Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "Michael Backes"
@inproceedings{DBLP:conf/tacas/FengHBITWPB24, author = {Nick Feng and Alan J. Hu and Sam Bayless and Syed M. Iqbal and Patrick Trentin and Mike Whalen and Lee Pike and John Backes}, editor = {Bernd Finkbeiner and Laura Kov{\'{a}}cs}, title = {{DRAT} Proofs of Unsatisfiability for {SAT} Modulo Monotonic Theories}, booktitle = {Tools and Algorithms for the Construction and Analysis of Systems - 30th International Conference, {TACAS} 2024, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2024, Luxembourg City, Luxembourg, April 6-11, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14570}, pages = {3--23}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57246-3\_1}, doi = {10.1007/978-3-031-57246-3\_1}, timestamp = {Sun, 14 Apr 2024 18:32:16 +0200}, biburl = {https://dblp.org/rec/conf/tacas/FengHBITWPB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wacv/ZhangYW0Z24, author = {Minxing Zhang and Ning Yu and Rui Wen and Michael Backes and Yang Zhang}, title = {Generated Distributions Are All You Need for Membership Inference Attacks Against Generative Models}, booktitle = {{IEEE/CVF} Winter Conference on Applications of Computer Vision, {WACV} 2024, Waikoloa, HI, USA, January 3-8, 2024}, pages = {4827--4837}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/WACV57701.2024.00477}, doi = {10.1109/WACV57701.2024.00477}, timestamp = {Wed, 17 Apr 2024 07:41:22 +0200}, biburl = {https://dblp.org/rec/conf/wacv/ZhangYW0Z24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-05561, author = {Lichao Sun and Yue Huang and Haoran Wang and Siyuan Wu and Qihui Zhang and Chujie Gao and Yixin Huang and Wenhan Lyu and Yixuan Zhang and Xiner Li and Zhengliang Liu and Yixin Liu and Yijue Wang and Zhikun Zhang and Bhavya Kailkhura and Caiming Xiong and Chaowei Xiao and Chunyuan Li and Eric P. Xing and Furong Huang and Hao Liu and Heng Ji and Hongyi Wang and Huan Zhang and Huaxiu Yao and Manolis Kellis and Marinka Zitnik and Meng Jiang and Mohit Bansal and James Zou and Jian Pei and Jian Liu and Jianfeng Gao and Jiawei Han and Jieyu Zhao and Jiliang Tang and Jindong Wang and John Mitchell and Kai Shu and Kaidi Xu and Kai{-}Wei Chang and Lifang He and Lifu Huang and Michael Backes and Neil Zhenqiang Gong and Philip S. Yu and Pin{-}Yu Chen and Quanquan Gu and Ran Xu and Rex Ying and Shuiwang Ji and Suman Jana and Tianlong Chen and Tianming Liu and Tianyi Zhou and William Wang and Xiang Li and Xiangliang Zhang and Xiao Wang and Xing Xie and Xun Chen and Xuyu Wang and Yan Liu and Yanfang Ye and Yinzhi Cao and Yue Zhao}, title = {TrustLLM: Trustworthiness in Large Language Models}, journal = {CoRR}, volume = {abs/2401.05561}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.05561}, doi = {10.48550/ARXIV.2401.05561}, eprinttype = {arXiv}, eprint = {2401.05561}, timestamp = {Tue, 23 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-05561.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-10703, author = {Nick Feng and Alan J. Hu and Sam Bayless and Syed M. Iqbal and Patrick Trentin and Mike Whalen and Lee Pike and John Backes}, title = {{DRAT} Proofs of Unsatisfiability for {SAT} Modulo Monotonic Theories}, journal = {CoRR}, volume = {abs/2401.10703}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.10703}, doi = {10.48550/ARXIV.2401.10703}, eprinttype = {arXiv}, eprint = {2401.10703}, timestamp = {Fri, 02 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-10703.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-12233, author = {Wenhao Wang and Muhammad Ahmad Kaleem and Adam Dziedzic and Michael Backes and Nicolas Papernot and Franziska Boenisch}, title = {Memorization in Self-Supervised Learning Improves Downstream Generalization}, journal = {CoRR}, volume = {abs/2401.12233}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.12233}, doi = {10.48550/ARXIV.2401.12233}, eprinttype = {arXiv}, eprint = {2401.12233}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-12233.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-02987, author = {Junjie Chu and Zeyang Sha and Michael Backes and Yang Zhang}, title = {Conversation Reconstruction Attack Against {GPT} Models}, journal = {CoRR}, volume = {abs/2402.02987}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.02987}, doi = {10.48550/ARXIV.2402.02987}, eprinttype = {arXiv}, eprint = {2402.02987}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-02987.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-05668, author = {Junjie Chu and Yugeng Liu and Ziqing Yang and Xinyue Shen and Michael Backes and Yang Zhang}, title = {Comprehensive Assessment of Jailbreak Attacks Against LLMs}, journal = {CoRR}, volume = {abs/2402.05668}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.05668}, doi = {10.48550/ARXIV.2402.05668}, eprinttype = {arXiv}, eprint = {2402.05668}, timestamp = {Wed, 14 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-05668.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-09179, author = {Rui Zhang and Hongwei Li and Rui Wen and Wenbo Jiang and Yuan Zhang and Michael Backes and Yun Shen and Yang Zhang}, title = {Rapid Adoption, Hidden Risks: The Dual Impact of Large Language Model Customization}, journal = {CoRR}, volume = {abs/2402.09179}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.09179}, doi = {10.48550/ARXIV.2402.09179}, eprinttype = {arXiv}, eprint = {2402.09179}, timestamp = {Mon, 19 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-09179.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ml/SmithGBA23, author = {Michael Thomas Smith and Kathrin Grosse and Michael Backes and Mauricio A. {\'{A}}lvarez}, title = {Adversarial vulnerability bounds for Gaussian process classification}, journal = {Mach. Learn.}, volume = {112}, number = {3}, pages = {971--1009}, year = {2023}, url = {https://doi.org/10.1007/s10994-022-06224-6}, doi = {10.1007/S10994-022-06224-6}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ml/SmithGBA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/TizioSSBSK23, author = {Giorgio Di Tizio and Patrick Speicher and Milivoj Simeonovski and Michael Backes and Ben Stock and Robert K{\"{u}}nnemann}, title = {Pareto-optimal Defenses for the Web Infrastructure: Theory and Practice}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {2}, pages = {18:1--18:36}, year = {2023}, url = {https://doi.org/10.1145/3567595}, doi = {10.1145/3567595}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/TizioSSBSK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/QuSH0Z023, author = {Yiting Qu and Xinyue Shen and Xinlei He and Michael Backes and Savvas Zannettou and Yang Zhang}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Unsafe Diffusion: On the Generation of Unsafe Images and Hateful Memes From Text-To-Image Models}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {3403--3417}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3616679}, doi = {10.1145/3576915.3616679}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/QuSH0Z023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/ShaHY0023, author = {Zeyang Sha and Xinlei He and Ning Yu and Michael Backes and Yang Zhang}, title = {Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image Encoders}, booktitle = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition, {CVPR} 2023, Vancouver, BC, Canada, June 17-24, 2023}, pages = {16373--16383}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CVPR52729.2023.01571}, doi = {10.1109/CVPR52729.2023.01571}, timestamp = {Tue, 29 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/ShaHY0023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/00020000023, author = {Rui Wen and Zhengyu Zhao and Zhuoran Liu and Michael Backes and Tianhao Wang and Yang Zhang}, title = {Is Adversarial Training Really a Silver Bullet for Mitigating Data Poisoning?}, booktitle = {The Eleventh International Conference on Learning Representations, {ICLR} 2023, Kigali, Rwanda, May 1-5, 2023}, publisher = {OpenReview.net}, year = {2023}, url = {https://openreview.net/pdf?id=zKvm1ETDOq}, timestamp = {Fri, 30 Jun 2023 14:38:38 +0200}, biburl = {https://dblp.org/rec/conf/iclr/00020000023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/0002HL0HBZ23, author = {Ziqing Yang and Xinlei He and Zheng Li and Michael Backes and Mathias Humbert and Pascal Berrang and Yang Zhang}, editor = {Andreas Krause and Emma Brunskill and Kyunghyun Cho and Barbara Engelhardt and Sivan Sabato and Jonathan Scarlett}, title = {Data Poisoning Attacks Against Multimodal Encoders}, booktitle = {International Conference on Machine Learning, {ICML} 2023, 23-29 July 2023, Honolulu, Hawaii, {USA}}, series = {Proceedings of Machine Learning Research}, volume = {202}, pages = {39299--39313}, publisher = {{PMLR}}, year = {2023}, url = {https://proceedings.mlr.press/v202/yang23f.html}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icml/0002HL0HBZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/MaZYH0S023, author = {Yihan Ma and Zhikun Zhang and Ning Yu and Xinlei He and Michael Backes and Yun Shen and Yang Zhang}, editor = {Andreas Krause and Emma Brunskill and Kyunghyun Cho and Barbara Engelhardt and Sivan Sabato and Jonathan Scarlett}, title = {Generated Graph Detection}, booktitle = {International Conference on Machine Learning, {ICML} 2023, 23-29 July 2023, Honolulu, Hawaii, {USA}}, series = {Proceedings of Machine Learning Research}, volume = {202}, pages = {23412--23428}, publisher = {{PMLR}}, year = {2023}, url = {https://proceedings.mlr.press/v202/ma23h.html}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icml/MaZYH0S023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LiuL0S023, author = {Yugeng Liu and Zheng Li and Michael Backes and Yun Shen and Yang Zhang}, title = {Backdoor Attacks Against Dataset Distillation}, booktitle = {30th Annual Network and Distributed System Security Symposium, {NDSS} 2023, San Diego, California, USA, February 27 - March 3, 2023}, publisher = {The Internet Society}, year = {2023}, url = {https://www.ndss-symposium.org/ndss-paper/backdoor-attacks-against-dataset-distillation/}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/LiuL0S023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Lyastani0B23, author = {Sanam Ghorbani Lyastani and Michael Backes and Sven Bugiel}, title = {A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites}, booktitle = {30th Annual Network and Distributed System Security Symposium, {NDSS} 2023, San Diego, California, USA, February 27 - March 3, 2023}, publisher = {The Internet Society}, year = {2023}, url = {https://www.ndss-symposium.org/ndss-paper/a-systematic-study-of-the-consistency-of-two-factor-authentication-user-journeys-on-top-ranked-websites/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/Lyastani0B23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/RasifardG0N23, author = {Hamed Rasifard and Rahul Gopinath and Michael Backes and Hamed Nemati}, editor = {Silvio Ranise and Roberto Carbone and Daniel Takabi}, title = {{SEAL:} Capability-Based Access Control for Data-Analytic Scenarios}, booktitle = {Proceedings of the 28th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2023, Trento, Italy, June 7-9, 2023}, pages = {67--78}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3589608.3593838}, doi = {10.1145/3589608.3593838}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/RasifardG0N23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/QuHPBZZ23, author = {Yiting Qu and Xinlei He and Shannon Pierson and Michael Backes and Yang Zhang and Savvas Zannettou}, title = {On the Evolution of (Hateful) Memes by Means of Multimodal Contrastive Learning}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {293--310}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179315}, doi = {10.1109/SP46215.2023.10179315}, timestamp = {Thu, 27 Jul 2023 08:17:10 +0200}, biburl = {https://dblp.org/rec/conf/sp/QuHPBZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/0032000023, author = {Min Chen and Zhikun Zhang and Tianhao Wang and Michael Backes and Yang Zhang}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {{FACE-AUDITOR:} Data Auditing in Facial Recognition Systems}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {7195--7212}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/chen-min}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/0032000023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LiY00F023, author = {Zheng Li and Ning Yu and Ahmed Salem and Michael Backes and Mario Fritz and Yang Zhang}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {UnGANable: Defending Against GAN-based Face Manipulation}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {7213--7230}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/li-zheng}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LiY00F023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Si00023, author = {Wai Man Si and Michael Backes and Yang Zhang and Ahmed Salem}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Two-in-One: {A} Model Hijacking Attack Against Text Generation Models}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {2223--2240}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/si}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Si00023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/StaicuRK023, author = {Cristian{-}Alexandru Staicu and Sazzadur Rahaman and {\'{A}}gnes Kiss and Michael Backes}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {6133--6150}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/staicu}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/StaicuRK023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Wang00H00023, author = {Haiming Wang and Zhikun Zhang and Tianhao Wang and Shibo He and Michael Backes and Jiming Chen and Yang Zhang}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov Models}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {1649--1666}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/wang-haiming}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Wang00H00023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-01197, author = {Yugeng Liu and Zheng Li and Michael Backes and Yun Shen and Yang Zhang}, title = {Backdoor Attacks Against Dataset Distillation}, journal = {CoRR}, volume = {abs/2301.01197}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.01197}, doi = {10.48550/ARXIV.2301.01197}, eprinttype = {arXiv}, eprint = {2301.01197}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-01197.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-09923, author = {Xinyue Shen and Yiting Qu and Michael Backes and Yang Zhang}, title = {Prompt Stealing Attacks Against Text-to-Image Generation Models}, journal = {CoRR}, volume = {abs/2302.09923}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.09923}, doi = {10.48550/ARXIV.2302.09923}, eprinttype = {arXiv}, eprint = {2302.09923}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-09923.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-05266, author = {Ziqing Yang and Zeyang Sha and Michael Backes and Yang Zhang}, title = {From Visual Prompt Learning to Zero-Shot Transfer: Mapping Is All You Need}, journal = {CoRR}, volume = {abs/2303.05266}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.05266}, doi = {10.48550/ARXIV.2303.05266}, eprinttype = {arXiv}, eprint = {2303.05266}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-05266.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-14822, author = {Xinlei He and Xinyue Shen and Zeyuan Chen and Michael Backes and Yang Zhang}, title = {MGTBench: Benchmarking Machine-Generated Text Detection}, journal = {CoRR}, volume = {abs/2303.14822}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.14822}, doi = {10.48550/ARXIV.2303.14822}, eprinttype = {arXiv}, eprint = {2303.14822}, timestamp = {Sat, 17 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-14822.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-02782, author = {Min Chen and Zhikun Zhang and Tianhao Wang and Michael Backes and Yang Zhang}, title = {{FACE-AUDITOR:} Data Auditing in Facial Recognition Systems}, journal = {CoRR}, volume = {abs/2304.02782}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.02782}, doi = {10.48550/ARXIV.2304.02782}, eprinttype = {arXiv}, eprint = {2304.02782}, timestamp = {Sun, 28 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-02782.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-08979, author = {Xinyue Shen and Zeyuan Chen and Michael Backes and Yang Zhang}, title = {In ChatGPT We Trust? Measuring and Characterizing the Reliability of ChatGPT}, journal = {CoRR}, volume = {abs/2304.08979}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.08979}, doi = {10.48550/ARXIV.2304.08979}, eprinttype = {arXiv}, eprint = {2304.08979}, timestamp = {Sat, 17 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-08979.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-07406, author = {Wai Man Si and Michael Backes and Yang Zhang and Ahmed Salem}, title = {Two-in-One: {A} Model Hijacking Attack Against Text Generation Models}, journal = {CoRR}, volume = {abs/2305.07406}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.07406}, doi = {10.48550/ARXIV.2305.07406}, eprinttype = {arXiv}, eprint = {2305.07406}, timestamp = {Thu, 10 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-07406.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-12502, author = {Yugeng Liu and Zheng Li and Michael Backes and Yun Shen and Yang Zhang}, title = {Watermarking Diffusion Model}, journal = {CoRR}, volume = {abs/2305.12502}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.12502}, doi = {10.48550/ARXIV.2305.12502}, eprinttype = {arXiv}, eprint = {2305.12502}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-12502.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-13873, author = {Yiting Qu and Xinyue Shen and Xinlei He and Michael Backes and Savvas Zannettou and Yang Zhang}, title = {Unsafe Diffusion: On the Generation of Unsafe Images and Hateful Memes From Text-To-Image Models}, journal = {CoRR}, volume = {abs/2305.13873}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.13873}, doi = {10.48550/ARXIV.2305.13873}, eprinttype = {arXiv}, eprint = {2305.13873}, timestamp = {Sat, 17 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-13873.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-01747, author = {Peihua Ma and Yixin Wu and Ning Yu and Yang Zhang and Michael Backes and Qin Wang and Cheng{-}I Wei}, title = {Vision-language models boost food composition compilation}, journal = {CoRR}, volume = {abs/2306.01747}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.01747}, doi = {10.48550/ARXIV.2306.01747}, eprinttype = {arXiv}, eprint = {2306.01747}, timestamp = {Sat, 17 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-01747.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-07754, author = {Yihan Ma and Zhengyu Zhao and Xinlei He and Zheng Li and Michael Backes and Yang Zhang}, title = {Generative Watermarking Against Unauthorized Subject-Driven Image Synthesis}, journal = {CoRR}, volume = {abs/2306.07754}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.07754}, doi = {10.48550/ARXIV.2306.07754}, eprinttype = {arXiv}, eprint = {2306.07754}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-07754.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-07758, author = {Yihan Ma and Zhikun Zhang and Ning Yu and Xinlei He and Michael Backes and Yun Shen and Yang Zhang}, title = {Generated Graph Detection}, journal = {CoRR}, volume = {abs/2306.07758}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.07758}, doi = {10.48550/ARXIV.2306.07758}, eprinttype = {arXiv}, eprint = {2306.07758}, timestamp = {Wed, 16 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-07758.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-08681, author = {Matthis Kruse and Michael Backes and Marco Patrignani}, title = {Secure Composition of Robust and Optimising Compilers}, journal = {CoRR}, volume = {abs/2307.08681}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.08681}, doi = {10.48550/ARXIV.2307.08681}, eprinttype = {arXiv}, eprint = {2307.08681}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-08681.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-03558, author = {Wai Man Si and Michael Backes and Yang Zhang}, title = {Mondrian: Prompt Abstraction Attack Against Large Language Models for Cheaper {API} Pricing}, journal = {CoRR}, volume = {abs/2308.03558}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.03558}, doi = {10.48550/ARXIV.2308.03558}, eprinttype = {arXiv}, eprint = {2308.03558}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-03558.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-03825, author = {Xinyue Shen and Zeyuan Chen and Michael Backes and Yun Shen and Yang Zhang}, title = {"Do Anything Now": Characterizing and Evaluating In-The-Wild Jailbreak Prompts on Large Language Models}, journal = {CoRR}, volume = {abs/2308.03825}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.03825}, doi = {10.48550/ARXIV.2308.03825}, eprinttype = {arXiv}, eprint = {2308.03825}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-03825.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-04933, author = {Bartlomiej Surma and Tahleen A. Rahman and Monique M. B. Breteler and Michael Backes and Yang Zhang}, title = {You Are How You Walk: Quantifying Privacy Risks in Step Count Data}, journal = {CoRR}, volume = {abs/2308.04933}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.04933}, doi = {10.48550/ARXIV.2308.04933}, eprinttype = {arXiv}, eprint = {2308.04933}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-04933.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-07847, author = {Yugeng Liu and Tianshuo Cong and Zhengyu Zhao and Michael Backes and Yun Shen and Yang Zhang}, title = {Robustness Over Time: Understanding Adversarial Examples' Effectiveness on Longitudinal Versions of Large Language Models}, journal = {CoRR}, volume = {abs/2308.07847}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.07847}, doi = {10.48550/ARXIV.2308.07847}, eprinttype = {arXiv}, eprint = {2308.07847}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-07847.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-04539, author = {Minxing Zhang and Michael Backes and Xiao Zhang}, title = {Generating Less Certain Adversarial Examples Improves Robust Generalization}, journal = {CoRR}, volume = {abs/2310.04539}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.04539}, doi = {10.48550/ARXIV.2310.04539}, eprinttype = {arXiv}, eprint = {2310.04539}, timestamp = {Fri, 20 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-04539.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-05141, author = {Yiyong Liu and Michael Backes and Xiao Zhang}, title = {Transferable Availability Poisoning Attacks}, journal = {CoRR}, volume = {abs/2310.05141}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.05141}, doi = {10.48550/ARXIV.2310.05141}, eprinttype = {arXiv}, eprint = {2310.05141}, timestamp = {Fri, 20 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-05141.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-07632, author = {Hai Huang and Zhengyu Zhao and Michael Backes and Yun Shen and Yang Zhang}, title = {Prompt Backdoors in Visual Prompt Learning}, journal = {CoRR}, volume = {abs/2310.07632}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.07632}, doi = {10.48550/ARXIV.2310.07632}, eprinttype = {arXiv}, eprint = {2310.07632}, timestamp = {Tue, 24 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-07632.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-07676, author = {Hai Huang and Zhengyu Zhao and Michael Backes and Yun Shen and Yang Zhang}, title = {Composite Backdoor Attacks Against Large Language Models}, journal = {CoRR}, volume = {abs/2310.07676}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.07676}, doi = {10.48550/ARXIV.2310.07676}, eprinttype = {arXiv}, eprint = {2310.07676}, timestamp = {Tue, 24 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-07676.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-08732, author = {Yuan Xin and Michael Backes and Xiao Zhang}, title = {Provably Robust Cost-Sensitive Learning via Randomized Smoothing}, journal = {CoRR}, volume = {abs/2310.08732}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.08732}, doi = {10.48550/ARXIV.2310.08732}, eprinttype = {arXiv}, eprint = {2310.08732}, timestamp = {Wed, 25 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-08732.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-11397, author = {Rui Wen and Tianhao Wang and Michael Backes and Yang Zhang and Ahmed Salem}, title = {Last One Standing: {A} Comparative Analysis of Security and Privacy of Soft Prompt Tuning, LoRA, and In-Context Learning}, journal = {CoRR}, volume = {abs/2310.11397}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.11397}, doi = {10.48550/ARXIV.2310.11397}, eprinttype = {arXiv}, eprint = {2310.11397}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-11397.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-11850, author = {Zhengyu Zhao and Hanwei Zhang and Renjue Li and Ronan Sicre and Laurent Amsaleg and Michael Backes and Qi Li and Chao Shen}, title = {Revisiting Transferable Adversarial Image Examples: Attack Categorization, Evaluation Guidelines, and New Insights}, journal = {CoRR}, volume = {abs/2310.11850}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.11850}, doi = {10.48550/ARXIV.2310.11850}, eprinttype = {arXiv}, eprint = {2310.11850}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-11850.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-11970, author = {Yixin Wu and Rui Wen and Michael Backes and Pascal Berrang and Mathias Humbert and Yun Shen and Yang Zhang}, title = {Quantifying Privacy Risks of Prompts in Visual Prompt Learning}, journal = {CoRR}, volume = {abs/2310.11970}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.11970}, doi = {10.48550/ARXIV.2310.11970}, eprinttype = {arXiv}, eprint = {2310.11970}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-11970.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-12665, author = {Boyang Zhang and Zheng Li and Ziqing Yang and Xinlei He and Michael Backes and Mario Fritz and Yang Zhang}, title = {SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models}, journal = {CoRR}, volume = {abs/2310.12665}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.12665}, doi = {10.48550/ARXIV.2310.12665}, eprinttype = {arXiv}, eprint = {2310.12665}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-12665.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-16613, author = {Yixin Wu and Ning Yu and Michael Backes and Yun Shen and Yang Zhang}, title = {On the Proactive Generation of Unsafe Images From Text-To-Image Models Using Benign Prompts}, journal = {CoRR}, volume = {abs/2310.16613}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.16613}, doi = {10.48550/ARXIV.2310.16613}, eprinttype = {arXiv}, eprint = {2310.16613}, timestamp = {Tue, 31 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-16613.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-19410, author = {Minxing Zhang and Ning Yu and Rui Wen and Michael Backes and Yang Zhang}, title = {Generated Distributions Are All You Need for Membership Inference Attacks Against Generative Models}, journal = {CoRR}, volume = {abs/2310.19410}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.19410}, doi = {10.48550/ARXIV.2310.19410}, eprinttype = {arXiv}, eprint = {2310.19410}, timestamp = {Thu, 02 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-19410.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-14685, author = {Boyang Zhang and Xinyue Shen and Wai Man Si and Zeyang Sha and Zeyuan Chen and Ahmed Salem and Yun Shen and Michael Backes and Yang Zhang}, title = {Comprehensive Assessment of Toxicity in ChatGPT}, journal = {CoRR}, volume = {abs/2311.14685}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.14685}, doi = {10.48550/ARXIV.2311.14685}, eprinttype = {arXiv}, eprint = {2311.14685}, timestamp = {Thu, 30 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-14685.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-11213, author = {Yiting Qu and Zhikun Zhang and Yun Shen and Michael Backes and Yang Zhang}, title = {{FAKEPCD:} Fake Point Cloud Detection via Source Attribution}, journal = {CoRR}, volume = {abs/2312.11213}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.11213}, doi = {10.48550/ARXIV.2312.11213}, eprinttype = {arXiv}, eprint = {2312.11213}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-11213.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GrosseLBPBM22, author = {Kathrin Grosse and Taesung Lee and Battista Biggio and Youngja Park and Michael Backes and Ian M. Molloy}, title = {Backdoor smoothing: Demystifying backdoor attacks on deep neural networks}, journal = {Comput. Secur.