BibTeX records: Felix C. Freiling

download as .bib file

@article{DBLP:journals/tissec/OttmannBF24,
  author       = {Jenny Ottmann and
                  Frank Breitinger and
                  Felix C. Freiling},
  title        = {An Experimental Assessment of Inconsistencies in Memory Forensics},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {27},
  number       = {1},
  pages        = {2:1--2:29},
  year         = {2024},
  url          = {https://doi.org/10.1145/3628600},
  doi          = {10.1145/3628600},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/OttmannBF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GruberHF23,
  author       = {Jan Gruber and
                  Christopher James Hargreaves and
                  Felix C. Freiling},
  title        = {Contamination of digital evidence: Understanding an underexposed risk},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {44},
  number       = {Supplement},
  pages        = {301501},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301501},
  doi          = {10.1016/J.FSIDI.2023.301501},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/GruberHF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:series/gidiss/2022,
  editor       = {R{\"{u}}diger Reischuk and
                  Sven Apel and
                  Abraham Bernstein and
                  Felix C. Freiling and
                  Hans{-}Peter Lenhof and
                  Gustaf Neumann and
                  Kay Uwe R{\"{o}}mer and
                  Bj{\"{o}}rn Scheuermann and
                  Nicole Schweikardt and
                  Klaus Wehrle},
  title        = {Ausgezeichnete Informatikdissertationen 2022},
  series       = {{LNI}},
  volume       = {{D-23}},
  publisher    = {{GI}},
  year         = {2023},
  url          = {https://dl.gi.de/handle/20.500.12116/42584},
  timestamp    = {Fri, 17 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/gidiss/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-12060,
  author       = {Jenny Ottmann and
                  {\"{U}}same Cengiz and
                  Frank Breitinger and
                  Felix C. Freiling},
  title        = {As if Time Had Stopped - Checking Memory Dumps for Quasi-Instantaneous
                  Consistency},
  journal      = {CoRR},
  volume       = {abs/2307.12060},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.12060},
  doi          = {10.48550/ARXIV.2307.12060},
  eprinttype    = {arXiv},
  eprint       = {2307.12060},
  timestamp    = {Tue, 01 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-12060.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SchneiderDLDF22,
  author       = {Janine Schneider and
                  Linus D{\"{u}}sel and
                  Benedikt Lorch and
                  Julia Drafz and
                  Felix C. Freiling},
  title        = {Prudent design principles for digital tampering experiments},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301334},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301334},
  doi          = {10.1016/J.FSIDI.2022.301334},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SchneiderDLDF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SchneiderEF22,
  author       = {Janine Schneider and
                  Maximilian Eichhorn and
                  Felix C. Freiling},
  title        = {Ambiguous file system partitions},
  journal      = {Digit. Investig.},
  volume       = {42},
  number       = {Supplement},
  pages        = {301399},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301399},
  doi          = {10.1016/J.FSIDI.2022.301399},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SchneiderEF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GruberVBF22,
  author       = {Jan Gruber and
                  Lena L. Voigt and
                  Zinaida Benenson and
                  Felix C. Freiling},
  title        = {Foundations of cybercriminalistics: From general process models to
                  case-specific concretizations in cybercrime investigations},
  journal      = {Digit. Investig.},
  volume       = {43},
  number       = {Supplement},
  pages        = {301438},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301438},
  doi          = {10.1016/J.FSIDI.2022.301438},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/GruberVBF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/EinzingerRF22,
  author       = {Christoph Einzinger and
                  Christian R{\"{u}}ckert and
                  Felix C. Freiling},
  title        = {Datenminimierung in der Netzwerkforensik},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {3},
  pages        = {149--155},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1580-0},
  doi          = {10.1007/S11623-022-1580-0},
  timestamp    = {Sat, 19 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/EinzingerRF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GruberF22,
  author       = {Jan Gruber and
                  Felix C. Freiling},
  title        = {Fighting Evasive Malware},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {46},
  number       = {5},
  pages        = {284--290},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11623-022-1604-9},
  doi          = {10.1007/S11623-022-1604-9},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GruberF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/LatzoHKHCFA22,
  author       = {Tobias Latzo and
                  Andreas Hellmich and
                  Annika Knepper and
                  Lukas Hardi and
                  Tim Phillip Castello{-}Waldow and
                  Felix C. Freiling and
                  Andreas Attenberger},
  editor       = {Hans P. Reiser and
                  Marcel Kyas},
  title        = {Maraudrone's Map: An Interactive Web Application for Forensic Analysis
                  and Visualization of {DJI} Drone Log Data},
  booktitle    = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic,
                  Iceland, November 30-December 2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13700},
  pages        = {329--345},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22295-5\_18},
  doi          = {10.1007/978-3-031-22295-5\_18},
  timestamp    = {Mon, 09 Jan 2023 17:58:32 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/LatzoHKHCFA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/GruberF22,
  author       = {Jan Gruber and
                  Felix C. Freiling},
  editor       = {Christian Wressnegger and
                  Delphine Reinhardt and
                  Thomas Barber and
                  Bernhard C. Witt and
                  Daniel Arp and
                  Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann},
  title        = {Fighting Evasive Malware: How to Pass the Reverse Turing Test By Utilizing
                  a VMI-Based Human Interaction Simulator},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8,
                  2022},
  series       = {{LNI}},
  volume       = {{P-323}},
  pages        = {49--64},
  publisher    = {Gesellschaft f{\"{u}}r Informatik, Bonn},
  year         = {2022},
  url          = {https://doi.org/10.18420/sicherheit2022\_03},
  doi          = {10.18420/SICHERHEIT2022\_03},
  timestamp    = {Tue, 04 Jul 2023 17:42:02 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/GruberF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:series/gidiss/2021,
  editor       = {Steffen H{\"{o}}lldobler and
                  R{\"{u}}diger Reischuk and
                  Sven Apel and
                  Abraham Bernstein and
                  Felix C. Freiling and
                  Hans{-}Peter Lenhof and
                  Gustaf Neumann and
                  Kay Uwe R{\"{o}}mer and
                  Bj{\"{o}}rn Scheuermann and
                  Nicole Schweikardt and
                  Klaus Wehrle},
  title        = {Ausgezeichnete Informatikdissertationen 2021},
  series       = {{LNI}},
  volume       = {{D-22}},
  publisher    = {{GI}},
  year         = {2022},
  url          = {https://dl.gi.de/handle/20.500.12116/39830},
  isbn         = {978-3-88579-980-1},
  timestamp    = {Thu, 16 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/gidiss/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MengesLVSPTKPFR21,
  author       = {Florian Menges and
                  Tobias Latzo and
                  Manfred Vielberth and
                  Sabine Sobola and
                  Henrich C. P{\"{o}}hls and
                  Benjamin Taubmann and
                  Johannes K{\"{o}}stler and
                  Alexander Puchta and
                  Felix C. Freiling and
                  Hans P. Reiser and
                  G{\"{u}}nther Pernul},
  title        = {Towards GDPR-compliant data processing in modern {SIEM} systems},
  journal      = {Comput. Secur.},
  volume       = {103},
  pages        = {102165},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102165},
  doi          = {10.1016/J.COSE.2020.102165},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MengesLVSPTKPFR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/FaustTMF21,
  author       = {Fabian Faust and
                  Aur{\'{e}}lien Thierry and
                  Tilo M{\"{u}}ller and
                  Felix C. Freiling},
  title        = {Selective Imaging of File System Data on Live Systems},
  journal      = {Digit. Investig.},
  volume       = {36 Supplement},
  pages        = {301115},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301115},
  doi          = {10.1016/J.FSIDI.2021.301115},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/FaustTMF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/OttmannPSSRF21,
  author       = {Jenny Ottmann and
                  Johannes Pollach and
                  Nicole Scheler and
                  Janine Schneider and
                  Christian R{\"{u}}ckert and
                  Felix C. Freiling},
  title        = {Zur Blackbox-Problematik im Bereich Mobilfunkforensik},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {45},
  number       = {8},
  pages        = {546--552},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11623-021-1487-1},
  doi          = {10.1007/S11623-021-1487-1},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/OttmannPSSRF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RocklPHMF21,
  author       = {Jonas R{\"{o}}ckl and
                  Mykolai Protsenko and
                  Monika Huber and
                  Tilo M{\"{u}}ller and
                  Felix C. Freiling},
  title        = {Advanced System Resiliency Based on Virtualization Techniques for
                  IoT Devices},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {455--467},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485836},
  doi          = {10.1145/3485832.3485836},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/RocklPHMF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/gidiss/2020,
  editor       = {Steffen H{\"{o}}lldobler and
                  Sven Apel and
                  Abraham Bernstein and
                  Felix C. Freiling and
                  Hans{-}Peter Lenhof and
                  Gustaf Neumann and
                  R{\"{u}}diger Reischuk and
                  Kay Uwe R{\"{o}}mer and
                  Bj{\"{o}}rn Scheuermann and
                  Nicole Schweikardt and
                  Myra Spiliopoulou and
                  Sabine S{\"{u}}sstrunk and
                  Klaus Wehrle},
  title        = {Ausgezeichnete Informatikdissertationen 2020},
  series       = {{LNI}},
  volume       = {{D-21}},
  publisher    = {{GI}},
  year         = {2021},
  url          = {https://dl.gi.de/handle/20.500.12116/37893},
  isbn         = {978-3-88579-775-3},
  timestamp    = {Thu, 16 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/gidiss/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MullanRF20,
  author       = {Patrick Mullan and
                  Christian Riess and
                  Felix C. Freiling},
  title        = {Towards Open-Set Forensic Source Grouping on {JPEG} Header Information},
  journal      = {Digit. Investig.},
  volume       = {32 Supplement},
  pages        = {300916},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300916},
  doi          = {10.1016/J.FSIDI.2020.300916},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/MullanRF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LatzoBF20,
  author       = {Tobias Latzo and
                  Julian Brost and
                  Felix C. Freiling},
  title        = {BMCLeech: Introducing Stealthy Memory Forensics to {BMC}},
  journal      = {Digit. Investig.},
  volume       = {32 Supplement},
  pages        = {300919},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300919},
  doi          = {10.1016/J.FSIDI.2020.300919},
  timestamp    = {Wed, 27 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/LatzoBF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SchneiderWF20,
  author       = {Janine Schneider and
                  Julian Wolf and
                  Felix C. Freiling},
  title        = {Tampering with Digital Evidence is Hard: The Case of Main Memory Images},
  journal      = {Digit. Investig.},
  volume       = {32 Supplement},
  pages        = {300924},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300924},
  doi          = {10.1016/J.FSIDI.2020.300924},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SchneiderWF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SchneiderDMF20,
  author       = {Janine Schneider and
                  Hans{-}Peter Deifel and
                  Stefan Milius and
                  Felix C. Freiling},
  title        = {Unifying Metadata-Based Storage Reconstruction and Carving with {LAYR}},
  journal      = {Digit. Investig.},
  volume       = {33 Supplement},
  pages        = {301006},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301006},
  doi          = {10.1016/J.FSIDI.2020.301006},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SchneiderDMF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/BuschNFRSF20,
  author       = {Marcel Busch and
                  Florian Nicolai and
                  Fabian Fleischer and
                  Christian R{\"{u}}ckert and
                  Christoph Safferling and
                  Felix C. Freiling},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Daryl Johnson and
                  Makan Pourzandi and
                  Suryadipta Majumdar},
  title        = {Make Remote Forensic Investigations Forensic Again: Increasing the
                  Evidential Value of Remote Forensic Investigations},
  booktitle    = {Digital Forensics and Cyber Crime - 11th {EAI} International Conference,
                  {ICDF2C} 2020, Boston, MA, USA, October 15-16, 2020, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {351},
  pages        = {23--43},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68734-2\_2},
  doi          = {10.1007/978-3-030-68734-2\_2},
  timestamp    = {Fri, 19 Apr 2024 15:03:30 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/BuschNFRSF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/PalutkeRWF20,
  author       = {Ralph Palutke and
                  Simon Ruderich and
                  Matthias Wild and
                  Felix C. Freiling},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {HyperLeech: Stealthy System Virtualization with Minimal Target Impact
                  through DMA-Based Hypervisor Injection},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {165--179},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/palutke},
  timestamp    = {Thu, 17 Jun 2021 16:04:48 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/PalutkeRWF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sadfe/GrossDF20,
  author       = {Tobias Gro{\ss} and
                  Richard Dirauf and
                  Felix C. Freiling},
  title        = {Systematic Analysis of Browser History Evidence},
  booktitle    = {13th International Conference on Systematic Approaches to Digital
                  Forensic Engineering, {SADFE} 2020, New York, NY, USA, May 15, 2020},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SADFE51007.2020.00010},
  doi          = {10.1109/SADFE51007.2020.00010},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sadfe/GrossDF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/MullerMF20,
  author       = {Nico M{\"{u}}ller and
                  Tilo M{\"{u}}ller and
                  Felix C. Freiling},
  editor       = {Delphine Reinhardt and
                  Hanno Langweg and
                  Bernhard C. Witt and
                  Mathias Fischer},
  title        = {Urheberrecht ./. Sicherheitsanalyse},
  booktitle    = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz
                  2020, G{\"{o}}ttingen},
  series       = {{LNI}},
  volume       = {{P-301}},
  pages        = {105--115},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2020},
  url          = {https://doi.org/10.18420/sicherheit2020\_08},
  doi          = {10.18420/SICHERHEIT2020\_08},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/MullerMF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MorgnerMKFB20,
  author       = {Philipp Morgner and
                  Christoph Mai and
                  Nicole Koschate{-}Fischer and
                  Felix C. Freiling and
                  Zinaida Benenson},
  title        = {Security Update Labels: Establishing Economic Incentives for Security
                  Patching of IoT Consumer Products},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {429--446},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00021},
  doi          = {10.1109/SP40000.2020.00021},
  timestamp    = {Thu, 21 Sep 2023 15:57:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/MorgnerMKFB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/gidiss/2019,
  editor       = {Steffen H{\"{o}}lldobler and
                  Sven Apel and
                  Abraham Bernstein and
                  Felix C. Freiling and
                  Hans{-}Peter Lenhof and
                  Gustaf Neumann and
                  R{\"{u}}diger Reischuk and
                  Kay Uwe R{\"{o}}mer and
                  Bj{\"{o}}rn Scheuermann and
                  Nicole Schweikardt and
                  Myra Spiliopoulou and
                  Sabine S{\"{u}}sstrunk and
                  Klaus Wehrle},
  title        = {Ausgezeichnete Informatikdissertationen 2019},
  series       = {{LNI}},
  volume       = {{D-20}},
  publisher    = {{GI}},
  year         = {2020},
  url          = {https://dl.gi.de/handle/20.500.12116/37999},
  isbn         = {978-3-88579-775-3},
  timestamp    = {Thu, 16 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/gidiss/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-02573,
  author       = {Fabian Faust and
                  Aur{\'{e}}lien Thierry and
                  Tilo M{\"{u}}ller and
                  Felix C. Freiling},
  title        = {Technical Report: Selective Imaging of File System Data on Live Systems},
  journal      = {CoRR},
  volume       = {abs/2012.02573},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.02573},
  eprinttype    = {arXiv},
  eprint       = {2012.02573},
  timestamp    = {Wed, 09 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-02573.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LatzoPF19,
  author       = {Tobias Latzo and
                  Ralph Palutke and
                  Felix C. Freiling},
  title        = {A universal taxonomy and survey of forensic memory acquisition techniques},
  journal      = {Digit. Investig.},
  volume       = {28},
  number       = {Supplement},
  pages        = {56--69},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.01.001},
  doi          = {10.1016/J.DIIN.2019.01.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/LatzoPF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MullanRF19,
  author       = {Patrick Mullan and
                  Christian Riess and
                  Felix C. Freiling},
  title        = {Forensic source identification using {JPEG} image headers: The case
                  of smartphones},
  journal      = {Digit. Investig.},
  volume       = {28 Supplement},
  pages        = {S68--S76},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.01.016},
