Quicklinks
The CISPA Building

 Publications Database [Main Page]


Scientific Publications are the most important measure of our scientific excellence and impact. In the past years, CISPA researchers have published papers at scientific conferences – most of which were in top-tier conferences – and articles in prestigious journals. The publications from 2011 onwards are listed in our publications database, including a direct link to the original paper.

Title Date Date Meta
A Hybrid Model for Identity Obfuscation by Face Replacement  2018  2018   Qianru Sun, Ayush Tewari, Weipeng Xu, Mario Fritz, Christian Theobalt, Bernt Schiele  European Conference on Computer Vision
A Survey on Routing in Anonymous Communication Protocols  2018  2018   Fatemeh Shirazi, Milivoj Simeonovski, Muhammad Rizwan Asghar, Michael Backes, Claudia Díaz
A4NT: Author Attribute Anonymity by Adversarial Training of Neural Machine Translation  2018  2018   Rakshith Shetty, Bernt Schiele, Mario Fritz  27th USENIX Security Symposium (USENIX Security 18)
Accurate and Diverse Sampling of Sequences based on a “Best of Many” Sample Objective  2018  2018   Apratim Bhattacharyya, Bernt Schiele, Mario Fritz  IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
Analyzing Guarded Protocols: Better Cutoffs, More Systems, More Expressivity  2018  2018   Swen Jacobs, Mouhammad Sakr  Verification, Model Checking, and Abstract Interpretation - 19th International Conference, VMCAI 2018, Proceedings
Anonymisierungsverfahren für genetische Daten  2018  2018   Ninja Marnau, Pascal Berrang, Mathias Humbert
Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse  2018  2018   Sanam Ghorbani Lyastani, Michael Schilling, Sascha Fahl, Michael Backes, Sven Bugiel  27th USENIX Security Symposium (USENIX Security 18)
Connecting Pixels to Privacy and Utility: Automatic Redaction of Private Information in Images  2018  2018   Tribhuvanesh Orekondy, Mario Fritz, Bernt Schiele  IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
Datenschutz durch Technikgestaltung für Genomdaten  2018  2018   Claudia Kawohl, Annika Krämer, Ninja Marnau
Detecting Information Flow by Mutating Input data  2018  2018   Björn Mathis, Vitalii Avdiienko, Ezekiel O. Soremekun, Marcel Böhme, Andreas Zeller  Software Engineering (SE) 2018
Didn’t You Hear Me? — Towards More Successful Web Vulnerability Notifications  2018  2018   Ben Stock, Giancarlo Pellegrino, Frank Li, Michael Backes, Christian Rossow  Proceedings of the 25th Annual Symposium on Network and Distributed System Security (NDSS '18).
Disentangled Person Image Generation  2018  2018   Liqian Ma, Qianru Sun, Stamatios Georgoulis, Luc Van Gool, Bernt Schiele, Mario Fritz  IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
Dissecting Privacy Risks in Biomedical Data  2018  2018   Pascal Berrang, Mathias Humbert, Yang Zhang, Irina Lehmann, Roland Eils, Michael Backes  Proceedings of the 3rd IEEE European Symposium on Security and Privacy (Euro S&P)
Diverse Conditional Image Generation by Stochastic Regression with Latent Drop-Out Codes  2018  2018   Yang He, Mario Fritz, Bernt Schiele  European Conference on Computer Vision (ECCV)
Efficient GUI Test Generation by Learning from Tests of Other Apps  2018  2018   Andreas Rau, Jenny Hotzkow, Andreas Zeller  Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings
Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure  2018  2018   Patrick Speicher, Marcel Steinmetz, Robert Künnemann, Milivoj Simeonovski, Giancarlo Pellegrino, Jörg Hoffmann, Michael Backes  2018 IEEE European Symposium on Security and Privacy, EuroS&P 2018, London, United Kingdom, April 24-26, 2018
Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure (full version) [TechReport]  2018  2018   Patrick Speicher, Marcel Steinmetz, Robert Künnemann, Milivoj Simeonovski, Giancarlo Pellegrino, Jörg Hoffmann, Michael Backes
Investigating System Operators' Perspective on Security Misconfigurations  2018  2018   Constanze Dietrich, Katharina Krombholz, Kevin Borgolte, Tobias Fiebig  25th ACM Conference on Computer and Communications Security
JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript  2018  2018   Aurore Fass, Robert Krawczyk, Michael Backes, Ben Stock  Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA '18)
Long-Term Image Boundary Prediction  2018  2018   Apratim Bhattacharyya, Mateusz Malinowski, Bernt Schiele, Mario Fritz  Association for the Advancement of Artificial Intelligence (AAAI)
Long-Term On-Board Prediction of People in Traffic Scenes under Uncertainty  2018  2018   Apratim Bhattacharyya, Mario Fritz, Bernt Schiele  IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps  2018  2018   Michael Brengel, Christian Rossow  Proceedings of the Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA)
Natural and Effective Obfuscation by Head Inpainting  2018  2018   Qianru Sun, Liqian Ma, Seong Joon Oh, Luc Van Gool, Bernt Schiele, Mario Fritz  IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
Optimizing Recurrent Pulsing Attacks using Application-Layer Amplification of Open DNS Resolvers  2018  2018   Jonas Bushart  12th USENIX Workshop on Offensive Technologies (WOOT 18)
PRIMA: Privacy-Preserving Identity and Access Management at Internet-Scale  2018  2018   Muhammad Rizwan Asghar, Michael Backes, Milivoj Simeonovski  2018 IEEE International Conference on Communications (ICC) Kansas City, MO, USA, 20-24 May 2018
Practical Test Dependency Detection  2018  2018   Alessio Gambi, Jonathan Bell, Andreas Zeller  Proceedings of the 2018 IEEE Conference on Software Testing, Validation and Verification
Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels  2018  2018   Meng Xu, Chenxiong Qian, Kangjie Lu, Michael Backes, Taesoo Kim  In Proceedings of the 39th IEEE Symposium on Security and Privacy (Oakland). San Francisco, CA, May 2018.
Stackelberg Planning: Towards Effective Leader-Follower State Space Search  2018  2018   Patrick Speicher, Marcel Steinmetz, Michael Backes, Jörg Hoffmann, Robert Künnemann  The Thirty-Second AAAI Conference on Artificial Intelligence (AAAI-18)
Tagvisor: A Privacy Advisor for Sharing Hashtags  2018  2018   Yang Zhang, Mathias Humbert, Tahleen Rahman, Cheng-Te Li, Jun Pang, Michael Backes  Proceedings of the Web Conference 2018 (WWW)
The Case for Automatic Database Administration using Deep Reinforcement Learning  2018  2018   Ankur Sharma, Felix Martin Schuhknecht, Jens Dittrich
The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators  2018  2018   Marten Oltrogge, Erik Derr, Christian Stransky, Yasemin Acar, Sascha Fahl, Christian Rossow, Giancarlo Pellegrino, Sven Bugiel, Michael Backes  39th IEEE Symposium on Security and Privacy (SP '18)
Transferring Tests Across Web Applications  2018  2018   Andreas Rau, Jenny Hotzkow, Andreas Zeller  ICWE - International Conference for Web Engineering
When the Crypto in Cryptocurrencies Breaks: Bitcoin Security under Broken Primitives  2018  2018   Ilias Giechaskiel, Cas Cremers, Kasper B. Rasmussen
Whitening Black-Box Neural Networks  2018  2018   Seong Joon Oh, Max Augustin, Bernt Schiele, Mario Fritz  International Conference on Learning Representations (ICLR)
Wo ist der Fehler und wie wird er behoben? Ein Experiment mit Softwareentwicklern.  2018  2018   Marcel Böhme, Ezekiel O. Soremekun, Sudipta Chattopadhyay, Emamurho Ugherughe, Andreas Zeller  Software Engineering (SE) 2018
You Are Where You APP: An Assessment on Location Privacy of Social APPs  2018  2018   Fanghua Zhao, Linan Gao, Yang Zhang, Zeyu Wang, Bo Wang, Shanqing Guo  The 29th IEEE International Symposium on Software Reliability Engineering
teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts  2018  2018   Johannes Krupp, Christian Rossow  27th USENIX Security Symposium (USENIX Security 18)

Publications [2011 – 2017]

CISPA researchers have published the following publications prior to joining the CISPA – Helmholtz-Zentrum (i.G.)

|
|
|
|
|
|
Title Date Date Meta
A Broad View of the Ecosystem of Socially Engineered Exploit Documents  2017  2017   Stevens Le Blond, Cedric Gilbert, Utkarsh Upadhyay, Manuel Gomez-Rodriguez, David Choffnes  Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17)
A Comprehensive Symbolic Analysis of TLS 1.3  2017  2017   Cas Cremers, Marko Horvat, Jonathan Hoyland, Sam Scott, Thyla van der Merwe
A Domain Based Approach to Social Relation Recognition  2017  2017   Qianru Sun, Bernt Schiele, Mario Fritz  IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
A Domain Based Approach to Social Relation Recognition  2017  2017   Qianru Sun, Bernt Schiele, Mario Fritz
A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and its Application to Fair Exchange  2017  2017   Michael Backes, Jannik Dreier, Steve Kremer, Robert Künnemann  Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17)
A Stitch in Time: Supporting Android Developers in Writing Secure Code  2017  2017   Duc Cuong Nguyen, Dominik Wermke, Yasemin Acar, Michael Backes, Charles Alexander Forbes Weir, Sascha Fahl  Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS '17)
A promising semantics for relaxed-memory concurrency  2017  2017   Jeehoon Kang, Chung-Kil Hur, Ori Lahav, Viktor Vafeiadis, Derek Dreyer  Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages (POPL'17)
A4NT : Author Attribute Anonymity by Adversarial Training of Neural Machine Translation [TechReport]  2017  2017   Rakshith Shetty, Bernt Schiele, Mario Fritz
A4NT: Author Attribute Anonymity by Adversarial Training of Neural Machine Translation  2017  2017   Rakshith Shetty, Bernt Schiele, Mario Fritz
ARTist: The Android Runtime Instrumentation and Security Toolkit  2017  2017   Michael Backes, Sven Bugiel, Oliver Schranz, Philipp von Styp-Rekowsky, Sebastian Weisgerber  Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17)
Accelerating Analytical Processing in MVCC using Fine-Granular High-Frequency Virtual Snapshotting  2017  2017   Ankur Sharma, Felix Martin Schuhknecht, Jens Dittrich
Active Learning of Input Grammars  2017  2017   Matthias Höschele, Alexander Kampmann, Andreas Zeller
Advanced Steel Microstructure Classification by Deep Learning Methods  2017  2017   Seyedmajid Azimi, Dominik Britz, Michael Engstler, Mario Fritz, Frank Mücklich
Adversarial Examples for Malware Detection  2017  2017   Kathrin Grosse, Nicolas Papernot, Praveen Manoharan, Michael Backes, Patrick McDaniel  Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II
Adversarial Image Perturbation for Privacy Protection - A Game Theory Perspective  2017  2017   Seong Joon Oh, Mario Fritz, Bernt Schiele
Adversarial Image Perturbation for Privacy Protection -- A Game Theory Perspective [TechReport]  2017  2017   Seong Joon Oh, Mario Fritz, Bernt Schiele
Adversarial Image Perturbation for Privacy Protection — A Game Theory Perspective  2017  2017   Seong Joon Oh, Mario Fritz, Bernt Schiele  IEEE International Conference on Computer Vision (ICCV), 2017
An Exact and Sustainable Analysis of Non-preemptive Scheduling  2017  2017   Mitra Nasri, Björn B. Brandenburg  2017 IEEE Real-Time Systems Symposium (RTSS)
An Exact and Sustainable Analysis of Non-preemptive Scheduling  2017  2017   Mitra Nasri, Björn B. Brandenburg  2017 IEEE Real-Time Systems Symposium, RTSS 2017, Paris, France, December 5-8, 2017
An Experimental Analysis of Different Key-Value Stores and Relational Databases  2017  2017   David Gembalczyk, Felix Martin Schuhknecht, Jens Dittrich
Ask Your Neurons: A Deep Learning Approach to Visual Question Answering  2017  2017   Mateusz Malinowski, Marcus Rohrbach, Mario Fritz
Auf der Jagd nach Schwachstellen – Eine strafrechtliche Bewertung von Portscans  2017  2017   Stephanie Vogelgesang, Frederik Möllers, Stefan Hessel, Karin Potel
Automatically Inferring and Enforcing User Expectations  2017  2017   Jenny Hotzkow  Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10 - 14, 2017
Beyond Pairwise Similarity: Quantifying and Characterizing Linguistic Similarity between Groups of Languages by MDL  2017  2017   Andrea K. Fisher, Jilles Vreeken, Dietrich Klakow
CUT: automatic unit testing in the cloud  2017  2017   Alessio Gambi, Sebastian Kappler, Johannes Lampel, Andreas Zeller  Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10 - 14, 2017
Characterising the Difference and the Norm between Sequence Databases  2017  2017   Frauke Hinrichs, Jilles Vreeken  Proceedings of the 4th Workshop on Interactions between Data Mining and Natural Language Processing (DMNLP)
Comparing the Usability of Cryptographic APIs  2017  2017   Yasemin Acar, Michael Backes, Sascha Fahl, Simson Garfinkel, Doowon Kim, Michelle Mazurek, Christian Stransky  38th IEEE Symposium on Security and Privacy (S&P '17)
Connecting Pixels to Privacy and Utility: Automatic Redaction of Private Information in Images [TechReport]  2017  2017   Tribhuvanesh Orekondy, Mario Fritz, Bernt Schiele
Correlation by Compression  2017  2017   Kailash Budhathoki, Jilles Vreeken  Proceedings of the SIAM International Conference on Data Mining (SDM)
Dachshund: Digging for and Securing (Non-)Blinded Constants in JIT Code  2017  2017   Giorgi Maisuradze, Michael Backes, Christian Rossow  Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17)
Data flow oriented UI testing: exploiting data flows and UI elements to test Android applications  2017  2017   Nataniel P Borges Jr  Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis
Datenschutz für Minderjährige nach der Europäischen Datenschutz-Grundverordnung (DSGVO) vom 27. April 2016  2017  2017   Jochen Krüger, Stephanie Vogelgesang, Michael Weller  Trends and Communities of Legal Informatics: Proceedings of the 20th International Legal Informatics Symposium IRIS 2017
Datensicherheit und IT-Sicherheit in der Justiz  2017  2017   Stephanie Vogelgesang
DeepCity: A Feature Learning Framework for Mining Location Check-ins  2017  2017   Jun Pang, Yang Zhang  Proceedings of the 11th International Conference on Web and Social Media (ICWSM'17)
Detecting Information Flow by Mutating Input Data  2017  2017   Björn Mathis, Vitalii Avdiienko, Ezekiel O. Soremekun, Marcel Böhme, Andreas Zeller  Proceedings of the 32Nd IEEE/ACM International Conference on Automated Software Engineering
Detecting behavior anomalies in graphical user interfaces  2017  2017   Vitalii Avdiienko, Konstantin Kuznetsov, Isabelle Rommelfanger, Andreas Rau, Alessandra Gorla, Andreas Zeller  Software Engineering Companion (ICSE-C), 2017 IEEE/ACM 39th International Conference on
Die Blockchain im Spannungsfeld der Grundsätze der Datenschutzgrundverordnung  2017  2017   Ninja Marnau  INFORMATIK 2017, Workshop Recht und Technik
Discovering Reliable Approximate Functional Dependencies  2017  2017   Panagiotis Mandros, Mario Boley, Jilles Vreeken  Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD)
Disentangled Person Image Generation [TechReport]  2017  2017   Liqian Ma, Qianru Sun, Stamatios Georgoulis, Luc Van Gool, Bernt Schiele, Mario Fritz
Distilling Information Reliability and Source Trustworthiness from Digital Traces  2017  2017   Behzad Tabibian, Isabel Valera, Mehrdad Farajtabar, Le Song, Bernhard Schölkopf, Manuel Gomez-Rodriguez  26th International World Wide Web Conference (WWW'17)
Dynamic Tainting for Automatic Test Case Generation  2017  2017   Björn Mathis  Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis
Efficient and Flexible Discovery of PHP Application Vulnerabilities  2017  2017   Michael Backes, Konrad Rieck, Malte Skoruppa, Ben Stock, Fabian Yamaguchi  Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17)
Efficient fuzz testing leveraging input, code, and execution  2017  2017   Nikolas Havrikov  2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C)
Efficiently Discovering Locally Exceptional yet Globally Representative Subgroups  2017  2017   Janis Kalofolias, Mario Boley, Jilles Vreeken  Proceedings of the IEEE International Conference on Data Mining (ICDM)
Efficiently Discovering Unexpected Pattern Co-Occurrences  2017  2017   Roel Bertens, Jilles Vreeken, Arno Siebes  Proceedings of the SIAM International Conference on Data Mining (SDM)
Efficiently Summarising Event Sequences with Rich Interleaving Patterns  2017  2017   Apratim Bhattacharyya, Jilles Vreeken  Proceedings of the SIAM International Conference on Data Mining (SDM)
Exploiting saliency for object segmentation from image level labels  2017  2017   Seong Joon Oh, Rodrigo Benenson, Anna Khoreva, Zeynep Akata, Mario Fritz, Bernt Schiele  IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
Exploiting saliency for object segmentation from image level labels  2017  2017   Seong Joon Oh, Rodrigo Benenson, Anna Khoreva, Zeynep Akata, Mario Fritz, Bernt Schiele
FACETS : Adaptive Local Exploration of Large Graphs  2017  2017   Robert Pienta, Minsuk Kahng, Zhang Lin, Jilles Vreeken, Partha Talukdar, James Abello, Ganesh Parameswaran, Duen Horng Chau  Proceedings of the SIAM International Conference on Data Mining (SDM)
FairTest: Discovering Unwarranted Associations in Data-Driven Applications  2017  2017   Floran Tramèr, Vaggelis Atlidakis, Roxana Geambasu, Daniel Hsu, Jean-Pierre Hubaux, Mathias Humbert, Ari Juels, Huang Lin  
Fairness Beyond Disparate Treatment & Disparate Impact: Learning Classification without Disparate Mistreatment  2017  2017   Bilal Zafar, Isabel Valera, Manuel Gomez-Rodriguez, Krishna P. Gummadi  26th International World Wide Web Conference (WWW'17)
Generating Unit Tests with Structured System Interactions  2017  2017   Nikolas Havrikov, Alessio Gambi, Andreas Zeller, Andrea Arcuri, Juan Pablo Galeotti  12th IEEE/ACM International Workshop on Automation of Software Testing, AST@ICSE 2017, Buenos Aires, Argentina, May 20-21, 2017
How Developers Debug Software- The DBGBENCH Dataset  2017  2017   Marcel Böhme, Ezekiel O. Soremekun, Sudipta Chattopadhyay, Emamurho Ugherughe, Andreas Zeller  2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C)
How Internet Resources Might Be Helping You Develop Faster but Less Securely  2017  2017   Yasemin Acar, Michael Backes, Sascha Fahl, Doowon Kim, Michelle L. Mazurek, Christian Stransky
How Wrong Am I? - Studying Adversarial Examples and their Impact on Uncertainty in Gaussian Process Machine Learning Models  2017  2017   Kathrin Grosse, David Pfaff, Michael Thomas Smith, Michael Backes
How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security  2017  2017   Ben Stock, Martin Johns, Marius Steffens, Michael Backes  Proceedings of the 26th USENIX Security Symposium (USENIX Security '17)
Identifying Consistent Statements about Numerical Data with Dispersion-Corrected Subgroup Discovery  2017  2017   Mario Boley, Brian R. Goldsmit, Luca M. Ghiringhelli, Jilles Vreeken
Identifying Personal DNA Methylation Profiles by Genotype Inference  2017  2017   Michael Backes, Pascal Berrang, Matthias Bieg, Roland Elis, Carl Herrmann, Mathias Humbert, Irina Lehmann  Proceedings of the 38th IEEE Symposium on Security and Privacy (S&P)
It's Written All Over Your Face: Full-Face Appearance-Based Gaze Estimation  2017  2017   Xucong Zhang, Yusuke Sugano, Mario Fritz, Andreas Bulling  2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, CVPR Workshops, Honolulu, HI, USA, July 21-26, 2017
Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android  2017  2017   Erik Derr, Sven Bugiel, Sascha Fahl, Yasemin Acar, Michael Backes  Proceedings of the 24th ACM Conference on Computer and Communication Security (CCS'17)
LUNA: Quantifying and Leveraging Uncertainty in Android Malware Analysis through Bayesian Machine Learning  2017  2017   Michael Backes, Mohammad Nauman  Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17)
Learning Dilation Factors for Semantic Segmentation of Street Scenes  2017  2017   Yang He, Margret Keuper, Bernt Schiele, Mario Fritz  Pattern Recognition - 39th German Conference, GCPR 2017, Basel, Switzerland, September 12-15, 2017, Proceedings
Learning Dilation Factors for Semantic Segmentation of Street Scenes  2017  2017   Yang He, Margret Keuper, Bernt Schiele, Mario Fritz
Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers  2017  2017   Christian Stransky, Yasemin Acar, Duc Cuong Nguyen, Dominik Wermke, Elissa M. Redmiles, Doowon Kim, Michael Backes, Simson Garfinkel, Michelle Mazurek, Sascha Fahl
Linking Amplification DDoS Attacks to Booter Services  2017  2017   Johannes Krupp, Mohammad Karami, Christian Rossow, Damon McCoy, Michael Backes  International Symposium on Research in Attacks, Intrusions, and Defenses
Local Analysis for Global Inputs  2017  2017   Alexander Kampmann  39th International Symposium on Software Engineering
Long-Term On-Board Prediction of People in Traffic Scenes under Uncertainty  2017  2017   Apratim Bhattacharyya, Mario Fritz, Bernt Schiele
MDL for Causal Inference on Discrete Data  2017  2017   Kailash Budhathoki, Jilles Vreeken  Proceedings of the IEEE International Conference on Data Mining (ICDM)
Millions of Targets Under Attack: A Macroscopic Characterization of the DoS Ecosystem  2017  2017   Mattijs Jonker, Alistair King, Johannes Krupp, Christian Rossow, Anna Sperotto, Alberto Dainotti  Proceedings of the 2017 Internet Measurement Conference
Mining input grammars with AUTOGRAM  2017  2017   Matthias Höschele, Andreas Zeller  Proceedings of the 39th International Conference on Software Engineering, ICSE 2017, Buenos Aires, Argentina, May 20-28, 2017 - Companion Volume
Mit Schirm, Charme und Kamera – Verbotene Sendeanlagen i.S.d. § 90 TKG  2017  2017   Frederik Möllers, Stephanie Vogelgesang, Stefan Hessel, Lena Leffer  Trends and Communities of Legal Informatics: Proceedings of the 20th International Legal Informatics Symposium IRIS 2017
Model-based testing of end-user collaboration intensive systems  2017  2017   Alessio Gambi, Christoph Mayr-Dorn, Andreas Zeller  Proceedings of the Symposium on Applied Computing, SAC 2017, Marrakech, Morocco, April 3-7, 2017
My friend Cayla - eine nach § 90 TKG verbotene Sendeanlage?  2017  2017   Stefan Hessel
Natural and Effective Obfuscation by Head Inpainting [TechReport]  2017  2017   Qianru Sun, Liqian Ma, Seong Joon Oh, Luc Van Gool, Bernt Schiele, Mario Fritz
Novel Views of Objects from a Single Image  2017  2017   Konstantinos Rematas, Chuong H. Nguyen, Tobias Ritschel, Mario Fritz, Tinne Tuytelaars
O!Snap: Cost-Efficient Testing in the Cloud  2017  2017   Alessio Gambi, Alessandra Gorla, Andreas Zeller  2017 IEEE International Conference on Software Testing, Verification and Validation, ICST 2017, Tokyo, Japan, March 13-17, 2017
Offline Equivalence: A Non-preemptive Scheduling Technique for Resource-Constrained Embedded Real-Time Systems  2017  2017   Mitra Nasri, Björn B. Brandenburg  2017 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS)
Origo: Causal Inference by Compression  2017  2017   Kailash Budhathoki, Jilles Vreeken
P2P Mixing and Unlinkable Bitcoin Transactions  2017  2017   Tim Ruffing, Pedro Moreno-Sanchez, Aniket Kate  Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17)
Parametricity Versus the Universal Type  2017  2017   Dominique Devriese, Marco Patrignani, Frank Piessens  POPL
Person Recognition in Social Media Photos  2017  2017   Seong Joon Oh, Rodrigo Benenson, Mario Fritz, Bernt Schiele
Predicting the Category and Attributes of Visual Search Targets Using Deep Gaze Pooling  2017  2017   Hosnieh Sattar, Andreas Bulling, Mario Fritz  Mutual Benefits of Cognitive and Computer Vision Workshop at International Conference on Computer Vision (ICCV-W)
Proceedings of the ACM SIGKDD Workshop on Interactive Data Exploration and Analytics (IDEA)  2017  2017   Jefrey Lijffijt, Duen Horng Chau, Jilles Vreeken, Matthijs van Leeuwen, Dafna Shahaf, Christos Faloutsos
Qapla: Policy compliance for database-backed systems  2017  2017   Aastha Mehta, Eslam Elnikety, Katura Harvey, Deepak Garg, Peter Druschel  26th USENIX Security Symposium (USENIX Security 17)
Quantifying Location Sociality  2017  2017   Jun Pang, Yang Zhang
Quantifying the Resiliency of Replicated Networked Control Systems to Transient Faults  2017  2017   Arpan Gujarati, Mitra Nasri, Björn B. Brandenburg  Proceedings of the Work-in-Progress Session of the 29th Euromicro Conference on Real-Time Systems (ECRTS 2017)
Reconciling Privacy and Utility in Continuous-Time Diffusion Networks  2017  2017   Michael Backes, Manuel Gomez-Rodriguez, Praveen Manoharan, Bartlomiej Surma  Proceedings of the 30th IEEE Computer Security Foundations Symposium (CSF '17)
RedQueen: An Online Algorithm for Smart Broadcasting in Social Networks  2017  2017   Ali Zarezade, U. Upadhyay, H. Rabiee, Manuel Gomez-Rodriguez  WSDM '17: Proceedings of the 10th ACM International Conference on Web Search and Data Mining
Relational cost analysis  2017  2017   Ezgi Çiçek, Gilles Barthe, Marco Gaboardi, Deepak Garg, Jan Hoffmann  Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages (POPL'17)
Richterliche Unabhängigkeit und Bring Your Own Device (BYOD) – Weg in die Zukunft oder unvertretbares Sicherheitsrisiko?  2017  2017   Jochen Krüger, Frederik Möllers, Stephanie Vogelgesang  Trends and Communities of Legal Informatics: Proceedings of the 20th International Legal Informatics Symposium IRIS 2017
Richterliche Unabhängigkeit und Bring Your Own Device (BYOD) – Weg in die Zukunft oder unvertretbares Sicherheitsrisiko?  2017  2017   Frederik Krüger, Stephanie Vogelgesang  Trends und Communities der Rechtsinformatik: Tagungsband des 20. Internationalen Rechtsinformatik Symposions IRIS 2017 / Trends and Communities of Legal Informatics: Proceedings of the 20th International Legal Informatics Symposium IRIS 2017
Robust Hyperproperty Preservation for Secure Compilation (Extended Abstract)  2017  2017   Deepak Garg, Cătălin Hriţcu, Marco Patrignani, Marco Stronati, David Swasey  1st Workshop on Principles of Secure Compilation
Robust and compositional verification of object capability patterns  2017  2017   David Swasey, Deepak Garg, Derek Dreyer
STD2P: RGBD Semantic Segmentation Using Spatio-Temporal Data-Driven Pooling  2017  2017   Yang He, Wei-Chen Chiu, Margret Keuper, Mario Fritz  IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
Seamless In-App Ad Blocking on Stock Android  2017  2017   Michael Backes, Sven Bugiel, Philipp von Styp-Rekowsky, Marvin Wißfeld  Mobile Security Technologies (MOST) 2017 Workshop
Security Analysis of Cache Replacement Policies  2017  2017   Pablo Canones, Boris Köpf, Jan Reineke  Proceedings of the 6th International Conference on Principles of Security and Trust
Security Developer Studies with GitHub Users: Exploring a Convenience Sample  2017  2017   Yasemin Acar, Christian Stransky, Dominik Wermke, Michelle Mazurek, Sascha Fahl
SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks  2017  2017   Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei  Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17)
Speaking the Same Language: Matching Machine to Human Captions by Adversarial Training [TechReport]  2017  2017   Rakshith Shetty, Marcus Rohrbach, Lisa Anne Hendricks, Mario Fritz, Bernt Schiele
Speaking the Same Language: Matching Machine to Human Captions by Adversarial Training  2017  2017   Rakshith Shetty, Marcus Rohrbach, Lisa Anne Hendricks, Mario Fritz, Bernt Schiele
Speaking the Same Language: Matching Machine to Human Captions by Adversarial Training  2017  2017   Rakshith Shetty, Marcus Rohrbach, Lisa Anne Hendricks, Mario Fritz, Bernt Schiele  IEEE International Conference on Computer Vision (ICCV)
Spionagegeräte im Kinderzimmer? – Zur Problematik des § 90 TKG bei Smart Toys  2017  2017   Stephanie Vogelgesang, Stefan Hessel
Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security  2017  2017   Felix Fischer, Konstantin Böttinger, Huang Xiao, Christian Stransky, Yasemin Acar, Michael Backes, Sascha Fahl  38th IEEE Symposium on Security and Privacy (S&P '17)
State Space Search Nogood Learning: Online Refinement of Critical-Path Dead-End Detectors in Planning  2017  2017   Marcel Steinmetz, Jörg Hoffmann
Strafbarkeit bei der digitalen Spurensuche – Eine rechtliche Bewertung von Honeypots  2017  2017   Stephanie Vogelgesang, Frederik Möllers, Karin Potel
Summarising Event Sequences using Serial Episodes and an Ontology  2017  2017   Kathrin Grosse, Jilles Vreeken  Proceedings of the 4th Workshop on Interactions between Data Mining and Natural Language Processing (DMNLP)
Supporting low-latency, low-criticality tasks in a certified mixed-criticality OS  2017  2017   Manohar Vanga, Andrea Bastoni, Henrik Theiling, Björn B. Brandenburg  Proceedings of the 25th International Conference on Real-Time Networks and Systems, RTNS 2017, Grenoble, France, October 04 - 06, 2017
Swayam: distributed autoscaling to meet SLAs of machine learning inference services with resource efficiency  2017  2017   Arpan Gujarati, Sameh Elnikety, Yuxiong He, Kathryn S. McKinley, Björn B. Brandenburg  Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference, Las Vegas, NV, USA, December 11 - 15, 2017
Tatobjekt und Vortaten der Datenhehlerei (§ 202 d StGB)  2017  2017   Dominik Brodowski, Ninja Marnau
Telling Cause from Effect by MDL-based Local and Global Regression  2017  2017   Alexander Marx, Jilles Vreeken  Proceedings of the IEEE International Conference on Data Mining (ICDM)
The 4th Reactive Synthesis Competition (SYNTCOMP 2017): Benchmarks, Participants & Results  2017  2017   Swen Jacobs, Nicolas Basset, Roderick Bloem, Romain Brenguier, Maximilien Colange, Peter Faymonville, Bernd Finkbeiner, Ayrat Khalimov, Felix Klein, Thibaud Michaud, Guillermo A. Perez, Jean-Francois Raskin, Ocan Sankur, Leander Tentrup  Proceedings Sixth Workshop on Synthesis, SYNT 2017, Heidelberg, Germany, 22nd July 2017.