}, volume = {120}, pages = {102814}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102814}, doi = {10.1016/J.COSE.2022.102814}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GrosseLBPBM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Chen000H022, author = {Min Chen and Zhikun Zhang and Tianhao Wang and Michael Backes and Mathias Humbert and Yang Zhang}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Graph Unlearning}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {499--513}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3559352}, doi = {10.1145/3548606.3559352}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Chen000H022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Huang0S00022, author = {Hai Huang and Zhikun Zhang and Yun Shen and Michael Backes and Qi Li and Yang Zhang}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {On the Privacy Risks of Cell-Based {NAS} Architectures}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {1427--1441}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560619}, doi = {10.1145/3548606.3560619}, timestamp = {Tue, 08 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Huang0S00022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiLHY0022, author = {Zheng Li and Yiyong Liu and Xinlei He and Ning Yu and Michael Backes and Yang Zhang}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Auditing Membership Leakages of Multi-Exit Networks}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {1917--1931}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3559359}, doi = {10.1145/3548606.3559359}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiLHY0022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Liu00022, author = {Yiyong Liu and Zhengyu Zhao and Michael Backes and Yang Zhang}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Membership Inference Attacks by Exploiting Loss Trajectory}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {2085--2098}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560684}, doi = {10.1145/3548606.3560684}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Liu00022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Nguyen0S22, author = {Trung Tin Nguyen and Michael Backes and Ben Stock}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Freely Given Consent?: Studying Consent Notice of Third-Party Tracking and Its Violations of {GDPR} in Android Apps}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {2369--2383}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560564}, doi = {10.1145/3548606.3560564}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Nguyen0S22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShenH0CY0ZS22, author = {Yun Shen and Yufei Han and Zhikun Zhang and Min Chen and Ting Yu and Michael Backes and Yang Zhang and Gianluca Stringhini}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Finding {MNEMON:} Reviving Memories of Node Embeddings}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {2643--2657}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3559358}, doi = {10.1145/3548606.3559358}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShenH0CY0ZS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Si0BCSZ022, author = {Wai Man Si and Michael Backes and Jeremy Blackburn and Emiliano De Cristofaro and Gianluca Stringhini and Savvas Zannettou and Yang Zhang}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Why So Toxic?: Measuring and Triggering Toxic Behavior in Open-Domain Chatbots}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {2659--2673}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560599}, doi = {10.1145/3548606.3560599}, timestamp = {Tue, 08 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Si0BCSZ022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BackesBHP22, author = {Michael Backes and Pascal Berrang and Lucjan Hanzlik and Ivan Pryvalov}, editor = {Vijayalakshmi Atluri and Roberto Di Pietro and Christian Damsgaard Jensen and Weizhi Meng}, title = {A Framework for Constructing Single Secret Leader Election from {MPC}}, booktitle = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13555}, pages = {672--691}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17146-8\_33}, doi = {10.1007/978-3-031-17146-8\_33}, timestamp = {Tue, 27 Sep 2022 21:07:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BackesBHP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/SalemWBMZ22, author = {Ahmed Salem and Rui Wen and Michael Backes and Shiqing Ma and Yang Zhang}, title = {Dynamic Backdoor Attacks Against Machine Learning Models}, booktitle = {7th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2022, Genoa, Italy, June 6-10, 2022}, pages = {703--718}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/EuroSP53844.2022.00049}, doi = {10.1109/EUROSP53844.2022.00049}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/SalemWBMZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwsm/ShenH0BZ022, author = {Xinyue Shen and Xinlei He and Michael Backes and Jeremy Blackburn and Savvas Zannettou and Yang Zhang}, editor = {Ceren Budak and Meeyoung Cha and Daniele Quercia}, title = {On Xing Tian and the Perseverance of Anti-China Sentiment Online}, booktitle = {Proceedings of the Sixteenth International {AAAI} Conference on Web and Social Media, {ICWSM} 2022, Atlanta, Georgia, USA, June 6-9, 2022}, pages = {944--955}, publisher = {{AAAI} Press}, year = {2022}, url = {https://ojs.aaai.org/index.php/ICWSM/article/view/19348}, timestamp = {Wed, 22 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icwsm/ShenH0BZ022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/00010022, author = {Ahmed Salem and Michael Backes and Yang Zhang}, title = {Get a Model! Model Hijacking Attack Against Machine Learning Models}, booktitle = {29th Annual Network and Distributed System Security Symposium, {NDSS} 2022, San Diego, California, USA, April 24-28, 2022}, publisher = {The Internet Society}, year = {2022}, url = {https://www.ndss-symposium.org/ndss-paper/auto-draft-241/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/00010022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/BieringerG0BK22, author = {Lukas Bieringer and Kathrin Grosse and Michael Backes and Battista Biggio and Katharina Krombholz}, editor = {Sonia Chiasson and Apu Kapadia}, title = {Industrial practitioners' mental models of adversarial machine learning}, booktitle = {Eighteenth Symposium on Usable Privacy and Security, {SOUPS} 2022, Boston, MA, USA, August 7-9, 2022}, pages = {97--116}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/soups2022/presentation/bieringer}, timestamp = {Wed, 26 Oct 2022 12:44:43 +0200}, biburl = {https://dblp.org/rec/conf/soups/BieringerG0BK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/000100S022, author = {Zhikun Zhang and Min Chen and Michael Backes and Yun Shen and Yang Zhang}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Inference Attacks Against Graph Neural Networks}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {4543--4560}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/zhang-zhikun}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/000100S022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LiuWH000CF022, author = {Yugeng Liu and Rui Wen and Xinlei He and Ahmed Salem and Zhikun Zhang and Michael Backes and Emiliano De Cristofaro and Mario Fritz and Yang Zhang}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {4525--4542}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/liu-yugeng}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/LiuWH000CF022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-07513, author = {Zeyang Sha and Xinlei He and Ning Yu and Michael Backes and Yang Zhang}, title = {Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image Encoders}, journal = {CoRR}, volume = {abs/2201.07513}, year = {2022}, url = {https://arxiv.org/abs/2201.07513}, eprinttype = {arXiv}, eprint = {2201.07513}, timestamp = {Tue, 21 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-07513.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-06963, author = {Yun Shen and Yufei Han and Zhikun Zhang and Min Chen and Ting Yu and Michael Backes and Yang Zhang and Gianluca Stringhini}, title = {Finding {MNEMON:} Reviving Memories of Node Embeddings}, journal = {CoRR}, volume = {abs/2204.06963}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.06963}, doi = {10.48550/ARXIV.2204.06963}, eprinttype = {arXiv}, eprint = {2204.06963}, timestamp = {Thu, 24 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-06963.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-08935, author = {Xinyue Shen and Xinlei He and Michael Backes and Jeremy Blackburn and Savvas Zannettou and Yang Zhang}, title = {On Xing Tian and the Perseverance of Anti-China Sentiment Online}, journal = {CoRR}, volume = {abs/2204.08935}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.08935}, doi = {10.48550/ARXIV.2204.08935}, eprinttype = {arXiv}, eprint = {2204.08935}, timestamp = {Tue, 21 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-08935.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-11180, author = {Zheng Li and Yiyong Liu and Xinlei He and Ning Yu and Michael Backes and Yang Zhang}, title = {Auditing Membership Leakages of Multi-Exit Networks}, journal = {CoRR}, volume = {abs/2208.11180}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.11180}, doi = {10.48550/ARXIV.2208.11180}, eprinttype = {arXiv}, eprint = {2208.11180}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-11180.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-14933, author = {Yiyong Liu and Zhengyu Zhao and Michael Backes and Yang Zhang}, title = {Membership Inference Attacks by Exploiting Loss Trajectory}, journal = {CoRR}, volume = {abs/2208.14933}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.14933}, doi = {10.48550/ARXIV.2208.14933}, eprinttype = {arXiv}, eprint = {2208.14933}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-14933.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-01688, author = {Hai Huang and Zhikun Zhang and Yun Shen and Michael Backes and Qi Li and Yang Zhang}, title = {On the Privacy Risks of Cell-Based {NAS} Architectures}, journal = {CoRR}, volume = {abs/2209.01688}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.01688}, doi = {10.48550/ARXIV.2209.01688}, eprinttype = {arXiv}, eprint = {2209.01688}, timestamp = {Wed, 09 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-01688.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-03463, author = {Wai Man Si and Michael Backes and Jeremy Blackburn and Emiliano De Cristofaro and Gianluca Stringhini and Savvas Zannettou and Yang Zhang}, title = {Why So Toxic? Measuring and Triggering Toxic Behavior in Open-Domain Chatbots}, journal = {CoRR}, volume = {abs/2209.03463}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.03463}, doi = {10.48550/ARXIV.2209.03463}, eprinttype = {arXiv}, eprint = {2209.03463}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-03463.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-15266, author = {Ziqing Yang and Xinlei He and Zheng Li and Michael Backes and Mathias Humbert and Pascal Berrang and Yang Zhang}, title = {Data Poisoning Attacks Against Multimodal Encoders}, journal = {CoRR}, volume = {abs/2209.15266}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.15266}, doi = {10.48550/ARXIV.2209.15266}, eprinttype = {arXiv}, eprint = {2209.15266}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-15266.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-00581, author = {Haiming Wang and Zhikun Zhang and Tianhao Wang and Shibo He and Michael Backes and Jiming Chen and Yang Zhang}, title = {PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov Model}, journal = {CoRR}, volume = {abs/2210.00581}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.00581}, doi = {10.48550/ARXIV.2210.00581}, eprinttype = {arXiv}, eprint = {2210.00581}, timestamp = {Fri, 07 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-00581.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-00957, author = {Zheng Li and Ning Yu and Ahmed Salem and Michael Backes and Mario Fritz and Yang Zhang}, title = {UnGANable: Defending Against GAN-based Face Manipulation}, journal = {CoRR}, volume = {abs/2210.00957}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.00957}, doi = {10.48550/ARXIV.2210.00957}, eprinttype = {arXiv}, eprint = {2210.00957}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-00957.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-00968, author = {Yixin Wu and Ning Yu and Zheng Li and Michael Backes and Yang Zhang}, title = {Membership Inference Attacks Against Text-to-image Generation Models}, journal = {CoRR}, volume = {abs/2210.00968}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.00968}, doi = {10.48550/ARXIV.2210.00968}, eprinttype = {arXiv}, eprint = {2210.00968}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-00968.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-01632, author = {Xinyue Shen and Xinlei He and Zheng Li and Yun Shen and Michael Backes and Yang Zhang}, title = {Backdoor Attacks in the Supply Chain of Masked Image Modeling}, journal = {CoRR}, volume = {abs/2210.01632}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.01632}, doi = {10.48550/ARXIV.2210.01632}, eprinttype = {arXiv}, eprint = {2210.01632}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-01632.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-09373, author = {Sanam Ghorbani Lyastani and Michael Backes and Sven Bugiel}, title = {A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites (Extended Version)}, journal = {CoRR}, volume = {abs/2210.09373}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.09373}, doi = {10.48550/ARXIV.2210.09373}, eprinttype = {arXiv}, eprint = {2210.09373}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-09373.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-09565, author = {Zhengyu Zhao and Hanwei Zhang and Renjue Li and Ronan Sicre and Laurent Amsaleg and Michael Backes}, title = {Towards Good Practices in Evaluating Transfer Adversarial Attacks}, journal = {CoRR}, volume = {abs/2211.09565}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.09565}, doi = {10.48550/ARXIV.2211.09565}, eprinttype = {arXiv}, eprint = {2211.09565}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-09565.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-06573, author = {Yiting Qu and Xinlei He and Shannon Pierson and Michael Backes and Yang Zhang and Savvas Zannettou}, title = {On the Evolution of (Hateful) Memes by Means of Multimodal Contrastive Learning}, journal = {CoRR}, volume = {abs/2212.06573}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.06573}, doi = {10.48550/ARXIV.2212.06573}, eprinttype = {arXiv}, eprint = {2212.06573}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-06573.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001BHP22, author = {Michael Backes and Pascal Berrang and Lucjan Hanzlik and Ivan Pryvalov}, title = {A framework for constructing Single Secret Leader Election from {MPC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1040}, year = {2022}, url = {https://eprint.iacr.org/2022/1040}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001BHP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Chen0C0MSW021, author = {Xiaoyi Chen and Ahmed Salem and Dingfan Chen and Michael Backes and Shiqing Ma and Qingni Shen and Zhonghai Wu and Yang Zhang}, title = {BadNL: Backdoor Attacks against {NLP} Models with Semantic-preserving Improvements}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {554--569}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485837}, doi = {10.1145/3485832.3485837}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/Chen0C0MSW021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/NguyenNSW021, author = {Trung Tin Nguyen and Duc Cuong Nguyen and Michael Schilling and Gang Wang and Michael Backes}, editor = {Jiannong Cao and Man Ho Au and Zhiqiang Lin and Moti Yung}, title = {Measuring User Perception for Detecting Unexpected Access to Sensitive Resource in Mobile Apps}, booktitle = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021}, pages = {578--592}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3433210.3437511}, doi = {10.1145/3433210.3437511}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiaccs/NguyenNSW021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/BaylessBDJLTJJZ20, author = {Sam Bayless and John D. Backes and Dan DaCosta and Benjamin F. Jones and Nate Launchbury and Patrick Trentin and Kelsey Jewell and Sagar Joshi and Michael Q. Zeng and Nandita Mathews}, editor = {Alexandra Silva and K. Rustan M. Leino}, title = {Debugging Network Reachability with Blocked Paths}, booktitle = {Computer Aided Verification - 33rd International Conference, {CAV} 2021, Virtual Event, July 20-23, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12760}, pages = {851--862}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-81688-9\_39}, doi = {10.1007/978-3-030-81688-9\_39}, timestamp = {Fri, 20 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cav/BaylessBDJLTJJZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Chen000HZ21, author = {Min Chen and Zhikun Zhang and Tianhao Wang and Michael Backes and Mathias Humbert and Yang Zhang}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {When Machine Unlearning Jeopardizes Privacy}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {896--911}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484756}, doi = {10.1145/3460120.3484756}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Chen000HZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FassS0S21, author = {Aurore Fass and Doli{\`{e}}re Francis Som{\'{e}} and Michael Backes and Ben Stock}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {DoubleX: Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {1789--1804}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484745}, doi = {10.1145/3460120.3484745}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/FassS0S21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RothG0KS21, author = {Sebastian Roth and Lea Gr{\"{o}}ber and Michael Backes and Katharina Krombholz and Ben Stock}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {12 Angry Developers - {A} Qualitative Study on Developers' Struggles with {CSP}}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {3085--3103}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484780}, doi = {10.1145/3460120.3484780}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/RothG0KS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Kunnemann0021, author = {Robert K{\"{u}}nnemann and Deepak Garg and Michael Backes}, title = {Accountability in the Decentralised-Adversary Setting}, booktitle = {34th {IEEE} Computer Security Foundations Symposium, {CSF} 2021, Dubrovnik, Croatia, June 21-25, 2021}, pages = {1--16}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CSF51468.2021.00007}, doi = {10.1109/CSF51468.2021.00007}, timestamp = {Fri, 13 Aug 2021 09:20:41 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Kunnemann0021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/Hanzlik0G0A0F21, author = {Lucjan Hanzlik and Yang Zhang and Kathrin Grosse and Ahmed Salem and Maximilian Augustin and Michael Backes and Mario Fritz}, title = {MLCapsule: Guarded Offline Deployment of Machine Learning as a Service}, booktitle = {{IEEE} Conference on Computer Vision and Pattern Recognition Workshops, {CVPR} Workshops 2021, virtual, June 19-25, 2021}, pages = {3300--3309}, publisher = {Computer Vision Foundation / {IEEE}}, year = {2021}, url = {https://openaccess.thecvf.com/content/CVPR2021W/TCV/html/Hanzlik\_MLCapsule\_Guarded\_Offline\_Deployment\_of\_Machine\_Learning\_as\_a\_Service\_CVPRW\_2021\_paper.html}, doi = {10.1109/CVPRW53098.2021.00368}, timestamp = {Mon, 18 Jul 2022 16:47:41 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/Hanzlik0G0A0F21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/MoogD0F21, author = {Marvin Moog and Markus Demmel and Michael Backes and Aurore Fass}, title = {Statically Detecting JavaScript Obfuscation and Minification Techniques in the Wild}, booktitle = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021}, pages = {569--580}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSN48987.2021.00065}, doi = {10.1109/DSN48987.2021.00065}, timestamp = {Mon, 09 Aug 2021 14:50:25 +0200}, biburl = {https://dblp.org/rec/conf/dsn/MoogD0F21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdm/Grosse021, author = {Kathrin Grosse and Michael Backes}, editor = {Carlotta Demeniconi and Ian Davidson}, title = {Do winning tickets exist before {DNN} training?}, booktitle = {Proceedings of the 2021 {SIAM} International Conference on Data Mining, {SDM} 2021, Virtual Event, April 29 - May 1, 2021}, pages = {549--557}, publisher = {{SIAM}}, year = {2021}, url = {https://doi.org/10.1137/1.9781611976700.62}, doi = {10.1137/1.9781611976700.62}, timestamp = {Sat, 21 Aug 2021 11:46:54 +0200}, biburl = {https://dblp.org/rec/conf/sdm/Grosse021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/00010LH0H0021, author = {Zhikun Zhang and Tianhao Wang and Ninghui Li and Jean Honorio and Michael Backes and Shibo He and Jiming Chen and Yang Zhang}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {PrivSyn: Differentially Private Data Synthesis}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {929--946}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/zhang-zhikun}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/00010LH0H0021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/00100B21, author = {Jie Huang and Michael Backes and Sven Bugiel}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {A11y and Privacy don't have to be mutually exclusive: Constraining Accessibility Service Misuse on Android}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3631--3648}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/huang}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/00100B21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Elbitar0N0B21, author = {Yusra Elbitar and Michael Schilling and Trung Tin Nguyen and Michael Backes and Sven Bugiel}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Explanation Beats Context: The Effect of Timing {\&} Rationales on Users' Runtime Permission Decisions}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {785--802}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/elbitar}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Elbitar0N0B21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HeJ0G021, author = {Xinlei He and Jinyuan Jia and Michael Backes and Neil Zhenqiang Gong and Yang Zhang}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Stealing Links from Graph Neural Networks}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2669--2686}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/he-xinlei}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/HeJ0G021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Nguyen0MS21, author = {Trung Tin Nguyen and Michael Backes and Ninja Marnau and Ben Stock}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Share First, Ask Later (or Never?) Studying Violations of GDPR's Explicit Consent in Android Apps}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3667--3684}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/nguyen}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Nguyen0MS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/OltroggeHAA0F21, author = {Marten Oltrogge and Nicolas Huaman and Sabrina Amft and Yasemin Acar and Michael Backes and Sascha Fahl}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Why Eve and Mallory Still Love Android: Revisiting {TLS} (In)Security in Android Applications}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {4347--4364}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/oltrogge}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/OltroggeHAA0F21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-02551, author = {Yugeng Liu and Rui Wen and Xinlei He and Ahmed Salem and Zhikun Zhang and Michael Backes and Emiliano De Cristofaro and Mario Fritz and Yang Zhang}, title = {ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models}, journal = {CoRR}, volume = {abs/2102.02551}, year = {2021}, url = {https://arxiv.org/abs/2102.02551}, eprinttype = {arXiv}, eprint = {2102.02551}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-02551.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-05429, author = {Xinlei He and Rui Wen and Yixin Wu and Michael Backes and Yun Shen and Yang Zhang}, title = {Node-Level Membership Inference Attacks Against Graph Neural Networks}, journal = {CoRR}, volume = {abs/2102.05429}, year = {2021}, url = {https://arxiv.org/abs/2102.05429}, eprinttype = {arXiv}, eprint = {2102.05429}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-05429.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-14991, author = {Min Chen and Zhikun Zhang and Tianhao Wang and Michael Backes and Mathias Humbert and Yang Zhang}, title = {Graph Unlearning}, journal = {CoRR}, volume = {abs/2103.14991}, year = {2021}, url = {https://arxiv.org/abs/2103.14991}, eprinttype = {arXiv}, eprint = {2103.14991}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-14991.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-03726, author = {Lukas Bieringer and Kathrin Grosse and Michael Backes and Katharina Krombholz}, title = {Mental Models of Adversarial Machine Learning}, journal = {CoRR}, volume = {abs/2105.03726}, year = {2021}, url = {https://arxiv.org/abs/2105.03726}, eprinttype = {arXiv}, eprint = {2105.03726}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-03726.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-02631, author = {Zhikun Zhang and Min Chen and Michael Backes and Yun Shen and Yang Zhang}, title = {Inference Attacks Against Graph Neural Networks}, journal = {CoRR}, volume = {abs/2110.02631}, year = {2021}, url = {https://arxiv.org/abs/2110.02631}, eprinttype = {arXiv}, eprint = {2110.02631}, timestamp = {Fri, 22 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-02631.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-05619, author = {Oliver Schranz and Sebastian Weisgerber and Erik Derr and Michael Backes and Sven Bugiel}, title = {Towards a Principled Approach for Dynamic Analysis of Android's Middleware}, journal = {CoRR}, volume = {abs/2110.05619}, year = {2021}, url = {https://arxiv.org/abs/2110.05619}, eprinttype = {arXiv}, eprint = {2110.05619}, timestamp = {Thu, 21 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-05619.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-04394, author = {Ahmed Salem and Michael Backes and Yang Zhang}, title = {Get a Model! Model Hijacking Attack Against Machine Learning Models}, journal = {CoRR}, volume = {abs/2111.04394}, year = {2021}, url = {https://arxiv.org/abs/2111.04394}, eprinttype = {arXiv}, eprint = {2111.04394}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-04394.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-11169, author = {Cristian{-}Alexandru Staicu and Sazzadur Rahaman and {\'{A}}gnes Kiss and Michael Backes}, title = {Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages}, journal = {CoRR}, volume = {abs/2111.11169}, year = {2021}, url = {https://arxiv.org/abs/2111.11169}, eprinttype = {arXiv}, eprint = {2111.11169}, timestamp = {Fri, 26 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-11169.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/debu/TroncosoPHSLLSP20, author = {Carmela Troncoso and Mathias Payer and Jean{-}Pierre Hubaux and Marcel Salath{\'{e}} and James R. Larus and Wouter Lueks and Theresa Stadler and Apostolos Pyrgelis and Daniele Antonioli and Ludovic Barman and Sylvain Chatel and Kenneth G. Paterson and Srdjan Capkun and David A. Basin and Jan Beutel and Dennis Jackson and Marc Roeschlin and Patrick Leu and Bart Preneel and Nigel P. Smart and Aysajan Abidin and Seda Gurses and Michael Veale and Cas Cremers and Michael Backes and Nils Ole Tippenhauer and Reuben Binns and Ciro Cattuto and Alain Barrat and Dario Fiore and Manuel Barbosa and Rui Oliveira and Jos{\'{e}} Pereira}, title = {Decentralized Privacy-Preserving Proximity Tracing}, journal = {{IEEE} Data Eng. Bull.}, volume = {43}, number = {2}, pages = {36--66}, year = {2020}, url = {http://sites.computer.org/debull/A20june/p36.pdf}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/debu/TroncosoPHSLLSP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/EsiyokHKB020, author = {Ilkan Esiyok and Lucjan Hanzlik and Robert K{\"{u}}nnemann and Lena Marie Budde and Michael Backes}, editor = {Mauro Conti and Jianying Zhou and Emiliano Casalicchio and Angelo Spognardi}, title = {TrollThrottle - Raising the Cost of Astroturfing}, booktitle = {Applied Cryptography and Network Security - 18th International Conference, {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12147}, pages = {456--476}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57878-7\_22}, doi = {10.1007/978-3-030-57878-7\_22}, timestamp = {Mon, 28 Sep 2020 14:58:16 +0200}, biburl = {https://dblp.org/rec/conf/acns/EsiyokHKB020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NguyenD0B20, author = {Duc Cuong Nguyen and Erik Derr and Michael Backes and Sven Bugiel}, title = {Up2Dep: Android Tool Support to Fix Insecure Code Dependencies}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {263--276}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427658}, doi = {10.1145/3427228.3427658}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/NguyenD0B20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Roth0S20, author = {Sebastian Roth and Michael Backes and Ben Stock}, editor = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Guofei Gu and Giuseppe Ateniese}, title = {Assessing the Impact of Script Gadgets on {CSP} at Scale}, booktitle = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020}, pages = {420--431}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3320269.3372201}, doi = {10.1145/3320269.3372201}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Roth0S20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/etra/Hagestedt0B20, author = {Inken Hagestedt and Michael Backes and Andreas Bulling}, editor = {Andreas Bulling and Anke Huckauf and Eakta Jain and Ralph Radach and Daniel Weiskopf}, title = {Adversarial Attacks on Classifiers for Eye-based User Modelling}, booktitle = {{ETRA} '20 Adjunct: 2020 Symposium on Eye Tracking Research and Applications, Stuttgart, Germany, June 2-5, 2020, Adjunct Volume}, pages = {44:1--44:3}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3379157.3390511}, doi = {10.1145/3379157.3390511}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/etra/Hagestedt0B20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/HagestedtHBLE0020, author = {Inken Hagestedt and Mathias Humbert and Pascal Berrang and Irina Lehmann and Roland Eils and Michael Backes and Yang Zhang}, title = {Membership Inference Against {DNA} Methylation Databases}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2020, Genoa, Italy, September 7-11, 2020}, pages = {509--520}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EuroSP48549.2020.00039}, doi = {10.1109/EUROSP48549.2020.00039}, timestamp = {Tue, 10 Nov 2020 11:45:04 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/HagestedtHBLE0020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icann/GrosseTM0K20, author = {Kathrin Grosse and Thomas Alexander Trost and Marius Mosbach and Michael Backes and Dietrich Klakow}, editor = {Igor Farkas and Paolo Masulli and Stefan Wermter}, title = {On the Security Relevance of Initial Weights in Deep Neural Networks}, booktitle = {Artificial Neural Networks and Machine Learning - {ICANN} 2020 - 29th International Conference on Artificial Neural Networks, Bratislava, Slovakia, September 15-18, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12396}, pages = {3--14}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-61609-0\_1}, doi = {10.1007/978-3-030-61609-0\_1}, timestamp = {Tue, 20 Oct 2020 17:51:28 +0200}, biburl = {https://dblp.org/rec/conf/icann/GrosseTM0K20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpr/GrosseS020, author = {Kathrin Grosse and Michael T. Smith and Michael Backes}, title = {Killing Four Birds with one Gaussian Process: The Relation between different Test-Time Attacks}, booktitle = {25th International Conference on Pattern Recognition, {ICPR} 2020, Virtual Event / Milan, Italy, January 10-15, 2021}, pages = {4696--4703}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICPR48806.2021.9413290}, doi = {10.1109/ICPR48806.2021.9413290}, timestamp = {Sat, 13 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpr/GrosseS020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/0016HSMV020, author = {Yang Zhang and Mathias Humbert and Bartlomiej Surma and Praveen Manoharan and Jilles Vreeken and Michael Backes}, title = {Towards Plausible Graph Anonymization}, booktitle = {27th Annual Network and Distributed System Security Symposium, {NDSS} 2020, San Diego, California, USA, February 23-26, 2020}, publisher = {The Internet Society}, year = {2020}, url = {https://www.ndss-symposium.org/ndss-paper/towards-plausible-graph-anonymization/}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/0016HSMV020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LyastaniSN0B20, author = {Sanam Ghorbani Lyastani and Michael Schilling and Michaela Neumayr and Michael Backes and Sven Bugiel}, title = {Is {FIDO2} the Kingslayer of User Authentication? {A} Comparative Usability Study of {FIDO2} Passwordless Authentication}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {268--285}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00047}, doi = {10.1109/SP40000.2020.00047}, timestamp = {Thu, 21 Sep 2023 15:57:24 +0200}, biburl = {https://dblp.org/rec/conf/sp/LyastaniSN0B20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/0001B0F020, author = {Ahmed Salem and Apratim Bhattacharya and Michael Backes and Mario Fritz and Yang Zhang}, editor = {Srdjan Capkun and Franziska Roesner}, title = {Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {1291--1308}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/salem}, timestamp = {Fri, 29 Jan 2021 22:08:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/0001B0F020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CalzavaraRR0S20, author = {Stefano Calzavara and Sebastian Roth and Alvise Rabitti and Michael Backes and Ben Stock}, editor = {Srdjan Capkun and Franziska Roesner}, title = {A Tale of Two Headers: {A} Formal Analysis of Inconsistent Click-Jacking Protection on the Web}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {683--697}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/calzavara}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/CalzavaraRR0S20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-00996, author = {Tahleen A. Rahman and Mario Fritz and Michael Backes and Yang Zhang}, title = {Everything About You: {A} Multimodal Approach towards Friendship Inference in Online Social Networks}, journal = {CoRR}, volume = {abs/2003.00996}, year = {2020}, url = {https://arxiv.org/abs/2003.00996}, eprinttype = {arXiv}, eprint = {2003.00996}, timestamp = {Wed, 11 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-00996.