Michael Backes

Affiliations:
  • CISPA Helmholtz Center for Information Security, Saarbrücken, Germany
  • Saarland University, Computer Science Department, Saarbrücken, Germany


According to our database1, Michael Backes authored at least 286 papers between 2002 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Mental Models of Adversarial Machine Learning.
CoRR, 2021

Graph Unlearning.
CoRR, 2021

Node-Level Membership Inference Attacks Against Graph Neural Networks.
CoRR, 2021

ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models.
CoRR, 2021

Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications.
Proceedings of the 30th USENIX Security Symposium, 2021

Share First, Ask Later (or Never?) Studying Violations of GDPR's Explicit Consent in Android Apps.
Proceedings of the 30th USENIX Security Symposium, 2021

Stealing Links from Graph Neural Networks.
Proceedings of the 30th USENIX Security Symposium, 2021

Explanation Beats Context: The Effect of Timing & Rationales on Users' Runtime Permission Decisions.
Proceedings of the 30th USENIX Security Symposium, 2021

A11y and Privacy don't have to be mutually exclusive: Constraining Accessibility Service Misuse on Android.
Proceedings of the 30th USENIX Security Symposium, 2021

PrivSyn: Differentially Private Data Synthesis.
Proceedings of the 30th USENIX Security Symposium, 2021

Do winning tickets exist before DNN training?
Proceedings of the 2021 SIAM International Conference on Data Mining, 2021

Statically Detecting JavaScript Obfuscation and Minification Techniques in the Wild.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

MLCapsule: Guarded Offline Deployment of Machine Learning as a Service.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2021

Accountability in the Decentralised-Adversary Setting.
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021

Measuring User Perception for Detecting Unexpected Access to Sensitive Resource in Mobile Apps.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Decentralized Privacy-Preserving Proximity Tracing.
IEEE Data Eng. Bull., 2020

Don't Trigger Me! A Triggerless Backdoor Attack Against Deep Neural Networks.
CoRR, 2020

BAAAN: Backdoor Attacks Against Autoencoder and GAN-Based Machine Learning Models.
CoRR, 2020

Privacy Analysis of Deep Learning in the Wild: Membership Inference Attacks against Transfer Learning.
CoRR, 2020

Adversarial Examples and Metrics.
CoRR, 2020

How many winning tickets are there in one DNN?
CoRR, 2020

A new measure for overfitting and its implications for backdooring of deep learning.
CoRR, 2020

BadNL: Backdoor Attacks Against NLP Models.
CoRR, 2020

Decentralized Privacy-Preserving Proximity Tracing.
CoRR, 2020

When Machine Unlearning Jeopardizes Privacy.
CoRR, 2020

Dynamic Backdoor Attacks Against Machine Learning Models.
CoRR, 2020

Everything About You: A Multimodal Approach towards Friendship Inference in Online Social Networks.
CoRR, 2020

A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web.
Proceedings of the 29th USENIX Security Symposium, 2020

Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning.
Proceedings of the 29th USENIX Security Symposium, 2020

Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Towards Plausible Graph Anonymization.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Killing Four Birds with one Gaussian Process: The Relation between different Test-Time Attacks.
Proceedings of the 25th International Conference on Pattern Recognition, 2020

On the Security Relevance of Initial Weights in Deep Neural Networks.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2020, 2020

Membership Inference Against DNA Methylation Databases.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

Adversarial Attacks on Classifiers for Eye-based User Modelling.
Proceedings of the ETRA '20 Adjunct: 2020 Symposium on Eye Tracking Research and Applications, 2020

Assessing the Impact of Script Gadgets on CSP at Scale.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

Up2Dep: Android Tool Support to Fix Insecure Code Dependencies.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

TrollThrottle - Raising the Cost of Astroturfing.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
Privacy-Preserving Similar Patient Queries for Combined Biomedical Data.
Proc. Priv. Enhancing Technol., 2019

How to wrap it up - A formally verified proposal for the use of authenticated wrapping in PKCS\#11.
IACR Cryptol. ePrint Arch., 2019

Ring Signatures: Logarithmic-Size, No Setup - from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2019

Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup.
IACR Cryptol. ePrint Arch., 2019

Causality & Control Flow.
Proceedings of the 4th Workshop on Formal Reasoning about Causation, 2019

Adversarial Vulnerability Bounds for Gaussian Process Classification.
CoRR, 2019

Proconda - Protected Control Data.
CoRR, 2019

Adversarial Initialization - when your network performs the way I want.
CoRR, 2019

Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security & Privacy.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Fidelius: Protecting User Secrets from Compromised Browsers.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Towards automated network mitigation analysis.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

MBeacon: Privacy-Preserving Beacons for DNA Methylation Data.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Fairwalk: Towards Fair Graph Embedding.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Up-To-Crash: Evaluating Third-Party Library Updatability on Android.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

Automated Verification of Accountability in Security Protocols.
Proceedings of the 32nd IEEE Computer Security Foundations Symposium, 2019

MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

HideNoSeek: Camouflaging Malicious JavaScript in Benign ASTs.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

JStap: a static pre-filter for malicious JavaScript detection.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Simulating the Large-Scale Erosion of Genomic Privacy Over Time.
IEEE ACM Trans. Comput. Biol. Bioinform., 2018

Accountability in Security Protocols.
IACR Cryptol. ePrint Arch., 2018

Membership Privacy for Fully Dynamic Group Signatures.
IACR Cryptol. ePrint Arch., 2018

Signatures with Flexible Public Key: A Unified Approach to Privacy-Preserving Signatures (Full Version).
IACR Cryptol. ePrint Arch., 2018

A Survey on Routing in Anonymous Communication Protocols.
ACM Comput. Surv., 2018

The Limitations of Model Uncertainty in Adversarial Settings.
CoRR, 2018

Killing Three Birds with one Gaussian Process: Analyzing Attack Vectors on Classification.
CoRR, 2018

ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models.
CoRR, 2018

Tagvisor: A Privacy Advisor for Sharing Hashtags.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse.
Proceedings of the 27th USENIX Security Symposium, 2018

Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Didn't You Hear Me? - Towards More Successful Web Vulnerability Notifications.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

PRIMA: Privacy-Preserving Identity and Access Management at Internet-Scale.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

Dissecting Privacy Risks in Biomedical Data.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

Stackelberg Planning: Towards Effective Leader-Follower State Space Search.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
How Internet Resources Might Be Helping You Develop Faster but Less Securely.
IEEE Secur. Priv., 2017

Studying the Impact of Managers on Password Strength and Reuse.
CoRR, 2017

CTRL+Z: Recovering Anonymized Social Graphs.
CoRR, 2017

On the (Statistical) Detection of Adversarial Examples.
CoRR, 2017

Simulated Penetration Testing and Mitigation Analysis.
CoRR, 2017

Who Controls the Internet?: Analyzing Global Threats using Property Graph Traversals.
Proceedings of the 26th International Conference on World Wide Web, 2017

Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers.
Proceedings of the 10th USENIX Workshop on Cyber Security Experimentation and Test, 2017

How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security.
Proceedings of the 26th USENIX Security Symposium, 2017

Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Comparing the Usability of Cryptographic APIs.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Seamless In-App Ad Blocking on Stock Android.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

Identifying Personal DNA Methylation Profiles by Genotype Inference.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Linking Amplification DDoS Attacks to Booter Services.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

Dachshund: Digging for and Securing (Non-)Blinded Constants in JIT Code.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

LUNA: Quantifying and Leveraging Uncertainty in Android Malware Analysis through Bayesian Machine Learning.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and Its Application to Fair Exchange.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Efficient and Flexible Discovery of PHP Application Vulnerabilities.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

ARTist: The Android Runtime Instrumentation and Security Toolkit.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Adversarial Examples for Malware Detection.
Proceedings of the Computer Security - ESORICS 2017, 2017

Reconciling Privacy and Utility in Continuous-Time Diffusion Networks.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

A Stitch in Time: Supporting Android Developers in WritingSecure Code.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

The ART of App Compartmentalization: Compiler-based Library Privilege Separation on Stock Android.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

walk2friends: Inferring Social Links from Mobility Profiles.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Boxify: Bringing Full-Fledged App Sandboxing to Stock Android.
login Usenix Mag., 2016

