Forschungsbereich Security and Privacy

Organization Name (de) Name der Organisation (de)
E192-06 - Forschungsbereich Security and Privacy
 
Code Kennzahl
E192-06
 
Type of Organization Organisationstyp
Research Division
Parent OrgUnit Übergeordnete Organisation
 
Active Aktiv
 


Results 1-100 of 233 (Search time: 0.001 seconds).

PreviewAuthors / EditorsTitleTypeIssue Date
1Fuchsbauer, Georg ; Sefranek, Marek Plonk Without Random OraclesPresentation Vortrag9-May-2026
2Sefranek, Marek Sparkle Revisited: Proving Tight Adaptive Security of a Simple Schnorr Threshold SchemePresentation Vortrag26-Jan-2026
3Aumayr, Lukas ; Avarikioti, Zeta ; Maffei, Matteo ; Scaffino, Giulia ; Zindros, Dionysis Blink: An Optimal Proof of Proof-of-WorkInproceedings Konferenzbeitrag 2-Jan-2026
4Landauer-2025-Digital Threats Research and Practice-vor.pdf.jpgLandauer, Max ; Alton, Leonhard ; Lindorfer, Martina ; Skopik, Florian ; Wurzenberger, Markus ; Hotwagner, Wolfgang Trace of the Times: Rootkit Detection through Temporal Anomalies in Kernel ActivityArticle Artikel Dec-2025
5Scherer, Markus ; Blaabjerg, Jeppe Fredsgaard ; Sjösten, Alexander ; Maffei, Matteo Wanilla: Sound Noninterference Analysis for WebAssemblyInproceedings Konferenzbeitrag 22-Nov-2025
6Bleier-2025-Profile Coverage Using Android Compilation Profiles to Evaluat...-am.pdf.jpgBleier, Jakob ; Kehrer, Felix ; Cito, Jürgen ; Lindorfer, Martina Profile Coverage: Using Android Compilation Profiles to Evaluate Dynamic TestingInproceedings Konferenzbeitrag 19-Nov-2025
7Bhati, Amit Singh ; Andreeva, Elena ; Müller, Simon ; Vizár, Damian Sonikku: Gotta Speed, Keed! A Family of Fast and Secure MACsInproceedings Konferenzbeitrag 13-Nov-2025
8Cortellazzi, Jacopo ; Quiring, Erwin ; Arp, Daniel ; Pendlebury, Feargus ; Pierazzi, Fabio ; Cavallaro, Lorenzo Intriguing Properties of Adversarial ML Attacks in the Problem Space [Extended Version]Article Artikel Nov-2025
9Anthony, Peter ; Galadima, Kefas Rimamnuskeb ; Adams, Zekeri ; Onoja, Monday ; Arp, Daniel ; Homola, Martin ; Balogh, Štefan Rule Extraction and Interaction-Aware Explainability for AI-Driven Malware DetectionInproceedings Konferenzbeitrag 25-Oct-2025
10Avarikioti, Zeta ; Christin, Nicolas 7th Conference on Advances in Financial Technologies : AFT 2025, October 8–10, 2025, Pittsburgh, PA, USAProceedings Tagungsband Oct-2025
11Wilm, Timo ; Normann, Philipp Identifying Offline Metrics that Predict Online Impact: A Pragmatic Strategy for Real-World Recommender SystemsInproceedings Konferenzbeitrag 7-Sep-2025
12Andreeva, Elena ; Bhati, Amit Singh ; Weninger, Andreas Multiforked Iterated Even-Mansour and a Note on the Tightness of IEM ProofsPreprint Preprint1-Sep-2025
13Steinböck, Magdalena ; Troost, Jens ; van Beijnum, Wilco ; Jan Seredynski ; Bos, Herbert ; Lindorfer, Martina ; Continella, Andrea SoK: Hardening Techniques in the Mobile Ecosystem — Are We There Yet?Inproceedings Konferenzbeitrag 26-Aug-2025
