CISPA Helmholtz Center for Information Security

General Info

Rank: #7 Worldwide
#1 in Europe
Papers: 179
Number of Researchers: 102
APA
(average papers per authors):
1.8
Country: GERMANY

Activity Map

Contributors

  • Michael Backes (78 papers)
  • Yang Zhang (27 papers)
  • Christian Rossow (17 papers)
  • Sven Bugiel (16 papers)
  • Ben Stock (15 papers)
  • Giancarlo Pellegrino (13 papers)
  • Cas Cremers (11 papers)
  • Sascha Fahl (10 papers)
  • Michael Schwarz (9 papers)
  • Zhikun Zhang (9 papers)
  • Mario Fritz (7 papers)
  • Katharina Krombholz (7 papers)
  • Nils Ole Tippenhauer (6 papers)
  • Xinlei He (6 papers)
  • Marius Steffens (5 papers)
  • Pascal Berrang (5 papers)
  • Ahmed Salem (5 papers)
  • Erik Derr (5 papers)
  • Sebastian Roth (4 papers)
  • Yasemin Acar (4 papers)
  • Lucjan Hanzlik (4 papers)
  • Min Chen (4 papers)
  • Andreas Zeller (3 papers)
  • Stefan Nurnberger (3 papers)
  • Soheil Khodayari (3 papers)
  • Christian Stransky (3 papers)
  • Marten Oltrogge (3 papers)
  • Charlie Jacomme (3 papers)
  • Trung Tin Nguyen (3 papers)
  • Thorsten Holz (3 papers)
  • Giorgi Maisuradze (2 papers)
  • Abdallah Dawoud (2 papers)
  • Sanam Ghorbani Lyastani (2 papers)
  • Michael Schilling (2 papers)
  • Sahar Abdelnabi (2 papers)
  • Daniel Weber (2 papers)
  • Bernd Finkbeiner (2 papers)
  • Jie Huang (2 papers)
  • Aurore Fass (2 papers)
  • Jonas Schneider-Bensch (2 papers)
  • Rui Wen (2 papers)
  • Benjamin Kiesl (2 papers)
  • Zheng Li (2 papers)
  • Yiyong Liu (2 papers)
  • Fabian Schwarz (2 papers)
  • Ahmad Ibrahim (2 papers)
  • Hamed Nemati (2 papers)
  • Johannes Krupp (2 papers)
  • Stephan Neuhaus (1 papers)
  • Tim Ruffing (1 papers)
  • Giulio Malavolta (1 papers)
  • Marie-Therese Walter (1 papers)
  • David Pfaff (1 papers)
  • Inken Hagestedt (1 papers)
  • Giada Stivala (1 papers)
  • Bartlomiej Surma (1 papers)
  • Praveen Manoharan (1 papers)
  • Jilles Vreeken (1 papers)
  • Mridula Singh (1 papers)
  • Markus Duermuth (1 papers)
  • Dominique Unruh (1 papers)
  • Mathias Humbert (1 papers)
  • Duc Cuong Nguyen (1 papers)
  • Michaela Neumayr (1 papers)
  • Daniel Frassinelli (1 papers)
  • Sohyeon Park (1 papers)
  • Jacqueline Brendel (1 papers)
  • Mang Zhao (1 papers)
  • Dominik Wermke (1 papers)
  • Noah Woehler (1 papers)
  • Simon Koch (1 papers)
  • Oliver Schranz (1 papers)
  • Pascal Dupre (1 papers)
  • Dingfan Chen (1 papers)
  • Nico Dottling (1 papers)
  • Jaiden Fairoze (1 papers)
  • Aurora Naska (1 papers)
  • Cristian-Alexandru Staicu (1 papers)
  • Doliere Francis Some (1 papers)
  • Lea Theresa Grober (1 papers)
  • Xaver Fabian (1 papers)
  • Khue Do (1 papers)
  • Gunnar Heide (1 papers)
  • Shubham Agarwal (1 papers)
  • Zhengyu Zhao (1 papers)
  • Till Schluter (1 papers)
  • Kamil Kluczniak (1 papers)
  • Renas Bacho (1 papers)
  • Julian Loss (1 papers)
  • Hai Huang (1 papers)
  • Karl Wust (1 papers)
  • Wai Man Si (1 papers)
  • Dhiman Chakraborty (1 papers)
  • Niklas Medinger (1 papers)
  • Yusra Elbitar (1 papers)
  • Nicolas Huaman (1 papers)
  • Michael Brengel (1 papers)
  • Ninja Marnau (1 papers)
  • Yugeng Liu (1 papers)
  • Robert Kunnemann (1 papers)
  • Sabrina Amft (1 papers)
  • Moritz Wilhelm (1 papers)

