Quicklinks
Decorative photo of one of the top-corners of the CISPA building
Portrait of Person: Michael Backes

Michael Backes (Faculty)
 
 Campus E9 1 | 66123 Saarbrücken | 3.01

Publications:

Title Date Date Meta
Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security & Privacy 2019  2019   Duc Cuong Nguyen, Erik Derr, Michael Backes, Sven Bugiel  To appear in the Proceedings of the IEEE Symposium on Security & Privacy, May 2019
Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse 2018  2018   Sanam Ghorbani Lyastani, Michael Schilling, Sascha Fahl, Michael Backes, Sven Bugiel  27th USENIX Security Symposium (USENIX Security 18)
JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript 2018  2018   Aurore Fass, Robert Krawczyk, Michael Backes, Ben Stock  Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA '18)
A Survey on Routing in Anonymous Communication Protocols 2018  2018   Fatemeh Shirazi, Milivoj Simeonovski, Muhammad Rizwan Asghar, Michael Backes, Claudia Díaz
Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels 2018  2018   Meng Xu, Chenxiong Qian, Kangjie Lu, Michael Backes, Taesoo Kim  In Proceedings of the 39th IEEE Symposium on Security and Privacy (Oakland). San Francisco, CA, May 2018.
Didn’t You Hear Me? — Towards More Successful Web Vulnerability Notifications 2018  2018   Ben Stock, Giancarlo Pellegrino, Frank Li, Michael Backes, Christian Rossow  Proceedings of the 25th Annual Symposium on Network and Distributed System Security (NDSS '18).
PRIMA: Privacy-Preserving Identity and Access Management at Internet-Scale 2018  2018   Muhammad Rizwan Asghar, Michael Backes, Milivoj Simeonovski  2018 IEEE International Conference on Communications (ICC) Kansas City, MO, USA, 20-24 May 2018
Dissecting Privacy Risks in Biomedical Data 2018  2018   Pascal Berrang, Mathias Humbert, Yang Zhang, Irina Lehmann, Roland Eils, Michael Backes  Proceedings of the 3rd IEEE European Symposium on Security and Privacy (Euro S&P)
The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators 2018  2018   Marten Oltrogge, Erik Derr, Christian Stransky, Yasemin Acar, Sascha Fahl, Christian Rossow, Giancarlo Pellegrino, Sven Bugiel, Michael Backes  39th IEEE Symposium on Security and Privacy (SP '18)
Stackelberg Planning: Towards Effective Leader-Follower State Space Search 2018  2018   Patrick Speicher, Marcel Steinmetz, Michael Backes, Jörg Hoffmann, Robert Künnemann  The Thirty-Second AAAI Conference on Artificial Intelligence (AAAI-18)
Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure 2018  2018   Patrick Speicher, Marcel Steinmetz, Robert Künnemann, Milivoj Simeonovski, Giancarlo Pellegrino, Jörg Hoffmann, Michael Backes  2018 IEEE European Symposium on Security and Privacy, EuroS&P 2018, London, United Kingdom, April 24-26, 2018
Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure (full version) [TechReport] 2018  2018   Patrick Speicher, Marcel Steinmetz, Robert Künnemann, Milivoj Simeonovski, Giancarlo Pellegrino, Jörg Hoffmann, Michael Backes
Tagvisor: A Privacy Advisor for Sharing Hashtags 2018  2018   Yang Zhang, Mathias Humbert, Tahleen Rahman, Cheng-Te Li, Jun Pang, Michael Backes  Proceedings of the Web Conference 2018 (WWW)
How Wrong Am I? - Studying Adversarial Examples and their Impact on Uncertainty in Gaussian Process Machine Learning Models 2017  2017   Kathrin Grosse, David Pfaff, Michael Thomas Smith, Michael Backes
Linking Amplification DDoS Attacks to Booter Services 2017  2017   Johannes Krupp, Mohammad Karami, Christian Rossow, Damon McCoy, Michael Backes  International Symposium on Research in Attacks, Intrusions, and Defenses
Adversarial Examples for Malware Detection 2017  2017   Kathrin Grosse, Nicolas Papernot, Praveen Manoharan, Michael Backes, Patrick McDaniel