14Cho, Gavin ; Fuchsbauer, Georg ; O’Neill, Adam ; Sefranek, Marek Schnorr Signatures are Tightly Secure in the ROM Under a Non-interactive AssumptionInproceedings Konferenzbeitrag 17-Aug-2025
15Bhati, Amit Singh ; Andreeva, Elena Breaking the IEEE Encryption Standard XCB-AES in Two QueriesInproceedings Konferenzbeitrag 17-Aug-2025
16Bleier, Jakob ; Lindorfer, Martina Back to the Binary: Revisiting Similarities of Android AppsSpecial Contribution Spezialbeitrag15-Aug-2025
17Benetollo, Lorenzo ; Lackner, Andreas ; Maffei, Matteo ; Scherer, Markus Let's Move2EVMInproceedings Konferenzbeitrag 13-Aug-2025
18Saha, Aakanksha ; Mattei, James ; Blasco, Jorge ; Cavallaro, Lorenzo ; Votipka, Daniel ; Lindorfer, Martina Expert Insights into Advanced Persistent Threats: Analysis, Attribution, and ChallengesInproceedings Konferenzbeitrag 13-Aug-2025
19Avarikioti, Zeta ; Wang, Yuheng ; Wang, Yuyi Thunderdome: Timelock-Free Rationally-Secure Virtual ChannelsInproceedings Konferenzbeitrag 13-Aug-2025
20Weißberg, Felix ; Hilgefort, Jan Malte ; Grogorick, Steve ; Arp, Daniel ; Eisenhofer, Thorsten ; Eisemann, Martin ; Rieck, Konrad Seeing through: analyzing and attacking virtual backgrounds in video callsInproceedings Konferenzbeitrag 13-Aug-2025
21Schmidt, David ; Ponticello, Alexander ; Steinböck, Magdalena ; Krombholz, Katharina ; Lindorfer, Martina Analyzing the iOS Local Network Permission from a Technical and User PerspectiveInproceedings Konferenzbeitrag 16-Jun-2025
22Bai, Sirui ; Fu, Xinyu ; Wang, Yuheng ; Wang, Yuyi ; Zheng, Chaodong Brief Announcement: Robust and Scalable Renaming with Subquadratic BitsInproceedings Konferenzbeitrag 13-Jun-2025
23Aumayr-2025-Computer Communications-vor.pdf.jpgAumayr, Lukas ; Ceylan, Esra ; Kopyciok, Yannik ; Maffei, Matteo ; Moreno-Sanchez, Pedro ; Salem, Iosif ; Schmid, Stefan Optimizing virtual payment channel establishment in the face of on-path adversariesArticle Artikel 1-Jun-2025
24Sefranek, Marek Hash functions in the context of PIOP-based SNARKsPresentation Vortrag27-Jan-2025
25Scaffino, Giulia ; Aumayr, Lukas ; Bastankhah, Mahsa ; Avarikioti, Zeta ; Maffei, Matteo Alba: The Dawn of Scalable Bridges for BlockchainsInproceedings Konferenzbeitrag Jan-2025
26Beer, Philipp ; Squarcina, Marco ; Roth, Sebastian ; Lindorfer, Martina TapTrap: animation-driven tapjacking on androidInproceedings Konferenzbeitrag 2025
27Bauer, Balthazar ; Fuchsbauer, Georg ; Regen, Fabian On Security Proofs of Existing Equivalence Class Signature SchemesInproceedings Konferenzbeitrag 11-Dec-2024
28Aumayr-2024-Securing Lightning Channels against Rational Miners-vor.pdf.jpgAumayr, Lukas ; Avarikioti, Zeta ; Maffei, Matteo ; Mazumdar, Subhra Securing Lightning Channels against Rational MinersInproceedings Konferenzbeitrag 9-Dec-2024
29Arp-2024-Communications of the ACM-vor.pdf.jpgArp, Daniel ; Quiring, Erwin ; Pendlebury, Feargus ; Warnecke, Alexander ; Pierazzi, Fabio ; Wressnegger, Christian ; Cavallaro, Lorenzo ; Rieck, Konrad Pitfalls in Machine Learning for Computer SecurityArticle Artikel 25-Oct-2024
