Rainer Böhme

Orcid: 0000-0003-4518-6227

Affiliations:
  • University of Münster, Germany


According to our database1, Rainer Böhme authored at least 159 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Strategic Vote Timing in Online Elections With Public Tallies.
CoRR, 2024

2023
Mapping the Privacy Landscape for Central Bank Digital Currencies.
Commun. ACM, March, 2023

JPEG Steganalysis Using Leaked Cover Thumbnails.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2023

Lessons Lost: Incident Response in the Age of Cyber Insurance and Breach Attorneys.
Proceedings of the 32nd USENIX Security Symposium, 2023

Anatomy of a High-Profile Data Breach: Dissecting the Aftermath of a Crypto-Wallet Case.
Proceedings of the 32nd USENIX Security Symposium, 2023

What can central bank digital currency designers learn from asking potential users?
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023

Causes and Effects of Unanticipated Numerical Deviations in Neural Network Inference Frameworks.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Progressive JPEGs in the Wild: Implications for Information Hiding and Forensics.
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2023

Detecting Privileged Parties on Ethereum.
Proceedings of the Financial Cryptography and Data Security. FC 2023 International Workshops, 2023

2022
More Real Than Real: A Study on Human Visual Perception of Synthetic Faces [Applications Corner].
IEEE Signal Process. Mag., 2022

Mapping the Privacy Landscape for Central Bank Digital Currencies: Now is the time to shape what future payment flows will reveal about you.
ACM Queue, 2022

Incident Response as a Lawyers' Service.
IEEE Secur. Priv., 2022

The commodification of consent.
Comput. Secur., 2022

CAAW'22: 2022 International Workshop on Cryptoasset Analytics.
Proceedings of the Companion of The Web Conference 2022, Virtual Event / Lyon, France, April 25, 2022

Know Your Library: How the libjpeg Version Influences Compression and Decompression Results.
Proceedings of the IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27, 2022

Not All Code are Create2 Equal.
Proceedings of the Financial Cryptography and Data Security. FC 2022 International Workshops, 2022

The Effect of the JPEG Implementation on the Cover-Source Mismatch Error in Image Steganalysis.
Proceedings of the 30th European Signal Processing Conference, 2022

Parallel Proof-of-Work with Concrete Bounds.
Proceedings of the 4th ACM Conference on Advances in Financial Technologies, 2022

2021
Privacy Preference Signals: Past, Present and Future.
Proc. Priv. Enhancing Technol., 2021

Conflicting Privacy Preference Signals in the Wild.
CoRR, 2021

Who are the arbitrageurs? Empirical evidence from Bitcoin traders in the Mt. Gox exchange platform.
CoRR, 2021

More Real than Real: A Study on Human Visual Perception of Synthetic Faces.
CoRR, 2021

SoK: Quantifying Cyber Risk.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

iNNformant: Boundary Samples as Telltale Watermarks.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021

Forensicability of Deep Neural Network Inference Pipelines.
Proceedings of the IEEE International Conference on Acoustics, 2021

Collaborative Deanonymization.
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021

Out of the Dark: The Effect of Law Enforcement Actions on Cryptocurrency Market Prices.
Proceedings of the APWG Symposium on Electronic Crime Research, 2021

Non-Adoption of Crypto-Assets: Exploring the Role of Trust, Self-Efficacy, and Risk.
Proceedings of the 29th European Conference on Information Systems, 2021

Bits Under the Mattress: Understanding Different Risk Perceptions and Security Behaviors of Crypto-Asset Users.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

2020
Multiple Purposes, Multiple Problems: A User Study of Consent Dialogs after GDPR.
Proc. Priv. Enhancing Technol., 2020

Trembling triggers: exploring the sensitivity of backdoors in DNN-based face recognition.
EURASIP J. Inf. Secur., 2020

Pricing Security in Proof-of-Work Systems.
CoRR, 2020

Responsible vulnerability disclosure in cryptocurrencies.
Commun. ACM, 2020

Measuring the Emergence of Consent Management on the Web.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

On the Difficulty of Hiding Keys in Neural Networks.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020

eNNclave: Offline Inference with Model Confidentiality.
Proceedings of the AISec@CCS 2020: Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security, 2020

Watching the Weak Link into Your Home: An Inspection and Monitoring Toolkit for TR-069.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
Information-Theoretic Bounds for the Forensic Detection of Downscaled Signals.
IEEE Trans. Inf. Forensics Secur., 2019