  doi          = {10.1016/J.DIIN.2019.01.016},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/MullanRF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/insk/SchillerFBM19,
  author       = {Jan Schiller and
                  Felix C. Freiling and
                  Zinaida Benenson and
                  Werner Massonne},
  title        = {Berufsbegleitendes Studieren an Universit{\"{a}}ten - Ein Zukunftsfeld
                  f{\"{u}}r die IT-Sicherheit},
  journal      = {Inform. Spektrum},
  volume       = {42},
  number       = {1},
  pages        = {38--47},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00287-019-01145-6},
  doi          = {10.1007/S00287-019-01145-6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/insk/SchillerFBM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MaeneGMCFV19,
  author       = {Pieter Maene and
                  Johannes G{\"{o}}tzfried and
                  Tilo M{\"{u}}ller and
                  Ruan de Clercq and
                  Felix C. Freiling and
                  Ingrid Verbauwhede},
  title        = {Atlas: Application Confidentiality in Compromised Embedded Systems},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {16},
  number       = {3},
  pages        = {415--423},
  year         = {2019},
  url          = {https://doi.org/10.1109/TDSC.2018.2858257},
  doi          = {10.1109/TDSC.2018.2858257},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/MaeneGMCFV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cecc/SchorradtBF19,
  author       = {Stefan Schorradt and
                  Edita Bajramovic and
                  Felix C. Freiling},
  title        = {On the Feasibility of Secure Logging for Industrial Control Systems
                  Using Blockchain},
  booktitle    = {Proceedings of the Third Central European Cybersecurity Conference,
                  {CECC} 2019, Munich, Germany, November 14-15, 2019},
  pages        = {4:1--4:6},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3360664.3360668},
  doi          = {10.1145/3360664.3360668},
  timestamp    = {Mon, 28 Oct 2019 08:10:46 +0100},
  biburl       = {https://dblp.org/rec/conf/cecc/SchorradtBF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cecc/AbdullahHF19,
  author       = {Lamya Abdullah and
                  Sebastian Hahn and
                  Felix C. Freiling},
  title        = {Achieving Consistency of Software Updates against Strong Attackers},
  booktitle    = {Proceedings of the Third Central European Cybersecurity Conference,
                  {CECC} 2019, Munich, Germany, November 14-15, 2019},
  pages        = {6:1--6:6},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3360664.3360670},
  doi          = {10.1145/3360664.3360670},
  timestamp    = {Mon, 28 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cecc/AbdullahHF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LatzoF19,
  author       = {Tobias Latzo and
                  Felix C. Freiling},
  title        = {Characterizing the Limitations of Forensic Event Reconstruction Based
                  on Log Files},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {466--475},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00069},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00069},
  timestamp    = {Thu, 14 Nov 2019 10:35:10 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LatzoF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/gidiss/2018,
  editor       = {Sven Apel and
                  Abraham Bernstein and
                  Felix C. Freiling and
                  Steffen H{\"{o}}lldobler and
                  Hans{-}Peter Lenhof and
                  Paul Molitor and
                  Gustaf Neumann and
                  R{\"{u}}diger Reischuk and
                  Bj{\"{o}}rn Scheuermann and
                  Nicole Schweikardt and
                  Myra Spiliopoulou and
                  Sabine S{\"{u}}sstrunk and
                  Klaus Wehrle},
  title        = {Ausgezeichnete Informatikdissertationen 2018},
  series       = {{LNI}},
  volume       = {{D-19}},
  publisher    = {{GI}},
  year         = {2019},
  url          = {https://dl.gi.de/handle/20.500.12116/36723},
  isbn         = {978-3-88579-977-1},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/gidiss/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-07841,
  author       = {Lamya Abdullah and
                  Felix C. Freiling and
                  Juan Quintero and
                  Zinaida Benenson},
  title        = {Sealed Computation: Abstract Requirements for Mechanisms to Support
                  Trustworthy Cloud Computing},
  journal      = {CoRR},
  volume       = {abs/1906.07841},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.07841},
  eprinttype    = {arXiv},
  eprint       = {1906.07841},
  timestamp    = {Mon, 24 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-07841.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-11094,
  author       = {Philipp Morgner and
                  Christoph Mai and
                  Nicole Koschate{-}Fischer and
                  Felix C. Freiling and
                  Zinaida Benenson},
  title        = {Security Update Labels: Establishing Economic Incentives for Security
                  Patching of IoT Consumer Products},
  journal      = {CoRR},
  volume       = {abs/1906.11094},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.11094},
  eprinttype    = {arXiv},
  eprint       = {1906.11094},
  timestamp    = {Thu, 27 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-11094.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/NemetzSF18,
  author       = {Sebastian Nemetz and
                  Sven Schmitt and
                  Felix C. Freiling},
  title        = {A standardized corpus for SQLite database forensics},
  journal      = {Digit. Investig.},
  volume       = {24 Supplement},
  pages        = {S121--S130},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.01.015},
  doi          = {10.1016/J.DIIN.2018.01.015},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/NemetzSF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PalutkeF18,
  author       = {Ralph Palutke and
                  Felix C. Freiling},
  title        = {Styx: Countering robust memory acquisition},
  journal      = {Digit. Investig.},
  volume       = {24 Supplement},
  pages        = {S18--S28},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.01.004},
  doi          = {10.1016/J.DIIN.2018.01.004},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/PalutkeF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/FreilingH18,
  author       = {Felix C. Freiling and
                  Leonhard H{\"{o}}sch},
  title        = {Controlled experiments in digital evidence tampering},
  journal      = {Digit. Investig.},
  volume       = {24 Supplement},
  pages        = {S83--S92},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.01.011},
  doi          = {10.1016/J.DIIN.2018.01.011},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/FreilingH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dt/FreilingGLMP18,
  author       = {Felix C. Freiling and
                  Tobias Gro{\ss} and
                  Tobias Latzo and
                  Tilo M{\"{u}}ller and
                  Ralph Palutke},
  title        = {Advances in Forensic Data Acquisition},
  journal      = {{IEEE} Des. Test},
  volume       = {35},
  number       = {5},
  pages        = {63--74},
  year         = {2018},
  url          = {https://doi.org/10.1109/MDAT.2018.2862366},
  doi          = {10.1109/MDAT.2018.2862366},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dt/FreilingGLMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/MaeneGCMFV18,
  author       = {Pieter Maene and
                  Johannes G{\"{o}}tzfried and
                  Ruan de Clercq and
                  Tilo M{\"{u}}ller and
                  Felix C. Freiling and
                  Ingrid Verbauwhede},
  title        = {Hardware-Based Trusted Computing Architectures for Isolation and Attestation},
  journal      = {{IEEE} Trans. Computers},
  volume       = {67},
  number       = {3},
  pages        = {361--374},
  year         = {2018},
  url          = {https://doi.org/10.1109/TC.2017.2647955},
  doi          = {10.1109/TC.2017.2647955},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/MaeneGCMFV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AbdullahFQB18,
  author       = {Lamya Abdullah and
                  Felix C. Freiling and
                  Juan Quintero and
                  Zinaida Benenson},
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Costas Lambrinoudakis and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis and
                  John Mylopoulos and
                  Christos Kalloniatis},
  title        = {Sealed Computation: Abstract Requirements for Mechanisms to Support
                  Trustworthy Cloud Computing},
  booktitle    = {Computer Security - {ESORICS} 2018 International Workshops, CyberICPS
                  2018 and {SECPRE} 2018, Barcelona, Spain, September 6-7, 2018, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11387},
  pages        = {137--152},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12786-2\_9},
  doi          = {10.1007/978-3-030-12786-2\_9},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AbdullahFQB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/HanschSPFB18,
  author       = {Norman H{\"{a}}nsch and
                  Andrea Schankin and
                  Mykolai Protsenko and
                  Felix C. Freiling and
                  Zinaida Benenson},
  editor       = {Mary Ellen Zurko and
                  Heather Richter Lipford},
  title        = {Programming Experience Might Not Help in Comprehending Obfuscated
                  Source Code Efficiently},
  booktitle    = {Fourteenth Symposium on Usable Privacy and Security, {SOUPS} 2018,
                  Baltimore, MD, USA, August 12-14, 2018},
  pages        = {341--356},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/soups2018/presentation/hansch},
  timestamp    = {Mon, 01 Feb 2021 08:41:57 +0100},
  biburl       = {https://dblp.org/rec/conf/soups/HanschSPFB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MorgnerFB18,
  author       = {Philipp Morgner and
                  Felix C. Freiling and
                  Zinaida Benenson},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {Opinion: Security Lifetime Labels - Overcoming Information Asymmetry
                  in Security of IoT Consumer Products},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {208--211},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212486},
  doi          = {10.1145/3212480.3212486},
  timestamp    = {Mon, 16 Sep 2019 13:25:53 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/MorgnerFB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:conf/gi/2017diss,
  editor       = {Sven Apel and
                  Abraham Bernstein and
                  Wolfgang Effelsberg and
                  Felix C. Freiling and
                  Steffen H{\"{o}}lldobler and
                  Hans{-}Peter Lenhof and
                  Paul Molitor and
                  Gustaf Neumann and
                  R{\"{u}}diger Reischuk and
                  Nicole Schweikardt and
                  Bj{\"{o}}rn Scheuermann and
                  Myra Spiliopoulou and
                  Sabine S{\"{u}}sstrunk},
  title        = {Ausgezeichnete Informatikdissertationen 2017},
  series       = {{LNI}},
  volume       = {{D-18}},
  publisher    = {{GI}},
  year         = {2018},
  url          = {https://dl.gi.de/handle/20.500.12116/19456},
  isbn         = {978-3-88579-977-1},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gi/2017diss.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/FreilingGR17,
  author       = {Felix C. Freiling and
                  Thomas Glanzmann and
                  Hans P. Reiser},
  title        = {Characterizing loss of digital evidence due to abstraction layers},
  journal      = {Digit. Investig.},
  volume       = {20 Supplement},
  pages        = {S107--S115},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.01.012},
  doi          = {10.1016/J.DIIN.2017.01.012},
  timestamp    = {Wed, 27 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/FreilingGR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/FreilingZ17,
  author       = {Felix C. Freiling and
                  Christian Zoubek},
  title        = {Do digital investigators have to program? {A} controlled experiment
                  in digital investigation},
  journal      = {Digit. Investig.},
  volume       = {20 Supplement},
  pages        = {S37--S46},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.01.004},
  doi          = {10.1016/J.DIIN.2017.01.004},
  timestamp    = {Thu, 30 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/FreilingZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/NoormanBMPMPVGM17,
  author       = {Job Noorman and
                  Jo Van Bulck and
                  Jan Tobias M{\"{u}}hlberg and
                  Frank Piessens and
                  Pieter Maene and
                  Bart Preneel and
                  Ingrid Verbauwhede and
                  Johannes G{\"{o}}tzfried and
                  Tilo M{\"{u}}ller and
                  Felix C. Freiling},
  title        = {Sancus 2.0: {A} Low-Cost Security Architecture for IoT Devices},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {7:1--7:33},
  year         = {2017},
  url          = {https://doi.org/10.1145/3079763},
  doi          = {10.1145/3079763},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/NoormanBMPMPVGM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:conf/gi/2016diss,
  editor       = {Abraham Bernstein and
                  Wolfgang Effelsberg and
                  Felix C. Freiling and
                  Steffen H{\"{o}}lldobler and
                  Hans{-}Peter Lenhof and
                  Paul Molitor and
                  Gustaf Neumann and
                  R{\"{u}}diger Reischuk and
                  Nicole Schweikardt and
                  Myra Spiliopoulou and
                  Sabine S{\"{u}}sstrunk},
  title        = {Ausgezeichnete Informatikdissertationen 2016},
  series       = {{LNI}},
  volume       = {{D-17}},
  publisher    = {{GI}},
  year         = {2017},
  url          = {https://dl.gi.de/handle/20.500.12116/19926},
  isbn         = {978-3-88579-976-4},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gi/2016diss.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GruhnF16,
  author       = {Michael Gruhn and
                  Felix C. Freiling},
  title        = {Evaluating atomicity, and integrity of correct memory acquisition
                  methods},
  journal      = {Digit. Investig.},
  volume       = {16 Supplement},
  pages        = {S1--S10},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.01.003},
  doi          = {10.1016/J.DIIN.2016.01.003},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/GruhnF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/0004GF16,
  author       = {Johannes Bauer and
                  Michael Gruhn and
                  Felix C. Freiling},
  title        = {Lest we forget: Cold-boot attacks on scrambled {DDR3} memory},
  journal      = {Digit. Investig.},
  volume       = {16 Supplement},
  pages        = {S65--S74},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.01.009},
  doi          = {10.1016/J.DIIN.2016.01.009},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/0004GF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/StritterFKRUGED16,
  author       = {Benjamin Stritter and
                  Felix C. Freiling and
                  Hartmut K{\"{o}}nig and
                  Ren{\'{e}} Rietz and
                  Steffen Ullrich and
                  Alexander von Gernler and
                  Felix Erlacher and
                  Falko Dressler},
  title        = {Cleaning up Web 2.0's Security Mess-at Least Partly},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {14},
  number       = {2},
  pages        = {48--57},
  year         = {2016},
  url          = {https://doi.org/10.1109/MSP.2016.31},
  doi          = {10.1109/MSP.2016.31},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/StritterFKRUGED16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/insk/Freiling16,
  author       = {Felix C. Freiling},
  title        = {Staatliche Sp{\"{a}}hsoftware zur Strafverfolgung - Zur Verh{\"{a}}ltnism{\"{a}}{\ss}igkeit
                  einer umstrittenen Ma{\ss}nahme},
  journal      = {Inform. Spektrum},
  volume       = {39},
  number       = {3},
  pages        = {203--209},
  year         = {2016},
  url          = {https://doi.org/10.1007/s00287-015-0912-y},
  doi          = {10.1007/S00287-015-0912-Y},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/insk/Freiling16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/it/DrescherEFGLMMV16,
  author       = {Gabor Drescher and
                  Christoph Erhardt and
                  Felix C. Freiling and
                  Johannes G{\"{o}}tzfried and
                  Daniel Lohmann and
                  Pieter Maene and
                  Tilo M{\"{u}}ller and
                  Ingrid Verbauwhede and
                  Andreas Weichslgartner and
                  Stefan Wildermann},
  title        = {Providing security on demand using invasive computing},
  journal      = {it Inf. Technol.},
  volume       = {58},
  number       = {6},
  pages        = {281--295},
  year         = {2016},
  url          = {https://doi.org/10.1515/itit-2016-0032},
  doi          = {10.1515/ITIT-2016-0032},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/it/DrescherEFGLMMV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/KurtzGBRF16,
  author       = {Andreas Kurtz and
                  Hugo Gascon and
                  Tobias Becker and
                  Konrad Rieck and
                  Felix C. Freiling},
  title        = {Fingerprinting Mobile Devices Using Personalized Configurations},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2016},
  number       = {1},
  pages        = {4--19},
  year         = {2016},
  url          = {https://doi.org/10.1515/popets-2015-0027},
  doi          = {10.1515/POPETS-2015-0027},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/KurtzGBRF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BauerF16,
  author       = {Johannes Bauer and
                  Felix C. Freiling},
  title        = {Towards Cycle-Accurate Emulation of Cortex-M Code to Detect Timing
                  Side Channels},
  booktitle    = {11th International Conference on Availability, Reliability and Security,
                  {ARES} 2016, Salzburg, Austria, August 31 - September 2, 2016},
  pages        = {49--58},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ARES.2016.94},
  doi          = {10.1109/ARES.2016.94},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BauerF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/BauerSFD16,
  author       = {Johannes Bauer and
                  Sebastian Schinzel and
                  Felix C. Freiling and
                  Andreas Dewald},
  editor       = {William H. Robinson and
                  Swarup Bhunia and
                  Ryan Kastner},
  title        = {Information leakage behind the curtain: Abusing anti-EMI features
                  for covert communication},
  booktitle    = {2016 {IEEE} International Symposium on Hardware Oriented Security
                  and Trust, {HOST} 2016, McLean, VA, USA, May 3-5, 2016},
  pages        = {130--134},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/HST.2016.7495570},
  doi          = {10.1109/HST.2016.7495570},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/BauerSFD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scopes/WeichslgartnerW16,
  author       = {Andreas Weichslgartner and
                  Stefan Wildermann and
                  Johannes G{\"{o}}tzfried and
                  Felix C. Freiling and
                  Michael Gla{\ss} and
                  J{\"{u}}rgen Teich},
  editor       = {Sander Stuijk},
  title        = {Design-Time/Run-Time Mapping of Security-Critical Applications in
                  Heterogeneous MPSoCs},
  booktitle    = {Proceedings of the 19th International Workshop on Software and Compilers
                  for Embedded Systems, {SCOPES} 2016, Sankt Goar, Germany, May 23-25,
                  2016},