Reconciling Privacy and Utility in Continuous-Time Diffusion Networks 2017  2017   Michael Backes, Manuel Gomez-Rodriguez, Praveen Manoharan, Bartlomiej Surma  Proceedings of the 30th IEEE Computer Security Foundations Symposium (CSF '17)
Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers 2017  2017   Christian Stransky, Yasemin Acar, Duc Cuong Nguyen, Dominik Wermke, Elissa M. Redmiles, Doowon Kim, Michael Backes, Simson Garfinkel, Michelle Mazurek, Sascha Fahl
Identifying Personal DNA Methylation Profiles by Genotype Inference 2017  2017   Michael Backes, Pascal Berrang, Matthias Bieg, Roland Elis, Carl Herrmann, Mathias Humbert, Irina Lehmann  Proceedings of the 38th IEEE Symposium on Security and Privacy (S&P)
Comparing the Usability of Cryptographic APIs 2017  2017   Yasemin Acar, Michael Backes, Sascha Fahl, Simson Garfinkel, Doowon Kim, Michelle Mazurek, Christian Stransky  38th IEEE Symposium on Security and Privacy (S&P '17)
Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security 2017  2017   Felix Fischer, Konstantin Böttinger, Huang Xiao, Christian Stransky, Yasemin Acar, Michael Backes, Sascha Fahl  38th IEEE Symposium on Security and Privacy (S&P '17)
ARTist: The Android Runtime Instrumentation and Security Toolkit 2017  2017   Michael Backes, Sven Bugiel, Oliver Schranz, Philipp von Styp-Rekowsky, Sebastian Weisgerber  Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17)
A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and its Application to Fair Exchange 2017  2017   Michael Backes, Jannik Dreier, Steve Kremer, Robert Künnemann  Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17)
LUNA: Quantifying and Leveraging Uncertainty in Android Malware Analysis through Bayesian Machine Learning 2017  2017   Michael Backes, Mohammad Nauman  Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17)
Efficient and Flexible Discovery of PHP Application Vulnerabilities 2017  2017   Michael Backes, Konrad Rieck, Malte Skoruppa, Ben Stock, Fabian Yamaguchi  Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17)
How Internet Resources Might Be Helping You Develop Faster but Less Securely 2017  2017   Yasemin Acar, Michael Backes, Sascha Fahl, Doowon Kim, Michelle L. Mazurek, Christian Stransky
Who Controls the Internet? Analyzing Global Threats using Property Graph Traversals 2017  2017   Milivoj Simeonovski, Giancarlo Pellegrino, Christian Rossow, Michael Backes  Proc. of the 26rd International Conference on World Wide Web (WWW 2017)
Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying 2017  2017   Kangjie Lu, Marie-Therese Walter, David Pfaff, Stefan Nürnberger, Wenke Lee, Michael Backes  Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17)
Dachshund: Digging for and Securing (Non-)Blinded Constants in JIT Code 2017  2017   Giorgi Maisuradze, Michael Backes, Christian Rossow  Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17)
How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security 2017  2017   Ben Stock, Martin Johns, Marius Steffens, Michael Backes  Proceedings of the 26th USENIX Security Symposium (USENIX Security '17)
Seamless In-App Ad Blocking on Stock Android 2017  2017   Michael Backes, Sven Bugiel, Philipp von Styp-Rekowsky, Marvin Wißfeld  Mobile Security Technologies (MOST) 2017 Workshop
Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android 2017  2017   Erik Derr, Sven Bugiel, Sascha Fahl, Yasemin Acar, Michael Backes  Proceedings of the 24th ACM Conference on Computer and Communication Security (CCS'17)
Adversarial Examples for Malware Detection 2017  2017   Kathrin Grosse, Nicolas Papernot, Praveen Manoharan, Michael Backes, Patrick McDaniel  Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II