Data Lineage in Malicious Environments.
IEEE Trans. Dependable Secur. Comput., 2016

Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms Against Structural Attacks.
Proc. Priv. Enhancing Technol., 2016

AnoA: A Framework for Analyzing Anonymous Communication Protocols.
J. Priv. Confidentiality, 2016

Anonymous RAM.
IACR Cryptol. ePrint Arch., 2016

Herausforderungen des Internet of Things.
Datenschutz und Datensicherheit, 2016

Adversarial Perturbations Against Deep Neural Networks for Malware Classification.
CoRR, 2016

On Profile Linkability despite Anonymity in Social Media Systems.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016

Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification.
Proceedings of the 25th USENIX Security Symposium, 2016

What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions of JIT-ROP Defenses.
Proceedings of the 25th USENIX Security Symposium, 2016

Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles.
Proceedings of the 25th USENIX Security Symposium, 2016

On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis.
Proceedings of the 25th USENIX Security Symposium, 2016

You Get Where You're Looking for: The Impact of Information Sources on Code Security.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

SoK: Lessons Learned from Android Security Research for Appified Software Platforms.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Implementation-level analysis of the JavaScript helios voting client.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

On the Feasibility of TTL-Based Filtering for DRDoS Mitigation.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

Delegatable Functional Signatures.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

How to Make ASLR Win the Clone Wars: Runtime Re-Randomization.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

From Zoos to Safaris - From Closed-World Enforcement to Open-World Assessment of Privacy.
Proceedings of the Foundations of Security Analysis and Design VIII, 2016

Detecting Hardware-Assisted Virtualization.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

POSTER: Mapping the Landscape of Large-Scale Vulnerability Notifications.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Efficient Cryptographic Password Hardening Services from Partially Oblivious Commitments.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Identifying the Scan and Attack Infrastructures Behind Amplification DDoS Attacks.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

RamCrypt: Kernel-based Address Space Encryption for User-mode Processes.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Computational Soundness for Dalvik Bytecode.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

POSTER: The ART of App Compartmentalization.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Membership Privacy in MicroRNA-based Studies.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

R-Droid: Leveraging Android App Analysis with Static Slice Optimization.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Reliable Third-Party Library Detection in Android and its Security Applications.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Quantifying information flow in cryptographic systems.
Math. Struct. Comput. Sci., 2015

Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
IACR Cryptol. ePrint Arch., 2015

How well do you blend into the crowd? - d-convergence: A novel paradigm for quantifying privacy in the age of Big-Data.
CoRR, 2015

Boxify: Full-fledged App Sandboxing for Stock Android.
Proceedings of the 24th USENIX Security Symposium, 2015

ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

PriCL: Creating a Precedent, a Framework for Reasoning about Privacy Case Law.
Proceedings of the Principles of Security and Trust - 4th International Conference, 2015

Computational Soundness for Interactive Primitives.
Proceedings of the Computer Security - ESORICS 2015, 2015

Symbolic Malleable Zero-Knowledge Proofs.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

POSTER: Towards Compiler-Assisted Taint Tracking on the Android Runtime (ART).
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

POSTER: In the Net of the Spider: Measuring the Anonymity-Impact of Network-level Adversaries Against Tor.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Fully Secure Inner-Product Proxy Re-Encryption with Constant Size Ciphertext.
Proceedings of the 3rd International Workshop on Security in Cloud Computing, 2015

Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations.
J. Comput. Secur., 2014

(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection.
IACR Cryptol. ePrint Arch., 2014

Nearly Practical and Privacy-Preserving Proofs on Authenticated Data.
IACR Cryptol. ePrint Arch., 2014

Operational Signature Schemes.
IACR Cryptol. ePrint Arch., 2014

Android Security Framework: Enabling Generic and Extensible Access Control on Android.
CoRR, 2014

Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Lime: Data Lineage in the Malicious Environment.
Proceedings of the Security and Trust Management - 10th International Workshop, 2014

X-pire 2.0: a user-controlled expiration date and copy protection mechanism.
Proceedings of the Symposium on Applied Computing, 2014