  pages        = {153--162},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2906363.2906370},
  doi          = {10.1145/2906363.2906370},
  timestamp    = {Tue, 06 Nov 2018 16:58:57 +0100},
  biburl       = {https://dblp.org/rec/conf/scopes/WeichslgartnerW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:conf/gi/2015diss,
  editor       = {Abraham Bernstein and
                  Wolfgang Effelsberg and
                  Felix C. Freiling and
                  Steffen H{\"{o}}lldobler and
                  Hans{-}Peter Lenhof and
                  Paul Molitor and
                  Gustaf Neumann and
                  R{\"{u}}diger Reischuk and
                  Nicole Schweikardt and
                  Myra Spiliopoulou and
                  Harald St{\"{o}}rrle and
                  Sabine S{\"{u}}sstrunk},
  title        = {Ausgezeichnete Informatikdissertationen 2015},
  series       = {{LNI}},
  volume       = {{D-16}},
  publisher    = {{GI}},
  year         = {2016},
  url          = {https://dl.gi.de/handle/20.500.12116/4410},
  isbn         = {978-3-88579-975-7},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gi/2015diss.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AnikeevFGM15,
  author       = {Maxim Anikeev and
                  Felix C. Freiling and
                  Johannes G{\"{o}}tzfried and
                  Tilo M{\"{u}}ller},
  title        = {Secure garbage collection: Preventing malicious data harvesting from
                  deallocated Java objects inside the Dalvik {VM}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {22},
  pages        = {81--86},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jisa.2014.10.001},
  doi          = {10.1016/J.JISA.2014.10.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AnikeevFGM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/it/Freiling15,
  author       = {Felix C. Freiling},
  title        = {From {IT} forensics to forensic computing},
  journal      = {it Inf. Technol.},
  volume       = {57},
  number       = {6},
  pages        = {337--338},
  year         = {2015},
  url          = {http://www.degruyter.com/view/j/itit.2015.57.issue-6/itit-2015-0039/itit-2015-0039.xml},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/it/Freiling15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/it/FreilingSG15,
  author       = {Felix C. Freiling and
                  Jan C. Schuhr and
                  Michael Gruhn},
  title        = {What is essential data in digital forensic analysis?},
  journal      = {it Inf. Technol.},
  volume       = {57},
  number       = {6},
  pages        = {376--383},
  year         = {2015},
  url          = {http://www.degruyter.com/view/j/itit.2015.57.issue-6/itit-2015-0016/itit-2015-0016.xml},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/it/FreilingSG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MullerF15,
  author       = {Tilo M{\"{u}}ller and
                  Felix C. Freiling},
  title        = {A Systematic Assessment of the Security of Full Disk Encryption},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {12},
  number       = {5},
  pages        = {491--503},
  year         = {2015},
  url          = {https://doi.org/10.1109/TDSC.2014.2369041},
  doi          = {10.1109/TDSC.2014.2369041},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/MullerF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GotzfriedMCMFV15,
  author       = {Johannes G{\"{o}}tzfried and
                  Tilo M{\"{u}}ller and
                  Ruan de Clercq and
                  Pieter Maene and
                  Felix C. Freiling and
                  Ingrid Verbauwhede},
  title        = {Soteria: Offline Software Protection within Low-cost Embedded Devices},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {241--250},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2856129},
  doi          = {10.1145/2818000.2856129},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GotzfriedMCMFV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imf/FreilingG15,
  author       = {Felix C. Freiling and
                  Michael Gruhn},
  editor       = {Jana Dittmann and
                  Holger Morgenstern},
  title        = {What is Essential Data in Digital Forensic Analysis?},
  booktitle    = {Ninth International Conference on {IT} Security Incident Management
                  {\&} {IT} Forensics, {IMF} 2015, Magdeburg, Germany, May 18-20,
                  2015},
  pages        = {40--48},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/IMF.2015.20},
  doi          = {10.1109/IMF.2015.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imf/FreilingG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:conf/gi/2014diss,
  editor       = {Abraham Bernstein and
                  Wolfgang Effelsberg and
                  Felix C. Freiling and
                  Steffen H{\"{o}}lldobler and
                  Hans{-}Peter Lenhof and
                  Paul Molitor and
                  Gustaf Neumann and
                  R{\"{u}}diger Reischuk and
                  Nicole Schweikardt and
                  Myra Spiliopoulou and
                  Harald St{\"{o}}rrle and
                  Sabine S{\"{u}}sstrunk},
  title        = {Ausgezeichnete Informatikdissertationen 2014},
  series       = {{LNI}},
  volume       = {{D-15}},
  publisher    = {{GI}},
  year         = {2015},
  url          = {https://dl.gi.de/handle/20.500.12116/4412},
  isbn         = {978-3-88579-419-6},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gi/2014diss.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FreilingS14,
  author       = {Felix C. Freiling and
                  Konstantin Sack},
  title        = {Selektive Datensicherungen in der IT-Forensik},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {38},
  number       = {2},
  pages        = {112--117},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11623-014-0043-7},
  doi          = {10.1007/S11623-014-0043-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FreilingS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/insk/FreilingGGKMMRS14,
  author       = {Felix C. Freiling and
                  R{\"{u}}diger Grimm and
                  Karl{-}Erwin Gro{\ss}pietsch and
                  Hubert B. Keller and
                  J{\"{u}}rgen Mottok and
                  Isabel M{\"{u}}nch and
                  Kai Rannenberg and
                  Francesca Saglietti},
  title        = {Technische Sicherheit und Informationssicherheit - Unterschiede und
                  Gemeinsamkeiten},
  journal      = {Inform. Spektrum},
  volume       = {37},
  number       = {1},
  pages        = {14--24},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00287-013-0748-2},
  doi          = {10.1007/S00287-013-0748-2},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/insk/FreilingGGKMMRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/ZhuangPMF14,
  author       = {Yan Zhuang and
                  Mykola Protsenko and
                  Tilo M{\"{u}}ller and
                  Felix C. Freiling},
  title        = {An(other) Exercise in Measuring the Strength of Source Code Obfuscation},
  booktitle    = {25th International Workshop on Database and Expert Systems Applications,
                  {DEXA} 2014, Munich, Germany, September 1-5, 2014},
  pages        = {313--317},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/DEXA.2014.69},
  doi          = {10.1109/DEXA.2014.69},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dexaw/ZhuangPMF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/FreilingPZ14,
  author       = {Felix C. Freiling and
                  Mykola Protsenko and
                  Yan Zhuang},
  editor       = {Jing Tian and
                  Jiwu Jing and
                  Mudhakar Srivatsa},
  title        = {An Empirical Evaluation of Software Obfuscation Techniques Applied
                  to Android APKs},
  booktitle    = {International Conference on Security and Privacy in Communication
                  Networks - 10th International {ICST} Conference, SecureComm 2014,
                  Beijing, China, September 24-26, 2014, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {153},
  pages        = {315--328},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-23802-9\_24},
  doi          = {10.1007/978-3-319-23802-9\_24},
  timestamp    = {Tue, 23 May 2017 01:12:12 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/FreilingPZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/KurtzTF14,
  author       = {Andreas Kurtz and
                  Markus Tro{\ss}bach and
                  Felix C. Freiling},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Snoop-it: Dynamische Analyse und Manipulation von Apple iOS Apps},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {13--23},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20046},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/KurtzTF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/HintzEBF14,
  author       = {Nadina Hintz and
                  Markus Engelberth and
                  Zinaida Benenson and
                  Felix C. Freiling},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Phishing still works: Erfahrungen und Lehren aus der Durchf{\"{u}}hrung
                  von Phishing-Experimenten},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {37--51},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20067},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/HintzEBF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/BrodowskiDFKR14,
  author       = {Dominik Brodowski and
                  Andreas Dewald and
                  Felix C. Freiling and
                  Steve Kov{\'{a}}cs and
                  Martin Rieger},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Drei Jahre Master Online Digitale Forensik: Ergebnisse und Erfahrungen},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {391--405},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20059},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/BrodowskiDFKR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/imf/2014,
  editor       = {Felix C. Freiling and
                  Holger Morgenstern and
                  Sandra Frings and
                  Oliver G{\"{o}}bel and
                  Detlef G{\"{u}}nther and
                  Jens Nedon and
                  Dirk Schadt},
  title        = {Eighth International Conference on {IT} Security Incident Management
                  {\&} {IT} Forensics, {IMF} 2014, M{\"{u}}nster, Germany,
                  May 12-14, 2014},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6823828/proceeding},
  isbn         = {978-1-4799-4330-2},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imf/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pik/Freiling13,
  author       = {Felix C. Freiling},
  title        = {Im Fokus: Technische und menschliche Aspekte von Cyberkriminalit{\"{a}}t},
  journal      = {Prax. Inf.verarb. Kommun.},
  volume       = {36},
  number       = {3},
  pages        = {199--200},
  year         = {2013},
  url          = {https://doi.org/10.1515/pik-2013-0008},
  doi          = {10.1515/PIK-2013-0008},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pik/Freiling13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/MullerSMF13,
  author       = {Tilo M{\"{u}}ller and
                  Hans Spath and
                  Richard M{\"{a}}ckl and
                  Felix C. Freiling},
  editor       = {Ahmad{-}Reza Sadeghi},
  title        = {Stark - Tamperproof Authentication to Resist Keylogging},
  booktitle    = {Financial Cryptography and Data Security - 17th International Conference,
                  {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7859},
  pages        = {295--312},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39884-1\_25},
  doi          = {10.1007/978-3-642-39884-1\_25},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/MullerSMF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imf/StuttgenDF13,
  author       = {Johannes St{\"{u}}ttgen and
                  Andreas Dewald and
                  Felix C. Freiling},
  editor       = {Holger Morgenstern and
                  Ralf Ehlert and
                  Felix C. Freiling and
                  Sandra Frings and
                  Oliver G{\"{o}}bel and
                  Detlef G{\"{u}}nther and
                  Stefan Kiltz and
                  Jens Nedon and
                  Dirk Schadt},
  title        = {Selective Imaging Revisited},
  booktitle    = {Seventh International Conference on {IT} Security Incident Management
                  and {IT} Forensics, {IMF} 2013, Nuremberg, Germany, March 12-14, 2013},
  pages        = {45--58},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/IMF.2013.16},
  doi          = {10.1109/IMF.2013.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imf/StuttgenDF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imf/WundramFM13,
  author       = {Martin Wundram and
                  Felix C. Freiling and
                  Christian Moch},
  editor       = {Holger Morgenstern and
                  Ralf Ehlert and
                  Felix C. Freiling and
                  Sandra Frings and
                  Oliver G{\"{o}}bel and
                  Detlef G{\"{u}}nther and
                  Stefan Kiltz and
                  Jens Nedon and
                  Dirk Schadt},
  title        = {Anti-forensics: The Next Step in Digital Forensics Tool Testing},
  booktitle    = {Seventh International Conference on {IT} Security Incident Management
                  and {IT} Forensics, {IMF} 2013, Nuremberg, Germany, March 12-14, 2013},
  pages        = {83--97},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/IMF.2013.17},
  doi          = {10.1109/IMF.2013.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imf/WundramFM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imf/KalberDF13,
  author       = {Sven K{\"{a}}lber and
                  Andreas Dewald and
                  Felix C. Freiling},
  editor       = {Holger Morgenstern and
                  Ralf Ehlert and
                  Felix C. Freiling and
                  Sandra Frings and
                  Oliver G{\"{o}}bel and
                  Detlef G{\"{u}}nther and
                  Stefan Kiltz and
                  Jens Nedon and
                  Dirk Schadt},
  title        = {Forensic Application-Fingerprinting Based on File System Metadata},
  booktitle    = {Seventh International Conference on {IT} Security Incident Management
                  and {IT} Forensics, {IMF} 2013, Nuremberg, Germany, March 12-14, 2013},
  pages        = {98--112},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/IMF.2013.20},
  doi          = {10.1109/IMF.2013.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imf/KalberDF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/ZwangerF13,
  author       = {Viviane Zwanger and
                  Felix C. Freiling},
  editor       = {Jeffrey Todd McDonald and
                  Mila Dalla Preda},
  title        = {Kernel mode {API} spectroscopy for incident response and digital forensics},
  booktitle    = {Proceedings of the 2nd {ACM} {SIGPLAN} Program Protection and Reverse
                  Engineering Workshop 2013, PPREW@POPL 2013, January 26, 2013, Rome,
                  Italy},
  pages        = {3:1--3:11},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2430553.2430556},
  doi          = {10.1145/2430553.2430556},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/ZwangerF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/SpreitzenbarthFESH13,
  author       = {Michael Spreitzenbarth and
                  Felix C. Freiling and
                  Florian Echtler and
                  Thomas Schreck and
                  Johannes Hoffmann},
  editor       = {Sung Y. Shin and
                  Jos{\'{e}} Carlos Maldonado},
  title        = {Mobile-sandbox: having a deeper look into android applications},
  booktitle    = {Proceedings of the 28th Annual {ACM} Symposium on Applied Computing,
                  {SAC} '13, Coimbra, Portugal, March 18-22, 2013},
  pages        = {1808--1815},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2480362.2480701},
  doi          = {10.1145/2480362.2480701},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/SpreitzenbarthFESH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/AnikeevF13,
  author       = {Maxim Anikeev and
                  Felix C. Freiling},
  editor       = {Atilla El{\c{c}}i and
                  Manoj Singh Gaur and
                  Mehmet A. Orgun and
                  Oleg B. Makarevich},
  title        = {Preventing malicious data harvesting from deallocated memory areas},
  booktitle    = {The 6th International Conference on Security of Information and Networks,
                  {SIN} '13, Aksaray, Turkey, November 26-28, 2013},
  pages        = {448--449},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523514.2527022},
  doi          = {10.1145/2523514.2527022},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/AnikeevF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/others/13/DewaldFSSV13,
  author       = {Andreas Dewald and
                  Felix C. Freiling and
                  Sven Schmitt and
                  Michael Spreitzenbarth and
                  Stefan V{\"{o}}mel},
  editor       = {Sandro Gaycken},
  title        = {Systematische Probleme und Grenzen der forensischen Informatik},
  booktitle    = {Jenseits von 1984 - Datenschutz und {\"{U}}berwachung in der
                  fortgeschrittenen Informationsgesellschaft: eine Versachlichung},
  pages        = {101--118},
  publisher    = {transcript Verlag},
  year         = {2013},
  timestamp    = {Thu, 04 Jun 2020 17:28:47 +0200},
  biburl       = {https://dblp.org/rec/books/others/13/DewaldFSSV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/imf/2013,
  editor       = {Holger Morgenstern and
                  Ralf Ehlert and
                  Felix C. Freiling and
                  Sandra Frings and
                  Oliver G{\"{o}}bel and
                  Detlef G{\"{u}}nther and
                  Stefan Kiltz and
                  Jens Nedon and
                  Dirk Schadt},
  title        = {Seventh International Conference on {IT} Security Incident Management
                  and {IT} Forensics, {IMF} 2013, Nuremberg, Germany, March 12-14, 2013},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6568360/proceeding},
  isbn         = {978-1-4673-6307-5},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imf/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/FreilingHP13,
  author       = {Felix C. Freiling and
                  Gerrit Hornung and
                  Radim Polc{\'{a}}k},
  title        = {Forensic Computing (Dagstuhl Seminar 13482)},
  journal      = {Dagstuhl Reports},
  volume       = {3},
  number       = {11},
  pages        = {193--208},
  year         = {2013},
  url          = {https://doi.org/10.4230/DagRep.3.11.193},
  doi          = {10.4230/DAGREP.3.11.193},
  timestamp    = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/FreilingHP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/VomelF12,
  author       = {Stefan V{\"{o}}mel and
                  Felix C. Freiling},
  title        = {Correctness, atomicity, and integrity: Defining criteria for forensically-sound
                  memory acquisition},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {2},
  pages        = {125--137},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.04.005},
  doi          = {10.1016/J.DIIN.2012.04.005},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/VomelF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BackerDFS12,
  author       = {Matthias B{\"{a}}cker and
                  Andreas Dewald and
                  Felix C. Freiling and
                  Sven Schmitt},
  title        = {Kriterien f{\"{u}}r die Priorisierung bei der Sicherung und Analyse
                  digitaler Spuren},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {8},
  pages        = {597--602},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0187-2},
  doi          = {10.1007/S11623-012-0187-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BackerDFS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/it/WillemsF12,
