In the following you can find the list of publications of my research group. For more publications, please visit the list of publications @ CISPA .

There is also a new publication database availablable under the following links:

Publications Database: Main Page · Section: Research Group InfSec


2019 (2)

IEEE Symposium on Security and Privacy (Oakland) (SandP) (1)

#324 Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security & Privacy

Duc Cuong Nguyen , Erik Derr , Michael Backes , Sven Bugiel
To appear in the Proceedings of the IEEE Symposium on Security & Privacy, May 2019 , 2019

Other Conferences (others) (1)

#323 Kommentierung der §§64, 70, 71, 74 BDSG

Ninja Marnau
2019

2018 (21)

IEEE Symposium on Security and Privacy (Oakland) (SandP) (3)

#322 Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels

Meng Xu , Chenxiong Qian , Kangjie Lu , Michael Backes , Taesoo Kim
In Proceedings of the 39th IEEE Symposium on Security and Privacy (Oakland). San Francisco, CA, May 2018. , 2018

#321 The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators

Marten Oltrogge , Erik Derr , Christian Stransky , Yasemin Acar , Sascha Fahl , Christian Rossow , Giancarlo Pellegrino , Sven Bugiel , Michael Backes
39th IEEE Symposium on Security and Privacy (SP '18) , 2018

#320 Verifying System Level Information Flow Using Confidentiality-Preserving Refinement

Christoph Baumann , Roberto Guanciale , Hamed Nemati , Mads Dam
In Submission , 2018

ACM Conference on Computer and Communications Security (CCS) (1)

#319 Lord of the x86 Rings: A Portable User Mode Privilege Separation Architecture on x86

Hojoon Lee , Chihyun Song , Brent Byunghoon Kang
ACM CCS 2018 , 2018

Usenix Security Symposium (USENIX-Security) (1)

#318 Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse

Sanam Ghorbani Lyastani , Michael Schilling , Sascha Fahl , Michael Backes , Sven Bugiel
27th USENIX Security Symposium (USENIX Security 18) , 2018

Network and Distributed System Security Symposium (NDSS) (1)

#317 Didn’t You Hear Me? — Towards More Successful Web Vulnerability Notifications

Ben Stock , Giancarlo Pellegrino , Frank Li , Michael Backes , Christian Rossow
Proceedings of the 25th Annual Symposium on Network and Distributed System Security (NDSS '18). , 2018

IEEE European Symposium on Security and Privacy (EuroSandP) (2)

#316 Dissecting Privacy Risks in Biomedical Data

Pascal Berrang , Mathias Humbert , Yang Zhang , Irina Lehmann , Roland Eils , Michael Backes
Proceedings of the 3rd IEEE European Symposium on Security and Privacy (Euro S&P) , 2018

#315 Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure

Patrick Speicher , Marcel Steinmetz , Robert Künnemann , Milivoj Simeonovski , Giancarlo Pellegrino , Jörg Hoffmann , Michael Backes
2018 IEEE European Symposium on Security and Privacy, EuroS&P 2018, London, United Kingdom, April 24-26, 2018 , 2018

Other Conferences (others) (13)

#314 A Survey on Routing in Anonymous Communication Protocols

Fatemeh Shirazi , Milivoj Simeonovski , Muhammad Rizwan Asghar , Michael Backes , Claudia Díaz
ACM Computing Surveys (CSUR) (Journal) , 2018

#313 Datenschutz durch Technikgestaltung für Genomdaten

Claudia Kawohl , Annika Krämer , Ninja Marnau
DSRI Herbstakademie Tagungsband 2018 (Journal) , 2018

#312 Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure (full version)

Patrick Speicher , Marcel Steinmetz , Robert Künnemann , Milivoj Simeonovski , Giancarlo Pellegrino , Jörg Hoffmann , Michael Backes
Extended Version of EuroS&P 2018 Paper (Journal) , 2018

#311 From Law to Engineering: A Computer Science Perspective on Privacy & Data Protection

Ninja Marnau , Christoph Sorge
2018

#310 JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript

Aurore Fass , Robert Krawczyk , Michael Backes , Ben Stock
Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA '18) , 2018

#309 Killing Three Birds with one Gaussian Process: Analyzing Attack Vectors on Classification

Kathrin Grosse , Michael Thomas Smith , Michael Backes
ArXiv e-prints (Journal) , 2018

#308 PRIMA: Privacy-Preserving Identity and Access Management at Internet-Scale

Muhammad Rizwan Asghar , Michael Backes , Milivoj Simeonovski
2018 IEEE International Conference on Communications (ICC) Kansas City, MO, USA, 20-24 May 2018 , 2018

#307 Privacy-Preserving Similar Patient Queries for Combined Biomedical Data

Ahmed Salem , Pascal Berrang , Mathias Humbert , Michael Backes
The 19th Privacy Enhancing Technologies Symposium (PETS) , 2018

#306 Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys

Michael Backes , Lucjan Hanzlik , Kamil Kluczniak , Jonas Schneider
IACR ASIACRYPT 2018 , 2018

#305 Stackelberg Planning: Towards Effective Leader-Follower State Space Search

Patrick Speicher , Marcel Steinmetz , Michael Backes , Jörg Hoffmann , Robert Künnemann
The Thirty-Second AAAI Conference on Artificial Intelligence (AAAI-18) , 2018

#304 Stellungnahme gegenüber dem Landtag des Saarlandes zum Thema „Stand und Entwicklungsperspektiven der Telemedizin im Saarland“

Sebastian Gerling , Ninja Marnau , Christoph Sorge
2018

#303 Tagvisor: A Privacy Advisor for Sharing Hashtags

Yang Zhang , Mathias Humbert , Tahleen Rahman , Cheng-Te Li , Jun Pang , Michael Backes
Proceedings of the Web Conference 2018 (WWW) , 2018

#302 You Are Where You APP: An Assessment on Location Privacy of Social APPs

Fanghua Zhao , Linan Gao , Yang Zhang , Zeyu Wang , Bo Wang , Shanqing Guo
The 29th IEEE International Symposium on Software Reliability Engineering , 2018

2017 (34)

IEEE Symposium on Security and Privacy (Oakland) (SandP) (3)

#301 Comparing the Usability of Cryptographic APIs

Yasemin Acar , Michael Backes , Sascha Fahl , Simson Garfinkel , Doowon Kim , Michelle Mazurek , Christian Stransky
38th IEEE Symposium on Security and Privacy (S&P '17) , 2017

#300 Identifying Personal DNA Methylation Profiles by Genotype Inference

Michael Backes , Pascal Berrang , Matthias Bieg , Roland Elis , Carl Herrmann , Mathias Humbert , Irina Lehmann
Proceedings of the 38th IEEE Symposium on Security and Privacy (S&P) , 2017

#299 Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security

Felix Fischer , Konstantin Böttinger , Huang Xiao , Christian Stransky , Yasemin Acar , Michael Backes , Sascha Fahl
38th IEEE Symposium on Security and Privacy (S&P '17) , 2017

ACM Conference on Computer and Communications Security (CCS) (5)

#298 A Stitch in Time: Supporting Android Developers in Writing Secure Code

Duc Cuong Nguyen , Dominik Wermke , Yasemin Acar , Michael Backes , Charles Alexander Forbes Weir , Sascha Fahl
Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS '17) , 2017

#297 Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs

Giancarlo Pellegrino , Martin Johns , Simon Koch , Michael Backes , Christian Rossow
Proceedings of the 24th ACM Conference on Computer and Communication Security (CCS'17) , 2017

#296 Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android

Erik Derr , Sven Bugiel , Sascha Fahl , Yasemin Acar , Michael Backes
Proceedings of the 24th ACM Conference on Computer and Communication Security (CCS'17) , 2017

#295 The ART of App Compartmentalization: Compiler-based Library Privilege Separation on Stock Android

Jie Huang , Oliver Schranz , Sven Bugiel , Michael Backes
Proceedings of the 24th ACM Conference on Computer and Communication Security (CCS'17) , 2017

#294 walk2friends: Inferring Social Links from Mobility Profiles.

