In the following you can find the list of publications of my research group. For more publications, please visit the list of publications @ CISPA .
There is also a new publication database availablable under the following links:
Publications Database: Main Page · Section: Research Group InfSec
2020 (1)
Other Conferences (others) (1)
2019 (18)
IEEE Symposium on Security and Privacy (Oakland) (SandP) (1)
#340 Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security & Privacy
Proceedings of the IEEE Symposium on Security & Privacy, May 2019 , 2019
ACM Conference on Computer and Communications Security (CCS) (1)
#339 HideNoSeek: Camouflaging Malicious JavaScript in Benign ASTs
ACM Conference on Computer and Communications Security (CCS 2019) , 2019
Network and Distributed System Security Symposium (NDSS) (2)
#338 MBeacon: Privacy-Preserving Beacons for DNA Methylation Data
26th Annual Network and Distributed System Security Symposium (NDSS 2019) , 2019
#337 ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models
26th Annual Network and Distributed System Security Symposium (NDSS 2019) , 2019
IEEE European Symposium on Security and Privacy (EuroSandP) (1)
#336 Up-To-Crash: Evaluating Third-Party Library Updatability on Android
4th IEEE European Symposium on Security and Privacy , 2019
IEEE Computer Security Foundations Symposium (CSF) (2)
#335 Automated Verification of Accountability in Security Protocols
Computer Security Foundations Symposium , 2019
#334 How to wrap it up - A formally verified proposal for the use of authenticated wrapping in PKCS#11
Computer Security Foundations Symposium , 2019
Other Conferences (others) (11)
#333 Adversarial Initialization - when your network performs the way I want -
ArXiv e-prints (Journal) , 2019
#332 Causality & Control flow
4th Workshop on Formal Reasoning about Causation, Responsibility, & Explanations in Science & Technology , 2019
#330 Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup
Proceedings of the 22nd edition of the International Conference on Practice and Theory of Public Key Cryptography (PKC 2019) (Journal) , 2019
#329 Fairwalk: Towards Fair Graph Embedding
The 28th International Joint Conference on Artificial Intelligence , 2019
#327 JStap: A Static Pre-Filter for Malicious JavaScript Detection
Annual Computer Security Applications Conference (ACSAC 2019) , 2019
#324 Towards Automated Network Mitigation Analysis
The 34th ACM/SIGAPP Symposium On Applied Computing , 2019
#323 Towards Automated Network Mitigation Analysis (extended version)
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing , 2019
2018 (22)
IEEE Symposium on Security and Privacy (Oakland) (SandP) (3)
#322 Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels
In Proceedings of the 39th IEEE Symposium on Security and Privacy (Oakland). San Francisco, CA, May 2018. , 2018
#321 The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators
39th IEEE Symposium on Security and Privacy (SP '18) , 2018
#320 Verifying System Level Information Flow Using Confidentiality-Preserving Refinement
In Submission , 2018
ACM Conference on Computer and Communications Security (CCS) (1)
#319 Lord of the x86 Rings: A Portable User Mode Privilege Separation Architecture on x86
ACM CCS 2018 , 2018
Usenix Security Symposium (USENIX-Security) (1)
#318 Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse
27th USENIX Security Symposium (USENIX Security 18) , 2018
Network and Distributed System Security Symposium (NDSS) (1)
#317 Didn’t You Hear Me? — Towards More Successful Web Vulnerability Notifications
Proceedings of the 25th Annual Symposium on Network and Distributed System Security (NDSS '18). , 2018
IEEE European Symposium on Security and Privacy (EuroSandP) (2)
#316 Dissecting Privacy Risks in Biomedical Data
Proceedings of the 3rd IEEE European Symposium on Security and Privacy (Euro S&P) , 2018
#315 Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure
2018 IEEE European Symposium on Security and Privacy, EuroS&P 2018, London, United Kingdom, April 24-26, 2018 , 2018
Other Conferences (others) (14)
#314 A Survey on Routing in Anonymous Communication Protocols
ACM Computing Surveys (CSUR) (Journal) , 2018
#313 Datenschutz durch Technikgestaltung für Genomdaten
DSRI Herbstakademie Tagungsband 2018 (Journal) , 2018
