Christian A. Gorke, Frederik Armknecht.
In: CoRR ArXiv, Volume 1708.04871, August 2017.
Christian A. Gorke, Christian Janson, Frederik Armknecht, Carlos Cid.
In: SCC@AsiaCCS - 5th International Workshop on Security in Cloud Computing, April 2017.
Christian A. Gorke, Christian Janson, Frederik Armknecht, Carlos Cid.
In: Cryptology ePrint Archive: Report 2017/161, February 2017.
Louis Tajan, Dirk Westhoff, Christian A. Reuter, Frederik Armknecht.
In: ICITST - 11th International Conference for Internet Technology and Secured Transactions, December 2016.
Frederik Armknecht, Colin Boyd, Christopher Carr, Kristian Gjøsteen, Angela Jäschke, Christian A. Reuter, Martin Strand.
In: Cryptology ePrint Archive: Report 2015/1192, December 2015.
Frederik Armknecht, Jens-Matthias Bohli, Ghassan O. Karame, Zongren Liu, Christian A. Reuter.
In: CCS - 21st ACM Conference on Computer and Communications Security, November 2014.
Wieland Fischer, Christian A. Reuter.
In: FDTC - 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, September 2012.
at Cloud-Security Workshop in Offenburg, Germany
at (ISC)² Chapter Germany in Mainz, Germany
at 26th Crypto-Day in Nürnberg, Germany
at SCC@AsiaCCS 2017 in Abu Dhabi, United Arab Emirates
at Networking Workshop in Bad Herrenalb, Germany
Cloud Standards and Cloud Auditing: How to Ensure Cloud Security
Investigation of Different Techniques and Use Cases for Cloud Auditing
Big Data Security Analytics for Threat Intelligence
SMAUG in the Plane: Sensor Enhanced Signatures
Inferring Passwords from Motion Data on Mobile Devices
Touch without Screen: Indirect Recognition of Taps and Wipes on Windows Phone
Implementation and Evaluation of a Compact Proof-Of-Retrievability Algorithm
Printer Tracking: Steganography and Hidden Machine Identification Codes
Evaluating Security of Messaging Applications and their Underlying Frameworks
Crypto Currencies: Theft, Security, and Privacy of Monero and DASH
The NSA Surveillance Revelation
Security Evaluation of Intel SGX and ARM TrustZone in Combination with DRM and Crypto Currencies
Analyse des Rowhammer Effekts
Proofs of Retrievability: State of the Art
Achieving Privacy in Cryptocurrencies Based on Smart Contracts
Countermeasures for Relay-Attacks in Automotive Security
Systemization of Proofs of Location Schemes
From L to O: Changes in the Android Security Model
Comparison of Trusted Computing Techniques
Cross-Browser Fingerprinting Techniques and Their Applications ★
Crypto Malware from the Darknet
Differential Privacy in Neural Networks
Evaluating Windows 10 Privacy
Experiments for Secure Mobile Authentication Using Gestures
Why 90s Crypto Restrictions Weaken Modern Security
Attacking Scammers ★
Analysis of App-Communication Mechanisms in Windows Phone 8.1 ★
Motion Sensors in Android Devices
Software-Based Attestation
Zero-knowledge proofs of identity & The knowledge complexity of interactive proof-systems
Scanning Malware
Guess Who’s Texting You? Evaluating the Security of Smartphone Messaging Applications
Turla & WannaCry / SambaCry & Petya / NotPetya
A Blockchain-based Anonymous Physical Delivery System & Computer Security, Privacy, and DNA Sequencing
TwinsCoin
Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors: Rowhammer
Post-quantum RSA & Shor's Algorithm
Ethereum, Smart Contracts, Scheme, Everledger & DAO Hack & Ethereum Hack 1 & 2
Geolocation of Data in the Cloud & Do You Know Where Your Cloud Files Are?
Retricoin: Bitcoin based on Compact proofs of retrievability
Tesla cars: Remote Hacking
Off-Path TCP Exploits: Global Rate Limit Considered Dangerous & New Methods for Passive Estimation of TCP Round-Trip Times
Purposely Confusing Machine Learning & Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition & Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples
Zerocash & Zerocoin
(Cross-)Browser Fingerprinting via OS and Hardware Level Features
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Spoofing GPS and Countermeasures
DDoS Attacks 1 & DDoS Attacks 2 & DDoS Attacks 3
Learning to Protect Communications with Adversarial Neural Cryptography
User-Generated Free-Form Gestures for Authentication: Security and Memorability
Big Data Analytics for Security Intelligence
Physical Cryptanalysis of KeeLoq Code Hopping Applications
Security of BMWs ConnectedDrive
Lock It and Still Lose It - On the (In)Security of Automotive Remote Keyless Entry Systems
Front-Door vs. Back-Door, Apple vs. IBM Debate & Encryption & Politics: Escrowed Encryption Standard ("Clipper Chip") & Feinstein-Burr Bill
Off-Path TCP Exploits: Global Rate Limit Considered Dangerous
Fingerprints: Online tracking: A 1-million-site measurement and analysis
Differential Privacy & RAPPOR
Malware PC: Locky, CTB-Locker, TeslaCrypt 2, trun, CryptoLocker, KeRanger, Surpirse, Petya, Samsa: How they work and why some stopped encrypting & Malware Mobil: SLocker, Xbot, Cyber Police
POODLE & LogJam
Blockchain-Based Systems & Zukunft von Bitcoin
AccelPrint: Beschleunigungssensor als Identifikator
MoLe: Motion Leaks through Smartwatch Sensors
Insecurity of Voice Solution VoLTE in LTE Mobile Networks
MagSpoof
Crypto & Politics: Front-Door vs. Back-Door
FREAK
RC4-Angriff von Shamir et al.
Simon and Speck ciphers
Axolotl & TextSecure
Advantages of Peercoin in respect to Bitcoin
Stagefright Sicherheitslücke & Android 5 Lockscreen Bypass Vulnerability
Malware-as-a-Service: Trojan Software Tox & Shellshock Sicherheitslücke
Return-Oriented Programming, "Exploits Without Code Injection"
Automotive: Remote Exploitation of an Unaltered Passenger Vehicle & Comprehensive Experimental Analyses of Automotive Attack Surfaces
Block Ciphers: Algebraic Cryptanalysis and Gröbner Bases
Heartbleed & Shellshock
Angriffe auf DECT Systeme
Honeywords Project
Locating Mobile Phones with SS7
KeySweeper
Gyrophone
Windows Phone 8.1 Sicherheits-Modell
Heartbleed