30Sefranek, Marek How (Not) to Simulate PLONKInproceedings Konferenzbeitrag 10-Sep-2024
31Chen, Ting-Han ; Tagliaro, Carlotta ; Lindorfer, Martina ; Borgolte, Kevin ; van der Ham-de Vos, Jeroen Are You Sure You Want To Do Coordinated Vulnerability Disclosure?Inproceedings Konferenzbeitrag8-Jul-2024
32Indri, Patrick ; Blohm, Peter ; Athavale, Anagha ; Bartocci, Ezio ; Weissenbacher, Georg ; Maffei, Matteo ; Nickovic, Dejan ; Gärtner, Thomas ; Malhotra, Sagar Distillation based Robustness Verification with PAC GuaranteesInproceedings Konferenzbeitrag 28-Jun-2024
33Fuchsbauer, Georg ; Wolf, Mathias Concurrently Secure Blind Schnorr SignaturesInproceedings Konferenzbeitrag 8-May-2024
34Alwen, Joel ; Fuchsbauer, Georg ; Mularczyk, Marta Updatable Public-Key Encryption, RevisitedInproceedings Konferenzbeitrag28-Apr-2024
35Bauer, Balthazar ; Fuchsbauer, Georg ; Regen, Fabian On Proving Equivalence Class Signatures Secure from Non-interactive AssumptionsInproceedings Konferenzbeitrag 13-Apr-2024
36Andreeva, Elena ; Bogdanov, Andrey ; Datta, Nilanjan ; Luykx, Atul ; Mennink, Bart ; Nandi, Mridul ; Tischhauser, Elmar ; Yasuda, Kan The COLM Authenticated Encryption SchemeArticle Artikel 7-Mar-2024
37Andreeva, Elena ; Weninger, Andreas A TPRF-based pseudo-random number generatorArticle Artikel 28-Jan-2024
38Davanian-2024-C2Miner Tricking IoT Malware into Revealing Live Command  C...-vor.pdf.jpgDavanian, Ali ; Faloutsos, Michail ; Lindorfer, Martina C2Miner: Tricking IoT Malware into Revealing Live Command & Control ServersInproceedings Konferenzbeitrag 2024
39Steinboeck-2024-Comparing Apples to Androids Discovery, Retrieval, and Ma...-vor.pdf.jpgSteinböck, Magdalena ; Bleier, Jakob ; Rainer, Mikka ; Urban, Tobias ; Utz, Christine ; Lindorfer, Martina Comparing Apples to Androids: Discovery, Retrieval, and Matching of iOS and Android Apps for Cross-Platform AnalysesInproceedings Konferenzbeitrag 2024
40Jeanteur, Simon ; Kovács, Laura ; Maffei, Matteo ; Rawson, Michael CryptoVampire: Automated Reasoning for the Complete Symbolic Attacker Cryptographic ModelInproceedings Konferenzbeitrag 2024
41Weippl, Edgar ; Maffei, Matteo Message from General Chairs; EuroSP 2024Inproceedings Konferenzbeitrag 2024
42Avarikioti, Zeta ; Schmid, Stefan ; Tiwari, Samarth Brief Announcement: Musketeer - Incentive-Compatible Rebalancing for Payment Channel NetworksInproceedings Konferenzbeitrag 2024
43Bhati, Amit Singh ; Andreeva, Elena ; Vizár, Damian OAE-RUP: A Strong Online AEAD Security Notion and Its Application to SAEFInproceedings Konferenzbeitrag 2024
44Hantke, Florian ; Roth, Sebastian ; Mrowczynski, Rafael ; Utz, Christine ; Stock, Ben Where Are the Red Lines? Towards Ethical Server-Side Scans in Security and Privacy ResearchInproceedings Konferenzbeitrag 2024