Papers

"Isolating Intrusions by Automatic Experiments"

Stephan Neuhaus, Andreas Zeller, ... -- NDSS 2006

"Extended Abstract: Information Flow in the Peer-Reviewing Process"

Michael Backes, Markus Duermuth, Dominique Unruh, ... -- Oakland 2007

"Predicting Vulnerable Software Components"

Andreas Zeller, ... -- CCS 2007

"Compromising Reflections-or-How to Read LCD Monitors around the Corner"

Michael Backes, ... -- Oakland 2008

"Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol"

Michael Backes, ... -- Oakland 2008

"Type-checking Zero-knowledge"

Michael Backes, ... -- CCS 2008

"CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable"

Michael Backes, ... -- NDSS 2009

"Automatic Discovery and Quantification of Information Leaks"

Michael Backes, ... -- Oakland 2009

"Tempest in a Teapot: Compromising Reflections Revisited"

Michael Backes, ... -- Oakland 2009

"CoSP: a general framework for computational soundness proofs"

Michael Backes, ... -- CCS 2009

"Computationally sound verification of source code"

Michael Backes, ... -- CCS 2010

"Acoustic Side-Channel Attacks on Printers"

Michael Backes, ... -- Usenix 2010

"A Security API for Distributed Social Networks"

Michael Backes, ... -- NDSS 2011

"Automated Synthesis of Secure Distributed Applications"

Michael Backes, ... -- NDSS 2012

"ObliviAd: Provably Secure and Practical Online Behavioral Advertising"

Michael Backes, ... -- Oakland 2012

"Computational Soundness Without Protocol Restrictions"

Michael Backes, ... -- CCS 2012

"Fuzzing with Code Fragments"

Andreas Zeller, ... -- Usenix 2012

"Preventing Side-channel Leaks in Web Traffic: A Formal Approach"

Michael Backes, ... -- NDSS 2013

"Verifiable Delegation of Computation on Outsourced Data"

Michael Backes, ... -- CCS 2013

"Relational Abstract Interpretation for the Verification of 2-Hypersafety Properties"

Bernd Finkbeiner, ... -- CCS 2013

"Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies"

Sven Bugiel, ... -- Usenix 2013

"(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection"

Michael Backes, ... -- CCS 2014

"You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code"

Michael Backes, ... -- CCS 2014

"Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing"

Michael Backes, ... -- Usenix 2014

"ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data"

Michael Backes, ... -- Oakland 2015

"Cross-Architecture Bug Search in Binary Executables"

Christian Rossow, ... -- Oakland 2015

"Boxify: Full-fledged App Sandboxing for Stock Android"

Michael Backes, Sven Bugiel, ... -- Usenix 2015

"In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services"

Giancarlo Pellegrino, ... -- Usenix 2015

"How to Make ASLR Win the Clone Wars: Runtime Re-Randomization"

Stefan Nurnberger, Michael Backes, ... -- NDSS 2016

"SoK: Lessons Learned From Android Security Research For Appified Software Platforms"

Michael Backes, Sven Bugiel, Sascha Fahl, ... -- Oakland 2016

"You Get Where You're Looking For: The Impact Of Information Sources On Code Security"

Yasemin Acar, Michael Backes, Sascha Fahl, ... -- Oakland 2016

"Reliable Third-Party Library Detection in Android and its Security Applications"

Michael Backes, Sven Bugiel, Erik Derr, ... -- CCS 2016

"Membership Privacy in MicroRNA-based Studies"

Michael Backes, Pascal Berrang, ... -- CCS 2016

"Efficient Cryptographic Password Hardening Services From Partially Oblivious Commitments"