#312 Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure (full version)
Extended Version of EuroS&P 2018 Paper (Journal) , 2018
#311 JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript
Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA '18) , 2018
#310 Killing Three Birds with one Gaussian Process: Analyzing Attack Vectors on Classification
ArXiv e-prints (Journal) , 2018
#308 PRIMA: Privacy-Preserving Identity and Access Management at Internet-Scale
2018 IEEE International Conference on Communications (ICC) Kansas City, MO, USA, 20-24 May 2018 , 2018
#307 Privacy-Preserving Similar Patient Queries for Combined Biomedical Data
The 19th Privacy Enhancing Technologies Symposium (PETS) , 2018
#306 Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys
IACR ASIACRYPT 2018 , 2018
#305 Stackelberg Planning: Towards Effective Leader-Follower State Space Search
The Thirty-Second AAAI Conference on Artificial Intelligence (AAAI-18) , 2018
#303 Tagvisor: A Privacy Advisor for Sharing Hashtags
Proceedings of the Web Conference 2018 (WWW) , 2018
#301 You Are Where You APP: An Assessment on Location Privacy of Social APPs
The 29th IEEE International Symposium on Software Reliability Engineering , 2018
2017 (33)
IEEE Symposium on Security and Privacy (Oakland) (SandP) (3)
#300 Comparing the Usability of Cryptographic APIs
38th IEEE Symposium on Security and Privacy (S&P '17) , 2017
#299 Identifying Personal DNA Methylation Profiles by Genotype Inference
Proceedings of the 38th IEEE Symposium on Security and Privacy (S&P) , 2017
#298 Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security
38th IEEE Symposium on Security and Privacy (S&P '17) , 2017
ACM Conference on Computer and Communications Security (CCS) (5)
#297 A Stitch in Time: Supporting Android Developers in Writing Secure Code
Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS '17) , 2017
#296 Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs
Proceedings of the 24th ACM Conference on Computer and Communication Security (CCS'17) , 2017
#295 Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android
Proceedings of the 24th ACM Conference on Computer and Communication Security (CCS'17) , 2017
#294 The ART of App Compartmentalization: Compiler-based Library Privilege Separation on Stock Android
Proceedings of the 24th ACM Conference on Computer and Communication Security (CCS'17) , 2017
#293 walk2friends: Inferring Social Links from Mobility Profiles.
Proceedings of the 24th ACM Conference on Computer and Communication Security (CCS'17) , 2017
Usenix Security Symposium (USENIX-Security) (1)
#292 How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security
Proceedings of the 26th USENIX Security Symposium (USENIX Security '17) , 2017
Network and Distributed System Security Symposium (NDSS) (2)
#291 Dachshund: Digging for and Securing (Non-)Blinded Constants in JIT Code
Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17) , 2017
#290 Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying
Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17) , 2017
IEEE European Symposium on Security and Privacy (EuroSandP) (3)
#289 A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and its Application to Fair Exchange
Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17) , 2017
#288 Efficient and Flexible Discovery of PHP Application Vulnerabilities
Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17) , 2017
#287 LUNA: Quantifying and Leveraging Uncertainty in Android Malware Analysis through Bayesian Machine Learning
Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17) , 2017
IEEE Computer Security Foundations Symposium (CSF) (1)
#286 Reconciling Privacy and Utility in Continuous-Time Diffusion Networks
Proceedings of the 30th IEEE Computer Security Foundations Symposium (CSF '17) , 2017
Other Conferences (others) (18)
#285 Adversarial Examples for Malware Detection
Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II , 2017
#284 ARTist: The Android Runtime Instrumentation and Security Toolkit
Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17) , 2017
#282 DeepCity: A Feature Learning Framework for Mining Location Check-ins
Proceedings of the 11th International Conference on Web and Social Media (ICWSM'17) , 2017
#281 Die Blockchain im Spannungsfeld der Grundsätze der Datenschutzgrundverordnung