Michael Backes , Mathias Humbert , Jun Pang , Yang Zhang
Proceedings of the 24th ACM Conference on Computer and Communication Security (CCS'17) , 2017

Usenix Security Symposium (USENIX-Security) (1)

#293 How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security

Ben Stock , Martin Johns , Marius Steffens , Michael Backes
Proceedings of the 26th USENIX Security Symposium (USENIX Security '17) , 2017

Network and Distributed System Security Symposium (NDSS) (2)

#292 Dachshund: Digging for and Securing (Non-)Blinded Constants in JIT Code

Giorgi Maisuradze , Michael Backes , Christian Rossow
Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17) , 2017

#291 Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying

Kangjie Lu , Marie-Therese Walter , David Pfaff , Stefan Nürnberger , Wenke Lee , Michael Backes
Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17) , 2017

IEEE European Symposium on Security and Privacy (EuroSandP) (4)

#290 A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and its Application to Fair Exchange

Michael Backes , Jannik Dreier , Steve Kremer , Robert Künnemann
Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17) , 2017

#289 ARTist: The Android Runtime Instrumentation and Security Toolkit

Michael Backes , Sven Bugiel , Oliver Schranz , Philipp von Styp-Rekowsky , Sebastian Weisgerber
Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17) , 2017

#288 Efficient and Flexible Discovery of PHP Application Vulnerabilities

Michael Backes , Konrad Rieck , Malte Skoruppa , Ben Stock , Fabian Yamaguchi
Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17) , 2017

#287 LUNA: Quantifying and Leveraging Uncertainty in Android Malware Analysis through Bayesian Machine Learning

Michael Backes , Mohammad Nauman
Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17) , 2017

IEEE Computer Security Foundations Symposium (CSF) (1)

#286 Reconciling Privacy and Utility in Continuous-Time Diffusion Networks

Michael Backes , Manuel Gomez-Rodriguez , Praveen Manoharan , Bartlomiej Surma
Proceedings of the 30th IEEE Computer Security Foundations Symposium (CSF '17) , 2017

Other Conferences (others) (18)

#285 Adversarial Examples for Malware Detection

Kathrin Grosse , Nicolas Papernot , Praveen Manoharan , Michael Backes , Patrick McDaniel
Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II , 2017

#284 CTRL+Z: Recovering Anonymized Social Graphs

Yang Zhang , Mathias Humbert , Bartlomiej Surma , Praveen Manoharan , Jilles Vreeken , Michael Backes
CoRR (Journal) , 2017

#283 DeepCity: A Feature Learning Framework for Mining Location Check-ins

Jun Pang , Yang Zhang
Proceedings of the 11th International Conference on Web and Social Media (ICWSM'17) , 2017

#282 Die Blockchain im Spannungsfeld der Grundsätze der Datenschutzgrundverordnung

Ninja Marnau
INFORMATIK 2017, Workshop Recht und Technik , 2017

#281 FairTest: Discovering Unwarranted Associations in Data-Driven Applications

Floran Tramèr , Vaggelis Atlidakis , Roxana Geambasu , Daniel Hsu , Jean-Pierre Hubaux , Mathias Humbert , Ari Juels , Huang Lin
2017

#280 How Internet Resources Might Be Helping You Develop Faster but Less Securely

Yasemin Acar , Michael Backes , Sascha Fahl , Doowon Kim , Michelle L. Mazurek , Christian Stransky
IEEE Security & Privacy (Journal) , 2017

#279 How Wrong Am I? - Studying Adversarial Examples and their Impact on Uncertainty in Gaussian Process Machine Learning Models

Kathrin Grosse , David Pfaff , Michael Thomas Smith , Michael Backes
ArXiv e-prints (Journal) , 2017

#278 Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers

Christian Stransky , Yasemin Acar , Duc Cuong Nguyen , Dominik Wermke , Elissa M. Redmiles , Doowon Kim , Michael Backes , Simson Garfinkel , Michelle Mazurek , Sascha Fahl
Proceedings of the 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET '17) , 2017

#277 Linking Amplification DDoS Attacks to Booter Services

Johannes Krupp , Mohammad Karami , Christian Rossow , Damon McCoy , Michael Backes
International Symposium on Research in Attacks, Intrusions, and Defenses , 2017

#276 On the (Statistical) Detection of Adversarial Examples

Kathrin Grosse , Praveen Manoharan , Nicolas Papernot , Michael Backes , Patrick McDaniel
CoRR (Journal) , 2017

#275 Quantifying Location Sociality

Jun Pang , Yang Zhang
Proceedings of the 28th ACM Conference on Hypertext and Social Media (HT'17) , 2017

#274 Seamless In-App Ad Blocking on Stock Android

Michael Backes , Sven Bugiel , Philipp von Styp-Rekowsky , Marvin Wißfeld
Mobile Security Technologies (MOST) 2017 Workshop , 2017

#273 Security Developer Studies with GitHub Users: Exploring a Convenience Sample

Yasemin Acar , Christian Stransky , Dominik Wermke , Michelle Mazurek , Sascha Fahl
13th Symposium on Usable Privacy and Security (SOUPS'17) , 2017

#272 Simulated Penetration Testing and Mitigation Analysis

Michael Backes , Jörg Hoffmann , Robert Künnemann , Patrick Speicher , Marcel Steinmetz
CoRR (Journal) , 2017

#271 Stellungnahme des CISPA zum Entwurf eines Gesetzes zur Förderung der elektronischen Verwaltung im Saarland sowie zur Änderung weiterer Vorschriften

Christoph Sorge , Ninja Marnau
2017

#270 Studying the Impact of Managers on Password Strength and Reuse

Sanam Ghorbani Lyastani , Michael Schilling , Sascha Fahl , Sven Bugiel , Michael Backes
CoRR (Journal) , 2017

#269 Tatobjekt und Vortaten der Datenhehlerei (§ 202 d StGB)

Dominik Brodowski , Ninja Marnau
Neue Zeitschrift für Strafrecht (NStZ) (Journal) , 2017

#268 Who Controls the Internet? Analyzing Global Threats using Property Graph Traversals

Milivoj Simeonovski , Giancarlo Pellegrino , Christian Rossow , Michael Backes
Proc. of the 26rd International Conference on World Wide Web (WWW 2017) , 2017

2016 (45)

IEEE Symposium on Security and Privacy (Oakland) (SandP) (2)

#267 SoK: Lessons Learned From Android Security Research For Appified Software Platforms

Yasemin Acar , Michael Backes , Sven Bugiel , Sascha Fahl , Patrick McDaniel , Matthew Smith
37th IEEE Symposium on Security and Privacy (S&P '16) , 2016

#266 You Get Where You're Looking For: The Impact Of Information Sources On Code Security

Yasemin Acar , Michael Backes , Sascha Fahl , Doowon Kim , Michelle Mazurek , Christian Stransky
37th IEEE Symposium on Security and Privacy (S&P '16) , 2016

ACM Conference on Computer and Communications Security (CCS) (7)

#265 Computational Soundness for Dalvik Bytecode

Michael Backes , Robert Künnemann , Esfandiar Mohammadi
Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS'16) , 2016

#264 Efficient Cryptographic Password Hardening Services From Partially Oblivious Commitments

Jonas Schneider , Nils Fleischhacker , Dominique Schröder , Michael Backes
Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16 ) , 2016

#263 Identifying the Scan and Attack Infrastructures behind Amplification DDoS attacks

Johannes Krupp , Michael Backes , Christian Rossow
Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16) , 2016

#262 Membership Privacy in MicroRNA-based Studies

Michael Backes , Pascal Berrang , Mathias Humbert , Praveen Manoharan
Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16) , 2016

#261 POSTER: Mapping the Landscape of Large-Scale Vulnerability Notifications

Ben Stock , Giancarlo Pellegrino , Christian Rossow , Martin Johns , Michael Backes
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016 , 2016