The ART of App Compartmentalization: Compiler-based Library Privilege Separation on Stock Android  2017  2017   Jie Huang, Oliver Schranz, Sven Bugiel, Michael Backes  Proceedings of the 24th ACM Conference on Computer and Communication Security (CCS'17)
The first reactive synthesis competition (SYNTCOMP 2014)  2017  2017   Swen Jacobs, Roderick Bloem, Romain Brenguier, Rüdiger Ehlers, Timotheus Hell, Robert Könighofer, Guillermo A. Perez, Jean-Francois Raskin, Leonid Ryzhyk, Ocan Sankur, Martina Seidl, Leander Tentrup, Adam Walker
Thread modularity at many levels: a pearl in compositional verification  2017  2017   Jochen Hoenicke, Rupak Majumdar, Andreas Podelski  Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages (POPL'17)
TimerShield: Protecting High-Priority Tasks from Low-Priority Timer Interference  2017  2017   P. Patel, Manohar Vanga, Björn B. Brandenburg  2017 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS)
Topic-driven testing  2017  2017   Andreas Rau  Software Engineering Companion (ICSE-C), 2017 IEEE/ACM 39th International Conference on
Towards a Visual Privacy Advisor: Understanding and Predicting Privacy Risks in Images [TechReport]  2017  2017   Tribhuvanesh Orekondy, Bernt Schiele, Mario Fritz
Towards a Visual Privacy Advisor: Understanding and Predicting Privacy Risks in Images  2017  2017   Tribhuvanesh Orekondy, Bernt Schiele, Mario Fritz  IEEE International Conference on Computer Vision (ICCV)
Towards a Visual Privacy Advisor: Understanding and Predicting Privacy Risks in Images  2017  2017   Tribhuvanesh Orekondy, Bernt Schiele, Mario Fritz
Uncovering Structure-Property Relationships of Materials by Subgroup Discovery  2017  2017   Brian Goldsmith, Mario Boley, Jilles Vreeken, Matthias Scheffler, Luca M. Ghiringhelli
Uncovering the Spatiotemporal Patterns of Collective Social Activity  2017  2017   Martin Jankowiak, Manuel Gomez-Rodriguez  2017 SIAM International Conference on Data Mining
Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying  2017  2017   Kangjie Lu, Marie-Therese Walter, David Pfaff, Stefan Nürnberger, Wenke Lee, Michael Backes  Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17)
Visual stability prediction for robotic manipulation  2017  2017   Wenbin Li, Ales Leonardis, Mario Fritz  2017 IEEE International Conference on Robotics and Automation, ICRA 2017, Singapore, Singapore, May 29 - June 3, 2017
What is Around the Camera?  2017  2017   Stamatios Georgoulis, Konstantinos Rematas, Tobias Ritschel, Mario Fritz, Tinne Tuytelaars, Luc Van Gool  IEEE International Conference on Computer Vision, ICCV 2017, Venice, Italy, October 22-29, 2017
Where is the Bug and How is It Fixed? An Experiment with Practitioners  2017  2017   Marcel Böhme, Ezekiel O. Soremekun, Sudipta Chattopadhyay, Emamurho Ugherughe, Andreas Zeller  Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering
Whitening Black-Box Neural Networks [TechReport]  2017  2017   Seong Joon Oh, Max Augustin, Bernt Schiele, Mario Fritz
Who Controls the Internet? Analyzing Global Threats using Property Graph Traversals  2017  2017   Milivoj Simeonovski, Giancarlo Pellegrino, Christian Rossow, Michael Backes  Proc. of the 26rd International Conference on World Wide Web (WWW 2017)
A High-Level LTL Synthesis Format: TLSF v1.1  2016  2016   Swen Jacobs, Felix Klein, Sebastian Schirmer  Proceedings Fifth Workshop on Synthesis, SYNT@CAV 2016, Toronto, Canada, July 17-18, 2016.
A Stream-Based Specification Language for Network Monitoring  2016  2016   Peter Faymonville, Bernd Finkbeiner, Sebastian Schirmer, Hazem Torfah  Proceedings of the 16th International Conference on Runtime Verification (RV'2016)
A Survey on Routing in Anonymous Communication Protocols  2016  2016   Fatemeh Shirazi, Milivoj Simeonovski, Muhammad Rizwan Asghar, Michael Backes, Claudia Díaz
A Survey on Static Cache Analysis for Real-Time Systems  2016  2016   Mingsong Lv, Nan Guan, Jan Reineke, Reinhard Wilhelm, Wang Yi
A type theory for incremental computational complexity with control flow changes  2016  2016   Deepak Garg, Ezgi Çiçek, Zoe Paraskevopoulou  Proceedings of the 21st ACM SIGPLAN International Conference on Functional Programming (ICFP '16)
Abnormal Sensitive Data Usage in Android Apps  2016  2016   Vitalii Avdiienko, Konstantin Kuznetsov, Alessandra Gorla, Andreas Zeller, Steven Arzt, Siegfried Rasthofer, Eric Bodden  In Proceedings of the Jornadas Nacionales de Investigación en Ciberseguridad
Adversarial Perturbations Against Deep Neural Networks for Malware Classification  2016  2016   Michael Backes, Praveen Manoharan, Kathrin Grosse, Nicolas Papernot
An Empirical Study of Textual Key-Fingerprint Representations  2016  2016   Dominik Schürmann, Karoline Busse, Matthew Smith, Sascha Fahl, Sergej Dechand, Yasemin Acar  Proceedings of the 25th USENIX Security Symposium (USENIX Security '16)
An experimental comparison of thirteen relational equi-joins in main memory  2016  2016   Stefan Schuh, Xiao Chen, Jens Dittrich  Proceedings of the 2016 International Conference on Management of Data
An experimental evaluation and analysis of database cracking  2016  2016   Felix Martin Schuhknecht, Alekh Jindal, Jens Dittrich
Angreiferjagd im Internet der Dinge  2016  2016   Sebastian Gerling, Christian Rossow
Anonymisierung, Pseudonymisierung und Transparenz für Big Data. Technische Herausforderungen und Regelung in der Datenschutz-Grundverordnung  2016  2016   Ninja Marnau
Anonymous RAM  2016  2016   Michael Backes, Amir Herzberg, Aniket Kate, Ivan Pryvalov  21st European Symposium on Research in Computer Security (ESORICS)
Asymmetric Secure Multi-execution with Declassification  2016  2016   Deepak Garg, Iulia Bolosteanu  Proceedings of Principles of Security and Trust - 5th International Conference (POST '16)
Automated analysis of security protocols with global state  2016  2016   Steve Kremer, Robert Künnemann
Automatisches Sicherheitstesten  2016  2016   Andreas Zeller
Autonome Systeme  2016  2016   Stefan Nürnberger, Sven Bugiel
Boxify: Bringing Full-Fledged App Sandboxing to Stock Android  2016  2016   Michael Backes, Sven Bugiel, Oliver Schranz, Philipp von Styp-Rekowsky
Causal Inference by Compression  2016  2016   Kailash Budhathoki, Jilles Vreeken  Proceedings of the IEEE International Conference on Data Mining (ICDM)
Causally Consistent Dynamic Slicing  2016  2016   Deepak Garg, James Cheney, Roly Perera  Proceedings of the 27th International Conference on Concurrency Theory (CONCUR '16)
Computational Soundness for Dalvik Bytecode  2016  2016   Michael Backes, Robert Künnemann, Esfandiar Mohammadi  Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS'16)
Datenspeicherung in modernen Fahrzeugen – wem „gehören” die im Fahrzeug gespeicherten Daten?  2016  2016   Stephanie Vogelgesang
Decidability in Parameterized Verification  2016  2016   Roderick Bloem, Swen Jacobs, Ayrat Khalimov, Igor Konnov, Sasha Rubin, Helmut Veith, Josef Widder
Deep Reflectance Maps  2016  2016   Konstantinos Rematas, Tobias Ritschel, Mario Fritz, Efstratios Gavves, Tinne Tuytelaars  2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016, Las Vegas, NV, USA, June 27-30, 2016
Delegatable Functional Signatures  2016  2016   Michael Backes, Sebastian Meiser, Dominique Schröder
Demo: I-Pic: A Platform for Privacy-Compliant Image Capture  2016  2016   Bernt Schiele, Bobby Bhattacharjee, Mario Fritz, Paarijaat Aditya, Peter Druschel, Rijurekha Sen, Seong Joon Oh, Rodrigo Benenson, Tong Tong Wu  Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services Companion (MobiSys '16)
Detecting Hardware-Assisted Virtualization  2016  2016   Michael Brengel, Michael Backes, Christian Rossow  Detection of Intrusions and Malware, and Vulnerability Assessment: 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings
Dissemination Biases of Social Media Channels: On the Topical Coverage of Socially Shared News  2016  2016   Abhijnan Chakraborty, Saptarshi Ghosh, Niloy Ganguly, Krishna P. Gummadi  Proceedings of the 10th International Conference on Web and Social Media
Distinguishing between Topical and Non-Topical Information Diffusion Mechanisms in Social Media  2016  2016   Przemyslaw A. Grabowicz, Niloy Ganguly, Krishna P. Gummadi  Proceedings of the 10th International Conference on Web and Social Media
Distributed PROMPT-LTL Synthesis  2016  2016   Swen Jacobs, Leander Tentrup, Martin Zimmermann  Proceedings of the Seventh International Symposium on Games, Automata, Logics and Formal Verification, GandALF 2016, Catania, Italy, 14-16 September 2016.
DroidMate: a robust and extensible test generator for Android  2016  2016   Andreas Zeller, Konrad Jamrozik  Proceedings of the International Conference on Mobile Software Engineering and Systems (MOBILESoft '16)
ESPRESSO: Explaining Relationships between Entity Sets  2016  2016   Stephan Seufert, Klaus Berberich, Srikanta J. Bedathur, Sarath Kumar Kondreddi, Patrick Ernst, Gerhard Weikum  Proceedings of the 25th ACM International Conference on Information and Knowledge Management (CIKM'16)
EU-Datenschutz nach „Safe Harbor“  2016  2016   Lena Leffer, Hendrik Mayer
Efficient Cryptographic Password Hardening Services From Partially Oblivious Commitments  2016  2016   Jonas Schneider, Nils Fleischhacker, Dominique Schröder, Michael Backes  Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16 )
Efficient Sanitizable Signatures Without Random Oracles  2016  2016   Russell W F Lai, Tao Zhang, Sherman S M Chow, Dominique Schröder  Proceedings of the 21st European Symposium on Research in Computer Security (ESORICS'16)
Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys  2016  2016   Nils Fleischhacker, Johannes Krupp, Giulio Malavolta, Jonas Schneider, Dominique Schröder, Mark Simkin  Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I
Estimating Diffusion Networks: Recovery Conditions, Sample Complexity & Soft-thresholding Algorithm  2016  2016   Nan Du, Yingyu Liang, Maria-Florina Balcan, Manuel Gomez-Rodriguez, Hongyuan Zha, Le Song
Faceless Person Recognition: Privacy Implications in Social Media  2016  2016   Seong Joon Oh, Rodrigo Benenson, Mario Fritz, Bernt Schiele  Computer Vision - ECCV 2016 - 14th European Conference, Amsterdam, The Netherlands, October 11-14, 2016, Proceedings, Part III
Faceless Person Recognition; Privacy Implications in Social Media  2016  2016   Seong Joon Oh, Rodrigo Benenson, Mario Fritz, Bernt Schiele
Flexibly Mining Better Subgroups  2016  2016   Hoang-Vu Nguyen, Jilles Vreeken  Proceedings of the SIAM International Conference on Data Mining (SDM)
Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data  2016  2016   Mainack Mondal, Johnnatan Messias, Saptarshi Ghosh, Krishna P. Gummadi, Aniket Kate  12th Symposium on Usable Privacy and Security (SOUPS'16)
From Zoos to Safaris - From Closed-World Enforcement to Open-World Assessment of Privacy  2016  2016   Michael Backes, Pascal Berrang, Praveen Manoharan
Goal Probability Analysis in Probabilistic Planning: Exploring and Enhancing the State of the Art  2016  2016   Marcel Steinmetz, Jörg Hoffmann, Olivier Buffet
Gotchas from mining bug reports  2016  2016   Sascha Just, Kim Herzig
Hacking Session beim 25. EDV-Gerichtstag – Praktische Demonstrationen zur IT-Sicherheit  2016  2016   Karin Potel, Stephanie Vogelgesang, Frederik Möllers
Hardware-Keylogger: Die Tastatur in der Hand des Feindes  2016  2016   Stephanie Vogelgesang, Stefan Hessel, Frederik Möllers
Herausgabe der Personalakte eines Beamten an ein privates Unternehmen zum Zwecke der Aktendigitalisierung, Anmerkung zu OVG Schleswig, Beschl. v. 27.07.2016 – 2 MB 11/16  2016  2016   Michael Weller, Stephanie Vogelgesang
Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification  2016  2016   Ben Stock, Giancarlo Pellegrino, Christian Rossow, Martin Johns, Michael Backes  Proceedings of the 25th USENIX Security Symposium (USENIX Security '16)
Hitting Families of Schedules for Asynchronous Programs  2016  2016   Dmitry Chistikov, Rupak Majumdar, Filip Niksic  Proc. of the 28th International Conference on Computer Aided Verification (CAV 2016)
HornDroid: Practical and Sound Static Analysis of Android Applications by SMT Solving  2016  2016   Ilya Grishchenko, Matteo Maffei, Stefano Calzavara  Proceedings of the 1st IEEE European Symposium on Security and Privacy (Euro S&P '16)
How to Make ASLR Win the Clone Wars: Runtime Re-Randomization  2016  2016   Kangjie Lu, Michael Backes, Stefan Nürnberger, Wenke Lee  Proceedings of the 23rd Annual Symposium on Network and Distributed System Security (NDSS '16)
I-Pic: A Platform for Privacy-Compliant Image Capture  2016  2016   Paarijaat Aditya, Rijurekha Sen, Peter Druschel, Seong Joon Oh, Rodrigo Benenson, Mario Fritz, Bernt Schiele, Bobby Bhattacharjee, Tong Tong Wu  Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services Companion (MobiSys '16)
Identifying the Scan and Attack Infrastructures behind Amplification DDoS attacks  2016  2016   Johannes Krupp, Michael Backes, Christian Rossow  Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16)
Implementation-level Analysis of the JavaScript Helios Voting Client  2016  2016   Michael Backes, Christian Hammer, David Pfaff, Malte Skoruppa  Proceedings of the 31st Annual ACM Symposium on Applied Computing - SAC 2016
Influence Estimation and Maximization in Continuous-Time Diffusion Networks  2016  2016   Manuel Gomez-Rodriguez, Le Song, Nan Du, Hongyuan Zha, Bernhard Schölkopf
Is Exploratory Search Different? A Comparison of Information Search Behavior for Exploratory and Lookup Tasks  2016  2016   Kumaripaba Athukorala, Dorata Glowacka, Giulio Jacucci, Antti Oulasvirta, Jilles Vreeken
J-NERD: Joint Named Entity Recognition and Disambiguation with Rich Linguistic Features  2016  2016   Dat Ba Nguyen, Martin Theobald, Gerhard Weikum
Keeping it Short and Simple: Summarising Complex Event Sequences with Multivariate Patterns  2016  2016   Roel Bertens, Jilles Vreeken, Arno Siebes  Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD)
Kizzle: A Signature Compiler for Detecting Exploit Kits  2016  2016   Ben Stock, Benjamin Livshits, Benjamin Zorn  The 46th Annual IEEE/IFIP Conference on Dependable Systems and Networks
Learning Deep Representations of Fine-Grained Visual Descriptions  2016  2016   Scott Reed, Zeynep Akata, Honglak Lee, Bernt Schiele  2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR'16)
Learning and Forecasting Opinion Dynamics in Social Networks  2016  2016   Abir De, Isabel Valera, Niloy Ganguly, Sourangshu Bhattacharya, Manuel Gomez-Rodriguez  NIPS '16: Advances in Neural Information Processing Systems
Learning to Detect Visual Grasp Affordance  2016  2016   Hyun Oh Song, Mario Fritz, Daniel Göhring, Trevor Darrell
Learning to Select Long-Track Features for Structure-From-Motion and Visual SLAM  2016  2016   Jonas Scheer, Mario Fritz, Oliver Grau  Pattern Recognition - 38th German Conference, GCPR 2016, Hannover, Germany, September 12-15, 2016, Proceedings
Light-Weight Contexts: An OS Abstraction for Safety and Performance  2016  2016   Anjo Vahldiek-Oberwanger, Bobby Bhattacharjee, Deepak Garg, Eslam Elnikety, Peter Druschel, James Litton  Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI '16)
Lightweight verification of separate compilation  2016  2016   Jeehoon Kang, Yoonseung Kim, Chung-Kil Hur, Derek Dreyer, Viktor Vafeiadis  Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'16)
Linear-Time Detection of Non-Linear Changes in Massively High Dimensional Time Series  2016  2016   Hoang-Vu Nguyen, Jilles Vreeken  Proceedings of the SIAM International Conference on Data Mining (SDM)
Long-Term Image Boundary Extrapolation  2016  2016   Apratim Bhattacharyya, Mateusz Malinowski, Bernt Schiele, Mario Fritz
Loss Functions for Top-k Error: Analysis and Insights  2016  2016   Maksim Lapin, Matthias Hein, Bernt Schiele  2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR'16)
MIRROR: symmetric timing analysis for real-time tasks on multicore platforms with shared resources  2016  2016   Wen-Hung Huang, Jian-Jia Chen, Jan Reineke  Proceedings of the 53rd Annual Design Automation Conference, DAC 2016, Austin, TX, USA, June 5-9, 2016
Machine Learning and Knowledge Discovery in Databases (ECML PKDD 2016)  2016  2016   
Machine Learning and Knowledge Discovery in Databases (ECML PKDD 2016)  2016  2016   Paolo Frasconi, Niels Landwehr, Giuseppe Manco, Jilles Vreeken
Mean Box Pooling: A Rich Image Representation and Output Embedding for the Visual Madlibs Task  2016  2016   Mateusz Malinowski, Ashkan Mokarian, Mario Fritz  Proceedings of the British Machine Vision Conference 2016, BMVC 2016, York, UK, September 19-22, 2016
Membership Privacy in MicroRNA-based Studies  2016  2016   Michael Backes, Pascal Berrang, Mathias Humbert, Praveen Manoharan  Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16)
Message Impartiality in Social Media Discussions  2016  2016   Muhammad Bilal Zafar, Krishna P. Gummadi, Cristian Danescu-Niculescu-Mizil  Proceedings of the 10th International Conference on Web and Social Media
Metadaten – eine neue juristische Problemkategorie im Rahmen der elektronischen Aktenführung?  2016  2016   Jochen Krüger, Frederik Möllers
Micro-Policies for Web Session Security  2016  2016   Matteo Maffei, Niklas Grimm, Riccardo Focardi, Stefano Calzavara  Proceedings of the 29th Computer Security Foundations Symposium 2016 (CSF '16)
Mining Apps for Anomalies  2016  2016   Andreas Zeller
Mining Sandboxes  2016  2016   Konrad Jamrozik, Philipp von Styp-Rekowsky, Andreas Zeller  Proceedings of the 38th International Conference on Software Engineering
Model Checking Population Protocols  2016  2016   Javier Esparza, Pierre Ganty, Jérôme Leroux, Rupak Majumdar  36th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, FSTTCS 2016, December 13-15, 2016, Chennai, India
Multi-Cue Zero-Shot Learning with Strong Supervision  2016  2016   Zeynep Akata, Mateusz Malinowski, Mario Fritz, Bernt Schiele
Multi-core System Architecture [TechReport]  2016  2016   Wolfgang J. Paul, P Lutsyk, J Oberhauser
Multi-cue Zero-Shot Learning with Strong Supervision  2016  2016   Zeynep Akata, Mateusz Malinowski, Mario Fritz, Bernt Schiele  2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016, Las Vegas, NV, USA, June 27-30, 2016
Nearly Optimal Verifiable Data Streaming  2016  2016   Johannes Krupp, Dominique Schröder, Mark Simkin, Dario Fiore, Giuseppe Ateniese, Stefan Nürnberger
Nearly Optimal Verifiable Data Streaming  2016  2016   Johannes Krupp, Dominique Schröder, Mark Simkin, Dario Fiore, Giuseppe Ateniese, Stefan Nürnberger  Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I
On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks.  2016  2016   Deepak Garg, Tamara Rezk, Vineet Rajani  Proceedings of the 29th Computer Security Foundations Symposium 2016 (CSF '16)
On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis  2016  2016   Michael Backes, Sven Bugiel, Erik Derr, Patrick McDaniel, Damien Octeau, Sebastian Weisgerber  Proceedings of the 25th USENIX Security Symposium (USENIX Security '16)
On Profile Linkability despite Anonymity in Social Media Systems  2016  2016   Michael Backes, Pascal Berrang, Oana Goga, Krishna P. Gummadi, Praveen Manoharan  Proceedings of the 2016 ACM Workshop on Privacy in the Electronic Society (WPES)
On Statistically Secure Obfuscation with Approximate Correctness  2016  2016   Zvika Brakerski, Christina Brzuska, Nils Fleischhacker  Proceedings of the 36th International Cryptology Conference (CRYPTO '16)
On Testing Embedded Software  2016  2016   Abhijeet Banerjee, Sudipta Chattopadhyay, Abhik Roychoudhury
On the Efficiency of the Information Networks in Social Media  2016  2016   Mahmoudreza Babaei, Przemyslaw A. Grabowicz, Isabel Valera, Krishna P. Gummadi, Manuel Gomez-Rodriguez  Proceedings of the 9th ACM International Conference on Web Search and Data Mining
On the Feasibility of TTL-based Filtering for DRDoS Mitigation  2016  2016   Michael Backes, Thorsten Holz, Christian Rossow, Teemu Rytilahti, Milivoj Simeonovski, Ben Stock  RAID 2016, 19th International Symposium on Research in Attacks, Intrusions and Defenses
On the Wisdom of Experts vs. Crowds: Discovering Trustworthy Topical News in Microblogs  2016  2016   Muhammad Bilal Zafar, Parantapa Bhattacharya, Niloy Ganguly, Saptarshi Ghosh, Krishna P. Gummadi  Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing (CSCW'16)
Operational Analytics Data Management Systems  2016  2016   Alexander Böhm, Jens Dittrich, Niloy Mukherjee, Ippokrantis Pandis, Rajkumar Sen
POSTER: The ART of App Compartmentalization  2016  2016   Michael Backes, Sven Bugiel, Jie Huang, Oliver Schranz  Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16 )
Partial Delete Relaxation, Unchained: On Intractable Red-Black Planning and Its Applications  2016  2016   Daniel Gnad, Marcel Steinmetz, Mathäus Jany, Jörg Hoffmann, Ivan Serina, Alfonso Gerevini  Proceedings of the 9th Annual Symposium on Combinatorial Search (SOCS'16)
Partial Order Reduction for Event-Driven Multi-threaded Programs  2016  2016   Pallavi Maiya, Rahul Gupta, Aditya Kanade, Rupak Majumdar  Proc. 22nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 16)
Patterns in Data Management  2016  2016   Jens Dittrich
Personenbezug bei dynamischen IP-Adressen – Anmerkung zur Entscheidung des EuGH vom 19.10.2016  2016  2016   Stephanie Vogelgesang, Frederik Möllers