INFORMATIK 2017, Workshop Recht und Technik , 2017
#279 How Internet Resources Might Be Helping You Develop Faster but Less Securely
IEEE Security & Privacy (Journal) , 2017
#278 Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers
Proceedings of the 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET '17) , 2017
#277 Linking Amplification DDoS Attacks to Booter Services
International Symposium on Research in Attacks, Intrusions, and Defenses , 2017
#275 Quantifying Location Sociality
Proceedings of the 28th ACM Conference on Hypertext and Social Media (HT'17) , 2017
#274 Seamless In-App Ad Blocking on Stock Android
Mobile Security Technologies (MOST) 2017 Workshop , 2017
#273 Security Developer Studies with GitHub Users: Exploring a Convenience Sample
13th Symposium on Usable Privacy and Security (SOUPS'17) , 2017
#269 Tatobjekt und Vortaten der Datenhehlerei (§ 202 d StGB)
Neue Zeitschrift für Strafrecht (NStZ) (Journal) , 2017
#268 Who Controls the Internet? Analyzing Global Threats using Property Graph Traversals
Proc. of the 26rd International Conference on World Wide Web (WWW 2017) , 2017
2016 (45)
IEEE Symposium on Security and Privacy (Oakland) (SandP) (2)
#267 SoK: Lessons Learned From Android Security Research For Appified Software Platforms
37th IEEE Symposium on Security and Privacy (S&P '16) , 2016
#266 You Get Where You're Looking For: The Impact Of Information Sources On Code Security
37th IEEE Symposium on Security and Privacy (S&P '16) , 2016
ACM Conference on Computer and Communications Security (CCS) (7)
#265 Computational Soundness for Dalvik Bytecode
Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS'16) , 2016
#264 Efficient Cryptographic Password Hardening Services From Partially Oblivious Commitments
Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16 ) , 2016
#263 Identifying the Scan and Attack Infrastructures behind Amplification DDoS attacks
Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16) , 2016
#262 Membership Privacy in MicroRNA-based Studies
Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16) , 2016
#261 POSTER: Mapping the Landscape of Large-Scale Vulnerability Notifications
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016 , 2016
#260 POSTER: The ART of App Compartmentalization
Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16 ) , 2016
#259 Reliable Third-Party Library Detection in Android and its Security Applications
Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16) , 2016
Usenix Security Symposium (USENIX-Security) (5)
#258 An Empirical Study of Textual Key-Fingerprint Representations
Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016
#257 Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification
Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016
#256 On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis
Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016
#255 Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles
Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016
#254 What Cannot be Read, Cannot be Leveraged? Revisiting Assumptions of JIT-ROP Defenses
Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016
Network and Distributed System Security Symposium (NDSS) (1)
#253 How to Make ASLR Win the Clone Wars: Runtime Re-Randomization
Proceedings of the 23rd Annual Symposium on Network and Distributed System Security (NDSS '16) , 2016
Other Conferences (others) (30)
#252 Adversarial Perturbations Against Deep Neural Networks for Malware Classification
The Computing Research Repository (CoRR) (Journal) , 2016
#251 Anonymisierung, Pseudonymisierung und Transparenz für Big Data. Technische Herausforderungen und Regelung in der Datenschutz-Grundverordnung
Datenschutz und Datensicherheit (DuD) (Journal) , 2016
#248 A Survey on Routing in Anonymous Communication Protocols
The Computing Research Repository (CoRR) (Journal) , 2016
#247 Automated analysis of security protocols with global state
Journal of Computer Security (Journal) , 2016
#242 Delegatable Functional Signatures
Public-Key Cryptography - PKC 2016: 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I , 2016
#241 Detecting Hardware-Assisted Virtualization
Detection of Intrusions and Malware, and Vulnerability Assessment: 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings , 2016