Michael Backes, ... -- CCS 2016

"Computational Soundness of Dalvik Bytecode"

Michael Backes, ... -- CCS 2016

"Identifying the Scanners and Attack Infrastructure behind Amplification DDoS attacks"

Michael Backes, Christian Rossow, ... -- CCS 2016

"Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification"

Ben Stock, Giancarlo Pellegrino, Christian Rossow, Michael Backes, ... -- Usenix 2016

"What Cannot be Read, Cannot be Leveraged? Revisiting Assumptions of JIT-ROP Defenses"

Michael Backes, Christian Rossow, ... -- Usenix 2016

"An Empirical Study of Textual Key-Fingerprint Representations"

Yasemin Acar, Sascha Fahl, ... -- Usenix 2016

"On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis"

Michael Backes, Sven Bugiel, Erik Derr, ... -- Usenix 2016

"Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles"

Michael Backes, Pascal Berrang, ... -- Usenix 2016

"P2P Mixing and Unlinkable Bitcoin Transactions"

Tim Ruffing, ... -- NDSS 2017

"SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks"

Giulio Malavolta, ... -- NDSS 2017

"Dachshund: Digging for and Securing (Non-)Blinded Constants in JIT Code"

Giorgi Maisuradze, Michael Backes, Christian Rossow, ... -- NDSS 2017

"Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying"

Marie-Therese Walter, David Pfaff, Stefan Nurnberger, Michael Backes, ... -- NDSS 2017

"Comparing the Usability of Cryptographic APIs"

Yasemin Acar, Michael Backes, Sascha Fahl, Christian Stransky, ... -- Oakland 2017

"Identifying Personal DNA Methylation Profiles by Genotype Inference"

Michael Backes, Pascal Berrang, Mathias Humbert, ... -- Oakland 2017

"Stack Overflow Considered Harmful? --- The Impact of Copy&Paste on Android Application Security"

Christian Stransky, Yasemin Acar, Michael Backes, Sascha Fahl, ... -- Oakland 2017

"A Stitch in Time: Supporting Android Developers in Writing Secure Code"

Michael Backes, ... -- CCS 2017

"Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs"

Giancarlo Pellegrino, Simon Koch, Michael Backes, Christian Rossow, ... -- CCS 2017

"Keep me updated: An Empirical Study of Third-Party Library Updatability on Android"

Erik Derr, Sven Bugiel, Michael Backes, ... -- CCS 2017

"The ART of App Compartmentalization: Compiler-based Library Privilege Separation on Stock Android"

Jie Huang, Oliver Schranz, Sven Bugiel, Michael Backes, ... -- CCS 2017

"Verifying Security Policies in Multi-agent Workflows with Loops"

Bernd Finkbeiner, ... -- CCS 2017

"walk2friends: Inferring Social Links from Mobility Profiles"

Michael Backes, Yang Zhang, ... -- CCS 2017

"How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security"

Ben Stock, Marius Steffens, Michael Backes, ... -- Usenix 2017

"Didn't You Hear Me? - Towards More Successful Web Vulnerability Notifications."

Ben Stock, Giancarlo Pellegrino, Michael Backes, Christian Rossow, ... -- NDSS 2018

"Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels"

Michael Backes, ... -- Oakland 2018

"The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators"

Marten Oltrogge, Erik Derr, Christian Stransky, Christian Rossow, Giancarlo Pellegrino, Sven Bugiel, Michael Backes, ... -- Oakland 2018

"On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees"

Cas Cremers, ... -- CCS 2018

"ret2spec: Speculative Execution Using Return Stack Buffers"

Giorgi Maisuradze, Christian Rossow, ... -- CCS 2018

"Investigating Operators' Perspective on Security Misconfigurations"

Katharina Krombholz, ... -- CCS 2018

"Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse"

Sanam Ghorbani Lyastani, Michael Backes, Sven Bugiel, ... -- Usenix 2018

"teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts"

Johannes Krupp, Christian Rossow, ... -- Usenix 2018

"Don't Trust The Locals: Investigating the Prevalence of Persistent Client-Side Cross-Site Scripting in the Wild"