  author       = {Carsten Willems and
                  Felix C. Freiling},
  title        = {Reverse Code Engineering - State of the Art and Countermeasures},
  journal      = {it Inf. Technol.},
  volume       = {54},
  number       = {2},
  pages        = {53--63},
  year         = {2012},
  url          = {https://doi.org/10.1524/itit.2012.0664},
  doi          = {10.1524/ITIT.2012.0664},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/it/WillemsF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CortinasFGLLPA12,
  author       = {Roberto Corti{\~{n}}as and
                  Felix C. Freiling and
                  Marjan Ghajar{-}Azadanlou and
                  Alberto Lafuente and
                  Mikel Larrea and
                  Lucia Draque Penso and
                  Iratxe Soraluze Arriola},
  title        = {Secure Failure Detection and Consensus in TrustedPals},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {4},
  pages        = {610--625},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.23},
  doi          = {10.1109/TDSC.2012.23},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/CortinasFGLLPA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/MullerTF12,
  author       = {Tilo M{\"{u}}ller and
                  Benjamin Taubmann and
                  Felix C. Freiling},
  editor       = {Feng Bao and
                  Pierangela Samarati and
                  Jianying Zhou},
  title        = {TreVisor - OS-Independent Software-Based Full Disk Encryption Secure
                  against Main Memory Attacks},
  booktitle    = {Applied Cryptography and Network Security - 10th International Conference,
                  {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7341},
  pages        = {66--83},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31284-7\_5},
  doi          = {10.1007/978-3-642-31284-7\_5},
  timestamp    = {Fri, 09 Apr 2021 18:46:11 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/MullerTF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WillemsFH12,
  author       = {Carsten Willems and
                  Felix C. Freiling and
                  Thorsten Holz},
  editor       = {Robert H'obbes' Zakon},
  title        = {Using memory management to detect and extract illegitimate code for
                  malware analysis},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {179--188},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420979},
  doi          = {10.1145/2420950.2420979},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/WillemsFH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edoc/AtkinsonBGFSHMM12,
  author       = {Colin Atkinson and
                  Florian Barth and
                  Ralph Gerbig and
                  Felix C. Freiling and
                  Sebastian Schinzel and
                  Frank Hadasch and
                  Alexander Maedche and
                  Benjamin M{\"{u}}ller},
  title        = {Reducing the Incidence of Unintended, Human-Caused Information Flows
                  in Enterprise Systems},
  booktitle    = {16th {IEEE} International Enterprise Distributed Object Computing
                  Conference Workshops, {EDOC} Workshops, Beijing, China, September
                  10-14, 2012},
  pages        = {11--18},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/EDOCW.2012.12},
  doi          = {10.1109/EDOCW.2012.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edoc/AtkinsonBGFSHMM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/SpreitzenbarthSF12,
  author       = {Michael Spreitzenbarth and
                  Sven Schmitt and
                  Felix C. Freiling},
  editor       = {Gilbert L. Peterson and
                  Sujeet Shenoi},
  title        = {Comparing Sources of Location Data from Android Smartphones},
  booktitle    = {Advances in Digital Forensics {VIII} - 8th {IFIP} {WG} 11.9 International
                  Conference on Digital Forensics, Pretoria, South Africa, January 3-5,
                  2012, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {383},
  pages        = {143--157},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33962-2\_10},
  doi          = {10.1007/978-3-642-33962-2\_10},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/SpreitzenbarthSF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/DewaldFSSSVW12,
  author       = {Andreas Dewald and
                  Felix C. Freiling and
                  Thomas Schreck and
                  Michael Spreitzenbarth and
                  Johannes St{\"{u}}ttgen and
                  Stefan V{\"{o}}mel and
                  Carsten Willems},
  editor       = {Neeraj Suri and
                  Michael Waidner},
  title        = {Analyse und Vergleich von BckR2D2-I und {II}},
  booktitle    = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz
                  2012 in Darmstadt},
  series       = {{LNI}},
  volume       = {{P-195}},
  pages        = {47--58},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18287},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/DewaldFSSSVW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/ZimmermannSSF12,
  author       = {Christian Zimmermann and
                  Michael Spreitzenbarth and
                  Sven Schmitt and
                  Felix C. Freiling},
  editor       = {Neeraj Suri and
                  Michael Waidner},
  title        = {Forensic Analysis of {YAFFS2}},
  booktitle    = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz
                  2012 in Darmstadt},
  series       = {{LNI}},
  volume       = {{P-195}},
  pages        = {59--69},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18263},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/ZimmermannSSF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/EngelberthGSF12,
  author       = {Markus Engelberth and
                  Jan G{\"{o}}bel and
                  Christian Sch{\"{o}}nbein and
                  Felix C. Freiling},
  editor       = {Neeraj Suri and
                  Michael Waidner},
  title        = {PyBox - {A} Python Sandbox},
  booktitle    = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz
                  2012 in Darmstadt},
  series       = {{LNI}},
  volume       = {{P-195}},
  pages        = {137--148},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18269},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/EngelberthGSF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/TriniusF12,
  author       = {Philipp Trinius and
                  Felix C. Freiling},
  editor       = {Neeraj Suri and
                  Michael Waidner},
  title        = {Filtern von Spam-Nachrichten mit kontextfreien Grammatiken},
  booktitle    = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz
                  2012 in Darmstadt},
  series       = {{LNI}},
  volume       = {{P-195}},
  pages        = {163--174},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18271},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/TriniusF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2012,
  editor       = {Dieter Gollmann and
                  Felix C. Freiling},
  title        = {Information Security - 15th International Conference, {ISC} 2012,
                  Passau, Germany, September 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7483},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33383-5},
  doi          = {10.1007/978-3-642-33383-5},
  isbn         = {978-3-642-33382-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0029558,
  author       = {Andreas Dewald and
                  Felix C. Freiling},
  title        = {Forensische Informatik},
  publisher    = {Books on Demand GmbH},
  year         = {2011},
  url          = {http://www.bod.de/index.php?id=296\&\#38;objk\_id=572434},
  isbn         = {978-3-8423-7947-3},
  timestamp    = {Mon, 07 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/daglib/0029558.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/FreilingGK11,
  author       = {Felix C. Freiling and
                  Rachid Guerraoui and
                  Petr Kuznetsov},
  title        = {The failure detector abstraction},
  journal      = {{ACM} Comput. Surv.},
  volume       = {43},
  number       = {2},
  pages        = {9:1--9:40},
  year         = {2011},
  url          = {https://doi.org/10.1145/1883612.1883616},
  doi          = {10.1145/1883612.1883616},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/FreilingGK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/VomelF11,
  author       = {Stefan V{\"{o}}mel and
                  Felix C. Freiling},
  title        = {A survey of main memory acquisition and analysis techniques for the
                  windows operating system},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {1},
  pages        = {3--22},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.06.002},
  doi          = {10.1016/J.DIIN.2011.06.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/VomelF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/EngelberthFGGHHTW11,
  author       = {Markus Engelberth and
                  Felix C. Freiling and
                  Jan G{\"{o}}bel and
                  Christian Gorecki and
                  Thorsten Holz and
                  Ralf Hund and
                  Philipp Trinius and
                  Carsten Willems},
  title        = {Das Internet-Malware-Analyse-System (InMAS) - Ein System zur gro{\ss}fl{\"{a}}chigen
                  Sammlung und Analyse von Schadsoftware im Internet},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {4},
  pages        = {247--252},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0061-7},
  doi          = {10.1007/S11623-011-0061-7},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/EngelberthFGGHHTW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/ArriolaCLLF11,
  author       = {Iratxe Soraluze Arriola and
                  Roberto Corti{\~{n}}as and
                  Alberto Lafuente and
                  Mikel Larrea and
                  Felix C. Freiling},
  title        = {Communication-efficient failure detection and consensus in omission
                  environments},
  journal      = {Inf. Process. Lett.},
  volume       = {111},
  number       = {6},
  pages        = {262--268},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ipl.2010.12.008},
  doi          = {10.1016/J.IPL.2010.12.008},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/ArriolaCLLF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/badgers/RossowDBCSFP11,
  author       = {Christian Rossow and
                  Christian J. Dietrich and
                  Herbert Bos and
                  Lorenzo Cavallaro and
                  Maarten van Steen and
                  Felix C. Freiling and
                  Norbert Pohlmann},
  editor       = {Engin Kirda and
                  Thorsten Holz},
  title        = {Sandnet: network traffic analysis of malicious software},
  booktitle    = {Proceedings of the First Workshop on Building Analysis Datasets and
                  Gathering Experience Returns for Security, BADGERS@EuroSys 2011, Salzburg,
                  Austria, April 10, 2011},
  pages        = {78--88},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1978672.1978682},
  doi          = {10.1145/1978672.1978682},
  timestamp    = {Fri, 11 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/badgers/RossowDBCSFP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/BenensonDEFMMVS11,
  author       = {Zinaida Benenson and
                  Andreas Dewald and
                  Hans{-}Georg E{\ss}er and
                  Felix C. Freiling and
                  Tilo M{\"{u}}ller and
                  Christian Moch and
                  Stefan V{\"{o}}mel and
                  Sebastian Schinzel and
                  Michael Spreitzenbarth and
                  Ben Stock and
                  Johannes St{\"{u}}ttgen},
  title        = {Exploring the Landscape of Cybercrime},
  booktitle    = {First SysSec Workshop 2011, SysSec@DIMVA 2011, Amsterdam, The Netherlands,
                  July 6, 2011},
  pages        = {71--74},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.ieeecomputersociety.org/10.1109/SysSec.2011.23},
  doi          = {10.1109/SYSSEC.2011.23},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dimva/BenensonDEFMMVS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ec2nd/DietrichRFBSP11,
  author       = {Christian J. Dietrich and
                  Christian Rossow and
                  Felix C. Freiling and
                  Herbert Bos and
                  Maarten van Steen and
                  Norbert Pohlmann},
  title        = {On Botnets That Use {DNS} for Command and Control},
  booktitle    = {Seventh European Conference on Computer Network Defense, {EC2ND} 2011,
                  Gothenburg, Sweden, September 6-7, 2011},
  pages        = {9--16},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/EC2ND.2011.16},
  doi          = {10.1109/EC2ND.2011.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ec2nd/DietrichRFBSP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gi/KnausSGEF11,
  author       = {Alexander Knaus and
                  Johannes St{\"{u}}ttgen and
                  Jan G{\"{o}}bel and
                  Markus Engelberth and
                  Felix C. Freiling},
  editor       = {Hans{-}Ulrich Hei{\ss} and
                  Peter Pepper and
                  Holger Schlingloff and
                  J{\"{o}}rg Schneider},
  title        = {S{\"{a}}uberung eines infizierten Windows-Betriebssystems auf
                  Basis von Malware-Analyse-Berichten},
  booktitle    = {41. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Informatik
                  schafft Communities, {INFORMATIK} 2011, Berlin, Germany, October 4-7,
                  2011, Abstract Proceedings},
  series       = {{LNI}},
  volume       = {{P-192}},
  pages        = {114},
  publisher    = {{GI}},
  year         = {2011},
  url          = {https://dl.gi.de/handle/20.500.12116/18838},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gi/KnausSGEF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gi/JawurekF11,
  author       = {Marek Jawurek and
                  Felix C. Freiling},
  editor       = {Hans{-}Ulrich Hei{\ss} and
                  Peter Pepper and
                  Holger Schlingloff and
                  J{\"{o}}rg Schneider},
  title        = {Privacy threat analysis of smart metering},
  booktitle    = {41. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Informatik
                  schafft Communities, {INFORMATIK} 2011, Berlin, Germany, October 4-7,
                  2011, Abstract Proceedings},
  series       = {{LNI}},
  volume       = {{P-192}},
  pages        = {318},
  publisher    = {{GI}},
  year         = {2011},
  url          = {https://dl.gi.de/handle/20.500.12116/18665},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gi/JawurekF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/MochF11,
  author       = {Christian Moch and
                  Felix C. Freiling},
  editor       = {Pavel Gladyshev and
                  Marcus K. Rogers},
  title        = {Evaluating the Forensic Image Generator Generator},
  booktitle    = {Digital Forensics and Cyber Crime - Third International {ICST} Conference,
                  {ICDF2C} 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {88},
  pages        = {238--252},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-35515-8\_20},
  doi          = {10.1007/978-3-642-35515-8\_20},
  timestamp    = {Wed, 24 May 2017 08:28:31 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/MochF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imf/DewaldFW11,
  author       = {Andreas Dewald and
                  Felix C. Freiling and
                  Tim Weber},
  editor       = {Holger Morgenstern and
                  Ralf Ehlert and
                  Sandra Frings and
                  Oliver G{\"{o}}bel and
                  Detlef G{\"{u}}nther and
                  Stefan Kiltz and
                  Jens Nedon and
                  Dirk Schadt},
  title        = {Design and Implementation of a Documentation Tool for Interactive
                  Commandline Sessions},
  booktitle    = {Sixth International Conference on {IT} Security Incident Management
                  and {IT} Forensics, {IMF} 2011, Stuttgart, Germany, May 10-12, 2011},
  pages        = {62--80},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IMF.2011.17},
  doi          = {10.1109/IMF.2011.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imf/DewaldFW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/FreilingS11,
  author       = {Felix C. Freiling and
                  Sebastian Schinzel},
  editor       = {Jan Camenisch and
                  Simone Fischer{-}H{\"{u}}bner and
                  Yuko Murayama and
                  Armand Portmann and
                  Carlos Rieder},
  title        = {Detecting Hidden Storage Side Channel Vulnerabilities in Networked
                  Applications},
  booktitle    = {Future Challenges in Security and Privacy for Academia and Industry
                  - 26th {IFIP} {TC} 11 International Information Security Conference,
                  {SEC} 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {354},
  pages        = {41--55},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21424-0\_4},
  doi          = {10.1007/978-3-642-21424-0\_4},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/FreilingS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/AlsbihFS11,
  author       = {Amir Alsbih and
                  Felix C. Freiling and
                  Christian Schindelhauer},
  editor       = {Jan Camenisch and
                  Simone Fischer{-}H{\"{u}}bner and
                  Yuko Murayama and
                  Armand Portmann and
                  Carlos Rieder},
  title        = {A Case Study in Practical Security of Cable Networks},
  booktitle    = {Future Challenges in Security and Privacy for Academia and Industry
                  - 26th {IFIP} {TC} 11 International Information Security Conference,
                  {SEC} 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {354},
  pages        = {92--103},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21424-0\_8},
  doi          = {10.1007/978-3-642-21424-0\_8},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/AlsbihFS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BecherFHHUW11,
  author       = {Michael Becher and
                  Felix C. Freiling and
                  Johannes Hoffmann and
                  Thorsten Holz and
                  Sebastian Uellenbeck and
                  Christopher Wolf},
  title        = {Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security
                  of Mobile Devices},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {96--111},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.29},
  doi          = {10.1109/SP.2011.29},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BecherFHHUW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sss/GoreckiFKH11,
  author       = {Christian Gorecki and
                  Felix C. Freiling and
                  Marc K{\"{u}}hrer and
                  Thorsten Holz},
  editor       = {Xavier D{\'{e}}fago and
                  Franck Petit and
                  Vincent Villain},
  title        = {TrumanBox: Improving Dynamic Malware Analysis by Emulating the Internet},
  booktitle    = {Stabilization, Safety, and Security of Distributed Systems - 13th
                  International Symposium, {SSS} 2011, Grenoble, France, October 10-12,
                  2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6976},
  pages        = {208--222},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24550-3\_17},
  doi          = {10.1007/978-3-642-24550-3\_17},
  timestamp    = {Sun, 25 Oct 2020 22:45:03 +0100},
  biburl       = {https://dblp.org/rec/conf/sss/GoreckiFKH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MullerFD11,
  author       = {Tilo M{\"{u}}ller and
                  Felix C. Freiling and
                  Andreas Dewald},
  title        = {{TRESOR} Runs Encryption Securely Outside {RAM}},
  booktitle    = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12,