#238 From Zoos to Safaris - From Closed-World Enforcement to Open-World Assessment of Privacy
Foundations of Security Analysis and Design VIII: FOSAD 2014/2015/2016 Tutorial Lectures , 2016
#235 Implementation-level Analysis of the JavaScript Helios Voting Client
Proceedings of the 31st Annual ACM Symposium on Applied Computing - SAC 2016 , 2016
#234 Kizzle: A Signature Compiler for Detecting Exploit Kits
The 46th Annual IEEE/IFIP Conference on Dependable Systems and Networks , 2016
#232 On Profile Linkability despite Anonymity in Social Media Systems
Proceedings of the 2016 ACM Workshop on Privacy in the Electronic Society (WPES) , 2016
#231 On the Feasibility of TTL-based Filtering for DRDoS Mitigation
RAID 2016, 19th International Symposium on Research in Attacks, Intrusions and Defenses , 2016
#230 R-Droid: Leveraging Android App Analysis with Static Slice Optimization
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security , 2016
#229 RamCrypt: Kernel-based Address Space Encryption for User-mode Processes
ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIACCS) , 2016
#228 SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion
Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings , 2016
#227 Simulating the Large-Scale Erosion of Genomic Privacy Over Time
Proceedings of the 3rd International Workshop on Genome Privacy and Security (GenoPri'16) , 2016
#223 VatiCAN - Vetted, Authenticated CAN Bus
. Conference on Cryptographic Hardware and Embedded Systems (CHES) , 2016
2015 (29)
IEEE Symposium on Security and Privacy (Oakland) (SandP) (1)
#222 ADSNARK: Nearly-Practical Privacy-Preserving Proofs on Authenticated Data
Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P) , 2015
ACM Conference on Computer and Communications Security (CCS) (3)
#221 POSTER: In the Net of the Spider - Measuring the Anonymity-Impact of Network-level Adversaries Against Tor
Proceedings of the 22nd ACM conference on Computer and Communications Security (ACM CCS '15) , 2015
#220 POSTER: Towards Compiler-Assisted Taint Tracking on the Android Runtime (ART)
Proceedings of the 22nd ACM conference on Computer and Communications Security (ACM CCS '15) , 2015
#219 Vccfinder: Finding potential vulnerabilities in open-source projects to assist code audits
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security , 2015
Usenix Security Symposium (USENIX-Security) (1)
#218 Boxify: Full-fledged App Sandboxing for Stock Android
Proceedings of the 24th USENIX Security Symposium (USENIX '15) , 2015
IEEE Computer Security Foundations Symposium (CSF) (1)
#217 Symbolic Malleable Zero-knowledge Proofs
Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF '15) , 2015
Other Conferences (others) (23)
#216 Achieving Optimal Utility for Distributed Differential Privacy Using SMPC
Applications of Secure Multiparty Computation , 2015
#211 Computational Soundness for Interactive Primitves
Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS'15) , 2015
#209 Data Lineage in Malicious Environments
IEEE Transactions on Dependable and Secure Computing (Journal) , 2015
#208 Fully Secure Inner-Product Proxy Re-Encryption with constant size Ciphertext
ACM ASIACCS Security in Cloud Computing Workshop 2015 , 2015
#207 How well do you blend into the crowd? - d-convergence: A novel paradigm for quantifying privacy in the age of Big-Data
CoRR (Journal) , 2015
#206 Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information
IACR Cryptology ePrint Archive (Journal) , 2015
#205 Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information
CoRR (Journal) , 2015
#204 Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information
13th International Conference on Applied Cryptography and Network Security (ACNS) , 2015
#203 Partially Oblivious Pseudorandom Functions: A Generic Approach and an Impossibility Result
2015
#202 PriCL: Creating a Precedent. A Framework for Reasoning about Privacy Case Law
Proceedings of the 4th Conference on Principles of Security and Trust (POST) , 2015
#201 Quantifying Information Flow in Cryptographic Systems
Mathematical Structures in Computer Science (Journal) , 2015
#200 Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources
Proceedings of the 13th International Conference on Applied Cryptography and Network Security (ACNS'15) , 2015