Marius Steffens, Christian Rossow, Ben Stock, ... -- NDSS 2019

"The Unexpected Danger of UX Features: A Case of Sensitive Data Leakage of Drivers in Ride-Hailing Services"

Giancarlo Pellegrino, ... -- NDSS 2019

"MBeacon: Privacy-Preserving Beacons for DNA Methylation Data"

Inken Hagestedt, Yang Zhang, Pascal Berrang, Michael Backes, ... -- NDSS 2019

"ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models"

Ahmed Salem, Yang Zhang, Pascal Berrang, Mario Fritz, Michael Backes, ... -- NDSS 2019

"Nearby Threats: Reversing, Analyzing, and Attacking Google's "Nearby Connections" on Android"

Nils Ole Tippenhauer, ... -- NDSS 2019

"Component-Based Formal Analysis of 5G-AKA: Channel Assumptions and Session Confusion"

Cas Cremers, ... -- NDSS 2019

"DroidCap: OS Support for Capability-based Permissions in Android"

Abdallah Dawoud, Sven Bugiel, ... -- NDSS 2019

"Fidelius: Protecting User Secrets from Compromised Browsers"

Michael Backes, Giancarlo Pellegrino, ... -- Oakland 2019

""If HTTPS Were Secure, I Wouldn't Need 2FA" - End User and Administrator Mental Models of HTTPS"

Katharina Krombholz, ... -- Oakland 2019

"Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security & Privacy"

Duc Cuong Nguyen, Erik Derr, Michael Backes, Sven Bugiel, ... -- Oakland 2019

"A Usability Evaluation of Let's Encrypt and Certbot - Usable Security Done Right?"

Katharina Krombholz, ... -- CCS 2019

"AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning"

Pascal Dupre, Giancarlo Pellegrino, ... -- CCS 2019

"HideNoSeek: Camouflaging Malicious JavaScript in Benign ASTs"

Aurore Fass, Michael Backes, Ben Stock, ... -- CCS 2019

"Membership Privacy for Fully Dynamic Group Signatures"

Michael Backes, Lucjan Hanzlik, Jonas Schneider-Bensch, ... -- CCS 2019

"MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples"

Ahmed Salem, Michael Backes, Yang Zhang, ... -- CCS 2019

"Seems Legit: Automated Analysis of Subtle Attacks on Protocols that use Signatures"

Cas Cremers, ... -- CCS 2019

"simTPM: User-centric TPM for Mobile Devices"

Dhiman Chakraborty, Lucjan Hanzlik, Sven Bugiel, ... -- Usenix 2019

"The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR"

Nils Ole Tippenhauer, ... -- Usenix 2019

"Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies"

Sebastian Roth, Ben Stock, ... -- NDSS 2020

"Cross-Origin State Inference (COSI) Attacks: Leaking Web Site States through XS-Leaks"

Soheil Khodayari, ... -- NDSS 2020

"Deceptive Previews: A Study of the Link Preview Trustworthiness in Social Platforms"

Giada Stivala, Giancarlo Pellegrino, ... -- NDSS 2020

"Towards Plausible Graph Anonymization"

Yang Zhang, Bartlomiej Surma, Praveen Manoharan, Jilles Vreeken, Michael Backes, ... -- NDSS 2020

"Automatic Uncovering of Hidden Behaviors from Input Validation in Mobile Apps"

Giancarlo Pellegrino, ... -- Oakland 2020

"Automatically Detecting Bystanders in Photos to Reduce Privacy Risks"

Mario Fritz, ... -- Oakland 2020

"BIAS: Bluetooth Impersonation AttackS"

Nils Ole Tippenhauer, ... -- Oakland 2020

"Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication"

Sanam Ghorbani Lyastani, Michael Schilling, Michaela Neumayr, Michael Backes, Sven Bugiel, ... -- Oakland 2020

"I Know Where You Parked Last Summer - Automated Reverse Engineering and Privacy Analysis of Modern Cars"

Daniel Frassinelli, Sohyeon Park, Stefan Nurnberger, ... -- Oakland 2020

"VisualPhishNet: Zero-Day Phishing Website Detection by Visual Similarity"