Pokémon GO – Technische Innovation und Strafrecht im Konflikt  2016  2016   Jochen Krüger, Frederik Möllers, Stephanie Vogelgesang
Post mortem auctoris? Software zur Unterstützung von Bibliotheken bei der Auffüllung ihrer Bestände  2016  2016   Frederik Möllers, Stefan Hessel  Netzwerke: Tagungsband des 19. Internationalen Rechtsinformatik Symposions IRIS 2016 / Networks: Proceedings of the 19th International Legal Informatics Symposium IRIS 2016
PostBits: using contextual locations for embedding cloud information in the home  2016  2016   Juan Pablo Forero, Piyum Fernando, Priyashri Sridhar, Anusha Indrajith Withana, Suranga Nanayakkara, Jürgen Steimle, Pattie Maes
Practical Undoability Checking via Contingent Planning  2016  2016   Jeanette Daum, Àlvaro Torralba, Jörg Hoffmann, Patrik Haslum, Ingo Weber  Proceedings of the 26th International Conference on Automated Planning and Scheduling (ICAPS'16)
Predicting the Category and Attributes of Visual Search Targets Using Deep Gaze Pooling [TechReport]  2016  2016   Hosnieh Sattar, Andreas Bulling, Mario Fritz
Privacy Capsules: Preventing Information Leaks by Mobile Apps  2016  2016   Bobby Bhattacharjee, Peter Druschel, Raul Herbster, Scott DellaTorre  Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2016, Singapore, June 26-30, 2016
Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles  2016  2016   Michael Backes, Pascal Berrang, Anne Hecksteden, Mathias Humbert, Andreas Keller, Tim Meyer  Proceedings of the 25th USENIX Security Symposium (USENIX Security '16)
Probabilistic CTL*: The Deductive Way  2016  2016   Rayna Dimitrova, Luis María Ferrer Fioriti, Holger Hermanns, Rupak Majumdar  Proc. 22nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 16)
Proceedings of the ACM SIGKDD Workshop on Interactive Data Exploration and Analytics (IDEA)  2016  2016   Jefrey Lijffijt, Duen Horng Chau, Jilles Vreeken, Matthijs van Leeuwen, Dafna Shahaf, Christos Faloutsos
Progress-Sensitive Security for SPARK  2016  2016   Deepak Garg, Willard Rafnsson, Andrei Sabelfeld  Proceedings of the International Symposium on Engineering Secure Software and Systems (ESSoS '16)
R-Droid: Leveraging Android App Analysis with Static Slice Optimization  2016  2016   Michael Backes, Sven Bugiel, Erik Derr, Sebastian Gerling, Christian Hammer  Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security
R-Susceptibility: An IR-Centric Approach to Assessing Privacy Risks for Users in Online Communities  2016  2016   Joanna Asia Biega, Krishna P. Gummadi, Ida Mele, Dragan Milchevski, Christos Tryfonopoulos, Gerhard Weikum  Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval (SIGIR '16)
RUMA has it: rewired user-space memory access is possible!  2016  2016   Felix Martin Schuhknecht, Jens Dittrich, Ankur Sharma
RamCrypt: Kernel-based Address Space Encryption for User-mode Processes  2016  2016   Johannes Götzfried, Tilo Müller, Gabor Drescher, Stefan Nürnberger, Michael Backes  ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIACCS)
Ransomware als moderne Piraterie: Erpressung in Zeiten digitaler Kriminalität  2016  2016   Stephanie Vogelgesang, Frederik Möllers
Recognition of Ongoing Complex Activities by Sequence Prediction over a Hierarchical Label Space  2016  2016   Wenbin Li, Mario Fritz  IEEE Winter Conference on Applications of Computer Vision (WACV)
Recognizing Fine-Grained and Composite Activities Using Hand-Centric Features and Script Data  2016  2016   Marcus Rohrbach, Anna Rohrbach, Michaela Regneri, Sikandar Amin, Mykhaylo Andriluka, Manfred Pinkal, Bernt Schiele
Reconstructing an Epidemic over Time  2016  2016   Polina Rozenshtein, Aristides Gionis, B. Aditya Prakash, Jilles Vreeken  Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD)
Reliable Third-Party Library Detection in Android and its Security Applications  2016  2016   Michael Backes, Sven Bugiel, Erik Derr  Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16)
Revisiting Goal Probability Analysis in Probabilistic Planning  2016  2016   Marcel Steinmetz, Jörg Hoffmann, Olivier Buffet  Proceedings of the 26th International Conference on Automated Planning and Scheduling (ICAPS'16)
Runtime Fragility in Main Memory  2016  2016   Endre Palatinus, Jens Dittrich
Runtime Verification for HyperLTL  2016  2016   Borzoo Bonakdarpour, Bernd Finkbeiner  Proceedings of the 16th International Conference on Runtime Verification (RV'2016)
SGX-Enabled Oblivious Machine Learning  2016  2016   Olga Ohrimenko, Manuel Costa, Cédric Fournet, Sebastian Nowozin, Aastha Mehta, Felix Schuster, Kapil Vaswani  Proceedings of the 25th USENIX Security Symposium (USENIX Security '16)
SPARTA: A Scheduling Policy for Thwarting Differential Power Analysis Attacks  2016  2016   Ke Jiang, Petru Eles, Zebo Peng, Sudipta Chattopadhyay, Lejla Batina  21st Asia and South Pacific Design Automation Conference (ASP-DAC)
Safety Verification of Continuous-Space Pure Jump Markov Processes  2016  2016   Sadegh Esmaeil Zadeh Soudjani, Rupak Majumdar, Alessandro Abate  Proc. 22nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 16)
SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion  2016  2016   Akira Yokoyama, Kou Ishii, Rui Tanabe, Yinmin Papa, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Daisuke Inoue, Michael Brengel, Michael Backes, Christian Rossow  Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings
Security & Privacy Column  2016  2016   Matteo Maffei
Sicherheit in der Gebäudeautomation  2016  2016   Frederik Möllers, Stephanie Vogelgesang
Simulating the Large-Scale Erosion of Genomic Privacy Over Time  2016  2016   Michael Backes, Pascal Berrang, Mathias Humbert, Xiaoyu Shen, Verena Wolf  Proceedings of the 3rd International Workshop on Genome Privacy and Security (GenoPri'16)
Smart Broadcasting: Do you want to be seen?  2016  2016   M. Karimi, E. Tavakoli, Mehrdad Farajtabar, Le Song, Manuel Gomez-Rodriguez  Proc. of the 22nd ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD'16)
Smart-Home-Systeme in Zeiten digitaler Kriminalität  2016  2016   Frederik Möllers, Stephanie Vogelgesang
SoK: Lessons Learned From Android Security Research For Appified Software Platforms  2016  2016   Yasemin Acar, Michael Backes, Sven Bugiel, Sascha Fahl, Patrick McDaniel, Matthew Smith  37th IEEE Symposium on Security and Privacy (S&P '16)
Software verstehen, zerstören, schützen mit automatischen Software-Modellen  2016  2016   Andreas Zeller  46. Jahrestagung der Gesellschaft fuer Informatik (Informatik 2016)
Soziale Netzwerke im Fokus von Phishing-Angriffen - Eine Analyse aus technischer und rechtlicher Sicht -  2016  2016   Stefan Hessel
Specifying and Verifying Secrecy in Workflows with Arbitrarily Many Agents  2016  2016   Bernd Finkbeiner, Helmut Seidl, Christian Müller  Proc. of the 14th International Symposium on Automated Technology for Verification and Analysis (ATVA 2016)
Strengthening Weak Identities Through Inter-Domain Trust Transfer  2016  2016   Giridhari Venkatadri, Oana Goga, Changtao Zhong, Bimal Viswanath, Krishna P. Gummadi, Nishanth R Sastry  Proceedings of the 25th International Conference on World Wide Web (WWW'16)
Switching to Git: The Good, the Bad, and the Ugly  2016  2016   Sascha Just, Kim Herzig, Jacek Czerwonka, Brendan Murphy  International Symposium on Software Reliability Engineering (ISSRE)
Symbolic Model Checking for Factored Probabilistic Models  2016  2016   David Deininger, Rayna Dimitrova, Rupak Majumdar  Proc. of the 14th International Symposium on Automated Technology for Verification and Analysis (ATVA 2016)
Synthesis of Self-Stabilising and Byzantine-Resilient Distributed Systems  2016  2016   Roderick Bloem, Nicolas Braud-Santoni, Swen Jacobs  Computer Aided Verification - 28th International Conference, CAV 2016, Toronto, ON, Canada, July 17-23, 2016, Proceedings, Part I
System Architecture as an Ordinary Engineering Discipline  2016  2016   Wolfgang J. Paul, Christoph Baumann, P. Lutsyk, Sabine Schmaltz, J. Oberhauser
T3: Comprehensive policy compliance in data retrieval systems  2016  2016   Eslam Elnikety, Aastha Mehta, Anjo Vahldiek-Oberwanger, Deepak Garg, Peter Druschel  Proceedings of the 25th USENIX Security Symposium (USENIX Security '16)
Taming release-acquire consistency  2016  2016   Ori Lahav, Nick Giannarakis, Viktor Vafeiadis  Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'16)
Ten Years of Knowledge Harvesting: Lessons and Challenges  2016  2016   Gerhard Weikum, Johannes Hoffart, Fabian M Suchanek
The 3rd Reactive Synthesis Competition (SYNTCOMP 2016): Benchmarks, Participants & Results  2016  2016   Swen Jacobs, Roderick Bloem, Romain Brenguier, Ayrat Khalimov, Felix Klein, Robert Könighofer, Jens Kreber, Alexander Legg, Nina Narodytska, Guillermo A. Perez, Jean-Francois Raskin, Leonid Ryzhyk, Ocan Sankur, Martina Seidl, Leander Tentrup, Adam Walker  Proceedings Fifth Workshop on Synthesis, SYNT@CAV 2016, Toronto, Canada, July 17-18, 2016.
The Impact of Tangled Code Changes on Defect Prediction Models  2016  2016   Kim Herzig, Sascha Just, Andreas Zeller
The Reactive Synthesis Competition: SYNTCOMP 2016 and Beyond  2016  2016   Swen Jacobs, Roderick Bloem  Proceedings Fifth Workshop on Synthesis, SYNT@CAV 2016, Toronto, Canada, July 17-18, 2016.
Thoth: Comprehensive Policy Compliance in Data Retrieval Systems  2016  2016   Eslam Elnikety, Aastha Mehta, Anjo Vahldiek-Oberwanger, Deepak Garg, Peter Druschel  Proceedings of the 25th USENIX Security Symposium (USENIX Security '16)
Thread-level Speculation with Kernel Support  2016  2016   Clemens Hammacher, Kevin Streit, Andreas Zeller, Sebastian Hack  Proceedings of the 25th International Conference on Compiler Construction
Tight Cutoffs for Guarded Protocols with Fairness  2016  2016   Simon Außerlechner, Swen Jacobs, Ayrat Khalimov  Verification, Model Checking, and Abstract Interpretation - 17th International Conference, VMCAI 2016, St. Petersburg, FL, USA, January 17-19, 2016. Proceedings
Towards Segmenting Consumer Stereo Videos: Benchmark, Baselines and Ensembles  2016  2016   Wei-Chen Chiu, Fabio Galasso, Mario Fritz  Computer Vision - ACCV 2016 - 13th Asian Conference on Computer Vision, Taipei, Taiwan, November 20-24, 2016, Revised Selected Papers, Part V
Two Message Oblivious Evaluation of Cryptographic Functionalities  2016  2016   Nico Döttling, Nils Fleischhacker, Johannes Krupp, Dominique Schröder  Proceedings of the 36th International Cryptology Conference (CRYPTO '16)
Understanding Same-Side Interactions with Wrist-Worn Devices  2016  2016   Frederic Kerber, Markus Löchtefeld, Antonio Krüger, Jess McIntosh, Charlie McNeill, Mike Fraser  Proceedings of the 9th Nordic Conference on Human-Computer Interaction. Nordic Conference on Human-Computer Interaction (NordiCHI-16), October 23-27, Gothenburg, Sweden
Universal Dependency Analysis  2016  2016   Hoang-Vu Nguyen, Panagiotis Mandros, Jilles Vreeken  Proceedings of the SIAM International Conference on Data Mining (SDM)
Uses and Abuses of Server-Side Requests  2016  2016   Giancarlo Pellegrino, Onur Catakoglu, Davide Balzarotti, Christian Rossow  Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2016
VConv-DAE: Deep Volumetric Shape Learning Without Object Labels  2016  2016   Abhishek Sharma, Oliver Grau, Mario Fritz  Computer Vision - ECCV 2016 Workshops - Amsterdam, The Netherlands, October 8-10 and 15-16, 2016, Proceedings, Part III
VatiCAN - Vetted, Authenticated CAN Bus  2016  2016   Stefan Nürnberger, Christian Rossow  . Conference on Cryptographic Hardware and Embedded Systems (CHES)
What Cannot be Read, Cannot be Leveraged? Revisiting Assumptions of JIT-ROP Defenses  2016  2016   Giorgi Maisuradze, Michael Backes, Christian Rossow  Proceedings of the 25th USENIX Security Symposium (USENIX Security '16)
What You Really Need To Know About Your Neighbor  2016  2016   Werner Damm, Bernd Finkbeiner, Astrid Rakow  Proceedings Fifth Workshop on Synthesis, SYNT@CAV 2016
Xplore-M-Ego: Contextual Media Retrieval Using Natural Language Queries  2016  2016   Sreyasi Nag Chowdhury, Mateusz Malinowski, Andreas Bulling, Mario Fritz  Proceedings of the 2016 ACM on International Conference on Multimedia Retrieval, ICMR 2016, New York, New York, USA, June 6-9, 2016
You Get Where You're Looking For: The Impact Of Information Sources On Code Security  2016  2016   Yasemin Acar, Michael Backes, Sascha Fahl, Doowon Kim, Michelle Mazurek, Christian Stransky  37th IEEE Symposium on Security and Privacy (S&P '16)
You are not your Developer, either: A Research Agenda for Usable Security and Privacy Research Beyond End Users  2016  2016   Yasemin Acar, Sascha Fahl, Michelle Mazurek  IEEE SecDev 2016
A Linear First-Order Functional Intermediate Language for Verified Compilers  2015  2015   Sigurd Schneider, Gert Smolka, Sebastian Hack  Interactive Theorem Proving - 6th International Conference, ITP 2015, Nanjing, China, August 24-27, 2015, Proceedings
A Logic of Programs with Interface-Confined Code  2015  2015   Anupam Datta, Deepak Garg, Limin Jia, Shayak Sen  Proceedings of the 28th Computer Security Foundations Symposium (CSF '15)
A Seven-Dimensional Analysis of Hashing Methods and its Implications on Query Processing  2015  2015   Stefan Richter, Victor Alvarez, Jens Dittrich
A comparison of adaptive radix trees and hash tables  2015  2015   V. Alvarez, Stefan Richter, X. Chen, Jens Dittrich  2015 IEEE 31st International Conference on Data Engineering
A formal C memory model supporting integer-pointer casts  2015  2015   Jeehoon Kang, Chung-Kil Hur, William Mansky, Dmitri Garbuzov, Steve Zdancewic, Viktor Vafeiadis  Proc. of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2016)
A generic and compositional framework for multicore response time analysis  2015  2015   Sebastian Altmeyer, Robert I. Davis, Leandro Soares Indrusiak, Claire Maiza, Vincent Nélis, Jan Reineke  Proceedings of the 23rd International Conference on Real Time Networks and Systems, RTNS 2015, Lille, France, November 4-6, 2015
ADSNARK: Nearly-Practical Privacy-Preserving Proofs on Authenticated Data  2015  2015   Michael Backes, Manuel Barbosa, Dario Fiore, Raphael M. Reischuk  Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P)
Achieving Optimal Utility for Distributed Differential Privacy Using SMPC  2015  2015   Fabienne Eigner, Aniket Kate, Matteo Maffei, Francesca Pampaloni, Ivan Pryvalov
Adam: Causality-Based Synthesis of Distributed Systems  2015  2015   Bernd Finkbeiner, Manuel Gieseking, Ernst-Rüdiger Olderog  Proc. of the 27th International Conference on Computer Aided Verification (CAV 2015)
AdaptiveNav: Adaptive Discovery of Interesting and Surprising Nodes in Large Graphs  2015  2015   Robert Pienta, Zhang Lin, M. Kahng, Jilles Vreeken, Partha Talukdar, J. Abello, G. Parameswaran, D.H. Chau  Proceedings of the IEEE Conference on Visualization (VIS)
Affine Refinement Types for Secure Distributed Programming  2015  2015   Michele Bugliesi, Stefano Calzavara, Fabienne Eigner, Matteo Maffei
Algorithms for Model Checking HyperLTL and HyperCTL ^*  2015  2015   Bernd Finkbeiner, Markus N. Rabe, Cesar Sanchez  Proc. of the 27th International Conference on Computer Aided Verification (CAV 2015)
AmpPot: Monitoring and Defending Against Amplification DDoS Attacks  2015  2015   Lukas Krämer, Johannes Krupp, Daisuke Makita, Tomomi Nishizoe, Takashi Koide, Katsunari Yoshioka, Christian Rossow  Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015, Proceedings
Appearance-based gaze estimation in the wild  2015  2015   Xucong Zhang, Yusuke Sugano, Mario Fritz, Andreas Bulling  IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2015, Boston, MA, USA, June 7-12, 2015
Approximate Counting in SMT and Value Estimation for Probabilistic Programs  2015  2015   Dmitry Chistikov, Rayna Dimitrova, Rupak Majumdar  Proc. 21st International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 15)
Ask Your Neurons: A Neural-Based Approach to Answering Questions about Images  2015  2015   Mateusz Malinowski, Marcus Rohrbach, Mario Fritz  2015 IEEE International Conference on Computer Vision, ICCV 2015, Santiago, Chile, December 7-13, 2015
Assume-Guarantee Synthesis for Concurrent Reactive Programs with Partial Information  2015  2015   Roderick Bloem, Krishnendu Chatterjee, Swen Jacobs, Robert Könighofer  Tools and Algorithms for the Construction and Analysis of Systems - 21st International Conference, TACAS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015. Proceedings
Asynchronous Liquid Separation Types  2015  2015   Johannes Kloos, Rupak Majumdar, Viktor Vafeiadis  Proceedings of the 29th European Conference on Object-Oriented Programming (ECOOP'16)
Back to the Past: Source Identification in Diffusion Networks from Partially Observed Cascades  2015  2015   Mehrdad Farajtabar, Manuel Gomez-Rodriguez, Nan Du, Mohammad Zamani, Hongyuan Zha, Le Song  Proceedings of the 18th International Conference on Artificial Intelligence and Statistics (AISTATS)
Bbs: A Phase-Bounded Model Checker for Asynchronous Programs  2015  2015   Rupak Majumdar, Zilong Wang  Proc. of the 27th International Conference on Computer Aided Verification (CAV 2015)
Boxify: Full-fledged App Sandboxing for Stock Android  2015  2015   Michael Backes, Sven Bugiel, Christian Hammer, Oliver Schranz, Philipp von Styp-Rekowsky  Proceedings of the 24th USENIX Security Symposium (USENIX '15)
COEVOLVE: A Joint Point Process Model for Information Diffusion and Network Co-evolution  2015  2015   M. Farajtabar, Y Wang, Manuel Gomez-Rodriguez, S Li, H Zha, Le Song  NIPS '15: Advances in Neural Information Processing Systems
CacheAudit: A Tool for the Static Analysis of Cache Side Channels  2015  2015   Goran Doychev, Boris Köpf, Laurent Mauborgne, Jan Reineke
Cashing Out the Great Cannon? On Browser-Based DDoS Attacks and Economics  2015  2015   Giancarlo Pellegrino, Christian Rossow, Fabrice J. Ryba, Thomas C. Schmidt, Matthias Wählisch  9th USENIX Workshop on Offensive Technologies (WOOT 15)
Causal Inference by Direction of Information  2015  2015   Jilles Vreeken  Proceedings of the SIAM International Conference on Data Mining (SDM)
Characterizing Information Diets of Social Media Users  2015  2015   Juhi Kulshrestha, Muhammad Bilal Zafar, Lisette Espin Noboa, Krishna P. Gummadi, Saptarshi Ghosh  Proceedings of the Ninth International Conference on Web and Social Media, ICWSM 2015, University of Oxford, Oxford, UK, May 26-29, 2015
Classifier based graph construction for video segmentation  2015  2015   Anna Khoreva, Fabio Galasso, Matthias Hein, Bernt Schiele  2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR'15)
Compositional Verification Methods for Next-Generation Concurrency (Dagstuhl Seminar 15191)  2015  2015   Lars Birkedal, Derek Dreyer, Philippa Gardner, Zhong Shao
Computational Soundness for Interactive Primitves  2015  2015   Michael Backes, Esfandiar Mohammadi, Tim Ruffing  Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS'15)
Computing the Skorokhod distance between polygonal traces  2015  2015   Rupak Majumdar, Vinayak S. Prabhu  Proc. of the 18th International Conference on Hybrid Systems: Computation and Control (HSCC 2015)
Cross-Architecture Bug Search in Binary Executables  2015  2015   Jannik Pewny, Behrad Garmany, Robert Gawlik, Christian Rossow, Thorsten Holz  Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P)
Data Lineage in Malicious Environments  2015  2015   Michael Backes, Niklas Grimm, Aniket Kate
Decidability of Parameterized Verification  2015  2015   Roderick Bloem, Swen Jacobs, Ayrat Khalimov, Igor Konnov, Sasha Rubin, Helmut Veith, Josef Widder
Dynamic scheduling for networked control systems  2015  2015   Indranil Saha, Sanjoy Baruah, Rupak Majumdar  Proc. of the 18th International Conference on Hybrid Systems: Computation and Control (HSCC 2015)
Efficient Output Kernel Learning for Multiple Tasks  2015  2015   Pratik Jawanpuria, Maksim Lapin, Matthias Hein, Bernt Schiele  Advances in Neural Information Processing Systems 28: Annual Conference on Neural Information Processing Systems 2015, December 7-12, 2015, Montreal, Quebec, Canada
Efficient Pseudorandom Functions via On-the-Fly Adaptation  2015  2015   Dominique Schröder, Nico Döttling  Proceedings of the 35th International Cryptology Conference (CRYPTO '15)
Ein Bild der Zukunft? – Selbstentwickelte Betriebssysteme für Prüfungen am Beispiel des Saarbrücker Prüfungsrechner-Toolkits Challenge OS  2015  2015   Stefan Hessel  Kooperation: Tagungsband des 18. Internationalen Rechtsinformatik Symposions IRIS 2015 / Co-operation: Proceedings of the 18th Legal Informatics Symposium IRIS 2015
Elektronischer Rechtsverkehr in Verfahren ohne Anwaltszwang - der Justizgewährungsanspruch des Bürgers als praktischer und theoretischer Störfaktor? - Anmerkungen insbesondere aus amtsrichterlicher Sicht  2015  2015   Jochen Krüger, Stephanie Vogelgesang  Kooperation: Tagungsband des 18. Internationalen Rechtsinformatik Symposions IRIS 2015 / Co-operation: Proceedings of the 18th Legal Informatics Symposium IRIS 2015
Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits  2015  2015   Omar Chowdhury, Deepak Garg, Limin Jia, Anupam Datta  Proceedings of the 22nd ACM conference on Computer and communications security (ACM CCS 2015)
Formal API Specification of the PikeOS Separation Kernel  2015  2015   Freek Verbeek, Oto Havle, Julien Schmaltz, Sergey Tverdyshev, Holger Blasum, Bruno Langenstein, Werner Stephan, Burkhart Wolff, Yakoub Nemouchi  Proc. 7th NASA Formal Methods Symposium (NFM 2015)