#194 Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms Against Structural Attacks
Proceedings on Privacy Enhancing Technologies , 2015
2014 (26)
ACM Conference on Computer and Communications Security (CCS) (3)
#193 (Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection
Proceedings of the 21st ACM Conference on Computer and Communications Security (ACM CCS '14) , 2014
#192 Poster: Quasi-ID: In fact, I am a human
Proceedings of the 21st ACM Conference on Computer and Communications Security (ACM CCS '14) , 2014
#191 You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code
Proceedings of the 21st ACM conference on Computer and Communications Security (ACM CCS '14) , 2014
Usenix Security Symposium (USENIX-Security) (1)
#190 Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing
Proceedings of the 23rd USENIX Security Symposium (USENIX '14) , 2014
IEEE Computer Security Foundations Symposium (CSF) (1)
#189 TUC: Time-sensitive and Modular Analysis of Anonymous Communication
Proceedings of the of the 27th IEEE Computer Security Foundations Symposium (CSF '14) , 2014
Other Conferences (others) (21)
#188 Android Security Framework: Extensible Multi-Layered Access Control on Android
In Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC'14) , 2014
#186 Asynchronous MPC with a Strict Honest Majority Using Non-equivocation
ACM Symposium on Principles of Distributed Computing 2014 , 2014
#185 BackRef: Accountability in Anonymous Communication Networks
Applied Cryptography and Network Security , 2014
#184 Computational Soundness Results for ProVerif - Bridging the Gap from Trace Properties to Uniformity
Proceedings of the 3rd Conference on Principles of Security and Trust (POST) , 2014
#180 Differentially Private Data Aggregation with Optimal Utility
30th Annual Computer Security Applications Conference (ACSAC) , 2014
#177 Lime: Data Lineage in the Malicious Environment
Proceedings of 10th International Workshopon Security and Trust Management (STM) , 2014
#175 Privacy-preserving Data Aggregation with Optimal Utility Using Arithmetic SMC -- Extended Abstract
Workshop on Usable and Efficient Secure Multiparty Computation -- Satellite Event of ESORICS , 2014
#174 Scippa: System-Centric IPC Provenance on Android
In Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC'14) , 2014
#172 Taking Android App Vetting to the Next Level with Path-sensitive Value Analysis
(Techreport) , 2014
#171 Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations
Journal of Computer Security (Journal) , 2014
#169 WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP
12th International Conference on Applied Cryptography and Network Security (ACNS 2014) , 2014
#168 X-pire 2.0 - A User-Controlled Expiration Date and Copy Protection Mechanism.
29th ACM Symposium on Applied Computing (SAC 2014) , 2014
2013 (23)
ACM Conference on Computer and Communications Security (CCS) (1)
#167 Verifiable Delegation of Computation on Outsourced Data
Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS '11) , 2013
Network and Distributed System Security Symposium (NDSS) (1)
#166 Preventing Side-Channel Leaks in Web Traffic: A Formal Approach
Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS '13) , 2013
IEEE Computer Security Foundations Symposium (CSF) (1)
#165 AnoA: A Framework For Analyzing Anonymous Communication Protocols
Proceedings of the 26th IEEE Computer Security Foundations Symposium (CSF '13) , 2013
Other Conferences (others) (20)
#163 AnoA: A Framework for Analyzing Anonymous Communication Protocols
6th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs) , 2013
#162 AppGuard - Enforcing User Requirements on Android Apps
19th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS) , 2013
#161 AppGuard - Fine-grained Policy Enforcement for Untrusted Android Applications
(Techreport) , 2013
#160 AppGuard – Fine-grained Policy Enforcement for Untrusted Android Applications
8th International Workshop on Data Privacy Management (DPM'13) , 2013
#159 Asynchronous Computational VSS with Reduced Communication Complexity
Proc. of the 2013 Cryptographers' Track at the RSA Conference (CT-RSA 2013) , 2013
#158 Callee-site Rewriting of Sealed System Libraries
International Symposium on Engineering Secure Software and Systems (ESSoS'13) , 2013
#157 Client-controlled Cryptography-as-a-Service in the Cloud