Sahar Abdelnabi, Katharina Krombholz, Mario Fritz, ... -- CCS 2020

"LEAF: A Faster Secure Search Algorithm via Localization, Extraction, and Reconstruction"

Rui Wen, Yang Zhang, ... -- CCS 2020

"GAN-Leaks: A Taxonomy of Membership Inference Attacks against Generative Models"

Dingfan Chen, Yang Zhang, Mario Fritz, ... -- CCS 2020

"Verifiable Timed Signatures Made Practical"

Nico Dottling, ... -- CCS 2020

"PMForce: Systematically Analyzing postMessage Handlers at Scale"

Marius Steffens, Ben Stock, ... -- CCS 2020

"Clone Detection in Secure Messaging: Improving Post-Compromise Security in Practice"

Cas Cremers, Jaiden Fairoze, Benjamin Kiesl, Aurora Naska, ... -- CCS 2020

"A Formal Analysis of IEEE 802.11's WPA2: Countering the Kracks Caused by Cracking the Counters"

Cas Cremers, Benjamin Kiesl, Niklas Medinger, ... -- Usenix 2020

"A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web"

Sebastian Roth, Michael Backes, Ben Stock, ... -- Usenix 2020

"SENG, the SGX-Enforcing Network Gateway: Authorizing Communication from Shielded Clients"

Fabian Schwarz, Christian Rossow, ... -- Usenix 2020

"Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning"

Ahmed Salem, Michael Backes, Mario Fritz, Yang Zhang, ... -- Usenix 2020

"A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols"

Cas Cremers, ... -- Usenix 2020

"Bringing Balance to the Force: Dynamic Analysis of the Android Application Framework"

Abdallah Dawoud, Sven Bugiel, ... -- NDSS 2021

"Reining in the Web’s Inconsistencies with Site Policy"

Marius Steffens, Ben Stock, ... -- NDSS 2021

"Who’s Hosting the Block Party? Studying Third-Party Blockage of CSP and SRI"

Marius Steffens, Ben Stock, ... -- NDSS 2021

"Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding"

Sahar Abdelnabi, Mario Fritz, ... -- Oakland 2021

"An Interactive Prover for Protocol Verification in the Computational Model"

Charlie Jacomme, ... -- Oakland 2021

"BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures"

Cas Cremers, ... -- Oakland 2021

"Black Widow: Blackbox Data-driven Web Scanning"

Giancarlo Pellegrino, ... -- Oakland 2021

"PLATYPUS: Software-based Power Side-Channel Attacks on x86"

Michael Schwarz, ... -- Oakland 2021

"SoK: Computer-Aided Cryptography"

Cas Cremers, ... -- Oakland 2021

"The Provable Security of Ed25519: Theory and Practice"

Jacqueline Brendel, Cas Cremers, Mang Zhao, ... -- Oakland 2021

"They Would do Better if They Worked Together: The Case of Interaction Problems Between Password Managers and Websites"

Marten Oltrogge, ... -- Oakland 2021

"Preventing Dynamic Library Compromise on Node.js via RWX-Based Privilege Reduction"

Cristian-Alexandru Staicu, ... -- CCS 2021

"AHEAD: Adaptive Hierarchical Decomposition for Range Query under Local Differential Privacy"

Zhikun Zhang, ... -- CCS 2021

"Membership Leakage in Label-Only Exposures"

Zheng Li, Yang Zhang, ... -- CCS 2021

"With a Little Help from My Friends: Constructing Practical Anonymous Credentials"

Lucjan Hanzlik, ... -- CCS 2021

"DoubleX: Statically Analyzing Browser Extensions at Scale"

Aurore Fass, Doliere Francis Some, Michael Backes, Ben Stock, ... -- CCS 2021

"Continuous Release of Data Streams under both Centralized and Local Differential Privacy"

Zhikun Zhang, ... -- CCS 2021

"When Machine Unlearning Jeopardizes Privacy"

Min Chen, Zhikun Zhang, Michael Backes, Yang Zhang, ... -- CCS 2021

"Quantifying and Mitigating Privacy Risks of Contrastive Learning"