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-03675, author = {Ahmed Salem and Rui Wen and Michael Backes and Shiqing Ma and Yang Zhang}, title = {Dynamic Backdoor Attacks Against Machine Learning Models}, journal = {CoRR}, volume = {abs/2003.03675}, year = {2020}, url = {https://arxiv.org/abs/2003.03675}, eprinttype = {arXiv}, eprint = {2003.03675}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-03675.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-08836, author = {Ilkan Esiyok and Lucjan Hanzlik and Robert K{\"{u}}nnemann and Lena Marie Budde and Michael Backes}, title = {Trollthrottle - Raising the Cost of Astroturfing}, journal = {CoRR}, volume = {abs/2004.08836}, year = {2020}, url = {https://arxiv.org/abs/2004.08836}, eprinttype = {arXiv}, eprint = {2004.08836}, timestamp = {Wed, 22 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-08836.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-02131, author = {Xinlei He and Jinyuan Jia and Michael Backes and Neil Zhenqiang Gong and Yang Zhang}, title = {Stealing Links from Graph Neural Networks}, journal = {CoRR}, volume = {abs/2005.02131}, year = {2020}, url = {https://arxiv.org/abs/2005.02131}, eprinttype = {arXiv}, eprint = {2005.02131}, timestamp = {Fri, 08 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-02131.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-02205, author = {Min Chen and Zhikun Zhang and Tianhao Wang and Michael Backes and Mathias Humbert and Yang Zhang}, title = {When Machine Unlearning Jeopardizes Privacy}, journal = {CoRR}, volume = {abs/2005.02205}, year = {2020}, url = {https://arxiv.org/abs/2005.02205}, eprinttype = {arXiv}, eprint = {2005.02205}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-02205.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-12273, author = {Carmela Troncoso and Mathias Payer and Jean{-}Pierre Hubaux and Marcel Salath{\'{e}} and James R. Larus and Edouard Bugnion and Wouter Lueks and Theresa Stadler and Apostolos Pyrgelis and Daniele Antonioli and Ludovic Barman and Sylvain Chatel and Kenneth G. Paterson and Srdjan Capkun and David A. Basin and Jan Beutel and Dennis Jackson and Marc Roeschlin and Patrick Leu and Bart Preneel and Nigel P. Smart and Aysajan Abidin and Seda F. G{\"{u}}rses and Michael Veale and Cas Cremers and Michael Backes and Nils Ole Tippenhauer and Reuben Binns and Ciro Cattuto and Alain Barrat and Dario Fiore and Manuel Barbosa and Rui Oliveira and Jos{\'{e}} Pereira}, title = {Decentralized Privacy-Preserving Proximity Tracing}, journal = {CoRR}, volume = {abs/2005.12273}, year = {2020}, url = {https://arxiv.org/abs/2005.12273}, eprinttype = {arXiv}, eprint = {2005.12273}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-12273.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-00860, author = {Inken Hagestedt and Michael Backes and Andreas Bulling}, title = {Adversarial Attacks on Classifiers for Eye-based User Modelling}, journal = {CoRR}, volume = {abs/2006.00860}, year = {2020}, url = {https://arxiv.org/abs/2006.00860}, eprinttype = {arXiv}, eprint = {2006.00860}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-00860.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-01043, author = {Xiaoyi Chen and Ahmed Salem and Michael Backes and Shiqing Ma and Yang Zhang}, title = {BadNL: Backdoor Attacks Against {NLP} Models}, journal = {CoRR}, volume = {abs/2006.01043}, year = {2020}, url = {https://arxiv.org/abs/2006.01043}, eprinttype = {arXiv}, eprint = {2006.01043}, timestamp = {Wed, 19 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-01043.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-06721, author = {Kathrin Grosse and Taesung Lee and Youngja Park and Michael Backes and Ian M. Molloy}, title = {A new measure for overfitting and its implications for backdooring of deep learning}, journal = {CoRR}, volume = {abs/2006.06721}, year = {2020}, url = {https://arxiv.org/abs/2006.06721}, eprinttype = {arXiv}, eprint = {2006.06721}, timestamp = {Wed, 02 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-06721.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-07014, author = {Kathrin Grosse and Michael Backes}, title = {How many winning tickets are there in one DNN?}, journal = {CoRR}, volume = {abs/2006.07014}, year = {2020}, url = {https://arxiv.org/abs/2006.07014}, eprinttype = {arXiv}, eprint = {2006.07014}, timestamp = {Wed, 17 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-07014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-06993, author = {Nico D{\"{o}}ttling and Kathrin Grosse and Michael Backes and Ian M. Molloy}, title = {Adversarial Examples and Metrics}, journal = {CoRR}, volume = {abs/2007.06993}, year = {2020}, url = {https://arxiv.org/abs/2007.06993}, eprinttype = {arXiv}, eprint = {2007.06993}, timestamp = {Wed, 02 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-06993.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-04872, author = {Yang Zou and Zhikun Zhang and Michael Backes and Yang Zhang}, title = {Privacy Analysis of Deep Learning in the Wild: Membership Inference Attacks against Transfer Learning}, journal = {CoRR}, volume = {abs/2009.04872}, year = {2020}, url = {https://arxiv.org/abs/2009.04872}, eprinttype = {arXiv}, eprint = {2009.04872}, timestamp = {Fri, 23 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-04872.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-03007, author = {Ahmed Salem and Yannick Sautter and Michael Backes and Mathias Humbert and Yang Zhang}, title = {{BAAAN:} Backdoor Attacks Against Autoencoder and GAN-Based Machine Learning Models}, journal = {CoRR}, volume = {abs/2010.03007}, year = {2020}, url = {https://arxiv.org/abs/2010.03007}, eprinttype = {arXiv}, eprint = {2010.03007}, timestamp = {Tue, 13 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-03007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-03282, author = {Ahmed Salem and Michael Backes and Yang Zhang}, title = {Don't Trigger Me! {A} Triggerless Backdoor Attack Against Deep Neural Networks}, journal = {CoRR}, volume = {abs/2010.03282}, year = {2020}, url = {https://arxiv.org/abs/2010.03282}, eprinttype = {arXiv}, eprint = {2010.03282}, timestamp = {Tue, 12 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-03282.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-15128, author = {Zhikun Zhang and Tianhao Wang and Ninghui Li and Jean Honorio and Michael Backes and Shibo He and Jiming Chen and Yang Zhang}, title = {PrivSyn: Differentially Private Data Synthesis}, journal = {CoRR}, volume = {abs/2012.15128}, year = {2020}, url = {https://arxiv.org/abs/2012.15128}, eprinttype = {arXiv}, eprint = {2012.15128}, timestamp = {Fri, 23 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-15128.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/SalemBHB19, author = {Ahmed Salem and Pascal Berrang and Mathias Humbert and Michael Backes}, title = {Privacy-Preserving Similar Patient Queries for Combined Biomedical Data}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2019}, number = {1}, pages = {47--67}, year = {2019}, url = {https://doi.org/10.2478/popets-2019-0004}, doi = {10.2478/POPETS-2019-0004}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/SalemBHB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/software/BackesBCGLRSSTV19, author = {John Backes and Pauline Bolignano and Byron Cook and Andrew Gacek and Kasper S{\o}e Luckow and Neha Rungta and Martin Sch{\"{a}}f and Cole Schlesinger and Rima Tanash and Carsten Varming and Michael W. Whalen}, title = {One-Click Formal Methods}, journal = {{IEEE} Softw.}, volume = {36}, number = {6}, pages = {61--65}, year = {2019}, url = {https://doi.org/10.1109/MS.2019.2930609}, doi = {10.1109/MS.2019.2930609}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/software/BackesBCGLRSSTV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Fass0S19, author = {Aurore Fass and Michael Backes and Ben Stock}, editor = {David Balenson}, title = {JStap: a static pre-filter for malicious JavaScript detection}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {257--269}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359813}, doi = {10.1145/3359789.3359813}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/Fass0S19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0001HS19, author = {Michael Backes and Lucjan Hanzlik and Jonas Schneider{-}Bensch}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Membership Privacy for Fully Dynamic Group Signatures}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {2181--2198}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3354257}, doi = {10.1145/3319535.3354257}, timestamp = {Tue, 10 Nov 2020 20:00:36 +0100}, biburl = {https://dblp.org/rec/conf/ccs/0001HS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Fass0S19, author = {Aurore Fass and Michael Backes and Ben Stock}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {HideNoSeek: Camouflaging Malicious JavaScript in Benign ASTs}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {1899--1913}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3345656}, doi = {10.1145/3319535.3345656}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Fass0S19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JiaSBZG19, author = {Jinyuan Jia and Ahmed Salem and Michael Backes and Yang Zhang and Neil Zhenqiang Gong}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {259--274}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3363201}, doi = {10.1145/3319535.3363201}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JiaSBZG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DaxKT019, author = {Alexander Dax and Robert K{\"{u}}nnemann and Sven Tangermann and Michael Backes}, title = {How to Wrap it up - {A} Formally Verified Proposal for the use of Authenticated Wrapping in PKCS{\#}11}, booktitle = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken, NJ, USA, June 25-28, 2019}, pages = {62--77}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSF.2019.00012}, doi = {10.1109/CSF.2019.00012}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/csfw/DaxKT019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/KunnemannE019, author = {Robert K{\"{u}}nnemann and Ilkan Esiyok and Michael Backes}, title = {Automated Verification of Accountability in Security Protocols}, booktitle = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken, NJ, USA, June 25-28, 2019}, pages = {397--413}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSF.2019.00034}, doi = {10.1109/CSF.2019.00034}, timestamp = {Mon, 09 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/KunnemannE019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/0001DHKS19, author = {Michael Backes and Nico D{\"{o}}ttling and Lucjan Hanzlik and Kamil Kluczniak and Jonas Schneider}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Ring Signatures: Logarithmic-Size, No Setup - from Standard Assumptions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11478}, pages = {281--311}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17659-4\_10}, doi = {10.1007/978-3-030-17659-4\_10}, timestamp = {Fri, 08 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/0001DHKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/HuangBB019, author = {Jie Huang and Nataniel P. Borges Jr. and Sven Bugiel and Michael Backes}, title = {Up-To-Crash: Evaluating Third-Party Library Updatability on Android}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2019, Stockholm, Sweden, June 17-19, 2019}, pages = {15--30}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EuroSP.2019.00012}, doi = {10.1109/EUROSP.2019.00012}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/HuangBB019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/RahmanS0019, author = {Tahleen A. Rahman and Bartlomiej Surma and Michael Backes and Yang Zhang}, editor = {Sarit Kraus}, title = {Fairwalk: Towards Fair Graph Embedding}, booktitle = {Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, {IJCAI} 2019, Macao, China, August 10-16, 2019}, pages = {3289--3295}, publisher = {ijcai.org}, year = {2019}, url = {https://doi.org/10.24963/ijcai.2019/456}, doi = {10.24963/IJCAI.2019/456}, timestamp = {Tue, 24 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/RahmanS0019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Hagestedt0HBT0019, author = {Inken Hagestedt and Yang Zhang and Mathias Humbert and Pascal Berrang and Haixu Tang and XiaoFeng Wang and Michael Backes}, title = {MBeacon: Privacy-Preserving Beacons for {DNA} Methylation Data}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/mbeacon-privacy-preserving-beacons-for-dna-methylation-data/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/Hagestedt0HBT0019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Salem0HBF019, author = {Ahmed Salem and Yang Zhang and Mathias Humbert and Pascal Berrang and Mario Fritz and Michael Backes}, title = {ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/ml-leaks-model-and-data-independent-membership-inference-attacks-and-defenses-on-machine-learning-models/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/Salem0HBF019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BackesHHKP19, author = {Michael Backes and Lucjan Hanzlik and Amir Herzberg and Aniket Kate and Ivan Pryvalov}, editor = {Dongdai Lin and Kazue Sako}, title = {Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains Without Trusted Setup}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11442}, pages = {286--313}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17253-4\_10}, doi = {10.1007/978-3-030-17253-4\_10}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BackesHHKP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/SpeicherS00K19, author = {Patrick Speicher and Marcel Steinmetz and J{\"{o}}rg Hoffmann and Michael Backes and Robert K{\"{u}}nnemann}, editor = {Chih{-}Cheng Hung and George A. Papadopoulos}, title = {Towards automated network mitigation analysis}, booktitle = {Proceedings of the 34th {ACM/SIGAPP} Symposium on Applied Computing, {SAC} 2019, Limassol, Cyprus, April 8-12, 2019}, pages = {1971--1978}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3297280.3297473}, doi = {10.1145/3297280.3297473}, timestamp = {Sun, 02 Jun 2019 21:18:38 +0200}, biburl = {https://dblp.org/rec/conf/sac/SpeicherS00K19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/EskandarianCBBF19, author = {Saba Eskandarian and Jonathan Cogan and Sawyer Birnbaum and Peh Chang Wei Brandon and Dillon Franke and Forest Fraser and Gaspar Garcia Jr. and Eric Gong and Hung T. Nguyen and Taresh K. Sethi and Vishal Subbiah and Michael Backes and Giancarlo Pellegrino and Dan Boneh}, title = {Fidelius: Protecting User Secrets from Compromised Browsers}, booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {264--280}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SP.2019.00036}, doi = {10.1109/SP.2019.00036}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/sp/EskandarianCBBF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/NguyenD0B19, author = {Duc Cuong Nguyen and Erik Derr and Michael Backes and Sven Bugiel}, title = {Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security {\&} Privacy}, booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {555--569}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SP.2019.00012}, doi = {10.1109/SP.2019.00012}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/NguyenD0B19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/corr/abs-1910-14219, author = {Robert K{\"{u}}nnemann and Deepak Garg and Michael Backes}, editor = {Georgiana Caltais and Jean Krivine}, title = {Causality {\&} Control Flow}, booktitle = {Proceedings of the 4th Workshop on Formal Reasoning about Causation, Responsibility, and Explanations in Science and Technology, CREST@ETAPS 2019, Prague, Czech Republic, 7th April 2019}, series = {{EPTCS}}, volume = {308}, pages = {32--46}, year = {2019}, url = {https://doi.org/10.4204/EPTCS.308.3}, doi = {10.4204/EPTCS.308.3}, timestamp = {Thu, 19 Dec 2019 15:19:10 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-14219.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1902-03020, author = {Kathrin Grosse and Thomas Alexander Trost and Marius Mosbach and Michael Backes and Dietrich Klakow}, title = {Adversarial Initialization - when your network performs the way {I} want}, journal = {CoRR}, volume = {abs/1902.03020}, year = {2019}, url = {http://arxiv.org/abs/1902.03020}, eprinttype = {arXiv}, eprint = {1902.03020}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1902-03020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-01067, author = {Ahmed Salem and Apratim Bhattacharyya and Michael Backes and Mario Fritz and Yang Zhang}, title = {Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning}, journal = {CoRR}, volume = {abs/1904.01067}, year = {2019}, url = {http://arxiv.org/abs/1904.01067}, eprinttype = {arXiv}, eprint = {1904.01067}, timestamp = {Tue, 24 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-01067.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-03758, author = {Marie{-}Therese Walter and David Pfaff and Stefan N{\"{u}}rnberger and Michael Backes}, title = {Proconda - Protected Control Data}, journal = {CoRR}, volume = {abs/1909.03758}, year = {2019}, url = {http://arxiv.org/abs/1909.03758}, eprinttype = {arXiv}, eprint = {1909.03758}, timestamp = {Tue, 17 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-03758.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-08864, author = {Michael Thomas Smith and Kathrin Grosse and Michael Backes and Mauricio A. {\'{A}}lvarez}, title = {Adversarial Vulnerability Bounds for Gaussian Process Classification}, journal = {CoRR}, volume = {abs/1909.08864}, year = {2019}, url = {http://arxiv.org/abs/1909.08864}, eprinttype = {arXiv}, eprint = {1909.08864}, timestamp = {Tue, 24 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-08864.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-10594, author = {Jinyuan Jia and Ahmed Salem and Michael Backes and Yang Zhang and Neil Zhenqiang Gong}, title = {MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples}, journal = {CoRR}, volume = {abs/1909.10594}, year = {2019}, url = {http://arxiv.org/abs/1909.10594}, eprinttype = {arXiv}, eprint = {1909.10594}, timestamp = {Tue, 17 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-10594.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-03019, author = {Gonzalo Mateo{-}Garcia and Silviu Oprea and Lewis Smith and Josh Veitch{-}Michaelis and Guy Schumann and Yarin Gal and Atilim G{\"{u}}nes Baydin and Dietmar Backes}, title = {Flood Detection On Low Cost Orbital Hardware}, journal = {CoRR}, volume = {abs/1910.03019}, year = {2019}, url = {http://arxiv.org/abs/1910.03019}, eprinttype = {arXiv}, eprint = {1910.03019}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-03019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001HHKP19, author = {Michael Backes and Lucjan Hanzlik and Amir Herzberg and Aniket Kate and Ivan Pryvalov}, title = {Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {63}, year = {2019}, url = {https://eprint.iacr.org/2019/063}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001HHKP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesDHKS19, author = {Michael Backes and Nico D{\"{o}}ttling and Lucjan Hanzlik and Kamil Kluczniak and Jonas Schneider}, title = {Ring Signatures: Logarithmic-Size, No Setup - from Standard Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {196}, year = {2019}, url = {https://eprint.iacr.org/2019/196}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesDHKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaxKTB19, author = {Alexander Dax and Robert K{\"{u}}nnemann and Sven Tangermann and Michael Backes}, title = {How to wrap it up - {A} formally verified proposal for the use of authenticated wrapping in PKCS{\textbackslash}{\#}11}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {462}, year = {2019}, url = {https://eprint.iacr.org/2019/462}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaxKTB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/CoferGBWPFPKKAH18, author = {Darren D. Cofer and Andrew Gacek and John Backes and Michael W. Whalen and Lee Pike and Adam Foltzer and Michal Podhradsky and Gerwin Klein and Ihor Kuz and June Andronick and Gernot Heiser and Douglas Stuart}, title = {A Formal Approach to Constructing Secure Air Vehicle Software}, journal = {Computer}, volume = {51}, number = {11}, pages = {14--23}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2876051}, doi = {10.1109/MC.2018.2876051}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/CoferGBWPFPKKAH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/ShiraziSABD18, author = {Fatemeh Shirazi and Milivoj Simeonovski and Muhammad Rizwan Asghar and Michael Backes and Claudia D{\'{\i}}az}, title = {A Survey on Routing in Anonymous Communication Protocols}, journal = {{ACM} Comput. Surv.}, volume = {51}, number = {3}, pages = {51:1--51:39}, year = {2018}, url = {https://doi.org/10.1145/3182658}, doi = {10.1145/3182658}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/ShiraziSABD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcbb/BackesBHSW18, author = {Michael Backes and Pascal Berrang and Mathias Humbert and Xiaoyu Shen and Verena Wolf}, title = {Simulating the Large-Scale Erosion of Genomic Privacy Over Time}, journal = {{IEEE} {ACM} Trans. Comput. Biol. Bioinform.}, volume = {15}, number = {5}, pages = {1405--1412}, year = {2018}, url = {https://doi.org/10.1109/TCBB.2018.2859380}, doi = {10.1109/TCBB.2018.2859380}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcbb/BackesBHSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/SpeicherS00K18, author = {Patrick Speicher and Marcel Steinmetz and Michael Backes and J{\"{o}}rg Hoffmann and Robert K{\"{u}}nnemann}, editor = {Sheila A. McIlraith and Kilian Q. Weinberger}, title = {Stackelberg Planning: Towards Effective Leader-Follower State Space Search}, booktitle = {Proceedings of the Thirty-Second {AAAI} Conference on Artificial Intelligence, (AAAI-18), the 30th innovative Applications of Artificial Intelligence (IAAI-18), and the 8th {AAAI} Symposium on Educational Advances in Artificial Intelligence (EAAI-18), New Orleans, Louisiana, USA, February 2-7, 2018}, pages = {6286--6293}, publisher = {{AAAI} Press}, year = {2018}, url = {https://doi.org/10.1609/aaai.v32i1.12090}, doi = {10.1609/AAAI.V32I1.12090}, timestamp = {Mon, 04 Sep 2023 12:29:24 +0200}, biburl = {https://dblp.org/rec/conf/aaai/SpeicherS00K18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/0001HKS18, author = {Michael Backes and Lucjan Hanzlik and Kamil Kluczniak and Jonas Schneider}, editor = {Thomas Peyrin and Steven D. Galbraith}, title = {Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11273}, pages = {405--434}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03329-3\_14}, doi = {10.1007/978-3-030-03329-3\_14}, timestamp = {Fri, 08 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/0001HKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/GacekBWWG18, author = {Andrew Gacek and John Backes and Mike Whalen and Lucas G. Wagner and Elaheh Ghassabani}, editor = {Hana Chockler and Georg Weissenbacher}, title = {The JKind Model Checker}, booktitle = {Computer Aided Verification - 30th International Conference, {CAV} 2018, Held as Part of the Federated Logic Conference, FloC 2018, Oxford, UK, July 14-17, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10982}, pages = {20--27}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96142-2\_3}, doi = {10.1007/978-3-319-96142-2\_3}, timestamp = {Fri, 09 Apr 2021 18:35:26 +0200}, biburl = {https://dblp.org/rec/conf/cav/GacekBWWG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/FassK0S18, author = {Aurore Fass and Robert P. Krawczyk and Michael Backes and Ben Stock}, editor = {Cristiano Giuffrida and S{\'{e}}bastien Bardin and Gregory Blanc}, title = {JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, {DIMVA} 2018, Saclay, France, June 28-29, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10885}, pages = {303--325}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93411-2\_14}, doi = {10.1007/978-3-319-93411-2\_14}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/FassK0S18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/BerrangHZLE018, author = {Pascal Berrang and Mathias Humbert and Yang Zhang and Irina Lehmann and Roland Eils and Michael Backes}, title = {Dissecting Privacy Risks in Biomedical Data}, booktitle = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2018, London, United Kingdom, April 24-26, 2018}, pages = {62--76}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EuroSP.2018.00013}, doi = {10.1109/EUROSP.2018.00013}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/BerrangHZLE018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/SpeicherSKSP0018, author = {Patrick Speicher and Marcel Steinmetz and Robert K{\"{u}}nnemann and Milivoj Simeonovski and Giancarlo Pellegrino and J{\"{o}}rg Hoffmann and Michael Backes}, title = {Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure}, booktitle = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2018, London, United Kingdom, April 24-26, 2018}, pages = {77--91}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EuroSP.2018.00014}, doi = {10.1109/EUROSP.2018.00014}, timestamp = {Wed, 11 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/SpeicherSKSP0018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/Asghar0S18, author = {Muhammad Rizwan Asghar and Michael Backes and Milivoj Simeonovski}, title = {{PRIMA:} Privacy-Preserving Identity and Access Management at Internet-Scale}, booktitle = {2018 {IEEE} International Conference on Communications, {ICC} 2018, Kansas City, MO, USA, May 20-24, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICC.2018.8422732}, doi = {10.1109/ICC.2018.8422732}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/Asghar0S18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/StockPL0R18, author = {Ben Stock and Giancarlo Pellegrino and Frank Li and Michael Backes and Christian Rossow}, title = {Didn't You Hear Me? - Towards More Successful Web Vulnerability Notifications}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, publisher = {The Internet Society}, year = {2018}, url = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_01B-1\_Stock\_paper.pdf}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/StockPL0R18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/OltroggeDSAFRPB18, author = {Marten Oltrogge and Erik Derr and Christian Stransky and Yasemin Acar and Sascha Fahl and Christian Rossow and Giancarlo Pellegrino and Sven Bugiel and Michael Backes}, title = {The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators}, booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}}, pages = {634--647}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SP.2018.00005}, doi = {10.1109/SP.2018.00005}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/OltroggeDSAFRPB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/XuQL0K18, author = {Meng Xu and Chenxiong Qian and Kangjie Lu and Michael Backes and Taesoo Kim}, title = {Precise and Scalable Detection of Double-Fetch Bugs in {OS} Kernels}, booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}}, pages = {661--678}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SP.2018.00017}, doi = {10.1109/SP.2018.00017}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/XuQL0K18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacas/KatisFGGBGW18, author = {Andreas Katis and Grigory Fedyukovich and Huajun Guo and Andrew Gacek and John Backes and Arie Gurfinkel and Michael W. Whalen}, editor = {Dirk Beyer and Marieke Huisman}, title = {Validity-Guided Synthesis of Reactive Systems from Assume-Guarantee Contracts}, booktitle = {Tools and Algorithms for the Construction and Analysis of Systems - 24th International Conference, {TACAS} 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10806}, pages = {176--193}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89963-3\_10}, doi = {10.1007/978-3-319-89963-3\_10}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tacas/KatisFGGBGW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LyastaniSF0B18, author = {Sanam Ghorbani Lyastani and Michael Schilling and Sascha Fahl and Michael Backes and Sven Bugiel}, editor = {William Enck and Adrienne Porter Felt}, title = {Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {203--220}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/lyastani}, timestamp = {Fri, 18 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LyastaniSF0B18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/ZhangHRLP018, author = {Yang Zhang and Mathias Humbert and Tahleen A. Rahman and Cheng{-}Te Li and Jun Pang and Michael Backes}, editor = {Pierre{-}Antoine Champin and Fabien Gandon and Mounia Lalmas and Panagiotis G. Ipeirotis}, title = {Tagvisor: {A} Privacy Advisor for Sharing Hashtags}, booktitle = {Proceedings of the 2018 World Wide Web Conference on World Wide Web, {WWW} 2018, Lyon, France, April 23-27, 2018}, pages = {287--296}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3178876.3186095}, doi = {10.1145/3178876.3186095}, timestamp = {Fri, 16 Apr 2021 10:04:12 +0200}, biburl = {https://dblp.org/rec/conf/www/ZhangHRLP018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2018, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, publisher = {{ACM}}, year = {2018}, url = {http://dl.acm.org/citation.cfm?id=3243734}, isbn = {978-1-4503-5693-0}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-04122, author = {Yang Zhang and Mathias Humbert and Tahleen A. Rahman and Cheng{-}Te Li and Jun Pang and Michael Backes}, title = {Tagvisor: {A} Privacy Advisor for Sharing Hashtags}, journal = {CoRR}, volume = {abs/1802.04122}, year = {2018}, url = {http://arxiv.org/abs/1802.04122}, eprinttype = {arXiv}, eprint = {1802.04122}, timestamp = {Tue, 24 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-04122.