Computational Soundness Results for ProVerif - Bridging the Gap from Trace Properties to Uniformity.
Proceedings of the Principles of Security and Trust - Third International Conference, 2014

Asynchronous MPC with a strict honest majority using non-equivocation.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2014

You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Android security framework: extensible multi-layered access control on Android.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

Scippa: system-centric IPC provenance on Android.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP.
Proceedings of the Applied Cryptography and Network Security, 2014

BackRef: Accountability in Anonymous Communication Networks.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Highly Controlled, Fine-grained Delegation of Signing Capabilities.
IACR Cryptol. ePrint Arch., 2013

TUC: Time-sensitive and Modular Analysis of Anonymous Communication.
IACR Cryptol. ePrint Arch., 2013

Differential Indistinguishability for Cryptographic Primitives with Imperfect Randomness.
IACR Cryptol. ePrint Arch., 2013

Verifiable Delegation of Computation on Outsourced Data.
IACR Cryptol. ePrint Arch., 2013

Asynchronous MPC with t<n/2 Using Non-equivocation.
IACR Cryptol. ePrint Arch., 2013

Introducing Accountability to Anonymity Networks.
CoRR, 2013

Using mobile device communication to strengthen e-Voting protocols.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

AppGuard - Enforcing User Requirements on Android Apps.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2013

Preventing Side-Channel Leaks in Web Traffic: A Formal Approach.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Idea: Callee-Site Rewriting of Sealed System Libraries.
Proceedings of the Engineering Secure Software and Systems - 5th International Symposium, 2013

AppGuard - Fine-Grained Policy Enforcement for Untrusted Android Applications.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

Privacy-Preserving Accountable Computation.
Proceedings of the Computer Security - ESORICS 2013, 2013

2012
Preface.
J. Comput. Secur., 2012

Computational Soundness without Protocol Restrictions.
IACR Cryptol. ePrint Arch., 2012

Differentially Private Smart Metering with Battery Recharging.
IACR Cryptol. ePrint Arch., 2012

Asynchronous Computational VSS with Reduced Communication Complexity.
IACR Cryptol. ePrint Arch., 2012

Computational Soundness of Symbolic Zero-knowledge Proofs: Weaker Assumptions and Mechanized Verification.
IACR Cryptol. ePrint Arch., 2012

SAFE extensibility of data-driven web applications.
Proceedings of the 21st World Wide Web Conference 2012, 2012

Ace: an efficient key-exchange protocol for onion routing.
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, 2012

ObliviAd: Provably Secure and Practical Online Behavioral Advertising.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Brief announcement: distributed cryptography using trinc.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2012

On the Development and Formalization of an Extensible Code Generator for Real Life Security Protocols.
Proceedings of the NASA Formal Methods, 2012

Automated Synthesis of Secure Distributed Applications.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Diffusion-Based Image Compression in Steganography.
Proceedings of the Advances in Visual Computing - 8th International Symposium, 2012

Verified Security of Merkle-Damgård.
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012

Adding query privacy to robust DHTs.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Cryptographically sound security proofs for basic and public-key Kerberos.
Int. J. Inf. Sec., 2011

Computational Verifiable Secret Sharing Revisited.
IACR Cryptol. ePrint Arch., 2011

Provably Secure and Practical Onion Routing.
IACR Cryptol. ePrint Arch., 2011

X-pire! - A digital expiration date for images in social networks
CoRR, 2011

A Novel Attack against Android Phones
CoRR, 2011

G2C: Cryptographic Protocols from Goal-Driven Specifications.
Proceedings of the Theory of Security and Applications - Joint Workshop, 2011

Union and Intersection Types for Secure Protocol Implementations.
Proceedings of the Theory of Security and Applications - Joint Workshop, 2011

Securing social networks.
Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, 2011

A Security API for Distributed Social Networks.
Proceedings of the Network and Distributed System Security Symposium, 2011

Automatically Verifying Typing Constraints for a Data Processing Language.
Proceedings of the Certified Programs and Proofs - First International Conference, 2011

Non-uniform distributions in quantitative information-flow.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Computationally Sound Verification of Source Code.
IACR Cryptol. ePrint Arch., 2010

