul : 2009
Böhme R. , Freiling F. , Gloe T. , Kirchner M. :Multimedia-Forensik als Teildisziplin der digitalen Forensik GI-Workshop Multimedia-Forensik (Lübeck , 28. September 2009 - 2. October 2009 )In: GI-Workshop Multimedia-Forensik , Lübeck : 2009 Open Access: https://dl.gi.de/handle/20.500.12116/31114 URL: https://dl.gi.de/handle/20.500.12116/31114
Freiling F. :Vom Wert offensiver Methoden. Ein Blick auf IT-Sicherheit aus Angreiferperspektive In: Datenschutz und Datensicherheit 33 (2009 ), p. 214-217 ISSN: 1614-0702
Freiling F. :Zur Nutzung von Verkehrsdaten im Rahmen der Vorratsdatenspeicherung (2009 ) Open Access: https://madoc.bib.uni-mannheim.de/2360/ URL: https://madoc.bib.uni-mannheim.de/2360/ (Techreport)
Freiling F. , Böhme R. , Gloe T. , Kirchner M. :Multimedia Forensics is not Computer Forensics Proceedings of the 3rd International Workshop on Computational Forensics (The Hague , 13. August 2009 - 14. August 2009 )In: Proceedings of the 3rd International Workshop on Computational Forensics , The Hague, Netherlands : 2009 DOI: 10.1007/978-3-642-03521-0_9
Freiling F. , Delporte-Gallet C. , Fauconnier H. , Tielmann A. , Kilic M. :Message-efficient omission-tolerant consensus with limited synchrony Proc. 14th IEEE Workshop on Dependable Parallel, Distributed and Network-Centric Systems (Rome , 23. May 2009 - 29. May 2009 )In: Proc. 14th IEEE Workshop on Dependable Parallel, Distributed and Network-Centric Systems , Rome, Italy : 2009 DOI: 10.1109/IPDPS.2009.5160899
Freiling F. , Heinson D. :Probleme des Verkehrsdatenbegriffs im Rahmen der Vorratsdatenspeicherung In: Datenschutz und Datensicherheit 33 (2009 ), p. 547-552 ISSN: 1614-0702 DOI: 10.1007/s11623-009-0141-0
Freiling F. , Holz T. , Engelberth M. :Learning More About the Underground Economy: A Case-Study of Keyloggers and Dropzones 14th European Symposium on Research in Computer Security (Saint-Malo, France , 21. September 2009 - 23. September 2009 )In: 14th European Symposium on Research in Computer Security 2009 DOI: 10.1007/978-3-642-04444-1_1 URL: http://pi1.informatik.uni-mannheim.de/filepool/publications/UE-dropzones-esorics09.pdf
Freiling F. , Lambertz C. , Majster-Cederbaum M. :Modular Consensus Algorithms for the Crash-Recovery Model International Workshop on Reliability, Availability, and Security (Hiroshima, Japan , 8. December 2009 - 11. December 2009 )In: International Conference on Parallel and Distributed Computing, Applications and Technologies 2009 DOI: 10.1109/PDCAT.2009.50
Hund R. , Holz T. , Freiling F. :Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms 18th USENIX Security Symposium (Montreal, Canada )In: 18th USENIX Security Symposium 2009 Open Access: http://www.usenix.org/events/sec09/tech/full_papers/hund.pdf
Krontiris I. , Benenson Z. , Freiling F. , Thanassis G. , Dimitriou T. :Cooperative Intrusion Detection in Wireless Sensor Networks 6th European Conference on Wireless Sensor Networks (Cork, Ireland , 11. February 2009 - 13. February 2009 )In: Proceedings of the 6th European Conference on Wireless Sensor Networks , Berlin, Heidelberg : 2009 DOI: 10.1007/978-3-642-00224-3_17
Mink M. , Freiling F. , Liegl M. :Datenschutz in digital-forensischen Lehrveranstaltungen In: Datenschutz und Datensicherheit 33 (2009 ), p. 222–227 ISSN: 1614-0702 DOI: 10.1007/s11623-009-0055-x
Mittal N. , Phaneesh KL. , Freiling F. :Safe termination detection in an asynchronous distributed system when processes may crash and recover In: Theoretical Computer Science 410 (2009 ), p. 614-628 ISSN: 0304-3975 DOI: 10.1016/j.tcs.2008.10.011