Teaching Digital Signal Processing With a Challenge on Image Forensics [SP Education].
IEEE Signal Process. Mag., 2019

Rationality is Self-Defeating in Permissionless Systems.
CoRR, 2019

HotPoW: Finality from Proof-of-Work Quorums.
CoRR, 2019

Detecting Token Systems on Ethereum.
Proceedings of the Financial Cryptography and Data Security, 2019

The Operational Cost of Ethereum Airdrops.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2019

2018
Rotten Apples or Bad Harvest? What We Are Measuring When We Are Measuring Abuse.
ACM Trans. Internet Techn., 2018

Special Issue on the Economics of Security and Privacy: Guest Editors' Introduction.
ACM Trans. Internet Techn., 2018

Blockchain Security at Scale (Dagstuhl Seminar 18461).
Dagstuhl Reports, 2018

The costs of consumer-facing cybercrime: an empirical exploration of measurement issues and estimates†.
J. Cybersecur., 2018

Detecting Adversarial Examples - A Lesson from Multimedia Forensics.
CoRR, 2018

Verbesserung der Syndrome-Trellis-Kodierung zur Erhöhung der Unvorhersagbarkeit von Einbettpositionen in steganographischen Systemen.
Proceedings of the Sicherheit 2018, 2018

Towards A Theory of Jpeg Block Convergence.
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018

Pricing Anonymity.
Proceedings of the Financial Cryptography and Data Security, 2018

Detecting Adversarial Examples - a Lesson from Multimedia Security.
Proceedings of the 26th European Signal Processing Conference, 2018

Webcam Covering as Planned Behavior.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

2017
Datenschutz trotz öffentlicher Blockchain?
Datenschutz und Datensicherheit, 2017

Technische Grundlagen und datenschutzrechtliche Fragen der Blockchain-Technologie.
Datenschutz und Datensicherheit, 2017

The price of anonymity: empirical evidence from a market for Bitcoin anonymization.
J. Cybersecur., 2017

Strategic Aspects of Cyber Risk Information Sharing.
ACM Comput. Surv., 2017

Decoy Password Vaults: At Least as Hard as Steganography?
Proceedings of the ICT Systems Security and Privacy Protection, 2017

On the Statistical Properties of Syndrome Trellis Coding.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

Information-theoretic Bounds of Resampling Forensics: New Evidence for Traces Beyond Cyclostationarity.
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017

Analyzing Persistent Impact of Cybercrime on the Societal Level: Evidence for Individual Security Behavior.
Proceedings of the International Conference on Information Systems, 2017

Mixing Coins of Different Quality: A Game-Theoretic Approach.
Proceedings of the Financial Cryptography and Data Security, 2017

Anonymous Alone? Measuring Bitcoin's Second-Generation Anonymization Techniques.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017

In Code We Trust? - Measuring the Control Flow Immutability of All Smart Contracts Deployed on Ethereum.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Game Theory and Adaptive Steganography.
IEEE Trans. Inf. Forensics Secur., 2016

Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance.
IEEE Trans. Dependable Secur. Comput., 2016

The economics of mandatory security breach reporting to authorities.
J. Cybersecur., 2016

Telltale Watermarks for Counting JPEG Compressions.
Proceedings of the Media Watermarking, 2016

Detecting Copy-Move Forgeries in Scanned Text Documents.
Proceedings of the Media Watermarking, 2016

Forensics of High Quality and Nearly Identical JPEG Image Recompression.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016

Perceived Benefit and Risk as Multidimensional Determinants of Bitcoin Use: A Quantitative Exploratory Study.
Proceedings of the International Conference on Information Systems, 2016

Back to the Roots: Information Sharing Economics and What We Can Learn for Security.
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, 2016

2015
Adaptive Steganography and Steganalysis with Fixed-Size Embedding.
Trans. Data Hiding Multim. Secur., 2015

Personal data markets.
Electron. Mark., 2015

The challenges of personal data markets and privacy.
Electron. Mark., 2015

Meldepflichten für IT-Sicherheitsvorfälle: Ein Prinzipal-Agent-Ansatz.
Proceedings of the Smart Enterprise Engineering: 12. Internationale Tagung Wirtschaftsinformatik, 2015

Forensics of high-quality JPEG images with color subsampling.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

Die Automatisierung von Compliance in Cloud-Umgebungen (ACCU).
Proceedings of the 45. Jahrestagung der Gesellschaft für Informatik, Informatik, Energie und Umwelt, INFORMATIK 2015, Cottbus, Germany, September 28, 2015