A Stitch in Time: Supporting Android Developers in Writing Secure Code 2017  2017   Duc Cuong Nguyen, Dominik Wermke, Yasemin Acar, Michael Backes, Charles Alexander Forbes Weir, Sascha Fahl  Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS '17)
Adversarial Perturbations Against Deep Neural Networks for Malware Classification 2016  2016   Michael Backes, Praveen Manoharan, Kathrin Grosse, Nicolas Papernot
Simulating the Large-Scale Erosion of Genomic Privacy Over Time 2016  2016   Michael Backes, Pascal Berrang, Mathias Humbert, Xiaoyu Shen, Verena Wolf  Proceedings of the 3rd International Workshop on Genome Privacy and Security (GenoPri'16)
On Profile Linkability despite Anonymity in Social Media Systems 2016  2016   Michael Backes, Pascal Berrang, Oana Goga, Krishna P. Gummadi, Praveen Manoharan  Proceedings of the 2016 ACM Workshop on Privacy in the Electronic Society (WPES)
Membership Privacy in MicroRNA-based Studies 2016  2016   Michael Backes, Pascal Berrang, Mathias Humbert, Praveen Manoharan  Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16)
Reliable Third-Party Library Detection in Android and its Security Applications 2016  2016   Michael Backes, Sven Bugiel, Erik Derr  Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16)
Computational Soundness for Dalvik Bytecode 2016  2016   Michael Backes, Robert Künnemann, Esfandiar Mohammadi  Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS'16)
Identifying the Scan and Attack Infrastructures behind Amplification DDoS attacks 2016  2016   Johannes Krupp, Michael Backes, Christian Rossow  Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16)
Efficient Cryptographic Password Hardening Services From Partially Oblivious Commitments 2016  2016   Jonas Schneider, Nils Fleischhacker, Dominique Schröder, Michael Backes  Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16 )
On the Feasibility of TTL-based Filtering for DRDoS Mitigation 2016  2016   Michael Backes, Thorsten Holz, Christian Rossow, Teemu Rytilahti, Milivoj Simeonovski, Ben Stock  RAID 2016, 19th International Symposium on Research in Attacks, Intrusions and Defenses
A Survey on Routing in Anonymous Communication Protocols 2016  2016   Fatemeh Shirazi, Milivoj Simeonovski, Muhammad Rizwan Asghar, Michael Backes, Claudia Díaz
Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles 2016  2016   Michael Backes, Pascal Berrang, Anne Hecksteden, Mathias Humbert, Andreas Keller, Tim Meyer  Proceedings of the 25th USENIX Security Symposium (USENIX Security '16)
On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis 2016  2016   Michael Backes, Sven Bugiel, Erik Derr, Patrick McDaniel, Damien Octeau, Sebastian Weisgerber  Proceedings of the 25th USENIX Security Symposium (USENIX Security '16)
What Cannot be Read, Cannot be Leveraged? Revisiting Assumptions of JIT-ROP Defenses 2016  2016   Giorgi Maisuradze, Michael Backes, Christian Rossow  Proceedings of the 25th USENIX Security Symposium (USENIX Security '16)
Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification 2016  2016   Ben Stock, Giancarlo Pellegrino, Christian Rossow, Martin Johns, Michael Backes  Proceedings of the 25th USENIX Security Symposium (USENIX Security '16)
Detecting Hardware-Assisted Virtualization 2016  2016   Michael Brengel, Michael Backes, Christian Rossow  Detection of Intrusions and Malware, and Vulnerability Assessment: 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings
Boxify: Bringing Full-Fledged App Sandboxing to Stock Android 2016  2016   Michael Backes, Sven Bugiel, Oliver Schranz, Philipp von Styp-Rekowsky