Moch C. , Freiling F. :The Forensic Image Generator Generator Proceedings of the Fifth International Conference on Incident Management and Forensics (Stuttgart, Germany )In: Proceedings of the Fifth International Conference on Incident Management and Forensics , Stuttgart, Germany : 2009 DOI: 10.1109/IMF.2009.8
Riess C. , Jordan JM. , Angelopoulou E. :A Common Framework for Ambient Illumination in the Dichromatic Reflectance Model 2009 IEEE 12th International Conference on Computer Vision Workshops, ICCV Workshops 2009 (Kyoto , 4. October 2009 - 4. October 2009 )In: IEEE (ed.): IEEE 12th International Conference on Computer Vision Workshops 2009 DOI: 10.1109/ICCVW.2009.5457519 URL: http://www5.informatik.uni-erlangen.de/Forschung/Publikationen/2009/Riess09-ACF.pdf
Trinius P. , Holz T. , Göbel J. , Freiling F. :Visual Analysis of Malware Behavior (Short paper) 6th International Workshop on Visualization for Cyber Security In: 6th International Workshop on Visualization for Cyber Security , Atlantic City, NJ, USA : 2009
Wilke J. , Blaß EO. , Freiling F. , Zitterbart M. :A framework for probabilistic, authentic aggregation in wireless sensor networks In: Praxis der Informationsverarbeitung und Kommunikation 32 (2009 ), p. 116-126 ISSN: 1865-8342
Wilke J. , Zitterbart M. , Benenson Z. , Freiling F. :Authentic Query Dissemination and Data Aggregation in Wireless Sensor Networks In: Networked Sensing Systems (INSS), Demo Session , Pittsburgh, PA : 2009
2008
Benenson Z. :Access control in wireless sensor networks (Dissertation, 2008 )
Benenson Z. , Bestehorn M. , Buchmann E. , Freiling F. , Jawurek M. :Query Dissemination with Predictable Reachability and Energy Usage in Sensor Networks 7th International Conference on Ad-hoc, Mobile and Wireless Networks, ADHOC-NOW 2008 (Sophia-Antipolis , 10. September 2008 - 12. September 2008 )In: Ad-hoc, Mobile and Wireless Networks, 7th International Conference (ADHOC-NOW) , Sophia-Antipolis, France : 2008 DOI: 10.1007/978-3-540-85209-4_22
Benenson Z. , Cholewinski PM. , Freiling F. :Vulnerabilities and attacks in wireless sensor networks In: Wireless Sensors Networks Security , Amsterdam : IOS Press , 2008 , p. 22-43 (Cryptology & Information Security Series (CIS))
Eusgeld I. , Freiling F. , Reussner R. (ed.):Dependability Metrics: Advanced Lectures [result from a Dagstuhl seminar, October 30 - November 1, 2005] Berlin : 2008 (Lecture Notes in Computer Science, Vol. 4909)ISBN: 978-3-540-68946-1
Eusgeld I. , Freiling F. , Reussner R. (ed.):Dependability Metrics 2008 (Lecture Notes in Computer Science)ISBN: 978-3-540-68946-1 DOI: 10.1007/978-3-540-68947-8 (Techreport)
2007
Benenson Z. :Lower Bounds In: Algorithms for Sensor and Ad Hoc Networks, Advanced Lectures , Heidelberg : Springer-verlag , 2007 , p. 117-130 (LNCS 4621)ISBN: 9783540749905
Benenson Z. , Cholewinski PM. , Freiling F. :Advanced Evasive Data Storage in Sensor Networks 8th International Conference on Mobile Data Management, MDM 2007 (Mannheim , 7. May 2007 - 11. May 2007 )In: MDM (8th International Conference on Mobile Data Management) , Mannheim : 2007 DOI: 10.1109/MDM.2007.29
Brust MR. , Andronache A. , Rothkugel S. , Benenson Z. :Topology-based Clusterhead Candidate Selection in Wireless Ad-hoc and Sensor Networks 2007 2nd International Conference on Communication System Software and Middleware and Workshops, COMSWARE 2007 (Bangalore , 7. January 2007 - 12. January 2007 )In: COMSWARE (Second International Conference on COMmunication System softWAre and MiddlewaRE) , Bangalore, India : 2007 DOI: 10.1109/COMSWA.2007.382475
Danner D. , Kaufhold C. , Kranz P. , Müller R. , Pfaller S. , Riess C. , Angelopoulou E. :FAUBOT: Purposeful Navigation of a Robot in a Simulated Environment CiberMouse Contest at IEEE Real-Time Systems Symposium (Tucson, AZ , 3. December 2007 - 6. December 2007 )In: 28th IEEE International Real-Time Systems Symposium (RTSS 2007) 2007 (anderer)