#260 POSTER: The ART of App Compartmentalization

Michael Backes , Sven Bugiel , Jie Huang , Oliver Schranz
Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16 ) , 2016

#259 Reliable Third-Party Library Detection in Android and its Security Applications

Michael Backes , Sven Bugiel , Erik Derr
Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16) , 2016

Usenix Security Symposium (USENIX-Security) (5)

#258 An Empirical Study of Textual Key-Fingerprint Representations

Dominik Schürmann , Karoline Busse , Matthew Smith , Sascha Fahl , Sergej Dechand , Yasemin Acar
Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016

#257 Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification

Ben Stock , Giancarlo Pellegrino , Christian Rossow , Martin Johns , Michael Backes
Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016

#256 On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis

Michael Backes , Sven Bugiel , Erik Derr , Patrick McDaniel , Damien Octeau , Sebastian Weisgerber
Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016

#255 Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles

Michael Backes , Pascal Berrang , Anne Hecksteden , Mathias Humbert , Andreas Keller , Tim Meyer
Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016

#254 What Cannot be Read, Cannot be Leveraged? Revisiting Assumptions of JIT-ROP Defenses

Giorgi Maisuradze , Michael Backes , Christian Rossow
Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016

Network and Distributed System Security Symposium (NDSS) (1)

#253 How to Make ASLR Win the Clone Wars: Runtime Re-Randomization

Kangjie Lu , Michael Backes , Stefan Nürnberger , Wenke Lee
Proceedings of the 23rd Annual Symposium on Network and Distributed System Security (NDSS '16) , 2016

Other Conferences (others) (30)

#252 Adversarial Perturbations Against Deep Neural Networks for Malware Classification

Michael Backes , Praveen Manoharan , Kathrin Grosse , Nicolas Papernot
The Computing Research Repository (CoRR) (Journal) , 2016

#251 Anonymisierung, Pseudonymisierung und Transparenz für Big Data. Technische Herausforderungen und Regelung in der Datenschutz-Grundverordnung

Ninja Marnau
Datenschutz und Datensicherheit (DuD) (Journal) , 2016

#250 Anonymity Guarantees for Tor Hidden Services

Lukas Wedeking
2016

#249 Anonymous RAM

Michael Backes , Amir Herzberg , Aniket Kate , Ivan Pryvalov
21st European Symposium on Research in Computer Security (ESORICS) , 2016

#248 A Survey on Routing in Anonymous Communication Protocols

Fatemeh Shirazi , Milivoj Simeonovski , Muhammad Rizwan Asghar , Michael Backes , Claudia Díaz
The Computing Research Repository (CoRR) (Journal) , 2016

#247 Automated analysis of security protocols with global state

Steve Kremer , Robert Künnemann
Journal of Computer Security (Journal) , 2016

#246 Autonome Systeme

Stefan Nürnberger , Sven Bugiel
Datenschutz und Datensicherheit (Journal) , 2016

#245 Boxify: Bringing Full-Fledged App Sandboxing to Stock Android

Michael Backes , Sven Bugiel , Oliver Schranz , Philipp von Styp-Rekowsky
USENIX ;login: (Journal) , 2016

#244 CRRP: A Cryptographic Protocol for Coercion-Resistant Rating Platforms

Ahmed Salem
2016

#243 Curious Volunteers: Anonymity Impact of adding Tor nodes

Tahleen Rahman Awazid
2016

#242 Delegatable Functional Signatures

Michael Backes , Sebastian Meiser , Dominique Schröder
Public-Key Cryptography - PKC 2016: 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I , 2016

#241 Detecting Hardware-Assisted Virtualization

Michael Brengel , Michael Backes , Christian Rossow
Detection of Intrusions and Malware, and Vulnerability Assessment: 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings , 2016

#240 Establishing mandatory access control on Android OS

Sven Bugiel
2016

#239 Extracting and Modeling Typosquatting Errors from Large-scale Passive DNS Data

Frederic Endner-Dühr
2016

#238 From Zoos to Safaris - From Closed-World Enforcement to Open-World Assessment of Privacy

Michael Backes , Pascal Berrang , Praveen Manoharan
Foundations of Security Analysis and Design VIII: FOSAD 2014/2015/2016 Tutorial Lectures , 2016

#237 Full Reference Monitoring for Android Intents

Nils Peter Lipp
2016

#236 Hardening Intel SGX enclaves against memory safety exploits

Joshua Steffensky
2016

#235 Implementation-level Analysis of the JavaScript Helios Voting Client

Michael Backes , Christian Hammer , David Pfaff , Malte Skoruppa
Proceedings of the 31st Annual ACM Symposium on Applied Computing - SAC 2016 , 2016

#234 Kizzle: A Signature Compiler for Detecting Exploit Kits

Ben Stock , Benjamin Livshits , Benjamin Zorn
The 46th Annual IEEE/IFIP Conference on Dependable Systems and Networks , 2016

#233 Making Chromium´s Certificate Transparency integration more accessible

Daniel Waxweiler
2016

#232 On Profile Linkability despite Anonymity in Social Media Systems

Michael Backes , Pascal Berrang , Oana Goga , Krishna P. Gummadi , Praveen Manoharan
Proceedings of the 2016 ACM Workshop on Privacy in the Electronic Society (WPES) , 2016

#231 On the Feasibility of TTL-based Filtering for DRDoS Mitigation

Michael Backes , Thorsten Holz , Christian Rossow , Teemu Rytilahti , Milivoj Simeonovski , Ben Stock
RAID 2016, 19th International Symposium on Research in Attacks, Intrusions and Defenses , 2016

#230 R-Droid: Leveraging Android App Analysis with Static Slice Optimization

Michael Backes , Sven Bugiel , Erik Derr , Sebastian Gerling , Christian Hammer
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security , 2016

#229 RamCrypt: Kernel-based Address Space Encryption for User-mode Processes

Johannes Götzfried , Tilo Müller , Gabor Drescher , Stefan Nürnberger , Michael Backes
ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIACCS) , 2016

#228 SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion

Akira Yokoyama , Kou Ishii , Rui Tanabe , Yinmin Papa , Katsunari Yoshioka , Tsutomu Matsumoto , Takahiro Kasama , Daisuke Inoue , Michael Brengel , Michael Backes , Christian Rossow
Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings , 2016

#227 Simulating the Large-Scale Erosion of Genomic Privacy Over Time

Michael Backes , Pascal Berrang , Mathias Humbert , Xiaoyu Shen , Verena Wolf
Proceedings of the 3rd International Workshop on Genome Privacy and Security (GenoPri'16) , 2016

#226 Static Analysis of Non-interference for Android Apps

Inken Hagestedt
2016

#225 Time-to-Live based Trilateration

Jonas Bushart
2016

#224 Towards Native Client Executables via Binary Translation on the x86 Platform

Sebastian Dietel
2016

#223 VatiCAN - Vetted, Authenticated CAN Bus

Stefan Nürnberger , Christian Rossow
. Conference on Cryptographic Hardware and Embedded Systems (CHES) , 2016

2015 (29)

IEEE Symposium on Security and Privacy (Oakland) (SandP) (1)

#222 ADSNARK: Nearly-Practical Privacy-Preserving Proofs on Authenticated Data

Michael Backes , Manuel Barbosa , Dario Fiore , Raphael M. Reischuk
Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P) , 2015

ACM Conference on Computer and Communications Security (CCS) (3)

#221 POSTER: In the Net of the Spider - Measuring the Anonymity-Impact of Network-level Adversaries Against Tor

Christian Rossow , Esfandiar Mohammadi , Michael Backes , Sebastian Meiser , Simon Koch
Proceedings of the 22nd ACM conference on Computer and Communications Security (ACM CCS '15) , 2015

#220 POSTER: Towards Compiler-Assisted Taint Tracking on the Android Runtime (ART)