                  2011, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {http://static.usenix.org/events/sec11/tech/full\_papers/Muller.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MullerFD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/FreilingHPP11,
  author       = {Felix C. Freiling and
                  Dirk Heckmann and
                  Radim Polc{\'{a}}k and
                  Joachim Posegga},
  title        = {Forensic Computing (Dagstuhl Seminar 11401)},
  journal      = {Dagstuhl Reports},
  volume       = {1},
  number       = {10},
  pages        = {1--13},
  year         = {2011},
  url          = {https://doi.org/10.4230/DagRep.1.10.1},
  doi          = {10.4230/DAGREP.1.10.1},
  timestamp    = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/FreilingHPP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ahswn/BestehornBBJBF10,
  author       = {Markus Bestehorn and
                  Zinaida Benenson and
                  Erik Buchmann and
                  Marek Jawurek and
                  Klemens B{\"{o}}hm and
                  Felix C. Freiling},
  title        = {Query Dissemination in Sensor Networks - Predicting Reachability and
                  Energy Consumption},
  journal      = {Ad Hoc Sens. Wirel. Networks},
  volume       = {9},
  number       = {1-2},
  pages        = {85--107},
  year         = {2010},
  url          = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-9-number-1-2/ahswn-9-1-2-p-85-107/},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ahswn/BestehornBBJBF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BackerFS10,
  author       = {Matthias B{\"{a}}cker and
                  Felix C. Freiling and
                  Sven Schmitt},
  title        = {Selektion vor der Sicherung - Methoden zur effizienten forensischen
                  Sicherung von digitalen Speichermedien},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {2},
  pages        = {80--85},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0040-4},
  doi          = {10.1007/S11623-010-0040-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BackerFS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/it/BenensonBF10,
  author       = {Zinaida Benenson and
                  Erik{-}Oliver Bla{\ss} and
                  Felix C. Freiling},
  title        = {Attacker Models for Wireless Sensor Networks (Angreifermodelle f{\"{u}}r
                  drahtlose Sensornetze)},
  journal      = {it Inf. Technol.},
  volume       = {52},
  number       = {6},
  pages        = {320--324},
  year         = {2010},
  url          = {https://doi.org/10.1524/itit.2010.0609},
  doi          = {10.1524/ITIT.2010.0609},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/it/BenensonBF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/KrontirisFD10,
  author       = {Ioannis Krontiris and
                  Felix C. Freiling and
                  Tassos Dimitriou},
  title        = {Location privacy in urban sensing networks: research challenges and
                  directions},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {17},
  number       = {5},
  pages        = {30--35},
  year         = {2010},
  url          = {https://doi.org/10.1109/MWC.2010.5601955},
  doi          = {10.1109/MWC.2010.5601955},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wc/KrontirisFD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/MuterGF10,
  author       = {Michael M{\"{u}}ter and
                  Andr{\'{e}} Groll and
                  Felix C. Freiling},
  title        = {A structured approach to anomaly detection for in-vehicle networks},
  booktitle    = {Sixth International Conference on Information Assurance and Security,
                  {IAS} 2010, Atlanta, GA, USA, August 23-25, 2010},
  pages        = {92--98},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ISIAS.2010.5604050},
  doi          = {10.1109/ISIAS.2010.5604050},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/MuterGF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosec/MullerDF10,
  author       = {Tilo M{\"{u}}ller and
                  Andreas Dewald and
                  Felix C. Freiling},
  editor       = {Manuel Costa and
                  Engin Kirda},
  title        = {{AESSE:} a cold-boot resistant implementation of {AES}},
  booktitle    = {Proceedings of the Third European Workshop on System Security, {EUROSEC}
                  2010, Paris, France, April 13, 2010},
  pages        = {42--47},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1752046.1752053},
  doi          = {10.1145/1752046.1752053},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosec/MullerDF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/KrontirisF10,
  author       = {Ioannis Krontiris and
                  Felix C. Freiling},
  title        = {Integrating people-centric sensing with social networks: {A} privacy
                  research agenda},
  booktitle    = {Eigth Annual {IEEE} International Conference on Pervasive Computing
                  and Communications, PerCom 2010, March 29 - April 2, 2010, Mannheim,
                  Germany, Workshop Proceedings},
  pages        = {620--623},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/PERCOMW.2010.5470510},
  doi          = {10.1109/PERCOMW.2010.5470510},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/KrontirisF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/DewaldHF10,
  author       = {Andreas Dewald and
                  Thorsten Holz and
                  Felix C. Freiling},
  editor       = {Sung Y. Shin and
                  Sascha Ossowski and
                  Michael Schumacher and
                  Mathew J. Palakal and
                  Chih{-}Cheng Hung},
  title        = {ADSandbox: sandboxing JavaScript to fight malicious websites},
  booktitle    = {Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC),
                  Sierre, Switzerland, March 22-26, 2010},
  pages        = {1859--1864},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1774088.1774482},
  doi          = {10.1145/1774088.1774482},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/DewaldHF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sicherheit/2010,
  editor       = {Felix C. Freiling},
  title        = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober
                  2010 in Berlin},
  series       = {{LNI}},
  volume       = {{P-170}},
  publisher    = {{GI}},
  year         = {2010},
  url          = {https://dl.gi.de/handle/20.500.12116/19974},
  isbn         = {978-3-88579-264-2},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Freiling09,
  author       = {Felix C. Freiling},
  title        = {Ein Blick auf IT-Sicherheit aus Angreiferperspektive - Vom Wert offensiver
                  Methoden},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {33},
  number       = {4},
  pages        = {214--217},
  year         = {2009},
  url          = {https://doi.org/10.1007/s11623-009-0053-z},
  doi          = {10.1007/S11623-009-0053-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Freiling09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LieglMF09,
  author       = {Marion Liegl and
                  Martin Mink and
                  Felix C. Freiling},
  title        = {Datenschutz in digital-forensischen Lehrveranstaltungen - Sicherer
                  Umgang mit pers{\"{o}}nlichen Daten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {33},
  number       = {4},
  pages        = {222--227},
  year         = {2009},
  url          = {https://doi.org/10.1007/s11623-009-0055-x},
  doi          = {10.1007/S11623-009-0055-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/LieglMF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FreilingH09,
  author       = {Felix C. Freiling and
                  Dennis Heinson},
  title        = {Probleme des Verkehrsdatenbegriffs im Rahmen der Vorratsdatenspeicherung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {33},
  number       = {9},
  pages        = {547--552},
  year         = {2009},
  url          = {https://doi.org/10.1007/s11623-009-0141-0},
  doi          = {10.1007/S11623-009-0141-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FreilingH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pik/WilkeBFZ09,
  author       = {Joachim Wilke and
                  Erik{-}Oliver Bla{\ss} and
                  Felix C. Freiling and
                  Martina Zitterbart},
  title        = {A Framework for Probabilistic, Authentic Aggregation in Wireless Sensor
                  Networks},
  journal      = {Prax. Inf.verarb. Kommun.},
  volume       = {32},
  number       = {2},
  pages        = {116--126},
  year         = {2009},
  url          = {https://doi.org/10.1515/piko.2009.0021},
  doi          = {10.1515/PIKO.2009.0021},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pik/WilkeBFZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/MittalPF09,
  author       = {Neeraj Mittal and
                  Kuppahalli L. Phaneesh and
                  Felix C. Freiling},
  title        = {Safe termination detection in an asynchronous distributed system when
                  processes may crash and recover},
  journal      = {Theor. Comput. Sci.},
  volume       = {410},
  number       = {6-7},
  pages        = {614--628},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.tcs.2008.10.011},
  doi          = {10.1016/J.TCS.2008.10.011},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/MittalPF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HolzEF09,
  author       = {Thorsten Holz and
                  Markus Engelberth and
                  Felix C. Freiling},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Learning More about the Underground Economy: {A} Case-Study of Keyloggers
                  and Dropzones},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_1},
  doi          = {10.1007/978-3-642-04444-1\_1},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/HolzEF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ewsn/KrontirisBGFD09,
  author       = {Ioannis Krontiris and
                  Zinaida Benenson and
                  Thanassis Giannetsos and
                  Felix C. Freiling and
                  Tassos Dimitriou},
  editor       = {Utz Roedig and
                  Cormac J. Sreenan},
  title        = {Cooperative Intrusion Detection in Wireless Sensor Networks},
  booktitle    = {Wireless Sensor Networks, 6th European Conference, {EWSN} 2009, Cork,
                  Ireland, February 11-13, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5432},
  pages        = {263--278},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00224-3\_17},
  doi          = {10.1007/978-3-642-00224-3\_17},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ewsn/KrontirisBGFD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gi/HolzEF09,
  author       = {Thorsten Holz and
                  Markus Engelberth and
                  Felix C. Freiling},
  editor       = {Stefan Fischer and
                  Erik Maehle and
                  R{\"{u}}diger Reischuk},
  title        = {Eine Analyse von 33 Gigabyte gestohlener Keylogger-Daten},
  booktitle    = {39. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Im Focus
                  das Leben, {INFORMATIK} 2009, L{\"{u}}beck, Germany, September
                  28 - October 2, 2009, Proceedings},
  series       = {{LNI}},
  volume       = {{P-154}},
  pages        = {193},
  publisher    = {{GI}},
  year         = {2009},
  url          = {https://dl.gi.de/handle/20.500.12116/31136},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gi/HolzEF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gi/BohmeFGK09,
  author       = {Rainer B{\"{o}}hme and
                  Felix C. Freiling and
                  Thomas Gloe and
                  Matthias Kirchner},
  editor       = {Stefan Fischer and
                  Erik Maehle and
                  R{\"{u}}diger Reischuk},
  title        = {Multimedia-Forensik als Teildisziplin der digitalen Forensik},
  booktitle    = {39. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Im Focus
                  das Leben, {INFORMATIK} 2009, L{\"{u}}beck, Germany, September
                  28 - October 2, 2009, Proceedings},
  series       = {{LNI}},
  volume       = {{P-154}},
  pages        = {1537--1551},
  publisher    = {{GI}},
  year         = {2009},
  url          = {https://dl.gi.de/handle/20.500.12116/31114},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gi/BohmeFGK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imf/MochF09,
  author       = {Christian Moch and
                  Felix C. Freiling},
  editor       = {Oliver Goebel and
                  Ralf Ehlert and
                  Sandra Frings and
                  Detlef G{\"{u}}nther and
                  Holger Morgenstern and
                  Dirk Schadt},
  title        = {The Forensic Image Generator Generator (Forensig2)},
  booktitle    = {{IMF} 2009, Fifth International Conference on {IT} Security Incident
                  Management and {IT} Forensics, Stuttgart, Germany, 15-17 September
                  2009},
  pages        = {78--93},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IMF.2009.8},
  doi          = {10.1109/IMF.2009.8},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imf/MochF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/Delporte-GalletFTFK09,
  author       = {Carole Delporte{-}Gallet and
                  Hugues Fauconnier and
                  Andreas Tielmann and
                  Felix C. Freiling and
                  Mahir Kilic},
  title        = {Message-efficient omission-tolerant consensus with limited synchrony},
  booktitle    = {23rd {IEEE} International Symposium on Parallel and Distributed Processing,
                  {IPDPS} 2009, Rome, Italy, May 23-29, 2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/IPDPS.2009.5160899},
  doi          = {10.1109/IPDPS.2009.5160899},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/Delporte-GalletFTFK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwcf/BohmeFGK09,
  author       = {Rainer B{\"{o}}hme and
                  Felix C. Freiling and
                  Thomas Gloe and
                  Matthias Kirchner},
  editor       = {Zeno J. M. H. Geradts and
                  Katrin Franke and
                  Cor J. Veenman},
  title        = {Multimedia Forensics Is Not Computer Forensics},
  booktitle    = {Computational Forensics, Third International Workshop, {IWCF} 2009,
                  The Hague, The Netherlands, August 13-14, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5718},
  pages        = {90--103},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03521-0\_9},
  doi          = {10.1007/978-3-642-03521-0\_9},
  timestamp    = {Mon, 05 Feb 2024 20:34:04 +0100},
  biburl       = {https://dblp.org/rec/conf/iwcf/BohmeFGK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdcat/FreilingLM09,
  author       = {Felix C. Freiling and
                  Christian Lambertz and
                  Mila E. Majster{-}Cederbaum},
  title        = {Modular Consensus Algorithms for the Crash-Recovery Model},
  booktitle    = {2009 International Conference on Parallel and Distributed Computing,
                  Applications and Technologies, {PDCAT} 2009, Higashi Hiroshima, Japan,
                  8-11 December 2009},
  pages        = {287--292},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/PDCAT.2009.50},
  doi          = {10.1109/PDCAT.2009.50},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdcat/FreilingLM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HundHF09,
  author       = {Ralf Hund and
                  Thorsten Holz and
                  Felix C. Freiling},
  editor       = {Fabian Monrose},
  title        = {Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection
                  Mechanisms},
  booktitle    = {18th {USENIX} Security Symposium, Montreal, Canada, August 10-14,
                  2009, Proceedings},
  pages        = {383--398},
  publisher    = {{USENIX} Association},
  year         = {2009},
  url          = {http://www.usenix.org/events/sec09/tech/full\_papers/hund.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/HundHF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/TriniusHGF09,
  author       = {Philipp Trinius and
                  Thorsten Holz and
                  Jan G{\"{o}}bel and
                  Felix C. Freiling},
  editor       = {Deborah A. Frincke and
                  Carrie Gates and
                  John R. Goodall and
                  Robert F. Erbacher},
  title        = {Visual analysis of malware behavior using treemaps and thread graphs},
  booktitle    = {6th International Workshop on Visualization for Cyber Security, VizSec
                  2009, Atlantic City, NJ, USA, October 11, 2009},
  pages        = {33--38},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/VIZSEC.2009.5375540},
  doi          = {10.1109/VIZSEC.2009.5375540},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/TriniusHGF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/MittalFVP08,
  author       = {Neeraj Mittal and
                  Felix C. Freiling and
                  Subbarayan Venkatesan and
                  Lucia Draque Penso},
  title        = {On termination detection in crash-prone distributed systems with failure
                  detectors},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {68},
  number       = {6},
  pages        = {855--875},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.jpdc.2008.02.001},
  doi          = {10.1016/J.JPDC.2008.02.001},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpdc/MittalFVP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adhoc-now/BenensonBBFJ08,
  author       = {Zinaida Benenson and
                  Markus Bestehorn and
                  Erik Buchmann and
                  Felix C. Freiling and
                  Marek Jawurek},
  editor       = {David Coudert and
                  David Simplot{-}Ryl and
                  Ivan Stojmenovic},
  title        = {Query Dissemination with Predictable Reachability and Energy Usage
                  in Sensor Networks},
  booktitle    = {Ad-hoc, Mobile and Wireless Networks, 7th International Conference,
                  {ADHOC-NOW} 2008, Sophia-Antipolis, France, September 10-12, 2008,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5198},
  pages        = {279--292},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85209-4\_22},
  doi          = {10.1007/978-3-540-85209-4\_22},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/adhoc-now/BenensonBBFJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imf/FreilingHM08,
  author       = {Felix C. Freiling and
                  Thorsten Holz and
                  Martin Mink},
  editor       = {Oliver G{\"{o}}bel and
                  Sandra Frings and
                  Detlef G{\"{u}}nther and
                  Jens Nedon and
                  Dirk Schadt},
  title        = {Reconstructing People's Lives: {A} Case Study in Teaching Forensic
                  Computing},
  booktitle    = {IT-Incidents Management {\&} IT-Forensics - {IMF} 2008, Conference
                  Proceedings, September 23-25, 2008, Mannheim, Germany},
  series       = {{LNI}},
  volume       = {{P-140}},
  pages        = {125--141},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/23588},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imf/FreilingHM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/HolzGRF08,
  author       = {Thorsten Holz and
                  Christian Gorecki and
                  Konrad Rieck and
                  Felix C. Freiling},
  title        = {Measuring and Detecting Fast-Flux Service Networks},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2008, San Diego, California, USA, 10th February - 13th February
                  2008},
  publisher    = {The Internet Society},
  year         = {2008},
  url          = {https://www.ndss-symposium.org/ndss2008/measuring-and-detecting-fast-flux-service-networks/},
  timestamp    = {Mon, 01 Feb 2021 08:42:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/HolzGRF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/HolzSDBF08,
  author       = {Thorsten Holz and
                  Moritz Steiner and
                  Frederic Dahl and
                  Ernst W. Biersack and
                  Felix C. Freiling},
  editor       = {Fabian Monrose},