11th International Conference on Applied Cryptography and Network Security (ACNS'13) , 2013
#156 Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized Verification
Principles of Security and Trust 2013 , 2013
#155 Differentially Private Smart Metering with Battery Recharging
Proceedings of the 8th International Workshop on Data Privacy Managemant (DPM 2013) , 2013
#153 Gadge Me if You Can: Secure and Efficient Ad-Hoc Instruction-Level Randomization for x86 and ARM
8th ACM SIGSAC symposium on Information, computer and communications security (ACM ASIACCS 2013) , 2013
#151 Highly Controlled, Fine-grained Delegation of Signing Capabilities
IACR Cryptology ePrint Archive (Journal) , 2013
#150 Idea: Callee-Site Rewriting of Sealed System Libraries
International Symposium on Engineering Secure Software and Systems (ESSoS'13) , 2013
#147 Privacy-Preserving Accountable Computation
Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS) , 2013
#146 Union, Intersection, and Refinement Types and Reasoning About Type Disjointness for Secure Protocol Implementations
Special issue of the Journal of Computer Security (JCS) for TOSCA-SecCo (Journal) , 2013
#145 Using Mobile Device Communication to Strengthen e-Voting Protocols
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society - WPES 2013 , 2013
2012 (26)
IEEE Symposium on Security and Privacy (Oakland) (SandP) (1)
#144 ObliviAd: Provably Secure and Practical Online Behavioral Advertising
Proceedings of the 33rd IEEE Symposium on Security and Privacy 2012 (Oakland 2012) , 2012
ACM Conference on Computer and Communications Security (CCS) (1)
#143 Computational Soundness without Protocol Restrictions
Proceedings of the 19th ACM Conference on Computer and Communication Security (CCS '12) , 2012
Network and Distributed System Security Symposium (NDSS) (2)
#142 Automated Synthesis of Secure Distributed Applications
Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS '12) , 2012
#141 MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones
Proceedings of the 19th Annual Symposium on Network and Distributed System Security (NDSS '12) , 2012
IEEE Computer Security Foundations Symposium (CSF) (2)
#140 Provably Secure and Practical Onion Routing
Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF) , 2012
#139 Verified Security of Merkle-Damgård
Proceedings of the 25th IEEE Computer Security Foundations Symposium - CSF 2012 , 2012
Other Conferences (others) (20)
#138 Ace: An Efficient Key-Exchange Protocol for Onion Routing
Proceedings of the 11th ACM Workshop on Privacy in the Electronic Society (WPES) , 2012
#137 Adding query privacy to robust DHTs
Proc. of the 7th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2012) , 2012
#133 Autonomous UAV
2012
#132 Brief announcement: distributed cryptography using trinc
ACM Symposium on Principles of Distributed Computing 2012 , 2012
#130 Computational Soundness of Symbolic Zero-knowledge Proofs: Weaker Assumptions and Mechanized Verification
Eight Workshop on Formal and Computational Cryptography (FCC 2012) , 2012
#129 Diffusion-Based Image Compression in Steganography
Proceedings of the 8th International Symposium on Visual Computing -- ISVC 2012 , 2012
#127 On the Development and Formalization of an Extensible Code Generator for Real Life Security Protocols
Proc. 4th NASA Formal Methods Symposium (NFM 2012) , 2012
#124 SAFE Extensibility of Data-Driven Web Applications
WWW~'12: Proceedings of the 21st International World Wide Web Conference , 2012
#119 XIFER: A Software Diversity Tool Against Code-Reuse Attacks
4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3) , 2012
2011 (24)
ACM Conference on Computer and Communications Security (CCS) (2)
#118 AmazonIA: When Elasticity Snaps Back
Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11) , 2011
#117 Poster: Control-flow Integrity for Smartphones
18th ACM conference on Computer and communications security (ACM CCS 2012) , 2011
Network and Distributed System Security Symposium (NDSS) (1)
#116 A Security API for Distributed Social Networks
Proceedings of the Network and Distributed System Security Symposium (NDSS '11) , 2011
Other Conferences (others) (21)
#113 Automatically Verifying Typing Constraints for a Data Processing Language
Proc. 1st International Conference on Certified Programs and Proofs (CPP 2011) , 2011