Michael Backes , Oliver Schranz , Philipp von Styp-Rekowsky
Proceedings of the 22nd ACM conference on Computer and Communications Security (ACM CCS '15) , 2015

#219 Vccfinder: Finding potential vulnerabilities in open-source projects to assist code audits

Henning Perl , Sergej Dechand , Matthew Smith , Daniel Arp , Fabian Yamaguchi , Konrad Rieck , Sascha Fahl , Yasemin Acar
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security , 2015

Usenix Security Symposium (USENIX-Security) (1)

#218 Boxify: Full-fledged App Sandboxing for Stock Android

Michael Backes , Sven Bugiel , Christian Hammer , Oliver Schranz , Philipp von Styp-Rekowsky
Proceedings of the 24th USENIX Security Symposium (USENIX '15) , 2015

IEEE Computer Security Foundations Symposium (CSF) (1)

#217 Symbolic Malleable Zero-knowledge Proofs

Esfandiar Mohammadi , Fabian Bendun , Kim Pecina , Matteo Maffei , Michael Backes
Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF '15) , 2015

Other Conferences (others) (23)

#216 Achieving Optimal Utility for Distributed Differential Privacy Using SMPC

Fabienne Eigner , Aniket Kate , Matteo Maffei , Francesca Pampaloni , Ivan Pryvalov
Applications of Secure Multiparty Computation , 2015

#215 Applying Privacy Case Law to The Right to be Forgotten

Abishek Tiwari
2015

#214 Argumentation Mining for the Sake of Privacy

Vikash Patel
2015

#213 ArtHook: Callee-side Method Hook Injection on the New Android Runtime ART

Marvin Wißfeld
2015

#212 Cold boot attacks and the error model of DRAM modules

Steffen Spier
2015

#211 Computational Soundness for Interactive Primitves

Michael Backes , Esfandiar Mohammadi , Tim Ruffing
Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS'15) , 2015

#210 Correlating BGP and Traceroute Data

Simon Koch
2015

#209 Data Lineage in Malicious Environments

Michael Backes , Niklas Grimm , Aniket Kate
IEEE Transactions on Dependable and Secure Computing (Journal) , 2015

#208 Fully Secure Inner-Product Proxy Re-Encryption with constant size Ciphertext

Michael Backes , Martin Gagné , Sri Aravinda Krishnan Thyagarajan
ACM ASIACCS Security in Cloud Computing Workshop 2015 , 2015

#207 How well do you blend into the crowd? - d-convergence: A novel paradigm for quantifying privacy in the age of Big-Data

Michael Backes , Pascal Berrang , Praveen Manoharan
CoRR (Journal) , 2015

#206 Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information

Milivoj Simeonovski , Fabian Bendun , Muhammad Rizwan Asghar , Michael Backes , Ninja Marnau , Peter Druschel
IACR Cryptology ePrint Archive (Journal) , 2015

#205 Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information

Milivoj Simeonovski , Fabian Bendun , Muhammad Rizwan Asghar , Michael Backes , Ninja Marnau , Peter Druschel
CoRR (Journal) , 2015

#204 Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information

Milivoj Simeonovski , Fabian Bendun , Muhammad Rizwan Asghar , Michael Backes , Ninja Marnau , Peter Druschel
13th International Conference on Applied Cryptography and Network Security (ACNS) , 2015

#203 Partially Oblivious Pseudorandom Functions: A Generic Approach and an Impossibility Result

Jonas Schneider
2015

#202 PriCL: Creating a Precedent. A Framework for Reasoning about Privacy Case Law

Michael Backes , Fabian Bendun , Jörg Hoffmann , Ninja Marnau
Proceedings of the 4th Conference on Principles of Security and Trust (POST) , 2015

#201 Quantifying Information Flow in Cryptographic Systems

Michael Backes , Boris Köpf
Mathematical Structures in Computer Science (Journal) , 2015

#200 Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources

Michael Backes , Aniket Kate , Sebastian Meiser , Tim Ruffing
Proceedings of the 13th International Conference on Applied Cryptography and Network Security (ACNS'15) , 2015

#199 Security Analysis of Mobile Banking Apps

Fabian Frank Schwarz
2015

#198 Security Analysis of Telematic and Emergency Devices in a Modern Car

Daniel Frassinelli
2015

#197 The MATOR Addon: Accessible Quantification of Tor Anonymity for the Tor Browser

Markus Bauer
2015

#196 Toward a Backward-compatible API for Defining Fine-grained App Policies on Android

Filip Fatz
2015

#195 Towards Compiler-Assisted Taint Tracking on the Android Runtime

Oliver Schranz
2015

#194 Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms Against Structural Attacks

Michael Backes , Sebastian Meiser , Marcin Slowik
Proceedings on Privacy Enhancing Technologies , 2015

2014 (26)

ACM Conference on Computer and Communications Security (CCS) (3)

#193 (Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection

Michael Backes , Aniket Kate , Sebastian Meiser , Esfandiar Mohammadi
Proceedings of the 21st ACM Conference on Computer and Communications Security (ACM CCS '14) , 2014

#192 Poster: Quasi-ID: In fact, I am a human

Milivoj Simeonovski
Proceedings of the 21st ACM Conference on Computer and Communications Security (ACM CCS '14) , 2014

#191 You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code

Michael Backes , Thorsten Holz , Benjamin Kollenda , Philipp Koppe , Stefan Nürnberger , Jannik Pewny
Proceedings of the 21st ACM conference on Computer and Communications Security (ACM CCS '14) , 2014

Usenix Security Symposium (USENIX-Security) (1)

#190 Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing

Michael Backes , Stefan Nürnberger
Proceedings of the 23rd USENIX Security Symposium (USENIX '14) , 2014

IEEE Computer Security Foundations Symposium (CSF) (1)

#189 TUC: Time-sensitive and Modular Analysis of Anonymous Communication

Michael Backes , Praveen Manoharan , Esfandiar Mohammadi
Proceedings of the of the 27th IEEE Computer Security Foundations Symposium (CSF '14) , 2014

Other Conferences (others) (21)

#188 Android Security Framework: Extensible Multi-Layered Access Control on Android

Michael Backes , Sven Bugiel , Sebastian Gerling , Philipp von Styp-Rekowsky
In Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC'14) , 2014

#187 Application-level Firewall in Stock Android

Frederic Endner-Dühr
2014

#186 Asynchronous MPC with a Strict Honest Majority Using Non-equivocation

Michael Backes , Fabian Bendun , Ashish Choudhury , Aniket Kate
ACM Symposium on Principles of Distributed Computing 2014 , 2014

#185 BackRef: Accountability in Anonymous Communication Networks

Michael Backes , Jeremy Clark , Aniket Kate , Milivoj Simeonovski , Peter Druschel
Applied Cryptography and Network Security , 2014

#184 Computational Soundness Results for ProVerif - Bridging the Gap from Trace Properties to Uniformity

Michael Backes , Esfandiar Mohammadi , Tim Ruffing
Proceedings of the 3rd Conference on Principles of Security and Trust (POST) , 2014

#183 Declarative Design and Enforcement for Secure Cloud Applications

Raphael M. Reischuk
2014

#182 Developing a RiskScore for Android Applications

Marc Schweig
2014

#181 Differentially Private Data Aggregation with Optimal Utility

Fabienne Eigner , Aniket Kate , Matteo Maffei , Francesca Pampaloni , Ivan Pryvalov
30th Annual Computer Security Applications Conference (ACSAC) , 2014

#180 Differentially Private Data Aggregation with Optimal Utility

Fabienne Eigner , Aniket Kate , Matteo Maffei , Francesca Pampaloni , Ivan Pryvalov
2014

#179 Evaluating the Effectiveness of In-app DRM Systems for Android

Niklas Brachmann
2014

#178 Identifying the Optimal Permission Set of Android Applications

Artem Perlov
2014

#177 Lime: Data Lineage in the Malicious Environment

Michael Backes , Niklas Grimm , Aniket Kate
Proceedings of 10th International Workshopon Security and Trust Management (STM) , 2014