Foundations of Reconfigurable PUFs  2015  2015   Jonas Schneider, Dominique Schröder  Proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, New York, NY, USA, June 2-5, 2015
From Facepalm to Brain Bender: Exploring Client-Side Cross-Site Scripting  2015  2015   Ben Stock, Bernd Kaiser, Stephan Pfistner, Sebastian Lekies, Martin Johns  Proceedings of the 22nd ACM Conference on Computer and Communications Security
Fully Secure Inner-Product Proxy Re-Encryption with constant size Ciphertext  2015  2015   Michael Backes, Martin Gagné, Sri Aravinda Krishnan Thyagarajan  ACM ASIACCS Security in Cloud Computing Workshop 2015
Generalized Task Parallelism  2015  2015   Andreas Zeller, Clemens Hammacher, Johannes Doerfert, Kevin Streit, Sebastian Hack
Getting to Know the Unknown Unknowns: Destructive-Noise Resistant Boolean Matrix Factorization  2015  2015   Sanjar Karaev, Pauli Miettinen, Jilles Vreeken  Proceedings of the SIAM International Conference on Data Mining (SDM)
Going Wild: Large-Scale Classification of Open DNS Resolvers  2015  2015   Marc Kührer, Thomas Hupperich, Jonas Bushart, Christian Rossow, Thorsten Holz  Proc. of the 2015 Internet Measurement Conference (IMC'15)
Guardat: enforcing data policies at the storage layer  2015  2015   Aastha Mehta, Anjo Vahldiek-Oberwanger, Ansley Post, Deepak Garg, Eslam Elnikety, Johannes Gehrke, Peter Druschel, Rodrigo Rodrigues  Proceedings of the 10th European Conference on Computer Systems (EuroSys '15)
Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems  2015  2015   David Choffnes, Peter Druschel, Stevens Le Blond, William Caldwell, Nicholas Merritt
Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems  2015  2015   Stevens Le Blond, David R. Choffnes, William Caldwell, Peter Druschel, Nicholas Merritt  Proc. of the 2015 ACM Conference on Special Interest Group on Data Communication (SIGCOMM '15)
Hidden Hazards: Finding Missing Nodes in Large Graph Epidemics  2015  2015   Shashi Sundareisan, Jilles Vreeken, B. Aditya Prakash  Proceedings of the SIAM International Conference on Data Mining (SDM)
How well do you blend into the crowd? - d-convergence: A novel paradigm for quantifying privacy in the age of Big-Data  2015  2015   Michael Backes, Pascal Berrang, Praveen Manoharan
In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services  2015  2015   Giancarlo Pellegrino, Davide Balzarotti, Stefan Winter, Neeraj Suri  Proceedings of the 24th USENIX Security Symposium (USENIX '15)
Information Flow Control for Event Handling and the DOM in Web Browsers  2015  2015   Abhishek Bichhawat, Christian Hammer, Deepak Garg, Vineet Rajani  Proceedings of the 28th Computer Security Foundations Symposium (CSF '15)
IoTPOT: Analysing the Rise of IoT Compromises  2015  2015   Yin Minn Pa Pa, Shogo Suzuki, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Christian Rossow  9th USENIX Workshop on Offensive Technologies (WOOT 15)
Iris: Monoids and Invariants as an Orthogonal Basis for Concurrent Reasoning  2015  2015   Ralf Jung, David Swasey, Filip Sieczkowski, Kasper Svendsen, Aaron Turon, Lars Birkedal, Derek Dreyer  Proceedings of the 43nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'15)
It's Not a Bug, It's a Feature: How Misclassification Impacts Bug Prediction  2015  2015   Andreas Zeller, Kim Herzig, Sascha Just  Software-Engineering & Management, Multikonferenz der GI-Fachbereiche Softwaretechnik (SWT) und Wirtschaftsinformatik (WI)
Janiform intra-document analytics for reproducible research  2015  2015   Jens Dittrich, Patrick Bender
Joint segmentation and activity discovery using semantic and temporal priors  2015  2015   Julia Seiter, Chiu Wei-Chen, Mario Fritz, Oliver Amft, Gerhard Tröster  2015 IEEE International Conference on Pervasive Computing and Communications, PerCom 2015, St. Louis, MO, USA, 23-27 March, 2015
Learning How to Prevent Return-Oriented Programming Efficiently  2015  2015   David Pfaff, Sebastian Hack, Christian Hammer  Engineering Secure Software and Systems
Liar, Liar, Coins on Fire! — Penalizing Equivocation By Loss of Bitcoins  2015  2015   Tim Ruffing, Aniket Kate, Dominique Schröder  Proceedings of the 22nd ACM conference on Computer and communications security (ACM CCS '15)
Microscopic Description and Prediction of Information Diffusion in Social Media: Quantifying the Impact of Topical Interests  2015  2015   Przemyslaw A. Grabowicz, Niloy Ganguly, Krishna P. Gummadi  Proc. of the 24th International Conference on World Wide Web (WWW 2015)
Mining Android Apps for Anomalies  2015  2015   Konstantin Kuznetsov, Alessandra Gorla, Ilaria Tavecchia, Florian Groß, Andreas Zeller
Mining Apps for Abnormal Usage of Sensitive Data  2015  2015   Vitalii Avdiienko, Konstantin Kuznetsov, Alessandra Gorla, Andreas Zeller, Steven Arzt, Siegfried Rasthofer, Eric Bodden  Proceedings of the 37th International Conference on Software Engineering
Mining apps for abnormal usage of sensitive data  2015  2015   Vitalii Avdiienko, Konstantin Kuznetsov, Alessandra Gorla, Andreas Zeller, Steven Arzt, Siegfried Rasthofer, Eric Bodden  In Proceedings of Grande Region Security and Reliability Day
Model Checking Parameterized Asynchronous Shared-Memory Systems  2015  2015   Antoine Durand-Gasselin, Javier Esparza, Pierre Ganty, Rupak Majumdar  Proc. of the 27th International Conference on Computer Aided Verification (CAV 2015)
Modular Verification of Concurrency-Aware Linearizability  2015  2015   Nir Hemed, Noam Rinetzky, Viktor Vafeiadis  Distributed Computing - 29th International Symposium, DISC 2015, Tokyo, Japan, October 7-9, 2015, Proceedings
Mtac: A monad for typed tactic programming in Coq  2015  2015   Beta Ziliani, Derek Dreyer, Neelakantan R. Krishnaswami, Aleksandar Nanevski, Viktor Vafeiadis
Multiprocessor real-time scheduling with arbitrary processor affinities: from practice to theory  2015  2015   Arpan Gujarati, Felipe Cerqueira, Björn B. Brandenburg
Non-Parametric Jensen-Shannon Divergence  2015  2015   Hoang-Vu Nguyen, Jilles Vreeken  Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECMLPKDD)
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information  2015  2015   Milivoj Simeonovski, Fabian Bendun, Muhammad Rizwan Asghar, Michael Backes, Ninja Marnau, Peter Druschel  13th International Conference on Applied Cryptography and Network Security (ACNS)
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information  2015  2015   Milivoj Simeonovski, Fabian Bendun, Muhammad Rizwan Asghar, Michael Backes, Ninja Marnau, Peter Druschel
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information  2015  2015   Milivoj Simeonovski, Fabian Bendun, Muhammad Rizwan Asghar, Michael Backes, Ninja Marnau, Peter Druschel
On the Reliability of Profile Matching Across Large Online Social Networks  2015  2015   Oana Goga, Patrick Loiseau, Robin Sommer, Renata Teixeira, Krishna P. Gummadi  Proc. of the 21st ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD'15)
On the Surprising Difficulty of Simple Things: The Case of Radix Partitioning  2015  2015   Felix Martin Schuhknecht, Pankaj Khanchandani, Jens Dittrich
POSTER: In the Net of the Spider - Measuring the Anonymity-Impact of Network-level Adversaries Against Tor  2015  2015   Christian Rossow, Esfandiar Mohammadi, Michael Backes, Sebastian Meiser, Simon Koch  Proceedings of the 22nd ACM conference on Computer and Communications Security (ACM CCS '15)
POSTER: Towards Compiler-Assisted Taint Tracking on the Android Runtime (ART)  2015  2015   Michael Backes, Oliver Schranz, Philipp von Styp-Rekowsky  Proceedings of the 22nd ACM conference on Computer and Communications Security (ACM CCS '15)
Person Recognition in Personal Photo Collections  2015  2015   Seong Joon Oh, Rodrigo Benenson, Mario Fritz, Bernt Schiele
Person Recognition in Personal Photo Collections  2015  2015   Seong Joon Oh, Rodrigo Benenson, Mario Fritz, Bernt Schiele  2015 IEEE International Conference on Computer Vision, ICCV 2015, Santiago, Chile, December 7-13, 2015
Pilsner: a compositionally verified compiler for a higher-order imperative language  2015  2015   Georg Neis, Chung-Kil Hur, Jan-Oliver Kaiser, Craig McLaughlin, Derek Dreyer, Viktor Vafeiadis  Proceedings of the 20st ACM SIGPLAN International Conference on Functional Programming (ICFP '15)
Prediction of search targets from fixations in open-world settings  2015  2015   Hosnieh Sattar, Sabine Müller, Mario Fritz, Andreas Bulling  IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2015, Boston, MA, USA, June 7-12, 2015
Prediction of search targets from fixations in open-world settings  2015  2015   Hosnieh Sattar, Sabine Müller, Mario Fritz, Andreas Bulling
PriCL: Creating a Precedent. A Framework for Reasoning about Privacy Case Law  2015  2015   Michael Backes, Fabian Bendun, Jörg Hoffmann, Ninja Marnau  Proceedings of the 4th Conference on Principles of Security and Trust (POST)
Privacy Preserving Payments in Credit Networks  2015  2015   Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Kim Pecina  Proceedings of the 22nd Annual Network and Distributed System Security Symposium (NDSS '15)
Privacy and Access Control for Outsourced Personal Records  2015  2015   Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder  Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P)
Proceedings of the ACM SIGKDD Workshop on Interactive Data Exploration and Analytics (IDEA)  2015  2015   Duen Horng Chau, Jilles Vreeken, Matthijs van Leeuwen, Dafna Shahaf, Christos Faloutsos
Program Actions as Actual Causes: A Building Block for Accountability  2015  2015   Anupam Datta, Deepak Garg, Dilsun Kirli Kaynar, Divya Sharma, Arunesh Sinha  Proceedings of the 28th Computer Security Foundations Symposium (CSF '15)
Quantifying Conformance Using the Skorokhod Metric  2015  2015   Jyotirmoy V. Deshmukh, Rupak Majumdar, Vinayak S. Prabhu  Proc. of the 27th International Conference on Computer Aided Verification (CAV 2015)
Quantifying Information Flow in Cryptographic Systems  2015  2015   Michael Backes, Boris Köpf
Quantifying Information Overload in Social Media and its Impact on Social Contagions  2015  2015   Mahmoudreza Babaei, Przemyslaw A. Grabowicz, Isabel Valera, Manuel Gomez-Rodriguez  ICWSM '15: Proceedings of the 9th International AAAI Conference on Weblogs and Social Media
Reachability Analysis of Reversal-bounded Automata on Series-Parallel Graphs  2015  2015   Rayna Dimitrova, Rupak Majumdar  Proceedings of 6th International Symposium on Games, Automata, Logics and Formal Verification (GandALF 2015)
Red-Black Planning: A New Tractability Analysis and Heuristic Function  2015  2015   Daniel Gnad, Jörg Hoffmann  Proceedings of the 8th Annual Symposium on Combinatorial Search (SOCS'15)
Red-black planning: A new systematic approach to partial delete relaxation  2015  2015   Carmel Domshlak, Jörg Hoffmann, Michael Katz
Refinement Types for Incremental Computational Complexity  2015  2015   Deepak Garg, Ezgi Çiçek, Umut A. Acar  Proceedings of the 24th European Symposium on Programming (ESOP '15)
Reliable Recon in Adversarial Peer-to-Peer Botnets  2015  2015   Dennis Andriesse, Christian Rossow, Herbert Bos  Proc. of the 2015 Internet Measurement Conference (IMC'15)
Rely/Guarantee Reasoning for Asynchronous Programs  2015  2015   Ivan Gavran, Filip Niksic, Aditya Kanade, Rupak Majumdar, Viktor Vafeiadis  Proceedings of the 26th International Conference on Concurrency Theory (CONCUR '15)
Sampling Content from Online Social Networks: Comparing Random vs. Expert Sampling of the Twitter Stream  2015  2015   Muhammad Bilal Zafar, Parantapa Bhattacharya, Niloy Ganguly, Krishna P. Gummadi, Saptarshi Ghosh
Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources  2015  2015   Michael Backes, Aniket Kate, Sebastian Meiser, Tim Ruffing  Proceedings of the 13th International Conference on Applied Cryptography and Network Security (ACNS'15)
See the Difference: Direct Pre-Image Reconstruction and Pose Estimation by Differentiating HOG  2015  2015   Walon Wei-Chen, Mario Fritz  2015 IEEE International Conference on Computer Vision, ICCV 2015, Santiago, Chile, December 7-13, 2015
Simulated Penetration Testing: From Dijkstra to Turing Test++  2015  2015   Jörg Hoffmann  Proceedings of the 25th International Conference on Automated Planning and Scheduling (ICAPS 2015)
Strength in Numbers: Robust Tamper Detection in Crowd Computations  2015  2015   Bimal Viswanath, Muhammad Ahmad Bashir, Muhammad Bilal Zafar, Simon Bouget, Saikat Guha, Krishna P. Gummadi, Aniket Kate, Alan Mislove  Proceedings of the 2015 ACM on Conference on Online Social Networks, COSN 2015, Palo Alto, California, USA, November 2-3, 2015
Summarizing and Understanding Large Graphs  2015  2015   Danai Koutra, U Kang, Jilles Vreeken, Christos Faloutsos
Symbolic Malleable Zero-knowledge Proofs  2015  2015   Esfandiar Mohammadi, Fabian Bendun, Kim Pecina, Matteo Maffei, Michael Backes  Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF '15)
System M: A Program Logic for Code Sandboxing and Identification  2015  2015   Anupam Datta, Deepak Garg, Limin Jia, Shayak Sen
Teaching robots the use of human tools from demonstration with non-dexterous end-effectors  2015  2015   Wenbin Li, Mario Fritz  15th IEEE-RAS International Conference on Humanoid Robots, Humanoids 2015, Seoul, South Korea, November 3-5, 2015
Test Complement Exclusion: Guarantees from Dynamic Analysis  2015  2015   Andreas Zeller  Proceedings of the 2015 IEEE 23rd International Conference on Program Comprehension
The Blind Men and the Elephant: About Meeting the Problem of Multiple Truths in Data from Clustering and Pattern Mining Perspectives  2015  2015   Arthur Zimek, Jilles Vreeken
The Case for Small Data Management  2015  2015   Jens Dittrich  Datenbanksysteme für Business, Technologie und Web (BTW), 16. Fachtagung des GI-Fachbereichs Datenbanken und Informationssysteme (DBIS), 4.-6.3.2015 in Hamburg, Germany. Proceedings
The Difference and the Norm — Characterising Similarities and Differences between Databases  2015  2015   Kailash Budhathoki, Jilles Vreeken  Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECMLPKDD)
The Doppelgänger Bot Attack: Exploring Identity Impersonation in Online Social Networks  2015  2015   Oana Goga, Giridhari Venkatadri, Krishna P. Gummadi  Proc. of the 2015 Internet Measurement Conference (IMC'15)
The Many Shades of Anonymity: Characterizing Anonymous Social Media Content  2015  2015   Denzil Correa, Leandro Araújo Silva, Mainack Mondal, Fabrício Benevenuto, Krishna P. Gummadi  Proceedings of the Ninth International Conference on Web and Social Media, ICWSM 2015, University of Oxford, Oxford, UK, May 26-29, 2015
The Second Reactive Synthesis Competition (SYNTCOMP 2015)  2015  2015   Swen Jacobs, Roderick Bloem, Romain Brenguier, Robert Könighofer, Guillermo A. Perez, Jean-Francois Raskin, Leonid Ryzhyk, Ocan Sankur, Martina Seidl, Leander Tentrup, Adam Walker  Proceedings Fourth Workshop on Synthesis, SYNT 2015, San Francisco, CA, USA, 18th July 2015.
The Unexpected Dangers of Dynamic JavaScript  2015  2015   Sebastian Lekies, Ben Stock, Martin Wentzel, Martin Johns  24th USENIX Security Symposium (USENIX Security 15)
To Pin or Not to Pin—Helping App Developers Bullet Proof Their TLS Connections  2015  2015   Marten Oltrogge, Yasemin Acar, Sergej Dechand, Matthew Smith, Sascha Fahl  24th USENIX Security Symposium (USENIX Security 15)
Type-Based Verification of Electronic Voting Protocols  2015  2015   Véronique Cortier, Fabienne Eigner, Steve Kremer, Matteo Maffei, Cyrille Wiedling  Proceedings of the 4th International Conference on Principles of Security and Trust (POST)
Using Dynamic Symbolic Execution to Generate Inputs in Search-based GUI Testing  2015  2015   Kevin Salvesen, Juan Pablo Galeotti, Florian Gross, Gordon Fraser, Andreas Zeller  Proceedings of the Eighth International Workshop on Search-Based Software Testing
Vccfinder: Finding potential vulnerabilities in open-source projects to assist code audits  2015  2015   Henning Perl, Sergej Dechand, Matthew Smith, Daniel Arp, Fabian Yamaguchi, Konrad Rieck, Sascha Fahl, Yasemin Acar  Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
VeriStream - A Framework for Verifiable Data Streaming  2015  2015   Dominique Schröder, Mark Simkin  Financial Cryptography and Data Security - 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers
Verifiably Encrypted Signatures: Security Revisited and a New Construction  2015  2015   Christian Hanser, Max Rabkin, Dominique Schröder  Proc. of the 20th European Symposium on Research in Computer Security (ESORICS 2015)
Verifying read-copy-update in a logic for weak memory  2015  2015   Joseph Tassarotti, Derek Dreyer, Viktor Vafeiadis  Proc. of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2015)
Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms Against Structural Attacks  2015  2015   Michael Backes, Sebastian Meiser, Marcin Slowik  Proceedings on Privacy Enhancing Technologies
Zeus Milker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism  2015  2015   Shankar Karuppayah, Stefanie Roos, Christian Rossow, Max Mühlhäuser, Mathias Fischer  Proc. of the 35th IEEE International Conference on Distributed Computing Systems (ICDCS'15)
jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications  2015  2015   Giancarlo Pellegrino, Constantin Tschürtz, Eric Bodden, Christian Rossow  Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015, Proceedings
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens  2014  2014   Seung Geol Choi, Jonathan Katz, Dominique Schröder, Arkady Yerukhimovich, Hong-Sheng Zhou  Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings
(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection  2014  2014   Michael Backes, Aniket Kate, Sebastian Meiser, Esfandiar Mohammadi  Proceedings of the 21st ACM Conference on Computer and Communications Security (ACM CCS '14)
A Case Study of Research through the App Store: Leveraging the System UI as a Playing Field for Improving the Design of Smartphone Launchers  2014  2014   Matthias Böhmer, Antonio Krüger
A Compiler Optimization to Increase the Efficiency of WCET Analysis  2014  2014   Jan Reineke, Mohamed Abdel Maksoud  22nd International Conference on Real-Time Networks and Systems, RTNS '14, Versaille, France, October 8-10, 2014
A Fresh Look on Knowledge Bases: Distilling Named Events from News  2014  2014   Erdal Kuzey, Jilles Vreeken, Gerhard Weikum  Proc. of the 23rd ACM International Conference on Information and Knowledge Management (CIKM'14)
A Look at Targeted Attacks Through the Lense of an NGO  2014  2014   Stevens Le Blond, Adina Uritesc, Cedric Gilbert, Zheng Leong Chua, Prateek Saxena, Engin Kirda  Proceedings of the 23rd USENIX Security Symposium (USENIX '14)
A Modular Framework for Multi-Factor Authentication and Key Exchange  2014  2014   Nils Fleischhacker, Mark Manulis, Amir Azodi  Security Standardisation Research - First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings
A Multi-World Approach to Question Answering about Real-World Scenes based on Uncertain Input  2014  2014   Mateusz Malinowski, Mario Fritz  Advances in Neural Information Processing Systems 27: Annual Conference on Neural Information Processing Systems 2014, December 8-13 2014, Montreal, Quebec, Canada
A Pipelined Multi-core MIPS Machine -- Hardware Implementation and Correctness Proof  2014  2014   Mikhail Kovalev, Silvia M. Müller, Wolfgang J. Paul
A Tutorial on Human Activity Recognition Using Body-worn Inertial Sensors  2014  2014   Andreas Bulling, Ulf Blanke, Bernt Schiele
Amplification Hell: Revisiting Network Protocols for DDoS Abuse  2014  2014   Christian Rossow  Proceedings of the 21st Annual Network and Distributed System Security Symposium (NDSS '14)
An SMT-based Approach to Coverability Analysis  2014  2014   Javier Esparza, Ruslán Ledesma-Garza, Rupak Majumdar, Philipp J. Meyer, Filip Niksic  Proc. of the 26th International Conference on Computer Aided Verification (CAV 2014)
Android Security Framework: Extensible Multi-Layered Access Control on Android  2014  2014   Michael Backes, Sven Bugiel, Sebastian Gerling, Philipp von Styp-Rekowsky  In Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC'14)
Anytime Recognition of Objects and Scenes  2014  2014   Sergey Karayev, Mario Fritz, Trevor Darrell  2014 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2014, Columbus, OH, USA, June 23-28, 2014
Architecture-parametric timing analysis  2014  2014   Jan Reineke, Johannes Doerfert  20th IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS 2014, Berlin, Germany, April 15-17, 2014
Asynchronous MPC with a Strict Honest Majority Using Non-equivocation  2014  2014   Michael Backes, Fabian Bendun, Ashish Choudhury, Aniket Kate  ACM Symposium on Principles of Distributed Computing 2014
Automated Fixing of Programs with Contracts  2014  2014   Andreas Zeller, Yi Wei, Bertrand Meyer, Martin Nordio, Carlo A. Furia, Yu Pei
Automatic Compositional Synthesis of Distributed Systems  2014  2014   Werner Damm, Bernd Finkbeiner  Proceedings of the 19th International Symposium on Formal Methods (FM'14)
Automating the Choice of Consistency Levels in Replicated Systems  2014  2014   Cheng Li, João Leitão, Allen Clement, Nuno M. Preguiça, Rodrigo Rodrigues, Viktor Vafeiadis  2014 USENIX Annual Technical Conference, USENIX ATC '14, Philadelphia, PA, USA, June 19-20, 2014.