#111 CFI Goes Mobile: Control-Flow Integrity for Smartphones
International Workshop on Trustworthy Embedded Devices (TrustED) (Journal) , 2011
#109 Computational Verifiable Secret Sharing Revisited
Proc. 17th International Conference on the Theory and Application of Cryptology (ASIACRYPT 2011) , 2011
#108 Cryptographically sound security proofs for basic and public-key Kerberos
International Journal of Information Security (Journal) , 2011
#107 G2C: Cryptographic Protocols from Goal-Driven Specifications
TOSCA'11: Proceedings of the 2011 International Conference on Theory of Security and Applications (now POST), held as part of ETAPS 2011 , 2011
#103 Non-Uniform Distributions in Quantitative Information-Flow
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS) , 2011
#102 Securing social networks
Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, PODC 2011, San Jose, CA, USA, June 6-8, 2011 , 2011
#100 Twin Clouds: An Architecture for Secure Cloud Computing
Workshop on Cryptography and Security in Clouds (CSC) , 2011
#99 Twin Clouds: Secure Cloud Computing with Low Latency
Communications and Multimedia Security Conference (CMS'11) , 2011
#98 Union and Intersection Types for Secure Protocol Implementations
Theory of Security and Applications - Joint Workshop, TOSCA 2011, Saarbrücken, Germany, March 31 - April 1, 2011, Revised Selected Papers , 2011
2010 (19)
ACM Conference on Computer and Communications Security (CCS) (1)
Usenix Security Symposium (USENIX-Security) (1)
Other Conferences (others) (17)
#92 Anonymity and Trust in Distributed Systems
Proceedings of 29th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC) , 2010
#90 Anonymous Webs of Trust
Proceedings of 10th Privacy Enhancing Technologies Symposium (PETS) , 2010
#88 Computationally Sound Abstraction and Verification of Secure Multi-Party Computations
Proceedings of the 30th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS) , 2010
#87 Computational Soundness of Symbolic Zero-Knowledge Proofs
Journal of Computer Security (Journal) , 2010
#80 RatFish: A File Sharing Protocol Provably Secure Against Rational Users
Proceedings of 15th European Symposium on Research in Computer Security (ESORICS) , 2010
#79 Ray - A Secure Microkernel Architecture
Eighth Annual International Conference on Privacy Security and Trust (IEEE PST 2010) , 2010
#78 Speaker Recognition in Encrypted Voice-over-IP Traffic
Proceedings of 15th European Symposium on Research in Computer Security (ESORICS) , 2010
2009 (20)
ACM Conference on Computer and Communications Security (CCS) (1)
#75 CoSP: a general framework for computational soundness proofs
Proceedings of the 16th ACM conference on Computer and communications security (CCS) , 2009
Network and Distributed System Security Symposium (NDSS) (1)
#74 CSAR: A practical and provable technique to make randomized systems accountable
NDSS 2009 , 2009
IEEE Computer Security Foundations Symposium (CSF) (1)
#73 Achieving Security Despite Compromise Using Zero-knowledge
Proceedings of 22nd IEEE Computer Security Foundations Symposium (CSF) , 2009
Other Conferences (others) (17)
#70 Anonymity and Censorship Resistance in Unstructured Overlay Networks
On the Move to Meaningful Internet Systems: OTM 2009, Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part I , 2009
#69 Anonymous and Censorship-resistant Content-sharing in Unstructured Overlays
Proceedings of OTM Conferences , 2009
#68 Automatic Discovery and Quantification of Information Leaks
Proceedings of 30th IEEE Symposium on Security and Privacy , 2009
#64 Design and Verification of Anonymous Trust Protocols
Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers , 2009
#59 Security of Robust Audio Hashes
First IEEE International Workshop on Information Forensics and Security (WIFS 2009) , 2009
#56 Tempest in a Teapot: Compromising Reflections Revisited
Proceedings of 30th IEEE Symposium on Security and Privacy , 2009
2008 (19)
IEEE Symposium on Security and Privacy (Oakland) (SandP) (1)
#55 Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol
IEEE Symposium on Security and Privacy, Proceedings of SSP'08 , 2008
ACM Conference on Computer and Communications Security (CCS) (1)
#54 Type-checking zero-knowledge
Proceedings of the 15th ACM conference on Computer and communications security , 2008