#176 Operational Signature Schemes

Michael Backes , Özgür Dagdelen , Marc Fischlin , Sebastian Gajek , Sebastian Meiser , Dominique Schröder
IACR Cryptology ePrint Archive (Journal) , 2014

#175 Privacy-preserving Data Aggregation with Optimal Utility Using Arithmetic SMC -- Extended Abstract

Fabienne Eigner , Aniket Kate , Matteo Maffei , Francesca Pampaloni , Ivan Pryvalov
Workshop on Usable and Efficient Secure Multiparty Computation -- Satellite Event of ESORICS , 2014

#174 Scippa: System-Centric IPC Provenance on Android

Michael Backes , Sven Bugiel , Sebastian Gerling
In Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC'14) , 2014

#173 System Centric IPC Call Chains for Android

Tobias Frey
2014

#172 Taking Android App Vetting to the Next Level with Path-sensitive Value Analysis

Michael Backes , Sven Bugiel , Erik Derr , Christian Hammer
(Techreport) , 2014

#171 Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations

Michael Backes , Cătălin Hriţcu , Matteo Maffei
Journal of Computer Security (Journal) , 2014

#170 Verifying the Internet Access of Android Applications

Erik Derr
2014

#169 WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP

Michael Backes , Rainer W. Gerling , Sebastian Gerling , Stefan Nürnberger , Dominique Schröder , Mark Simkin
12th International Conference on Applied Cryptography and Network Security (ACNS 2014) , 2014

#168 X-pire 2.0 - A User-Controlled Expiration Date and Copy Protection Mechanism.

Michael Backes , Sebastian Gerling , Stefan Lorenz , Stephan Lukas
29th ACM Symposium on Applied Computing (SAC 2014) , 2014

2013 (23)

ACM Conference on Computer and Communications Security (CCS) (1)

#167 Verifiable Delegation of Computation on Outsourced Data

Michael Backes , Dario Fiore , Raphael M. Reischuk
Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS '11) , 2013

Network and Distributed System Security Symposium (NDSS) (1)

#166 Preventing Side-Channel Leaks in Web Traffic: A Formal Approach

Michael Backes , Goran Doychev , Boris Köpf
Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS '13) , 2013

IEEE Computer Security Foundations Symposium (CSF) (1)

#165 AnoA: A Framework For Analyzing Anonymous Communication Protocols

Michael Backes , Aniket Kate , Praveen Manoharan , Sebastian Meiser , Esfandiar Mohammadi
Proceedings of the 26th IEEE Computer Security Foundations Symposium (CSF '13) , 2013

Other Conferences (others) (20)

#164 A Developer-Centric Approach to Dynamic Permission System

Oliver Schranz
2013

#163 AnoA: A Framework for Analyzing Anonymous Communication Protocols

Michael Backes , Aniket Kate , Praveen Manoharan , Sebastian Meiser , Esfandiar Mohammadi
6th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs) , 2013

#162 AppGuard - Enforcing User Requirements on Android Apps

Michael Backes , Sebastian Gerling , Christian Hammer , Matteo Maffei , Philipp von Styp-Rekowsky
19th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS) , 2013

#161 AppGuard - Fine-grained Policy Enforcement for Untrusted Android Applications

Michael Backes , Sebastian Gerling , Christian Hammer , Matteo Maffei , Philipp von Styp-Rekowsky
(Techreport) , 2013

#160 AppGuard – Fine-grained Policy Enforcement for Untrusted Android Applications

Michael Backes , Sebastian Gerling , Christian Hammer , Matteo Maffei , Philipp von Styp-Rekowsky
8th International Workshop on Data Privacy Management (DPM'13) , 2013

#159 Asynchronous Computational VSS with Reduced Communication Complexity

Michael Backes , Amit Datta , Aniket Kate
Proc. of the 2013 Cryptographers' Track at the RSA Conference (CT-RSA 2013) , 2013

#158 Callee-site Rewriting of Sealed System Libraries

Philipp von Styp-Rekowsky , Sebastian Gerling , Michael Backes , Christian Hammer
International Symposium on Engineering Secure Software and Systems (ESSoS'13) , 2013

#157 Client-controlled Cryptography-as-a-Service in the Cloud

Sören Bleikertz , Sven Bugiel , Hugo Ideler , Stefan Nürnberger , Ahmad-Reza Sadeghi
11th International Conference on Applied Cryptography and Network Security (ACNS'13) , 2013

#156 Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized Verification

Michael Backes , Fabian Bendun , Dominique Unruh
Principles of Security and Trust 2013 , 2013

#155 Differentially Private Smart Metering with Battery Recharging

Michael Backes , Sebastian Meiser
Proceedings of the 8th International Workshop on Data Privacy Managemant (DPM 2013) , 2013

#154 Formal Verification of Cryptographic Security Proofs

Matthias Berg
2013

#153 Gadge Me if You Can: Secure and Efficient Ad-Hoc Instruction-Level Randomization for x86 and ARM

Lucas Vincenzo Davi , Alexandra Dmitrienko , Stefan Nürnberger , Ahmad-Reza Sadeghi
8th ACM SIGSAC symposium on Information, computer and communications security (ACM ASIACCS 2013) , 2013

#152 Generic Access Control for Extensible Web Applications within the SAFE Activation

Florian Schröder
2013

#151 Highly Controlled, Fine-grained Delegation of Signing Capabilities

Michael Backes , Sebastian Meiser , Dominique Schröder
IACR Cryptology ePrint Archive (Journal) , 2013

#150 Idea: Callee-Site Rewriting of Sealed System Libraries

Philipp von Styp-Rekowsky , Sebastian Gerling , Michael Backes , Christian Hammer
International Symposium on Engineering Secure Software and Systems (ESSoS'13) , 2013

#149 Introducing Accountability to Anonymity Networks

Michael Backes , Jeremy Clark , Peter Druschel , Aniket Kate , Milivoj Simeonovski
CoRR (Journal) , 2013

#148 Lime: A Framework for Data Lineage in the Malicious Environment

Niklas Grimm
2013

#147 Privacy-Preserving Accountable Computation

Michael Backes , Dario Fiore , Esfandiar Mohammadi
Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS) , 2013

#146 Union, Intersection, and Refinement Types and Reasoning About Type Disjointness for Secure Protocol Implementations

Michael Backes , Cătălin Hriţcu , Matteo Maffei
Special issue of the Journal of Computer Security (JCS) for TOSCA-SecCo (Journal) , 2013

#145 Using Mobile Device Communication to Strengthen e-Voting Protocols

Michael Backes , Martin Gagné , Malte Skoruppa
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society - WPES 2013 , 2013

2012 (26)

IEEE Symposium on Security and Privacy (Oakland) (SandP) (1)

#144 ObliviAd: Provably Secure and Practical Online Behavioral Advertising

Michael Backes , Aniket Kate , Matteo Maffei , Kim Pecina
Proceedings of the 33rd IEEE Symposium on Security and Privacy 2012 (Oakland 2012) , 2012

ACM Conference on Computer and Communications Security (CCS) (1)

#143 Computational Soundness without Protocol Restrictions

Michael Backes , Ankit Malik , Dominique Unruh
Proceedings of the 19th ACM Conference on Computer and Communication Security (CCS '12) , 2012

Network and Distributed System Security Symposium (NDSS) (2)

#142 Automated Synthesis of Secure Distributed Applications

Michael Backes , Matteo Maffei , Kim Pecina
Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS '12) , 2012

#141 MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones

Lucas Davi , Alexandra Dmitrienko , Manuel Egele , Thomas Fischer , Thorsten Holz , Ralf Hund , Stefan Nürnberger , Ahmad-Reza Sadeghi
Proceedings of the 19th Annual Symposium on Network and Distributed System Security (NDSS '12) , 2012

IEEE Computer Security Foundations Symposium (CSF) (2)