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-10891, author = {Robert K{\"{u}}nnemann and Ilkan Esiyok and Michael Backes}, title = {Automated Verification of Accountability in Security Protocols}, journal = {CoRR}, volume = {abs/1805.10891}, year = {2018}, url = {http://arxiv.org/abs/1805.10891}, eprinttype = {arXiv}, eprint = {1805.10891}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-10891.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-01246, author = {Ahmed Salem and Yang Zhang and Mathias Humbert and Mario Fritz and Michael Backes}, title = {ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models}, journal = {CoRR}, volume = {abs/1806.01246}, year = {2018}, url = {http://arxiv.org/abs/1806.01246}, eprinttype = {arXiv}, eprint = {1806.01246}, timestamp = {Tue, 24 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-01246.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-02032, author = {Kathrin Grosse and Michael T. Smith and Michael Backes}, title = {Killing Three Birds with one Gaussian Process: Analyzing Attack Vectors on Classification}, journal = {CoRR}, volume = {abs/1806.02032}, year = {2018}, url = {http://arxiv.org/abs/1806.02032}, eprinttype = {arXiv}, eprint = {1806.02032}, timestamp = {Sat, 13 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-02032.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1808-00590, author = {Lucjan Hanzlik and Yang Zhang and Kathrin Grosse and Ahmed Salem and Max Augustin and Michael Backes and Mario Fritz}, title = {MLCapsule: Guarded Offline Deployment of Machine Learning as a Service}, journal = {CoRR}, volume = {abs/1808.00590}, year = {2018}, url = {http://arxiv.org/abs/1808.00590}, eprinttype = {arXiv}, eprint = {1808.00590}, timestamp = {Tue, 24 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1808-00590.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-04774, author = {Saba Eskandarian and Jonathan Cogan and Sawyer Birnbaum and Peh Chang Wei Brandon and Dillon Franke and Forest Fraser and Gaspar Garcia Jr. and Eric Gong and Hung T. Nguyen and Taresh K. Sethi and Vishal Subbiah and Michael Backes and Giancarlo Pellegrino and Dan Boneh}, title = {Fidelius: Protecting User Secrets from Compromised Browsers}, journal = {CoRR}, volume = {abs/1809.04774}, year = {2018}, url = {http://arxiv.org/abs/1809.04774}, eprinttype = {arXiv}, eprint = {1809.04774}, timestamp = {Fri, 05 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-04774.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1812-02606, author = {Kathrin Grosse and David Pfaff and Michael T. Smith and Michael Backes}, title = {The Limitations of Model Uncertainty in Adversarial Settings}, journal = {CoRR}, volume = {abs/1812.02606}, year = {2018}, url = {http://arxiv.org/abs/1812.02606}, eprinttype = {arXiv}, eprint = {1812.02606}, timestamp = {Sat, 13 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1812-02606.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001HKS18, author = {Michael Backes and Lucjan Hanzlik and Kamil Kluczniak and Jonas Schneider}, title = {Signatures with Flexible Public Key: {A} Unified Approach to Privacy-Preserving Signatures (Full Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {191}, year = {2018}, url = {http://eprint.iacr.org/2018/191}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001HKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesHS18, author = {Michael Backes and Lucjan Hanzlik and Jonas Schneider}, title = {Membership Privacy for Fully Dynamic Group Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {641}, year = {2018}, url = {https://eprint.iacr.org/2018/641}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesHS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KunnemannG018, author = {Robert K{\"{u}}nnemann and Deepak Garg and Michael Backes}, title = {Accountability in Security Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {127}, year = {2018}, url = {http://eprint.iacr.org/2018/127}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KunnemannG018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/AcarBFKMS17, author = {Yasemin Acar and Michael Backes and Sascha Fahl and Doowon Kim and Michelle L. Mazurek and Christian Stransky}, title = {How Internet Resources Might Be Helping You Develop Faster but Less Securely}, journal = {{IEEE} Secur. Priv.}, volume = {15}, number = {2}, pages = {50--60}, year = {2017}, url = {https://doi.org/10.1109/MSP.2017.24}, doi = {10.1109/MSP.2017.24}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/AcarBFKMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0001HPZ17, author = {Michael Backes and Mathias Humbert and Jun Pang and Yang Zhang}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {walk2friends: Inferring Social Links from Mobility Profiles}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1943--1957}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133972}, doi = {10.1145/3133956.3133972}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/0001HPZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DerrBFA017, author = {Erik Derr and Sven Bugiel and Sascha Fahl and Yasemin Acar and Michael Backes}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2187--2200}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134059}, doi = {10.1145/3133956.3134059}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DerrBFA017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HuangSB017, author = {Jie Huang and Oliver Schranz and Sven Bugiel and Michael Backes}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {The {ART} of App Compartmentalization: Compiler-based Library Privilege Separation on Stock Android}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1037--1049}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134064}, doi = {10.1145/3133956.3134064}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HuangSB017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NguyenWA0WF17, author = {Duc Cuong Nguyen and Dominik Wermke and Yasemin Acar and Michael Backes and Charles Weir and Sascha Fahl}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {A Stitch in Time: Supporting Android Developers in WritingSecure Code}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1065--1077}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133977}, doi = {10.1145/3133956.3133977}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NguyenWA0WF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PellegrinoJ0BR17, author = {Giancarlo Pellegrino and Martin Johns and Simon Koch and Michael Backes and Christian Rossow}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Deemon: Detecting {CSRF} with Dynamic Analysis and Property Graphs}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1757--1771}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133959}, doi = {10.1145/3133956.3133959}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/PellegrinoJ0BR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BackesGMS17, author = {Michael Backes and Manuel Gomez{-}Rodriguez and Praveen Manoharan and Bartlomiej Surma}, title = {Reconciling Privacy and Utility in Continuous-Time Diffusion Networks}, booktitle = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa Barbara, CA, USA, August 21-25, 2017}, pages = {292--304}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CSF.2017.29}, doi = {10.1109/CSF.2017.29}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BackesGMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GrossePMBM17, author = {Kathrin Grosse and Nicolas Papernot and Praveen Manoharan and Michael Backes and Patrick D. McDaniel}, editor = {Simon N. Foley and Dieter Gollmann and Einar Snekkenes}, title = {Adversarial Examples for Malware Detection}, booktitle = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10493}, pages = {62--79}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66399-9\_4}, doi = {10.1007/978-3-319-66399-9\_4}, timestamp = {Fri, 13 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GrossePMBM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/0001BSSW17, author = {Michael Backes and Sven Bugiel and Oliver Schranz and Philipp von Styp{-}Rekowsky and Sebastian Weisgerber}, title = {ARTist: The Android Runtime Instrumentation and Security Toolkit}, booktitle = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2017, Paris, France, April 26-28, 2017}, pages = {481--495}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/EuroSP.2017.43}, doi = {10.1109/EUROSP.2017.43}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/0001BSSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/0001RSSY17, author = {Michael Backes and Konrad Rieck and Malte Skoruppa and Ben Stock and Fabian Yamaguchi}, title = {Efficient and Flexible Discovery of {PHP} Application Vulnerabilities}, booktitle = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2017, Paris, France, April 26-28, 2017}, pages = {334--349}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/EuroSP.2017.14}, doi = {10.1109/EUROSP.2017.14}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/0001RSSY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/BackesDKK17, author = {Michael Backes and Jannik Dreier and Steve Kremer and Robert K{\"{u}}nnemann}, title = {A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and Its Application to Fair Exchange}, booktitle = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2017, Paris, France, April 26-28, 2017}, pages = {76--91}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/EuroSP.2017.12}, doi = {10.1109/EUROSP.2017.12}, timestamp = {Thu, 13 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/BackesDKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/BackesN17, author = {Michael Backes and Mohammad Nauman}, title = {{LUNA:} Quantifying and Leveraging Uncertainty in Android Malware Analysis through Bayesian Machine Learning}, booktitle = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2017, Paris, France, April 26-28, 2017}, pages = {204--217}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/EuroSP.2017.24}, doi = {10.1109/EUROSP.2017.24}, timestamp = {Thu, 13 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/BackesN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LuWPNL017, author = {Kangjie Lu and Marie{-}Therese Walter and David Pfaff and Stefan N{\"{u}}mberger and Wenke Lee and Michael Backes}, title = {Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying}, booktitle = {24th Annual Network and Distributed System Security Symposium, {NDSS} 2017, San Diego, California, USA, February 26 - March 1, 2017}, publisher = {The Internet Society}, year = {2017}, url = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/unleashing-use-initialization-vulnerabilities-linux-kernel-using-targeted-stack-spraying/}, timestamp = {Mon, 01 Feb 2021 08:42:15 +0100}, biburl = {https://dblp.org/rec/conf/ndss/LuWPNL017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Maisuradze0R17, author = {Giorgi Maisuradze and Michael Backes and Christian Rossow}, title = {Dachshund: Digging for and Securing (Non-)Blinded Constants in {JIT} Code}, booktitle = {24th Annual Network and Distributed System Security Symposium, {NDSS} 2017, San Diego, California, USA, February 26 - March 1, 2017}, publisher = {The Internet Society}, year = {2017}, url = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/dachshund-digging-and-securing-non-blinded-constants-jit-code/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/Maisuradze0R17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KruppKRM017, author = {Johannes Krupp and Mohammad Karami and Christian Rossow and Damon McCoy and Michael Backes}, editor = {Marc Dacier and Michael D. Bailey and Michalis Polychronakis and Manos Antonakakis}, title = {Linking Amplification DDoS Attacks to Booter Services}, booktitle = {Research in Attacks, Intrusions, and Defenses - 20th International Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10453}, pages = {427--449}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66332-6\_19}, doi = {10.1007/978-3-319-66332-6\_19}, timestamp = {Mon, 20 Nov 2023 09:00:29 +0100}, biburl = {https://dblp.org/rec/conf/raid/KruppKRM017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/0001BBEHHL17, author = {Michael Backes and Pascal Berrang and Matthias Bieg and Roland Eils and Carl Herrmann and Mathias Humbert and Irina Lehmann}, title = {Identifying Personal {DNA} Methylation Profiles by Genotype Inference}, booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose, CA, USA, May 22-26, 2017}, pages = {957--976}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SP.2017.21}, doi = {10.1109/SP.2017.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/0001BBEHHL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/0001BSW17, author = {Michael Backes and Sven Bugiel and Philipp von Styp{-}Rekowsky and Marvin WiBfeld}, title = {Seamless In-App Ad Blocking on Stock Android}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {163--168}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.24}, doi = {10.1109/SPW.2017.24}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/0001BSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Acar0FGKMS17, author = {Yasemin Acar and Michael Backes and Sascha Fahl and Simson L. Garfinkel and Doowon Kim and Michelle L. Mazurek and Christian Stransky}, title = {Comparing the Usability of Cryptographic APIs}, booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose, CA, USA, May 22-26, 2017}, pages = {154--171}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SP.2017.52}, doi = {10.1109/SP.2017.52}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/Acar0FGKMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/FischerBXSA0F17, author = {Felix Fischer and Konstantin B{\"{o}}ttinger and Huang Xiao and Christian Stransky and Yasemin Acar and Michael Backes and Sascha Fahl}, title = {Stack Overflow Considered Harmful? The Impact of Copy{\&}Paste on Android Application Security}, booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose, CA, USA, May 22-26, 2017}, pages = {121--136}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SP.2017.31}, doi = {10.1109/SP.2017.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/FischerBXSA0F17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/StockJS017, author = {Ben Stock and Martin Johns and Marius Steffens and Michael Backes}, editor = {Engin Kirda and Thomas Ristenpart}, title = {How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {971--987}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/stock}, timestamp = {Mon, 01 Feb 2021 08:42:59 +0100}, biburl = {https://dblp.org/rec/conf/uss/StockJS017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/StranskyANWKR0G17, author = {Christian Stransky and Yasemin Acar and Duc Cuong Nguyen and Dominik Wermke and Doowon Kim and Elissa M. Redmiles and Michael Backes and Simson L. Garfinkel and Michelle L. Mazurek and Sascha Fahl}, editor = {Jos{\'{e}} M. Fernandez and Mathias Payer}, title = {Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers}, booktitle = {10th {USENIX} Workshop on Cyber Security Experimentation and Test, {CSET} 2017, Vancouver, BC, Canada, August 14, 2017}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/cset17/workshop-program/presentation/stransky}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/StranskyANWKR0G17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/SimeonovskiPR017, author = {Milivoj Simeonovski and Giancarlo Pellegrino and Christian Rossow and Michael Backes}, editor = {Rick Barrett and Rick Cummings and Eugene Agichtein and Evgeniy Gabrilovich}, title = {Who Controls the Internet?: Analyzing Global Threats using Property Graph Traversals}, booktitle = {Proceedings of the 26th International Conference on World Wide Web, {WWW} 2017, Perth, Australia, April 3-7, 2017}, pages = {647--656}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3038912.3052587}, doi = {10.1145/3038912.3052587}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/SimeonovskiPR017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/00010KSS17, author = {Michael Backes and J{\"{o}}rg Hoffmann and Robert K{\"{u}}nnemann and Patrick Speicher and Marcel Steinmetz}, title = {Simulated Penetration Testing and Mitigation Analysis}, journal = {CoRR}, volume = {abs/1705.05088}, year = {2017}, url = {http://arxiv.org/abs/1705.05088}, eprinttype = {arXiv}, eprint = {1705.05088}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/00010KSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GrosseMP0M17, author = {Kathrin Grosse and Praveen Manoharan and Nicolas Papernot and Michael Backes and Patrick D. McDaniel}, title = {On the (Statistical) Detection of Adversarial Examples}, journal = {CoRR}, volume = {abs/1702.06280}, year = {2017}, url = {http://arxiv.org/abs/1702.06280}, eprinttype = {arXiv}, eprint = {1702.06280}, timestamp = {Fri, 13 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GrosseMP0M17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-08221, author = {Michael Backes and Mathias Humbert and Jun Pang and Yang Zhang}, title = {walk2friends: Inferring Social Links from Mobility Profiles}, journal = {CoRR}, volume = {abs/1708.08221}, year = {2017}, url = {http://arxiv.org/abs/1708.08221}, eprinttype = {arXiv}, eprint = {1708.08221}, timestamp = {Sat, 31 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-08221.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-08786, author = {Giancarlo Pellegrino and Martin Johns and Simon Koch and Michael Backes and Christian Rossow}, title = {Deemon: Detecting {CSRF} with Dynamic Analysis and Property Graphs}, journal = {CoRR}, volume = {abs/1708.08786}, year = {2017}, url = {http://arxiv.org/abs/1708.08786}, eprinttype = {arXiv}, eprint = {1708.08786}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-08786.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-04986, author = {Andreas Katis and Grigory Fedyukovich and Huajun Guo and Andrew Gacek and John Backes and Arie Gurfinkel and Michael W. Whalen}, title = {Validity-Guided Synthesis of Reactive Systems from Assume-Guarantee Contracts}, journal = {CoRR}, volume = {abs/1709.04986}, year = {2017}, url = {http://arxiv.org/abs/1709.04986}, eprinttype = {arXiv}, eprint = {1709.04986}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-04986.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1710-03135, author = {Felix Fischer and Konstantin B{\"{o}}ttinger and Huang Xiao and Christian Stransky and Yasemin Acar and Michael Backes and Sascha Fahl}, title = {Stack Overflow Considered Harmful? The Impact of Copy{\&}Paste on Android Application Security}, journal = {CoRR}, volume = {abs/1710.03135}, year = {2017}, url = {http://arxiv.org/abs/1710.03135}, eprinttype = {arXiv}, eprint = {1710.03135}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1710-03135.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1711-05441, author = {Yang Zhang and Mathias Humbert and Bartlomiej Surma and Praveen Manoharan and Jilles Vreeken and Michael Backes}, title = {{CTRL+Z:} Recovering Anonymized Social Graphs}, journal = {CoRR}, volume = {abs/1711.05441}, year = {2017}, url = {http://arxiv.org/abs/1711.05441}, eprinttype = {arXiv}, eprint = {1711.05441}, timestamp = {Fri, 13 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1711-05441.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-01222, author = {Andrew Gacek and John Backes and Mike Whalen and Lucas G. Wagner and Elaheh Ghassabani}, title = {The JKind Model Checker}, journal = {CoRR}, volume = {abs/1712.01222}, year = {2017}, url = {http://arxiv.org/abs/1712.01222}, eprinttype = {arXiv}, eprint = {1712.01222}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-01222.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-08940, author = {Sanam Ghorbani Lyastani and Michael Schilling and Sascha Fahl and Sven Bugiel and Michael Backes}, title = {Studying the Impact of Managers on Password Strength and Reuse}, journal = {CoRR}, volume = {abs/1712.08940}, year = {2017}, url = {http://arxiv.org/abs/1712.08940}, eprinttype = {arXiv}, eprint = {1712.08940}, timestamp = {Fri, 18 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-08940.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bioinformatics/StockelKTSBLGKG16, author = {Daniel St{\"{o}}ckel and Tim Kehl and Patrick Trampert and Lara Schneider and Christina Backes and Nicole Ludwig and Andreas Gerasch and Michael Kaufmann and Manfred Gessler and Norbert M. Graf and Eckart Meese and Andreas Keller and Hans{-}Peter Lenhof}, title = {Multi-omics enrichment analysis using the GeneTrail2 web service}, journal = {Bioinform.}, volume = {32}, number = {10}, pages = {1502--1508}, year = {2016}, url = {https://doi.org/10.1093/bioinformatics/btv770}, doi = {10.1093/BIOINFORMATICS/BTV770}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bioinformatics/StockelKTSBLGKG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Backes16, author = {Michael Backes}, title = {Herausforderungen des Internet of Things}, journal = {Datenschutz und Datensicherheit}, volume = {40}, number = {8}, pages = {489--490}, year = {2016}, url = {https://doi.org/10.1007/s11623-016-0642-6}, doi = {10.1007/S11623-016-0642-6}, timestamp = {Mon, 11 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Backes16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/BackesKMMM16, author = {Michael Backes and Aniket Kate and Praveen Manoharan and Sebastian Meiser and Esfandiar Mohammadi}, title = {AnoA: {A} Framework for Analyzing Anonymous Communication Protocols}, journal = {J. Priv. Confidentiality}, volume = {7}, number = {2}, year = {2016}, url = {https://doi.org/10.29012/jpc.v7i2.651}, doi = {10.29012/JPC.V7I2.651}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/BackesKMMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/neuroimage/BackesWLRNEHFSG16, author = {Heiko Backes and Maureen Walberer and Anne Ladwig and Maria A. Rueger and Bernd Neumaier and Heike Endepols and Mathias Hoehn and Gereon R. Fink and Michael Schroeter and Rudolf Graf}, title = {Glucose consumption of inflammatory cells masks metabolic deficits in the brain}, journal = {NeuroImage}, volume = {128}, pages = {54--62}, year = {2016}, url = {https://doi.org/10.1016/j.neuroimage.2015.12.044}, doi = {10.1016/J.NEUROIMAGE.2015.12.044}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/neuroimage/BackesWLRNEHFSG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/BackesMS16, author = {Michael Backes and Sebastian Meiser and Marcin Slowik}, title = {Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms Against Structural Attacks}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2016}, number = {2}, pages = {40--60}, year = {2016}, url = {https://doi.org/10.1515/popets-2016-0004}, doi = {10.1515/POPETS-2016-0004}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/BackesMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/0001GK16, author = {Michael Backes and Niklas Grimm and Aniket Kate}, title = {Data Lineage in Malicious Environments}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {2}, pages = {178--191}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2399296}, doi = {10.1109/TDSC.2015.2399296}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/0001GK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/0001BSS16, author = {Michael Backes and Sven Bugiel and Oliver Schranz and Philipp von Styp{-}Rekowsky}, title = {Boxify: Bringing Full-Fledged App Sandboxing to Stock Android}, journal = {login Usenix Mag.}, volume = {41}, number = {2}, year = {2016}, url = {https://www.usenix.org/publications/login/summer2016/backes}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/0001BSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0001BD16, author = {Michael Backes and Sven Bugiel and Erik Derr}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Reliable Third-Party Library Detection in Android and its Security Applications}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {356--367}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978333}, doi = {10.1145/2976749.2978333}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/0001BD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0001BDG016, author = {Michael Backes and Sven Bugiel and Erik Derr and Sebastian Gerling and Christian Hammer}, editor = {Xiaofeng Chen and XiaoFeng Wang and Xinyi Huang}, title = {R-Droid: Leveraging Android App Analysis with Static Slice Optimization}, booktitle = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016}, pages = {129--140}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897845.2897927}, doi = {10.1145/2897845.2897927}, timestamp = {Mon, 25 Apr 2022 08:42:03 +0200}, biburl = {https://dblp.org/rec/conf/ccs/0001BDG016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0001BHM16, author = {Michael Backes and Pascal Berrang and Mathias Humbert and Praveen Manoharan}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Membership Privacy in MicroRNA-based Studies}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {319--330}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978355}, doi = {10.1145/2976749.2978355}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/0001BHM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0001BHS16, author = {Michael Backes and Sven Bugiel and Jie Huang and Oliver Schranz}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {{POSTER:} The {ART} of App Compartmentalization}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1811--1813}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2989056}, doi = {10.1145/2976749.2989056}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/0001BHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0001KM16, author = {Michael Backes and Robert K{\"{u}}nnemann and Esfandiar Mohammadi}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Computational Soundness for Dalvik Bytecode}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {717--730}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978418}, doi = {10.1145/2976749.2978418}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/0001KM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GotzfriedMDN016, author = {Johannes G{\"{o}}tzfried and Tilo M{\"{u}}ller and Gabor Drescher and Stefan N{\"{u}}rnberger and Michael Backes}, editor = {Xiaofeng Chen and XiaoFeng Wang and Xinyi Huang}, title = {RamCrypt: Kernel-based Address Space Encryption for User-mode Processes}, booktitle = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016}, pages = {919--924}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897845.2897924}, doi = {10.1145/2897845.2897924}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GotzfriedMDN016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Krupp0R16, author = {Johannes Krupp and Michael Backes and Christian Rossow}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Identifying the Scan and Attack Infrastructures Behind Amplification DDoS Attacks}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1426--1437}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978293}, doi = {10.1145/2976749.2978293}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Krupp0R16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SchneiderFS016, author = {Jonas Schneider and Nils Fleischhacker and Dominique Schr{\"{o}}der and Michael Backes}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Efficient Cryptographic Password Hardening Services from Partially Oblivious Commitments}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1192--1203}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978375}, doi = {10.1145/2976749.2978375}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SchneiderFS016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/StockPRJ016, author = {Ben Stock and Giancarlo Pellegrino and Christian Rossow and Martin Johns and Michael Backes}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {{POSTER:} Mapping the Landscape of Large-Scale Vulnerability Notifications}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1787--1789}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2989057}, doi = {10.1145/2976749.2989057}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/StockPRJ016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/Brengel0R16, author = {Michael Brengel and Michael Backes and Christian Rossow}, editor = {Juan Caballero and Urko Zurutuza and Ricardo J. Rodr{\'{\i}}guez}, title = {Detecting Hardware-Assisted Virtualization}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, {DIMVA} 2016, San Sebasti{\'{a}}n, Spain, July 7-8, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9721}, pages = {207--227}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40667-1\_11}, doi = {10.1007/978-3-319-40667-1\_11}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/Brengel0R16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/0001HKP16, author = {Michael Backes and Amir Herzberg and Aniket Kate and Ivan Pryvalov}, editor = {Ioannis G. Askoxylakis and Sotiris Ioannidis and Sokratis K. Katsikas and Catherine Meadows}, title = {Anonymous {RAM}}, booktitle = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9878}, pages = {344--362}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45744-4\_17}, doi = {10.1007/978-3-319-45744-4\_17}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/esorics/0001HKP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fosad/0001BM16, author = {Michael Backes and Pascal Berrang and Praveen Manoharan}, editor = {Alessandro Aldini and Javier L{\'{o}}pez and Fabio Martinelli}, title = {From Zoos to Safaris - From Closed-World Enforcement to Open-World Assessment of Privacy}, booktitle = {Foundations of Security Analysis and Design {VIII} - {FOSAD} 2014/2015/2016 Tutorial Lectures}, series = {Lecture Notes in Computer Science}, volume = {9808}, pages = {87--138}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-43005-8\_3}, doi = {10.1007/978-3-319-43005-8\_3}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fosad/0001BM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LuLN016, author = {Kangjie Lu and Wenke Lee and Stefan N{\"{u}}rnberger and Michael Backes}, title = {How to Make {ASLR} Win the Clone Wars: Runtime Re-Randomization}, booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, publisher = {The Internet Society}, year = {2016}, url = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/how-make-aslr-win-clone-wars-runtime-re-randomization.pdf}, timestamp = {Thu, 17 Jun 2021 16:04:48 +0200}, biburl = {https://dblp.org/rec/conf/ndss/LuLN016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nfm/BackesWGK16, author = {John D. Backes and Michael W. Whalen and Andrew Gacek and John Komp}, editor = {Sanjai Rayadurgam and Oksana Tkachuk}, title = {On Implementing Real-Time Specification Patterns Using Observers}, booktitle = {{NASA} Formal Methods - 8th International Symposium, {NFM} 2016, Minneapolis, MN, USA, June 7-9, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9690}, pages = {19--33}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40648-0\_2}, doi = {10.1007/978-3-319-40648-0\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/nfm/BackesWGK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BackesMS16, author = {Michael Backes and Sebastian Meiser and Dominique Schr{\"{o}}der}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Delegatable Functional Signatures}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9614}, pages = {357--386}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49384-7\_14}, doi = {10.1007/978-3-662-49384-7\_14}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BackesMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/0001HRRSS16, author = {Michael Backes and Thorsten Holz and Christian Rossow and Teemu Rytilahti and Milivoj Simeonovski and Ben Stock}, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {On the Feasibility of TTL-Based Filtering for DRDoS Mitigation}, booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, pages = {303--322}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2\_14}, doi = {10.1007/978-3-319-45719-2\_14}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/0001HRRSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/YokoyamaITPYMKI16, author = {Akira Yokoyama and Kou Ishii and Rui Tanabe and Yinmin Papa and Katsunari Yoshioka and Tsutomu Matsumoto and Takahiro Kasama and Daisuke Inoue and Michael Brengel and Michael Backes and Christian Rossow}, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion}, booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, pages = {165--187}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2\_8}, doi = {10.1007/978-3-319-45719-2\_8}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/YokoyamaITPYMKI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/BackesHPS16, author = {Michael Backes and Christian Hammer and David Pfaff and Malte Skoruppa}, editor = {Sascha Ossowski}, title = {Implementation-level analysis of the JavaScript helios voting client}, booktitle = {Proceedings of the 31st Annual {ACM} Symposium on Applied Computing, Pisa, Italy, April 4-8, 2016}, pages = {2071--2078}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2851613.2851800}, doi = {10.1145/2851613.2851800}, timestamp = {Tue, 06 Nov 2018 11:06:49 +0100}, biburl = {https://dblp.org/rec/conf/sac/BackesHPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Acar0BFM016, author = {Yasemin Acar and Michael Backes and Sven Bugiel and Sascha Fahl and Patrick D. McDaniel and Matthew Smith}, title = {SoK: Lessons Learned from Android Security Research for Appified Software Platforms}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {433--451}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.33}, doi = {10.1109/SP.2016.33}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/Acar0BFM016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/AcarBFKMS16, author = {Yasemin Acar and Michael Backes and Sascha Fahl and Doowon Kim and Michelle L. Mazurek and Christian Stransky}, title = {You Get Where You're Looking for: The Impact of Information Sources on Code Security}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {289--305}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.25}, doi = {10.1109/SP.2016.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/AcarBFKMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/0001BDMOW16, author = {Michael Backes and Sven Bugiel and Erik Derr and Patrick D. McDaniel and Damien Octeau and Sebastian Weisgerber}, editor = {Thorsten Holz and Stefan Savage}, title = {On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {1101--1118}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/backes\_android}, timestamp = {Mon, 01 Feb 2021 08:43:18 +0100}, biburl = {https://dblp.org/rec/conf/uss/0001BDMOW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/0001BHHKM16, author = {Michael Backes and Pascal Berrang and Anna Hecksteden and Mathias Humbert and Andreas Keller and Tim Meyer}, editor = {Thorsten Holz and Stefan Savage}, title = {Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {1223--1240}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/backes\_epigenetics}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/0001BHHKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Maisuradze0R16, author = {Giorgi Maisuradze and Michael Backes and Christian Rossow}, editor = {Thorsten Holz and Stefan Savage}, title = {What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions of {JIT-ROP} Defenses}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {139--156}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/maisuradze}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/Maisuradze0R16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/StockPRJ016, author = {Ben Stock and Giancarlo Pellegrino and Christian Rossow and Martin Johns and Michael Backes}, editor = {Thorsten Holz and Stefan Savage}, title = {Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {1015--1032}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/stock}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/StockPRJ016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/0001BGGM16, author = {Michael Backes and Pascal Berrang and Oana Goga and Krishna P. Gummadi and Praveen Manoharan}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Sabrina De Capitani di Vimercati}, title = {On Profile Linkability despite Anonymity in Social Media Systems}, booktitle = {Proceedings of the 2016 {ACM} on Workshop on Privacy in the Electronic Society, WPES@CCS 2016, Vienna, Austria, October 24 - 28, 2016}, pages = {25--35}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2994629}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wpes/0001BGGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/0001BSSW16, author = {Michael Backes and Sven Bugiel and Oliver Schranz and Philipp von Styp{-}Rekowsky and Sebastian Weisgerber}, title = {ARTist: The Android Runtime Instrumentation and Security Toolkit}, journal = {CoRR}, volume = {abs/1607.06619}, year = {2016}, url = {http://arxiv.org/abs/1607.06619}, eprinttype = {arXiv}, eprint = {1607.06619}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/0001BSSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/0001KM16, author = {Michael Backes and Robert K{\"{u}}nnemann and Esfandiar Mohammadi}, title = {Computational Soundness for Dalvik Bytecode}, journal = {CoRR}, volume = {abs/1608.04362}, year = {2016}, url = {http://arxiv.org/abs/1608.04362}, eprinttype = {arXiv}, eprint = {1608.04362}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/0001KM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Asghar0S16, author = {Muhammad Rizwan Asghar and Michael Backes and Milivoj Simeonovski}, title = {{PRIMA:} Privacy-Preserving Identity and Access Management at Internet-Scale}, journal = {CoRR}, volume = {abs/1612.01787}, year = {2016}, url = {http://arxiv.org/abs/1612.01787}, eprinttype = {arXiv}, eprint = {1612.01787}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Asghar0S16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BackesWGK16, author = {John D. Backes and Michael W. Whalen and Andrew Gacek and John Komp}, title = {On Implementing Real-time Specification Patterns Using Observers}, journal = {CoRR}, volume = {abs/1604.08155}, year = {2016}, url = {http://arxiv.org/abs/1604.08155}, eprinttype = {arXiv}, eprint = {1604.08155}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BackesWGK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GrossePM0M16, author = {Kathrin Grosse and Nicolas Papernot and Praveen Manoharan and Michael Backes and Patrick D. McDaniel}, title = {Adversarial Perturbations Against Deep Neural Networks for Malware Classification}, journal = {CoRR}, volume = {abs/1606.04435}, year = {2016}, url = {http://arxiv.org/abs/1606.04435}, eprinttype = {arXiv}, eprint = {1606.04435}, timestamp = {Fri, 13 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GrossePM0M16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KatisFGBGW16, author = {Andreas Katis and Grigory Fedyukovich and Andrew Gacek and John D. Backes and Arie Gurfinkel and Michael W. Whalen}, title = {Synthesis from Assume-Guarantee Contracts using Skolemized Proofs of Realizability}, journal = {CoRR}, volume = {abs/1610.05867}, year = {2016}, url = {http://arxiv.org/abs/1610.05867}, eprinttype = {arXiv}, eprint = {1610.05867}, timestamp = {Tue, 17 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KatisFGBGW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ShiraziSA0D16, author = {Fatemeh Shirazi and Milivoj Simeonovski and Muhammad Rizwan Asghar and Michael Backes and Claudia D{\'{\i}}az}, title = {A Survey on Routing in Anonymous Communication Protocols}, journal = {CoRR}, volume = {abs/1608.05538}, year = {2016}, url = {http://arxiv.org/abs/1608.05538}, eprinttype = {arXiv}, eprint = {1608.05538}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ShiraziSA0D16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001HKP16, author = {Michael Backes and Amir Herzberg and Aniket Kate and Ivan Pryvalov}, title = {Anonymous {RAM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {678}, year = {2016}, url = {http://eprint.iacr.org/2016/678}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001HKP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jfr/HebertBMHARBBFH15, author = {Paul Hebert and Max Bajracharya and Jeremy Ma and Nicolas Hudson and Alper Aydemir and Jason I. Reid and Charles Bergh and James Borders and Matthew A. Frost and Michael Hagman and John Leichty and Paul Backes and Brett Kennedy and Paul Karplus and Brian W. Satzinger and Katie Byl and Krishna Shankar and Joel W. Burdick}, title = {Mobile Manipulation and Mobility as Manipulation - Design and Algorithms of RoboSimian}, journal = {J. Field Robotics}, volume = {32}, number = {2}, pages = {255--274}, year = {2015}, url = {https://doi.org/10.1002/rob.21566}, doi = {10.1002/ROB.21566}, timestamp = {Wed, 08 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jfr/HebertBMHARBBFH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mscs/0001K15, author = {Michael Backes and Boris K{\"{o}}pf}, title = {Quantifying information flow in cryptographic systems}, journal = {Math. Struct. Comput. Sci.}, volume = {25}, number = {2}, pages = {457--479}, year = {2015}, url = {https://doi.org/10.1017/S0960129513000662}, doi = {10.1017/S0960129513000662}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mscs/0001K15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/0001KMR15, author = {Michael Backes and Aniket Kate and Sebastian Meiser and Tim Ruffing}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {675--695}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_33}, doi = {10.1007/978-3-319-28166-7\_33}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/0001KMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/SimeonovskiBA0M15, author = {Milivoj Simeonovski and Fabian Bendun and Muhammad Rizwan Asghar and Michael Backes and Ninja Marnau and Peter Druschel}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {431--453}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_21}, doi = {10.1007/978-3-319-28166-7\_21}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/SimeonovskiBA0M15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0001GT15, author = {Michael Backes and Martin Gagn{\'{e}} and Sri Aravinda Krishnan Thyagarajan}, editor = {Feng Bao and Steven Miller and Sherman S. M. Chow and Danfeng Yao}, title = {Fully Secure Inner-Product Proxy Re-Encryption with Constant Size Ciphertext}, booktitle = {Proceedings of the 3rd International Workshop on Security in Cloud Computing, SCC@ASIACCS '15, Singapore, Republic of Singapore, April 14, 2015}, pages = {31--40}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2732516.2732525}, doi = {10.1145/2732516.2732525}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/0001GT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0001KMMR15, author = {Michael Backes and Simon Koch and Sebastian Meiser and Esfandiar Mohammadi and Christian Rossow}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{POSTER:} In the Net of the Spider: Measuring the Anonymity-Impact of Network-level Adversaries Against Tor}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1626--1628}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2810115}, doi = {10.1145/2810103.2810115}, timestamp = {Tue, 10 Nov 2020 19:58:09 +0100}, biburl = {https://dblp.org/rec/conf/ccs/0001KMMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0001SS15, author = {Michael Backes and Oliver Schranz and Philipp von Styp{-}Rekowsky}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{POSTER:} Towards Compiler-Assisted Taint Tracking on the Android Runtime {(ART)}}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1629--1631}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2810129}, doi = {10.1145/2810103.2810129}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/0001SS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/0001BMMP15, author = {Michael Backes and Fabian Bendun and Matteo Maffei and Esfandiar Mohammadi and Kim Pecina}, editor = {C{\'{e}}dric Fournet and Michael W. Hicks and Luca Vigan{\`{o}}}, title = {Symbolic Malleable Zero-Knowledge Proofs}, booktitle = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona, Italy, 13-17 July, 2015}, pages = {412--426}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CSF.2015.35}, doi = {10.1109/CSF.2015.35}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/0001BMMP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/0001MR15, author = {Michael Backes and Esfandiar Mohammadi and Tim Ruffing}, editor = {G{\"{u}}nther Pernul and Peter Y. A. Ryan and Edgar R. Weippl}, title = {Computational Soundness for Interactive Primitives}, booktitle = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9326}, pages = {125--145}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24174-6\_7}, doi = {10.1007/978-3-319-24174-6\_7}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/0001MR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nfm/BackesCMW15, author = {John Backes and Darren D. Cofer and Steven P. Miller and Michael W. Whalen}, editor = {Klaus Havelund and Gerard J. Holzmann and Rajeev Joshi}, title = {Requirements Analysis of a Quad-Redundant Flight Control System}, booktitle = {{NASA} Formal Methods - 7th International Symposium, {NFM} 2015, Pasadena, CA, USA, April 27-29, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9058}, pages = {82--96}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17524-9\_7}, doi = {10.1007/978-3-319-17524-9\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/nfm/BackesCMW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nfm/GacekKWBC15, author = {Andrew Gacek and Andreas Katis and Michael W. Whalen and John Backes and Darren D. Cofer}, editor = {Klaus Havelund and Gerard J. Holzmann and Rajeev Joshi}, title = {Towards Realizability Checking of Contracts Using Theories}, booktitle = {{NASA} Formal Methods - 7th International Symposium, {NFM} 2015, Pasadena, CA, USA, April 27-29, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9058}, pages = {173--187}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17524-9\_13}, doi = {10.1007/978-3-319-17524-9\_13}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nfm/GacekKWBC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/0001B0M15, author = {Michael Backes and Fabian Bendun and J{\"{o}}rg Hoffmann and Ninja Marnau}, editor = {Riccardo Focardi and Andrew C. Myers}, title = {PriCL: Creating a Precedent, a Framework for Reasoning about Privacy Case Law}, booktitle = {Principles of Security and Trust - 4th International Conference, {POST} 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9036}, pages = {344--363}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46666-7\_18}, doi = {10.1007/978-3-662-46666-7\_18}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/0001B0M15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/0001BFR15, author = {Michael Backes and Manuel Barbosa and Dario Fiore and Raphael M. Reischuk}, title = {{ADSNARK:} Nearly Practical and Privacy-Preserving Proofs on Authenticated Data}, booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose, CA, USA, May 17-21, 2015}, pages = {271--286}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SP.2015.24}, doi = {10.1109/SP.2015.24}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/0001BFR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/0001B0SS15, author = {Michael Backes and Sven Bugiel and Christian Hammer and Oliver Schranz and Philipp von Styp{-}Rekowsky}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Boxify: Full-fledged App Sandboxing for Stock Android}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {691--706}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/backes}, timestamp = {Mon, 01 Feb 2021 08:42:57 +0100}, biburl = {https://dblp.org/rec/conf/uss/0001B0SS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/0001BHM15, author = {Michael Backes and Fabian Bendun and J{\"{o}}rg Hoffmann and Ninja Marnau}, title = {PriCL: Creating a Precedent {A} Framework for Reasoning about Privacy Case Law}, journal = {CoRR}, volume = {abs/1501.03353}, year = {2015}, url = {http://arxiv.org/abs/1501.03353}, eprinttype = {arXiv}, eprint = {1501.03353}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/0001BHM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/0001BM15, author = {Michael Backes and Pascal Berrang and Praveen Manoharan}, title = {How well do you blend into the crowd? - d-convergence: {A} novel paradigm for quantifying privacy in the age of Big-Data}, journal = {CoRR}, volume = {abs/1502.03346}, year = {2015}, url = {http://arxiv.org/abs/1502.03346}, eprinttype = {arXiv}, eprint = {1502.03346}, timestamp = {Fri, 13 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/0001BM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BackesCMW15, author = {John Backes and Darren D. Cofer and Steven P. Miller and Mike Whalen}, title = {Requirements Analysis of a Quad-Redundant Flight Control System}, journal = {CoRR}, volume = {abs/1502.03343}, year = {2015}, url = {http://arxiv.org/abs/1502.03343}, eprinttype = {arXiv}, eprint = {1502.03343}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BackesCMW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GacekKWBC15, author = {Andrew Gacek and Andreas Katis and Michael W. Whalen and John Backes and Darren D. Cofer}, title = {Towards Realizability Checking of Contracts using Theories}, journal = {CoRR}, volume = {abs/1502.03005}, year = {2015}, url = {http://arxiv.org/abs/1502.03005}, eprinttype = {arXiv}, eprint = {1502.03005}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GacekKWBC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SimeonovskiBA0M15, author = {Milivoj Simeonovski and Fabian Bendun and Muhammad Rizwan Asghar and Michael Backes and Ninja Marnau and Peter Druschel}, title = {Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information}, journal = {CoRR}, volume = {abs/1506.06033}, year = {2015}, url = {http://arxiv.org/abs/1506.06033}, eprinttype = {arXiv}, eprint = {1506.06033}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SimeonovskiBA0M15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SimeonovskiBA0M15, author = {Milivoj Simeonovski and Fabian Bendun and Muhammad Rizwan Asghar and Michael Backes and Ninja Marnau and Peter Druschel}, title = {Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {592}, year = {2015}, url = {http://eprint.iacr.org/2015/592}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SimeonovskiBA0M15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adac/VoigtFBR14, author = {Tobias Voigt and Roland Fried and Michael Backes and Wolfgang Rhode}, title = {Threshold optimization for classification in imbalanced data in a problem of gamma-ray astronomy}, journal = {Adv. Data Anal. Classif.}, volume = {8}, number = {2}, pages = {195--216}, year = {2014}, url = {https://doi.org/10.1007/s11634-014-0167-5}, doi = {10.1007/S11634-014-0167-5}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adac/VoigtFBR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BackesHM14, author = {Michael Backes and Catalin Hritcu and Matteo Maffei}, title = {Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations}, journal = {J. Comput. Secur.}, volume = {22}, number = {2}, pages = {301--353}, year = {2014}, url = {https://doi.org/10.3233/JCS-130493}, doi = {10.3233/JCS-130493}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BackesHM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/neuroimage/GramerFSTKSVKBG14, author = {Markus Gramer and Delphine Feuerstein and Andre Steimers and Masatoshi Takagaki and Tetsuya Kumagai and Michael Su{\'{e}} and Stefan Vollmar and Matthias Kohl{-}Bareis and Heiko Backes and Rudolf Graf}, title = {Device for simultaneous positron emission tomography, laser speckle imaging and {RGB} reflectometry: Validation and application to cortical spreading depression and brain ischemia in rats}, journal = {NeuroImage}, volume = {94}, pages = {250--262}, year = {2014}, url = {https://doi.org/10.1016/j.neuroimage.2014.03.027}, doi = {10.1016/J.NEUROIMAGE.2014.03.027}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/neuroimage/GramerFSTKSVKBG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BackesCKSD14, author = {Michael Backes and Jeremy Clark and Aniket Kate and Milivoj Simeonovski and Peter Druschel}, editor = {Ioana Boureanu and Philippe Owesarski and Serge Vaudenay}, title = {BackRef: Accountability in Anonymous Communication Networks}, booktitle = {Applied Cryptography and Network Security - 12th International Conference, {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8479}, pages = {380--400}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07536-5\_23}, doi = {10.1007/978-3-319-07536-5\_23}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/BackesCKSD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BackesGGNSS14, author = {Michael Backes and Rainer W. Gerling and Sebastian Gerling and Stefan N{\"{u}}rnberger and Dominique Schr{\"{o}}der and Mark Simkin}, editor = {Ioana Boureanu and Philippe Owesarski and Serge Vaudenay}, title = {WebTrust - {A} Comprehensive Authenticity and Integrity Framework for {HTTP}}, booktitle = {Applied Cryptography and Network Security - 12th International Conference, {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8479}, pages = {401--418}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07536-5\_24}, doi = {10.1007/978-3-319-07536-5\_24}, timestamp = {Mon, 26 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/BackesGGNSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BackesBG14, author = {Michael Backes and Sven Bugiel and Sebastian Gerling}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Scippa: system-centric {IPC} provenance on Android}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {36--45}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664264}, doi = {10.1145/2664243.2664264}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/BackesBG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BackesBGS14, author = {Michael Backes and Sven Bugiel and Sebastian Gerling and Philipp von Styp{-}Rekowsky}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Android security framework: extensible multi-layered access control on Android}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {46--55}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664265}, doi = {10.1145/2664243.2664265}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/BackesBGS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BackesHKKNP14, author = {Michael Backes and Thorsten Holz and Benjamin Kollenda and Philipp Koppe and Stefan N{\"{u}}rnberger and Jannik Pewny}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1342--1353}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660378}, doi = {10.1145/2660267.2660378}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BackesHKKNP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BackesKMM14, author = {Michael Backes and Aniket Kate and Sebastian Meiser and Esfandiar Mohammadi}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {513--524}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660371}, doi = {10.1145/2660267.2660371}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BackesKMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BackesMM14, author = {Michael Backes and Praveen Manoharan and Esfandiar Mohammadi}, title = {{TUC:} Time-Sensitive and Modular Analysis of Anonymous Communication}, booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna, Austria, 19-22 July, 2014}, pages = {383--397}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSF.2014.34}, doi = {10.1109/CSF.2014.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BackesMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/BackesBCK14, author = {Michael Backes and Fabian Bendun and Ashish Choudhury and Aniket Kate}, editor = {Magn{\'{u}}s M. Halld{\'{o}}rsson and Shlomi Dolev}, title = {Asynchronous {MPC} with a strict honest majority using non-equivocation}, booktitle = {{ACM} Symposium on Principles of Distributed Computing, {PODC} '14, Paris, France, July 15-18, 2014}, pages = {10--19}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611462.2611490}, doi = {10.1145/2611462.2611490}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/podc/BackesBCK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/BackesMR14, author = {Michael Backes and Esfandiar Mohammadi and Tim Ruffing}, editor = {Mart{\'{\i}}n Abadi and Steve Kremer}, title = {Computational Soundness Results for ProVerif - Bridging the Gap from Trace Properties to Uniformity}, booktitle = {Principles of Security and Trust - Third International Conference, {POST} 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8414}, pages = {42--62}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54792-8\_3}, doi = {10.1007/978-3-642-54792-8\_3}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/post/BackesMR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/BackesGLL14, author = {Michael Backes and Sebastian Gerling and Stefan Lorenz and Stephan Lukas}, editor = {Yookun Cho and Sung Y. Shin and Sang{-}Wook Kim and Chih{-}Cheng Hung and Jiman Hong}, title = {X-pire 2.0: a user-controlled expiration date and copy protection mechanism}, booktitle = {Symposium on Applied Computing, {SAC} 2014, Gyeongju, Republic of Korea - March 24 - 28, 2014}, pages = {1633--1640}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2554850.2554856}, doi = {10.1145/2554850.2554856}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/BackesGLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigada/GacekBCSW14, author = {Andrew Gacek and John Backes and Darren D. Cofer and Konrad Slind and Mike Whalen}, editor = {Michael B. Feldman and S. Tucker Taft}, title = {Resolute: an assurance case language for architecture models}, booktitle = {Proceedings of the 2014 {ACM} SIGAda annual conference on High integrity language technology, {HILT} 2014, Portland, Oregon, USA, October 18-21, 2014}, pages = {19--28}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2663171.2663177}, doi = {10.1145/2663171.2663177}, timestamp = {Fri, 02 Jun 2023 17:16:28 +0200}, biburl = {https://dblp.org/rec/conf/sigada/GacekBCSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/BackesGK14, author = {Michael Backes and Niklas Grimm and Aniket Kate}, editor = {Sjouke Mauw and Christian Damsgaard Jensen}, title = {Lime: Data Lineage in the Malicious Environment}, booktitle = {Security and Trust Management - 10th International Workshop, {STM} 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8743}, pages = {183--187}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11851-2\_13}, doi = {10.1007/978-3-319-11851-2\_13}, timestamp = {Thu, 23 Sep 2021 11:47:56 +0200}, biburl = {https://dblp.org/rec/conf/stm/BackesGK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BackesN14, author = {Michael Backes and Stefan N{\"{u}}rnberger}, editor = {Kevin Fu and Jaeyeon Jung}, title = {Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing}, booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA, USA, August 20-22, 2014}, pages = {433--447}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/backes}, timestamp = {Mon, 01 Feb 2021 08:43:04 +0100}, biburl = {https://dblp.org/rec/conf/uss/BackesN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BackesBGS14, author = {Michael Backes and Sven Bugiel and Sebastian Gerling and Philipp von Styp{-}Rekowsky}, title = {Android Security Framework: Enabling Generic and Extensible Access Control on Android}, journal = {CoRR}, volume = {abs/1404.1395}, year = {2014}, url = {http://arxiv.org/abs/1404.1395}, eprinttype = {arXiv}, eprint = {1404.1395}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BackesBGS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BackesGK14, author = {Michael Backes and Niklas Grimm and Aniket Kate}, title = {Lime: Data Lineage in the Malicious Environment}, journal = {CoRR}, volume = {abs/1408.1076}, year = {2014}, url = {http://arxiv.org/abs/1408.1076}, eprinttype = {arXiv}, eprint = {1408.1076}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BackesGK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GacekBCSW14, author = {Andrew Gacek and John Backes and Darren D. Cofer and Konrad Slind and Mike Whalen}, title = {Resolute: An Assurance Case Language for Architecture Models}, journal = {CoRR}, volume = {abs/1409.4629}, year = {2014}, url = {http://arxiv.org/abs/1409.4629}, eprinttype = {arXiv}, eprint = {1409.4629}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GacekBCSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesDFGMS14, author = {Michael Backes and {\"{O}}zg{\"{u}}r Dagdelen and Marc Fischlin and Sebastian Gajek and Sebastian Meiser and Dominique Schr{\"{o}}der}, title = {Operational Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {820}, year = {2014}, url = {http://eprint.iacr.org/2014/820}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesDFGMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesFR14, author = {Michael Backes and Dario Fiore and Raphael M. Reischuk}, title = {Nearly Practical and Privacy-Preserving Proofs on Authenticated Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {617}, year = {2014}, url = {http://eprint.iacr.org/2014/617}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesFR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesKMM14, author = {Michael Backes and Aniket Kate and Sebastian Meiser and Esfandiar Mohammadi}, title = {(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {621}, year = {2014}, url = {http://eprint.iacr.org/2014/621}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesKMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesKMMM14, author = {Michael Backes and Aniket Kate and Praveen Manoharan and Sebastian Meiser and Esfandiar Mohammadi}, title = {AnoA: {A} Framework For Analyzing Anonymous Communication Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {87}, year = {2014}, url = {http://eprint.iacr.org/2014/087}, timestamp = {Fri, 13 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesKMMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bioinformatics/StockelMKGBRKKL13, author = {Daniel St{\"{o}}ckel and Oliver M{\"{u}}ller and Tim Kehl and Andreas Gerasch and Christina Backes and Alexander Rurainski and Andreas Keller and Michael Kaufmann and Hans{-}Peter Lenhof}, title = {NetworkTrail - a web service for identifying and visualizing deregulated subnetworks}, journal = {Bioinform.