BackRef: Accountability in Anonymous Communication Networks  2014  2014   Michael Backes, Jeremy Clark, Aniket Kate, Milivoj Simeonovski, Peter Druschel  Applied Cryptography and Network Security
Basic Problems in Multi-View Modeling  2014  2014   Jan Reineke, Stavros Tripakis  Proc. 20th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 14)
Beyond Access Control: Managing Online Privacy via Exposure  2014  2014   Mainack Mondal, Peter Druschel, Krishna P. Gummadi, Alan Mislove  Proceedings of the Workshop on Useable Security (USEC'14)
Blocking Optimality in Distributed Real-Time Locking Protocols  2014  2014   Björn B. Brandenburg
Bounds on mobility  2014  2014   Reiner Hüchting, Rupak Majumdar, Roland Meyer  Proc. of the 25th International Conference on Concurrency Theory (CONCUR 2014)
Brave New World: Privacy Risks for Mobile Users  2014  2014   Paarijaat Aditya, Bobby Bhattacharjee, Peter Druschel, Viktor Erdelyi, Matthew Lentz
Brave new world: privacy risks for mobile users  2014  2014   Paarijaat Aditya, Bobby Bhattacharjee, Peter Druschel, Viktor Erdelyi, Matthew Lentz  Proceedings of the ACM MobiCom Workshop on Security and Privacy in Mobile Environments, SPME@MobiCom 2014, Maui, Hawaii, USA, September 11, 2014
Bridging the Gap Between Digital Cryptography and the Physical World  2014  2014   Mark Simkin, Dominique Schröder, Andreas Bulling, Mario Fritz  European Symposium on Research in Computer Security (ESORICS)
Brief Announcement: Towards Security and Privacy for Outsourced Data in the Multi-party Setting  2014  2014   Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder  Proceedings of the 2014 ACM Symposium on Principles of Distributed Computing
Building timing predictable embedded systems  2014  2014   Philip Axer, Rolf Ernst, Heiko Falk, Alain Girault, Daniel Grund, Nan Guan, Bengt Jonsson, Peter Marwedel, Jan Reineke, Christine Rochange, Maurice Sebastian, Reinhard von Hanxleden, Reinhard Wilhelm, Wang Yi
Causal Termination of Multi-threaded Programs  2014  2014   Andrey Kupriyanov, Bernd Finkbeiner  Proc. of the 26th International Conference on Computer Aided Verification (CAV 2014)
Checking App Behavior Against App Descriptions  2014  2014   Alessandra Gorla, Ilaria Tavecchia, Florian Gross, Andreas Zeller  Proc. of the 36th International Conference on Software Engineering (ICSE 2014)
Checking probabilistic noninterference using JOANA  2014  2014   Gregor Snelting, Dennis Giffhorn, Jürgen Graf, Christian Hammer, Martin Hecker, Martin Mohr, Daniel Wasserrab
CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin  2014  2014   Tim Ruffing, Pedro Moreno-Sanchez, Aniket Kate  Proc. of the 19th European Symposium on Research in Computer Security (ESORICS 2014)
Computational Soundness Results for ProVerif - Bridging the Gap from Trace Properties to Uniformity  2014  2014   Michael Backes, Esfandiar Mohammadi, Tim Ruffing  Proceedings of the 3rd Conference on Principles of Security and Trust (POST)
Counting Models of Linear-Time Temporal Logic  2014  2014   Bernd Finkbeiner, Hazem Torfah  8th International Conference on Language and Automata Theory and Applications (LATA 2014)
Cross-checking oracles from intrinsic software redundancy  2014  2014   Antonio Carzaniga, Alberto Goffi, Alessandra Gorla, Andrea Mattavelli, Mauro Pezzè  36th International Conference on Software Engineering, ICSE '14, Hyderabad, India - May 31 - June 07, 2014
DEMO: Enhancing Security and Privacy with Google Glass  2014  2014   Johannes Krupp, Dominique Schröder, Mark Simkin  Proceedings of the 21st ACM Conference on Computer and Communication Security (CCS '14)
DOM-basiertes Cross-Site Scripting im Web: Reise in ein unerforschtes Land.  2014  2014   Ben Stock, Sebastian Lekies, Martin Johns  Sicherheit
Deductive control synthesis for alternating-time logics  2014  2014   Rayna Dimitrova, Rupak Majumdar  Proc. of the International Conference on Embedded Software (EMSOFT 2014)
Deep Twitter diving: exploring topical groups in microblogs at scale  2014  2014   Parantapa Bhattacharya, Saptarshi Ghosh, Juhi Kulshrestha, Mainack Mondal, Muhammad Bilal Zafar, Niloy Ganguly, Krishna P. Gummadi  Proc. of the Computer Supported Cooperative Work (CSCW '14)
Detecting Unrealizable Specifications of Distributed Systems  2014  2014   Bernd Finkbeiner, Leander Tentrup  Proc. 20th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 14)
Detection and Tracking of Occluded People  2014  2014   Siyu Tang, Mykhaylo Andriluka, Bernt Schiele
Differentially Private Data Aggregation with Optimal Utility  2014  2014   Fabienne Eigner, Aniket Kate, Matteo Maffei, Francesca Pampaloni, Ivan Pryvalov  30th Annual Computer Security Applications Conference (ACSAC)
Discovering Emerging Entities with Ambiguous Names  2014  2014   Johannes Hoffart, Yasemin Altun, Gerhard Weikum  Proc. of the 23rd International Conference on World Wide Web (WWW 2014)
Dynamic package interfaces  2014  2014   Shahram Esmaeilsabzali, Rupak Majumdar, Thomas Wies, Damien Zufferey  Proc. of the 17th International Conference on Fundamental Approaches to Software Engineering (FASE 2014)
Edit Distance for Timed Automata  2014  2014   Krishnendu Chatterjee, Rasmus Ibsen-Jensen, Rupak Majumdar  Proc. of the 17th International Conference on Hybrid Systems: Computation and Control (HSCC 2014)
Efficiently Spotting the Starting Points of an Epidemic in a Large Graph  2014  2014   B. Aditya Prakash, Jilles Vreeken, Christos Faloutsos
EnCore: Private, Context-based Communication for Mobile Social Apps  2014  2014   Paarijaat Aditya, Viktor Erdelyi, Matthew Lentz, Elaine Shi, Bobby Bhattacharjee, Peter Druschel  Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services
Exception Handling for Dynamic Information Flow Control  2014  2014   Abhishek Bichhawat  Companion Proceedings of the 36th International Conference on Software Engineering (Student Research Competition)
Exit from Hell? Reducing the Impact of Amplification DDoS Attacks  2014  2014   Marc Kührer, Thomas Hupperich, Christian Rossow, Thorsten Holz  Proceedings of the 23rd USENIX Security Symposium (USENIX '14)
Extrinsic Influence Factors in Software Reliability: A Study of 200,000 Windows Machines  2014  2014   Christian Bird, Venkatesh-Prasad Ranganath, Thomas Zimmermann, Nachiappan Nagappan, Andreas Zeller  Companion Proceedings of the 36th International Conference on Software Engineering
F-ing modules  2014  2014   Andreas Rossberg, Claudio V Russo, Derek Dreyer
Fast DQBF refutation  2014  2014   Bernd Finkbeiner, Leander Tentrup  Theory and Applications of Satisfiability Testing (SAT 2014)
Feasibility and Infeasibility of Secure Computation with Malicious PUFs  2014  2014   Dana Dachman-Soled, Nils Fleischhacker, Jonathan Katz, Anna Lysyanskaya, Dominique Schröder  Proceedings of the 34th International Cryptology Conference (Crypto '14)
Formal Specification of a Generic Separation Kernel  2014  2014   Freek Verbeek, Sergey Tverdyshev, Oto Havle, Holger Blasum, Bruno Langenstein, Werner Stephan, Yakoub Nemouchi, Abderrahmane Feliachi, Burkhart Wolff, Julien Schmaltz
GPS: navigating weak memory with ghosts, protocols, and separation  2014  2014   Aaron Turon, Viktor Vafeiadis, Derek Dreyer  Proc. of the 2014 ACM SIGPLAN International Conference on Object Oriented Programming Systems, Languages, and Applications (OOPSLA 2014)
Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis  2014  2014   Abhishek Bichhawat, Vineet Rajani, Deepak Garg, Christian Hammer  Proceedings of the Ninth Workshop on Programming Languages and Analysis for Security
Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks  2014  2014   Marc Kührer, Thomas Hupperich, Christian Rossow, Thorsten Holz  Proceedings of the 8th USENIX Workshop on Offensive Technologies (WOOT ’14)
Image-Based Synthesis and Re-synthesis of Viewpoints Guided by 3D Models  2014  2014   Konstantinos Rematas, Tobias Ritschel, Mario Fritz, Tinne Tuytelaars  2014 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2014, Columbus, OH, USA, June 23-28, 2014
Improved Features for Runtime Prediction of Domain-Independent Planners  2014  2014   Chris Fawcett, Mauro Vallati, Frank Hutter, Jörg Hoffmann, Holger H. Hoos, Kevin Leyton-Brown  Proceedings of the 25th International Conference on Automated Planning and Scheduling (ICAPS 2014)
Incorporating Reputation Information into Decision-Making Processes in Markets of Composed Services  2014  2014   Alexander Jungmann, Sonja Brangewitz, Ronald Petrlic, Marie Christin Platenius
Inferring user interests in the Twitter social network  2014  2014   Parantapa Bhattacharya, Muhammad Bilal Zafar, Niloy Ganguly, Saptarshi Ghosh, Krishna P. Gummadi  Proc. of the 8th ACM Conference on Recommender Systems (RecSys '14)
Information Flow Control in WebKit's JavaScript Bytecode  2014  2014   Abhishek Bichhawat, Vineet Rajani, Deepak Garg, Christian Hammer
Interacting with 3D Content on Stereoscopic Displays  2014  2014   Florian Daiber, Marco Speicher, Sven Gehring, Markus Löchtefeld, Antonio Krüger  Proceedings of the International Symposium on Pervasive Displays (PerDis)
Interaction Model to Predict Subjective-Specificity of Search Results  2014  2014   Kumaripaba Athukorala, Antti Oulasvirta, Dorata Glowacka, Jilles Vreeken, Giulio Jaccuci  Posters, Demos, Late-Breaking Results and Workshop Proceedings of the 22nd Conference on User Modelling, Adaptation, and Personalization (UMAP)
Interrupted by a phone call: exploring designs for lowering the impact of call notifications for smartphone users  2014  2014   Matthias Böhmer, Christian Lander, Sven Gehring, Duncon P Burmby, Antonio Krüger  Proceedings of the ACM SIGCHI International Conference on Human Factors in Computing Systems (CHI)
Investigating the effectiveness of peephole interaction for smartwatches in a map navigation task  2014  2014   Frederic Kerber, Antonio Krüger, Markus Löchtefeld  Proceedings of the 16th International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI)
JTACO: Test Execution for Faster Bounded Verification  2014  2014   Alexander Kampmann, Juan Pablo Galeotti, Andreas Zeller  Proc. of the 8th International Conference on Tests and Proofs (TAP 2014)
KnowLife: a Knowledge Graph for Health and Life Sciences  2014  2014   Patrick Ernst, Cynthia Meng, Amy Siu, Gerhard Weikum  Proc. of the 30th IEEE International Conference on Data Engineering (ICDE'14)
Kuai: A model checker for software-defined networks  2014  2014   Rupak Majumdar, Sai Deep Tetali, Zilong Wang  Proc. of Formal Methods in Computer-Aided Design (FMCAD 2014)
Learning Pruning Rules for Heuristic Search Planning  2014  2014   Michal Krajnanský, Jörg Hoffmann, Olivier Buffet, Alan Fern  Proc. of the 21st European Conference on Artificial Intelligence (ECAI 2014)
Learning using privileged information: SV M+ and weighted SVM  2014  2014   Maksim Lapin, Matthias Hein, Bernt Schiele
Leveraging semantic signatures for bug search in binary programs  2014  2014   Jannik Pewny, Felix Schuster, Lukas Bernhard, Thorsten Holz, Christian Rossow  Proc. of the 30th Annual Computer Security Applications Conference (ACSAC'14)
Lime: Data Lineage in the Malicious Environment  2014  2014   Michael Backes, Niklas Grimm, Aniket Kate  Proceedings of 10th International Workshopon Security and Trust Management (STM)
MDL4BMF : Minimum Description Length for Boolean Matrix Factorization  2014  2014   Pauli Miettinen, Jilles Vreeken
Main Memory Adaptive Indexing for Multi-core Systems  2014  2014   Victor Alvarez, Felix Martin Schuhknecht, Jens Dittrich, Stefan Richter  Proceedings of the 10th International Workshop on Data Management on New Hardware (DaMoN)
Matching of Incomplete Service Specifications Exemplified by Privacy Policy Matching  2014  2014   Marie Christin Platenius, Svetlana Arifulina, Ronald Petrlic, Wilhelm Schäfer  Proceedings of The 4th International Workshop on Adaptive Services for the Future Internet
Mining Bug Data: A Practitioner’s Guide  2014  2014   Kim Herzig, Andreas Zeller
Monitoring Parametric Temporal Logic  2014  2014   Peter Faymonville, Bernd Finkbeiner, Doron Peled  Proceedings of the 15th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI'14)
Multivariate Maximal Correlation Analysis  2014  2014   Hoang-Vu Nguyen, Emmanuel Müller, Jilles Vreeken, Klemens Böhm  Proceedings of the International Conference on Machine Learning (ICML)
Narrow or Broad? Estimating Subjective Specificity in Exploratory Search  2014  2014   Kumaripaba Atukorala, Antti Oulasvirta, Dorata Glowacka, Jilles Vreeken, Giulio Jaccuci  Proceedings of ACM Conference on Information and Knowledge Management (CIKM)
Object Disambiguation for Augmented Reality Applications  2014  2014   Walon Wei-Chen, Gregory Johnson, Daniel McCulley, Oliver Grau, Mario Fritz  British Machine Vision Conference, BMVC 2014, Nottingham, UK, September 1-5, 2014
On Advanced Monitoring in Resilient and Unstructured P2P Botnets  2014  2014   Shankar Karuppayah, Mathias Fischer, Christian Rossow, Max Mühlhäuser  Proceedings of the 2014 IEEE International Conference on Communications (ICC 2014)
On Measuring the Impact of DDoS Botnets  2014  2014   Arne Welzel, Christian Rossow, Herbert Bos  Proceedings of the Seventh European Workshop on System Security (EuroSec '14)
On Tight Security Proofs for Schnorr Signatures  2014  2014   Nils Fleischhacker, Tibor Jager, Dominique Schröder  Proc. of the 20th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2014)
On the (In)Security of Mobile Two-Factor Authentication  2014  2014   Alexandra Dmitrienko, Christopher Liebchen, Christian Rossow, Ahmad-Reza Sadeghi  Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers
Optimizing Planning Domains by Automatic Action Schema Splitting  2014  2014   Carlos Areces, Facundo Bustos, Martín Ariel Dominguez, Jörg Hoffmann  Proceedings of the 25th International Conference on Automated Planning and Scheduling (ICAPS 2014)
Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing  2014  2014   Michael Backes, Stefan Nürnberger  Proceedings of the 23rd USENIX Security Symposium (USENIX '14)
PIDGIN: Privacy-preserving Interest and Content Sharing in Opportunistic Networks  2014  2014   Muhammad Rizwan Asghar, Ashish Gehani, Bruno Crispo, Giovanni Russello  Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security
Paint it Black: Evaluating the Effectiveness of Malware Blacklists  2014  2014   Marc Kührer, Christian Rossow, Thorsten Holz  Proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses
People on Drugs: Credibility of User Statements in Health Communities.  2014  2014   Subhabrata Mukherjee, Gerhard Weikum, Cristian Danescu-Niculescu-Mizil  Proc. of the 20th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD'14)
Personenbezug verhindern! Verschleierung von IP-Adressen in Webserver-Logfiles  2014  2014   Dominik Leibenger, Frederik Möllers, Ronald Petrlic
Petri Games: Synthesis of Distributed Systems with Causal Memory  2014  2014   Bernd Finkbeiner, Ernst-Rüdiger Olderog  Proceedings of Fifth International Symposium on Games, Automata, Logics and Formal Verification (GandALF 2014)
Poster: Quasi-ID: In fact, I am a human  2014  2014   Milivoj Simeonovski  Proceedings of the 21st ACM Conference on Computer and Communications Security (ACM CCS '14)
Precise Client-side Protection against DOM-based Cross-Site Scripting  2014  2014   Ben Stock, Sebastian Lekies, Tobias Mueller, Patrick Spiegel, Martin Johns  23rd USENIX Security Symposium (USENIX Security 14)
Privacy-preserving Data Aggregation with Optimal Utility Using Arithmetic SMC -- Extended Abstract  2014  2014   Fabienne Eigner, Aniket Kate, Matteo Maffei, Francesca Pampaloni, Ivan Pryvalov  Workshop on Usable and Efficient Secure Multiparty Computation -- Satellite Event of ESORICS
Privacy-preserving audit for broker-based health information exchange  2014  2014   Se Eun Oh, Ji Young Chun, Limin Jia, Deepak Garg, Carl A. Gunter, Anupam Datta  Proceedings of the 4th ACM conference on Data and application security and privacy (CODASPY'14)
Private-by-Design Advertising Meets the Real World  2014  2014   Alexey Reznichenko, Paul Francis  Proc. of the 20th ACM Conference on Computer and Communication Security (CCS 2014)
ProCrawl: Mining Test Models from Multi-user Web Applications  2014  2014   Matthias Schur, Andreas Roth, Andreas Zeller  Proc. International Symposium on Software Testing and Analysis (ISSTA 2014)
Probabilistic Prediction of Privacy Risks in User Search Histories  2014  2014   Joanna Asia Biega, Ida Mele, Gerhard Weikum  Proceedings of the First International Workshop on Privacy and Secuirty of Big Data (PSBD@CIKM '14)
Protecting Users Against XSS-based Password Manager Abuse  2014  2014   Ben Stock, Martin Johns  Proceedings of the 9th ACM symposium on Information, computer and communications security
Quantifying Information Overload in Social Media and Its Impact on Social Contagions  2014  2014   Manuel Gomez-Rodriguez, Krishna P. Gummadi, Bernhard Schölkopf  Proceedings of the Eighth International Conference on Weblogs and Social Media, ICWSM 2014, Ann Arbor, Michigan, USA, June 1-4, 2014.
Race Detection for Android Applications  2014  2014   Pallavi Maiya, Aditya Kanade, Rupak Majumdar  Proc. of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2014)
Regression Test Selection for Distributed Software Histories  2014  2014   Milos Gligoric, Rupak Majumdar, Rohan Sharma, Lamyaa Eloussi, Darko Marinov  Proc. of the 26th International Conference on Computer Aided Verification (CAV 2014)
Reverse engineering of cache replacement policies in Intel microprocessors and their evaluation  2014  2014   Andreas Abel, Jan Reineke  2014 IEEE International Symposium on Performance Analysis of Systems and Software, ISPASS 2014, Monterey, CA, USA, March 23-25, 2014
SDDR: Light-Weight, Secure Mobile Encounters  2014  2014   Matthew Lentz, Viktor Erdelyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, Bobby Bhattacharjee  Proceedings of the 23rd USENIX Security Symposium (USENIX '14)
Scalable Multitask Representation Learning for Scene Classification  2014  2014   Maksim Lapin, Bernt Schiele, Matthias Hein  2014 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2014, Columbus, OH, USA, June 23-28, 2014
Scippa: System-Centric IPC Provenance on Android  2014  2014   Michael Backes, Sven Bugiel, Sebastian Gerling  In Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC'14)
Search-based Security Testing of Web Applications  2014  2014   Julian Thome, Alessandra Gorla, Andreas Zeller  Proceedings of the 7th International Workshop on Search-Based Software Testing
Supporting Exploratory Search Through User Modelling  2014  2014   Kumaripaba Athukorala, Antti Oulasvirta, Dorata Glowacka, Jilles Vreeken, Giulio Jaccuci  Posters, Demos, Late-Breaking Results and Workshop Proceedings of the 22nd Conference on User Modelling, Adaptation, and Personalization (UMAP)
SurfacePhone: A Mobile Projection Device for Single- and Multiuser Everywhere Tabletop Interaction  2014  2014   Christian Winkler, Markus Löchtefeld, David Dobbelstein, Antonio Krüger, Enrico Rukzio  Proceedings of the 32nd ACM CHI Conference on Human Factors in Computing Systems. ACM International Conference on Human Factors in Computing Systems (CHI-14), 32nd, April 26 - May 1, Toronto,, Ontario
Synthesis of Geometry Proof Problems  2014  2014   Christopher Alvin, Sumit Gulwani, Supratik Mukhopadhyay, Rupak Majumdar  Proc. of the 28th Conference of Artificial Intelligence (AAAI 2014)
TUC: Time-sensitive and Modular Analysis of Anonymous Communication  2014  2014   Michael Backes, Praveen Manoharan, Esfandiar Mohammadi  Proceedings of the of the 27th IEEE Computer Security Foundations Symposium (CSF '14)
Temporal Logics for Hyperproperties  2014  2014   Michael R. Clarkson, Bernd Finkbeiner, Masoud Koleini, Kristopher K. Micinski, Markus N. Rabe, Cesar Sanchez  Proc. of the 3rd Conference on Principles of Security and Trust (POST 2014)
Temporal Mode-Checking for Runtime Monitoring of Privacy Policies  2014  2014   Anupam Datta, Deepak Garg, Limin Jia, Omar Chowdhury  Proceedings of the 27th IEEE Computer Security Foundations Symposium (CSF '14)
Temporal Mode-Checking for Runtime Monitoring of Privacy Policies  2014  2014   Omar Chowdhury, Limin Jia, Deepak Garg, Anupam Datta  Proc. 26th International Conference on Computer Aided Verification (CAV 2014)
Test Generation Across Multiple Layers  2014  2014   Matthias Höschele, Juan Pablo Galeotti, Andreas Zeller  Proceedings of the 7th International Workshop on Search-Based Software Testing
Towards Detecting Anomalous User Behavior in Online Social Networks  2014  2014   Bimal Viswanath, Ahmad M Bashir, Mark Crovella, Saikat Guha, Krishna P. Gummadi, Balachander Krishnamurthy, Alan Mislove  Proceedings of the 23rd USENIX Security Symposium (USENIX '14)
Towards a Flexible and Privacy-Preserving Reputation System for Markets of Composed Services  2014  2014   Sonja Brangewitz, Alexander Jungmann, Ronald Petrlic, Marie Christin Platenius  Proceedings of The Sixth International Conferences on Advanced Service Computing
Ubic: Bridging the Gap between Digital Cryptography and the Physical World  2014  2014   Mark Simkin, Dominique Schröder, Andreas Bulling, Mario Fritz  Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I
Unary Pushdown Automata and Straight-Line Programs  2014  2014   Dmitry Chistikov, Rupak Majumdar  Proc. of the 41st International Colloquium on Automata, Languages and Programming (ICALP 2014)
Uncovering the Plot: Detecting Surprising Coalitions of Entities in Multi-Relational Schemas  2014  2014   Hao Wu, Jilles Vreeken, Nikolaj Tatti, Naren Ramakrishnan
Understanding and Specifying Social Access Control Lists  2014  2014   Mainack Mondal, Yabing Liu, Bimal Viswanath, Krishna P. Gummadi, Alan Mislove  Proceedings of the 10th Symposium on Usable Privacy and Security (SOUPS 2014)
Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations  2014  2014   Michael Backes, Cătălin Hriţcu, Matteo Maffei
Unsupervised Interaction-Preserving Discretization of Multivariate Data  2014  2014   Hoang-Vu Nguyen, Emmanuel Müller, Jilles Vreeken, Böhm Klemens
Verification of Certifying Computations through AutoCorres and Simpl  2014  2014   Lars Noschinski, Christine Rizkallah, Kurt Mehlhorn  Proc. 6th NASA Formal Methods Symposium (NFM 2014)
VoG: Summarizing and Understanding Large Graphs  2014  2014   Danai Koutra, U Kang, Jilles Vreeken, Christos Faloutsos  Proceedings of the SIAM International Conference on Data Mining (SDM)
WebMate: Web Application Test Generation in the Real World  2014  2014   Valentin Dallmeier, Bernd Pohl, Martin Burger, Michael Mirold, Andreas Zeller  Proc. of the Seventh International IEEE Conference on Software Testing, Verification and Validation Workshops(ICSTW 2014)
WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP  2014  2014   Michael Backes, Rainer W. Gerling, Sebastian Gerling, Stefan Nürnberger, Dominique Schröder, Mark Simkin  12th International Conference on Applied Cryptography and Network Security (ACNS 2014)
X-pire 2.0 - A User-Controlled Expiration Date and Copy Protection Mechanism.  2014  2014   Michael Backes, Sebastian Gerling, Stefan Lorenz, Stephan Lukas  29th ACM Symposium on Applied Computing (SAC 2014)
XMLMate: Evolutionary XML Test Generation  2014  2014   Nikolas Havrikov, Matthias Höschele, Juan Pablo Galeotti, Andreas Zeller  Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering
You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code  2014  2014   Michael Backes, Thorsten Holz, Benjamin Kollenda, Philipp Koppe, Stefan Nürnberger, Jannik Pewny  Proceedings of the 21st ACM conference on Computer and Communications Security (ACM CCS '14)
Zero-Communication Seed Establishment for Anti-Jamming Techniques  2014  2014   Kim Pecina, Esfandiar Mohammadi, Christina Pöpper  Proceedings of the NDSS Workshop on Security of Emerging Networking Technologies (SENT)
25 Million Flows Later - Large-scale Detection of DOM-based XSS  2013  2013   Sebastian Lekies, Ben Stock, Martin Johns  20th ACM Conference on Computer and Communications Security Berlin 4.11.2013