Xinlei He, Yang Zhang, ... -- CCS 2021

"Membership Inference Attacks Against Recommender Systems"

Yang Zhang, ... -- CCS 2021

"12 Angry Developers – A Qualitative Study on Developers’ Struggles with CSP"

Sebastian Roth, Lea Theresa Grober, Michael Backes, Katharina Krombholz, Ben Stock, ... -- CCS 2021

"On the Usability of Authenticity Checks for Hardware Security Tokens"

Katharina Krombholz, ... -- Usenix 2021

"LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks"

Nils Ole Tippenhauer, ... -- Usenix 2021

"Explanation Beats Context: The Effect of Timing & Rationales on Users' Runtime Permission Decisions"

Yusra Elbitar, Michael Schilling, Trung Tin Nguyen, Michael Backes, Sven Bugiel, ... -- Usenix 2021

"PrivSyn: Differentially Private Data Synthesis"

Zhikun Zhang, Michael Backes, Yang Zhang, ... -- Usenix 2021

"A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises"

Nicolas Huaman, Sascha Fahl, ... -- Usenix 2021

"Osiris: Automated Discovery of Microarchitectural Side Channels"

Daniel Weber, Ahmad Ibrahim, Hamed Nemati, Michael Schwarz, Christian Rossow, ... -- Usenix 2021

"The Complexities of Healing in Secure Group Messaging: Why Cross-Group Effects Matter"

Cas Cremers, ... -- Usenix 2021

"JAW: Studying Client-side CSRF with Hybrid Property Graphs and Declarative Traversals"

Soheil Khodayari, Giancarlo Pellegrino, ... -- Usenix 2021

"Stealing Links from Graph Neural Networks"

Xinlei He, Michael Backes, Yang Zhang, ... -- Usenix 2021

"YARIX: Scalable YARA-based Malware Intelligence"

Michael Brengel, Christian Rossow, ... -- Usenix 2021

"A11y and Privacy don't have to be mutually exclusive: Constraining Accessibility Service Misuse on Android"

Jie Huang, Michael Backes, Sven Bugiel, ... -- Usenix 2021

"Share First, Ask Later (or Never?) Studying Violations of GDPR's Explicit Consent in Android Apps"

Trung Tin Nguyen, Michael Backes, Ninja Marnau, Ben Stock, ... -- Usenix 2021

"Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications"

Marten Oltrogge, Michael Backes, ... -- Usenix 2021

"V-Range: Enabling Secure Ranging in 5G Wireless Networks"

Mridula Singh, ... -- NDSS 2022

"Property Inference Attacks Against GANs"

Yang Zhang, ... -- NDSS 2022

"Get a Model! Model Hijacking Attack Against Machine Learning Models"

Ahmed Salem, Michael Backes, Yang Zhang, ... -- NDSS 2022

"27 Years and 81 Million Opportunities Later: Investigating the Use of Email Encryption for an Entire University"

Sascha Fahl, ... -- Oakland 2022

"A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols"

Cas Cremers, Charlie Jacomme, Cas Cremers, ... -- Oakland 2022

"Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects"

Dominik Wermke, Noah Woehler, Sascha Fahl, ... -- Oakland 2022

"Finding and Exploiting CPU Features using MSR Templating"

Daniel Weber, Michael Schwarz, ... -- Oakland 2022

"How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study"

Sascha Fahl, ... -- Oakland 2022

"Model Stealing Attacks Against Inductive Graph Neural Networks"

Xinlei He, Yang Zhang, ... -- Oakland 2022

"The State of the SameSite: Studying the Usage, Effectiveness, and Adequacy of SameSite Cookies"

Soheil Khodayari, Giancarlo Pellegrino, ... -- Oakland 2022

"Auditing Membership Leakages of Multi-Exit Networks"

Zheng Li, Yiyong Liu, Xinlei He, Michael Backes, Yang Zhang, ... -- CCS 2022

"Automatic Detection of Speculative Execution Combinations"

Xaver Fabian, ... -- CCS 2022

"FeIDo: Recoverable FIDO2 Tokens Using Electronic IDs"