}, volume = {29}, number = {13}, pages = {1702--1703}, year = {2013}, url = {https://doi.org/10.1093/bioinformatics/btt204}, doi = {10.1093/BIOINFORMATICS/BTT204}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bioinformatics/StockelMKGBRKKL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sadm/ThielerBFR13, author = {Anita Monika Thieler and Michael Backes and Roland Fried and Wolfgang Rhode}, title = {Periodicity detection in irregularly sampled light curves by robust regression and outlier detection}, journal = {Stat. Anal. Data Min.}, volume = {6}, number = {1}, pages = {73--89}, year = {2013}, url = {https://doi.org/10.1002/sam.11178}, doi = {10.1002/SAM.11178}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sadm/ThielerBFR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BackesFR13, author = {Michael Backes and Dario Fiore and Raphael M. Reischuk}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Verifiable delegation of computation on outsourced data}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {863--874}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516681}, doi = {10.1145/2508859.2516681}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BackesFR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BackesKMMM13, author = {Michael Backes and Aniket Kate and Praveen Manoharan and Sebastian Meiser and Esfandiar Mohammadi}, title = {AnoA: {A} Framework for Analyzing Anonymous Communication Protocols}, booktitle = {2013 {IEEE} 26th Computer Security Foundations Symposium, New Orleans, LA, USA, June 26-28, 2013}, pages = {163--178}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CSF.2013.18}, doi = {10.1109/CSF.2013.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BackesKMMM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BackesDK13, author = {Michael Backes and Amit Datta and Aniket Kate}, editor = {Ed Dawson}, title = {Asynchronous Computational {VSS} with Reduced Communication Complexity}, booktitle = {Topics in Cryptology - {CT-RSA} 2013 - The Cryptographers' Track at the {RSA} Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7779}, pages = {259--276}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36095-4\_17}, doi = {10.1007/978-3-642-36095-4\_17}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/BackesDK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BackesFM13, author = {Michael Backes and Dario Fiore and Esfandiar Mohammadi}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Privacy-Preserving Accountable Computation}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {38--56}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_3}, doi = {10.1007/978-3-642-40203-6\_3}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BackesFM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BackesGHMS13, author = {Michael Backes and Sebastian Gerling and Christian Hammer and Matteo Maffei and Philipp von Styp{-}Rekowsky}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Georgios V. Lioudakis and Nora Cuppens{-}Boulahia and Simon N. Foley and William M. Fitzgerald}, title = {AppGuard - Fine-Grained Policy Enforcement for Untrusted Android Applications}, booktitle = {Data Privacy Management and Autonomous Spontaneous Security - 8th International Workshop, {DPM} 2013, and 6th International Workshop, {SETOP} 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8247}, pages = {213--231}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-54568-9\_14}, doi = {10.1007/978-3-642-54568-9\_14}, timestamp = {Sun, 25 Oct 2020 22:34:56 +0100}, biburl = {https://dblp.org/rec/conf/esorics/BackesGHMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BackesM13, author = {Michael Backes and Sebastian Meiser}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Georgios V. Lioudakis and Nora Cuppens{-}Boulahia and Simon N. Foley and William M. Fitzgerald}, title = {Differentially Private Smart Metering with Battery Recharging}, booktitle = {Data Privacy Management and Autonomous Spontaneous Security - 8th International Workshop, {DPM} 2013, and 6th International Workshop, {SETOP} 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8247}, pages = {194--212}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-54568-9\_13}, doi = {10.1007/978-3-642-54568-9\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BackesM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/Styp-RekowskyGBH13, author = {Philipp von Styp{-}Rekowsky and Sebastian Gerling and Michael Backes and Christian Hammer}, editor = {Jan J{\"{u}}rjens and Benjamin Livshits and Riccardo Scandariato}, title = {Idea: Callee-Site Rewriting of Sealed System Libraries}, booktitle = {Engineering Secure Software and Systems - 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7781}, pages = {33--41}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36563-8\_3}, doi = {10.1007/978-3-642-36563-8\_3}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/essos/Styp-RekowskyGBH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BackesDK13, author = {Michael Backes and Goran Doychev and Boris K{\"{o}}pf}, title = {Preventing Side-Channel Leaks in Web Traffic: {A} Formal Approach}, booktitle = {20th Annual Network and Distributed System Security Symposium, {NDSS} 2013, San Diego, California, USA, February 24-27, 2013}, publisher = {The Internet Society}, year = {2013}, url = {https://www.ndss-symposium.org/ndss2013/preventing-side-channel-leaks-web-traffic-formal-approach}, timestamp = {Mon, 01 Feb 2021 08:42:13 +0100}, biburl = {https://dblp.org/rec/conf/ndss/BackesDK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/BackesBU13, author = {Michael Backes and Fabian Bendun and Dominique Unruh}, editor = {David A. Basin and John C. Mitchell}, title = {Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized Verification}, booktitle = {Principles of Security and Trust - Second International Conference, {POST} 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7796}, pages = {206--225}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36830-1\_11}, doi = {10.1007/978-3-642-36830-1\_11}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/BackesBU13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacas/BackesGHMS13, author = {Michael Backes and Sebastian Gerling and Christian Hammer and Matteo Maffei and Philipp von Styp{-}Rekowsky}, editor = {Nir Piterman and Scott A. Smolka}, title = {AppGuard - Enforcing User Requirements on Android Apps}, booktitle = {Tools and Algorithms for the Construction and Analysis of Systems - 19th International Conference, {TACAS} 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7795}, pages = {543--548}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36742-7\_39}, doi = {10.1007/978-3-642-36742-7\_39}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/tacas/BackesGHMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/BackesGS13, author = {Michael Backes and Martin Gagn{\'{e}} and Malte Skoruppa}, editor = {Ahmad{-}Reza Sadeghi and Sara Foresti}, title = {Using mobile device communication to strengthen e-Voting protocols}, booktitle = {Proceedings of the 12th annual {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2013, Berlin, Germany, November 4, 2013}, pages = {237--242}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517840.2517863}, doi = {10.1145/2517840.2517863}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/BackesGS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BackesCDKS13, author = {Michael Backes and Jeremy Clark and Peter Druschel and Aniket Kate and Milivoj Simeonovski}, title = {Introducing Accountability to Anonymity Networks}, journal = {CoRR}, volume = {abs/1311.3151}, year = {2013}, url = {http://arxiv.org/abs/1311.3151}, eprinttype = {arXiv}, eprint = {1311.3151}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BackesCDKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesBCK13, author = {Michael Backes and Fabian Bendun and Ashish Choudhury and Aniket Kate}, title = {Asynchronous {MPC} with t{\textless}n/2 Using Non-equivocation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {745}, year = {2013}, url = {http://eprint.iacr.org/2013/745}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesBCK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesFR13, author = {Michael Backes and Dario Fiore and Raphael M. Reischuk}, title = {Verifiable Delegation of Computation on Outsourced Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {469}, year = {2013}, url = {http://eprint.iacr.org/2013/469}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesFR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesKMR13, author = {Michael Backes and Aniket Kate and Sebastian Meiser and Tim Ruffing}, title = {Differential Indistinguishability for Cryptographic Primitives with Imperfect Randomness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {808}, year = {2013}, url = {http://eprint.iacr.org/2013/808}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesKMR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesMM13, author = {Michael Backes and Praveen Manoharan and Esfandiar Mohammadi}, title = {{TUC:} Time-sensitive and Modular Analysis of Anonymous Communication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {664}, year = {2013}, url = {http://eprint.iacr.org/2013/664}, timestamp = {Fri, 13 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesMM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesMS13, author = {Michael Backes and Sebastian Meiser and Dominique Schr{\"{o}}der}, title = {Highly Controlled, Fine-grained Delegation of Signing Capabilities}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {408}, year = {2013}, url = {http://eprint.iacr.org/2013/408}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bmcbi/LacznyLHLBGKVKMSMLK12, author = {Cedric Laczny and Petra Leidinger and Jan Haas and Nicole Ludwig and Christina Backes and Andreas Gerasch and Michael Kaufmann and Britta Vogel and Hugo A. Katus and Benjamin Meder and Cord St{\"{a}}hler and Eckart Meese and Hans{-}Peter Lenhof and Andreas Keller}, title = {miRTrail - a comprehensive webserver for analyzing gene and miRNA patterns to enhance the understanding of regulatory mechanisms in diseases}, journal = {{BMC} Bioinform.}, volume = {13}, pages = {36}, year = {2012}, url = {https://doi.org/10.1186/1471-2105-13-36}, doi = {10.1186/1471-2105-13-36}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bmcbi/LacznyLHLBGKVKMSMLK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/MyersB12, author = {Andrew C. Myers and Michael Backes}, title = {Preface}, journal = {J. Comput. Secur.}, volume = {20}, number = {6}, pages = {635--636}, year = {2012}, url = {https://doi.org/10.3233/JCS-2012-0445}, doi = {10.3233/JCS-2012-0445}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/MyersB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BackesGKT12, author = {Michael Backes and Ian Goldberg and Aniket Kate and Tomas Toft}, editor = {Heung Youl Youm and Yoojae Won}, title = {Adding query privacy to robust DHTs}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {30--31}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414473}, doi = {10.1145/2414456.2414473}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BackesGKT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BackesMU12, author = {Michael Backes and Ankit Malik and Dominique Unruh}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Computational soundness without protocol restrictions}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {699--711}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382270}, doi = {10.1145/2382196.2382270}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BackesMU12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BackesBBGKSB12, author = {Michael Backes and Gilles Barthe and Matthias Berg and Benjamin Gr{\'{e}}goire and C{\'{e}}sar Kunz and Malte Skoruppa and Santiago Zanella B{\'{e}}guelin}, editor = {Stephen Chong}, title = {Verified Security of Merkle-Damg{\aa}rd}, booktitle = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge, MA, USA, June 25-27, 2012}, pages = {354--368}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CSF.2012.14}, doi = {10.1109/CSF.2012.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BackesBBGKSB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BackesGKM12, author = {Michael Backes and Ian Goldberg and Aniket Kate and Esfandiar Mohammadi}, editor = {Stephen Chong}, title = {Provably Secure and Practical Onion Routing}, booktitle = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge, MA, USA, June 25-27, 2012}, pages = {369--385}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CSF.2012.32}, doi = {10.1109/CSF.2012.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BackesGKM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gfkl/VoigtF0R12, author = {Tobias Voigt and Roland Fried and Michael Backes and Wolfgang Rhode}, editor = {Myra Spiliopoulou and Lars Schmidt{-}Thieme and Ruth Janning}, title = {Gamma-Hadron-Separation in the {MAGIC} Experiment}, booktitle = {Data Analysis, Machine Learning and Knowledge Discovery - Proceedings of the 36th Annual Conference of the Gesellschaft f{\"{u}}r Klassifikation e. V., Hildesheim, Germany, August 2012}, series = {Studies in Classification, Data Analysis, and Knowledge Organization}, pages = {115--124}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-319-01595-8\_13}, doi = {10.1007/978-3-319-01595-8\_13}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gfkl/VoigtF0R12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isvc/MainbergerSBWB12, author = {Markus Mainberger and Christian Schmaltz and Matthias Berg and Joachim Weickert and Michael Backes}, editor = {George Bebis and Richard Boyle and Bahram Parvin and Darko Koracin and Charless C. Fowlkes and Sen Wang and Min{-}Hyung Choi and Stephan Mantler and J{\"{u}}rgen P. Schulze and Daniel Acevedo and Klaus Mueller and Michael E. Papka}, title = {Diffusion-Based Image Compression in Steganography}, booktitle = {Advances in Visual Computing - 8th International Symposium, {ISVC} 2012, Rethymnon, Crete, Greece, July 16-18, 2012, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {7432}, pages = {219--228}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33191-6\_22}, doi = {10.1007/978-3-642-33191-6\_22}, timestamp = {Fri, 04 Nov 2022 09:06:17 +0100}, biburl = {https://dblp.org/rec/conf/isvc/MainbergerSBWB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BackesMP12, author = {Michael Backes and Matteo Maffei and Kim Pecina}, title = {Automated Synthesis of Secure Distributed Applications}, booktitle = {19th Annual Network and Distributed System Security Symposium, {NDSS} 2012, San Diego, California, USA, February 5-8, 2012}, publisher = {The Internet Society}, year = {2012}, url = {https://www.ndss-symposium.org/ndss2012/automated-synthesis-secure-distributed-applications}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/BackesMP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nfm/BackesBH12, author = {Michael Backes and Alex Busenius and Catalin Hritcu}, editor = {Alwyn Goodloe and Suzette Person}, title = {On the Development and Formalization of an Extensible Code Generator for Real Life Security Protocols}, booktitle = {{NASA} Formal Methods - 4th International Symposium, {NFM} 2012, Norfolk, VA, USA, April 3-5, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7226}, pages = {371--387}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28891-3\_34}, doi = {10.1007/978-3-642-28891-3\_34}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/nfm/BackesBH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/BackesBK12, author = {Michael Backes and Fabian Bendun and Aniket Kate}, editor = {Darek Kowalski and Alessandro Panconesi}, title = {Brief announcement: distributed cryptography using trinc}, booktitle = {{ACM} Symposium on Principles of Distributed Computing, {PODC} '12, Funchal, Madeira, Portugal, July 16-18, 2012}, pages = {91--92}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2332432.2332448}, doi = {10.1145/2332432.2332448}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/BackesBK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BackesKMP12, author = {Michael Backes and Aniket Kate and Matteo Maffei and Kim Pecina}, title = {ObliviAd: Provably Secure and Practical Online Behavioral Advertising}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012, San Francisco, California, {USA}}, pages = {257--271}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SP.2012.25}, doi = {10.1109/SP.2012.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/BackesKMP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/BackesKM12, author = {Michael Backes and Aniket Kate and Esfandiar Mohammadi}, editor = {Ting Yu and Nikita Borisov}, title = {Ace: an efficient key-exchange protocol for onion routing}, booktitle = {Proceedings of the 11th annual {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2012, Raleigh, NC, USA, October 15, 2012}, pages = {55--64}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381966.2381974}, doi = {10.1145/2381966.2381974}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/wpes/BackesKM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/ReischukBG12, author = {Raphael M. Reischuk and Michael Backes and Johannes Gehrke}, editor = {Alain Mille and Fabien Gandon and Jacques Misselis and Michael Rabinovich and Steffen Staab}, title = {{SAFE} extensibility of data-driven web applications}, booktitle = {Proceedings of the 21st World Wide Web Conference 2012, {WWW} 2012, Lyon, France, April 16-20, 2012}, pages = {799--808}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2187836.2187944}, doi = {10.1145/2187836.2187944}, timestamp = {Fri, 16 Apr 2021 10:04:12 +0200}, biburl = {https://dblp.org/rec/conf/www/ReischukBG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesBU12, author = {Michael Backes and Fabian Bendun and Dominique Unruh}, title = {Computational Soundness of Symbolic Zero-knowledge Proofs: Weaker Assumptions and Mechanized Verification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {81}, year = {2012}, url = {http://eprint.iacr.org/2012/081}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesBU12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesDK12, author = {Michael Backes and Amit Datta and Aniket Kate}, title = {Asynchronous Computational {VSS} with Reduced Communication Complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {619}, year = {2012}, url = {http://eprint.iacr.org/2012/619}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesDK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesM12, author = {Michael Backes and Sebastian Meiser}, title = {Differentially Private Smart Metering with Battery Recharging}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {183}, year = {2012}, url = {http://eprint.iacr.org/2012/183}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesMU12, author = {Michael Backes and Ankit Malik and Dominique Unruh}, title = {Computational Soundness without Protocol Restrictions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {486}, year = {2012}, url = {http://eprint.iacr.org/2012/486}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesMU12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BackesCJST11, author = {Michael Backes and Iliano Cervesato and Aaron D. Jaggard and Andre Scedrov and Joe{-}Kai Tsay}, title = {Cryptographically sound security proofs for basic and public-key Kerberos}, journal = {Int. J. Inf. Sec.}, volume = {10}, number = {2}, pages = {107--134}, year = {2011}, url = {https://doi.org/10.1007/s10207-011-0125-6}, doi = {10.1007/S10207-011-0125-6}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BackesCJST11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BackesKP11, author = {Michael Backes and Aniket Kate and Arpita Patra}, editor = {Dong Hoon Lee and Xiaoyun Wang}, title = {Computational Verifiable Secret Sharing Revisited}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7073}, pages = {590--609}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25385-0\_32}, doi = {10.1007/978-3-642-25385-0\_32}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BackesKP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BackesBK11, author = {Michael Backes and Matthias Berg and Boris K{\"{o}}pf}, editor = {Bruce S. N. Cheung and Lucas Chi Kwong Hui and Ravi S. Sandhu and Duncan S. Wong}, title = {Non-uniform distributions in quantitative information-flow}, booktitle = {Proceedings of the 6th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24, 2011}, pages = {367--375}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1966913.1966960}, doi = {10.1145/1966913.1966960}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BackesBK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpp/BackesHT11, author = {Michael Backes and Catalin Hritcu and Thorsten Tarrach}, editor = {Jean{-}Pierre Jouannaud and Zhong Shao}, title = {Automatically Verifying Typing Constraints for a Data Processing Language}, booktitle = {Certified Programs and Proofs - First International Conference, {CPP} 2011, Kenting, Taiwan, December 7-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7086}, pages = {296--313}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25379-9\_22}, doi = {10.1007/978-3-642-25379-9\_22}, timestamp = {Thu, 14 Oct 2021 10:14:33 +0200}, biburl = {https://dblp.org/rec/conf/cpp/BackesHT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BackesMP11, author = {Michael Backes and Matteo Maffei and Kim Pecina}, title = {A Security {API} for Distributed Social Networks}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2011, San Diego, California, USA, 6th February - 9th February 2011}, publisher = {The Internet Society}, year = {2011}, url = {https://www.ndss-symposium.org/ndss2011/security-api-distributed-social-networks-paper}, timestamp = {Mon, 01 Feb 2021 08:42:10 +0100}, biburl = {https://dblp.org/rec/conf/ndss/BackesMP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/BackesMP11, author = {Michael Backes and Matteo Maffei and Kim Pecina}, editor = {Cyril Gavoille and Pierre Fraigniaud}, title = {Securing social networks}, booktitle = {Proceedings of the 30th Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} 2011, San Jose, CA, USA, June 6-8, 2011}, pages = {341--342}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1993806.1993874}, doi = {10.1145/1993806.1993874}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/BackesMP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tosca/BackesHM11, author = {Michael Backes and Catalin Hritcu and Matteo Maffei}, editor = {Sebastian M{\"{o}}dersheim and Catuscia Palamidessi}, title = {Union and Intersection Types for Secure Protocol Implementations}, booktitle = {Theory of Security and Applications - Joint Workshop, {TOSCA} 2011, Saarbr{\"{u}}cken, Germany, March 31 - April 1, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6993}, pages = {1--28}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27375-9\_1}, doi = {10.1007/978-3-642-27375-9\_1}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/tosca/BackesHM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tosca/BackesMPR11, author = {Michael Backes and Matteo Maffei and Kim Pecina and Raphael M. Reischuk}, editor = {Sebastian M{\"{o}}dersheim and Catuscia Palamidessi}, title = {{G2C:} Cryptographic Protocols from Goal-Driven Specifications}, booktitle = {Theory of Security and Applications - Joint Workshop, {TOSCA} 2011, Saarbr{\"{u}}cken, Germany, March 31 - April 1, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6993}, pages = {57--77}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27375-9\_4}, doi = {10.1007/978-3-642-27375-9\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tosca/BackesMPR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1106-4184, author = {Michael Backes and Sebastian Gerling and Philipp von Styp{-}Rekowsky}, title = {A Novel Attack against Android Phones}, journal = {CoRR}, volume = {abs/1106.4184}, year = {2011}, url = {http://arxiv.org/abs/1106.4184}, eprinttype = {arXiv}, eprint = {1106.4184}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1106-4184.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1107-1072, author = {Michael Backes and Ian Goldberg and Aniket Kate and Tomas Toft}, title = {Adding Query Privacy to Robust DHTs}, journal = {CoRR}, volume = {abs/1107.1072}, year = {2011}, url = {http://arxiv.org/abs/1107.1072}, eprinttype = {arXiv}, eprint = {1107.1072}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1107-1072.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1112-2649, author = {Julian Backes and Michael Backes and Markus D{\"{u}}rmuth and Sebastian Gerling and Stefan Lorenz}, title = {X-pire! - {A} digital expiration date for images in social networks}, journal = {CoRR}, volume = {abs/1112.2649}, year = {2011}, url = {http://arxiv.org/abs/1112.2649}, eprinttype = {arXiv}, eprint = {1112.2649}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1112-2649.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesGKM11, author = {Michael Backes and Ian Goldberg and Aniket Kate and Esfandiar Mohammadi}, title = {Provably Secure and Practical Onion Routing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {308}, year = {2011}, url = {http://eprint.iacr.org/2011/308}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesGKM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesKP11, author = {Michael Backes and Aniket Kate and Arpita Patra}, title = {Computational Verifiable Secret Sharing Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {281}, year = {2011}, url = {http://eprint.iacr.org/2011/281}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesKP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BackesU10, author = {Michael Backes and Dominique Unruh}, title = {Computational soundness of symbolic zero-knowledge proofs}, journal = {J. Comput. Secur.}, volume = {18}, number = {6}, pages = {1077--1155}, year = {2010}, url = {https://doi.org/10.3233/JCS-2009-0392}, doi = {10.3233/JCS-2009-0392}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BackesU10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BackesMU10, author = {Michael Backes and Matteo Maffei and Dominique Unruh}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {Computationally sound verification of source code}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {387--398}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866351}, doi = {10.1145/1866307.1866351}, timestamp = {Tue, 10 Nov 2020 20:00:21 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BackesMU10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BackesCK10, author = {Michael Backes and Oana Ciobotaru and Anton Krohmer}, editor = {Dimitris Gritzalis and Bart Preneel and Marianthi Theoharidou}, title = {RatFish: {A} File Sharing Protocol Provably Secure against Rational Users}, booktitle = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6345}, pages = {607--625}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15497-3\_37}, doi = {10.1007/978-3-642-15497-3\_37}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BackesCK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BackesDDK10, author = {Michael Backes and Goran Doychev and Markus D{\"{u}}rmuth and Boris K{\"{o}}pf}, editor = {Dimitris Gritzalis and Bart Preneel and Marianthi Theoharidou}, title = {Speaker Recognition in Encrypted Voice Streams}, booktitle = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6345}, pages = {508--523}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15497-3\_31}, doi = {10.1007/978-3-642-15497-3\_31}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/BackesDDK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/BackesMM10, author = {Michael Backes and Matteo Maffei and Esfandiar Mohammadi}, editor = {Kamal Lodaya and Meena Mahajan}, title = {Computationally Sound Abstraction and Verification of Secure Multi-Party Computations}, booktitle = {{IARCS} Annual Conference on Foundations of Software Technology and Theoretical Computer Science, {FSTTCS} 2010, December 15-18, 2010, Chennai, India}, series = {LIPIcs}, volume = {8}, pages = {352--363}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2010}, url = {https://doi.org/10.4230/LIPIcs.FSTTCS.2010.352}, doi = {10.4230/LIPICS.FSTTCS.2010.352}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/fsttcs/BackesMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/BackesLMP10, author = {Michael Backes and Stefan Lorenz and Matteo Maffei and Kim Pecina}, editor = {Mikhail J. Atallah and Nicholas J. Hopper}, title = {Anonymous Webs of Trust}, booktitle = {Privacy Enhancing Technologies, 10th International Symposium, {PETS} 2010, Berlin, Germany, July 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6205}, pages = {130--148}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14527-8\_8}, doi = {10.1007/978-3-642-14527-8\_8}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/BackesLMP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/BackesLMP10, author = {Michael Backes and Stefan Lorenz and Matteo Maffei and Kim Pecina}, editor = {Andr{\'{e}}a W. Richa and Rachid Guerraoui}, title = {Brief announcement: anonymity and trust in distributed systems}, booktitle = {Proceedings of the 29th Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} 2010, Zurich, Switzerland, July 25-28, 2010}, pages = {237--238}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1835698.1835753}, doi = {10.1145/1835698.1835753}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/BackesLMP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BackesDGPS10, author = {Michael Backes and Markus D{\"{u}}rmuth and Sebastian Gerling and Manfred Pinkal and Caroline Sporleder}, title = {Acoustic Side-Channel Attacks on Printers}, booktitle = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13, 2010, Proceedings}, pages = {307--322}, publisher = {{USENIX} Association}, year = {2010}, url = {http://www.usenix.org/events/sec10/tech/full\_papers/Backes.