Trends, Tips, Tolls: A Longitudinal Study of Bitcoin Transaction Fees.
Proceedings of the Financial Cryptography and Data Security, 2015

Mandatory Security Information Sharing with Authorities: Implications on Investments in Internal Controls.
Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative Security, 2015

2014
Secure Team Composition to Thwart Insider Threats and Cyber-Espionage.
ACM Trans. Internet Techn., 2014

Too Much Choice: End-User Privacy Decisions in the Context of Choice Proliferation.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014

Consumer Participation in Online Contracts - Exploring Cross-Out Clauses.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

Predictable rain?: steganalysis of public-key steganography using wet paper codes.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

"Steganalysis in Technicolor" Boosting WS detection of stego images from CFA-interpolated covers.
Proceedings of the IEEE International Conference on Acoustics, 2014

Towards Risk Scoring of Bitcoin Transactions.
Proceedings of the Financial Cryptography and Data Security, 2014

2013
Trading Agent Kills Market Information - Evidence from Online Social Lending.
Proceedings of the Web and Internet Economics - 9th International Conference, 2013

Bitspotting: Detecting Optimal Adaptive Steganography.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Moving steganography and steganalysis from the laboratory into the real world.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

Block convergence in repeated transform coding: JPEG-100 forensics, carbon dating, and tamper detection.
Proceedings of the IEEE International Conference on Acoustics, 2013

A game-theoretic analysis of content-adaptive steganography with independent embedding.
Proceedings of the 21st European Signal Processing Conference, 2013

Managing the Weakest Link - A Game-Theoretic Approach for the Mitigation of Insider Threats.
Proceedings of the Computer Security - ESORICS 2013, 2013

An inquiry into money laundering tools in the Bitcoin ecosystem.
Proceedings of the 2013 APWG eCrime Researchers Summit, 2013

Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency.
Proceedings of the Economics of Information Security and Privacy, 2013

Measuring the Cost of Cybercrime.
Proceedings of the Economics of Information Security and Privacy, 2013

2012
Weighted stego-image steganalysis for naive content-adaptive embedding.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency.
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012

Measuring the Cost of Cybercrime.
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012

A Game-Theoretic Approach to Content-Adaptive Steganography.
Proceedings of the Information Hiding - 14th International Conference, 2012

Geld stinkt, Bitcoin auch - Eine Ökobilanz der BitcoinBlock Chain.
Proceedings of the 57. Jahrestagung der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie, 42. Jahrestagung der Gesellschaft für Informatik, Was bewegt uns in der/die Zukunft?, 2012

Where to Hide the Bits ?
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012

Security Audits Revisited.
Proceedings of the Financial Cryptography and Data Security, 2012

How do consumers react to cybercrime?
Proceedings of the 2012 eCrime Researchers Summit, 2012

2011
Wann sind IT-Security-Audits nützlich?
Proceedings of the 10. Internationale Tagung Wirtschaftsinformatik, 2011

The security cost of cheap user interaction.
Proceedings of the 2011 New Security Paradigms Workshop, 2011

Countering Counter-Forensics: The Case of JPEG Compression.
Proceedings of the Information Hiding - 13th International Conference, 2011

Security Games with Market Insurance.
Proceedings of the Decision and Game Theory for Security - Second International Conference, 2011

Collective Exposure: Peer Effects in Voluntary Disclosure of Personal Data.
Proceedings of the Financial Cryptography and Data Security, 2011

2010
Advanced Statistical Steganalysis
Information Security and Cryptography, Springer, ISBN: 978-3-642-14312-0, 2010

The Dresden Image Database for Benchmarking Digital Image Forensics.
J. Digit. Forensic Pract., 2010

Towards Insurable Network Architectures (Versicherbare Netzarchitekturen).
it Inf. Technol., 2010

The Iterated Weakest Link.
IEEE Secur. Priv., 2010

Modeling Cyber-Insurance: Towards a Unifying Framework.
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010

The Role of Soft Information in Trust Building: Evidence from Online Social Lending.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

Social Lending aus der Perspektive des Datenschutzes.
Proceedings of the Sicherheit 2010: Sicherheit, 2010

Security Metrics and Security Investment Models.
Proceedings of the Advances in Information and Computer Security, 2010

Optimal Information Security Investment with Penetration Testing.
Proceedings of the Decision and Game Theory for Security, 2010

Trained to accept?: a field experiment on consent dialogs.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