  title        = {Measurements and Mitigation of Peer-to-Peer-based Botnets: {A} Case
                  Study on Storm Worm},
  booktitle    = {First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '08, San Francisco, CA, USA, April 15, 2008, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/leet08/tech/full\_papers/holz/holz.pdf},
  timestamp    = {Mon, 26 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nsdi/HolzSDBF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/IkinciHF08,
  author       = {Ali Ikinci and
                  Thorsten Holz and
                  Felix C. Freiling},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {407--421},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21494},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/IkinciHF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/BecherF08,
  author       = {Michael Becher and
                  Felix C. Freiling},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Towards Dynamic Malware Analysis to Increase Mobile Device Security423},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {423--433},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21495},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/BecherF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/FreilingL08,
  author       = {Felix C. Freiling and
                  Jens Liebchen},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Iterative Kompromittierungsgraphverfeinerung als methodische Grundlage
                  f{\"{u}}r Netzwerkpenetrationstests},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {435--447},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21496},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/FreilingL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/FreilingLM08,
  author       = {Felix C. Freiling and
                  Christian Lambertz and
                  Mila E. Majster{-}Cederbaum},
  editor       = {Gadi Taubenfeld},
  title        = {Easy Consensus Algorithms for the Crash-Recovery Model},
  booktitle    = {Distributed Computing, 22nd International Symposium, {DISC} 2008,
                  Arcachon, France, September 22-24, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5218},
  pages        = {507--508},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87779-0\_39},
  doi          = {10.1007/978-3-540-87779-0\_39},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/wdag/FreilingLM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dagstuhl/2005dm,
  editor       = {Irene Eusgeld and
                  Felix C. Freiling and
                  Ralf H. Reussner},
  title        = {Dependability Metrics: Advanced Lectures [result from a Dagstuhl seminar,
                  October 30 - November 1, 2005]},
  series       = {Lecture Notes in Computer Science},
  volume       = {4909},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68947-8},
  doi          = {10.1007/978-3-540-68947-8},
  isbn         = {978-3-540-68946-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/2005dm.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/WillemsHF07,
  author       = {Carsten Willems and
                  Thorsten Holz and
                  Felix C. Freiling},
  title        = {Toward Automated Dynamic Malware Analysis Using CWSandbox},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {5},
  number       = {2},
  pages        = {32--39},
  year         = {2007},
  url          = {https://doi.org/10.1109/MSP.2007.45},
  doi          = {10.1109/MSP.2007.45},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/WillemsHF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europar/FreilingMM07,
  author       = {Felix C. Freiling and
                  Matthias Majuntke and
                  Neeraj Mittal},
  editor       = {Anne{-}Marie Kermarrec and
                  Luc Boug{\'{e}} and
                  Thierry Priol},
  title        = {On Detecting Termination in the Crash-Recovery Model},
  booktitle    = {Euro-Par 2007, Parallel Processing, 13th International Euro-Par Conference,
                  Rennes, France, August 28-31, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4641},
  pages        = {629--638},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74466-5\_66},
  doi          = {10.1007/978-3-540-74466-5\_66},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/europar/FreilingMM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imf/FreilingS07,
  author       = {Felix C. Freiling and
                  Bastian Schwittay},
  editor       = {Sandra Frings and
                  Oliver G{\"{o}}bel and
                  Detlef G{\"{u}}nther and
                  Hardo Hase and
                  Jens Nedon and
                  Dirk Schadt and
                  Arslan Br{\"{o}}mme},
  title        = {A Common Process Model for Incident Response and Computer Forensics},
  booktitle    = {IT-Incidents Management {\&} IT-Forensics - {IMF} 2007, Conference
                  Proceedings, September 11-13, 2007, Stuttgart, Germany},
  series       = {{LNI}},
  volume       = {{P-114}},
  pages        = {19--39},
  publisher    = {{GI}},
  year         = {2007},
  url          = {https://dl.gi.de/handle/20.500.12116/22383},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imf/FreilingS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imf/DaiyaDF07,
  author       = {Harish Daiya and
                  Maximillian Dornseif and
                  Felix C. Freiling},
  editor       = {Sandra Frings and
                  Oliver G{\"{o}}bel and
                  Detlef G{\"{u}}nther and
                  Hardo Hase and
                  Jens Nedon and
                  Dirk Schadt and
                  Arslan Br{\"{o}}mme},
  title        = {Testing Forensic Hash Tools on Sparse Files},
  booktitle    = {IT-Incidents Management {\&} IT-Forensics - {IMF} 2007, Conference
                  Proceedings, September 11-13, 2007, Stuttgart, Germany},
  series       = {{LNI}},
  volume       = {{P-114}},
  pages        = {113--123},
  publisher    = {{GI}},
  year         = {2007},
  url          = {https://dl.gi.de/handle/20.500.12116/22389},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imf/DaiyaDF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imf/FreilingS07a,
  author       = {Felix C. Freiling and
                  Bastian Schwittay},
  editor       = {Sandra Frings and
                  Oliver G{\"{o}}bel and
                  Detlef G{\"{u}}nther and
                  Hardo Hase and
                  Jens Nedon and
                  Dirk Schadt and
                  Arslan Br{\"{o}}mme},
  title        = {Towards Reliable Rootkit Detection in Live Response},
  booktitle    = {IT-Incidents Management {\&} IT-Forensics - {IMF} 2007, Conference
                  Proceedings, September 11-13, 2007, Stuttgart, Germany},
  series       = {{LNI}},
  volume       = {{P-114}},
  pages        = {125--143},
  publisher    = {{GI}},
  year         = {2007},
  url          = {https://dl.gi.de/handle/20.500.12116/22380},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imf/FreilingS07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mdm/BenensonFC07,
  author       = {Zinaida Benenson and
                  Felix C. Freiling and
                  Peter M. Cholewinski},
  editor       = {Christian Becker and
                  Christian S. Jensen and
                  Jianwen Su and
                  Daniela Nicklas},
  title        = {Advanced Evasive Data Storage in Sensor Networks},
  booktitle    = {8th International Conference on Mobile Data Management {(MDM} 2007),
                  Mannheim, Germany, May 7-11, 2007},
  pages        = {146--151},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/MDM.2007.29},
  doi          = {10.1109/MDM.2007.29},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mdm/BenensonFC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sss/CortinasFGLLPA07,
  author       = {Roberto Corti{\~{n}}as and
                  Felix C. Freiling and
                  Marjan Ghajar{-}Azadanlou and
                  Alberto Lafuente and
                  Mikel Larrea and
                  Lucia Draque Penso and
                  Iratxe Soraluze Arriola},
  editor       = {Toshimitsu Masuzawa and
                  S{\'{e}}bastien Tixeuil},
  title        = {Secure Failure Detection in TrustedPals},
  booktitle    = {Stabilization, Safety, and Security of Distributed Systems, 9th International
                  Symposium, {SSS} 2007, Paris, France, November 14-16, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4838},
  pages        = {173--188},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76627-8\_15},
  doi          = {10.1007/978-3-540-76627-8\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sss/CortinasFGLLPA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sss/FreilingJ07,
  author       = {Felix C. Freiling and
                  Arshad Jhumka},
  editor       = {Toshimitsu Masuzawa and
                  S{\'{e}}bastien Tixeuil},
  title        = {Global Predicate Detection in Distributed Systems with Small Faults},
  booktitle    = {Stabilization, Safety, and Security of Distributed Systems, 9th International
                  Symposium, {SSS} 2007, Paris, France, November 14-16, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4838},
  pages        = {296--310},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76627-8\_23},
  doi          = {10.1007/978-3-540-76627-8\_23},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sss/FreilingJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/Delporte-GalletFFPT07,
  author       = {Carole Delporte{-}Gallet and
                  Hugues Fauconnier and
                  Felix C. Freiling and
                  Lucia Draque Penso and
                  Andreas Tielmann},
  editor       = {Andrzej Pelc},
  title        = {From Crash-Stop to Permanent Omission: Automatic Transformation and
                  Weakest Failure Detectors},
  booktitle    = {Distributed Computing, 21st International Symposium, {DISC} 2007,
                  Lemesos, Cyprus, September 24-26, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4731},
  pages        = {165--178},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75142-7\_15},
  doi          = {10.1007/978-3-540-75142-7\_15},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/wdag/Delporte-GalletFFPT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dagstuhl/2006P6371,
  editor       = {Christian Cachin and
                  Felix C. Freiling and
                  Jaap{-}Henk Hoepman},
  title        = {From Security to Dependability, 10.09. - 15.09.2006},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {06371},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2007},
  url          = {http://drops.dagstuhl.de/portals/06371/},
  timestamp    = {Thu, 10 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/2006P6371.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerDVFSRL06,
  author       = {Helmut Reimer and
                  Jana Dittmann and
                  Claus Vielhauer and
                  Felix C. Freiling and
                  Francesca Saglietti and
                  Manfred Reitenspie{\ss} and
                  Andreas Lang},
  title        = {Veranstaltungsbesprechungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {30},
  number       = {4},
  pages        = {258--259},
  year         = {2006},
  url          = {https://doi.org/10.1007/s11623-006-0072-y},
  doi          = {10.1007/S11623-006-0072-Y},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ReimerDVFSRL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/JhumkaFFS06,
  author       = {Arshad Jhumka and
                  Felix C. Freiling and
                  Christof Fetzer and
                  Neeraj Suri},
  title        = {An approach to synthesise safe systems},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {1/2},
  pages        = {62--74},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.010824},
  doi          = {10.1504/IJSN.2006.010824},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/JhumkaFFS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/FreilingV06,
  author       = {Felix C. Freiling and
                  Hagen V{\"{o}}lzer},
  title        = {Illustrating the impossibility of crash-tolerant consensus in asynchronous
                  systems},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {40},
  number       = {2},
  pages        = {105--109},
  year         = {2006},
  url          = {https://doi.org/10.1145/1131322.1131324},
  doi          = {10.1145/1131322.1131324},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/FreilingV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arcs/BenesonFHKP06,
  author       = {Zinaida Benenson and
                  Felix C. Freiling and
                  Thorsten Holz and
                  Dogan Kesdogan and
                  Lucia Draque Penso},
  editor       = {Wolfgang Karl and
                  J{\"{u}}rgen Becker and
                  Karl{-}Erwin Gro{\ss}pietsch and
                  Christian Hochberger and
                  Erik Maehle},
  title        = {Safety, Liveness, and Information Flow: Dependability Revisited},
  booktitle    = {{ARCS} 2006 - 19th International Conference on Architecture of Computing
                  Systems, Workshops Proceedings, March 16, 2006, Frankfurt am Main,
                  Germany},
  series       = {{LNI}},
  volume       = {{P-81}},
  pages        = {56--65},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/29437},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/arcs/BenesonFHKP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/BenensonFPRW06,
  author       = {Zinaida Benenson and
                  Felix C. Freiling and
                  Birgit Pfitzmann and
                  Christian Rohner and
                  Michael Waidner},
  editor       = {Levente Butty{\'{a}}n and
                  Virgil D. Gligor and
                  Dirk Westhoff},
  title        = {Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer
                  Ad Hoc Networks},
  booktitle    = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European
                  Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4357},
  pages        = {165--178},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11964254\_15},
  doi          = {10.1007/11964254\_15},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/BenensonFPRW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/FortFPBK06,
  author       = {Milan Fort and
                  Felix C. Freiling and
                  Lucia Draque Penso and
                  Zinaida Benenson and
                  Dogan Kesdogan},
  editor       = {Dieter Gollmann and
                  Jan Meier and
                  Andrei Sabelfeld},
  title        = {TrustedPals: Secure Multiparty Computation Implemented with Smart
                  Cards},
  booktitle    = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research
                  in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4189},
  pages        = {34--48},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11863908\_3},
  doi          = {10.1007/11863908\_3},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/FortFPBK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imf/AndersonDFHILM06,
  author       = {Philip Anderson and
                  Maximillian Dornseif and
                  Felix C. Freiling and
                  Thorsten Holz and
                  Alastair Irons and
                  Christopher Laing and
                  Martin Mink},
  editor       = {Oliver G{\"{o}}bel and
                  Dirk Schadt and
                  Sandra Frings and
                  Hardo Hase and
                  Detlef G{\"{u}}nther and
                  Jens Nedon},
  title        = {A Comparative Study of Teaching Forensics at a University Degree Level},
  booktitle    = {IT-Incidents Management {\&} IT-Forensics - {IMF} 2006, Conference
                  Proceedings, October, 18th-19th, 2006, Stuttgart},
  series       = {{LNI}},
  volume       = {{P-97}},
  pages        = {116--127},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/23454},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imf/AndersonDFHILM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/MinkF06,
  author       = {Martin Mink and
                  Felix C. Freiling},
  title        = {Is attack better than defense?: teaching information security the
                  right way},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {44--48},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231056},
  doi          = {10.1145/1231047.1231056},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/MinkF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/opodis/MittalPF06,
  author       = {Neeraj Mittal and
                  Kuppahalli L. Phaneesh and
                  Felix C. Freiling},
  editor       = {Alexander A. Shvartsman},
  title        = {Safe Termination Detection in an Asynchronous Distributed System When
                  Processes May Crash and Recover},
  booktitle    = {Principles of Distributed Systems, 10th International Conference,
                  {OPODIS} 2006, Bordeaux, France, December 12-15, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4305},
  pages        = {126--141},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11945529\_10},
  doi          = {10.1007/11945529\_10},
  timestamp    = {Mon, 03 Jan 2022 22:35:20 +0100},
  biburl       = {https://dblp.org/rec/conf/opodis/MittalPF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/BenensonPFL06,
  author       = {Zinaida Benenson and
                  Lexi Pimenidis and
                  Felix C. Freiling and
                  Stefan Lucks},
  title        = {Authenticated Query Flooding in Sensor Networks},
  booktitle    = {4th {IEEE} Conference on Pervasive Computing and Communications Workshops
                  (PerCom 2006 Workshops), 13-17 March 2006, Pisa, Italy},
  pages        = {644--647},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/PERCOMW.2006.23},
  doi          = {10.1109/PERCOMW.2006.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/BenensonPFL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BaecherKHDF06,
  author       = {Paul Baecher and
                  Markus Koetter and
                  Thorsten Holz and
                  Maximillian Dornseif and
                  Felix C. Freiling},
  editor       = {Diego Zamboni and
                  Christopher Kr{\"{u}}gel},
  title        = {The Nepenthes Platform: An Efficient Approach to Collect Malware},
  booktitle    = {Recent Advances in Intrusion Detection, 9th International Symposium,
                  {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4219},
  pages        = {165--184},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11856214\_9},
  doi          = {10.1007/11856214\_9},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BaecherKHDF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/BenensonFHLP06,
  author       = {Zinaida Benenson and
                  Felix C. Freiling and
                  Ernest Hammerschmidt and
                  Stefan Lucks and
                  Lexi Pimenidis},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Kai Rannenberg and
                  Louise Yngstr{\"{o}}m and
                  Stefan Lindskog},
  title        = {Authenticated Query Flooding in Sensor Networks},
  booktitle    = {Security and Privacy in Dynamic Environments, Proceedings of the {IFIP}
                  {TC-11} 21st International Information Security Conference {(SEC}
                  2006), 22-24 May 2006, Karlstad, Sweden},
  series       = {{IFIP}},
  volume       = {201},
  pages        = {38--49},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/0-387-33406-8\_4},
  doi          = {10.1007/0-387-33406-8\_4},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/BenensonFHLP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/EsserF06,
  author       = {Hans{-}Georg E{\ss}er and
                  Felix C. Freiling},
  editor       = {Jana Dittmann},
  title        = {Kapazit{\"{a}}tsmessung eines verdeckten Zeitkanals {\"{u}}ber