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/BackesDGPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesMU10, author = {Michael Backes and Matteo Maffei and Dominique Unruh}, title = {Computationally Sound Verification of Source Code}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {416}, year = {2010}, url = {http://eprint.iacr.org/2010/416}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesMU10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bioinformatics/KellerBGKKML09, author = {Andreas Keller and Christina Backes and Andreas Gerasch and Michael Kaufmann and Oliver Kohlbacher and Eckart Meese and Hans{-}Peter Lenhof}, title = {A novel algorithm for detecting differentially regulated paths based on gene set enrichment analysis}, journal = {Bioinform.}, volume = {25}, number = {21}, pages = {2787--2794}, year = {2009}, url = {https://doi.org/10.1093/bioinformatics/btp510}, doi = {10.1093/BIOINFORMATICS/BTP510}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bioinformatics/KellerBGKKML09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BackesHU09, author = {Michael Backes and Dennis Hofheinz and Dominique Unruh}, editor = {Ehab Al{-}Shaer and Somesh Jha and Angelos D. Keromytis}, title = {CoSP: a general framework for computational soundness proofs}, booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009}, pages = {66--78}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1653662.1653672}, doi = {10.1145/1653662.1653672}, timestamp = {Tue, 10 Nov 2020 19:58:07 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BackesHU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BackesGHM09, author = {Michael Backes and Martin P. Grochulla and Catalin Hritcu and Matteo Maffei}, title = {Achieving Security Despite Compromise Using Zero-knowledge}, booktitle = {Proceedings of the 22nd {IEEE} Computer Security Foundations Symposium, {CSF} 2009, Port Jefferson, New York, USA, July 8-10, 2009}, pages = {308--323}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CSF.2009.24}, doi = {10.1109/CSF.2009.24}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BackesGHM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BackesDHU09, author = {Michael Backes and Peter Druschel and Andreas Haeberlen and Dominique Unruh}, title = {{CSAR:} {A} Practical and Provable Technique to Make Randomized Systems Accountable}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2009, San Diego, California, USA, 8th February - 11th February 2009}, publisher = {The Internet Society}, year = {2009}, url = {https://www.ndss-symposium.org/ndss2009/csar-practical-and-provable-technique-make-randomized-systems-accountable/}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/BackesDHU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/BackesHLMTW09, author = {Michael Backes and Marek Hamerlik and Alessandro Linari and Matteo Maffei and Christos Tryfonopoulos and Gerhard Weikum}, editor = {Robert Meersman and Tharam S. Dillon and Pilar Herrero}, title = {Anonymity and Censorship Resistance in Unstructured Overlay Networks}, booktitle = {On the Move to Meaningful Internet Systems: {OTM} 2009, Confederated International Conferences, CoopIS, DOA, IS, and {ODBASE} 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {5870}, pages = {147--164}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05148-7\_12}, doi = {10.1007/978-3-642-05148-7\_12}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/otm/BackesHLMTW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BackesCDLW09, author = {Michael Backes and Tongbo Chen and Markus D{\"{u}}rmuth and Hendrik P. A. Lensch and Martin Welk}, title = {Tempest in a Teapot: Compromising Reflections Revisited}, booktitle = {30th {IEEE} Symposium on Security and Privacy {(SP} 2009), 17-20 May 2009, Oakland, California, {USA}}, pages = {315--327}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/SP.2009.20}, doi = {10.1109/SP.2009.20}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/BackesCDLW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BackesKR09, author = {Michael Backes and Boris K{\"{o}}pf and Andrey Rybalchenko}, title = {Automatic Discovery and Quantification of Information Leaks}, booktitle = {30th {IEEE} Symposium on Security and Privacy {(SP} 2009), 17-20 May 2009, Oakland, California, {USA}}, pages = {141--153}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/SP.2009.18}, doi = {10.1109/SP.2009.18}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/BackesKR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Backes09, author = {Michael Backes}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Design and Verification of Anonymous Trust Protocols}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {149--156}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_18}, doi = {10.1007/978-3-642-36213-2\_18}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/Backes09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BackesM09, author = {Michael Backes and Matteo Maffei}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Design and Verification of Anonymous Trust Protocols}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {143--148}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_17}, doi = {10.1007/978-3-642-36213-2\_17}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BackesM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2009, editor = {Michael Backes and Peng Ning}, title = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1}, doi = {10.1007/978-3-642-04444-1}, isbn = {978-3-642-04443-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesHU09, author = {Michael Backes and Dennis Hofheinz and Dominique Unruh}, title = {CoSP: {A} General Framework For Computational Soundness Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {80}, year = {2009}, url = {http://eprint.iacr.org/2009/080}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesHU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bmcbi/KellerBAGKKKL08, author = {Andreas Keller and Christina Backes and Maher Al{-}Awadhi and Andreas Gerasch and Jan K{\"{u}}ntzer and Oliver Kohlbacher and Michael Kaufmann and Hans{-}Peter Lenhof}, title = {GeneTrailExpress: a web-based pipeline for the statistical evaluation of microarray experiments}, journal = {{BMC} Bioinform.}, volume = {9}, year = {2008}, url = {https://doi.org/10.1186/1471-2105-9-552}, doi = {10.1186/1471-2105-9-552}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bmcbi/KellerBAGKKKL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BackesDHK08, author = {Michael Backes and Markus D{\"{u}}rmuth and Dennis Hofheinz and Ralf K{\"{u}}sters}, title = {Conditional reactive simulatability}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {2}, pages = {155--169}, year = {2008}, url = {https://doi.org/10.1007/s10207-007-0046-6}, doi = {10.1007/S10207-007-0046-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BackesDHK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BackesP08, author = {Michael Backes and Birgit Pfitzmann}, title = {Limits of the {BRSIM/UC} soundness of Dolev-Yao-style {XOR}}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {1}, pages = {33--54}, year = {2008}, url = {https://doi.org/10.1007/s10207-007-0040-z}, doi = {10.1007/S10207-007-0040-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BackesP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BackesPS08, author = {Michael Backes and Birgit Pfitzmann and Andre Scedrov}, title = {Key-dependent message security under active attacks - BRSIM/UC-soundness of Dolev-Yao-style encryption with key cycles}, journal = {J. Comput. Secur.}, volume = {16}, number = {5}, pages = {497--530}, year = {2008}, url = {https://doi.org/10.3233/JCS-2008-0332}, doi = {10.3233/JCS-2008-0332}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BackesPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BackesDU08, author = {Michael Backes and Markus D{\"{u}}rmuth and Dominique Unruh}, editor = {Josef Pieprzyk}, title = {{OAEP} Is Secure under Key-Dependent Messages}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5350}, pages = {506--523}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89255-7\_31}, doi = {10.1007/978-3-540-89255-7\_31}, timestamp = {Sun, 02 Jun 2019 21:16:53 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BackesDU08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BackesU08, author = {Michael Backes and Dominique Unruh}, editor = {Josef Pieprzyk}, title = {Limits of Constructive Security Proofs}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5350}, pages = {290--307}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89255-7\_18}, doi = {10.1007/978-3-540-89255-7\_18}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BackesU08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/BackesLMP08, author = {Michael Backes and Stefan Lorenz and Matteo Maffei and Kim Pecina}, editor = {Aarti Gupta and Sharad Malik}, title = {The {CASPA} Tool: Causality-Based Abstraction for Security Protocol Analysis}, booktitle = {Computer Aided Verification, 20th International Conference, {CAV} 2008, Princeton, NJ, USA, July 7-14, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5123}, pages = {419--422}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70545-1\_39}, doi = {10.1007/978-3-540-70545-1\_39}, timestamp = {Sat, 30 Sep 2023 09:35:55 +0200}, biburl = {https://dblp.org/rec/conf/cav/BackesLMP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BackesHM08, author = {Michael Backes and Catalin Hritcu and Matteo Maffei}, editor = {Peng Ning and Paul F. Syverson and Somesh Jha}, title = {Type-checking zero-knowledge}, booktitle = {Proceedings of the 2008 {ACM} Conference on Computer and Communications Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008}, pages = {357--370}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1455770.1455816}, doi = {10.1145/1455770.1455816}, timestamp = {Tue, 10 Nov 2020 19:59:27 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BackesHM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BackesHM08, author = {Michael Backes and Catalin Hritcu and Matteo Maffei}, title = {Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus}, booktitle = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium, {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008}, pages = {195--209}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CSF.2008.26}, doi = {10.1109/CSF.2008.26}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BackesHM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BackesU08, author = {Michael Backes and Dominique Unruh}, title = {Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers}, booktitle = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium, {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008}, pages = {255--269}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CSF.2008.20}, doi = {10.1109/CSF.2008.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BackesU08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BackesK08, author = {Michael Backes and Boris K{\"{o}}pf}, editor = {Sushil Jajodia and Javier L{\'{o}}pez}, title = {Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks}, booktitle = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5283}, pages = {517--532}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88313-5\_33}, doi = {10.1007/978-3-540-88313-5\_33}, timestamp = {Thu, 29 Aug 2019 08:09:59 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BackesK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lpar/BackesBU08, author = {Michael Backes and Matthias Berg and Dominique Unruh}, editor = {Iliano Cervesato and Helmut Veith and Andrei Voronkov}, title = {A Formal Language for Cryptographic Pseudocode}, booktitle = {Logic for Programming, Artificial Intelligence, and Reasoning, 15th International Conference, {LPAR} 2008, Doha, Qatar, November 22-27, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5330}, pages = {353--376}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89439-1\_26}, doi = {10.1007/978-3-540-89439-1\_26}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/lpar/BackesBU08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/BackesHLMTW08, author = {Michael Backes and Marek Hamerlik and Alessandro Linari and Matteo Maffei and Christos Tryfonopoulos and Gerhard Weikum}, editor = {Rida A. Bazzi and Boaz Patt{-}Shamir}, title = {Anonymous and censorship resistant content sharing in unstructured overlays}, booktitle = {Proceedings of the Twenty-Seventh Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} 2008, Toronto, Canada, August 18-21, 2008}, pages = {429}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1400751.1400822}, doi = {10.1145/1400751.1400822}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/BackesHLMTW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BackesDU08, author = {Michael Backes and Markus D{\"{u}}rmuth and Dominique Unruh}, title = {Compromising Reflections-or-How to Read {LCD} Monitors around the Corner}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {158--169}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.25}, doi = {10.1109/SP.2008.25}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/BackesDU08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BackesMU08, author = {Michael Backes and Matteo Maffei and Dominique Unruh}, title = {Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {202--215}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.23}, doi = {10.1109/SP.2008.23}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/BackesMU08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesK08, author = {Michael Backes and Boris K{\"{o}}pf}, title = {Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {162}, year = {2008}, url = {http://eprint.iacr.org/2008/162}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesU08, author = {Michael Backes and Dominique Unruh}, title = {Computational soundness of symbolic zero-knowledge proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {152}, year = {2008}, url = {http://eprint.iacr.org/2008/152}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesU08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bmcbi/KuntzerBBGKKL07, author = {Jan K{\"{u}}ntzer and Christina Backes and Torsten Blum and Andreas Gerasch and Michael Kaufmann and Oliver Kohlbacher and Hans{-}Peter Lenhof}, title = {{BNDB} - The Biochemical Network Database}, journal = {{BMC} Bioinform.}, volume = {8}, year = {2007}, url = {https://doi.org/10.1186/1471-2105-8-367}, doi = {10.1186/1471-2105-8-367}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bmcbi/KuntzerBBGKKL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/BackesPW07, author = {Michael Backes and Birgit Pfitzmann and Michael Waidner}, title = {The reactive simulatability {(RSIM)} framework for asynchronous systems}, journal = {Inf. Comput.}, volume = {205}, number = {12}, pages = {1685--1720}, year = {2007}, url = {https://doi.org/10.1016/j.ic.2007.05.002}, doi = {10.1016/J.IC.2007.05.002}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/BackesPW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BackesGP07, author = {Michael Backes and Stefanos Gritzalis and Bart Preneel}, title = {Preface}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {6}, pages = {359--360}, year = {2007}, url = {https://doi.org/10.1007/s10207-007-0034-x}, doi = {10.1007/S10207-007-0034-X}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BackesGP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BackesBW07, author = {Michael Backes and David A. Basin and Michael Waidner}, title = {Preface}, journal = {J. Comput. Secur.}, volume = {15}, number = {6}, pages = {561}, year = {2007}, url = {https://doi.org/10.3233/jcs-2007-15601}, doi = {10.3233/JCS-2007-15601}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BackesBW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BackesCFM07, author = {Michael Backes and Agostino Cortesi and Riccardo Focardi and Matteo Maffei}, editor = {Peng Ning and Vijay Atluri and Virgil D. Gligor and Heiko Mantel}, title = {A calculus of challenges and responses}, booktitle = {Proceedings of the 2007 {ACM} workshop on Formal methods in security engineering, {FMSE} 2007, Fairfax, VA, USA, November 2, 2007}, pages = {51--60}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314436.1314444}, doi = {10.1145/1314436.1314444}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BackesCFM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BackesCM07, author = {Michael Backes and Agostino Cortesi and Matteo Maffei}, title = {Causality-based Abstraction of Multiplicity in Security Protocols}, booktitle = {20th {IEEE} Computer Security Foundations Symposium, {CSF} 2007, 6-8 July 2007, Venice, Italy}, pages = {355--369}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/CSF.2007.11}, doi = {10.1109/CSF.2007.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BackesCM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BackesPS07, author = {Michael Backes and Birgit Pfitzmann and Andre Scedrov}, title = {Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles}, booktitle = {20th {IEEE} Computer Security Foundations Symposium, {CSF} 2007, 6-8 July 2007, Venice, Italy}, pages = {112--124}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/CSF.2007.23}, doi = {10.1109/CSF.2007.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BackesPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/BackesDK07, author = {Michael Backes and Markus D{\"{u}}rmuth and Ralf K{\"{u}}sters}, editor = {Vikraman Arvind and Sanjiva Prasad}, title = {On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography}, booktitle = {{FSTTCS} 2007: Foundations of Software Technology and Theoretical Computer Science, 27th International Conference, New Delhi, India, December 12-14, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4855}, pages = {108--120}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77050-3\_9}, doi = {10.1007/978-3-540-77050-3\_9}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/fsttcs/BackesDK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BackesDU07, author = {Michael Backes and Markus D{\"{u}}rmuth and Dominique Unruh}, title = {Information Flow in the Peer-Reviewing Process}, booktitle = {2007 {IEEE} Symposium on Security and Privacy (S{\&}P 2007), 20-23 May 2007, Oakland, California, {USA}}, pages = {187--191}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SP.2007.24}, doi = {10.1109/SP.2007.24}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/BackesDU07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BackesMU07, author = {Michael Backes and J{\"{o}}rn M{\"{u}}ller{-}Quade and Dominique Unruh}, editor = {Salil P. Vadhan}, title = {On the Necessity of Rewinding in Secure Multiparty Computation}, booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC} 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4392}, pages = {157--173}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-70936-7\_9}, doi = {10.1007/978-3-540-70936-7\_9}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BackesMU07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secco/2005, editor = {Michael Backes and Andre Scedrov}, title = {Proceedings of the International Workshop on Security and Concurrency, SecCo@CONCUR 2005, San Francisco, CA, USA, August 22, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {180}, number = {1}, publisher = {Elsevier}, year = {2007}, url = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/180/issue/1}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secco/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/BackesMU07, author = {Michael Backes and Matteo Maffei and Dominique Unruh}, editor = {Liqun Chen and Steve Kremer and Mark Dermot Ryan}, title = {Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol}, booktitle = {Formal Protocol Verification Applied, 14.10. - 19.10.2007}, series = {Dagstuhl Seminar Proceedings}, volume = {07421}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2007}, url = {http://drops.dagstuhl.de/opus/volltexte/2008/1415}, timestamp = {Sun, 22 Jan 2023 01:36:25 +0100}, biburl = {https://dblp.org/rec/conf/dagstuhl/BackesMU07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesDK07, author = {Michael Backes and Markus D{\"{u}}rmuth and Ralf K{\"{u}}sters}, title = {On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {233}, year = {2007}, url = {http://eprint.iacr.org/2007/233}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesDK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesMU07, author = {Michael Backes and Matteo Maffei and Dominique Unruh}, title = {Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {289}, year = {2007}, url = {http://eprint.iacr.org/2007/289}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesMU07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesU07, author = {Michael Backes and Dominique Unruh}, title = {On the Security of Protocols with Logarithmic Communication Complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {169}, year = {2007}, url = {http://eprint.iacr.org/2007/169}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesU07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jib/KuntzerBGBHKKL06, author = {Jan K{\"{u}}ntzer and Torsten Blum and Andreas Gerasch and Christina Backes and Andreas Hildebrandt and Michael Kaufmann and Oliver Kohlbacher and Hans{-}Peter Lenhof}, title = {{BN++} - {A} Biological Information System}, journal = {J. Integr. Bioinform.}, volume = {3}, number = {2}, year = {2006}, url = {https://doi.org/10.2390/biecoll-jib-2006-34}, doi = {10.2390/BIECOLL-JIB-2006-34}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jib/KuntzerBGBHKKL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/BackesDDMT06, author = {Michael Backes and Anupam Datta and Ante Derek and John C. Mitchell and Mathieu Turuani}, title = {Compositional analysis of contract-signing protocols}, journal = {Theor. Comput. Sci.}, volume = {367}, number = {1-2}, pages = {33--56}, year = {2006}, url = {https://doi.org/10.1016/j.tcs.2006.08.039}, doi = {10.1016/J.TCS.2006.08.039}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/BackesDDMT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BackesL06, author = {Michael Backes and Peeter Laud}, editor = {Ari Juels and Rebecca N. Wright and Sabrina De Capitani di Vimercati}, title = {Computationally sound secrecy proofs by mechanized flow analysis}, booktitle = {Proceedings of the 13th {ACM} Conference on Computer and Communications Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3, 2006}, pages = {370--379}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180405.1180450}, doi = {10.1145/1180405.1180450}, timestamp = {Wed, 24 Feb 2021 17:28:35 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BackesL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/SprengerBBPW06, author = {Christoph Sprenger and Michael Backes and David A. Basin and Birgit Pfitzmann and Michael Waidner}, title = {Cryptographically Sound Theorem Proving}, booktitle = {19th {IEEE} Computer Security Foundations Workshop, {(CSFW-19} 2006), 5-7 July 2006, Venice, Italy}, pages = {153--166}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/CSFW.2006.10}, doi = {10.1109/CSFW.2006.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/SprengerBBPW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BackesCJST06, author = {Michael Backes and Iliano Cervesato and Aaron D. Jaggard and Andre Scedrov and Joe{-}Kai Tsay}, editor = {Dieter Gollmann and Jan Meier and Andrei Sabelfeld}, title = {Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos}, booktitle = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4189}, pages = {362--383}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11863908\_23}, doi = {10.1007/11863908\_23}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BackesCJST06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BackesCO06, author = {Michael Backes and Christian Cachin and Alina Oprea}, editor = {Dieter Gollmann and Jan Meier and Andrei Sabelfeld}, title = {Secure Key-Updating for Lazy Revocation}, booktitle = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4189}, pages = {327--346}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11863908\_21}, doi = {10.1007/11863908\_21}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BackesCO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BackesDHK06, author = {Michael Backes and Markus D{\"{u}}rmuth and Dennis Hofheinz and Ralf K{\"{u}}sters}, editor = {Dieter Gollmann and Jan Meier and Andrei Sabelfeld}, title = {Conditional Reactive Simulatability}, booktitle = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4189}, pages = {424--443}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11863908\_26}, doi = {10.1007/11863908\_26}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BackesDHK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BackesPW06, author = {Michael Backes and Birgit Pfitzmann and Michael Waidner}, editor = {Dieter Gollmann and Jan Meier and Andrei Sabelfeld}, title = {Limits of the {BRSIM/UC} Soundness of Dolev-Yao Models with Hashes}, booktitle = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4189}, pages = {404--423}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11863908\_25}, doi = {10.1007/11863908\_25}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BackesPW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fm/BackesPW06, author = {Michael Backes and Birgit Pfitzmann and Michael Waidner}, editor = {Jayadev Misra and Tobias Nipkow and Emil Sekerinski}, title = {Formal Methods and Cryptography}, booktitle = {{FM} 2006: Formal Methods, 14th International Symposium on Formal Methods, Hamilton, Canada, August 21-27, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4085}, pages = {612--616}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11813040\_44}, doi = {10.1007/11813040\_44}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/fm/BackesPW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fossacs/BackesMPV06, author = {Michael Backes and Sebastian M{\"{o}}dersheim and Birgit Pfitzmann and Luca Vigan{\`{o}}}, editor = {Luca Aceto and Anna Ing{\'{o}}lfsd{\'{o}}ttir}, title = {Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario}, booktitle = {Foundations of Software Science and Computation Structures, 9th International Conference, {FOSSACS} 2006, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2006, Vienna, Austria, March 25-31, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3921}, pages = {428--445}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11690634\_29}, doi = {10.1007/11690634\_29}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/fossacs/BackesMPV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/BackesP06, author = {Michael Backes and Birgit Pfitzmann}, editor = {Simone Fischer{-}H{\"{u}}bner and Kai Rannenberg and Louise Yngstr{\"{o}}m and Stefan Lindskog}, title = {On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol}, booktitle = {Security and Privacy in Dynamic Environments, Proceedings of the {IFIP} {TC-11} 21st International Information Security Conference {(SEC} 2006), 22-24 May 2006, Karlstad, Sweden}, series = {{IFIP}}, volume = {201}, pages = {233--245}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/0-387-33406-8\_20}, doi = {10.1007/0-387-33406-8\_20}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/BackesP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isw/2006, editor = {Sokratis K. Katsikas and Javier L{\'{o}}pez and Michael Backes and Stefanos Gritzalis and Bart Preneel}, title = {Information Security, 9th International Conference, {ISC} 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4176}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11836810}, doi = {10.1007/11836810}, isbn = {3-540-38341-7}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesCJST06, author = {Michael Backes and Iliano Cervesato and Aaron D. Jaggard and Andre Scedrov and Joe{-}Kai Tsay}, title = {Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {219}, year = {2006}, url = {http://eprint.iacr.org/2006/219}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesCJST06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesDHK06, author = {Michael Backes and Markus D{\"{u}}rmuth and Dennis Hofheinz and Ralf K{\"{u}}sters}, title = {Conditional Reactive Simulatability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {132}, year = {2006}, url = {http://eprint.iacr.org/2006/132}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesDHK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesL06, author = {Michael Backes and Peeter Laud}, title = {Computationally Sound Secrecy Proofs by Mechanized Flow Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {266}, year = {2006}, url = {http://eprint.iacr.org/2006/266}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesMPV06, author = {Michael Backes and Sebastian M{\"{o}}dersheim and Birgit Pfitzmann and Luca Vigan{\`{o}}}, title = {Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {58}, year = {2006}, url = {http://eprint.iacr.org/2006/058}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesMPV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesMU06, author = {Michael Backes and J{\"{o}}rn M{\"{u}}ller{-}Quade and Dominique Unruh}, title = {On the Necessity of Rewinding in Secure Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {315}, year = {2006}, url = {http://eprint.iacr.org/2006/315}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesMU06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesPW06, author = {Michael Backes and Birgit Pfitzmann and Michael Waidner}, title = {Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {68}, year = {2006}, url = {http://eprint.iacr.org/2006/068}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesPW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SprengerBBPW06, author = {Christoph Sprenger and Michael Backes and David A. Basin and Birgit Pfitzmann and Michael Waidner}, title = {Cryptographically Sound Theorem Proving}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {47}, year = {2006}, url = {http://eprint.iacr.org/2006/047}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SprengerBBPW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BackesPW05, author = {Michael Backes and Birgit Pfitzmann and Michael Waidner}, title = {Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library}, journal = {Int. J. Inf. Sec.