#140 Provably Secure and Practical Onion Routing

Michael Backes , Aniket Kate , Ian Goldberg , Esfandiar Mohammadi
Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF) , 2012

#139 Verified Security of Merkle-Damgård

Michael Backes , Gilles Barthe , Matthias Berg , Benjamin Grégoire , César Kunz , Malte Skoruppa , Santiago Zanella Béguelin
Proceedings of the 25th IEEE Computer Security Foundations Symposium - CSF 2012 , 2012

Other Conferences (others) (20)

#138 Ace: An Efficient Key-Exchange Protocol for Onion Routing

Michael Backes , Aniket Kate , Esfandiar Mohammadi
Proceedings of the 11th ACM Workshop on Privacy in the Electronic Society (WPES) , 2012

#137 Adding query privacy to robust DHTs

Michael Backes , Ian Goldberg , Aniket Kate , Tomas Toft
Proc. of the 7th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2012) , 2012

#136 A Framework for Security-Oriented Distributed Programming

Manuel Reinert
2012

#135 Analysis and Mitigation of Information Leaks in Web Browsing Traffic

Goran Doychev
2012

#134 AppGuard - Real-time Policy Enforcement for Third-Party Applications

Michael Backes , Sebastian Gerling , Christian Hammer , Matteo Maffei , Philipp von Styp-Rekowsky
(Techreport) , 2012

#133 Autonomous UAV

Philip Peter
2012

#132 Brief announcement: distributed cryptography using trinc

Michael Backes , Fabian Bendun , Aniket Kate
ACM Symposium on Principles of Distributed Computing 2012 , 2012

#131 Computational Soundness of Interactive Primitives

Tim Ruffing
2012

#130 Computational Soundness of Symbolic Zero-knowledge Proofs: Weaker Assumptions and Mechanized Verification

Michael Backes , Fabian Bendun , Dominique Unruh
Eight Workshop on Formal and Computational Cryptography (FCC 2012) , 2012

#129 Diffusion-Based Image Compression in Steganography

Markus Mainberger , Michael Backes , Matthias Berg , Joachim Weickert
Proceedings of the 8th International Symposium on Visual Computing -- ISVC 2012 , 2012

#128 Model-based Monitoring for Sensitive SCADA Systems

Joachim Lutz
2012

#127 On the Development and Formalization of an Extensible Code Generator for Real Life Security Protocols

Michael Backes , Alex Busenius , Cătălin Hriţcu
Proc. 4th NASA Formal Methods Symposium (NFM 2012) , 2012

#126 Privacy Presserving Surveillance and Face Recognition

Sebastian Meyer
2012

#125 Rational Cryptography

Oana Ciobotaru
2012

#124 SAFE Extensibility of Data-Driven Web Applications

Raphael M. Reischuk , Michael Backes , Johannes Gehrke
WWW~'12: Proceedings of the 21st International World Wide Web Conference , 2012

#123 Securing User-data in Android - A conceptual approach for consumer and enterprise usage

Liviu Teris
2012

#122 Security Analysis of Browser Extension Concepts

Karsten Knuth
2012

#121 User-controlled Internet Connections in Android

Sven Obser
2012

#120 Verifiable Security of Prefix-free Merkle-Damgård

Malte Skoruppa
2012

#119 XIFER: A Software Diversity Tool Against Code-Reuse Attacks

Lucas Davi , Alexandra Dmitrienko , Stefan Nürnberger , Ahmad-Reza Sadeghi
4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3) , 2012

2011 (24)

ACM Conference on Computer and Communications Security (CCS) (2)

#118 AmazonIA: When Elasticity Snaps Back

Sven Bugiel , Thomas Pöppelmann , Stefan Nürnberger , Ahmad-Reza Sadeghi , Thomas Schneider
Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11) , 2011

#117 Poster: Control-flow Integrity for Smartphones

Lucas Davi , Alexandra Dmitrienko , Manuel Egele , Thomas Fischer , Thorsten Holz , Ralf Hund , Stefan Nürnberger , Ahmad-Reza Sadeghi
18th ACM conference on Computer and communications security (ACM CCS 2012) , 2011

Network and Distributed System Security Symposium (NDSS) (1)

#116 A Security API for Distributed Social Networks

Michael Backes , Matteo Maffei , Kim Pecina
Proceedings of the Network and Distributed System Security Symposium (NDSS '11) , 2011

Other Conferences (others) (21)

#115 A Local Cross-Site Scripting Attack against Android Phones

Michael Backes , Sebastian Gerling , Philipp von Styp-Rekowsky
(Journal) , 2011

#114 Anonymous Webs of Trust

Stefan Lorenz
2011

#113 Automatically Verifying Typing Constraints for a Data Processing Language

Michael Backes , Cătălin Hriţcu , Thorsten Tarrach
Proc. 1st International Conference on Certified Programs and Proofs (CPP 2011) , 2011

#112 Automatic Verification of Equivalences of Cryptographic Games

Holger Bornträger
2011

#111 CFI Goes Mobile: Control-Flow Integrity for Smartphones

Lucas Davi , Alexandra Dmitrienko , Manuel Egele , Thomas Fischer , Thorsten Holz , Ralf Hund , Stefan Nürnberger , Ahmad-Reza Sadeghi
International Workshop on Trustworthy Embedded Devices (TrustED) (Journal) , 2011

#110 Computational Soundness of Passively Secure Encryption in Presence of Active Adversaries

Sebastian Meiser
2011

#109 Computational Verifiable Secret Sharing Revisited

Michael Backes , Aniket Kate , Arpita Patra
Proc. 17th International Conference on the Theory and Application of Cryptology (ASIACRYPT 2011) , 2011

#108 Cryptographically sound security proofs for basic and public-key Kerberos

Michael Backes , Iliano Cervesato , Aaron D Jaggard , Andre Scedrov , Joe-Kai Tsay
International Journal of Information Security (Journal) , 2011

#107 G2C: Cryptographic Protocols from Goal-Driven Specifications

Michael Backes , Matteo Maffei , Kim Pecina , Raphael M. Reischuk
TOSCA'11: Proceedings of the 2011 International Conference on Theory of Security and Applications (now POST), held as part of ETAPS 2011 , 2011

#106 Game-Theoretic Notions of Incoercibility

Robert Künnemann
2011

#105 Low-Cost Byzantine Fault Tolerant Replication for a Cloud Environment

Stefan Tombers
2011

#104 Mechanized Formalization of a Transformation from an Extensible Spi Calculus to Java

Alex Busenius
2011

#103 Non-Uniform Distributions in Quantitative Information-Flow

Michael Backes , Matthias Berg , Boris Köpf
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS) , 2011

#102 Securing social networks

Michael Backes , Matteo Maffei , Kim Pecina
Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, PODC 2011, San Jose, CA, USA, June 6-8, 2011 , 2011

#101 Towards a Formal Sematics for G2C Summary

Jan Balzer
2011

#100 Twin Clouds: An Architecture for Secure Cloud Computing

Sven Bugiel , Stefan Nürnberger , Ahmad-Reza Sadeghi , Thomas Schneider
Workshop on Cryptography and Security in Clouds (CSC) , 2011

#99 Twin Clouds: Secure Cloud Computing with Low Latency

Sven Bugiel , Stefan Nürnberger , Ahmad-Reza Sadeghi , Thomas Schneider
Communications and Multimedia Security Conference (CMS'11) , 2011

#98 Union and Intersection Types for Secure Protocol Implementations

Michael Backes , Cătălin Hriţcu , Matteo Maffei
Theory of Security and Applications - Joint Workshop, TOSCA 2011, Saarbrücken, Germany, March 31 - April 1, 2011, Revised Selected Papers , 2011

#97 Union Intersection, and Refinement Types and Reasoning About Type Disjointness for Security Protocol Analysis

Cătălin Hriţcu
2011

#96 Universally Composable Relativistic Commitments

Ines Lucia Ciolacu
2011

#95 X-pire! - A digital expiration date for images in social networks

Julian Backes , Michael Backes , Markus Dürmuth , Stefan Lorenz , Sebastian Gerling
(Techreport) , 2011