45Bernardo, Pedro ; Veronese, Lorenzo ; DALLA VALLE, VALENTINO ; Calzavara, Stefano ; Squarcina, Marco ; Adão, Pedro ; Maffei, Matteo Web Platform Threats: Automated Detection of Web Security Issues With WPTInproceedings Konferenzbeitrag 2024
46Saha, Aakanksha ; Blasco Alís, Jorge ; Lindorfer, Martina Exploring the Malicious Document Threat Landscape: Towards a Systematic Approach to Detection and AnalysisInproceedings Konferenzbeitrag2024
47Avarikioti-2024-Musketeer Incentive-Compatible Rebalancing for Payment Ch...-vor.pdf.jpgAvarikioti, Zeta ; Schmid, Stefan ; Tiwari, Samarth Musketeer: Incentive-Compatible Rebalancing for Payment Channel NetworksInproceedings Konferenzbeitrag 2024
48Andreeva, Elena ; Bhattacharyya, Rishiraj ; Roy, Arnab ; Trevisani, Stefano On Efficient and Secure Compression Functions for Arithmetization-Oriented HashingInproceedings Konferenzbeitrag 2024
49Scherer, Markus ; Blaabjerg, Jeppe Fredsgaard ; Sjösten, Alexander ; Solitro, Magdalena Maria ; Maffei, Matteo Wappler: Sound Reachability Analysis for WebAssemblyInproceedings Konferenzbeitrag 2024
50Avarikioti, Zeta ; Kędzior, Paweł ; Lizurej, Tomasz ; Michalak, Tomasz Bribe & Fork: Cheap PCN Bribing Attacks via Forking ThreatInproceedings Konferenzbeitrag 2024
51Bhati, Amit Singh ; Dufka, Antonín ; Andreeva, Elena ; Roy, Arnab ; Preneel, Bart Skye: An Expanding PRF based Fast KDF and its ApplicationsInproceedings Konferenzbeitrag 2024
52Roth, Sebastian ; Gröber, Lea ; Baus, Philipp ; Krombholz, Katharina ; Stock, Ben Trust Me If You Can - How Usable Is Trusted Types In Practice?Inproceedings Konferenzbeitrag 2024
53Beer, Philipp ; Squarcina, Marco ; Veronese, Lorenzo ; Lindorfer, Martina Tabbed Out: Subverting the Android Custom Tab Security ModelInproceedings Konferenzbeitrag 2024
54Tagliaro-2024-Large-Scale Security Analysis of Real-World Backend Deploym...-vor.pdf.jpgTagliaro, Carlotta ; Komsic, Martina ; Continella, Andrea ; Borgolte, Kevin ; Lindorfer, Martina Large-Scale Security Analysis of Real-World Backend Deployments Speaking IoT-Focused ProtocolsInproceedings Konferenzbeitrag 2024
55Athavale, Anagha ; Bartocci, Ezio ; Christakis, Maria ; Maffei, Matteo ; Ničković, Dejan ; Weissenbacher, Georg Verifying Global Two-Safety Properties in Neural Networks with ConfidenceInproceedings Konferenzbeitrag 2024
56Aumayr, Lukas ; Ceylan, Esra ; Kopyciok, Yannik ; Maffei, Matteo ; Moreno-Sanchez, Pedro ; Salem, Iosif ; Schmid, Stefan Optimizing Virtual Payment Channel Establishment in the Face of On-Path AdversariesInproceedings Konferenzbeitrag2024
57Andreeva, Elena ; Cogliati, Benoît ; Lallemand, Virginie ; Minier, Marine ; Purnal, Antoon ; Roy, Arnab Masked Iterate-Fork-Iterate: A New Design Paradigm for Tweakable Expanding Pseudorandom FunctionInproceedings Konferenzbeitrag 2024
58Saha, Aakanksha ; Blasco, Jorge ; Cavallaro, Lorenzo ; Lindorfer, Martina ADAPT it! Automating APT Campaign and Group Attribution by Leveraging and Linking Heterogeneous FilesInproceedings Konferenzbeitrag 2024