Acoustic Side-Channel Attacks on Printers.
Proceedings of the 19th USENIX Security Symposium, 2010

Brief announcement: anonymity and trust in distributed systems.
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010

Anonymous Webs of Trust.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010

Computationally Sound Abstraction and Verification of Secure Multi-Party Computations.
Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2010

Speaker Recognition in Encrypted Voice Streams.
Proceedings of the Computer Security, 2010

RatFish: A File Sharing Protocol Provably Secure against Rational Users.
Proceedings of the Computer Security, 2010

2009
CoSP: A General Framework For Computational Soundness Proofs.
IACR Cryptol. ePrint Arch., 2009

Design and Verification of Anonymous Trust Protocols.
Proceedings of the Security Protocols XVII, 2009

Design and Verification of Anonymous Trust Protocols.
Proceedings of the Security Protocols XVII, 2009

Automatic Discovery and Quantification of Information Leaks.
Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), 2009

Tempest in a Teapot: Compromising Reflections Revisited.
Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), 2009

Anonymity and Censorship Resistance in Unstructured Overlay Networks.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009

CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable.
Proceedings of the Network and Distributed System Security Symposium, 2009

Achieving Security Despite Compromise Using Zero-knowledge.
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009

2008
Key-dependent message security under active attacks - BRSIM/UC-soundness of Dolev-Yao-style encryption with key cycles.
J. Comput. Secur., 2008

Limits of the BRSIM/UC soundness of Dolev-Yao-style XOR.
Int. J. Inf. Sec., 2008

Conditional reactive simulatability.
Int. J. Inf. Sec., 2008

Computational soundness of symbolic zero-knowledge proofs.
IACR Cryptol. ePrint Arch., 2008

Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks.
IACR Cryptol. ePrint Arch., 2008

Compromising Reflections-or-How to Read LCD Monitors around the Corner.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (S&P 2008), 2008

Anonymous and censorship resistant content sharing in unstructured overlays.
Proceedings of the Twenty-Seventh Annual ACM Symposium on Principles of Distributed Computing, 2008

A Formal Language for Cryptographic Pseudocode.
Proceedings of the Logic for Programming, 2008

Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers.
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008

Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus.
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008

Type-checking zero-knowledge.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

The CASPA Tool: Causality-Based Abstraction for Security Protocol Analysis.
Proceedings of the Computer Aided Verification, 20th International Conference, 2008

Limits of Constructive Security Proofs.
Proceedings of the Advances in Cryptology, 2008

OAEP Is Secure under Key-Dependent Messages.
Proceedings of the Advances in Cryptology, 2008

2007
Preface.
J. Comput. Secur., 2007

Preface.
Int. J. Inf. Sec., 2007

On the Security of Protocols with Logarithmic Communication Complexity.
IACR Cryptol. ePrint Arch., 2007

Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol.
IACR Cryptol. ePrint Arch., 2007

On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography.
IACR Cryptol. ePrint Arch., 2007

Preface.
Electron. Notes Theor. Comput. Sci., 2007

Information Flow in the Peer-Reviewing Process.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Causality-based Abstraction of Multiplicity in Security Protocols.
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007

A calculus of challenges and responses.
Proceedings of the 2007 ACM workshop on Formal methods in security engineering, 2007

2006
Compositional analysis of contract-signing protocols.
Theor. Comput. Sci., 2006

Cryptographically Sound Theorem Proving.
IACR Cryptol. ePrint Arch., 2006

Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes.
IACR Cryptol. ePrint Arch., 2006

On the Necessity of Rewinding in Secure Multiparty Computation.
IACR Cryptol. ePrint Arch., 2006

Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario.
IACR Cryptol. ePrint Arch., 2006

Computationally Sound Secrecy Proofs by Mechanized Flow Analysis.
IACR Cryptol. ePrint Arch., 2006

On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

Formal Methods and Cryptography.
Proceedings of the FM 2006: Formal Methods, 2006

Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes.
Proceedings of the Computer Security, 2006

2005
Unifying simulatability definitions in cryptographic systems under different timing assumptions.
J. Log. Algebraic Methods Program., 2005