Riess C. , Wanka R. :Periodic Load Balancing on the N-Cycle: Analytical and Experimental Evaluation 13th International Euro-Par Conference (Rennes , 28. August 2007 - 31. August 2007 )In: Proceedings of the 13th International Euro-Par Conference 2007 DOI: 10.1007/978-3-540-74466-5_86
2006
Achtzehn A. , Benenson Z. , Rohner C. :Implementing Agreement Protocols in Sensor Networks In: MASS Workshops (3rd International Conference on Mobile Adhoc and Sensor Systems , Vancouver, Canada : 2006
Becher A. , Benenson Z. , Dornseif M. :Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks 3rd International Conference on Security in Pervasive Computing, SPC 2006 (York , 18. April 2006 - 21. April 2006 )In: Security in Pervasive Computing (SPC), Third International Conference , York, UK : 2006 DOI: 10.1007/11734666_9
Benenson Z. , Freiling F. , Hammerschmidt E. , Lucks S. , Pimenidis L. :Authenticated Query Flooding in Sensor Networks In: IFIP SEC , Karlstad, Sweden : 2006 DOI: 10.1007/0-387-33406-8_4
Benenson Z. , Freiling F. , Holz T. , Kesdogan D. , Draque Penso L. :Safety, Liveness, and Information Flow: Dependability Revisited In: ARCS Workshops (19th International Conference on Architecture of Computing Systems) , Frankfurt am Main : 2006
Benenson Z. , Freiling F. , Pfitzmann B. , Rohner C. , Waidner M. :Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks 3rd European Workshop on Security and Privacy in Ad Hoc and Sensor Networks, ESAS 2006 (Hamburg , 20. September 2006 - 21. September 2006 )In: ESAS (Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop) , Hamburg : 2006 DOI: 10.1007/11964254_15
Fort M. , Freiling F. , Draque Penso L. , Benenson Z. , Kesdogan D. :TrustedPals: Secure Multiparty Computation Implemented with Smart Cards 11th European Symposium on Research in Computer Security, ESORICS 2006 (Hamburg , 18. September 2006 - 20. September 2006 )In: Computer Security - {ESORICS} 2006, 11th European Symposium on Research in Computer Security , Hamburg : 2006
2005
Benenson Z. :Authenticated Queries in Sensor Networks Second European Workshop on Security and Privacy in Ad-hoc and Sensor Networks, ESAS 2005 (Visegrad , 13. July 2005 - 14. July 2005 )In: 2nd European Workshop on Security and Privacy in Ad-hoc and Sensor Networks (ESAS) , Visegrad, Hungary : 2005 DOI: 10.1007/11601494_5
Benenson Z. , Cholewinski PM. , Freiling F. :Simple Evasive Data Storage in Sensor Networks In: International Conference on Parallel and Distributed Computing Systems, PDCS , Phoenix, AZ, USA : 2005
Benenson Z. , Freiling F. , Kesdogan D. :An algorithmic framework for robust access control in wireless sensor networks 2nd European Workshop onWireless Sensor Networks, EWSN 2005 (Istanbul , 31. January 2005 - 2. February 2005 )In: EWSN 2005 , Istanbul : 2005 DOI: 10.1109/EWSN.2005.1462007
Benenson Z. , Gedicke N. , Raivio O. :Realizing Robust User Authentication in Sensor Networks In: REALWSN , Stockholm : 2005
Benenson Z. , Gärtner FC. , Kesdogan D. :Secure Multi-Party Computation with Security Modules SICHERHEIT 2005 - Sicherheit - Schutz und Zuverlassigkeit, Beitrage der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft fur Informatik e.V. (GI)- 2nd Annual Meeting of the Department of Security of the Society for Informatics - Security (Regensburg , 5. April 2005 - 8. April 2005 )In: Sicherheit 2005 , Regensburg : 2005
Benenson Z. , Kühn U. , Lucks S. :Cryptographic Attack Metrics In: Dependability Metrics , LNCS : Springer , 2005 , p. 133-156 ISBN: 978-3-540-68946-1
2004