A Comparative Study of Modern Inference Techniques for Discrete Energy Minimization Problem  2013  2013   Jörg H Kappes, Bjoern Andres, Fred A. Hamprecht, Christoph Schnörr, Sebastian Nowozin, Dhruv Batra, Sungwoong Kim, Bernhard X Kausler, Jan Lellmann, Nikos Komodakis, Carsten Rother  Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
A Comparison of Knives for Bread Slicing  2013  2013   Alekh Jindal, Endre Palatinus, Vladimir Pavlov, Jens Dittrich
A Framework for the Verification of Certifying Computations  2013  2013   Eyad Alkassar, Sascha Böhme, Kurt Mehlhorn, Christine Rizkallah
A Fully Preemptive Multiprocessor Semaphore Protocol for Latency-Sensitive Real-Time Applications  2013  2013   Björn B. Brandenburg  25th Euromicro Conference on Real-Time Systems, ECRTS 2013, Paris, France, July 9-12, 2013
A Holistic View of Security and Privacy Issues in Smart Grids  2013  2013   Muhammad Rizwan Asghar, Daniele Miorandi
A Privacy-aware Shopping Scenario  2013  2013   Gerrit Kahl, Denise Paradowski  Proceedings of the Companion Publication of the 2013 International Conference on Intelligent User Interfaces. International Conference on Intelligent User Interfaces (IUI-13), March 19-22, Santa Monic
A Programming Language Approach to Fault Tolerance for Fork-Join Parallelism  2013  2013   Mustafa Zengin, Viktor Vafeiadis  Seventh International Symposium on Theoretical Aspects of Software Engineering, TASE 2013, 1-3 July 2013, Birmingham, UK
A Theory of Name Boundedness  2013  2013   Reiner Hüchting, Rupak Majumdar, Roland Meyer  Proc. of the 24th International Conference on Concurrency Theory (CONCUR 2013)
A Theory of Partitioned Global Address Spaces  2013  2013   Georgel Calin, Egor Derevenetc, Rupak Majumdar, Roland Meyer  Proc. of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2013)
A Uniformization Theorem for Nested Word to Word Transductions  2013  2013   Dmitry Chistikov, Rupak Majumdar  Proc. of the 18th International Conference on Implementation and Application of Automata (CIAA 2013)
A study on icon arrangement by smartphone users  2013  2013   Matthias Böhmer, Antonio Krüger  Proceedings of the ACM SIGCHI International Conference on Human Factors in Computing Systems (CHI)
Advances in Mobile Security  2013  2013   Sven Bugiel, Erik Derr, Sebastian Gerling, Christian Hammer  8th Future Security - Security Research Conference
Algebraic (Trapdoor) One-Way Functions and Their Applications  2013  2013   Dario Catalano, Dario Fiore, Rosario Gennaro, Konstantinos Vamvourellis  Proc. of the 10th Theory of Cryptography Conference (TCC 2013)
An asymptotically optimal real-time locking protocol for clustered scheduling under suspension-aware analysis  2013  2013   Björn B. Brandenburg
AnoA: A Framework For Analyzing Anonymous Communication Protocols  2013  2013   Michael Backes, Aniket Kate, Praveen Manoharan, Sebastian Meiser, Esfandiar Mohammadi  Proceedings of the 26th IEEE Computer Security Foundations Symposium (CSF '13)
AppGuard - Enforcing User Requirements on Android Apps  2013  2013   Michael Backes, Sebastian Gerling, Christian Hammer, Matteo Maffei, Philipp von Styp-Rekowsky
AppGuard – Fine-grained Policy Enforcement for Untrusted Android Applications  2013  2013   Michael Backes, Sebastian Gerling, Christian Hammer, Matteo Maffei, Philipp von Styp-Rekowsky  8th International Workshop on Data Privacy Management (DPM'13)
Approximate Transient Analysis of Queuing Networks by Quasi Product Forms  2013  2013   Alessio Angius, András Horváth, Verena Wolf  Analytical and Stochastic Modelling Techniques and Applications - 20th International Conference, ASMTA 2013, Ghent, Belgium, July 8-10, 2013. Proceedings
Asynchronous Computational VSS with Reduced Communication Complexity  2013  2013   Michael Backes, Amit Datta, Aniket Kate  Proc. of the 2013 Cryptographers' Track at the RSA Conference (CT-RSA 2013)
Automated Security Proofs for Almost-Universal Hash for MAC Verification  2013  2013   Martin Gagné, Pascal Lafourcade, Yassine Lakhnech  Proc. of the 18th European Symposium on Research in Computer Security (ESORICS 2013)
Automatic recovery from runtime failures  2013  2013   Antonio Carzaniga, Alessandra Gorla, Andrea Mattavelli, Nicolò Perino, Mauro Pezzè  35th International Conference on Software Engineering, ICSE '13, San Francisco, CA, USA, May 18-26, 2013
Bisimilar finite abstractions of stochastic control systems  2013  2013   Majid Zamani, Peyman Mohajerin Esfahani, Rupak Majumdar, Alessandro Abate, John Lygeros  Proc. of the 52nd IEEE Conference on Decision and Control (CDC 2013)
Bounded synthesis  2013  2013   Bernd Finkbeiner, Sven Schewe  International Journal on Software Tools for Technology Transfer (STTT'13)
CMI: An Information-Theoretic Contrast Measure for Enhancing Subspace Cluster and Outlier Detection  2013  2013   Hoang-Vu Nguyen, Emmanuel Müller, Jilles Vreeken, Fabian Keller, Klemens Böhm  Proceedings of the SIAM International Conference on Data Mining (SDM)
CacheAudit: A Tool for the Static Analysis of Cache Side Channels  2013  2013   Goran Doychev, Dominik Feld, Boris Köpf, Laurent Mauborgne, Jan Reineke  Proceedings of the 22nd USENIX Security Symposium (USENIX '13)
Callee-site Rewriting of Sealed System Libraries  2013  2013   Philipp von Styp-Rekowsky, Sebastian Gerling, Michael Backes, Christian Hammer
Causality-Based Verification of Multi-threaded Programs  2013  2013   Andrey Kupriyanov, Bernd Finkbeiner  Proc. of the 24th International Conference on Concurrency Theory (CONCUR 2013)
Checked coverage: an indicator for oracle quality  2013  2013   David Schuler, Andreas Zeller
Classifying code changes and predicting defects using changegenealogies  2013  2013   Kim Herzig, Sascha Just, Andreas Rau, Andreas Zeller
Client-controlled Cryptography-as-a-Service in the Cloud  2013  2013   Sören Bleikertz, Sven Bugiel, Hugo Ideler, Stefan Nürnberger, Ahmad-Reza Sadeghi  11th International Conference on Applied Cryptography and Network Security (ACNS'13)
CompCertTSO: A Verified Compiler for Relaxed-Memory Concurrency  2013  2013   Jaroslav Sevcík, Viktor Vafeiadis, Francesco Zappa Nardelli, Suresh Jagannathan, Peter Sewell
Compositional Equivalence Checking for Models and Code of Control Systems  2013  2013   Rupak Majumdar, Indranil Saha, Koichi Ueda, Hakan Yazarel  Proc. of the 52nd IEEE Conference on Decision and Control (CDC 2013)
Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized Verification  2013  2013   Michael Backes, Fabian Bendun, Dominique Unruh  Principles of Security and Trust 2013
Constrained fractional set programs and their application in local clustering and community detection  2013  2013   Thomas Bühler, Syama Sundar Rangapuram, Simon Setzer, Matthias Hein  Proceedings of the 30th International Conference on Machine Learning, ICML 2013, Atlanta, GA, USA, 16-21 June 2013
Contractions, Removals and How to Certify 3-Connectivity in Linear Time.  2013  2013   Jens M Schmidt  SIAM Journal on Computing
Covering and Uncovering Equivalent Mutants  2013  2013   David Schuler, Andreas Zeller
DEMO: Secure and Customizable Web Development in the SAFE Activation Framework  2013  2013   Raphael M. Reischuk, Florian Schröder, Johannes Gehrke  CCS~'13: Proceedings of the 20th ACM Conference on Computer and Communications Security
Dependent Type Theory for Verification of Information Flow and Access Control Policies  2013  2013   Aleksandar Nanevski, Anindya Banerjee, Deepak Garg
Detecting Bicliques in GF[q]  2013  2013   Jan Ramon, Pauli Miettinen, Jilles Vreeken  Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECMLPKDD)
Detecting Deadlock in Programs with Data-Centric Synchronization  2013  2013   Daniel Marino, Christian Hammer, Julian Dolby, Mandana Vaziri, Frank Tip, Jan Vitek  ICSE '13: Proceedings of the 35th International Conference on Software Engineering
Differential Privacy by Typing in Security Protocols  2013  2013   Fabienne Eigner, Matteo Maffei  Proceedings of the 26th IEEE Computer Security Foundations Symposium (CSF '13)
Differential Privacy by Typing in Security Protocols  2013  2013   Fabienne Eigner, Matteo Maffei  Proc. 1st Workshop on Hot Issues in Security Principles and Trust (HotSpot 2013)
Differentially Private Smart Metering with Battery Recharging  2013  2013   Michael Backes, Sebastian Meiser  Proceedings of the 8th International Workshop on Data Privacy Managemant (DPM 2013)
Discovering semantic relations from the web and organizing them with PATTY  2013  2013   Ndapandula Nakashole, Gerhard Weikum, Fabian M Suchanek
ESPOON$_ERBAC$: Enforcing Security Policies in Outsourced Environments  2013  2013   Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo
Efficient Algorithms for Control Closures  2013  2013   Christian Hammer  1st International Workshop on Interference and Dependence
Efficient Discovery of the Most Interesting Associations  2013  2013   Geoffrey Webb, Jilles Vreeken
Efficient OR Hadoop: Why not both?  2013  2013   Jens Dittrich, Stefan Richter, Stefan Schuh, Jorge-Arnulfo Quiané-Ruiz
Efficient partitioning of sporadic real-time tasks with shared resources and spin locks  2013  2013   Alexander Wieder, Björn B. Brandenburg  8th IEEE International Symposium on Industrial Embedded Systems, SIES 2013, Porto, Portugal, June 19-21, 2013
Elephant, Do Not Forget Everything! Efficient Processing of Growing Datasets  2013  2013   Jorg Schad, Jorge-Arnulfo Quiané-Ruiz, Jens Dittrich  Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing (CLOUD)
Entwicklung sicherer Software durch Security by Design  2013  2013   Eric Bodden, Markus Schneider, Michael Kreutzer, Mira Mezini, Christian Hammer, Andreas Zeller, Dirk Achenbach, Matthias Huber, Daniel Kraschewski
Eradicating DNS Rebinding with the Extended Same-Origin Policy  2013  2013   Martin Johns, Sebastian Lekies, Ben Stock  22nd USENIX Security Symposium
Every DFS Tree of a 3-Connected Graph Contains a Contractible Edge  2013  2013   Amr Elmasry, Jens M. Schmidt, Kurt Mehlhorn
Expand, Enlarge, and Check for Branching Vector Addition Systems  2013  2013   Rupak Majumdar, Zilong Wang  Proc. of the 24th International Conference on Concurrency Theory (CONCUR 2013)
Fine-grained Semantic Typing of Emerging Entities  2013  2013   Ndapandula Nakashole, Tomasz Tylenda, Gerhard Weikum  Proc. of the 51st Annual Meeting of the Association for Computational Linguistics (ACL-51)
Flexible Access Control for JavaScript  2013  2013   Gregor Richards, Christian Hammer, Francesco Zappa Nardelli, Suresh Jagannathan, Jan Vitek  Proceedings of the 2013 ACM SIGPLAN international conference on Object oriented programming systems languages and applications
Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies  2013  2013   Sven Bugiel, Stephan Heuser, Ahmad-Reza Sadeghi  22nd USENIX Security Symposium (USENIX Security '13)
Gadge Me if You Can: Secure and Efficient Ad-Hoc Instruction-Level Randomization for x86 and ARM  2013  2013   Lucas Vincenzo Davi, Alexandra Dmitrienko, Stefan Nürnberger, Ahmad-Reza Sadeghi  8th ACM SIGSAC symposium on Information, computer and communications security (ACM ASIACCS 2013)
Gem-based Entity-Knowledge Maintenance  2013  2013   Bilyana Taneva, Gerhard Weikum  Proc. of the 22nd ACM International Conference on Information and Knowledge Management (CIKM'13)
Generating Test Suites with Augmented Dynamic Symbolic Execution  2013  2013   Konrad Jamrozik, Gordon Fraser, Nikolai Tillmann, Jonathan De Halleux  Proc. of the 7th International Conference on Tests and Proofs (TAP 2013)
HYENA-live: Fine-Grained Online Entity Type Classification from Natural-language Text  2013  2013   Mohamed Amir Yosef, Sandro Bauer, Johannes Hoffart, Marc Spaniol, Gerhard Weikum  Proc. of the 51st Annual Meeting of the Association for Computational Linguistics (ACL-51)
How Achaeans Would Construct Columns in Troy  2013  2013   Alekh Jindal, Felix Martin Schuhknecht, Jens Dittrich, Karen Khachatryan, Alexander Bunte  CIDR 2013, Sixth Biennial Conference on Innovative Data Systems Research, Asilomar, CA, USA, January 6-9, 2013, Online Proceedings
How to make ad hoc proof automation less ad hoc  2013  2013   Georges Gonthier, Beta Ziliani, Aleksandar Nanevski, Derek Dreyer
Idea: Callee-Site Rewriting of Sealed System Libraries  2013  2013   Philipp von Styp-Rekowsky, Sebastian Gerling, Michael Backes, Christian Hammer  International Symposium on Engineering Secure Software and Systems (ESSoS'13)
Identity-Based Steganography and Its Applications to Censorship Resistance  2013  2013   Tim Ruffing, Jonas Schneider, Aniket Kate  6th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2013)
Improved analysis and evaluation of real-time semaphore protocols for P-FP scheduling  2013  2013   Björn B. Brandenburg  19th IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS 2013, Philadelphia, PA, USA, April 9-11, 2013
Incremental Inductive Coverability  2013  2013   Johannes Kloos, Rupak Majumdar, Filip Niksic, Ruzica Piskac  Proc. of the 25th International Conference on Computer Aided Verification (CAV 2013)
It's not a bug, it's a feature: how misclassification impacts bug prediction  2013  2013   Kim Herzig, Sascha Just, Andreas Zeller  Proc. of the 35th International Conference on Software Engineering (ICSE 2013)
Learning People Detectors for Tracking in Crowded Scenes  2013  2013   Siyu Tang, Mykhaylo Andriluka, Anton Milan, Konrad Schindler, Stefan Roth, Bernt Schiele  IEEE International Conference on Computer Vision (ICCV)
Learning Smooth Pooling Regions for Visual Recognition  2013  2013   Mateusz Malinowski, Mario Fritz  British Machine Vision Conference, BMVC 2013, Bristol, UK, September 9-13, 2013
Limitations of the Meta-reduction Technique: The Case of Schnorr Signatures  2013  2013   Marc Fischlin, Nils Fleischhacker  Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Technique (EUROCRYPT '13)
Limitations of the Meta-reduction Technique: The Case of Schnorr Signatures  2013  2013   Marc Fischlin, Nils Fleischhacker  Proc. of the Annual International Conference on the Theory and Applications of Cryptographic Technique (EUROCRYPT 2013)
Logical Foundations of Secure Resource Management  2013  2013   Michele Bugliesi, Stefano Calzavara, Fabienne Eigner, Matteo Maffei  Proc. of the 2nd Conference on Principles of Security and Trust (POST 2013)
Lossy Channel Games under Incomplete Information  2013  2013   Rayna Dimitrova, Bernd Finkbeiner  Proceedings 1st International Workshop on Strategic Reasoning (SR'13)
Maximum Entropy Models for Iteratively Identifying Subjectively Interesting Structure in Real-Valued Data  2013  2013   Kleanthis-Nikolaos Kontonasios, Jilles Vreeken, Tijl De Bie  Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECMLPKDD)
Measurement-based modeling of the cache replacement policy  2013  2013   Andreas Abel, Jan Reineke  19th IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS 2013, Philadelphia, PA, USA, April 9-11, 2013
Mining Connection Pathways for Marked Nodes in Large Graphs  2013  2013   Leman Akoglu, Jilles Vreeken, Hanghang Tong, Duen Horn Chau, Nikolaj Tatti, Christos Faloutsos  Proceedings of the SIAM International Conference on Data Mining (SDM)
Mining Frequently Co-occurring Object Sets over Multiple Neighborhoods  2013  2013   Emin Aksehirli, Bart Goethals, Emmanuel Müller, Jilles Vreeken  Proceedings of the IEEE International Conference on Data Mining (ICDM)
Mining behavior models from enterprise web applications  2013  2013   Matthias Schur, Andreas Roth, Andreas Zeller  Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, ESEC/FSE'13
Model Checking Database Applications  2013  2013   Milos Gligoric, Rupak Majumdar  Proc. of the 20th International Symposium on Static Analysis (SAS 2013)
Mosquito: Another One Bites the Data Upload STream  2013  2013   Stefan Richter, Jens Dittrich, Stefan Schuh, Tobias Frey
MrCrypt: Static Analysis for Secure Cloud Computations  2013  2013   Sai Deep Tetali, Mohsen Lesani, Rupak Majumdar, Todd Millstein  Proc. of the 2013 ACM SIGPLAN International Conference on Object Oriented Programming Systems, Languages, and Applications (OOPSLA 2013)
Mtac: a monad for typed tactic programming in Coq  2013  2013   Beta Ziliani, Derek Dreyer, Neelakantan R. Krishnaswami, Aleksandar Nanevski, Viktor Vafeiadis  Proc of the 18th ACM SIGPLAN International Conference on Functional Programming (ICFP '13)
Multi-class Video Co-segmentation with a Generative Multi-video Model  2013  2013   Walon Wei-Chen, Mario Fritz  2013 IEEE Conference on Computer Vision and Pattern Recognition, Portland, OR, USA, June 23-28, 2013
Multiprocessor Feasibility Analysis of Recurrent Task Systems with Specified Processor Affinities  2013  2013   Sanjoy Baruah, Björn B. Brandenburg  Proceedings of the IEEE 34th Real-Time Systems Symposium, RTSS 2013, Vancouver, BC, Canada, December 3-6, 2013
Off-line/on-line signatures revisited: a general unifying paradigm, efficient threshold variants and experimental results  2013  2013   Emmanuel Bresson, Dario Catalano, Mario Raimondo, Dario Fiore, Rosario Gennaro
On Spin Locks in AUTOSAR: Blocking Analysis of FIFO, Unordered, and Priority-Ordered Spin Locks  2013  2013   Alexander Wieder, Björn B. Brandenburg  Proceedings of the IEEE 34th Real-Time Systems Symposium, RTSS 2013, Vancouver, BC, Canada, December 3-6, 2013
On sampling the wisdom of crowds: random vs. expert sampling of the twitter stream  2013  2013   Saptarshi Ghosh, Muhammad Bilal Zafar, Parantapa Bhattacharya, Naveen Kumar Sharma, Niloy Ganguly, Krishna P. Gummadi  Proc. of the 22nd ACM International Conference on Information and Knowledge Management (CIKM'13)
On-the-fly verification and optimization of DTA-properties for large Markov chains  2013  2013   Linar Mikeev, Martin R. Neuhäußer, David Spieler, Verena Wolf
Parameterized verification of asynchronous shared-memory systems  2013  2013   Javier Esparza, Pierre Ganty, Rupak Majumdar  Proc. of the 25th International Conference on Computer Aided Verification (CAV 2013)
Peer-assisted Content Distribution in Akamai Netsession  2013  2013   Mingchen Zhao, Paarijaat Aditya, Ang Chen, Yin Lin, Andreas Haeberlen, Peter Druschel, Bruce Maggs, Bill Wishon, Miroslav Ponec  Proc. of the 2013 Internet Measurement Conference (IMC'13)
Poster: Identity-Based Steganography and Its Applications to Censorship Resistance  2013  2013   Tim Ruffing, Jonas Schneider, Aniket Kate  Proceedings of the 20th ACM Conference on Computer and Communication Security (CCS '13)
Practical Homomorphic MACs for Arithmetic Circuits  2013  2013   Dario Catalano, Dario Fiore  Proc. of the Annual International Conference on the Theory and Applications of Cryptographic Technique (EUROCRYPT 2013)
Precise timing analysis for direct-mapped caches  2013  2013   Sidharta Andalam, Alain Girault, Roopak Sinha, Partha S. Roop, Jan Reineke  The 50th Annual Design Automation Conference 2013, DAC '13, Austin, TX, USA, May 29 - June 07, 2013
Predicting defects using change genealogies  2013  2013   Kim Herzig, Sascha Just, Andreas Rau, Andreas Zeller  Proc. of the 24th International IEEE Symposium on Software Reliability Engineering (ISSRE 2013)
Preventing Side-Channel Leaks in Web Traffic: A Formal Approach  2013  2013   Michael Backes, Goran Doychev, Boris Köpf  Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS '13)
Privacy-Preserving Accountable Computation  2013  2013   Michael Backes, Dario Fiore, Esfandiar Mohammadi  Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS)
Pseudorandom signatures  2013  2013   Nils Fleischhacker, Felix Günther, Franziskus Kiefer, Mark Manulis, Bertram Poettering  Proc. of the 8th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2013)
Real-time High Performance Deformable Models for Face Detection in the Wild  2013  2013   Junjie Yan, Xucong Zhang, Zhen Lei, Stan Z Li  Proceedings of the IAPR International Conference on Biometrics (ICB)
Reconstructing Core Dumps  2013  2013   Jeremias Rößler, Andreas Zeller, Gordon Fraser, Cristian Zamfir, George Candea  Proc. of the Sixth International IEEE Conference on Software Testing, Verification and Validation (ICST 2013)
Relational Abstract Interpretation for the Verification of 2-Hypersafety Properties  2013  2013   Bernd Finkbeiner, Helmut Seidl, Máté Kovács  Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS '13)
Relational abstract interpretation for the verification of 2-hypersafety properties  2013  2013   Máté Kovács, Helmut Seidl, Bernd Finkbeiner  Proc. of the 20th ACM Conference on Computer and Communication Security (CCS 2013)
Robust Multi-resolution Pedestrian Detection in Traffic Scenes  2013  2013   Junjie Yan, Xucong Zhang, Zhen Lei, ShengCai Liao, Stan Z Li  IEEE Conference Computer Vision and Pattern Recognition (CVPR)
Sambamba: Runtime Adaptive Parallel Execution  2013  2013   Kevin Streit, Clemens Hammacher, Andreas Zeller, Sebastian Hack  Proceedings of the 3rd International Workshop on Adaptive Self-Tuning Computing Systems
Schedulability Analysis of the Linux Push and Pull Scheduler with Arbitrary Processor Affinities  2013  2013   Arpan Gujarati, Felipe Cerqueira, Björn B. Brandenburg  25th Euromicro Conference on Real-Time Systems, ECRTS 2013, Paris, France, July 9-12, 2013
Search-based data-flow test generation  2013  2013   Mattia Vivanti, Andre Mis, Alessandra Gorla, Gordon Fraser  IEEE 24th International Symposium on Software Reliability Engineering, ISSRE 2013, Pasadena, CA, USA, November 4-7, 2013
Security and Privacy by Declarative Design  2013  2013   Matteo Maffei, Kim Pecina, Manuel Reinert  Proceedings of the IEEE 26th Computer Security Foundations Symposium (CSF '16)
Sequential Bayesian Model Update under Structured Scene Prior for Semantic Road Scenes Labeling  2013  2013   Evgeny Levinkov, Mario Fritz  IEEE International Conference on Computer Vision, ICCV 2013, Sydney, Australia, December 1-8, 2013
SplitX: high-performance private analytics  2013  2013   Ruichuan Chen, Istemi Ekin Akkus, Paul Francis  Proc. of the ACM SIGCOMM 2013 Conference
Static Provenance Verification for Message Passing Programs  2013  2013   Rupak Majumdar, Roland Meyer, Zilong Wang  Proc. of the 20th International Symposium on Static Analysis (SAS 2013)
Strong Appearance and Expressive Spatial Models for Human Pose Estimation  2013  2013   Leonid Pishchulin, Mykhaylo Andriluka, Peter Gehler, Bernt Schiele  IEEE International Conference on Computer Vision (ICCV)
Summarizing Categorical Data by Clustering Attributes  2013  2013   Michael Mampaey, Jilles Vreeken
Supervisor Synthesis for Controller Upgrades  2013  2013   Johannes Kloos, Rupak Majumdar  Proc. of the Conference on Design, Automation and Test in Europe (DATE 2013)
Supporting Complex Queries and Access Policies for Multi-user Encrypted Databases  2013  2013   Muhammad Rizwan Asghar, Giovanni Russello, Bruno Crispo, Mihaela Ion  Proceedings of the 2013 ACM Workshop on Cloud Computing Security Workshop
Synthesis of fixed-point programs  2013  2013   Eva Darulova, Viktor Kuncak, Rupak Majumdar, Indranil Saha  Proc. of the International Conference on Embedded Software (EMSOFT 2013)
The OMLP family of optimal multiprocessor real-time locking protocols  2013  2013   Björn B. Brandenburg, James H. Anderson
The Uncracked Pieces in Database Cracking  2013  2013   Felix Martin Schuhknecht, Alekh Jindal, Jens Dittrich
The impact of tangled code changes  2013  2013   Kim Herzig, Andreas Zeller  Proc. of the 10th Working Conference on Mining Software Repositories (MSR 2013)
Theory of Multi Core Hypervisor Verification  2013  2013   Ernie Cohen, Wolfgang J. Paul, Sabine Schmaltz  Proc. 39th International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM 2013)
Towards Efficient Traffic-analysis Resistant Anonymity Networks  2013  2013   Stevens Le Blond, David Choffnes, Wenxuan Zhou, Peter Druschel, Hitesh Ballani, Paul Francis  Proc. of the ACM SIGCOMM 2013 Conference
Towards Practical Communication in Byzantine-Resistant DHTs  2013  2013   Maxwell Young, Aniket Kate, Ian Goldberg, Martin Karsten
Towards Zero-Overhead Static and Adaptive Indexing in Hadoop  2013  2013   Stefan Richter, Jorge-Arnulfo Quiané-Ruiz, Stefan Schuh, Jens Dittrich
Towards practical privacy-preserving Digital Rights Management for Cloud Computing  2013  2013   Nakul Joshi, Ronald Petrlic  Proceedings of The 10th Annual IEEE Consumer Communications & Networking Conference (CCNC 2013)