IEEE Computer Security Foundations Symposium (CSF) (2)
#53 Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-calculus
Proceedings of 21st IEEE Computer Security Foundations Symposium (CSF) , 2008
#52 Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers
21st IEEE Computer Security Foundations Symposium, CSF 2008 , 2008
Other Conferences (others) (15)
#50 Brief Announcement: Anonymous and Censorship-resistant Content-sharing in Unstructured Overlays
Proceedings of 27th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC) , 2008
#49 CASPA: Causality-based Abstraction for Security Protocol Analysis
Proceedings of 20th International Conference on Computer Aided Verification (CAV) , 2008
#48 Compromising Reflections or How to Read LCD Monitors Around the Corner
IEEE Symposium on Security and Privacy, Proceedings of SSP'08 , 2008
#47 Conditional Reactive Simulatability
International Journal of Information Security (Journal) , 2008
#45 Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks
Proceedings of 13th European Symposium on Research in Computer Security (ESORICS) , 2008
#42 Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles
Journal of Computer Security (JCS) (Journal) , 2008
#40 Limits of the BRSIM/UC soundness of Dolev-Yao-style XOR
International Journal of Information Security (Journal) , 2008
2007 (20)
IEEE Computer Security Foundations Symposium (CSF) (2)
#36 Causality-based Abstraction of Multiplicity in Security Protocols
Proceedings of 20th IEEE Computer Security Foundation Symposium (CSF) , 2007
#35 Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles
Proceedings of 20th IEEE Computer Security Foundation Symposium (CSF) , 2007
Other Conferences (others) (18)
#34 A Calculus of Challenges and Responses
Proceedings of 5th ACM Workshop on Formal Methods in Security Engineering (FMSE) , 2007
#30 Enterprise Privacy Policies and Languages
Digital Privacy: Theory, Technologies and Practices , 2007
#29 Enterprise Privacy Policies and Languages
Digital Privacy: Theory, Technologies and Practices , 2007
#27 Information Flow in the Peer-Reviewing Process (extended abstract)
Proceedings of 28th IEEE Symposium on Security and Privacy (SSP) , 2007
#22 On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography
Proceedings of 27th International Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS) , 2007
#21 On the Necessity of Rewinding in Secure Multiparty Computation
Theory of Cryptography, Proceedings of TCC 2007 , 2007
#19 The Reactive Simulatability Framework for Asynchronous Systems
Information and Computation (Journal) , 2007
2006 (16)
ACM Conference on Computer and Communications Security (CCS) (1)
#16 Computationally Sound Secrecy Proofs by Mechanized Flow Analysis
Proceedings of 13th ACM Conference on Computer and Communications Security (CCS) , 2006
Other Conferences (others) (15)
#15 Compositional Analysis of Contract Signing Protocols
Theoretical Computer Science (Journal) , 2006
#13 Conditional Reactive Simulatability
Proceedings of 11th European Symposium on Research in Computer Security (ESORICS) , 2006
#12 Cryptographically Sound Security Proofs for Basic and Public-key Kerberos
Proceedings of 11th European Symposium on Research in Computer Security(ESORICS) , 2006
#11 Cryptographically Sound Theorem Proving
Proceedings of 19th IEEE Computer Security Foundations Workshop (CSFW) , 2006
#10 Formal Methods and Cryptography
Proceedings of 14th International Symposium on Formal Methods (FM) , 2006
#8 Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes
Proceedings of 11th European Symposium on Research in Computer Security(ESORICS) , 2006
#7 On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol
Proceedings of 21st IFIP International Information Security Conference (SEC) , 2006
#5 Proceedings of 9th International Conference on Information Security (ISC), Samos Island, Greece
2006
#4 Real-or-Random Key Secrecy of the Otway-Rees Protocol via a Symbolic Security Proof
Electronic Notes in Theoretical Computer Science (ENTCS) (Journal) , 2006
#3 Secure Key-Updating for Lazy Revocation
Proceedings of 11th European Symposium on Research in Computer Security(ESORICS) , 2006
#1 Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario
Proceedings of Foundations of Software Science and Computational Structures (FOSSACS) , 2006