R-Droid: Leveraging Android App Analysis with Static Slice Optimization 2016  2016   Michael Backes, Sven Bugiel, Erik Derr, Sebastian Gerling, Christian Hammer  Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security
RamCrypt: Kernel-based Address Space Encryption for User-mode Processes 2016  2016   Johannes Götzfried, Tilo Müller, Gabor Drescher, Stefan Nürnberger, Michael Backes  ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIACCS)
SoK: Lessons Learned From Android Security Research For Appified Software Platforms 2016  2016   Yasemin Acar, Michael Backes, Sven Bugiel, Sascha Fahl, Patrick McDaniel, Matthew Smith  37th IEEE Symposium on Security and Privacy (S&P '16)
You Get Where You're Looking For: The Impact Of Information Sources On Code Security 2016  2016   Yasemin Acar, Michael Backes, Sascha Fahl, Doowon Kim, Michelle Mazurek, Christian Stransky  37th IEEE Symposium on Security and Privacy (S&P '16)
Implementation-level Analysis of the JavaScript Helios Voting Client 2016  2016   Michael Backes, Christian Hammer, David Pfaff, Malte Skoruppa  Proceedings of the 31st Annual ACM Symposium on Applied Computing - SAC 2016
How to Make ASLR Win the Clone Wars: Runtime Re-Randomization 2016  2016   Kangjie Lu, Michael Backes, Stefan Nürnberger, Wenke Lee  Proceedings of the 23rd Annual Symposium on Network and Distributed System Security (NDSS '16)
From Zoos to Safaris - From Closed-World Enforcement to Open-World Assessment of Privacy 2016  2016   Michael Backes, Pascal Berrang, Praveen Manoharan
POSTER: The ART of App Compartmentalization 2016  2016   Michael Backes, Sven Bugiel, Jie Huang, Oliver Schranz  Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16 )
Anonymous RAM 2016  2016   Michael Backes, Amir Herzberg, Aniket Kate, Ivan Pryvalov  21st European Symposium on Research in Computer Security (ESORICS)
Delegatable Functional Signatures 2016  2016   Michael Backes, Sebastian Meiser, Dominique Schröder
SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion 2016  2016   Akira Yokoyama, Kou Ishii, Rui Tanabe, Yinmin Papa, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Daisuke Inoue, Michael Brengel, Michael Backes, Christian Rossow  Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings
Adversarial Perturbations Against Deep Neural Networks for Malware Classification 2016  2016   Michael Backes, Praveen Manoharan, Kathrin Grosse, Nicolas Papernot
Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms Against Structural Attacks 2015  2015   Michael Backes, Sebastian Meiser, Marcin Slowik  Proceedings on Privacy Enhancing Technologies
POSTER: Towards Compiler-Assisted Taint Tracking on the Android Runtime (ART) 2015  2015   Michael Backes, Oliver Schranz, Philipp von Styp-Rekowsky  Proceedings of the 22nd ACM conference on Computer and Communications Security (ACM CCS '15)
POSTER: In the Net of the Spider - Measuring the Anonymity-Impact of Network-level Adversaries Against Tor 2015  2015   Christian Rossow, Esfandiar Mohammadi, Michael Backes, Sebastian Meiser, Simon Koch  Proceedings of the 22nd ACM conference on Computer and Communications Security (ACM CCS '15)
Boxify: Full-fledged App Sandboxing for Stock Android 2015  2015   Michael Backes, Sven Bugiel, Christian Hammer, Oliver Schranz, Philipp von Styp-Rekowsky  Proceedings of the 24th USENIX Security Symposium (USENIX '15)
Symbolic Malleable Zero-knowledge Proofs 2015  2015   Esfandiar Mohammadi, Fabian Bendun, Kim Pecina, Matteo Maffei, Michael Backes  Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF '15)
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information 2015  2015   Milivoj Simeonovski, Fabian Bendun, Muhammad Rizwan Asghar, Michael Backes, Ninja Marnau, Peter Druschel  13th International Conference on Applied Cryptography and Network Security (ACNS)