}, volume = {4}, number = {3}, pages = {135--154}, year = {2005}, url = {https://doi.org/10.1007/s10207-004-0056-6}, doi = {10.1007/S10207-004-0056-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BackesPW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BackesPW05a, author = {Michael Backes and Birgit Pfitzmann and Michael Waidner}, title = {Reactively secure signature schemes}, journal = {Int. J. Inf. Sec.}, volume = {4}, number = {4}, pages = {242--252}, year = {2005}, url = {https://doi.org/10.1007/s10207-004-0062-8}, doi = {10.1007/S10207-004-0062-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BackesPW05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlp/Backes05, author = {Michael Backes}, title = {Unifying simulatability definitions in cryptographic systems under different timing assumptions}, journal = {J. Log. Algebraic Methods Program.}, volume = {64}, number = {2}, pages = {157--188}, year = {2005}, url = {https://doi.org/10.1016/j.jlap.2004.09.002}, doi = {10.1016/J.JLAP.2004.09.002}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jlp/Backes05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BackesP05, author = {Michael Backes and Birgit Pfitzmann}, title = {Relating Symbolic and Cryptographic Secrecy}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {2}, number = {2}, pages = {109--123}, year = {2005}, url = {https://doi.org/10.1109/TDSC.2005.25}, doi = {10.1109/TDSC.2005.25}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BackesP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BackesHMU05, author = {Michael Backes and Dennis Hofheinz and J{\"{o}}rn M{\"{u}}ller{-}Quade and Dominique Unruh}, editor = {Vijay Atluri and Pierangela Samarati and Ralf K{\"{u}}sters and John C. Mitchell}, title = {On fairness in simulatability-based cryptographic systems}, booktitle = {Proceedings of the 2005 {ACM} workshop on Formal methods in security engineering, {FMSE} 2005, Fairfax, VA, USA, November 11, 2005}, pages = {13--22}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1103576.1103579}, doi = {10.1145/1103576.1103579}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BackesHMU05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BackesD05, author = {Michael Backes and Markus D{\"{u}}rmuth}, title = {A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System}, booktitle = {18th {IEEE} Computer Security Foundations Workshop, {(CSFW-18} 2005), 20-22 June 2005, Aix-en-Provence, France}, pages = {78--93}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSFW.2005.5}, doi = {10.1109/CSFW.2005.5}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BackesD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BackesDDMT05, author = {Michael Backes and Anupam Datta and Ante Derek and John C. Mitchell and Mathieu Turuani}, title = {Compositional Analysis of Contract Signing Protocols}, booktitle = {18th {IEEE} Computer Security Foundations Workshop, {(CSFW-18} 2005), 20-22 June 2005, Aix-en-Provence, France}, pages = {94--110}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSFW.2005.12}, doi = {10.1109/CSFW.2005.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BackesDDMT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Backes05, author = {Michael Backes}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {Quantifying Probabilistic Information Flow in Computational Reactive Systems}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {336--354}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_20}, doi = {10.1007/11555827\_20}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Backes05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BackesP05, author = {Michael Backes and Birgit Pfitzmann}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {Limits of the Cryptographic Realization of Dolev-Yao-Style {XOR}}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {178--196}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_11}, doi = {10.1007/11555827\_11}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BackesP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sisw/BackesCO05, author = {Michael Backes and Christian Cachin and Alina Oprea}, title = {Lazy Revocation in Cryptographic File Systems}, booktitle = {3rd International {IEEE} Security in Storage Workshop {(SISW} 2005), December 13, 2005, San Francisco, California, {USA}}, pages = {1--11}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/SISW.2005.7}, doi = {10.1109/SISW.2005.7}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sisw/BackesCO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BackesP05, author = {Michael Backes and Birgit Pfitzmann}, title = {Relating Symbolic and Cryptographic Secrecy}, booktitle = {2005 {IEEE} Symposium on Security and Privacy (S{\&}P 2005), 8-11 May 2005, Oakland, CA, {USA}}, pages = {171--182}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/SP.2005.17}, doi = {10.1109/SP.2005.17}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/BackesP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sws/BackesG05, author = {Michael Backes and Thomas Gro{\ss}}, editor = {Ernesto Damiani and Hiroshi Maruyama}, title = {Tailoring the Dolev-Yao abstraction to web services realities}, booktitle = {Proceedings of the 2nd {ACM} Workshop On Secure Web Services, {SWS} 2005, Fairfax, VA, USA, November 11, 2005}, pages = {65--74}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1103022.1103035}, doi = {10.1145/1103022.1103035}, timestamp = {Tue, 12 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sws/BackesG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BackesC05, author = {Michael Backes and Christian Cachin}, editor = {Joe Kilian}, title = {Public-Key Steganography with Active Attacks}, booktitle = {Theory of Cryptography, Second Theory of Cryptography Conference, {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3378}, pages = {210--226}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30576-7\_12}, doi = {10.1007/978-3-540-30576-7\_12}, timestamp = {Sun, 02 Jun 2019 21:21:22 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BackesC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/BackesCS05, author = {Michael Backes and Jan Camenisch and Dieter Sommer}, editor = {Vijay Atluri and Sabrina De Capitani di Vimercati and Roger Dingledine}, title = {Anonymous yet accountable access control}, booktitle = {Proceedings of the 2005 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2005, Alexandria, VA, USA, November 7, 2005}, pages = {40--46}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102199.1102208}, doi = {10.1145/1102199.1102208}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/BackesCS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/Backes06, author = {Michael Backes}, editor = {Mart{\'{\i}}n H{\"{o}}tzel Escard{\'{o}} and Achim Jung and Michael W. Mislove}, title = {Real-or-random Key Secrecy of the Otway-Rees Protocol via a Symbolic Security Proof}, booktitle = {Proceedings of the 21st Annual Conference on Mathematical Foundations of Programming Semantics, {MFPS} 2005, Birmingham, UK, May 18-21, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {155}, pages = {111--145}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.11.054}, doi = {10.1016/J.ENTCS.2005.11.054}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/Backes06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/BackesS07, author = {Michael Backes and Andre Scedrov}, editor = {Michael Backes and Andre Scedrov}, title = {Preface}, booktitle = {Proceedings of the International Workshop on Security and Concurrency, SecCo@CONCUR 2005, San Francisco, CA, USA, August 22, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {180}, number = {1}, pages = {1--2}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.05.043}, doi = {10.1016/J.ENTCS.2005.05.043}, timestamp = {Tue, 31 Jan 2023 13:51:04 +0100}, biburl = {https://dblp.org/rec/journals/entcs/BackesS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesCO05, author = {Michael Backes and Christian Cachin and Alina Oprea}, title = {Secure Key-Updating for Lazy Revocation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {334}, year = {2005}, url = {http://eprint.iacr.org/2005/334}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesCO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesHMU05, author = {Michael Backes and Dennis Hofheinz and J{\"{o}}rn M{\"{u}}ller{-}Quade and Dominique Unruh}, title = {On Fairness in Simulatability-based Cryptographic Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {294}, year = {2005}, url = {http://eprint.iacr.org/2005/294}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesHMU05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesP05, author = {Michael Backes and Birgit Pfitzmann}, title = {Limits of the Cryptographic Realization of Dolev-Yao-style {XOR}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {220}, year = {2005}, url = {http://eprint.iacr.org/2005/220}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesPS05, author = {Michael Backes and Birgit Pfitzmann and Andre Scedrov}, title = {Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {421}, year = {2005}, url = {http://eprint.iacr.org/2005/421}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesPS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/de/Backes2004, author = {Michael Backes}, title = {Cryptographically sound analysis of security protocols}, school = {Saarland University, Saarbr{\"{u}}cken, Germany}, year = {2004}, url = {http://scidok.sulb.uni-saarland.de/volltexte/2004/296/index.html}, urn = {urn:nbn:de:bsz:291-scidok-2966}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/de/Backes2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BackesP04, author = {Michael Backes and Birgit Pfitzmann}, title = {Computational probabilistic noninterference}, journal = {Int. J. Inf. Sec.}, volume = {3}, number = {1}, pages = {42--60}, year = {2004}, url = {https://doi.org/10.1007/s10207-004-0039-7}, doi = {10.1007/S10207-004-0039-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BackesP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BackesPW04, author = {Michael Backes and Birgit Pfitzmann and Michael Waidner}, title = {Polynomial liveness}, journal = {J. Comput. Secur.}, volume = {12}, number = {3-4}, pages = {589--617}, year = {2004}, url = {https://doi.org/10.3233/jcs-2004-123-409}, doi = {10.3233/JCS-2004-123-409}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BackesPW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/BackesP04, author = {Michael Backes and Birgit Pfitzmann}, title = {A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {22}, number = {10}, pages = {2075--2086}, year = {2004}, url = {https://doi.org/10.1109/JSAC.2004.836016}, doi = {10.1109/JSAC.2004.836016}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/BackesP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BackesP04, author = {Michael Backes and Birgit Pfitzmann}, title = {Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library}, booktitle = {17th {IEEE} Computer Security Foundations Workshop, {(CSFW-17} 2004), 28-30 June 2004, Pacific Grove, CA, {USA}}, pages = {204--218}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.ieeecomputersociety.org/10.1109/CSFW.2004.20}, doi = {10.1109/CSFW.2004.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BackesP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Backes04, author = {Michael Backes}, editor = {Pierangela Samarati and Peter Y. A. Ryan and Dieter Gollmann and Refik Molva}, title = {A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol}, booktitle = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3193}, pages = {89--108}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30108-0\_6}, doi = {10.1007/978-3-540-30108-0\_6}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Backes04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BackesDS04, author = {Michael Backes and Markus D{\"{u}}rmuth and Rainer Steinwandt}, editor = {Pierangela Samarati and Peter Y. A. Ryan and Dieter Gollmann and Refik Molva}, title = {An Algebra for Composing Enterprise Privacy Policies}, booktitle = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3193}, pages = {33--52}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30108-0\_3}, doi = {10.1007/978-3-540-30108-0\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BackesDS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fosad/BackesPW04, author = {Michael Backes and Birgit Pfitzmann and Michael Waidner}, editor = {Alessandro Aldini and Roberto Gorrieri and Fabio Martinelli}, title = {Justifying a Dolev-Yao Model Under Active Attacks}, booktitle = {Foundations of Security Analysis and Design III, {FOSAD} 2004/2005 Tutorial Lectures}, series = {Lecture Notes in Computer Science}, volume = {3655}, pages = {1--41}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11554578\_1}, doi = {10.1007/11554578\_1}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/fosad/BackesPW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/BackesH04, author = {Michael Backes and Dennis Hofheinz}, editor = {Kan Zhang and Yuliang Zheng}, title = {How to Break and Repair a Universally Composable Signature Functionality}, booktitle = {Information Security, 7th International Conference, {ISC} 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3225}, pages = {61--72}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30144-8\_6}, doi = {10.1007/978-3-540-30144-8\_6}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/isw/BackesH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/BackesPW04, author = {Michael Backes and Birgit Pfitzmann and Michael Waidner}, editor = {Kan Zhang and Yuliang Zheng}, title = {Low-Level Ideal Signatures and General Integrity Idealization}, booktitle = {Information Security, 7th International Conference, {ISC} 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3225}, pages = {39--51}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30144-8\_4}, doi = {10.1007/978-3-540-30144-8\_4}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/BackesPW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/BackesDK04, author = {Michael Backes and Markus D{\"{u}}rmuth and G{\"{u}}nter Karjoth}, title = {Unification in Privacy Policy Evaluation - Translating {EPAL} into Prolog}, booktitle = {5th {IEEE} International Workshop on Policies for Distributed Systems and Networks {(POLICY} 2004), 7-9 June 2004, Yorktown Heights, NY, {USA}}, pages = {185--188}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/POLICY.2004.1309165}, doi = {10.1109/POLICY.2004.1309165}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/BackesDK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/BackesKBS04, author = {Michael Backes and G{\"{u}}nter Karjoth and Walid Bagga and Matthias Schunter}, editor = {Hisham Haddad and Andrea Omicini and Roger L. Wainwright and Lorie M. Liebrock}, title = {Efficient comparison of enterprise privacy policies}, booktitle = {Proceedings of the 2004 {ACM} Symposium on Applied Computing (SAC), Nicosia, Cyprus, March 14-17, 2004}, pages = {375--382}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/967900.967983}, doi = {10.1145/967900.967983}, timestamp = {Tue, 06 Nov 2018 11:06:44 +0100}, biburl = {https://dblp.org/rec/conf/sac/BackesKBS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BackesPW04, author = {Michael Backes and Birgit Pfitzmann and Michael Waidner}, editor = {Moni Naor}, title = {A General Composition Theorem for Secure Reactive Systems}, booktitle = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC} 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2951}, pages = {336--354}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24638-1\_19}, doi = {10.1007/978-3-540-24638-1\_19}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BackesPW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2004, editor = {Vijayalakshmi Atluri and Michael Backes and David A. Basin and Michael Waidner}, title = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004}, publisher = {{ACM}}, year = {2004}, url = {http://dl.acm.org/citation.cfm?id=1030083}, isbn = {1-58113-971-3}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesP04, author = {Michael Backes and Birgit Pfitzmann}, title = {Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {59}, year = {2004}, url = {http://eprint.iacr.org/2004/059}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesP04a, author = {Michael Backes and Birgit Pfitzmann}, title = {Relating Symbolic and Cryptographic Secrecy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {300}, year = {2004}, url = {http://eprint.iacr.org/2004/300}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesP04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesPW04, author = {Michael Backes and Birgit Pfitzmann and Michael Waidner}, title = {The Reactive Simulatability {(RSIM)} Framework for Asynchronous Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {82}, year = {2004}, url = {http://eprint.iacr.org/2004/082}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesPW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bpm/BackesPW03, author = {Michael Backes and Birgit Pfitzmann and Michael Waidner}, editor = {Wil M. P. van der Aalst and Arthur H. M. ter Hofstede and Mathias Weske}, title = {Security in Business Process Engineering}, booktitle = {Business Process Management, International Conference, {BPM} 2003, Eindhoven, The Netherlands, June 26-27, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2678}, pages = {168--183}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-44895-0\_12}, doi = {10.1007/3-540-44895-0\_12}, timestamp = {Sat, 19 Oct 2019 20:23:19 +0200}, biburl = {https://dblp.org/rec/conf/bpm/BackesPW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BackesMM03, author = {Michael Backes and Catherine Meadows and John C. Mitchell}, editor = {Michael Backes and David A. Basin}, title = {Relating cryptography and formal methods: a panel}, booktitle = {Proceedings of the 2003 {ACM} workshop on Formal methods in security engineering, {FMSE} 2003, Washington, DC, USA, October 30, 2003}, pages = {61--66}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/1035429.1035436}, doi = {10.1145/1035429.1035436}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BackesMM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BackesPW03, author = {Michael Backes and Birgit Pfitzmann and Michael Waidner}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {A composable cryptographic library with nested operations}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {220--230}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948140}, doi = {10.1145/948109.948140}, timestamp = {Tue, 10 Nov 2020 20:00:42 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BackesPW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/concur/Backes03, author = {Michael Backes}, editor = {Roberto M. Amadio and Denis Lugiez}, title = {Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions}, booktitle = {{CONCUR} 2003 - Concurrency Theory, 14th International Conference, Marseille, France, September 3-5, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2761}, pages = {346--360}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45187-7\_23}, doi = {10.1007/978-3-540-45187-7\_23}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/concur/Backes03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/BackesC03, author = {Michael Backes and Christian Cachin}, title = {Reliable Broadcast in a Computational Hybrid Model with Byzantine Faults, Crashes, and Recoveries}, booktitle = {2003 International Conference on Dependable Systems and Networks {(DSN} 2003), 22-25 June 2003, San Francisco, CA, USA, Proceedings}, pages = {37--46}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/DSN.2003.1209914}, doi = {10.1109/DSN.2003.1209914}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/BackesC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BackesPS03, author = {Michael Backes and Birgit Pfitzmann and Matthias Schunter}, editor = {Einar Snekkenes and Dieter Gollmann}, title = {A Toolkit for Managing Enterprise Privacy Policies}, booktitle = {Computer Security - {ESORICS} 2003, 8th European Symposium on Research in Computer Security, Gj{\o}vik, Norway, October 13-15, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2808}, pages = {162--180}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39650-5\_10}, doi = {10.1007/978-3-540-39650-5\_10}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BackesPS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BackesPW03, author = {Michael Backes and Birgit Pfitzmann and Michael Waidner}, editor = {Einar Snekkenes and Dieter Gollmann}, title = {Symmetric Authentication within a Simulatable Cryptographic Library}, booktitle = {Computer Security - {ESORICS} 2003, 8th European Symposium on Research in Computer Security, Gj{\o}vik, Norway, October 13-15, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2808}, pages = {271--290}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39650-5\_16}, doi = {10.1007/978-3-540-39650-5\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BackesPW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/BackesP03, author = {Michael Backes and Birgit Pfitzmann}, editor = {Paritosh K. Pandya and Jaikumar Radhakrishnan}, title = {A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol}, booktitle = {{FST} {TCS} 2003: Foundations of Software Technology and Theoretical Computer Science, 23rd Conference, Mumbai, India, December 15-17, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2914}, pages = {1--12}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24597-1\_1}, doi = {10.1007/978-3-540-24597-1\_1}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/fsttcs/BackesP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/BackesPW03, author = {Michael Backes and Birgit Pfitzmann and Michael Waidner}, editor = {Colin Boyd and Wenbo Mao}, title = {Reactively Secure Signature Schemes}, booktitle = {Information Security, 6th International Conference, {ISC} 2003, Bristol, UK, October 1-3, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2851}, pages = {84--95}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10958513\_7}, doi = {10.1007/10958513\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/BackesPW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/BackesS03, author = {Michael Backes and Matthias Schunter}, editor = {Christian Hempelmann and Victor Raskin}, title = {From absence of certain vulnerabilities towards security proofs: pushing the limits of formal verification}, booktitle = {Proceedings of the New Security Paradigms Workshop 2003, August 18-21, 2002, Ascona, Switzerland}, pages = {67--74}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/986655.986666}, doi = {10.1145/986655.986666}, timestamp = {Wed, 14 Nov 2018 10:52:51 +0100}, biburl = {https://dblp.org/rec/conf/nspw/BackesS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/BackesCS03, author = {Michael Backes and Christian Cachin and Reto Strobl}, editor = {Elizabeth Borowsky and Sergio Rajsbaum}, title = {Proactive secure message transmission in asynchronous networks}, booktitle = {Proceedings of the Twenty-Second {ACM} Symposium on Principles of Distributed Computing, {PODC} 2003, Boston, Massachusetts, USA, July 13-16, 2003}, pages = {223--232}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/872035.872069}, doi = {10.1145/872035.872069}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/BackesCS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BackesP03, author = {Michael Backes and Birgit Pfitzmann}, title = {Intransitive Non-Interference for Cryptographic Purpose}, booktitle = {2003 {IEEE} Symposium on Security and Privacy (S{\&}P 2003), 11-14 May 2003, Berkeley, CA, {USA}}, pages = {140}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/SECPRI.2003.1199333}, doi = {10.1109/SECPRI.2003.1199333}, timestamp = {Thu, 21 Sep 2023 15:57:30 +0200}, biburl = {https://dblp.org/rec/conf/sp/BackesP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stacs/BackesJ03, author = {Michael Backes and Christian Jacobi}, editor = {Helmut Alt and Michel Habib}, title = {Cryptographically Sound and Machine-Assisted Verification of Security Protocols}, booktitle = {{STACS} 2003, 20th Annual Symposium on Theoretical Aspects of Computer Science, Berlin, Germany, February 27 - March 1, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2607}, pages = {675--686}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36494-3\_59}, doi = {10.1007/3-540-36494-3\_59}, timestamp = {Thu, 14 Oct 2021 10:38:16 +0200}, biburl = {https://dblp.org/rec/conf/stacs/BackesJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2003fmse, editor = {Michael Backes and David A. Basin}, title = {Proceedings of the 2003 {ACM} workshop on Formal methods in security engineering, {FMSE} 2003, Washington, DC, USA, October 30, 2003}, publisher = {{ACM}}, year = {2003}, isbn = {1-58113-781-8}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2003fmse.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Backes03, author = {Michael Backes}, title = {Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {114}, year = {2003}, url = {http://eprint.iacr.org/2003/114}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Backes03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesC03, author = {Michael Backes and Christian Cachin}, title = {Public-Key Steganography with Active Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {231}, year = {2003}, url = {http://eprint.iacr.org/2003/231}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesH03, author = {Michael Backes and Dennis Hofheinz}, title = {How to Break and Repair a Universally Composable Signature Functionality}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {240}, year = {2003}, url = {http://eprint.iacr.org/2003/240}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesP03, author = {Michael Backes and Birgit Pfitzmann}, title = {A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {121}, year = {2003}, url = {http://eprint.iacr.org/2003/121}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesPW03, author = {Michael Backes and Birgit Pfitzmann and Michael Waidner}, title = {A Universally Composable Cryptographic Library}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {15}, year = {2003}, url = {http://eprint.iacr.org/2003/015}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesPW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesPW03a, author = {Michael Backes and Birgit Pfitzmann and Michael Waidner}, title = {Symmetric Authentication Within a Simulatable Cryptographic Library}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {145}, year = {2003}, url = {http://eprint.iacr.org/2003/145}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesPW03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BackesPSW02, author = {Michael Backes and Birgit Pfitzmann and Michael Steiner and Michael Waidner}, title = {Polynomial Fairness and Liveness}, booktitle = {15th {IEEE} Computer Security Foundations Workshop {(CSFW-15} 2002), 24-26 June 2002, Cape Breton, Nova Scotia, Canada}, pages = {160--174}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSFW.2002.1021814}, doi = {10.1109/CSFW.2002.1021814}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BackesPSW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BackesP02, author = {Michael Backes and Birgit Pfitzmann}, editor = {Dieter Gollmann and G{\"{u}}nter Karjoth and Michael Waidner}, title = {Computational Probabilistic Non-interference}, booktitle = {Computer Security - {ESORICS} 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2502}, pages = {1--23}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45853-0\_1}, doi = {10.1007/3-540-45853-0\_1}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BackesP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fm/BackesJP02, author = {Michael Backes and Christian Jacobi and Birgit Pfitzmann}, editor = {Lars{-}Henrik Eriksson and Peter A. Lindsay}, title = {Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation}, booktitle = {{FME} 2002: Formal Methods - Getting {IT} Right, International Symposium of Formal Methods Europe, Copenhagen, Denmark, July 22-24, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2391}, pages = {310--329}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45614-7\_18}, doi = {10.1007/3-540-45614-7\_18}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/fm/BackesJP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/siggraph/WahrmanHBC88, author = {Michael Wahrman and Richard Hollander and Michael Backes and Martha Coolidge}, editor = {Richard L. Phillips}, title = {The reality of computer graphics in the motion picture industry}, booktitle = {Panel Proceedings of the 15th Annual Conference on Computer Graphics and Interactive Techniques, {SIGGRAPH} 1988, Atlanta, GA, USA, August 1-5, 1988}, pages = {7}, publisher = {{ACM}}, year = {1988}, url = {https://doi.org/10.1145/1402242.1402249}, doi = {10.1145/1402242.1402249}, timestamp = {Fri, 12 Mar 2021 11:26:26 +0100}, biburl = {https://dblp.org/rec/conf/siggraph/WahrmanHBC88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.