Towards realistic team formation in social networks based on densest subgraphs  2013  2013   Syama Sundar Rangapuram, Thomas Bühler, Matthias Hein  22nd International World Wide Web Conference, WWW '13, Rio de Janeiro, Brazil, May 13-17, 2013
Tweet4act: Using Incident-Specific Profiles for Classifying Crisis-Related Messages  2013  2013   Soudip Roy Chowdhury, Muhammad Imran, Muhammad Rizwan Asghar, Sihem Amer-Yahia, Carlos Castillo  The 10th International Conference on Information Systems for Crisis Response and Management (ISCRAM)
Union, Intersection, and Refinement Types and Reasoning About Type Disjointness for Secure Protocol Implementations  2013  2013   Michael Backes, Cătălin Hriţcu, Matteo Maffei
Unlinkable content playbacks in a multiparty DRM system  2013  2013   Ronald Petrlic, Stephan Sekula  Data and Applications Security and Privacy XXVII
Using Mobile Device Communication to Strengthen e-Voting Protocols  2013  2013   Michael Backes, Martin Gagné, Malte Skoruppa  Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society - WPES 2013
Vector Commitments and Their Applications  2013  2013   Dario Catalano, Dario Fiore  Proc. of the 16th International Conference on Practice and Theory in Public Key Cryptography (PKC 2013)
Verifiable Delegation of Computation on Outsourced Data  2013  2013   Michael Backes, Dario Fiore, Raphael M. Reischuk  Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS '11)
WWHow! Freeing Data Storage from Cages  2013  2013   Alekh Jindal, Jorge-Arnulfo Quiané-Ruiz, Jens Dittrich  Proceedings of the 6th Biennial Conference on Innovative Data Systems Research (CIDR)
WebMate: Generating Test Cases for Web 2.0  2013  2013   Valentin Dallmeier, Martin Burger, Tobias Orth, Andreas Zeller  Proc. Software Quality Days 2013
What's in the apps for context?: extending a sensor for studying app usage to informing context-awareness  2013  2013   Matthias Böhmer, Christian Lander, Antonio Krüger  Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication. International Conference on Ubiquitous Computing (Ubicomp-13), September 8-12, Zurich, Switzerland
Where Next in Object Recognition and how much Supervision Do We Need?  2013  2013   Sandra Ebert, Bernt Schiele
Where Should We Fix This Bug? A Two-Phase Recommendation Model  2013  2013   Dongsun Kim, Yida Tao, Sunghun Kim, Andreas Zeller
Wie realistisch ist ein Recht auf Vergessenwerden?  2013  2013   Sebastian Gerling, Rainer W. Gerling
A Perfect Model for Bounded Verification  2012  2012   Javier Esparza, Pierre Ganty, Rupak Majumdar  Proc. of the 27th Annual IEEE/ACM Symposium on Logic in Computer Science (LICS 2012)
A Weakly Supervised Model for Sentence-Level Semantic Orientation Analysis with Multiple Experts  2012  2012   Lizhen Qu, Rainer Gemulla, Gerhard Weikum  Proc. of the Joint Conference on Empirical Methods for Natural Language Processing and Computational Natural Language Learning (EMNLP-CoNLL'12)
A comparative analysis of decentralized power grid stabilization strategies  2012  2012   Arnd Hartmanns, Holger Hermanns, Pascal Berrang  Proceedings of the Winter Simulation Conference
A data-centric approach to synchronization  2012  2012   Julian Dolby, Christian Hammer, Daniel Marino, Frank Tip, Mandana Vaziri, Jan Vitek
A dynamic program analysis to find floating-point accuracy problems  2012  2012   Florian Benz, Andreas Hildebrandt, Sebastian Hack  ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '12, Beijing, China - June 11 - 16, 2012
A geometric approach to robotic laundry folding  2012  2012   Stephen Miller, Jur van den Berg, Mario Fritz, Trevor Darrell, Kenneth Y. Goldberg, Pieter Abbeel
A self-healing technique for Java applications  2012  2012   Antonio Carzaniga, Alessandra Gorla, Andrea Mattavelli, Nicolò Perino  34th International Conference on Software Engineering, ICSE 2012, June 2-9, 2012, Zurich, Switzerland
ACTORS: A Goal-Driven Approach for Capturing and Managing Consent in e-Health Systems  2012  2012   Muhammad Rizwan Asghar, Giovanni Russello  2012 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY)
Accountability and Trust in Cooperative Information Systems  2012  2012   Peter Druschel  Proc. of the 28th IEEE International Conference on Data Engineering (ICDE'12)
Ace: An Efficient Key-Exchange Protocol for Onion Routing  2012  2012   Michael Backes, Aniket Kate, Esfandiar Mohammadi  Proceedings of the 11th ACM Workshop on Privacy in the Electronic Society (WPES)
Active Metric Learning for Object Recognition  2012  2012   Sandra Ebert, Mario Fritz, Bernt Schiele  Pattern Recognition - Joint 34th DAGM and 36th OAGM Symposium, Graz, Austria, August 28-31, 2012. Proceedings
Adding fake facts to ontologies  2012  2012   Fabian M Suchanek, David Gross-Amblard  Proc. of the 21st International Conference on World Wide Web (WWW 2012)
Adding query privacy to robust DHTs  2012  2012   Michael Backes, Ian Goldberg, Aniket Kate, Tomas Toft  Proc. of the 7th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2012)
Affine Refinement Types for Authentication and Authorization  2012  2012   Michele Bugliesi, Stefano Calzavara, Fabienne Eigner, Matteo Maffei  Proc. 6th International Symposium on Trustworthy Global Computing (TGC 2012)
Algorithmic Verification of Asynchronous Programs  2012  2012   Pierre Ganty, Rupak Majumdar
An Empirical Evaluation of the Influence of the Load-Store Unit on WCET Analysis  2012  2012   Mohamed Abdel Maksoud, Jan Reineke  12th International Workshop on Worst-Case Execution Time Analysis, WCET 2012, July 10, 2012, Pisa, Italy
An O(n+m) Certifying Triconnnectivity Algorithm for Hamiltonian Graphs  2012  2012   Amr Elmasry, Kurt Mehlhorn, Jens M. Schmidt
Approximately Bisimilar Symbolic Models for Digital Control Systems  2012  2012   Rupak Majumdar, Majid Zamani  Proc. of the 24th International Conference on Computer Aided Verification (CAV 2012)
Articulated People Detection and Pose Estimation: Reshaping the Future  2012  2012   Leonid Pishchulin, Arjun Jain, Mykhaylo Andriluka, Thorsten Thormählen, Bernt Schiele  Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
Automated Synthesis of Secure Distributed Applications  2012  2012   Michael Backes, Matteo Maffei, Kim Pecina  Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS '12)
Automatically Generating Test Cases for Specification Mining  2012  2012   Valentin Dallmeier, Nikolai Knopp, Christoph Mallon, Gordon Fraser, Sebastian Hack, Andreas Zeller
Big Data Methods for Computational Linguistics  2012  2012   Gerhard Weikum, Johannes Hoffart, Ndapandula Nakashole, Marc Spaniol, Fabian M Suchanek, Mohamed Amir Yosef
Brief announcement: distributed cryptography using trinc  2012  2012   Michael Backes, Fabian Bendun, Aniket Kate  ACM Symposium on Principles of Distributed Computing 2012
CLSE: Closed-Loop Symbolic Execution  2012  2012   Rupak Majumdar, Indranil Saha, K C Shashidhar, Zilong Wang  Proc. of the 4th International Symposium on NASA Formal Methods (NFM 2012)
Certifying 3-Connectivity in Linear Time  2012  2012   Jens M Schmidt  Proc. 39th International Colloquium on Automata, Languages and Programming (ICALP 2012)
Comparing Apples and Oranges : Measuring Differences between Exploratory Data Mining Results  2012  2012   Nikolaj Tatti, Jilles Vreeken
Completing the Automated Verification of a Small Hypervisor - Assembler Code Verification  2012  2012   Wolfgang J. Paul, Sabine Schmaltz, Andrey Shadrin  Proc. 10th International Conference on Software Engineering and Formal Methods (SEFM 2012)
Computational Soundness without Protocol Restrictions  2012  2012   Michael Backes, Ankit Malik, Dominique Unruh  Proceedings of the 19th ACM Conference on Computer and Communication Security (CCS '12)
Counterexample-Guided Synthesis of Observation Predicates  2012  2012   Rayna Dimitrova, Bernd Finkbeiner  Proceedings of the 10th International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS'12)
Countermodels from Sequent Calculi in Multi-Modal Logics  2012  2012   Deepak Garg, Valerio Genovese, Sara Negri  Proc. of the 27th Annual IEEE Symposium on Logic in Computer Science (LICS 2012)
Defending Against Large-scale Crawls in Online Social Networks  2012  2012   Mainack Mondal, Bimal Viswanath, Allen Clement, Peter Druschel, Krishna P. Gummadi, Alan Mislove, Ansley Post  Conference on emerging Networking Experiments and Technologies, CoNEXT '12, Nice, France - December 10 - 13, 2012
Dependability Results for Power Grids with Decentralized Stabilization Strategies  2012  2012   Pascal Berrang, Jonathan Bogdoll, Ernst Moritz Hahn, Arnd Hartmanns, Holger Hermanns
Diffusion-Based Image Compression in Steganography  2012  2012   Markus Mainberger, Michael Backes, Matthias Berg, Joachim Weickert  Proceedings of the 8th International Symposium on Visual Computing -- ISVC 2012
Discovering Descriptive Tile Trees by Fast Mining of Optimal Geometric Subtiles  2012  2012   Nikolaj Tatti, Jilles Vreeken  Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECMLPKDD)
Discovering and Exploring Relations on the Web  2012  2012   Ndapandula Nakashole, Gerhard Weikum, Fabian M Suchanek
EXSYST: Search-based GUI testing  2012  2012   Florian Gross, Gordon Fraser, Andreas Zeller  Proc. of the 34th International Conference on Software Engineering (ICSE 2012)
Efficient Big Data Processing in Hadoop MapReduce  2012  2012   Jens Dittrich, Jorge-Arnulfo Quiané-Ruiz
Efficient May Happen in Parallel Analysis for Async-finish Parallelism  2012  2012   Jonathan K. Lee, Jens Palsberg, Rupak Majumdar, Hong Hong  Proc. of the 19th International Symposium on Static Analysis (SAS 2012)
Efficient Parallel Path Checking for Linear-Time Temporal Logic With Past and Bounds  2012  2012   Lars Kuhtz, Bernd Finkbeiner  Logical Methods in Computer Science (LMCS'12)
Enforceable Security Policies Revisited  2012  2012   David Basin, Vincent Jugé, Felix Klaedtke, Eugen Zvalinescu  Proc. 1st Conference on Principles of Security and Trust (POST)
Engage: A Deployment Management System  2012  2012   Jeffrey Fischer, Rupak Majumdar, Shahram Esmaeilsabzali  Proc. of the 33rd ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2012)
Equivalence of Games with Probabilistic Uncertainty and Partial-Observation Games  2012  2012   Krishnendu Chatterjee, Martin Chmelik, Rupak Majumdar  Proc. of the 10th International Symposium on Automated Technology for Verification and Analysis (ATVA 2012)
Exploring the design space of social network-based Sybil defense  2012  2012   Bimal Viswanath, Mainack Mondal, Allen Clement, Peter Druschel, Krishna P. Gummadi, Alan Mislove, Ansley Post  Proc. of the 4th International Conference on Communication Systems and Networks (COMSNETS2012)
Fast and Reliable Anomaly Detection in Categoric Data  2012  2012   Leman Akoglu, Hanghang Tong, Jilles Vreeken, Christos Faloutsos  Proceedings of ACM Conference on Information and Knowledge Mining (CIKM)
Flexible and Dynamic Consent-Capturing  2012  2012   Muhammad Rizwan Asghar, Giovanni Russello
Fuzzing with Code Fragments  2012  2012   Christian Holler, Kim Herzig, Andreas Zeller  Proc. of the 21st Usenix Security Symposium
Harmony and dissonance: organizing the people's voices on political controversies  2012  2012   Rawia Awadallah, Maya Ramanath, Gerhard Weikum  Proc. of the 5th ACM International Conference on Web Search and Data Mining (WSDM'12)
History-Free Sequential Aggregate Signatures  2012  2012   Marc Fischlin, Anja Lehmann, Dominique Schröder  Proc. 8th International Conference on Security and Cryptography for Networks (SCN 2012)
Input-Output stability for discrete systems  2012  2012   Paulo Tabuada, Ayca Balkan, Sina Yamac Caliskan, Yasser Shoukry, Rupak Majumdar  Proc. of the International Conference on Embedded Software (EMSOFT 2012)
Integrated Semantics of Intermediate-Language C and Macro-Assembler for Pervasive Formal Verification of Operating Systems and Hypervisors from VerisoftXT  2012  2012   Sabine Schmaltz, Andrey Shadrin  Proc. 4th International Conference on Verified Software: Theories, Tools, and Experiments (VSTTE 2012)
Interactively and Visually Exploring Tours of Marked Nodes in Large Graphs  2012  2012   Duen Horng Chau, Leman Akoglu, Jilles Vreeken, Hanghang Tong, Christos Faloutsos  Proceedings of IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)
Isolating failure causes through test case generation  2012  2012   Jeremias Rößler, Gordon Fraser, Andreas Zeller, Alessandro Orso  Proc. of the 2012 International Symposium on Software Testing and Analysis (ISSTA 2012)
KORE: keyphrase overlap relatedness for entity disambiguation  2012  2012   Johannes Hoffart, Stephan Seufert, Dat Ba Nguyen, Martin Theobald, Gerhard Weikum  Proc. of the 21st ACM International Conference on Information and Knowledge Management (CIKM'12)
LINDA: distributed web-of-data-scale entity matching  2012  2012   Christoph Böhm, Gerard Melo de, Felix Naumann, Gerhard Weikum  Proc. of the 21st ACM International Conference on Information and Knowledge Management (CIKM'12)
Labeled Goal-Directed Search in Access Control Logic  2012  2012   Valerio Genovese, Deepak Garg, Daniele Rispoli  Proc. of the 8th International Workshop on Security and Trust Management (STM 2012)
Labeled Sequent Calculi for Access Control Logics: Countermodels, Saturation and Abduction  2012  2012   Valerio Genovese, Deepak Garg, Daniele Rispoli  Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF '12)
Language-Theoretic Abstraction Refinement  2012  2012   Zhenyue Long, Georgel Calin, Rupak Majumdar, Roland Meyer  Proc. of the 15th International Conference on Fundamental Approaches to Software Engineering (FASE 2012)
Lazy Synthesis  2012  2012   Bernd Finkbeiner, Swen Jacobs  Proceedings of the 13th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI'12)
Marathon: Detecting Atomic-Set Serializability Violations with Conflict Graphs  2012  2012   William N Sumner, Christian Hammer, Julian Dolby
Matching Points of Interest from Different Social Networking Sites  2012  2012   Tatjana Scheffler, Rafael Schirru, Paul Lehmann
Merging the Cryptographic Security Analysis and the Algebraic-Logic Security Proof of PACE  2012  2012   Lassaad Cheikhrouhou, Werner Stephan, Marc Fischlin, Markus Ullmann  Sicherheit 2012 -- Beiträge der 6-ten Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e. V.
Mining Models  2012  2012   Andreas Zeller  Proc. of the 19th International Workshop on Model Checking Software (SPIN 2012)
Mining and Visualizing Connection Pathways in Large Information Networks  2012  2012   Leman Akoglu, Jilles Vreeken, Hanghang Tong, Duen Horng Chau, Christos Faloutsos  Proceedings of the Workshop on Information in Networks (WIN)
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones  2012  2012   Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi  Proceedings of the 19th Annual Symposium on Network and Distributed System Security (NDSS '12)
Model Checking Information Flow in Reactive Systems  2012  2012   Rayna Dimitrova, Bernd Finkbeiner, Máté Kovács, Markus N. Rabe, Helmut Seidl  Proc. 13th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI)
Monitoring Realizability  2012  2012   Rüdiger Ehlers, Bernd Finkbeiner  Proceedings of the Second International Conference on Runtime Verification (RV'11)
Monitoring Temporal Information Flow  2012  2012   Rayna Dimitrova, Bernd Finkbeiner, Markus N. Rabe  Proc. 5th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA)
Monitoring compliance policies over incomplete and disagreeing logs  2012  2012   David Basin, Felix Klaedtke, Srdjan Marinovic, Eugen Zălinescu  Proceedings of the 3rd International Conference on Runtime Verification (RV'2012)
Mutation-Driven Generation of Unit Tests and Oracles  2012  2012   Gordon Fraser, Andreas Zeller
Non-tracking Web Analytics  2012  2012   Istemi Ekin Akkus, Ruichuan Chen, Michaela Hardt, Paul Francis, Johannes Gehrke  Proceedings of the 19th ACM Conference on Computer and Communication Security (CCS '12)
ObliviAd: Provably Secure and Practical Online Behavioral Advertising  2012  2012   Michael Backes, Aniket Kate, Matteo Maffei, Kim Pecina  Proceedings of the 33rd IEEE Symposium on Security and Privacy 2012 (Oakland 2012)
On the (Non-)Equivalence of UC Security Notions  2012  2012   Oana Ciobotaru  Proc. 6th International Conference on Provable Security (ProvSec 2012)
On the (limited) power of non-equivocation  2012  2012   Allen Clement, Flavio Junqueira, Aniket Kate, Rodrigo Rodrigues  Proc. of the 31st Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2012)
On the Development and Formalization of an Extensible Code Generator for Real Life Security Protocols  2012  2012   Michael Backes, Alex Busenius, Cătălin Hriţcu  Proc. 4th NASA Formal Methods Symposium (NFM 2012)
Only Aggressive Elephants are Fast Elephants  2012  2012   Jens Dittrich, Jorge-Arnulfo Quiané-Ruiz, Stefan Richter, Stefan Schuh, Alekh Jindal, Jorg Schad
OpinioNetIt: A Structured and Faceted Knowledge-base of Opinions  2012  2012   Rawia Awadallah, Maya Ramanath, Gerhard Weikum  Proc. of the 12th IEEE International Conference on Data Mining (ICDM'12)
PATTY: A Taxonomy of Relational Patterns with Semantic Types  2012  2012   Ndapandula Nakashole, Gerhard Weikum, Fabian M Suchanek  Proc. Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning (EMNLP-CoNLL 2012)
PolariCQ: polarity classification of political quotations  2012  2012   Rawia Awadallah, Maya Ramanath, Gerhard Weikum  Proc. of the 21st ACM International Conference on Information and Knowledge Management (CIKM'12)
Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services  2012  2012   Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi, Stefan Saroiu  Proceedings of the 21st Usenix Security Symposium (USENIX '12)
Polynomial Runtime and Composability  2012  2012   Dennis Hofheinz, Dominique Unruh, Jörn Müller-Quade
Predicting emerging social conventions in online social networks  2012  2012   Farshad Kooti, Winter A Mason, Krishna P. Gummadi, Meeyoung Cha  Proc. of the 21st ACM International Conference on Information and Knowledge Management (CIKM'12)
Privacy-Preserving Digital Rights Management in a Trusted Cloud Environment  2012  2012   Ronald Petrlic  Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12)
Proceedings of the 12th IEEE International Conference on Data Mining Workshops (ICDMW), IEEE, 2012  2012  2012   Jilles Vreeken, Charles X. Ling, Arno Siebes, Mohammed J. Zaki, Jeffrey Xu Yu, Bart Goethals, Geoffrey I. Webb, Xindong Wu
Proceedings of the ECML PKDD Workshop on Instant Interactive Data Mining (IID)  2012  2012   Jilles Vreeken, Matthijs van Leeuwen, Siegfried Nijssen, Nikolaj Tatti, Anton Dries, Bart Goethals
Proceedings of the Workshop on JavaScript Tools  2012  2012     Proceedings of the Workshop on JavaScript Tools
Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication  2012  2012   David Basin, Cas Cremers, Simon Meier  Proc. 1st Conference on Principles of Security and Trust (POST)
Provably Secure and Practical Onion Routing  2012  2012   Michael Backes, Aniket Kate, Ian Goldberg, Esfandiar Mohammadi  Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF)
Proving programs continuous: technical perspective  2012  2012   Andreas Zeller
Proxy Re-Encryption in a Privacy-Preserving Cloud Computing DRM Scheme  2012  2012   Ronald Petrlic  Cyberspace Safety and Security
Quantum Proofs of Knowledge  2012  2012   Dominique Unruh  Eurocrypt 2012
RALF: A reinforced active learning formulation for object class recognition  2012  2012   Sandra Ebert, Mario Fritz, Bernt Schiele  2012 IEEE Conference on Computer Vision and Pattern Recognition, Providence, RI, USA, June 16-21, 2012
Recognizing Materials from Virtual Examples  2012  2012   Wenbin Li, Mario Fritz  Computer Vision - ECCV 2012 - 12th European Conference on Computer Vision, Florence, Italy, October 7-13, 2012, Proceedings, Part IV
Reliable Client Accounting for P2P-infrastructure Hybrids  2012  2012   Paarijaat Aditya, Mingchen Zhao, Yin Lin, Andreas Haeberlen, Peter Druschel, Bruce Maggs, Bill Wishon  Proc. of the 9th Usenix Symposium on Networked Systems Design and Implementation (NSDI 2012)
SAFE Extensibility of Data-Driven Web Applications  2012  2012   Raphael M. Reischuk, Michael Backes, Johannes Gehrke  WWW~'12: Proceedings of the 21st International World Wide Web Conference
Sambamba: A Runtime System for Online Adaptive Parallelization  2012  2012   Kevin Streit, Clemens Hammacher, Andreas Zeller, Sebastian Hack  Proc. of the 21st International Conference Compiler Construction (CC 2012)
Scalable Testing of File System Checkers  2012  2012   João Carlos Menezes Carreira, Rodrigo Rodrigues, George Candea, Rupak Majumdar  Proc. of the 7th ACM European Conference on Computer Systems (EuroSys 2012)
Search-based system testing: high coverage, no false alarms  2012  2012   Florian Gross, Gordon Fraser, Andreas Zeller  Proc. International Symposium on Software Testing and Analysis (ISSTA 2012)
Securing Data Provenance in the Cloud  2012  2012   Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo
Security of Blind Signatures Revisited  2012  2012   Dominique Schröder, Dominique Unruh  PKC 2012
Semi-Supervised Learning on a Budget: Scaling Up to Large Datasets  2012  2012   Sandra Ebert, Mario Fritz, Bernt Schiele  Computer Vision - ACCV 2012 - 11th Asian Conference on Computer Vision, Daejeon, Korea, November 5-9, 2012, Revised Selected Papers, Part I
Softer Smartcards: Usable Cryptographic Tokens with Secure Execution  2012  2012   Franz Ferdinand Brasser, Sven Bugiel, Atanas Filyanov, Ahmad-Reza Sadeghi, Steffen Schulz  Financial Cryptography and Data Security (FC)
Sparselet Models for Efficient Multiclass Object Detection  2012  2012   Hyun Oh Song, Stefan Zickler, Tim Althoff, Ross B. Girshick, Mario Fritz, Christopher Geyer, Pedro F. Felzenszwalb, Trevor Darrell  Computer Vision - ECCV 2012 - 12th European Conference on Computer Vision, Florence, Italy, October 7-13, 2012, Proceedings, Part II
Spotting Culprits in Epidemics: How many and Which ones?  2012  2012   B. Aditya Prakash, Jilles Vreeken, Christos Faloutsos  Proceedings of the IEEE International Conference on Data Mining (ICDM)
Stateful authorization logic - Proof theory and a case study  2012  2012   Deepak Garg, Frank Pfenning
Summarising Event Sequences with Serial Episodes  2012  2012   Jilles Vreeken, Nikolaj Tatti  Proceedings of the fifth Workshop on Information Theoretic Methods in Science and Engineering (WITMSE)
Summarizing Data Succinctly with the Most Informative Itemsets  2012  2012   Michael Mampaey, Jilles Vreeken, Nikolaj Tatti
Superficially substructural types  2012  2012   Neelakantan R. Krishnaswami, Aaron Turon, Derek Dreyer, Deepak Garg  ACM SIGPLAN International Conference on Functional Programming (ICFP 2012)
Synthesis of minimal-error control software  2012  2012   Rupak Majumdar, Indranil Saha, Majid Zamani  Proc. of the International Conference on Embedded Software (EMSOFT 2012)
Template-Based Controller Synthesis for Timed Systems  2012  2012   Bernd Finkbeiner, Hans-Jörg Peter  Proc. 18th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 12)
The Complexity of Bounded Synthesis for Timed Control with Partial Observability  2012  2012   Hans-Jörg Peter, Bernd Finkbeiner  Proceedings of the 10th International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS'12)
The Long and the Short of It: Summarising Event Sequences with Serial Episodes  2012  2012   Nikolaj Tatti, Jilles Vreeken  Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD)
The Pooled NBNN Kernel: Beyond Image-to-Class and Image-to-Image  2012  2012   Konstantinos Rematas, Mario Fritz, Tinne Tuytelaars  Computer Vision - ACCV 2012 - 11th Asian Conference on Computer Vision, Daejeon, Korea, November 5-9, 2012, Revised Selected Papers, Part I
Three-valued abstraction for probabilistic systems  2012  2012   Joost-Pieter Katoen, Daniel Klink, Martin Leucker, Verena Wolf
Timely Object Recognition  2012  2012   Sergey Karayev, Tobias Baumgartner, Mario Fritz, Trevor Darrell  Advances in Neural Information Processing Systems 25: 26th Annual Conference on Neural Information Processing Systems 2012. Proceedings of a meeting held December 3-6, 2012, Lake Tahoe, Nevada, United States.