2010 (19)

ACM Conference on Computer and Communications Security (CCS) (1)

#94 Computationally Sound Verification of Source Code

Michael Backes , Matteo Maffei , Dominique Unruh
ACM CCS 2010 , 2010

Usenix Security Symposium (USENIX-Security) (1)

#93 Acoustic Side-Channel Attacks of Printers

Michael Backes , Markus Dürmuth , Sebastian Gerling , Manfred Pinkal , Caroline Sporleder
Proceedings of 19th USENIX Security Symposium , 2010

Other Conferences (others) (17)

#92 Anonymity and Trust in Distributed Systems

Michael Backes , Stefan Lorenz , Matteo Maffei , Kim Pecina
Proceedings of 29th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC) , 2010

#91 Anonymity in Online Polls

Dominik Feld
2010

#90 Anonymous Webs of Trust

Michael Backes , Stefan Lorenz , Matteo Maffei , Kim Pecina
Proceedings of 10th Privacy Enhancing Technologies Symposium (PETS) , 2010

#89 Automatically Verifying 'M' Modelling Language Constraints

Thorsten Tarrach
2010

#88 Computationally Sound Abstraction and Verification of Secure Multi-Party Computations

Michael Backes , Matteo Maffei , Esfandiar Mohammadi
Proceedings of the 30th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS) , 2010

#87 Computational Soundness of Symbolic Zero-Knowledge Proofs

Michael Backes , Dominique Unruh
Journal of Computer Security (Journal) , 2010

#86 Digital Watermarking: Methods and Applications for Digital Images

Nicolas Rickert
2010

#85 Formale Analyse von Mastermind

Rajiv Lund
2010

#84 Formalization of Game-Transformations

Jonathan Driedger
2010

#83 Formal Verification of ElGamal Encryption using a Probabilistic Lambda-Calculus

Malte Skoruppa
2010

#82 Moment Preserving Diffusion in Image Processing

Martin Grochulla
2010

#81 Novel Classes of Side Channels and Covert Channels

Markus Dürmuth
2010

#80 RatFish: A File Sharing Protocol Provably Secure Against Rational Users

Michael Backes , Oana Ciobotaru , Anton Krohmer
Proceedings of 15th European Symposium on Research in Computer Security (ESORICS) , 2010

#79 Ray - A Secure Microkernel Architecture

Stefan Nürnberger , Thomas Feller , Sorin A Huss
Eighth Annual International Conference on Privacy Security and Trust (IEEE PST 2010) , 2010

#78 Speaker Recognition in Encrypted Voice-over-IP Traffic

Michael Backes , Goran Doychev , Markus Dürmuth , Boris Köpf
Proceedings of 15th European Symposium on Research in Computer Security (ESORICS) , 2010

#77 Speaker Recognition in Encrypted Voice Streams

Goran Doychev
2010

#76 Type-Based Verification of Electronic Voting Systems

Fabienne Eigner
2010

2009 (20)

ACM Conference on Computer and Communications Security (CCS) (1)

#75 CoSP: a general framework for computational soundness proofs

Michael Backes , Dennis Hofheinz , Dominique Unruh
Proceedings of the 16th ACM conference on Computer and communications security (CCS) , 2009

Network and Distributed System Security Symposium (NDSS) (1)

#74 CSAR: A practical and provable technique to make randomized systems accountable

Michael Backes , Peter Druschel , Andreas Haeberlen , Dominique Unruh
NDSS 2009 , 2009

IEEE Computer Security Foundations Symposium (CSF) (1)

#73 Achieving Security Despite Compromise Using Zero-knowledge

Michael Backes , Martin Grochulla , Cătălin Hriţcu , Matteo Maffei
Proceedings of 22nd IEEE Computer Security Foundations Symposium (CSF) , 2009

Other Conferences (others) (17)

#72 Acoustic Side-Channel Attacks on Printers

Sebastian Gerling
2009

#71 Anonymity and Censorship Resistance in Sematic Overlay Networtks

Lech Marek Hamerlik
2009

#70 Anonymity and Censorship Resistance in Unstructured Overlay Networks

Michael Backes , Marek Hamerlik , Alessandro Linari , Matteo Maffei , Christos Tryfonopoulos , Gerhard Weikum
On the Move to Meaningful Internet Systems: OTM 2009, Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part I , 2009

#69 Anonymous and Censorship-resistant Content-sharing in Unstructured Overlays

Michael Backes , Lech Marek Hamerlik , Alessandro Linari , Matteo Maffei , Christos Tryfonopoulos , Gerhard Weikum
Proceedings of OTM Conferences , 2009

#68 Automatic Discovery and Quantification of Information Leaks

Michael Backes , Boris Köpf , Andrey Rybalchenko
Proceedings of 30th IEEE Symposium on Security and Privacy , 2009

#67 Caspa - Mechanized Verification of Security Protocols using Causality-based Abstractions

Stefan Lorenz
2009

#66 Computational Soundness of Symbolic Zero-Knowledge Proofs against Active Attackers under Relaxed Assumptions

Esfandiar Mohammadi
2009

#65 Computing Information-theoretic Bounds for Unknown Message Side-Channel Attacks

Christian Schnuck
2009

#64 Design and Verification of Anonymous Trust Protocols

Michael Backes , Matteo Maffei
Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers , 2009

#63 Expi2Java - En Extensible Code Generator for Security Protocols

Alex Busenius
2009

#62 Hiding Malicious Postscript Code and How to Define Undetectabilit

Robert Künnemann
2009

#61 Rational File Sharing

Anton Krohmer
2009

#60 Security Despite Compromise with Zero-Knowledge Proofs

Martin Grochulla
2009

#59 Security of Robust Audio Hashes

Stefan Thiemert , Stefan Nürnberger , Martin Steinebach , Sascha Zmudzinski
First IEEE International Workshop on Information Forensics and Security (WIFS 2009) , 2009

#58 Sicherheitskonzept an einem Rechenzentrum

Dirk Heine
2009

#57 SPI2F - A Prototype Code Generator for Security Protocols

Thorsten Tarrach
2009

#56 Tempest in a Teapot: Compromising Reflections Revisited

Michael Backes , Tongbo Chen , Markus Dürmuth , Hendrik Lensch , Martin Welk
Proceedings of 30th IEEE Symposium on Security and Privacy , 2009

2008 (19)

IEEE Symposium on Security and Privacy (Oakland) (SandP) (1)

#55 Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol

Michael Backes , Matteo Maffei , Dominique Unruh
IEEE Symposium on Security and Privacy, Proceedings of SSP'08 , 2008

ACM Conference on Computer and Communications Security (CCS) (1)

#54 Type-checking zero-knowledge

Michael Backes , Matteo Maffei , Cătălin Hriţcu
Proceedings of the 15th ACM conference on Computer and communications security , 2008

IEEE Computer Security Foundations Symposium (CSF) (2)

#53 Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-calculus

Michael Backes , Cătălin Hriţcu , Matteo Maffei
Proceedings of 21st IEEE Computer Security Foundations Symposium (CSF) , 2008

#52 Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers

Michael Backes , Dominique Unruh
21st IEEE Computer Security Foundations Symposium, CSF 2008 , 2008

Other Conferences (others) (15)

#51 A Formal Language for Cryptographic Pseudocode

Michael Backes , Matthias Berg , Dominique Unruh
LPAR 2008 , 2008

#50 Brief Announcement: Anonymous and Censorship-resistant Content-sharing in Unstructured Overlays

Michael Backes , Lech Marek Hamerlik , Alessandro Linari , Matteo Maffei , Christos Tryfonopoulos , Gerhard Weikum
Proceedings of 27th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC) , 2008

#49 CASPA: Causality-based Abstraction for Security Protocol Analysis

Michael Backes , Stefan Lorenz , Matteo Maffei , Kim Pecina
Proceedings of 20th International Conference on Computer Aided Verification (CAV) , 2008