ADSNARK: Nearly-Practical Privacy-Preserving Proofs on Authenticated Data 2015  2015   Michael Backes, Manuel Barbosa, Dario Fiore, Raphael M. Reischuk  Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P)
PriCL: Creating a Precedent. A Framework for Reasoning about Privacy Case Law 2015  2015   Michael Backes, Fabian Bendun, Jörg Hoffmann, Ninja Marnau  Proceedings of the 4th Conference on Principles of Security and Trust (POST)
How well do you blend into the crowd? - d-convergence: A novel paradigm for quantifying privacy in the age of Big-Data 2015  2015   Michael Backes, Pascal Berrang, Praveen Manoharan
Fully Secure Inner-Product Proxy Re-Encryption with constant size Ciphertext 2015  2015   Michael Backes, Martin Gagné, Sri Aravinda Krishnan Thyagarajan  ACM ASIACCS Security in Cloud Computing Workshop 2015
Data Lineage in Malicious Environments 2015  2015   Michael Backes, Niklas Grimm, Aniket Kate
Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources 2015  2015   Michael Backes, Aniket Kate, Sebastian Meiser, Tim Ruffing  Proceedings of the 13th International Conference on Applied Cryptography and Network Security (ACNS'15)
Quantifying Information Flow in Cryptographic Systems 2015  2015   Michael Backes, Boris Köpf
Computational Soundness for Interactive Primitves 2015  2015   Michael Backes, Esfandiar Mohammadi, Tim Ruffing  Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS'15)
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information 2015  2015   Milivoj Simeonovski, Fabian Bendun, Muhammad Rizwan Asghar, Michael Backes, Ninja Marnau, Peter Druschel
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information 2015  2015   Milivoj Simeonovski, Fabian Bendun, Muhammad Rizwan Asghar, Michael Backes, Ninja Marnau, Peter Druschel
Scippa: System-Centric IPC Provenance on Android 2014  2014   Michael Backes, Sven Bugiel, Sebastian Gerling  In Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC'14)
Android Security Framework: Extensible Multi-Layered Access Control on Android 2014  2014   Michael Backes, Sven Bugiel, Sebastian Gerling, Philipp von Styp-Rekowsky  In Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC'14)
(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection 2014  2014   Michael Backes, Aniket Kate, Sebastian Meiser, Esfandiar Mohammadi  Proceedings of the 21st ACM Conference on Computer and Communications Security (ACM CCS '14)
You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code 2014  2014   Michael Backes, Thorsten Holz, Benjamin Kollenda, Philipp Koppe, Stefan Nürnberger, Jannik Pewny  Proceedings of the 21st ACM conference on Computer and Communications Security (ACM CCS '14)
Lime: Data Lineage in the Malicious Environment 2014  2014   Michael Backes, Niklas Grimm, Aniket Kate  Proceedings of 10th International Workshopon Security and Trust Management (STM)
Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing 2014  2014   Michael Backes, Stefan Nürnberger  Proceedings of the 23rd USENIX Security Symposium (USENIX '14)
TUC: Time-sensitive and Modular Analysis of Anonymous Communication 2014  2014   Michael Backes, Praveen Manoharan, Esfandiar Mohammadi  Proceedings of the of the 27th IEEE Computer Security Foundations Symposium (CSF '14)
Asynchronous MPC with a Strict Honest Majority Using Non-equivocation 2014  2014   Michael Backes, Fabian Bendun, Ashish Choudhury, Aniket Kate  ACM Symposium on Principles of Distributed Computing 2014
WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP 2014  2014   Michael Backes, Rainer W. Gerling, Sebastian Gerling, Stefan Nürnberger, Dominique Schröder, Mark Simkin  12th International Conference on Applied Cryptography and Network Security (ACNS 2014)