Towards Statistical Queries over Distributed Private User Data  2012  2012   Ruichuan Chen, Alexey Reznichenko, Paul Francis, Johannes Gehrke  Proc. of the 9th Usenix Symposium on Networked Systems Design and Implementation (NSDI 2012)
Towards Taming Privilege-Escalation Attacks on Android  2012  2012   Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi, Bhargava Shastry  19th Annual Network & Distributed System Security Symposium (NDSS'12)
Trigger memoization in self-triggered control  2012  2012   Indranil Saha, Rupak Majumdar  Proc. of the International Conference on Embedded Software (EMSOFT 2012)
Trusted Storage  2012  2012   Anjo Vahldiek, Eslam Elnikety, Ansley Post, Peter Druschel, Deepak Garg, Johannes Gehrke, Rodrigo Rodrigues  Presented at USENIX FAST'12 WiP
Understanding and combating link farming in the twitter social network  2012  2012   Saptarshi Ghosh, Bimal Viswanath, Farshad Kooti, Naveen Kumar Sharma, Gautam Korlam, Fabrício Benevenuto, Niloy Ganguly, Krishna P. Gummadi  Proc. of the 21st International Conference on World Wide Web (WWW 2012)
Verifiable data streaming  2012  2012   Dominique Schröder, Heike Schröder  Proc. of the 19th ACM Conference on Computer and Communication Security (CCS 2012)
Verification of TLB Virtualization Implemented in C  2012  2012   Eyad Alkassar, Ernie Cohen, Mikhail Kovalev, Wolfgang J. Paul  Proc. 4th International Conference on Verified Software: Theories, Tools, and Experiments (VSTTE 2012)
Verified Security of Merkle-Damgård  2012  2012   Michael Backes, Gilles Barthe, Matthias Berg, Benjamin Grégoire, César Kunz, Malte Skoruppa, Santiago Zanella Béguelin  Proceedings of the 25th IEEE Computer Security Foundations Symposium - CSF 2012
Where Do I Start? Algorithmic Strategies to Guide Intelligence Analysts  2012  2012   Hao Wu, Michael Mampaey, Nikolaj Tatti, Jilles Vreeken, M.Shariar Hossain, Naren Ramakrishnan  Proceedings of the ACM SIGKDD Workshop on Intelligence and Security Informatics (ISI-KDD)
Why Eve and Mallory Love Android: An Analysis of Android SSL (in)Security  2012  2012   Sascha Fahl, Marian Harbach, Thomas Muders, Lars Baumgärtner, Bernd Freisleben, Matthew Smith  Proceedings of the 2012 ACM Conference on Computer and Communications Security
XIFER: A Software Diversity Tool Against Code-Reuse Attacks  2012  2012   Lucas Davi, Alexandra Dmitrienko, Stefan Nürnberger, Ahmad-Reza Sadeghi  4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3)
\textsc Slim : Directly Mining Descriptive Patterns  2012  2012   Koen Smets, Jilles Vreeken  Proceedings of the SIAM International Conference on Data Mining (SDM)
\textsc TourViz : Interactive Visualization of Connection Pathways in Large Graphs  2012  2012   Duen Horng Chau, Leman Akoglu, Jilles Vreeken, Hanghang Tong, Christos Faloutsos  Proceedings of ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD)
A Formal Framework for Provenance Security  2011  2011   James Cheney  Proceedings of the 24th IEEE Computer Security Foundations Symposium
A Local Cross-Site Scripting Attack against Android Phones  2011  2011   Michael Backes, Sebastian Gerling, Philipp von Styp-Rekowsky
A Lyapunov approach in incremental stability  2011  2011   Majid Zamani, Rupak Majumdar  50th IEEE Conference on Decision and Control and European Control Conference (CDC-ECC 2011)
A Security API for Distributed Social Networks  2011  2011   Michael Backes, Matteo Maffei, Kim Pecina  Proceedings of the Network and Distributed System Security Symposium (NDSS '11)
A Statistical Test for Information Leaks Using Continuous Mutual Information  2011  2011   Tom Chothia, Apratim Guha  Proceedings of the 24th IEEE Computer Security Foundations Symposium
A Template for Predictability Definitions with Supporting Evidence  2011  2011   Daniel Grund, Jan Reineke, Reinhard Wilhelm  Bringing Theory to Practice: Predictability and Performance in Embedded Systems, DATE Workshop PPES 2011, March 18, 2011, Grenoble, France.
A category-level 3-D object dataset: Putting the Kinect to work  2011  2011   Allison Janoch, Sergey Karayev, Yangqing Jia, Jonathan T. Barron, Mario Fritz, Kate Saenko, Trevor Darrell  IEEE International Conference on Computer Vision Workshops, ICCV 2011 Workshops, Barcelona, Spain, November 6-13, 2011
A probabilistic model for recursive factorized image features  2011  2011   Sergey Karayev, Mario Fritz, Sanja Fidler, Trevor Darrell  The 24th IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2011, Colorado Springs, CO, USA, 20-25 June 2011
AmazonIA: When Elasticity Snaps Back  2011  2011   Sven Bugiel, Thomas Pöppelmann, Stefan Nürnberger, Ahmad-Reza Sadeghi, Thomas Schneider  Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11)
An Efficient User Verification System via Mouse Movements  2011  2011   Nan Zheng, Aaron Paloski, Haining Wang  Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS)
Analyzing facebook privacy settings: user expectations vs. reality  2011  2011   Yabing Liu, Krishna P. Gummadi, Balachander Krishnamurthy, Alan Mislove  Proc. of the 11th ACM SIGCOMM Conference on Internet Measurement (IMC 2011)
Assumptions and Guarantees for Compositional Noninterference  2011  2011   Heiko Mantel, David Sands, Henning Sudbrock  Proceedings of the 24th IEEE Computer Security Foundations Symposium
Attacking and fixing Helios: An analysis of ballot secrecy  2011  2011   Véronique Cortier, Ben Smyth  Proceedings of the 24th IEEE Computer Security Foundations Symposium
Auctions in do-not-track compliant internet advertising  2011  2011   Alexey Reznichenko, Saikat Guha, Paul Francis  Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11)
Automated proofs for Diffie-Hellman-based key exchanges  2011  2011   Long Ngo, Colin Boyd, Juan Gonzalez Nieto  Proceedings of the 24th IEEE Computer Security Foundations Symposium
Automatically Verifying Typing Constraints for a Data Processing Language  2011  2011   Michael Backes, Cătălin Hriţcu, Thorsten Tarrach  Proc. 1st International Conference on Certified Programs and Proofs (CPP 2011)
Branch target buffers: WCET analysis framework and timing predictability  2011  2011   Daniel Grund, Jan Reineke, Gernot Gebhard
Bug-Assist: Assisting Fault Localization in ANSI-C Programs  2011  2011   Manu Jose, Rupak Majumdar  Proc. of the 23rd International Conference on Computer Aided Verification (CAV 2011)
CAMA: A Predictable Cache-Aware Memory Allocator  2011  2011   Jörg Herter, Peter Backes, Florian Haupenthal, Jan Reineke  23rd Euromicro Conference on Real-Time Systems, ECRTS 2011, Porto, Portugal, 5-8 July, 2011
CFI Goes Mobile: Control-Flow Integrity for Smartphones  2011  2011   Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi
Cause Clue Clauses: Error Localization Using Maximum Satisfiability  2011  2011   Manu Jose, Rupak Majumdar  Proc. of the 32rd ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2011)
Comparing Apples and Oranges: Measuring Differences between Data Mining Results  2011  2011   Nikolaj Tatti, Jilles Vreeken  Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Data (ECMLPKDD)
Computational Soundness of Passively Secure Encryption in Presence of Active Adversaries  2011  2011   Sebastian Meiser  Seventh Workshop on Formal and Computational Cryptography (FCC 2011)
Computational Verifiable Secret Sharing Revisited  2011  2011   Michael Backes, Aniket Kate, Arpita Patra  Proc. 17th International Conference on the Theory and Application of Cryptology (ASIACRYPT 2011)
Concurrent composition in the bounded quantum storage model  2011  2011   Dominique Unruh  Eurocrypt 2011
Constructing Mid-Points for Two-Party Asynchronous Protocols  2011  2011   Petar Tsankov, David Basin, Mohammad Torabi Dashti  Proc. 15th International Conference On Principles Of Distributed Systems (OPODIS)
Cryptographically sound security proofs for basic and public-key Kerberos  2011  2011   Michael Backes, Iliano Cervesato, Aaron D Jaggard, Andre Scedrov, Joe-Kai Tsay
Designing next-generation real-time streaming systems  2011  2011   Sander Stuijk, Twan Basten, Benny Akesson, Marc Geilen, Orlando Moreira, Jan Reineke  Proceedings of the 9th International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2011, part of ESWeek '11 Seventh Embedded Systems Week, Taipei, Taiwan, 9-14 October, 201
Differentially Private Billing with Rebates [TechReport]  2011  2011   George Danezis, Markulf Kohlweiss, Alfredo Rial
Does It Pay to Extend the Perimeter of a World Model?  2011  2011   Werner Damm, Bernd Finkbeiner  Proceedings of the 17th International Symposium on Formal Methods (FM'11)
Dynamic Enforcement of Knowledge-based Security Policies  2011  2011   Piotr Mardziel, Stephen Magill, Michael Hicks, Mudhakar Srivatsa  Proceedings of the 24th IEEE Computer Security Foundations Symposium
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments  2011  2011   Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo  The Sixth International Conference on Availability, Reliability and Security
Efficient calculation of rare event probabilities in Markovian queueing networks  2011  2011   Linar Mikeev, Werner Sandmann, Verena Wolf  5th International ICST Conference on Performance Evaluation Methodologies and Tools Communications, VALUETOOLS '11, Paris, France, May 16-20, 2011
Enhancing the Trust of Internet Routing with Lightweight Route Attestation  2011  2011   Qi Li, Mingwei Xu, Jianping Wu, Xinwen Zhang, Patrick P. C. Lee, Ke Xu  Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS)
Formal analysis of protocols based on TPM state registers  2011  2011   Stephanie Delaune, Steve Kremer, Mark D. Ryan, Graham Steel  Proceedings of the 24th IEEE Computer Security Foundations Symposium
Formalisms for Specifying Markovian Population Models  2011  2011   Thomas A Henzinger, Barbara Jobstmann, Verena Wolf
G2C: Cryptographic Protocols from Goal-Driven Specifications  2011  2011   Michael Backes, Matteo Maffei, Kim Pecina, Raphael M. Reischuk  TOSCA'11: Proceedings of the 2011 International Conference on Theory of Security and Applications (now POST), held as part of ETAPS 2011
Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols  2011  2011   Francois Dupressoir, Andrew D. Gordon, Jan Jurjens, David A. Naumann  Proceedings of the 24th IEEE Computer Security Foundations Symposium
HMC: Verifying Functional Programs Using Abstract Interpreters  2011  2011   Ranjit Jhala, Rupak Majumdar, Andrey Rybalchenko  Proc. of the 23rd International Conference on Computer Aided Verification (CAV 2011)
I have a DREAM! (DIffeRentially PrivatE smartMetering)  2011  2011   Gergely Acs, Claude Castelluccia  Proceedings of the 13th Information Hiding Conference, May 2011, Prague
I spy with my little eye: Learning optimal filters for cross-modal stereo under projected patterns  2011  2011   Walon Wei-Chen, Ulf Blanke, Mario Fritz  IEEE International Conference on Computer Vision Workshops, ICCV 2011 Workshops, Barcelona, Spain, November 6-13, 2011
Improving the Kinect by Cross-Modal Stereo  2011  2011   Walon Wei-Chen, Ulf Blanke, Mario Fritz  British Machine Vision Conference, BMVC 2011, Dundee, UK, August 29 - September 2, 2011. Proceedings
Information flow analysis for JavaScript  2011  2011   Seth Just, Alan Cleary, Brandon Shirley, Christian Hammer  Proceedings of the 1st ACM SIGPLAN international workshop on Programming language and systems technologies for internet clients
Information-theoretic Bounds for Differentially Private Mechanisms  2011  2011   Gilles Barthe, Boris Köpf  Proceedings of the 24th IEEE Computer Security Foundations Symposium
Integrated Specification and Verification of Security Protocols and Policies  2011  2011   Simone Frau, Mohammad Torabi Dashti  Proceedings of the 24th IEEE Computer Security Foundations Symposium
Integrity Protection for Automated Teller Machines  2011  2011   Ronald Petrlic  Proceedings of the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11)
Krimp: Mining Itemsets that Compress  2011  2011   Jilles Vreeken, Matthijs van Leeuwen, Arno Siebes
Local Memory via Layout Randomization  2011  2011   Radha Jagadeesan, Corin Pitcher, Julian Rathke, James Riely  Proceedings of the 24th IEEE Computer Security Foundations Symposium
MIME: A Framework for Interactive Visual Pattern Mining  2011  2011   Bart Goethals, Sandy Moens, Jilles Vreeken  Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD)
MIME: A Framework for Interactive Visual Pattern Mining  2011  2011   Bart Goethals, Sandy Moens, Jilles Vreeken  Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Data (ECMLPKDD)
Maximum Entropy Modelling for Assessing Results on Real-Valued Data  2011  2011   Kleanthis-Nikolaos Kontonasios, Jilles Vreeken, Tijl De  Proceedings of the IEEE International Conference on Data Mining (ICDM)
Minimum Attention Controller Synthesis for Omega-regular Objectives  2011  2011   Krishnendu Chatterjee, Rupak Majumdar  Proceedings of the 9th International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS'11)
Model Order Selection for Boolean Matrix Factorization  2011  2011   Pauli Miettinen, Jilles Vreeken  Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD)
Modular Protections Against Non-control Data Attacks  2011  2011   Cole Schlesinger, Karthik Pattabiraman, Nikhil Swamy, David Walker, Benjamin Zorn  Proceedings of the 24th IEEE Computer Security Foundations Symposium
Non-Uniform Distributions in Quantitative Information-Flow  2011  2011   Michael Backes, Matthias Berg, Boris Köpf  Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS)
Obstruction-free Authorization Enforcement: Aligning Security With Business Objectives  2011  2011   David Basin, Samuel J Burri, Günter Karjoth  Proceedings of the 24th IEEE Computer Security Foundations Symposium
On Adversary Models and Compositional Security  2011  2011   Anupam Datta, Deepak Garg, Dilsun Kirli Kaynar, Limin Jia, Jason Franklin
PRET DRAM controller: bank privatization for predictability and temporal isolation  2011  2011   Jan Reineke, Isaac Liu, Hiren D. Patel, Sungjun Kim, Edward A. Lee  Proceedings of the 9th International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2011, part of ESWeek '11 Seventh Embedded Systems Week, Taipei, Taiwan, 9-14 October, 201
Parametrized shape models for clothing  2011  2011   Stephen Miller, Mario Fritz, Trevor Darrell, Pieter Abbeel  IEEE International Conference on Robotics and Automation, ICRA 2011, Shanghai, China, 9-13 May 2011
Perception for the manipulation of socks  2011  2011   Ping Chuan Wang, Stephen Miller, Mario Fritz, Trevor Darrell, Pieter Abbeel  2011 IEEE/RSJ International Conference on Intelligent Robots and Systems, IROS 2011, San Francisco, CA, USA, September 25-30, 2011
Performance-aware Scheduler Synthesis for Control Systems  2011  2011   Rupak Majumdar, Indranil Saha, Majid Zamani  Proc. of the International Conference on Embedded Software (EMSOFT 2011)
Pessoa 2.0: A Controller Synthesis Tool for Cyber-physical Systems  2011  2011   Pritam Roy, Paulo Tabuada, Rupak Majumdar  Proc. of the 14th International Conference on Hybrid Systems: Computation and Control (HSCC 2011)
Pick Your Neighborhood - Improving Labels and Neighborhood Structure for Label Propagation  2011  2011   Sandra Ebert, Mario Fritz, Bernt Schiele  Pattern Recognition - 33rd DAGM Symposium, Frankfurt/Main, Germany, August 31 - September 2, 2011. Proceedings
Policy auditing over incomplete logs: theory, implementation and applications  2011  2011   Anupam Datta, Deepak Garg, Limin Jia  Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11)
Poster: Control-flow Integrity for Smartphones  2011  2011   Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi  18th ACM conference on Computer and communications security (ACM CCS 2012)
Poster: ESPOON$_ERBAC$: Enforcing Security Policies in Outsourced Environments with Encrypted RBAC  2011  2011   Muhammad Rizwan Asghar, Giovanni Russello, Bruno Crispo  Proceedings of the 18th ACM conference on Computer and communications security
Practical 3-D object detection using category and instance-level appearance models  2011  2011   Kate Saenko, Sergey Karayev, Yangqing Jia, Alex Shyr, Allison Janoch, Jonathan Long, Mario Fritz, Trevor Darrell  2011 IEEE/RSJ International Conference on Intelligent Robots and Systems, IROS 2011, San Francisco, CA, USA, September 25-30, 2011
Practical and Lightweight Domain Isolation on Android  2011  2011   Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Ahmad-Reza Sadeghi, Bhargava Shastry  1st ACM CCS Workshop on Security and Privacy in Mobile Devices (SPSM'11)
RAFT at work: speeding-up mapreduce applications under task and node failures  2011  2011   Jorge-Arnulfo Quiané-Ruiz, Christoph Pinkel, Jorg Schad, Jens Dittrich  Proceedings of the ACM SIGMOD International Conference on Management of data
RAFTing MapReduce: Fast recovery on the RAFT  2011  2011   Jorge-Arnulfo Quiané-Ruiz, Christoph Pinkel, Jorg Schad, Jens Dittrich  Proceedings of the IEEE 27th International Conference on Data Engineering (ICDE)
Re-synchronizing Audio Watermarking after Non-linear Time Stretching  2011  2011   Sascha Zmudzinski, Martin Steinebach  Proceeding of Electronic Imaging 2011 - Media Watermarking, Security, and Forensics XIII
Reactive Safety  2011  2011   Rüdiger Ehlers, Bernd Finkbeiner  Proceedings of Second International Symposium on Games, Automata3Logics and Formal Verification (GandALF 2011)
Regret Minimizing Audits: A Learning-theoretic Basis for Privacy Protection  2011  2011   Jeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha  Proceedings of the 24th IEEE Computer Security Foundations Symposium
Relax and Let the Database Do the Partitioning Online  2011  2011   Alekh Jindal, Jens Dittrich  Enabling Real-Time Business Intelligence (BIRTE)
Relaxed-memory concurrency and verified compilation  2011  2011   Jaroslav Sevcík, Viktor Vafeiadis, Francesco Zappa Nardelli, Suresh Jagannathan, Peter Sewell  Proceedings of the 38th ACM SIGPLAN Symposium on Principles of Programming Languages (POPL'11)
Resource-aware Authorization Policies for Statically Typed Cryptographic Protocols  2011  2011   Michele Bugliesi, Stefano Calzavara, Fabienne Eigner, Matteo Maffei  Proceedings of the 24th IEEE Computer Security Foundations Symposium
Robust Discrete Synthesis Against Unspecified Disturbances  2011  2011   Rupak Majumdar, Elaine Render, Paulo Tabuada  Proc. of the 14th International Conference on Hybrid Systems: Computation and Control (HSCC 2011)
Round Optimal Blind Signatures  2011  2011   Dominique Schröder, Dominique Unruh, Sanjam Garg, Vanishree Rao, Amit Sahai  Crypto 2011
S3K: seeking statement-supporting top-K witnesses  2011  2011   Steffen Metzger, Shady Elbassuoni, Katja Hose, Ralf Schenkel  Proc. of the 20th ACM International Conference on Information and Knowledge Management (CIKM'11)
SHAVE: stochastic hybrid analysis of markov population models  2011  2011   Maksim Lapin, Linar Mikeev, Verena Wolf  Proceedings of the 14th ACM International Conference on Hybrid Systems: Computation and Control, HSCC 2011, Chicago, IL, USA, April 12-14, 2011
Scalable Trust Establishment with Software Reputation  2011  2011   Sven Bugiel, Lucas Davi, Steffen Schulz  Workshop on Scalable Trusted Computing (STC'11)
Securing social networks  2011  2011   Michael Backes, Matteo Maffei, Kim Pecina  Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, PODC 2011, San Jose, CA, USA, June 6-8, 2011
Security for Key Management Interfaces  2011  2011   Steve Kremer, Graham Steel, Bogdan Warinschi  Proceedings of the 24th IEEE Computer Security Foundations Symposium
Sedic: Privacy-Aware Data Intensive Computing on Hybrid Clouds  2011  2011   Zhang Kehuan, Zhou Xiaoyong, Chen Yangyi, Wang XiaoFeng, Ruan Yaoping  Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS)
Smart meter privacy using a rechargeable battery: minimizing the rate of information leakage  2011  2011   David Varodayan, Ashish Khisti  Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2011, Prague, Czech Republic, May 2011.
Static analysis for efficient hybrid information-flow control  2011  2011   Scott Moore, Stephen Chong  Proceedings of the 24th IEEE Computer Security Foundations Symposium
Survey: Certifying Algorithms  2011  2011   Ross M McConnell, Kurt Mehlhorn, Stefan Näher, Pascal Schweitzer
Tell Me What I Need to Know: Succinctly Summarizing Data with Itemsets  2011  2011   Michael Mampaey, Nikolaj Tatti, Jilles Vreeken  Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD)
Temporal isolation on multiprocessing architectures  2011  2011   Dai N Bui, Edward A. Lee, Isaac Liu, Hiren D. Patel, Jan Reineke  Proceedings of the 48th Design Automation Conference, DAC 2011, San Diego, California, USA, June 5-10, 2011
Termination-Insensitive Computational Indistinguishability (and applications to computational soundness)  2011  2011   Dominique Unruh  Proceedings of the 24th IEEE Computer Security Foundations Symposium
Text-based CAPTCHA Strengths and Weaknesses  2011  2011   Elie Bursztein, Matthieu Martin, John C. Mitchell  Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS)
The Complexity of Quantitative Information Flow Problems  2011  2011   Pavol Cerny, Krishnendu Chatterjee, Thomas A Henzinger  Proceedings of the 24th IEEE Computer Security Foundations Symposium
The Eval that Men Do -- A Large-scale Study of the Use of Eval in JavaScript Applications  2011  2011   Gregor Richards, Christian Hammer, Brian Burg, Jan Vitek  ECOOP'11: Proceedings of the 25th European Conference on Object-Oriented Programming
The NBNN kernel  2011  2011   Tinne Tuytelaars, Mario Fritz, Kate Saenko, Trevor Darrell  IEEE International Conference on Computer Vision, ICCV 2011, Barcelona, Spain, November 6-13, 2011
The Odd One Out: Identifying and Characterising Anomalies  2011  2011   Koen Smets, Jilles Vreeken  Proceedings of the SIAM International Conference on Data Mining (SDM)
Towards a One Size Fits All Database Architecture  2011  2011   Jens Dittrich, Alekh Jindal  Proceedings of the 4th Biennial Conference on Innovative Data Systems Research (CIDR)
Trojan data layouts: right shoes for a running elephant  2011  2011   Alekh Jindal, Jorge-Arnulfo Quiané-Ruiz, Jens Dittrich  Proceedings of the 2nd ACM Symposium on Cloud Computing (SoCC)
Twin Clouds: An Architecture for Secure Cloud Computing  2011  2011   Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sadeghi, Thomas Schneider  Workshop on Cryptography and Security in Clouds (CSC)
Twin Clouds: Secure Cloud Computing with Low Latency  2011  2011   Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sadeghi, Thomas Schneider  Communications and Multimedia Security Conference (CMS'11)
Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms  2011  2011   Anupam Datta, Jeremiah Blocki, Nicolas Christin, Henry DeYoung, Deepak Garg, Limin Jia, Dilsun Kirli Kaynar, Arunesh Sinha  Proc. of the 7th International Conference Information Systems Security (ICISS 2011)
Unicorn: Two-Factor Attestation for Data Security  2011  2011   Mohammad Mannan, Boem Heyn Kim, Afshar Ganjali, David Lie  Proceedings of the 18th ACM conference on Computer and communications security
Union and Intersection Types for Secure Protocol Implementations  2011  2011   Michael Backes, Cătălin Hriţcu, Matteo Maffei  Theory of Security and Applications - Joint Workshop, TOSCA 2011, Saarbrücken, Germany, March 31 - April 1, 2011, Revised Selected Papers
Unraveling tobacco BY-2 protein complexes with BN PAGE/LC-MS/MS and clustering methods  2011  2011   Noor Remmerie, Thomas De Vijlder, Dirk Valkenborg, Kris Laukens, Koen Smets, Jilles Vreeken, Inge Mertens, Sebastien Carpentier, Bart Panis, Geert de Jaeger, Els Prinsen, Erwin Witters
Verification of Certifying Computations  2011  2011   Eyad Alkassar, Sascha Böhme, Kurt Mehlhorn, Christine Rizkallah  Proc. of the 23rd International Conference on Computer Aided Verification (CAV 2011)
Verification of Information Flow and Access Control Policies with Dependent Types  2011  2011   Aleksandar Nanevski, Anindya Banerjee, Deepak Garg  Proceedings of the 32nd IEEE Symposium on Security and Privacy (S&P '11)
Vertical Protocol Composition  2011  2011   Thomas Groß, Sebastian Mödersheim  Proceedings of the 24th IEEE Computer Security Foundations Symposium
Watermarking for Ontologies  2011  2011   Fabian M Suchanek, David Gross-Amblard, Serge Abiteboul  Proc. 10th International Semantic Web Conference (ISWC 2011)
Weak Kripke Structures and LTL  2011  2011   Bernd Finkbeiner, Lars Kuhtz  Proceedings of the 22nd International Conference on Concurrency Theory (CONCUR'11)
Weakly Supervised Recognition of Daily Life Activities with Wearable Sensors  2011  2011   Maja Stikic, Diane Larlus, Sandra Ebert, Bernt Schiele
When Pattern met Subspace Cluster, a Relationship Story  2011  2011   Jilles Vreeken, Arthur Zimek  Proceedings of the 2nd Workshop on Discovering, Summarizing and Using Multiple Clusterings (MultiClust)
X-pire! - A digital expiration date for images in social networks [TechReport]  2011  2011   Julian Backes, Michael Backes, Markus Dürmuth, Stefan Lorenz, Sebastian Gerling