#48 Compromising Reflections or How to Read LCD Monitors Around the Corner

Michael Backes , Markus Dürmuth , Dominique Unruh
IEEE Symposium on Security and Privacy, Proceedings of SSP'08 , 2008

#47 Conditional Reactive Simulatability

Michael Backes , Markus Dürmuth , Dennis Hofheinz , Ralf Küsters
International Journal of Information Security (Journal) , 2008

#46 Efficient Long-term Secure Universally Composable Commitments

Oana Ciobataru
2008

#45 Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks

Michael Backes , Boris Köpf
Proceedings of 13th European Symposium on Research in Computer Security (ESORICS) , 2008

#44 Formal Specification of the x87 Floating-Point Instruction Set

Christoph Baumann
2008

#43 Gespiegelt / Verräterische Reflexionen: Wie Brillengläser Geheimnisse verraten

Michael Backes , Markus Dürmuth , Dominique Unruh
2008

#42 Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles

Michael Backes , Birgit Pfitzmann , Andre Scedrov
Journal of Computer Security (JCS) (Journal) , 2008

#41 Limits of Constructive Security Proofs

Michael Backes , Dominique Unruh
ASIACRYPT 2008 , 2008

#40 Limits of the BRSIM/UC soundness of Dolev-Yao-style XOR

Michael Backes , Birgit Pfitzmann
International Journal of Information Security (Journal) , 2008

#39 MD5 Collisions on Multimedia Files

Holger Bornträger
2008

#38 OAEP is Secure Under Key-dependent Messages

Michael Backes , Markus Dürmuth , Dominique Unruh
ASIACRYPT 2008 , 2008

#37 Quantenbasierte Koordination von Multiagentensystemen

Stefan Nesbigall
2008

2007 (20)

IEEE Computer Security Foundations Symposium (CSF) (2)

#36 Causality-based Abstraction of Multiplicity in Security Protocols

Michael Backes , Agostino Cortesi , Matteo Maffei
Proceedings of 20th IEEE Computer Security Foundation Symposium (CSF) , 2007

#35 Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles

Michael Backes , Birgit Pfitzmann , Andre Scedrov
Proceedings of 20th IEEE Computer Security Foundation Symposium (CSF) , 2007

Other Conferences (others) (18)

#34 A Calculus of Challenges and Responses

Michael Backes , Agostino Cortesi , Riccardo Focardi , Matteo Maffei
Proceedings of 5th ACM Workshop on Formal Methods in Security Engineering (FMSE) , 2007

#33 Causality-based Abstraction of Multiplicity in Security Protocol Analysis

Michael Backes , Agostino Cortesi , Matteo Maffei
2007

#32 Cryptographic Soundness of Simpler Symbolic Signatures and Authentications

Fabienne Eigner
2007

#31 Design und Implementierung eines Sync-ML Clients für das c`man-Framework für Symbian Gerät

Martin Nicolay
2007

#30 Enterprise Privacy Policies and Languages

Michael Backes , Markus Dürmuth
Digital Privacy: Theory, Technologies and Practices , 2007

#29 Enterprise Privacy Policies and Languages

Michael Backes , Markus Dürmuth
Digital Privacy: Theory, Technologies and Practices , 2007

#28 Implementing Fuzzy Identity-Based Encryption

Markus Müller
2007

#27 Information Flow in the Peer-Reviewing Process (extended abstract)

Michael Backes , Markus Dürmuth , Dominique Unruh
Proceedings of 28th IEEE Symposium on Security and Privacy (SSP) , 2007

#26 LAN Crypt Gateway and Secure Browser Access

Sebastian Gerling
2007

#25 Mechanized verification of Security Protocols Using Causality-based Abstractions

Kim Pecina
2007

#24 Multiparty Computation in an Asynchronous Network

Süntje Böttcher
2007

#23 On Key-dependent Encryption

Matthias Berg
2007

#22 On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography

Michael Backes , Markus Dürmuth , Ralf Küsters
Proceedings of 27th International Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS) , 2007

#21 On the Necessity of Rewinding in Secure Multiparty Computation

Michael Backes , Jörn Müller-Quade , Dominique Unruh
Theory of Cryptography, Proceedings of TCC 2007 , 2007

#20 On the Security of Protocols with Logarithmic Communication Complexity

Michael Backes , Dominique Unruh
2007

#19 The Reactive Simulatability Framework for Asynchronous Systems

Michael Backes , Birgit Pfitzmann , Michael Waidner
Information and Computation (Journal) , 2007

#18 Trust Model for eVoting

Martin Grochulla
2007

#17 Vorgetäuscht / Böse Textdokumente -- Postscript gone wild

Michael Backes , Markus Dürmuth , Dominique Unruh
2007

2006 (16)

ACM Conference on Computer and Communications Security (CCS) (1)

#16 Computationally Sound Secrecy Proofs by Mechanized Flow Analysis

Michael Backes , Peeter Laud
Proceedings of 13th ACM Conference on Computer and Communications Security (CCS) , 2006

Other Conferences (others) (15)

#15 Compositional Analysis of Contract Signing Protocols

Michael Backes , Anupam Datta , Ante Derek , John C. Mitchell , Mathieu Turuani
Theoretical Computer Science (Journal) , 2006

#14 Computationally Sound Secrecy Proofs by Mechanized Flow Analysis

Michael Backes , Peeter Laud
2006

#13 Conditional Reactive Simulatability

Michael Backes , Markus Dürmuth , Dennis Hofheinz , Ralf Küsters
Proceedings of 11th European Symposium on Research in Computer Security (ESORICS) , 2006

#12 Cryptographically Sound Security Proofs for Basic and Public-key Kerberos

Michael Backes , Iliano Cervesato , Aaron D Jaggard , Andre Scedrov , Joe-Kai Tsay
Proceedings of 11th European Symposium on Research in Computer Security(ESORICS) , 2006

#11 Cryptographically Sound Theorem Proving

Christoph Sprenger , Michael Backes , David Basin , Birgit Pfitzmann , Michael Waidner
Proceedings of 19th IEEE Computer Security Foundations Workshop (CSFW) , 2006

#10 Formal Methods and Cryptography

Michael Backes , Birgit Pfitzmann , Michael Waidner
Proceedings of 14th International Symposium on Formal Methods (FM) , 2006

#9 Games and the Impossibility of Realizable Ideal Functionality

Michael Backes , Anupam Datta , Ante Derek , John C. Mitchell , Ajith Ramanathan , Andre Scedrov
2006

#8 Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes

Michael Backes , Birgit Pfitzmann , Michael Waidner
Proceedings of 11th European Symposium on Research in Computer Security(ESORICS) , 2006

#7 On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol

Michael Backes , Birgit Pfitzmann
Proceedings of 21st IFIP International Information Security Conference (SEC) , 2006

#6 On the Necessity of Rewinding in Secure Multiparty Computation

Michael Backes , Jörn Müller-Quade , Dominique Unruh
2006

#5 Proceedings of 9th International Conference on Information Security (ISC), Samos Island, Greece

Michael Backes , Stefanos Gritzalis , Bart Preneel , Sokratis K Katsikas , Javier Lopez
2006

#4 Real-or-Random Key Secrecy of the Otway-Rees Protocol via a Symbolic Security Proof

Michael Backes
Electronic Notes in Theoretical Computer Science (ENTCS) (Journal) , 2006

#3 Secure Key-Updating for Lazy Revocation

Michael Backes , Christian Cachin , Alina Oprea
Proceedings of 11th European Symposium on Research in Computer Security(ESORICS) , 2006

#2 Soundness Limits of Dolev-Yao Models

Michael Backes , Birgit Pfitzmann , Michael Waidner
2006

#1 Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario

Michael Backes , Sebastian Mödersheim , Birgit Pfitzmann , Luca Vigano
Proceedings of Foundations of Software Science and Computational Structures (FOSSACS) , 2006