Privacy in Online Social Lending.
Proceedings of the Intelligent Information Privacy Management, 2010

2009
Improved statistical steganalysis using models of heterogeneous cover signals.
PhD thesis, 2009

The Iterated Weakest Link - A Model of Adaptive Security Investment.
Proceedings of the 8th Annual Workshop on the Economics of Information Security, 2009

Valuating Privacy with Option Pricing Theory.
Proceedings of the 8th Annual Workshop on the Economics of Information Security, 2009

Synthesis of color filter array pattern in digital images.
Proceedings of the Media Forensics and Security I, 2009

Multimedia Forensics Is Not Computer Forensics.
Proceedings of the Computational Forensics, Third International Workshop, 2009

An Epistemological Approach to Steganography.
Proceedings of the Information Hiding, 11th International Workshop, 2009

Multimedia-Forensik als Teildisziplin der digitalen Forensik.
Proceedings of the 39. Jahrestagung der Gesellschaft für Informatik, Im Focus das Leben, INFORMATIK 2009, Lübeck, Germany, September 28, 2009

Privacy-Enhanced Event Scheduling.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Conformity or Diversity: Social Implications of Transparency in Personal Data Processing.
Proceedings of the Managing Information Risk and the Economics of Security, 2009

Security Economics and European Policy.
Proceedings of the Managing Information Risk and the Economics of Security, 2009

2008
Hiding Traces of Resampling in Digital Images.
IEEE Trans. Inf. Forensics Secur., 2008

Digital Rights Management zum Schutz personenbezogener Daten?
Datenschutz und Datensicherheit, 2008

Conformity or Diversity: Social Implications of Transparency in Personal Data Processing.
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008

Security Economics and European Policy.
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008

Revisiting weighted stego-image steganalysis.
Proceedings of the Security, 2008

Weighted Stego-Image Steganalysis for JPEG Covers.
Proceedings of the Information Hiding, 10th International Workshop, 2008

Data Retention and Anonymity Services - Introducing a New Class of Realistic Adversary Models.
Proceedings of the Future of Identity in the Information Society, 2008

2007
Pricing strategies in electronic marketplaces with privacy-enhancing technologies.
Wirtschaftsinf., 2007

On the Security of "A Steganographic Scheme for Secure Communications Based on the Chaos and the Euler Theorem".
IEEE Trans. Multim., 2007

On the Viability of Privacy-Enhancing Technologies in a Self-Regulated Business-to-Consumer Market: Will Privacy Remain a Luxury Good?
Proceedings of the 6th Annual Workshop on the Economics of Information Security, 2007

Can we trust digital image forensics?
Proceedings of the 15th International Conference on Multimedia 2007, 2007

Tamper Hiding: Defeating Image Forensics.
Proceedings of the Information Hiding, 9th International Workshop, 2007

2006
Models and Measures for Correlation in Cyber-Insurance.
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006

The Effect of Stock Spam on Financial Markets.
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006

On the Limits of Cyber-Insurance.
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006

A two-factor error model for quantitative steganalysis.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

A Comparison of Market Approaches to Software Vulnerability Disclosure.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

2005
Feature-based encoder classification of compressed audio streams.
Multim. Syst., 2005

Cyber-Insurance Revisited.
Proceedings of the 4th Annual Workshop on the Economics of Information Security, 2005

IT-Risiken im Schadenversicherungsmodell: Implikationen der Marktstruktur.
Proceedings of the Sicherheit 2005: Sicherheit, 2005

Economics of Identity Management: A Supply-Side Perspective.
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005

Assessment of Steganalytic Methods Using Multiple Regression Models.
Proceedings of the Information Hiding, 7th International Workshop, 2005

Validation of Predictions with Measurements.
Proceedings of the Dependability Metrics: Advanced Lectures [result from a Dagstuhl seminar, October 30, 2005

Economic Security Metrics.
Proceedings of the Dependability Metrics: Advanced Lectures [result from a Dagstuhl seminar, October 30, 2005

On Metrics and Measurements.
Proceedings of the Dependability Metrics: Advanced Lectures [result from a Dagstuhl seminar, October 30, 2005

2004
On the PET Workshop Panel "Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?".
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004

Statistical characterisation of MP3 encoders for steganalysis.
Proceedings of the 6th workshop on Multimedia & Security, 2004

Exploiting Preserved Statistics for Steganalysis.
Proceedings of the Information Hiding, 6th International Workshop, 2004

Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics.
Proceedings of the Computer Security, 2004


  Loading...