59Cini-2024-Journal of Cryptology-vor.pdf.jpgCini, Valerio ; Ramacher, Sebastian ; Slamanig, Daniel ; Striecks, Christoph ; Tairi, Erkan (Inner-product) functional encryption with updatable ciphertextsArticle Artikel 2024
60Avarikioti, Georgia ; Bastankhah, Mahsa ; Maddah-Ali, Mohammad Ali ; Pietrzak, Krzysztof ; Svoboda, Jakub ; Yeo, Michelle Route Discovery in Private Payment Channel NetworksInproceedings Konferenzbeitrag 2024
61Lindorfer-2023-The Threat of Surveillance and the Need for Privacy Protec...-vor.pdf.jpgLindorfer, Martina The Threat of Surveillance and the Need for Privacy ProtectionsBook Contribution Buchbeitrag 21-Dec-2023
62Sober-2023-CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND A...-vor.pdf.jpgSober, Michael ; Scaffino, Giulia ; Schulte, Stefan ; Kanhere, Salil S. A blockchain-based IoT data marketplaceArticle Artikel Dec-2023
63Goeth-2023-Optimizing 0-RTT Key Exchange with Full Forward Security-vor.pdf.jpgGöth, Christian ; Ramacher, Sebastian ; Slamanig, Daniel ; Striecks, Christoph ; Tairi, Erkan ; Zikulnig, Alexander Optimizing 0-RTT Key Exchange with Full Forward SecurityInproceedings Konferenzbeitrag 26-Nov-2023
64Bhati, Amit Singh ; Pohle, Erik ; Abidin, Aysajan ; Andreeva, Elena ; Preneel, Bart Let's Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure ComputationInproceedings Konferenzbeitrag21-Nov-2023
65Tairi-2023-LedgerLocks A Security Framework for Blockchain Protocols Base...-vor.pdf.jpgTairi, Erkan ; Moreno-Sanchez, Pedro ; Schneidewind, Clara LedgerLocks: A Security Framework for Blockchain Protocols Based on Adaptor SignaturesInproceedings Konferenzbeitrag 21-Nov-2023
66Schmidt-2023-IoTFlow Inferring IoT Device Behavior at Scale through Stati...-vor.pdf.jpgSchmidt, David ; Tagliaro, Carlotta ; Borgolte, Kevin ; Lindorfer, Martina IoTFlow: Inferring IoT Device Behavior at Scale through Static Mobile Companion App AnalysisInproceedings Konferenzbeitrag Nov-2023
672023-Cookie Crumbles Breaking and Fixing Web Session Integrity-vor.pdf.jpgSquarcina, Marco ; Adão, Pedro ; Lorenzo Veronese ; Matteo Maffei Cookie Crumbles: Breaking and Fixing Web Session IntegrityInproceedings Konferenzbeitrag 26-Oct-2023
68Aumayr, Lukas Virtual Payment Channel Networks in CryptocurrenciesPresentation Vortrag12-Oct-2023
692023-Chrisimos A useful Proof-of-Work for finding Minimal Dominating Set o...-ao.pdf.jpgChatterjee, Diptendu ; Banerjee, Prabal ; Mazumdar, Subhra Chrisimos: A useful Proof-of-Work for finding Minimal Dominating Set of a graphPreprint Preprint 13-Sep-2023
70Aumayr, Lukas ; Moreno-Sanchez, Pedro ; Kate, Aniket ; Maffei, Matteo Breaking and Fixing Virtual Channels: Domino Attack and DonnerPresentation Vortrag6-Sep-2023
71Aumayr, Lukas ; Abbaszadeh, Kasra ; Maffei, Matteo Thora: Atomic and Privacy-Preserving Multi-Channel UpdatesPresentation Vortrag30-Aug-2023
72Aumayr, Lukas ; Sri AravindaKrishnan Thyagarajan ; Giulio Malavolta ; Moreno-Sanchez, Pedro ; Maffei, Matteo Sleepy Channels: Bitcoin-Compatible Bi-directional Payment Channels without WatchtowersPresentation Vortrag30-Aug-2023