Fabian Schwarz, Khue Do, Gunnar Heide, Lucjan Hanzlik, Christian Rossow, ... -- CCS 2022

"Finding MNEMON: Reviving Memories of Node Embeddings"

Zhikun Zhang, Min Chen, Michael Backes, Yang Zhang, ... -- CCS 2022

"Freely Given Consent? Studying Consent Notice of Third-Party Tracking and Its Violations of GDPR in Android Apps"

Trung Tin Nguyen, Michael Backes, Ben Stock, ... -- CCS 2022

"Graph Unlearning"

Min Chen, Zhikun Zhang, Michael Backes, Yang Zhang, ... -- CCS 2022

"Helping or Hindering? How Browser Extensions Undermine Security"

Shubham Agarwal, ... -- CCS 2022

"HyperDbg: Reinventing Hardware-Assisted Debugging"

Michael Schwarz, ... -- CCS 2022

"JIT-Picking: Differential Fuzzing of JavaScript Engines"

Thorsten Holz, ... -- CCS 2022

"Membership Inference Attacks by Exploiting Loss Trajectory"

Yiyong Liu, Zhengyu Zhao, Michael Backes, Yang Zhang, ... -- CCS 2022

"Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels"

Ahmad Ibrahim, Hamed Nemati, Till Schluter, Nils Ole Tippenhauer, Christian Rossow, ... -- CCS 2022

"NTRU-u-um: Secure Fully Homomorphic Encryption from NTRU with Small Modulus"

Kamil Kluczniak, ... -- CCS 2022

"On the Adaptive Security of the Threshold BLS Signature Scheme"

Renas Bacho, Julian Loss, ... -- CCS 2022

"On the Privacy Risks of Cell-Based NAS Architectures"

Hai Huang, Zhikun Zhang, Michael Backes, Yang Zhang, ... -- CCS 2022

"Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy-Preserving Regulation"

Karl Wust, ... -- CCS 2022

"ROAST: Robust Asynchronous Schnorr Threshold Signatures"

Jonas Schneider-Bensch, ... -- CCS 2022

"SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders"

Xinlei He, Yang Zhang, ... -- CCS 2022

"Why So Toxic? Measuring and Triggering Toxic Behavior in Open-Domain Chatbots"

Wai Man Si, Michael Backes, Yang Zhang, ... -- CCS 2022

"AMD Prefetch Attacks through Power and Time"

Michael Schwarz, ... -- Usenix 2022

"ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models"

Yugeng Liu, Rui Wen, Xinlei He, Ahmed Salem, Zhikun Zhang, Michael Backes, Mario Fritz, Yang Zhang, ... -- Usenix 2022

"Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX"

Michael Schwarz, ... -- Usenix 2022

"Rapid Prototyping for Microarchitectural Attacks"

Michael Schwarz, ... -- Usenix 2022

"Inference Attacks Against Graph Neural Networks"

Zhikun Zhang, Min Chen, Michael Backes, Yang Zhang, ... -- Usenix 2022

"Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow Monitoring"

Nils Ole Tippenhauer, ... -- Usenix 2022

"Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context"

Katharina Krombholz, ... -- Usenix 2022

"Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks"

Michael Schwarz, ... -- Usenix 2022

"SAPIC+: protocol verifiers of the world, unite!"

Charlie Jacomme, Robert Kunnemann, ... -- Usenix 2022

"Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples"

Sabrina Amft, Sascha Fahl, ... -- Usenix 2022

"Teacher Model Fingerprinting Attacks Against Transfer Learning"

Yang Zhang, ... -- Usenix 2022

"ÆPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture"

Michael Schwarz, ... -- Usenix 2022

"The Security Lottery: Measuring Client-Side Web Security Inconsistencies"

Sebastian Roth, Moritz Wilhelm, Ben Stock, ... -- Usenix 2022

"AmpFuzz: Fuzzing for Amplification DDoS Vulnerabilities"

Johannes Krupp, Christian Rossow, ... -- Usenix 2022

"SGXFuzz: Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing"

Thorsten Holz, ... -- Usenix 2022

"Loki: Hardening Code Obfuscation Against Automated Attacks"

Thorsten Holz, ... -- Usenix 2022