Reactively secure signature schemes.
Int. J. Inf. Sec., 2005

Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library.
Int. J. Inf. Sec., 2005

Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles.
IACR Cryptol. ePrint Arch., 2005

Limits of the Cryptographic Realization of Dolev-Yao-style XOR.
IACR Cryptol. ePrint Arch., 2005

On Fairness in Simulatability-based Cryptographic Systems.
IACR Cryptol. ePrint Arch., 2005

Secure Key-Updating for Lazy Revocation.
IACR Cryptol. ePrint Arch., 2005

Real-or-random Key Secrecy of the Otway-Rees Protocol via a Symbolic Security Proof.
Proceedings of the 21st Annual Conference on Mathematical Foundations of Programming Semantics, 2005

Anonymous yet accountable access control.
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005

Tailoring the Dolev-Yao abstraction to web services realities.
Proceedings of the 2nd ACM Workshop On Secure Web Services, 2005

Lazy Revocation in Cryptographic File Systems.
Proceedings of the 3rd International IEEE Security in Storage Workshop (SISW 2005), 2005

Quantifying Probabilistic Information Flow in Computational Reactive Systems.
Proceedings of the Computer Security, 2005

A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System.
Proceedings of the 18th IEEE Computer Security Foundations Workshop, 2005

2004
Cryptographically sound analysis of security protocols.
PhD thesis, 2004

A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol.
IEEE J. Sel. Areas Commun., 2004

Polynomial liveness.
J. Comput. Secur., 2004

Computational probabilistic noninterference.
Int. J. Inf. Sec., 2004

The Reactive Simulatability (RSIM) Framework for Asynchronous Systems.
IACR Cryptol. ePrint Arch., 2004

Relating Symbolic and Cryptographic Secrecy.
IACR Cryptol. ePrint Arch., 2004

Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library.
IACR Cryptol. ePrint Arch., 2004

A General Composition Theorem for Secure Reactive Systems.
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004

Efficient comparison of enterprise privacy policies.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

Unification in Privacy Policy Evaluation - Translating EPAL into Prolog.
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004

Low-Level Ideal Signatures and General Integrity Idealization.
Proceedings of the Information Security, 7th International Conference, 2004

Justifying a Dolev-Yao Model Under Active Attacks.
Proceedings of the Foundations of Security Analysis and Design III, 2004

An Algebra for Composing Enterprise Privacy Policies.
Proceedings of the Computer Security, 2004

A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol.
Proceedings of the Computer Security, 2004

2003
Symmetric Authentication Within a Simulatable Cryptographic Library.
IACR Cryptol. ePrint Arch., 2003

A Universally Composable Cryptographic Library.
IACR Cryptol. ePrint Arch., 2003

How to Break and Repair a Universally Composable Signature Functionality.
IACR Cryptol. ePrint Arch., 2003

Public-Key Steganography with Active Attacks.
IACR Cryptol. ePrint Arch., 2003

Cryptographically Sound and Machine-Assisted Verification of Security Protocols.
Proceedings of the STACS 2003, 20th Annual Symposium on Theoretical Aspects of Computer Science, Berlin, Germany, February 27, 2003

Intransitive Non-Interference for Cryptographic Purpose.
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003

Proactive secure message transmission in asynchronous networks.
Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing, 2003

From absence of certain vulnerabilities towards security proofs: pushing the limits of formal verification.
Proceedings of the New Security Paradigms Workshop 2003, 2003

A Toolkit for Managing Enterprise Privacy Policies.
Proceedings of the Computer Security, 2003

Reliable Broadcast in a Computational Hybrid Model with Byzantine Faults, Crashes, and Recoveries.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

A composable cryptographic library with nested operations.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

Relating cryptography and formal methods: a panel.
Proceedings of the 2003 ACM workshop on Formal methods in security engineering, 2003

Security in Business Process Engineering.
Proceedings of the Business Process Management, International Conference, 2003

2002
Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation.
Proceedings of the FME 2002: Formal Methods, 2002

Computational Probabilistic Non-interference.
Proceedings of the Computer Security, 2002

Polynomial Fairness and Liveness.
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 2002


  Loading...