BackRef: Accountability in Anonymous Communication Networks 2014  2014   Michael Backes, Jeremy Clark, Aniket Kate, Milivoj Simeonovski, Peter Druschel  Applied Cryptography and Network Security
X-pire 2.0 - A User-Controlled Expiration Date and Copy Protection Mechanism. 2014  2014   Michael Backes, Sebastian Gerling, Stefan Lorenz, Stephan Lukas  29th ACM Symposium on Applied Computing (SAC 2014)
Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations 2014  2014   Michael Backes, Cătălin Hriţcu, Matteo Maffei
Computational Soundness Results for ProVerif - Bridging the Gap from Trace Properties to Uniformity 2014  2014   Michael Backes, Esfandiar Mohammadi, Tim Ruffing  Proceedings of the 3rd Conference on Principles of Security and Trust (POST)
Verifiable Delegation of Computation on Outsourced Data 2013  2013   Michael Backes, Dario Fiore, Raphael M. Reischuk  Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS '11)
Using Mobile Device Communication to Strengthen e-Voting Protocols 2013  2013   Michael Backes, Martin Gagné, Malte Skoruppa  Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society - WPES 2013
AppGuard – Fine-grained Policy Enforcement for Untrusted Android Applications 2013  2013   Michael Backes, Sebastian Gerling, Christian Hammer, Matteo Maffei, Philipp von Styp-Rekowsky  8th International Workshop on Data Privacy Management (DPM'13)
Differentially Private Smart Metering with Battery Recharging 2013  2013   Michael Backes, Sebastian Meiser  Proceedings of the 8th International Workshop on Data Privacy Managemant (DPM 2013)
AnoA: A Framework For Analyzing Anonymous Communication Protocols 2013  2013   Michael Backes, Aniket Kate, Praveen Manoharan, Sebastian Meiser, Esfandiar Mohammadi  Proceedings of the 26th IEEE Computer Security Foundations Symposium (CSF '13)
Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized Verification 2013  2013   Michael Backes, Fabian Bendun, Dominique Unruh  Principles of Security and Trust 2013
Preventing Side-Channel Leaks in Web Traffic: A Formal Approach 2013  2013   Michael Backes, Goran Doychev, Boris Köpf  Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS '13)
Asynchronous Computational VSS with Reduced Communication Complexity 2013  2013   Michael Backes, Amit Datta, Aniket Kate  Proc. of the 2013 Cryptographers' Track at the RSA Conference (CT-RSA 2013)
Privacy-Preserving Accountable Computation 2013  2013   Michael Backes, Dario Fiore, Esfandiar Mohammadi  Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS)
AppGuard - Enforcing User Requirements on Android Apps 2013  2013   Michael Backes, Sebastian Gerling, Christian Hammer, Matteo Maffei, Philipp von Styp-Rekowsky
Union, Intersection, and Refinement Types and Reasoning About Type Disjointness for Secure Protocol Implementations 2013  2013   Michael Backes, Cătălin Hriţcu, Matteo Maffei
Callee-site Rewriting of Sealed System Libraries 2013  2013   Philipp von Styp-Rekowsky, Sebastian Gerling, Michael Backes, Christian Hammer
Idea: Callee-Site Rewriting of Sealed System Libraries 2013  2013   Philipp von Styp-Rekowsky, Sebastian Gerling, Michael Backes, Christian Hammer  International Symposium on Engineering Secure Software and Systems (ESSoS'13)
Computational Soundness without Protocol Restrictions 2012  2012   Michael Backes, Ankit Malik, Dominique Unruh  Proceedings of the 19th ACM Conference on Computer and Communication Security (CCS '12)
Ace: An Efficient Key-Exchange Protocol for Onion Routing 2012  2012   Michael Backes, Aniket Kate, Esfandiar Mohammadi  Proceedings of the 11th ACM Workshop on Privacy in the Electronic Society (WPES)