                  {HTTP}},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {115--118},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24763},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/EsserF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/WarnsFH06,
  author       = {Timo Warns and
                  Felix C. Freiling and
                  Wilhelm Hasselbring},
  title        = {Solving Consensus Using Structural Failure Models},
  booktitle    = {25th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2006),2-4
                  October 2006, Leeds, {UK}},
  pages        = {212--224},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/SRDS.2006.44},
  doi          = {10.1109/SRDS.2006.44},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/WarnsFH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sss/FreilingMM06,
  author       = {Felix C. Freiling and
                  Matthias Majuntke and
                  Neeraj Mittal},
  editor       = {Ajoy Kumar Datta and
                  Maria Gradinariu},
  title        = {Brief Announcement: Termination Detection in an Asynchronous Distributed
                  System with Crash-Recovery Failures},
  booktitle    = {Stabilization, Safety, and Security of Distributed Systems, 8th International
                  Symposium, {SSS} 2006, Dallas, TX, USA, November 17-19, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4280},
  pages        = {572--573},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-49823-0\_43},
  doi          = {10.1007/978-3-540-49823-0\_43},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/sss/FreilingMM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/CachinFH06,
  author       = {Christian Cachin and
                  Felix C. Freiling and
                  Jaap{-}Henk Hoepman},
  editor       = {Christian Cachin and
                  Felix C. Freiling and
                  Jaap{-}Henk Hoepman},
  title        = {06371 Executive Summary -- From Security to Dependability},
  booktitle    = {From Security to Dependability, 10.09. - 15.09.2006},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {06371},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2006},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2007/851},
  timestamp    = {Thu, 10 Jun 2021 13:02:09 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/CachinFH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/CachinFH06a,
  author       = {Christian Cachin and
                  Felix C. Freiling and
                  Jaap{-}Henk Hoepman},
  editor       = {Christian Cachin and
                  Felix C. Freiling and
                  Jaap{-}Henk Hoepman},
  title        = {06371 Abstracts Collection -- From Security to Dependability},
  booktitle    = {From Security to Dependability, 10.09. - 15.09.2006},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {06371},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2006},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2007/853},
  timestamp    = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/CachinFH06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/EusgeldF05,
  author       = {Irene Eusgeld and
                  Felix C. Freiling},
  editor       = {Irene Eusgeld and
                  Felix C. Freiling and
                  Ralf H. Reussner},
  title        = {Introduction to Dependability Metrics},
  booktitle    = {Dependability Metrics: Advanced Lectures [result from a Dagstuhl seminar,
                  October 30 - November 1, 2005]},
  series       = {Lecture Notes in Computer Science},
  volume       = {4909},
  pages        = {1--4},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-68947-8\_1},
  doi          = {10.1007/978-3-540-68947-8\_1},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/EusgeldF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/BohmeF05,
  author       = {Rainer B{\"{o}}hme and
                  Felix C. Freiling},
  editor       = {Irene Eusgeld and
                  Felix C. Freiling and
                  Ralf H. Reussner},
  title        = {On Metrics and Measurements},
  booktitle    = {Dependability Metrics: Advanced Lectures [result from a Dagstuhl seminar,
                  October 30 - November 1, 2005]},
  series       = {Lecture Notes in Computer Science},
  volume       = {4909},
  pages        = {7--13},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-68947-8\_2},
  doi          = {10.1007/978-3-540-68947-8\_2},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/BohmeF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/Freiling05,
  author       = {Felix C. Freiling},
  editor       = {Irene Eusgeld and
                  Felix C. Freiling and
                  Ralf H. Reussner},
  title        = {Introduction to Security Metrics},
  booktitle    = {Dependability Metrics: Advanced Lectures [result from a Dagstuhl seminar,
                  October 30 - November 1, 2005]},
  series       = {Lecture Notes in Computer Science},
  volume       = {4909},
  pages        = {129--132},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-68947-8\_11},
  doi          = {10.1007/978-3-540-68947-8\_11},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/Freiling05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/FreilingW05,
  author       = {Felix C. Freiling and
                  Max Walter},
  editor       = {Irene Eusgeld and
                  Felix C. Freiling and
                  Ralf H. Reussner},
  title        = {Reliability vs. Security: {A} Subjective Overview},
  booktitle    = {Dependability Metrics: Advanced Lectures [result from a Dagstuhl seminar,
                  October 30 - November 1, 2005]},
  series       = {Lecture Notes in Computer Science},
  volume       = {4909},
  pages        = {255--257},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-68947-8\_25},
  doi          = {10.1007/978-3-540-68947-8\_25},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/FreilingW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edcc/AvoineGGV05,
  author       = {Gildas Avoine and
                  Felix C. G{\"{a}}rtner and
                  Rachid Guerraoui and
                  Marko Vukolic},
  editor       = {Mario Dal Cin and
                  Mohamed Ka{\^{a}}niche and
                  Andr{\'{a}}s Pataricza},
  title        = {Gracefully Degrading Fair Exchange with Security Modules},
  booktitle    = {Dependable Computing - EDCC-5, 5th European Dependable Computing Conference,
                  Budapest, Hungary, April 20-22, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3463},
  pages        = {55--71},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11408901\_5},
  doi          = {10.1007/11408901\_5},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/edcc/AvoineGGV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/FreilingHW05,
  author       = {Felix C. Freiling and
                  Thorsten Holz and
                  Georg Wicherski},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed
                  Denial-of-Service Attacks},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {319--335},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_19},
  doi          = {10.1007/11555827\_19},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/FreilingHW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europar/ShapiroKFR05,
  author       = {Marc Shapiro and
                  Idit Keidar and
                  Felix C. Freiling and
                  Lu{\'{\i}}s E. T. Rodrigues},
  editor       = {Jos{\'{e}} C. Cunha and
                  Pedro D. Medeiros},
  title        = {Topic 8 - Distributed Systems and Algorithms},
  booktitle    = {Euro-Par 2005, Parallel Processing, 11th International Euro-Par Conference,
                  Lisbon, Portugal, August 30 - September 2, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3648},
  pages        = {593},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11549468\_66},
  doi          = {10.1007/11549468\_66},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/europar/ShapiroKFR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ewsn/BenensonGK05,
  author       = {Zinaida Benenson and
                  Felix C. G{\"{a}}rtner and
                  Dogan Kesdogan},
  title        = {An algorithmic framework for robust access control in wireless sensor
                  networks},
  booktitle    = {Wireless Sensor Networks, Second European Workshop, {EWSN} 2005, Istanbul,
                  Turkey, January 31 - February 2, 2005, Proceedings},
  pages        = {158--165},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/EWSN.2005.1462007},
  doi          = {10.1109/EWSN.2005.1462007},
  timestamp    = {Mon, 01 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ewsn/BenensonGK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gi/FreilingMP05,
  author       = {Felix C. Freiling and
                  Neeraj Mittal and
                  Lucia Draque Penso},
  editor       = {Armin B. Cremers and
                  Rainer Manthey and
                  Peter Martini and
                  Volker Steinhage},
  title        = {Transformations in Secure and Fault-Tolerant Distributed Computation},
  booktitle    = {35. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Informatik
                  LIVE!, {INFORMATIK} 2005, Bonn, Germany, September 19-22, 2005, Band
                  1},
  series       = {{LNI}},
  volume       = {{P-67}},
  pages        = {410--412},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28071},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gi/FreilingMP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ictac/Delporte-GalletFF05,
  author       = {Carole Delporte{-}Gallet and
                  Hugues Fauconnier and
                  Felix C. Freiling},
  editor       = {Dang Van Hung and
                  Martin Wirsing},
  title        = {Revisiting Failure Detection and Consensus in Omission Failure Environments},
  booktitle    = {Theoretical Aspects of Computing - {ICTAC} 2005, Second International
                  Colloquium, Hanoi, Vietnam, October 17-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3722},
  pages        = {394--408},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560647\_26},
  doi          = {10.1007/11560647\_26},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/ictac/Delporte-GalletFF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/opodis/FreilingHP05,
  author       = {Felix C. Freiling and
                  Maurice Herlihy and
                  Lucia Draque Penso},
  editor       = {James H. Anderson and
                  Giuseppe Prencipe and
                  Roger Wattenhofer},
  title        = {Optimal Randomized Fair Exchange with Secret Shared Coins},
  booktitle    = {Principles of Distributed Systems, 9th International Conference, {OPODIS}
                  2005, Pisa, Italy, December 12-14, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3974},
  pages        = {61--72},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11795490\_7},
  doi          = {10.1007/11795490\_7},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/opodis/FreilingHP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdcs/BenensonCF05,
  author       = {Zinaida Benenson and
                  Peter M. Cholewinski and
                  Felix C. Freiling},
  editor       = {S. Q. Zheng},
  title        = {Simple Evasive Data Storage in Sensor Networks},
  booktitle    = {International Conference on Parallel and Distributed Computing Systems,
                  {PDCS} 2005, November 14-16, 2005, Phoenix, AZ, {USA}},
  pages        = {779--784},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2005},
  timestamp    = {Wed, 09 Nov 2022 13:58:44 +0100},
  biburl       = {https://dblp.org/rec/conf/pdcs/BenensonCF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/BenensonGK05,
  author       = {Zinaida Benenson and
                  Felix C. G{\"{a}}rtner and
                  Dogan Kesdogan},
  editor       = {Hannes Federrath},
  title        = {Secure Multi-Party Computation with Security Modules},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {41--52},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28394},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/BenensonGK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sss/FreilingG05,
  author       = {Felix C. Freiling and
                  Sukumar Ghosh},
  editor       = {Ted Herman and
                  S{\'{e}}bastien Tixeuil},
  title        = {Code Stabilization},
  booktitle    = {Self-Stabilizing Systems, 7th International Symposium, {SSS} 2005,
                  Barcelona, Spain, October 26-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3764},
  pages        = {128--139},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11577327\_9},
  doi          = {10.1007/11577327\_9},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/sss/FreilingG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/MittalFVP05,
  author       = {Neeraj Mittal and
                  Felix C. Freiling and
                  Subbarayan Venkatesan and
                  Lucia Draque Penso},
  editor       = {Pierre Fraigniaud},
  title        = {Efficient Reduction for Wait-Free Termination Detection in a Crash-Prone
                  Distributed System},
  booktitle    = {Distributed Computing, 19th International Conference, {DISC} 2005,
                  Cracow, Poland, September 26-29, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3724},
  pages        = {93--107},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11561927\_9},
  doi          = {10.1007/11561927\_9},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/wdag/MittalFVP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pik/DornseifGH04,
  author       = {Maximillian Dornseif and
                  Felix C. G{\"{a}}rtner and
                  Thorsten Holz},
  title        = {Vulnerability Assessment using Honeypots},
  journal      = {Prax. Inf.verarb. Kommun.},
  volume       = {27},
  number       = {4},
  pages        = {195--201},
  year         = {2004},
  url          = {https://doi.org/10.1515/PIKO.2004.195},
  doi          = {10.1515/PIKO.2004.195},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pik/DornseifGH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/BunseFL04,
  author       = {Christian Bunse and
                  Felix C. Freiling and
                  Nicole L{\'{e}}vy},
  editor       = {Ralf H. Reussner and
                  Judith A. Stafford and
                  Clemens A. Szyperski},
  title        = {A Taxonomy on Component-Based Software Engineering Methods},
  booktitle    = {Architecting Systems with Trustworthy Components, International Seminar,
                  Dagstuhl Castle, Germany, December 12-17, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3938},
  pages        = {103--119},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11786160\_6},
  doi          = {10.1007/11786160\_6},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/BunseFL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/FreilingS04,
  author       = {Felix C. Freiling and
                  Thomas Santen},
  editor       = {Ralf H. Reussner and
                  Judith A. Stafford and
                  Clemens A. Szyperski},
  title        = {On the Composition of Compositional Reasoning},
  booktitle    = {Architecting Systems with Trustworthy Components, International Seminar,
                  Dagstuhl Castle, Germany, December 12-17, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3938},
  pages        = {137--151},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11786160\_8},
  doi          = {10.1007/11786160\_8},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/FreilingS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/DornseifGH04,
  author       = {Maximillian Dornseif and
                  Felix C. G{\"{a}}rtner and
                  Thorsten Holz},
  editor       = {Ulrich Flegel and
                  Michael Meier},
  title        = {Ermittlung von Verwundbarkeiten mit elektronischen K{\"{o}}dern},
  booktitle    = {Detection of Intrusions and Malware {\&} Vulnerability Assessment,
                  {GI} {SIG} {SIDAR} Workshop, {DIMVA} 2004, Dortmund, Germany, July
                  6.7, 2004, Proceedings},
  series       = {{LNI}},
  volume       = {{P-46}},
  pages        = {129--141},
  publisher    = {{GI}},
  year         = {2004},
  url          = {https://dl.gi.de/handle/20.500.12116/29211},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/DornseifGH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/formats/GartnerJ04,
  author       = {Felix C. G{\"{a}}rtner and
                  Arshad Jhumka},
  editor       = {Yassine Lakhnech and
                  Sergio Yovine},
  title        = {Automating the Addition of Fail-Safe Fault-Tolerance: Beyond Fusion-Closed
                  Specifications},
  booktitle    = {Formal Techniques, Modelling and Analysis of Timed and Fault-Tolerant
                  Systems, Joint International Conferences on Formal Modelling and Analysis
                  of Timed Systems, {FORMATS} 2004 and Formal Techniques in Real-Time
                  and Fault-Tolerant Systems, {FTRTFT} 2004, Grenoble, France, September
                  22-24, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3253},
  pages        = {183--198},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30206-3\_14},
  doi          = {10.1007/978-3-540-30206-3\_14},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/formats/GartnerJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gi/BenensonGK04,
  author       = {Zinaida Benenson and
                  Felix C. G{\"{a}}rtner and
                  Dogan Kesdogan},
  editor       = {Peter Dadam and
                  Manfred Reichert},
  title        = {User Authentication in Sensor Networks},
  booktitle    = {34. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Informatik
                  verbindet, {INFORMATIK} 2004, Ulm, Germany, September 20-24, 2004,
                  Band 2},
  series       = {{LNI}},
  volume       = {{P-51}},
  pages        = {385--389},
  publisher    = {{GI}},
  year         = {2004},
  url          = {https://dl.gi.de/handle/20.500.12116/28800},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gi/BenensonGK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/webDyn2004/BuchmannBCFGLMM04,
  author       = {Alejandro P. Buchmann and
                  Christof Bornh{\"{o}}vd and
                  Mariano Cilia and
                  Ludger Fiege and
                  Felix C. G{\"{a}}rtner and
                  Christoph Liebig and
                  Matthias Meixner and
                  Gero M{\"{u}}hl},
  editor       = {Mark Levene and
                  Alexandra Poulovassilis},
  title        = {{DREAM:} Distributed Reliable Event-Based Application Management},
  booktitle    = {Web Dynamics - Adapting to Change in Content, Size, Topology and Use},
  pages        = {319--352},
  publisher    = {Springer},
  year         = {2004},
  timestamp    = {Mon, 03 Jan 2005 15:12:12 +0100},
  biburl       = {https://dblp.org/rec/books/sp/webDyn2004/BuchmannBCFGLMM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-CR-0406059,
  author       = {Maximillian Dornseif and
                  Felix C. G{\"{a}}rtner and
                  Thorsten Holz},
  title        = {Ermittlung von Verwundbarkeiten mit elektronischen Koedern},
  journal      = {CoRR},
  volume       = {cs.CR/0406059},
  year         = {2004},
  url          = {http://arxiv.org/abs/cs/0406059},
  timestamp    = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/cs-CR-0406059.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/PagniaVG03,
  author       = {Henning Pagnia and
                  Holger Vogt and
                  Felix C. G{\"{a}}rtner},
  title        = {Fair Exchange},
  journal      = {Comput. J.},
  volume       = {46},
  number       = {1},
  pages        = {55--75},
  year         = {2003},
  url          = {https://doi.org/10.1093/comjnl/46.1.55},
  doi          = {10.1093/COMJNL/46.1.55},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/PagniaVG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsonline/GartnerBK03,
  author       = {Felix C. G{\"{a}}rtner and
                  Levente Butty{\'{a}}n and
                  Klaus Kursawe},
  title        = {Dependable Systems: Podsy Workshop Report - From Fault Tolerance to
                  Security and Back},