73Scaffino, Giulia ; Aumayr, Lukas ; Avarikioti, Georgia ; Maffei, Matteo Glimpse: On-Demand PoW Light Client with Constant-Size Storage for DeFiInproceedings Konferenzbeitrag 9-Aug-2023
74Jungwirth, Gerhard ; Saha, Aakanksha ; Schröder, Michael ; Fiebig, Tobias ; Lindorfer, Martina ; Cito, Jürgen Connecting the .dotfiles: Checked-In Secret Exposure with Extra (Lateral Movement) StepsInproceedings Konferenzbeitrag12-Jul-2023
75Pradeep-2023-Not Your Average App A Large-scale Privacy Analysis of Andro...-vor.pdf.jpgPradeep, Amogh ; Feal, Álvaro ; Gamba, Julien ; Rao, Ashwin ; Lindorfer, Martina ; Vallina-Rodriguez, Narseo ; Choffnes, David Not Your Average App: A Large-scale Privacy Analysis of Android BrowsersInproceedings Konferenzbeitrag Jul-2023
76Fiebig-2023-Heads in the Clouds Measuring Universities Migration to Publi...-vor.pdf.jpgFiebig, Tobias ; Gürses, Seda ; Hernández Gañán, Carlos ; Kotkamp, Erna ; Kuipers, Fernando ; Lindorfer, Martina ; Prisse, Menghua ; Sari, Taritha Heads in the Clouds? Measuring Universities’ Migration to Public Clouds: Implications for Privacy & Academic FreedomInproceedings Konferenzbeitrag Jul-2023
77Sober-2023-Distributed Key Generation with Smart Contracts using zk-SNARKs-smur.pdf.jpgSober, Michael ; Max Kobelt ; Scaffino, Giulia ; Kaaser, Dominik ; Schulte, Stefan Distributed Key Generation with Smart Contracts using zk-SNARKsInproceedings Konferenzbeitrag 7-Jun-2023
78Bleier-2023-Of Ahead Time Evaluating Disassembly of Android Apps Compiled...-vor.pdf.jpgBleier, Jakob ; Lindorfer, Martina Of Ahead Time: Evaluating Disassembly of Android Apps Compiled to Binary OATs Through the ARTInproceedings Konferenzbeitrag May-2023
79Hageman-2023-IEEE Transactions on Software Engineering-am.pdf.jpgHageman, Kaspar ; Feal, Alvaro ; Gamba, Julien ; Girish, Aniketh ; Bleier, Jakob ; Lindorfer, Martina ; Tapiador, Juan ; Vallina-Rodriguez, Narseo Mixed Signals: Analyzing Software Attribution Challenges in the Android EcosystemArticle Artikel 1-Apr-2023
80Streibelt-2023-Back-to-the-Future Whois An IP Address Attribution Service...-vor.pdf.jpgStreibelt, Florian ; Lindorfer, Martina ; Gürses, Seda ; Hernández Gañán, Carlos ; Fiebig, Tobias Back-to-the-Future Whois: An IP Address Attribution Service for Working with Historic DatasetsInproceedings Konferenzbeitrag 10-Mar-2023
81Mazumdar, Subhra ; Ruj, Sushmita CryptoMaze: Privacy-Preserving Splitting of Off-Chain PaymentsArticle Artikel 1-Mar-2023
82Aumayr, Lukas ; Abbaszadeh, Kasra ; Maffei, Matteo Thora: Atomic and Privacy-Preserving Multi-Channel UpdatesPresentation Vortrag28-Feb-2023
83Aumayr, Lukas ; Sri AravindaKrishnan Thyagarajan ; Giulio Malavolta ; Moreno-Sanchez, Pedro ; Maffei, Matteo Sleepy Channels: Bi-directional Payment Channels without WatchtowersPresentation Vortrag28-Feb-2023
84Aumayr, Lukas ; Moreno-Sanchez, Pedro ; Kate, Aniket ; Maffei, Matteo Breaking and Fixing Virtual Channels: Domino Attack and DonnerInproceedings Konferenzbeitrag27-Feb-2023
85Hoenisch, Philipp ; Mazumdar, Subhra ; Moreno-Sanchez, Pedro ; Ruj, Sushmita LightSwap: An Atomic Swap Does Not Require Timeouts at both BlockchainsInproceedings Konferenzbeitrag24-Feb-2023
86Tagliaro, Carlotta ; Hahn, Florian ; Sepe, Riccardo ; Aceti, Alessio ; Lindorfer, Martina I Still Know What You Watched Last Sunday: Privacy of the HbbTV Protocol in the European Smart TV LandscapeInproceedings KonferenzbeitragFeb-2023
87Abusalah, Hamza ; Fuchsbauer, Georg ; Gazi, Peter ; Klein, Karen SNACKs: Leveraging Proofs of Sequential Work for Blockchain Light ClientsInproceedings Konferenzbeitrag 25-Jan-2023
88Fuchsbauer, Georg ; Orrù, Michele Non-interactive Mimblewimble transactions, revisitedInproceedings Konferenzbeitrag 25-Jan-2023
89Rain, Sophie ; Avarikioti, Georgia ; Kovacs, Laura ; Maffei, Matteo Towards a Game-Theoretic Security Analysis of Off-Chain ProtocolsInproceedings Konferenzbeitrag 2023
90Veronese, Lorenzo ; Farinier, Benjamin ; Bernardo, Pedro ; Tempesta, Mauro ; Squarcina, Marco ; Maffei, Matteo WebSpec: Towards Machine-Checked Analysis of Browser Security MechanismsInproceedings Konferenzbeitrag2023
91Tagliaro, Carlotta ; Hahn, Florian ; Sepe, Riccardo ; Aceti, Alessio ; Lindorfer, Martina Investigating HbbTV Privacy Invasiveness Across European CountriesInproceedings Konferenzbeitrag 2023
92Avarikioti, Georgia ; Heimbach, Lioba ; Schmid, Roland ; Vanbever, Laurent ; Wattenhofer, Roger ; Wintermeyer, Patrick FnF-BFT: A BFT Protocol with Provable Performance Under AttackInproceedings Konferenzbeitrag2023
93Andreeva, Elena ; Weninger, Andreas A Forkcipher-Based Pseudo-Random Number GeneratorInproceedings Konferenzbeitrag2023
94Hodžić, Samir ; Roy, Arnab ; Andreeva, Elena Quantum cryptanalysis of Farfalle and (generalised) key-alternating Feistel networksArticle Artikel 2023
95Avarikioti, Georgia ; Desjardins, Antoine ; Kokoris-Kogias, Lefteris ; Wattenhofer, Roger Divide & Scale: Formalization and Roadmap to Robust ShardingInproceedings Konferenzbeitrag2023
96Avarikioti, Georgia ; Lizurej, Tomasz ; Michalak, Tomasz ; Yeo, Michelle Lightning Creation GamesInproceedings Konferenzbeitrag2023
97Mazumdar-2022-IEEE Transactions on Network and Service Management-am.pdf.jpgMazumdar, Subhra ; Banerjee, Prabal ; Sinha, Abhinandan ; Ruj, Sushmita ; Roy, Bimal Strategic Analysis of Griefing Attack in Lightning NetworkArticle Artikel 20-Dec-2022
98Bastys, Iulia ; Algehed, Maximilian ; Sjösten, Alexander ; Sabelfeld, Andrei SecWasm: Information Flow Control for WebAssemblyInproceedings Konferenzbeitrag5-Dec-2022
99Fiebig, Tobias ; Gürses, Seda ; Lindorfer, Martina Position Paper: Escaping Academic Cloudification to Preserve Academic FreedomArticle Artikel Dec-2022
100Mazumdar-2022-Towards faster settlement in HTLC-based Cross-Chain Atomic...-smur.pdf.jpgMazumdar, Subhra Towards faster settlement in HTLC-based Cross-Chain Atomic SwapsPreprint Preprint 28-Nov-2022