Brief announcement: distributed cryptography using trinc 2012  2012   Michael Backes, Fabian Bendun, Aniket Kate  ACM Symposium on Principles of Distributed Computing 2012
Verified Security of Merkle-Damgård 2012  2012   Michael Backes, Gilles Barthe, Matthias Berg, Benjamin Grégoire, César Kunz, Malte Skoruppa, Santiago Zanella Béguelin  Proceedings of the 25th IEEE Computer Security Foundations Symposium - CSF 2012
ObliviAd: Provably Secure and Practical Online Behavioral Advertising 2012  2012   Michael Backes, Aniket Kate, Matteo Maffei, Kim Pecina  Proceedings of the 33rd IEEE Symposium on Security and Privacy 2012 (Oakland 2012)
Automated Synthesis of Secure Distributed Applications 2012  2012   Michael Backes, Matteo Maffei, Kim Pecina  Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS '12)
On the Development and Formalization of an Extensible Code Generator for Real Life Security Protocols 2012  2012   Michael Backes, Alex Busenius, Cătălin Hriţcu  Proc. 4th NASA Formal Methods Symposium (NFM 2012)
Adding query privacy to robust DHTs 2012  2012   Michael Backes, Ian Goldberg, Aniket Kate, Tomas Toft  Proc. of the 7th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2012)
Provably Secure and Practical Onion Routing 2012  2012   Michael Backes, Aniket Kate, Ian Goldberg, Esfandiar Mohammadi  Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF)
Diffusion-Based Image Compression in Steganography 2012  2012   Markus Mainberger, Michael Backes, Matthias Berg, Joachim Weickert  Proceedings of the 8th International Symposium on Visual Computing -- ISVC 2012
SAFE Extensibility of Data-Driven Web Applications 2012  2012   Raphael M. Reischuk, Michael Backes, Johannes Gehrke  WWW~'12: Proceedings of the 21st International World Wide Web Conference
A Security API for Distributed Social Networks 2011  2011   Michael Backes, Matteo Maffei, Kim Pecina  Proceedings of the Network and Distributed System Security Symposium (NDSS '11)
X-pire! - A digital expiration date for images in social networks [TechReport] 2011  2011   Julian Backes, Michael Backes, Markus Dürmuth, Stefan Lorenz, Sebastian Gerling
Non-Uniform Distributions in Quantitative Information-Flow 2011  2011   Michael Backes, Matthias Berg, Boris Köpf  Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS)
Cryptographically sound security proofs for basic and public-key Kerberos 2011  2011   Michael Backes, Iliano Cervesato, Aaron D Jaggard, Andre Scedrov, Joe-Kai Tsay
A Local Cross-Site Scripting Attack against Android Phones 2011  2011   Michael Backes, Sebastian Gerling, Philipp von Styp-Rekowsky
Union and Intersection Types for Secure Protocol Implementations 2011  2011   Michael Backes, Cătălin Hriţcu, Matteo Maffei  Theory of Security and Applications - Joint Workshop, TOSCA 2011, Saarbrücken, Germany, March 31 - April 1, 2011, Revised Selected Papers
Automatically Verifying Typing Constraints for a Data Processing Language 2011  2011   Michael Backes, Cătălin Hriţcu, Thorsten Tarrach  Proc. 1st International Conference on Certified Programs and Proofs (CPP 2011)
Computational Verifiable Secret Sharing Revisited 2011  2011   Michael Backes, Aniket Kate, Arpita Patra  Proc. 17th International Conference on the Theory and Application of Cryptology (ASIACRYPT 2011)
Securing social networks 2011  2011   Michael Backes, Matteo Maffei, Kim Pecina  Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, PODC 2011, San Jose, CA, USA, June 6-8, 2011
G2C: Cryptographic Protocols from Goal-Driven Specifications 2011  2011   Michael Backes, Matteo Maffei, Kim Pecina, Raphael M. Reischuk  TOSCA'11: Proceedings of the 2011 International Conference on Theory of Security and Applications (now POST), held as part of ETAPS 2011