  journal      = {{IEEE} Distributed Syst. Online},
  volume       = {4},
  number       = {9},
  year         = {2003},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dsonline/GartnerBK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/it/Gartner03,
  author       = {Felix C. G{\"{a}}rtner},
  title        = {Beobachten des Internet: Traum und Wirklichkeit (How to observe the
                  Internet)},
  journal      = {it Inf. Technol.},
  volume       = {45},
  number       = {6},
  pages        = {353--355},
  year         = {2003},
  url          = {https://doi.org/10.1524/itit.45.6.353.20504},
  doi          = {10.1524/ITIT.45.6.353.20504},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/it/Gartner03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/VogtGP03,
  author       = {Holger Vogt and
                  Felix C. G{\"{a}}rtner and
                  Henning Pagnia},
  title        = {Supporting Fair Exchange in Mobile Environments},
  journal      = {Mob. Networks Appl.},
  volume       = {8},
  number       = {2},
  pages        = {127--136},
  year         = {2003},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/VogtGP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/GartnerKB03,
  author       = {Felix C. G{\"{a}}rtner and
                  Klaus Kursawe and
                  Levente Butty{\'{a}}n},
  title        = {PoDSy 2003: Principles of Dependable Systems},
  booktitle    = {2003 International Conference on Dependable Systems and Networks {(DSN}
                  2003), 22-25 June 2003, San Francisco, CA, USA, Proceedings},
  pages        = {763},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.ieeecomputersociety.org/10.1109/DSN.2003.10002},
  doi          = {10.1109/DSN.2003.10002},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/GartnerKB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gi/Gartner03,
  author       = {Felix C. G{\"{a}}rtner},
  editor       = {R{\"{u}}diger Grimm and
                  Hubert B. Keller and
                  Kai Rannenberg},
  title        = {Byzantine Failures and Security: Arbitrary is not (always) Random},
  booktitle    = {33. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Schwerpunkt
                  "Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit", {INFORMATIK}
                  2003 - Mit Sicherheit Informatik, Frankfurt am Main, Germany, September
                  29 - October 2, 2003},
  series       = {{LNI}},
  volume       = {{P-36}},
  pages        = {127--138},
  publisher    = {{GI}},
  year         = {2003},
  url          = {https://dl.gi.de/handle/20.500.12116/29565},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gi/Gartner03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/middleware/FiegeZGH03,
  author       = {Ludger Fiege and
                  Andreas Zeidler and
                  Felix C. G{\"{a}}rtner and
                  Sidath B. Handurukande},
  title        = {Dealing with Uncertainty in Mobile Publish/Subscribe Middleware},
  booktitle    = {International Middleware Conference, Workshop Proceedings, June 16-20,
                  2003, Rio de Janeiro, Brazil},
  pages        = {60--67},
  publisher    = {PUC-Rio},
  year         = {2003},
  timestamp    = {Thu, 17 Jul 2003 08:59:54 +0200},
  biburl       = {https://dblp.org/rec/conf/middleware/FiegeZGH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/middleware/FiegeGKZ03,
  author       = {Ludger Fiege and
                  Felix C. G{\"{a}}rtner and
                  Oliver Kasten and
                  Andreas Zeidler},
  editor       = {Markus Endler and
                  Douglas C. Schmidt},
  title        = {Supporting Mobility in Content-Based Publish/Subscribe Middleware},
  booktitle    = {Middleware 2003, {ACM/IFIP/USENIX} International Middleware Conference,
                  Rio de Janeiro, Brazil, June 16-20, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2672},
  pages        = {103--122},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-44892-6\_6},
  doi          = {10.1007/3-540-44892-6\_6},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/middleware/FiegeGKZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/BohnGV03,
  author       = {J{\"{u}}rgen Bohn and
                  Felix C. G{\"{a}}rtner and
                  Harald Vogt},
  editor       = {Dieter Hutter and
                  G{\"{u}}nter M{\"{u}}ller and
                  Werner Stephan and
                  Markus Ullmann},
  title        = {Dependability Issues of Pervasive Computing in a Healthcare Environment},
  booktitle    = {Security in Pervasive Computing, First International Conference, Boppard,
                  Germany, March 12-14, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2802},
  pages        = {53--70},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39881-3\_8},
  doi          = {10.1007/978-3-540-39881-3\_8},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/BohnGV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sss/GartnerP03,
  author       = {Felix C. G{\"{a}}rtner and
                  Henning Pagnia},
  editor       = {Shing{-}Tsaan Huang and
                  Ted Herman},
  title        = {Time-Efficient Self-Stabilizing Algorithms through Hierarchical Structures},
  booktitle    = {Self-Stabilizing Systems, 6th International Symposium, {SSS} 2003,
                  San Francisco, CA, USA, June 24-25, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2704},
  pages        = {154--168},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45032-7\_12},
  doi          = {10.1007/3-540-45032-7\_12},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/sss/GartnerP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ker/FiegeMG02,
  author       = {Ludger Fiege and
                  Gero M{\"{u}}hl and
                  Felix C. G{\"{a}}rtner},
  title        = {Modular event-based systems},
  journal      = {Knowl. Eng. Rev.},
  volume       = {17},
  number       = {4},
  pages        = {359--388},
  year         = {2002},
  url          = {https://doi.org/10.1017/S0269888903000559},
  doi          = {10.1017/S0269888903000559},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ker/FiegeMG02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fasec/Gartner02,
  author       = {Felix C. G{\"{a}}rtner},
  editor       = {Ali E. Abdallah and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Revisiting Liveness Properties in the Context of Secure Systems},
  booktitle    = {Formal Aspects of Security, First International Conference, FASec
                  2002, London, UK, December 16-18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2629},
  pages        = {221--238},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-40981-6\_18},
  doi          = {10.1007/978-3-540-40981-6\_18},
  timestamp    = {Wed, 15 Sep 2021 13:43:48 +0200},
  biburl       = {https://dblp.org/rec/conf/fasec/Gartner02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mascots/MuhlFGB02,
  author       = {Gero M{\"{u}}hl and
                  Ludger Fiege and
                  Felix C. G{\"{a}}rtner and
                  Alejandro P. Buchmann},
  title        = {Evaluating Advanced Routing Algorithms for Content-Based Publish/Subscribe
                  Systems},
  booktitle    = {10th International Workshop on Modeling, Analysis, and Simulation
                  of Computer and Telecommunication Systems {(MASCOTS} 2002), 11-16
                  October 2002, Fort Worth, Texas, {USA}},
  pages        = {167--176},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/MASCOT.2002.1167074},
  doi          = {10.1109/MASCOT.2002.1167074},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mascots/MuhlFGB02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/FiegeMG02,
  author       = {Ludger Fiege and
                  Gero M{\"{u}}hl and
                  Felix C. G{\"{a}}rtner},
  editor       = {Gary B. Lamont and
                  Hisham Haddad and
                  George A. Papadopoulos and
                  Brajendra Panda},
  title        = {A modular approach to build structured event-based systems},
  booktitle    = {Proceedings of the 2002 {ACM} Symposium on Applied Computing (SAC),
                  March 10-14, 2002, Madrid, Spain},
  pages        = {385--392},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/508791.508864},
  doi          = {10.1145/508791.508864},
  timestamp    = {Tue, 06 Nov 2018 11:06:47 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/FiegeMG02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/GartnerP02,
  author       = {Felix C. G{\"{a}}rtner and
                  Stefan Pleisch},
  editor       = {Dahlia Malkhi},
  title        = {Failure Detection Sequencers: Necessary and Sufficient Information
                  about Failures to Solve Predicate Detection},
  booktitle    = {Distributed Computing, 16th International Conference, {DISC} 2002,
                  Toulouse, France, October 28-30, 2002 Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2508},
  pages        = {280--294},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36108-1\_19},
  doi          = {10.1007/3-540-36108-1\_19},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/wdag/GartnerP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Freiling01,
  author       = {Felix C. Freiling},
  title        = {Formale Grundlagen der Fehlertoleranz in verteilten Systemen},
  school       = {Darmstadt University of Technology, Germany},
  year         = {2001},
  url          = {http://elib.tu-darmstadt.de/diss/000162/gaertner.pdf},
  urn          = {urn:nbn:de:tuda-tuprints-1621},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Freiling01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/welcom/VogtPG01,
  author       = {Holger Vogt and
                  Henning Pagnia and
                  Felix C. G{\"{a}}rtner},
  editor       = {Ludger Fiege and
                  Gero M{\"{u}}hl and
                  Uwe G. Wilhelm},
  title        = {Using Smart Cards for Fair Exchange},
  booktitle    = {Electronic Commerce, Second International Workshop, {WELCOM} 2001
                  Heidelberg, Germany, November 16-17, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2232},
  pages        = {101--113},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45598-1\_11},
  doi          = {10.1007/3-540-45598-1\_11},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/welcom/VogtPG01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wss/GartnerP01,
  author       = {Felix C. G{\"{a}}rtner and
                  Stefan Pleisch},
  editor       = {Ajoy Kumar Datta and
                  Ted Herman},
  title        = {(Im)Possibilities of Predicate Detection in Crash-Affected Systems},
  booktitle    = {Self-Stabilizing Systems, 5th International Workshop, {WSS} 2001,
                  Lisbon, Portugal, October 1-2, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2194},
  pages        = {98--113},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45438-1\_7},
  doi          = {10.1007/3-540-45438-1\_7},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/wss/GartnerP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/gi/Gartner01,
  author       = {Felix C. G{\"{a}}rtner},
  editor       = {Heinz Beilner and
                  Herbert Fiedler and
                  Oliver G{\"{u}}nther and
                  Steffen H{\"{o}}lldobler and
                  G{\"{u}}nter Hotz and
                  Peter Liggesmeyer and
                  Klaus{-}Peter L{\"{o}}hr and
                  R{\"{u}}diger Reischuk and
                  Dorothea Wagner},
  title        = {Formale Grundlagen der Fehlertoleranz in verteilten Systemen},
  booktitle    = {Ausgezeichnete Informatikdissertationen 2001},
  series       = {{LNI}},
  volume       = {{D-2}},
  pages        = {39--49},
  publisher    = {{GI}},
  year         = {2001},
  url          = {https://dl.gi.de/handle/20.500.12116/4445},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gi/Gartner01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jetai/MantelG00,
  author       = {Heiko Mantel and
                  Felix C. G{\"{a}}rtner},
  title        = {A case study in the mechanical verification of fault tolerance},
  journal      = {J. Exp. Theor. Artif. Intell.},
  volume       = {12},
  number       = {4},
  pages        = {473--487},
  year         = {2000},
  url          = {https://doi.org/10.1080/095281300454847},
  doi          = {10.1080/095281300454847},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jetai/MantelG00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/flairs/MantelG00,
  author       = {Heiko Mantel and
                  Felix C. G{\"{a}}rtner},
  editor       = {James N. Etheredge and
                  Bill Z. Manaris},
  title        = {A Case Study in the Mechanical Verification of Fault Tolerance},
  booktitle    = {Proceedings of the Thirteenth International Florida Artificial Intelligence
                  Research Society Conference, May 22-24, 2000, Orlando, Florida, {USA}},
  pages        = {341--345},
  publisher    = {{AAAI} Press},
  year         = {2000},
  url          = {http://www.aaai.org/Library/FLAIRS/2000/flairs00-064.php},
  timestamp    = {Wed, 26 Oct 2022 08:35:35 +0200},
  biburl       = {https://dblp.org/rec/conf/flairs/MantelG00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gi/TheisenG00,
  author       = {Marc Theisen and
                  Felix C. G{\"{a}}rtner},
  editor       = {Kurt Mehlhorn and
                  Gregor Snelting},
  title        = {Correctness Preserving Transformations for the Design of Parallelized
                  Low-Power Systems},
  booktitle    = {Informatik 2000, Neue Horizonte im neuen Jahrhundert 30. Jahrestagung
                  der Gesellschaft f{\"{u}}r Informatik Berlin, 19.-22. September
                  2000},
  series       = {Informatik aktuell},
  pages        = {165--180},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-642-58322-3\_15},
  doi          = {10.1007/978-3-642-58322-3\_15},
  timestamp    = {Thu, 27 Jun 2019 11:28:34 +0200},
  biburl       = {https://dblp.org/rec/conf/gi/TheisenG00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ma/PagniaVGW00,
  author       = {Henning Pagnia and
                  Holger Vogt and
                  Felix C. G{\"{a}}rtner and
                  Uwe G. Wilhelm},
  editor       = {David Kotz and
                  Friedemann Mattern},
  title        = {Solving Fair Exchange with Mobile Agents},
  booktitle    = {Agent Systems, Mobile Agents, and Applications, Second International
                  Symposium on Agent Systems and Applications and Fourth International
                  Symposium on Mobile Agents, {ASA/MA} 2000, Z{\"{u}}rich, Switzerland,
                  September 13-15, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1882},
  pages        = {57--72},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-45347-5\_6},
  doi          = {10.1007/978-3-540-45347-5\_6},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/ma/PagniaVGW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/GartnerK00,
  author       = {Felix C. G{\"{a}}rtner and
                  Sven Kloppenburg},
  title        = {Consistent Detection of Global Predicates under a Weak Fault Assumption},
  booktitle    = {19th {IEEE} Symposium on Reliable Distributed Systems, SRDS'00, N{\"{u}}rnberg,
                  Germany, October 16-18, 2000, Proceedings},
  pages        = {94--103},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/RELDI.2000.885397},
  doi          = {10.1109/RELDI.2000.885397},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/GartnerK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/Gartner99,
  author       = {Felix C. G{\"{a}}rtner},
  title        = {Fundamentals of Fault-Tolerant Distributed Computing in Asynchronous
                  Environments},
  journal      = {{ACM} Comput. Surv.},
  volume       = {31},
  number       = {1},
  pages        = {1--26},
  year         = {1999},
  url          = {https://doi.org/10.1145/311531.311532},
  doi          = {10.1145/311531.311532},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/Gartner99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/Gartner99,
  author       = {Felix C. G{\"{a}}rtner},
  title        = {Transformational Approaches to the Specification and Verification
                  of Fault-Tolerant Systems: Formal Background and Classification},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {5},
  number       = {10},
  pages        = {668--692},
  year         = {1999},
  url          = {https://doi.org/10.3217/jucs-005-10-0668},
  doi          = {10.3217/JUCS-005-10-0668},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jucs/Gartner99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/VogtPG99,
  author       = {Holger Vogt and
                  Henning Pagnia and
                  Felix C. G{\"{a}}rtner},
  title        = {Modular Fair Exchange Protocols for Electronic Commerce},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {3--11},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816008},
  doi          = {10.1109/CSAC.1999.816008},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/VogtPG99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gi/GartnerT99,
  author       = {Felix C. G{\"{a}}rtner and
                  Marc Theisen},
  editor       = {Kurt Beiersd{\"{o}}rfer and
                  Gregor Engels and
                  Wilhelm Sch{\"{a}}fer},
  title        = {Transformationen zur parallelisierten und fehlertoleranten Informationsverarbeitung},
  booktitle    = {Informatik '99 - Informatik {\"{u}}berwindet Grenzen, 29. Jahrestagung
                  der Gesellschaft f{\"{u}}r Informatik, Paderborn, 5.-9. Oktober
                  1999},
  series       = {Informatik Aktuell},
  pages        = {207--214},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/978-3-662-01069-3\_31},
  doi          = {10.1007/978-3-662-01069-3\_31},
  timestamp    = {Tue, 23 May 2017 01:10:32 +0200},
  biburl       = {https://dblp.org/rec/conf/gi/GartnerT99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/GartnerPV99,
  author       = {Felix C. G{\"{a}}rtner and
                  Henning Pagnia and
                  Holger Vogt},
  title        = {Approaching a Formal Definition of Fairness in Electronic Commerce},
  booktitle    = {The Eighteenth Symposium on Reliable Distributed Systems, {SRDS} 1999,
                  Lausanne, Switzerland, October 19-22, 1999, Proceedings},
  pages        = {354--359},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/RELDIS.1999.805123},
  doi          = {10.1109/RELDIS.1999.805123},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/GartnerPV99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wss/TheelG99,
  author       = {Oliver E. Theel and
                  Felix C. G{\"{a}}rtner},
  editor       = {Anish Arora},
  title        = {An exercise in proving convergence through transfer functions},
  booktitle    = {1999 {ICDCS} Workshop on Self-stabilizing Systems, Austin, Texas,
                  USA, June 5, 1999, Proceedings},
  pages        = {41--47},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  timestamp    = {Mon, 18 Jun 2018 20:48:42 +0200},
  biburl       = {https://dblp.org/rec/conf/wss/TheelG99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wss/GartnerP99,
  author       = {Felix C. G{\"{a}}rtner and
                  Henning Pagnia},
  editor       = {Anish Arora},
  title        = {Self-stabilizing load distribution for replicated servers on a per-access
                  basis},
  booktitle    = {1999 {ICDCS} Workshop on Self-stabilizing Systems, Austin, Texas,
                  USA, June 5, 1999, Proceedings},
  pages        = {102--109},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  timestamp    = {Mon, 30 Dec 2002 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wss/GartnerP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/insk/Gartner98,
  author       = {Felix C. G{\"{a}}rtner},
  title        = {Aller Jahre wieder ... Eine fiktive Leidensgeschichte},
  journal      = {Inform. Spektrum},
  volume       = {21},
  number       = {3},
  pages        = {161},
  year         = {1998},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/insk/Gartner98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics