Search dblp for Publications

export results for "Michael Backes"

 download as .bib file

@inproceedings{DBLP:conf/tacas/FengHBITWPB24,
  author       = {Nick Feng and
                  Alan J. Hu and
                  Sam Bayless and
                  Syed M. Iqbal and
                  Patrick Trentin and
                  Mike Whalen and
                  Lee Pike and
                  John Backes},
  editor       = {Bernd Finkbeiner and
                  Laura Kov{\'{a}}cs},
  title        = {{DRAT} Proofs of Unsatisfiability for {SAT} Modulo Monotonic Theories},
  booktitle    = {Tools and Algorithms for the Construction and Analysis of Systems
                  - 30th International Conference, {TACAS} 2024, Held as Part of the
                  European Joint Conferences on Theory and Practice of Software, {ETAPS}
                  2024, Luxembourg City, Luxembourg, April 6-11, 2024, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14570},
  pages        = {3--23},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57246-3\_1},
  doi          = {10.1007/978-3-031-57246-3\_1},
  timestamp    = {Sun, 14 Apr 2024 18:32:16 +0200},
  biburl       = {https://dblp.org/rec/conf/tacas/FengHBITWPB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wacv/ZhangYW0Z24,
  author       = {Minxing Zhang and
                  Ning Yu and
                  Rui Wen and
                  Michael Backes and
                  Yang Zhang},
  title        = {Generated Distributions Are All You Need for Membership Inference
                  Attacks Against Generative Models},
  booktitle    = {{IEEE/CVF} Winter Conference on Applications of Computer Vision, {WACV}
                  2024, Waikoloa, HI, USA, January 3-8, 2024},
  pages        = {4827--4837},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/WACV57701.2024.00477},
  doi          = {10.1109/WACV57701.2024.00477},
  timestamp    = {Wed, 17 Apr 2024 07:41:22 +0200},
  biburl       = {https://dblp.org/rec/conf/wacv/ZhangYW0Z24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-05561,
  author       = {Lichao Sun and
                  Yue Huang and
                  Haoran Wang and
                  Siyuan Wu and
                  Qihui Zhang and
                  Chujie Gao and
                  Yixin Huang and
                  Wenhan Lyu and
                  Yixuan Zhang and
                  Xiner Li and
                  Zhengliang Liu and
                  Yixin Liu and
                  Yijue Wang and
                  Zhikun Zhang and
                  Bhavya Kailkhura and
                  Caiming Xiong and
                  Chaowei Xiao and
                  Chunyuan Li and
                  Eric P. Xing and
                  Furong Huang and
                  Hao Liu and
                  Heng Ji and
                  Hongyi Wang and
                  Huan Zhang and
                  Huaxiu Yao and
                  Manolis Kellis and
                  Marinka Zitnik and
                  Meng Jiang and
                  Mohit Bansal and
                  James Zou and
                  Jian Pei and
                  Jian Liu and
                  Jianfeng Gao and
                  Jiawei Han and
                  Jieyu Zhao and
                  Jiliang Tang and
                  Jindong Wang and
                  John Mitchell and
                  Kai Shu and
                  Kaidi Xu and
                  Kai{-}Wei Chang and
                  Lifang He and
                  Lifu Huang and
                  Michael Backes and
                  Neil Zhenqiang Gong and
                  Philip S. Yu and
                  Pin{-}Yu Chen and
                  Quanquan Gu and
                  Ran Xu and
                  Rex Ying and
                  Shuiwang Ji and
                  Suman Jana and
                  Tianlong Chen and
                  Tianming Liu and
                  Tianyi Zhou and
                  William Wang and
                  Xiang Li and
                  Xiangliang Zhang and
                  Xiao Wang and
                  Xing Xie and
                  Xun Chen and
                  Xuyu Wang and
                  Yan Liu and
                  Yanfang Ye and
                  Yinzhi Cao and
                  Yue Zhao},
  title        = {TrustLLM: Trustworthiness in Large Language Models},
  journal      = {CoRR},
  volume       = {abs/2401.05561},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.05561},
  doi          = {10.48550/ARXIV.2401.05561},
  eprinttype    = {arXiv},
  eprint       = {2401.05561},
  timestamp    = {Tue, 23 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-05561.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-10703,
  author       = {Nick Feng and
                  Alan J. Hu and
                  Sam Bayless and
                  Syed M. Iqbal and
                  Patrick Trentin and
                  Mike Whalen and
                  Lee Pike and
                  John Backes},
  title        = {{DRAT} Proofs of Unsatisfiability for {SAT} Modulo Monotonic Theories},
  journal      = {CoRR},
  volume       = {abs/2401.10703},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.10703},
  doi          = {10.48550/ARXIV.2401.10703},
  eprinttype    = {arXiv},
  eprint       = {2401.10703},
  timestamp    = {Fri, 02 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-10703.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-12233,
  author       = {Wenhao Wang and
                  Muhammad Ahmad Kaleem and
                  Adam Dziedzic and
                  Michael Backes and
                  Nicolas Papernot and
                  Franziska Boenisch},
  title        = {Memorization in Self-Supervised Learning Improves Downstream Generalization},
  journal      = {CoRR},
  volume       = {abs/2401.12233},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.12233},
  doi          = {10.48550/ARXIV.2401.12233},
  eprinttype    = {arXiv},
  eprint       = {2401.12233},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-12233.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-02987,
  author       = {Junjie Chu and
                  Zeyang Sha and
                  Michael Backes and
                  Yang Zhang},
  title        = {Conversation Reconstruction Attack Against {GPT} Models},
  journal      = {CoRR},
  volume       = {abs/2402.02987},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.02987},
  doi          = {10.48550/ARXIV.2402.02987},
  eprinttype    = {arXiv},
  eprint       = {2402.02987},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-02987.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-05668,
  author       = {Junjie Chu and
                  Yugeng Liu and
                  Ziqing Yang and
                  Xinyue Shen and
                  Michael Backes and
                  Yang Zhang},
  title        = {Comprehensive Assessment of Jailbreak Attacks Against LLMs},
  journal      = {CoRR},
  volume       = {abs/2402.05668},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.05668},
  doi          = {10.48550/ARXIV.2402.05668},
  eprinttype    = {arXiv},
  eprint       = {2402.05668},
  timestamp    = {Wed, 14 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-05668.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-09179,
  author       = {Rui Zhang and
                  Hongwei Li and
                  Rui Wen and
                  Wenbo Jiang and
                  Yuan Zhang and
                  Michael Backes and
                  Yun Shen and
                  Yang Zhang},
  title        = {Rapid Adoption, Hidden Risks: The Dual Impact of Large Language Model
                  Customization},
  journal      = {CoRR},
  volume       = {abs/2402.09179},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.09179},
  doi          = {10.48550/ARXIV.2402.09179},
  eprinttype    = {arXiv},
  eprint       = {2402.09179},
  timestamp    = {Mon, 19 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-09179.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ml/SmithGBA23,
  author       = {Michael Thomas Smith and
                  Kathrin Grosse and
                  Michael Backes and
                  Mauricio A. {\'{A}}lvarez},
  title        = {Adversarial vulnerability bounds for Gaussian process classification},
  journal      = {Mach. Learn.},
  volume       = {112},
  number       = {3},
  pages        = {971--1009},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10994-022-06224-6},
  doi          = {10.1007/S10994-022-06224-6},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ml/SmithGBA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/TizioSSBSK23,
  author       = {Giorgio Di Tizio and
                  Patrick Speicher and
                  Milivoj Simeonovski and
                  Michael Backes and
                  Ben Stock and
                  Robert K{\"{u}}nnemann},
  title        = {Pareto-optimal Defenses for the Web Infrastructure: Theory and Practice},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {2},
  pages        = {18:1--18:36},
  year         = {2023},
  url          = {https://doi.org/10.1145/3567595},
  doi          = {10.1145/3567595},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/TizioSSBSK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/QuSH0Z023,
  author       = {Yiting Qu and
                  Xinyue Shen and
                  Xinlei He and
                  Michael Backes and
                  Savvas Zannettou and
                  Yang Zhang},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Unsafe Diffusion: On the Generation of Unsafe Images and Hateful Memes
                  From Text-To-Image Models},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {3403--3417},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3616679},
  doi          = {10.1145/3576915.3616679},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/QuSH0Z023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/ShaHY0023,
  author       = {Zeyang Sha and
                  Xinlei He and
                  Ning Yu and
                  Michael Backes and
                  Yang Zhang},
  title        = {Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image
                  Encoders},
  booktitle    = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition,
                  {CVPR} 2023, Vancouver, BC, Canada, June 17-24, 2023},
  pages        = {16373--16383},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CVPR52729.2023.01571},
  doi          = {10.1109/CVPR52729.2023.01571},
  timestamp    = {Tue, 29 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cvpr/ShaHY0023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/00020000023,
  author       = {Rui Wen and
                  Zhengyu Zhao and
                  Zhuoran Liu and
                  Michael Backes and
                  Tianhao Wang and
                  Yang Zhang},
  title        = {Is Adversarial Training Really a Silver Bullet for Mitigating Data
                  Poisoning?},
  booktitle    = {The Eleventh International Conference on Learning Representations,
                  {ICLR} 2023, Kigali, Rwanda, May 1-5, 2023},
  publisher    = {OpenReview.net},
  year         = {2023},
  url          = {https://openreview.net/pdf?id=zKvm1ETDOq},
  timestamp    = {Fri, 30 Jun 2023 14:38:38 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/00020000023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/0002HL0HBZ23,
  author       = {Ziqing Yang and
                  Xinlei He and
                  Zheng Li and
                  Michael Backes and
                  Mathias Humbert and
                  Pascal Berrang and
                  Yang Zhang},
  editor       = {Andreas Krause and
                  Emma Brunskill and
                  Kyunghyun Cho and
                  Barbara Engelhardt and
                  Sivan Sabato and
                  Jonathan Scarlett},
  title        = {Data Poisoning Attacks Against Multimodal Encoders},
  booktitle    = {International Conference on Machine Learning, {ICML} 2023, 23-29 July
                  2023, Honolulu, Hawaii, {USA}},
  series       = {Proceedings of Machine Learning Research},
  volume       = {202},
  pages        = {39299--39313},
  publisher    = {{PMLR}},
  year         = {2023},
  url          = {https://proceedings.mlr.press/v202/yang23f.html},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icml/0002HL0HBZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/MaZYH0S023,
  author       = {Yihan Ma and
                  Zhikun Zhang and
                  Ning Yu and
                  Xinlei He and
                  Michael Backes and
                  Yun Shen and
                  Yang Zhang},
  editor       = {Andreas Krause and
                  Emma Brunskill and
                  Kyunghyun Cho and
                  Barbara Engelhardt and
                  Sivan Sabato and
                  Jonathan Scarlett},
  title        = {Generated Graph Detection},
  booktitle    = {International Conference on Machine Learning, {ICML} 2023, 23-29 July
                  2023, Honolulu, Hawaii, {USA}},
  series       = {Proceedings of Machine Learning Research},
  volume       = {202},
  pages        = {23412--23428},
  publisher    = {{PMLR}},
  year         = {2023},
  url          = {https://proceedings.mlr.press/v202/ma23h.html},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icml/MaZYH0S023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LiuL0S023,
  author       = {Yugeng Liu and
                  Zheng Li and
                  Michael Backes and
                  Yun Shen and
                  Yang Zhang},
  title        = {Backdoor Attacks Against Dataset Distillation},
  booktitle    = {30th Annual Network and Distributed System Security Symposium, {NDSS}
                  2023, San Diego, California, USA, February 27 - March 3, 2023},
  publisher    = {The Internet Society},
  year         = {2023},
  url          = {https://www.ndss-symposium.org/ndss-paper/backdoor-attacks-against-dataset-distillation/},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/LiuL0S023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/Lyastani0B23,
  author       = {Sanam Ghorbani Lyastani and
                  Michael Backes and
                  Sven Bugiel},
  title        = {A Systematic Study of the Consistency of Two-Factor Authentication
                  User Journeys on Top-Ranked Websites},
  booktitle    = {30th Annual Network and Distributed System Security Symposium, {NDSS}
                  2023, San Diego, California, USA, February 27 - March 3, 2023},
  publisher    = {The Internet Society},
  year         = {2023},
  url          = {https://www.ndss-symposium.org/ndss-paper/a-systematic-study-of-the-consistency-of-two-factor-authentication-user-journeys-on-top-ranked-websites/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/Lyastani0B23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/RasifardG0N23,
  author       = {Hamed Rasifard and
                  Rahul Gopinath and
                  Michael Backes and
                  Hamed Nemati},
  editor       = {Silvio Ranise and
                  Roberto Carbone and
                  Daniel Takabi},
  title        = {{SEAL:} Capability-Based Access Control for Data-Analytic Scenarios},
  booktitle    = {Proceedings of the 28th {ACM} Symposium on Access Control Models and
                  Technologies, {SACMAT} 2023, Trento, Italy, June 7-9, 2023},
  pages        = {67--78},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3589608.3593838},
  doi          = {10.1145/3589608.3593838},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/RasifardG0N23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/QuHPBZZ23,
  author       = {Yiting Qu and
                  Xinlei He and
                  Shannon Pierson and
                  Michael Backes and
                  Yang Zhang and
                  Savvas Zannettou},
  title        = {On the Evolution of (Hateful) Memes by Means of Multimodal Contrastive
                  Learning},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {293--310},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179315},
  doi          = {10.1109/SP46215.2023.10179315},
  timestamp    = {Thu, 27 Jul 2023 08:17:10 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/QuHPBZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/0032000023,
  author       = {Min Chen and
                  Zhikun Zhang and
                  Tianhao Wang and
                  Michael Backes and
                  Yang Zhang},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {{FACE-AUDITOR:} Data Auditing in Facial Recognition Systems},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {7195--7212},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/chen-min},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/0032000023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LiY00F023,
  author       = {Zheng Li and
                  Ning Yu and
                  Ahmed Salem and
                  Michael Backes and
                  Mario Fritz and
                  Yang Zhang},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {UnGANable: Defending Against GAN-based Face Manipulation},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {7213--7230},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/li-zheng},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LiY00F023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Si00023,
  author       = {Wai Man Si and
                  Michael Backes and
                  Yang Zhang and
                  Ahmed Salem},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Two-in-One: {A} Model Hijacking Attack Against Text Generation Models},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {2223--2240},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/si},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Si00023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/StaicuRK023,
  author       = {Cristian{-}Alexandru Staicu and
                  Sazzadur Rahaman and
                  {\'{A}}gnes Kiss and
                  Michael Backes},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Bilingual Problems: Studying the Security Risks Incurred by Native
                  Extensions in Scripting Languages},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {6133--6150},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/staicu},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/StaicuRK023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Wang00H00023,
  author       = {Haiming Wang and
                  Zhikun Zhang and
                  Tianhao Wang and
                  Shibo He and
                  Michael Backes and
                  Jiming Chen and
                  Yang Zhang},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {PrivTrace: Differentially Private Trajectory Synthesis by Adaptive
                  Markov Models},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {1649--1666},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/wang-haiming},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Wang00H00023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-01197,
  author       = {Yugeng Liu and
                  Zheng Li and
                  Michael Backes and
                  Yun Shen and
                  Yang Zhang},
  title        = {Backdoor Attacks Against Dataset Distillation},
  journal      = {CoRR},
  volume       = {abs/2301.01197},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.01197},
  doi          = {10.48550/ARXIV.2301.01197},
  eprinttype    = {arXiv},
  eprint       = {2301.01197},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-01197.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-09923,
  author       = {Xinyue Shen and
                  Yiting Qu and
                  Michael Backes and
                  Yang Zhang},
  title        = {Prompt Stealing Attacks Against Text-to-Image Generation Models},
  journal      = {CoRR},
  volume       = {abs/2302.09923},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.09923},
  doi          = {10.48550/ARXIV.2302.09923},
  eprinttype    = {arXiv},
  eprint       = {2302.09923},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-09923.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-05266,
  author       = {Ziqing Yang and
                  Zeyang Sha and
                  Michael Backes and
                  Yang Zhang},
  title        = {From Visual Prompt Learning to Zero-Shot Transfer: Mapping Is All
                  You Need},
  journal      = {CoRR},
  volume       = {abs/2303.05266},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.05266},
  doi          = {10.48550/ARXIV.2303.05266},
  eprinttype    = {arXiv},
  eprint       = {2303.05266},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-05266.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-14822,
  author       = {Xinlei He and
                  Xinyue Shen and
                  Zeyuan Chen and
                  Michael Backes and
                  Yang Zhang},
  title        = {MGTBench: Benchmarking Machine-Generated Text Detection},
  journal      = {CoRR},
  volume       = {abs/2303.14822},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.14822},
  doi          = {10.48550/ARXIV.2303.14822},
  eprinttype    = {arXiv},
  eprint       = {2303.14822},
  timestamp    = {Sat, 17 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-14822.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-02782,
  author       = {Min Chen and
                  Zhikun Zhang and
                  Tianhao Wang and
                  Michael Backes and
                  Yang Zhang},
  title        = {{FACE-AUDITOR:} Data Auditing in Facial Recognition Systems},
  journal      = {CoRR},
  volume       = {abs/2304.02782},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.02782},
  doi          = {10.48550/ARXIV.2304.02782},
  eprinttype    = {arXiv},
  eprint       = {2304.02782},
  timestamp    = {Sun, 28 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-02782.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-08979,
  author       = {Xinyue Shen and
                  Zeyuan Chen and
                  Michael Backes and
                  Yang Zhang},
  title        = {In ChatGPT We Trust? Measuring and Characterizing the Reliability
                  of ChatGPT},
  journal      = {CoRR},
  volume       = {abs/2304.08979},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.08979},
  doi          = {10.48550/ARXIV.2304.08979},
  eprinttype    = {arXiv},
  eprint       = {2304.08979},
  timestamp    = {Sat, 17 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-08979.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-07406,
  author       = {Wai Man Si and
                  Michael Backes and
                  Yang Zhang and
                  Ahmed Salem},
  title        = {Two-in-One: {A} Model Hijacking Attack Against Text Generation Models},
  journal      = {CoRR},
  volume       = {abs/2305.07406},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.07406},
  doi          = {10.48550/ARXIV.2305.07406},
  eprinttype    = {arXiv},
  eprint       = {2305.07406},
  timestamp    = {Thu, 10 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-07406.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-12502,
  author       = {Yugeng Liu and
                  Zheng Li and
                  Michael Backes and
                  Yun Shen and
                  Yang Zhang},
  title        = {Watermarking Diffusion Model},
  journal      = {CoRR},
  volume       = {abs/2305.12502},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.12502},
  doi          = {10.48550/ARXIV.2305.12502},
  eprinttype    = {arXiv},
  eprint       = {2305.12502},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-12502.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-13873,
  author       = {Yiting Qu and
                  Xinyue Shen and
                  Xinlei He and
                  Michael Backes and
                  Savvas Zannettou and
                  Yang Zhang},
  title        = {Unsafe Diffusion: On the Generation of Unsafe Images and Hateful Memes
                  From Text-To-Image Models},
  journal      = {CoRR},
  volume       = {abs/2305.13873},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.13873},
  doi          = {10.48550/ARXIV.2305.13873},
  eprinttype    = {arXiv},
  eprint       = {2305.13873},
  timestamp    = {Sat, 17 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-13873.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-01747,
  author       = {Peihua Ma and
                  Yixin Wu and
                  Ning Yu and
                  Yang Zhang and
                  Michael Backes and
                  Qin Wang and
                  Cheng{-}I Wei},
  title        = {Vision-language models boost food composition compilation},
  journal      = {CoRR},
  volume       = {abs/2306.01747},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.01747},
  doi          = {10.48550/ARXIV.2306.01747},
  eprinttype    = {arXiv},
  eprint       = {2306.01747},
  timestamp    = {Sat, 17 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-01747.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-07754,
  author       = {Yihan Ma and
                  Zhengyu Zhao and
                  Xinlei He and
                  Zheng Li and
                  Michael Backes and
                  Yang Zhang},
  title        = {Generative Watermarking Against Unauthorized Subject-Driven Image
                  Synthesis},
  journal      = {CoRR},
  volume       = {abs/2306.07754},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.07754},
  doi          = {10.48550/ARXIV.2306.07754},
  eprinttype    = {arXiv},
  eprint       = {2306.07754},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-07754.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-07758,
  author       = {Yihan Ma and
                  Zhikun Zhang and
                  Ning Yu and
                  Xinlei He and
                  Michael Backes and
                  Yun Shen and
                  Yang Zhang},
  title        = {Generated Graph Detection},
  journal      = {CoRR},
  volume       = {abs/2306.07758},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.07758},
  doi          = {10.48550/ARXIV.2306.07758},
  eprinttype    = {arXiv},
  eprint       = {2306.07758},
  timestamp    = {Wed, 16 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-07758.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-08681,
  author       = {Matthis Kruse and
                  Michael Backes and
                  Marco Patrignani},
  title        = {Secure Composition of Robust and Optimising Compilers},
  journal      = {CoRR},
  volume       = {abs/2307.08681},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.08681},
  doi          = {10.48550/ARXIV.2307.08681},
  eprinttype    = {arXiv},
  eprint       = {2307.08681},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-08681.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-03558,
  author       = {Wai Man Si and
                  Michael Backes and
                  Yang Zhang},
  title        = {Mondrian: Prompt Abstraction Attack Against Large Language Models
                  for Cheaper {API} Pricing},
  journal      = {CoRR},
  volume       = {abs/2308.03558},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.03558},
  doi          = {10.48550/ARXIV.2308.03558},
  eprinttype    = {arXiv},
  eprint       = {2308.03558},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-03558.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-03825,
  author       = {Xinyue Shen and
                  Zeyuan Chen and
                  Michael Backes and
                  Yun Shen and
                  Yang Zhang},
  title        = {"Do Anything Now": Characterizing and Evaluating In-The-Wild Jailbreak
                  Prompts on Large Language Models},
  journal      = {CoRR},
  volume       = {abs/2308.03825},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.03825},
  doi          = {10.48550/ARXIV.2308.03825},
  eprinttype    = {arXiv},
  eprint       = {2308.03825},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-03825.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-04933,
  author       = {Bartlomiej Surma and
                  Tahleen A. Rahman and
                  Monique M. B. Breteler and
                  Michael Backes and
                  Yang Zhang},
  title        = {You Are How You Walk: Quantifying Privacy Risks in Step Count Data},
  journal      = {CoRR},
  volume       = {abs/2308.04933},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.04933},
  doi          = {10.48550/ARXIV.2308.04933},
  eprinttype    = {arXiv},
  eprint       = {2308.04933},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-04933.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-07847,
  author       = {Yugeng Liu and
                  Tianshuo Cong and
                  Zhengyu Zhao and
                  Michael Backes and
                  Yun Shen and
                  Yang Zhang},
  title        = {Robustness Over Time: Understanding Adversarial Examples' Effectiveness
                  on Longitudinal Versions of Large Language Models},
  journal      = {CoRR},
  volume       = {abs/2308.07847},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.07847},
  doi          = {10.48550/ARXIV.2308.07847},
  eprinttype    = {arXiv},
  eprint       = {2308.07847},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-07847.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-04539,
  author       = {Minxing Zhang and
                  Michael Backes and
                  Xiao Zhang},
  title        = {Generating Less Certain Adversarial Examples Improves Robust Generalization},
  journal      = {CoRR},
  volume       = {abs/2310.04539},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.04539},
  doi          = {10.48550/ARXIV.2310.04539},
  eprinttype    = {arXiv},
  eprint       = {2310.04539},
  timestamp    = {Fri, 20 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-04539.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-05141,
  author       = {Yiyong Liu and
                  Michael Backes and
                  Xiao Zhang},
  title        = {Transferable Availability Poisoning Attacks},
  journal      = {CoRR},
  volume       = {abs/2310.05141},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.05141},
  doi          = {10.48550/ARXIV.2310.05141},
  eprinttype    = {arXiv},
  eprint       = {2310.05141},
  timestamp    = {Fri, 20 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-05141.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-07632,
  author       = {Hai Huang and
                  Zhengyu Zhao and
                  Michael Backes and
                  Yun Shen and
                  Yang Zhang},
  title        = {Prompt Backdoors in Visual Prompt Learning},
  journal      = {CoRR},
  volume       = {abs/2310.07632},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.07632},
  doi          = {10.48550/ARXIV.2310.07632},
  eprinttype    = {arXiv},
  eprint       = {2310.07632},
  timestamp    = {Tue, 24 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-07632.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-07676,
  author       = {Hai Huang and
                  Zhengyu Zhao and
                  Michael Backes and
                  Yun Shen and
                  Yang Zhang},
  title        = {Composite Backdoor Attacks Against Large Language Models},
  journal      = {CoRR},
  volume       = {abs/2310.07676},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.07676},
  doi          = {10.48550/ARXIV.2310.07676},
  eprinttype    = {arXiv},
  eprint       = {2310.07676},
  timestamp    = {Tue, 24 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-07676.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-08732,
  author       = {Yuan Xin and
                  Michael Backes and
                  Xiao Zhang},
  title        = {Provably Robust Cost-Sensitive Learning via Randomized Smoothing},
  journal      = {CoRR},
  volume       = {abs/2310.08732},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.08732},
  doi          = {10.48550/ARXIV.2310.08732},
  eprinttype    = {arXiv},
  eprint       = {2310.08732},
  timestamp    = {Wed, 25 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-08732.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-11397,
  author       = {Rui Wen and
                  Tianhao Wang and
                  Michael Backes and
                  Yang Zhang and
                  Ahmed Salem},
  title        = {Last One Standing: {A} Comparative Analysis of Security and Privacy
                  of Soft Prompt Tuning, LoRA, and In-Context Learning},
  journal      = {CoRR},
  volume       = {abs/2310.11397},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.11397},
  doi          = {10.48550/ARXIV.2310.11397},
  eprinttype    = {arXiv},
  eprint       = {2310.11397},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-11397.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-11850,
  author       = {Zhengyu Zhao and
                  Hanwei Zhang and
                  Renjue Li and
                  Ronan Sicre and
                  Laurent Amsaleg and
                  Michael Backes and
                  Qi Li and
                  Chao Shen},
  title        = {Revisiting Transferable Adversarial Image Examples: Attack Categorization,
                  Evaluation Guidelines, and New Insights},
  journal      = {CoRR},
  volume       = {abs/2310.11850},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.11850},
  doi          = {10.48550/ARXIV.2310.11850},
  eprinttype    = {arXiv},
  eprint       = {2310.11850},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-11850.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-11970,
  author       = {Yixin Wu and
                  Rui Wen and
                  Michael Backes and
                  Pascal Berrang and
                  Mathias Humbert and
                  Yun Shen and
                  Yang Zhang},
  title        = {Quantifying Privacy Risks of Prompts in Visual Prompt Learning},
  journal      = {CoRR},
  volume       = {abs/2310.11970},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.11970},
  doi          = {10.48550/ARXIV.2310.11970},
  eprinttype    = {arXiv},
  eprint       = {2310.11970},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-11970.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-12665,
  author       = {Boyang Zhang and
                  Zheng Li and
                  Ziqing Yang and
                  Xinlei He and
                  Michael Backes and
                  Mario Fritz and
                  Yang Zhang},
  title        = {SecurityNet: Assessing Machine Learning Vulnerabilities on Public
                  Models},
  journal      = {CoRR},
  volume       = {abs/2310.12665},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.12665},
  doi          = {10.48550/ARXIV.2310.12665},
  eprinttype    = {arXiv},
  eprint       = {2310.12665},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-12665.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-16613,
  author       = {Yixin Wu and
                  Ning Yu and
                  Michael Backes and
                  Yun Shen and
                  Yang Zhang},
  title        = {On the Proactive Generation of Unsafe Images From Text-To-Image Models
                  Using Benign Prompts},
  journal      = {CoRR},
  volume       = {abs/2310.16613},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.16613},
  doi          = {10.48550/ARXIV.2310.16613},
  eprinttype    = {arXiv},
  eprint       = {2310.16613},
  timestamp    = {Tue, 31 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-16613.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-19410,
  author       = {Minxing Zhang and
                  Ning Yu and
                  Rui Wen and
                  Michael Backes and
                  Yang Zhang},
  title        = {Generated Distributions Are All You Need for Membership Inference
                  Attacks Against Generative Models},
  journal      = {CoRR},
  volume       = {abs/2310.19410},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.19410},
  doi          = {10.48550/ARXIV.2310.19410},
  eprinttype    = {arXiv},
  eprint       = {2310.19410},
  timestamp    = {Thu, 02 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-19410.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-14685,
  author       = {Boyang Zhang and
                  Xinyue Shen and
                  Wai Man Si and
                  Zeyang Sha and
                  Zeyuan Chen and
                  Ahmed Salem and
                  Yun Shen and
                  Michael Backes and
                  Yang Zhang},
  title        = {Comprehensive Assessment of Toxicity in ChatGPT},
  journal      = {CoRR},
  volume       = {abs/2311.14685},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.14685},
  doi          = {10.48550/ARXIV.2311.14685},
  eprinttype    = {arXiv},
  eprint       = {2311.14685},
  timestamp    = {Thu, 30 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-14685.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-11213,
  author       = {Yiting Qu and
                  Zhikun Zhang and
                  Yun Shen and
                  Michael Backes and
                  Yang Zhang},
  title        = {{FAKEPCD:} Fake Point Cloud Detection via Source Attribution},
  journal      = {CoRR},
  volume       = {abs/2312.11213},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.11213},
  doi          = {10.48550/ARXIV.2312.11213},
  eprinttype    = {arXiv},
  eprint       = {2312.11213},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-11213.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GrosseLBPBM22,
  author       = {Kathrin Grosse and
                  Taesung Lee and
                  Battista Biggio and
                  Youngja Park and
                  Michael Backes and
                  Ian M. Molloy},
  title        = {Backdoor smoothing: Demystifying backdoor attacks on deep neural networks},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102814},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102814},
  doi          = {10.1016/J.COSE.2022.102814},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GrosseLBPBM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Chen000H022,
  author       = {Min Chen and
                  Zhikun Zhang and
                  Tianhao Wang and
                  Michael Backes and
                  Mathias Humbert and
                  Yang Zhang},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Graph Unlearning},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {499--513},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3559352},
  doi          = {10.1145/3548606.3559352},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Chen000H022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Huang0S00022,
  author       = {Hai Huang and
                  Zhikun Zhang and
                  Yun Shen and
                  Michael Backes and
                  Qi Li and
                  Yang Zhang},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {On the Privacy Risks of Cell-Based {NAS} Architectures},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {1427--1441},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560619},
  doi          = {10.1145/3548606.3560619},
  timestamp    = {Tue, 08 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Huang0S00022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiLHY0022,
  author       = {Zheng Li and
                  Yiyong Liu and
                  Xinlei He and
                  Ning Yu and
                  Michael Backes and
                  Yang Zhang},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Auditing Membership Leakages of Multi-Exit Networks},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {1917--1931},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3559359},
  doi          = {10.1145/3548606.3559359},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LiLHY0022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Liu00022,
  author       = {Yiyong Liu and
                  Zhengyu Zhao and
                  Michael Backes and
                  Yang Zhang},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Membership Inference Attacks by Exploiting Loss Trajectory},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {2085--2098},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560684},
  doi          = {10.1145/3548606.3560684},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Liu00022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Nguyen0S22,
  author       = {Trung Tin Nguyen and
                  Michael Backes and
                  Ben Stock},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Freely Given Consent?: Studying Consent Notice of Third-Party Tracking
                  and Its Violations of {GDPR} in Android Apps},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {2369--2383},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560564},
  doi          = {10.1145/3548606.3560564},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Nguyen0S22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShenH0CY0ZS22,
  author       = {Yun Shen and
                  Yufei Han and
                  Zhikun Zhang and
                  Min Chen and
                  Ting Yu and
                  Michael Backes and
                  Yang Zhang and
                  Gianluca Stringhini},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Finding {MNEMON:} Reviving Memories of Node Embeddings},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {2643--2657},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3559358},
  doi          = {10.1145/3548606.3559358},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ShenH0CY0ZS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Si0BCSZ022,
  author       = {Wai Man Si and
                  Michael Backes and
                  Jeremy Blackburn and
                  Emiliano De Cristofaro and
                  Gianluca Stringhini and
                  Savvas Zannettou and
                  Yang Zhang},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Why So Toxic?: Measuring and Triggering Toxic Behavior in Open-Domain
                  Chatbots},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {2659--2673},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560599},
  doi          = {10.1145/3548606.3560599},
  timestamp    = {Tue, 08 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Si0BCSZ022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BackesBHP22,
  author       = {Michael Backes and
                  Pascal Berrang and
                  Lucjan Hanzlik and
                  Ivan Pryvalov},
  editor       = {Vijayalakshmi Atluri and
                  Roberto Di Pietro and
                  Christian Damsgaard Jensen and
                  Weizhi Meng},
  title        = {A Framework for Constructing Single Secret Leader Election from {MPC}},
  booktitle    = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13555},
  pages        = {672--691},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17146-8\_33},
  doi          = {10.1007/978-3-031-17146-8\_33},
  timestamp    = {Tue, 27 Sep 2022 21:07:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BackesBHP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/SalemWBMZ22,
  author       = {Ahmed Salem and
                  Rui Wen and
                  Michael Backes and
                  Shiqing Ma and
                  Yang Zhang},
  title        = {Dynamic Backdoor Attacks Against Machine Learning Models},
  booktitle    = {7th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2022, Genoa, Italy, June 6-10, 2022},
  pages        = {703--718},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/EuroSP53844.2022.00049},
  doi          = {10.1109/EUROSP53844.2022.00049},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/SalemWBMZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwsm/ShenH0BZ022,
  author       = {Xinyue Shen and
                  Xinlei He and
                  Michael Backes and
                  Jeremy Blackburn and
                  Savvas Zannettou and
                  Yang Zhang},
  editor       = {Ceren Budak and
                  Meeyoung Cha and
                  Daniele Quercia},
  title        = {On Xing Tian and the Perseverance of Anti-China Sentiment Online},
  booktitle    = {Proceedings of the Sixteenth International {AAAI} Conference on Web
                  and Social Media, {ICWSM} 2022, Atlanta, Georgia, USA, June 6-9, 2022},
  pages        = {944--955},
  publisher    = {{AAAI} Press},
  year         = {2022},
  url          = {https://ojs.aaai.org/index.php/ICWSM/article/view/19348},
  timestamp    = {Wed, 22 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icwsm/ShenH0BZ022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/00010022,
  author       = {Ahmed Salem and
                  Michael Backes and
                  Yang Zhang},
  title        = {Get a Model! Model Hijacking Attack Against Machine Learning Models},
  booktitle    = {29th Annual Network and Distributed System Security Symposium, {NDSS}
                  2022, San Diego, California, USA, April 24-28, 2022},
  publisher    = {The Internet Society},
  year         = {2022},
  url          = {https://www.ndss-symposium.org/ndss-paper/auto-draft-241/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/00010022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/BieringerG0BK22,
  author       = {Lukas Bieringer and
                  Kathrin Grosse and
                  Michael Backes and
                  Battista Biggio and
                  Katharina Krombholz},
  editor       = {Sonia Chiasson and
                  Apu Kapadia},
  title        = {Industrial practitioners' mental models of adversarial machine learning},
  booktitle    = {Eighteenth Symposium on Usable Privacy and Security, {SOUPS} 2022,
                  Boston, MA, USA, August 7-9, 2022},
  pages        = {97--116},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/soups2022/presentation/bieringer},
  timestamp    = {Wed, 26 Oct 2022 12:44:43 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/BieringerG0BK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/000100S022,
  author       = {Zhikun Zhang and
                  Min Chen and
                  Michael Backes and
                  Yun Shen and
                  Yang Zhang},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Inference Attacks Against Graph Neural Networks},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {4543--4560},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/zhang-zhikun},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/000100S022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LiuWH000CF022,
  author       = {Yugeng Liu and
                  Rui Wen and
                  Xinlei He and
                  Ahmed Salem and
                  Zhikun Zhang and
                  Michael Backes and
                  Emiliano De Cristofaro and
                  Mario Fritz and
                  Yang Zhang},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine
                  Learning Models},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {4525--4542},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/liu-yugeng},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/LiuWH000CF022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-07513,
  author       = {Zeyang Sha and
                  Xinlei He and
                  Ning Yu and
                  Michael Backes and
                  Yang Zhang},
  title        = {Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image
                  Encoders},
  journal      = {CoRR},
  volume       = {abs/2201.07513},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.07513},
  eprinttype    = {arXiv},
  eprint       = {2201.07513},
  timestamp    = {Tue, 21 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-07513.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2204-06963,
  author       = {Yun Shen and
                  Yufei Han and
                  Zhikun Zhang and
                  Min Chen and
                  Ting Yu and
                  Michael Backes and
                  Yang Zhang and
                  Gianluca Stringhini},
  title        = {Finding {MNEMON:} Reviving Memories of Node Embeddings},
  journal      = {CoRR},
  volume       = {abs/2204.06963},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2204.06963},
  doi          = {10.48550/ARXIV.2204.06963},
  eprinttype    = {arXiv},
  eprint       = {2204.06963},
  timestamp    = {Thu, 24 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2204-06963.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2204-08935,
  author       = {Xinyue Shen and
                  Xinlei He and
                  Michael Backes and
                  Jeremy Blackburn and
                  Savvas Zannettou and
                  Yang Zhang},
  title        = {On Xing Tian and the Perseverance of Anti-China Sentiment Online},
  journal      = {CoRR},
  volume       = {abs/2204.08935},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2204.08935},
  doi          = {10.48550/ARXIV.2204.08935},
  eprinttype    = {arXiv},
  eprint       = {2204.08935},
  timestamp    = {Tue, 21 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2204-08935.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-11180,
  author       = {Zheng Li and
                  Yiyong Liu and
                  Xinlei He and
                  Ning Yu and
                  Michael Backes and
                  Yang Zhang},
  title        = {Auditing Membership Leakages of Multi-Exit Networks},
  journal      = {CoRR},
  volume       = {abs/2208.11180},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.11180},
  doi          = {10.48550/ARXIV.2208.11180},
  eprinttype    = {arXiv},
  eprint       = {2208.11180},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-11180.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-14933,
  author       = {Yiyong Liu and
                  Zhengyu Zhao and
                  Michael Backes and
                  Yang Zhang},
  title        = {Membership Inference Attacks by Exploiting Loss Trajectory},
  journal      = {CoRR},
  volume       = {abs/2208.14933},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.14933},
  doi          = {10.48550/ARXIV.2208.14933},
  eprinttype    = {arXiv},
  eprint       = {2208.14933},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-14933.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-01688,
  author       = {Hai Huang and
                  Zhikun Zhang and
                  Yun Shen and
                  Michael Backes and
                  Qi Li and
                  Yang Zhang},
  title        = {On the Privacy Risks of Cell-Based {NAS} Architectures},
  journal      = {CoRR},
  volume       = {abs/2209.01688},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.01688},
  doi          = {10.48550/ARXIV.2209.01688},
  eprinttype    = {arXiv},
  eprint       = {2209.01688},
  timestamp    = {Wed, 09 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-01688.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-03463,
  author       = {Wai Man Si and
                  Michael Backes and
                  Jeremy Blackburn and
                  Emiliano De Cristofaro and
                  Gianluca Stringhini and
                  Savvas Zannettou and
                  Yang Zhang},
  title        = {Why So Toxic? Measuring and Triggering Toxic Behavior in Open-Domain
                  Chatbots},
  journal      = {CoRR},
  volume       = {abs/2209.03463},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.03463},
  doi          = {10.48550/ARXIV.2209.03463},
  eprinttype    = {arXiv},
  eprint       = {2209.03463},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-03463.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-15266,
  author       = {Ziqing Yang and
                  Xinlei He and
                  Zheng Li and
                  Michael Backes and
                  Mathias Humbert and
                  Pascal Berrang and
                  Yang Zhang},
  title        = {Data Poisoning Attacks Against Multimodal Encoders},
  journal      = {CoRR},
  volume       = {abs/2209.15266},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.15266},
  doi          = {10.48550/ARXIV.2209.15266},
  eprinttype    = {arXiv},
  eprint       = {2209.15266},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-15266.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-00581,
  author       = {Haiming Wang and
                  Zhikun Zhang and
                  Tianhao Wang and
                  Shibo He and
                  Michael Backes and
                  Jiming Chen and
                  Yang Zhang},
  title        = {PrivTrace: Differentially Private Trajectory Synthesis by Adaptive
                  Markov Model},
  journal      = {CoRR},
  volume       = {abs/2210.00581},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.00581},
  doi          = {10.48550/ARXIV.2210.00581},
  eprinttype    = {arXiv},
  eprint       = {2210.00581},
  timestamp    = {Fri, 07 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-00581.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-00957,
  author       = {Zheng Li and
                  Ning Yu and
                  Ahmed Salem and
                  Michael Backes and
                  Mario Fritz and
                  Yang Zhang},
  title        = {UnGANable: Defending Against GAN-based Face Manipulation},
  journal      = {CoRR},
  volume       = {abs/2210.00957},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.00957},
  doi          = {10.48550/ARXIV.2210.00957},
  eprinttype    = {arXiv},
  eprint       = {2210.00957},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-00957.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-00968,
  author       = {Yixin Wu and
                  Ning Yu and
                  Zheng Li and
                  Michael Backes and
                  Yang Zhang},
  title        = {Membership Inference Attacks Against Text-to-image Generation Models},
  journal      = {CoRR},
  volume       = {abs/2210.00968},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.00968},
  doi          = {10.48550/ARXIV.2210.00968},
  eprinttype    = {arXiv},
  eprint       = {2210.00968},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-00968.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-01632,
  author       = {Xinyue Shen and
                  Xinlei He and
                  Zheng Li and
                  Yun Shen and
                  Michael Backes and
                  Yang Zhang},
  title        = {Backdoor Attacks in the Supply Chain of Masked Image Modeling},
  journal      = {CoRR},
  volume       = {abs/2210.01632},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.01632},
  doi          = {10.48550/ARXIV.2210.01632},
  eprinttype    = {arXiv},
  eprint       = {2210.01632},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-01632.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-09373,
  author       = {Sanam Ghorbani Lyastani and
                  Michael Backes and
                  Sven Bugiel},
  title        = {A Systematic Study of the Consistency of Two-Factor Authentication
                  User Journeys on Top-Ranked Websites (Extended Version)},
  journal      = {CoRR},
  volume       = {abs/2210.09373},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.09373},
  doi          = {10.48550/ARXIV.2210.09373},
  eprinttype    = {arXiv},
  eprint       = {2210.09373},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-09373.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-09565,
  author       = {Zhengyu Zhao and
                  Hanwei Zhang and
                  Renjue Li and
                  Ronan Sicre and
                  Laurent Amsaleg and
                  Michael Backes},
  title        = {Towards Good Practices in Evaluating Transfer Adversarial Attacks},
  journal      = {CoRR},
  volume       = {abs/2211.09565},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.09565},
  doi          = {10.48550/ARXIV.2211.09565},
  eprinttype    = {arXiv},
  eprint       = {2211.09565},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-09565.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-06573,
  author       = {Yiting Qu and
                  Xinlei He and
                  Shannon Pierson and
                  Michael Backes and
                  Yang Zhang and
                  Savvas Zannettou},
  title        = {On the Evolution of (Hateful) Memes by Means of Multimodal Contrastive
                  Learning},
  journal      = {CoRR},
  volume       = {abs/2212.06573},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.06573},
  doi          = {10.48550/ARXIV.2212.06573},
  eprinttype    = {arXiv},
  eprint       = {2212.06573},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-06573.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001BHP22,
  author       = {Michael Backes and
                  Pascal Berrang and
                  Lucjan Hanzlik and
                  Ivan Pryvalov},
  title        = {A framework for constructing Single Secret Leader Election from {MPC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1040},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1040},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001BHP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Chen0C0MSW021,
  author       = {Xiaoyi Chen and
                  Ahmed Salem and
                  Dingfan Chen and
                  Michael Backes and
                  Shiqing Ma and
                  Qingni Shen and
                  Zhonghai Wu and
                  Yang Zhang},
  title        = {BadNL: Backdoor Attacks against {NLP} Models with Semantic-preserving
                  Improvements},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {554--569},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485837},
  doi          = {10.1145/3485832.3485837},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/Chen0C0MSW021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/NguyenNSW021,
  author       = {Trung Tin Nguyen and
                  Duc Cuong Nguyen and
                  Michael Schilling and
                  Gang Wang and
                  Michael Backes},
  editor       = {Jiannong Cao and
                  Man Ho Au and
                  Zhiqiang Lin and
                  Moti Yung},
  title        = {Measuring User Perception for Detecting Unexpected Access to Sensitive
                  Resource in Mobile Apps},
  booktitle    = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications
                  Security, Virtual Event, Hong Kong, June 7-11, 2021},
  pages        = {578--592},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3433210.3437511},
  doi          = {10.1145/3433210.3437511},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiaccs/NguyenNSW021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/BaylessBDJLTJJZ20,
  author       = {Sam Bayless and
                  John D. Backes and
                  Dan DaCosta and
                  Benjamin F. Jones and
                  Nate Launchbury and
                  Patrick Trentin and
                  Kelsey Jewell and
                  Sagar Joshi and
                  Michael Q. Zeng and
                  Nandita Mathews},
  editor       = {Alexandra Silva and
                  K. Rustan M. Leino},
  title        = {Debugging Network Reachability with Blocked Paths},
  booktitle    = {Computer Aided Verification - 33rd International Conference, {CAV}
                  2021, Virtual Event, July 20-23, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12760},
  pages        = {851--862},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-81688-9\_39},
  doi          = {10.1007/978-3-030-81688-9\_39},
  timestamp    = {Fri, 20 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/BaylessBDJLTJJZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Chen000HZ21,
  author       = {Min Chen and
                  Zhikun Zhang and
                  Tianhao Wang and
                  Michael Backes and
                  Mathias Humbert and
                  Yang Zhang},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {When Machine Unlearning Jeopardizes Privacy},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {896--911},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484756},
  doi          = {10.1145/3460120.3484756},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Chen000HZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FassS0S21,
  author       = {Aurore Fass and
                  Doli{\`{e}}re Francis Som{\'{e}} and
                  Michael Backes and
                  Ben Stock},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {DoubleX: Statically Detecting Vulnerable Data Flows in Browser Extensions
                  at Scale},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {1789--1804},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484745},
  doi          = {10.1145/3460120.3484745},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/FassS0S21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RothG0KS21,
  author       = {Sebastian Roth and
                  Lea Gr{\"{o}}ber and
                  Michael Backes and
                  Katharina Krombholz and
                  Ben Stock},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {12 Angry Developers - {A} Qualitative Study on Developers' Struggles
                  with {CSP}},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {3085--3103},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484780},
  doi          = {10.1145/3460120.3484780},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/RothG0KS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Kunnemann0021,
  author       = {Robert K{\"{u}}nnemann and
                  Deepak Garg and
                  Michael Backes},
  title        = {Accountability in the Decentralised-Adversary Setting},
  booktitle    = {34th {IEEE} Computer Security Foundations Symposium, {CSF} 2021, Dubrovnik,
                  Croatia, June 21-25, 2021},
  pages        = {1--16},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSF51468.2021.00007},
  doi          = {10.1109/CSF51468.2021.00007},
  timestamp    = {Fri, 13 Aug 2021 09:20:41 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Kunnemann0021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/Hanzlik0G0A0F21,
  author       = {Lucjan Hanzlik and
                  Yang Zhang and
                  Kathrin Grosse and
                  Ahmed Salem and
                  Maximilian Augustin and
                  Michael Backes and
                  Mario Fritz},
  title        = {MLCapsule: Guarded Offline Deployment of Machine Learning as a Service},
  booktitle    = {{IEEE} Conference on Computer Vision and Pattern Recognition Workshops,
                  {CVPR} Workshops 2021, virtual, June 19-25, 2021},
  pages        = {3300--3309},
  publisher    = {Computer Vision Foundation / {IEEE}},
  year         = {2021},
  url          = {https://openaccess.thecvf.com/content/CVPR2021W/TCV/html/Hanzlik\_MLCapsule\_Guarded\_Offline\_Deployment\_of\_Machine\_Learning\_as\_a\_Service\_CVPRW\_2021\_paper.html},
  doi          = {10.1109/CVPRW53098.2021.00368},
  timestamp    = {Mon, 18 Jul 2022 16:47:41 +0200},
  biburl       = {https://dblp.org/rec/conf/cvpr/Hanzlik0G0A0F21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/MoogD0F21,
  author       = {Marvin Moog and
                  Markus Demmel and
                  Michael Backes and
                  Aurore Fass},
  title        = {Statically Detecting JavaScript Obfuscation and Minification Techniques
                  in the Wild},
  booktitle    = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021},
  pages        = {569--580},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSN48987.2021.00065},
  doi          = {10.1109/DSN48987.2021.00065},
  timestamp    = {Mon, 09 Aug 2021 14:50:25 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/MoogD0F21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdm/Grosse021,
  author       = {Kathrin Grosse and
                  Michael Backes},
  editor       = {Carlotta Demeniconi and
                  Ian Davidson},
  title        = {Do winning tickets exist before {DNN} training?},
  booktitle    = {Proceedings of the 2021 {SIAM} International Conference on Data Mining,
                  {SDM} 2021, Virtual Event, April 29 - May 1, 2021},
  pages        = {549--557},
  publisher    = {{SIAM}},
  year         = {2021},
  url          = {https://doi.org/10.1137/1.9781611976700.62},
  doi          = {10.1137/1.9781611976700.62},
  timestamp    = {Sat, 21 Aug 2021 11:46:54 +0200},
  biburl       = {https://dblp.org/rec/conf/sdm/Grosse021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/00010LH0H0021,
  author       = {Zhikun Zhang and
                  Tianhao Wang and
                  Ninghui Li and
                  Jean Honorio and
                  Michael Backes and
                  Shibo He and
                  Jiming Chen and
                  Yang Zhang},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {PrivSyn: Differentially Private Data Synthesis},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {929--946},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/zhang-zhikun},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/00010LH0H0021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/00100B21,
  author       = {Jie Huang and
                  Michael Backes and
                  Sven Bugiel},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {A11y and Privacy don't have to be mutually exclusive: Constraining
                  Accessibility Service Misuse on Android},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3631--3648},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/huang},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/00100B21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Elbitar0N0B21,
  author       = {Yusra Elbitar and
                  Michael Schilling and
                  Trung Tin Nguyen and
                  Michael Backes and
                  Sven Bugiel},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Explanation Beats Context: The Effect of Timing {\&} Rationales
                  on Users' Runtime Permission Decisions},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {785--802},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/elbitar},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Elbitar0N0B21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HeJ0G021,
  author       = {Xinlei He and
                  Jinyuan Jia and
                  Michael Backes and
                  Neil Zhenqiang Gong and
                  Yang Zhang},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Stealing Links from Graph Neural Networks},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2669--2686},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/he-xinlei},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/HeJ0G021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Nguyen0MS21,
  author       = {Trung Tin Nguyen and
                  Michael Backes and
                  Ninja Marnau and
                  Ben Stock},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Share First, Ask Later (or Never?) Studying Violations of GDPR's Explicit
                  Consent in Android Apps},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3667--3684},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/nguyen},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Nguyen0MS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/OltroggeHAA0F21,
  author       = {Marten Oltrogge and
                  Nicolas Huaman and
                  Sabrina Amft and
                  Yasemin Acar and
                  Michael Backes and
                  Sascha Fahl},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Why Eve and Mallory Still Love Android: Revisiting {TLS} (In)Security
                  in Android Applications},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {4347--4364},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/oltrogge},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/OltroggeHAA0F21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-02551,
  author       = {Yugeng Liu and
                  Rui Wen and
                  Xinlei He and
                  Ahmed Salem and
                  Zhikun Zhang and
                  Michael Backes and
                  Emiliano De Cristofaro and
                  Mario Fritz and
                  Yang Zhang},
  title        = {ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine
                  Learning Models},
  journal      = {CoRR},
  volume       = {abs/2102.02551},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.02551},
  eprinttype    = {arXiv},
  eprint       = {2102.02551},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-02551.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-05429,
  author       = {Xinlei He and
                  Rui Wen and
                  Yixin Wu and
                  Michael Backes and
                  Yun Shen and
                  Yang Zhang},
  title        = {Node-Level Membership Inference Attacks Against Graph Neural Networks},
  journal      = {CoRR},
  volume       = {abs/2102.05429},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.05429},
  eprinttype    = {arXiv},
  eprint       = {2102.05429},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-05429.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-14991,
  author       = {Min Chen and
                  Zhikun Zhang and
                  Tianhao Wang and
                  Michael Backes and
                  Mathias Humbert and
                  Yang Zhang},
  title        = {Graph Unlearning},
  journal      = {CoRR},
  volume       = {abs/2103.14991},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.14991},
  eprinttype    = {arXiv},
  eprint       = {2103.14991},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-14991.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-03726,
  author       = {Lukas Bieringer and
                  Kathrin Grosse and
                  Michael Backes and
                  Katharina Krombholz},
  title        = {Mental Models of Adversarial Machine Learning},
  journal      = {CoRR},
  volume       = {abs/2105.03726},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.03726},
  eprinttype    = {arXiv},
  eprint       = {2105.03726},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-03726.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-02631,
  author       = {Zhikun Zhang and
                  Min Chen and
                  Michael Backes and
                  Yun Shen and
                  Yang Zhang},
  title        = {Inference Attacks Against Graph Neural Networks},
  journal      = {CoRR},
  volume       = {abs/2110.02631},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.02631},
  eprinttype    = {arXiv},
  eprint       = {2110.02631},
  timestamp    = {Fri, 22 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-02631.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-05619,
  author       = {Oliver Schranz and
                  Sebastian Weisgerber and
                  Erik Derr and
                  Michael Backes and
                  Sven Bugiel},
  title        = {Towards a Principled Approach for Dynamic Analysis of Android's Middleware},
  journal      = {CoRR},
  volume       = {abs/2110.05619},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.05619},
  eprinttype    = {arXiv},
  eprint       = {2110.05619},
  timestamp    = {Thu, 21 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-05619.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-04394,
  author       = {Ahmed Salem and
                  Michael Backes and
                  Yang Zhang},
  title        = {Get a Model! Model Hijacking Attack Against Machine Learning Models},
  journal      = {CoRR},
  volume       = {abs/2111.04394},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.04394},
  eprinttype    = {arXiv},
  eprint       = {2111.04394},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-04394.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-11169,
  author       = {Cristian{-}Alexandru Staicu and
                  Sazzadur Rahaman and
                  {\'{A}}gnes Kiss and
                  Michael Backes},
  title        = {Bilingual Problems: Studying the Security Risks Incurred by Native
                  Extensions in Scripting Languages},
  journal      = {CoRR},
  volume       = {abs/2111.11169},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.11169},
  eprinttype    = {arXiv},
  eprint       = {2111.11169},
  timestamp    = {Fri, 26 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-11169.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/debu/TroncosoPHSLLSP20,
  author       = {Carmela Troncoso and
                  Mathias Payer and
                  Jean{-}Pierre Hubaux and
                  Marcel Salath{\'{e}} and
                  James R. Larus and
                  Wouter Lueks and
                  Theresa Stadler and
                  Apostolos Pyrgelis and
                  Daniele Antonioli and
                  Ludovic Barman and
                  Sylvain Chatel and
                  Kenneth G. Paterson and
                  Srdjan Capkun and
                  David A. Basin and
                  Jan Beutel and
                  Dennis Jackson and
                  Marc Roeschlin and
                  Patrick Leu and
                  Bart Preneel and
                  Nigel P. Smart and
                  Aysajan Abidin and
                  Seda Gurses and
                  Michael Veale and
                  Cas Cremers and
                  Michael Backes and
                  Nils Ole Tippenhauer and
                  Reuben Binns and
                  Ciro Cattuto and
                  Alain Barrat and
                  Dario Fiore and
                  Manuel Barbosa and
                  Rui Oliveira and
                  Jos{\'{e}} Pereira},
  title        = {Decentralized Privacy-Preserving Proximity Tracing},
  journal      = {{IEEE} Data Eng. Bull.},
  volume       = {43},
  number       = {2},
  pages        = {36--66},
  year         = {2020},
  url          = {http://sites.computer.org/debull/A20june/p36.pdf},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/debu/TroncosoPHSLLSP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/EsiyokHKB020,
  author       = {Ilkan Esiyok and
                  Lucjan Hanzlik and
                  Robert K{\"{u}}nnemann and
                  Lena Marie Budde and
                  Michael Backes},
  editor       = {Mauro Conti and
                  Jianying Zhou and
                  Emiliano Casalicchio and
                  Angelo Spognardi},
  title        = {TrollThrottle - Raising the Cost of Astroturfing},
  booktitle    = {Applied Cryptography and Network Security - 18th International Conference,
                  {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12147},
  pages        = {456--476},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57878-7\_22},
  doi          = {10.1007/978-3-030-57878-7\_22},
  timestamp    = {Mon, 28 Sep 2020 14:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/EsiyokHKB020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NguyenD0B20,
  author       = {Duc Cuong Nguyen and
                  Erik Derr and
                  Michael Backes and
                  Sven Bugiel},
  title        = {Up2Dep: Android Tool Support to Fix Insecure Code Dependencies},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {263--276},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427658},
  doi          = {10.1145/3427228.3427658},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/NguyenD0B20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Roth0S20,
  author       = {Sebastian Roth and
                  Michael Backes and
                  Ben Stock},
  editor       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh and
                  Guofei Gu and
                  Giuseppe Ateniese},
  title        = {Assessing the Impact of Script Gadgets on {CSP} at Scale},
  booktitle    = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications
                  Security, Taipei, Taiwan, October 5-9, 2020},
  pages        = {420--431},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3320269.3372201},
  doi          = {10.1145/3320269.3372201},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Roth0S20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/etra/Hagestedt0B20,
  author       = {Inken Hagestedt and
                  Michael Backes and
                  Andreas Bulling},
  editor       = {Andreas Bulling and
                  Anke Huckauf and
                  Eakta Jain and
                  Ralph Radach and
                  Daniel Weiskopf},
  title        = {Adversarial Attacks on Classifiers for Eye-based User Modelling},
  booktitle    = {{ETRA} '20 Adjunct: 2020 Symposium on Eye Tracking Research and Applications,
                  Stuttgart, Germany, June 2-5, 2020, Adjunct Volume},
  pages        = {44:1--44:3},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3379157.3390511},
  doi          = {10.1145/3379157.3390511},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/etra/Hagestedt0B20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/HagestedtHBLE0020,
  author       = {Inken Hagestedt and
                  Mathias Humbert and
                  Pascal Berrang and
                  Irina Lehmann and
                  Roland Eils and
                  Michael Backes and
                  Yang Zhang},
  title        = {Membership Inference Against {DNA} Methylation Databases},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2020, Genoa, Italy, September 7-11, 2020},
  pages        = {509--520},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/EuroSP48549.2020.00039},
  doi          = {10.1109/EUROSP48549.2020.00039},
  timestamp    = {Tue, 10 Nov 2020 11:45:04 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/HagestedtHBLE0020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icann/GrosseTM0K20,
  author       = {Kathrin Grosse and
                  Thomas Alexander Trost and
                  Marius Mosbach and
                  Michael Backes and
                  Dietrich Klakow},
  editor       = {Igor Farkas and
                  Paolo Masulli and
                  Stefan Wermter},
  title        = {On the Security Relevance of Initial Weights in Deep Neural Networks},
  booktitle    = {Artificial Neural Networks and Machine Learning - {ICANN} 2020 - 29th
                  International Conference on Artificial Neural Networks, Bratislava,
                  Slovakia, September 15-18, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12396},
  pages        = {3--14},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61609-0\_1},
  doi          = {10.1007/978-3-030-61609-0\_1},
  timestamp    = {Tue, 20 Oct 2020 17:51:28 +0200},
  biburl       = {https://dblp.org/rec/conf/icann/GrosseTM0K20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpr/GrosseS020,
  author       = {Kathrin Grosse and
                  Michael T. Smith and
                  Michael Backes},
  title        = {Killing Four Birds with one Gaussian Process: The Relation between
                  different Test-Time Attacks},
  booktitle    = {25th International Conference on Pattern Recognition, {ICPR} 2020,
                  Virtual Event / Milan, Italy, January 10-15, 2021},
  pages        = {4696--4703},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICPR48806.2021.9413290},
  doi          = {10.1109/ICPR48806.2021.9413290},
  timestamp    = {Sat, 13 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpr/GrosseS020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/0016HSMV020,
  author       = {Yang Zhang and
                  Mathias Humbert and
                  Bartlomiej Surma and
                  Praveen Manoharan and
                  Jilles Vreeken and
                  Michael Backes},
  title        = {Towards Plausible Graph Anonymization},
  booktitle    = {27th Annual Network and Distributed System Security Symposium, {NDSS}
                  2020, San Diego, California, USA, February 23-26, 2020},
  publisher    = {The Internet Society},
  year         = {2020},
  url          = {https://www.ndss-symposium.org/ndss-paper/towards-plausible-graph-anonymization/},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/0016HSMV020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LyastaniSN0B20,
  author       = {Sanam Ghorbani Lyastani and
                  Michael Schilling and
                  Michaela Neumayr and
                  Michael Backes and
                  Sven Bugiel},
  title        = {Is {FIDO2} the Kingslayer of User Authentication? {A} Comparative
                  Usability Study of {FIDO2} Passwordless Authentication},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {268--285},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00047},
  doi          = {10.1109/SP40000.2020.00047},
  timestamp    = {Thu, 21 Sep 2023 15:57:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/LyastaniSN0B20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/0001B0F020,
  author       = {Ahmed Salem and
                  Apratim Bhattacharya and
                  Michael Backes and
                  Mario Fritz and
                  Yang Zhang},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {Updates-Leak: Data Set Inference and Reconstruction Attacks in Online
                  Learning},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {1291--1308},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/salem},
  timestamp    = {Fri, 29 Jan 2021 22:08:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/0001B0F020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CalzavaraRR0S20,
  author       = {Stefano Calzavara and
                  Sebastian Roth and
                  Alvise Rabitti and
                  Michael Backes and
                  Ben Stock},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {A Tale of Two Headers: {A} Formal Analysis of Inconsistent Click-Jacking
                  Protection on the Web},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {683--697},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/calzavara},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/CalzavaraRR0S20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-00996,
  author       = {Tahleen A. Rahman and
                  Mario Fritz and
                  Michael Backes and
                  Yang Zhang},
  title        = {Everything About You: {A} Multimodal Approach towards Friendship Inference
                  in Online Social Networks},
  journal      = {CoRR},
  volume       = {abs/2003.00996},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.00996},
  eprinttype    = {arXiv},
  eprint       = {2003.00996},
  timestamp    = {Wed, 11 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-00996.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-03675,
  author       = {Ahmed Salem and
                  Rui Wen and
                  Michael Backes and
                  Shiqing Ma and
                  Yang Zhang},
  title        = {Dynamic Backdoor Attacks Against Machine Learning Models},
  journal      = {CoRR},
  volume       = {abs/2003.03675},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.03675},
  eprinttype    = {arXiv},
  eprint       = {2003.03675},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-03675.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-08836,
  author       = {Ilkan Esiyok and
                  Lucjan Hanzlik and
                  Robert K{\"{u}}nnemann and
                  Lena Marie Budde and
                  Michael Backes},
  title        = {Trollthrottle - Raising the Cost of Astroturfing},
  journal      = {CoRR},
  volume       = {abs/2004.08836},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.08836},
  eprinttype    = {arXiv},
  eprint       = {2004.08836},
  timestamp    = {Wed, 22 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-08836.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-02131,
  author       = {Xinlei He and
                  Jinyuan Jia and
                  Michael Backes and
                  Neil Zhenqiang Gong and
                  Yang Zhang},
  title        = {Stealing Links from Graph Neural Networks},
  journal      = {CoRR},
  volume       = {abs/2005.02131},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.02131},
  eprinttype    = {arXiv},
  eprint       = {2005.02131},
  timestamp    = {Fri, 08 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-02131.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-02205,
  author       = {Min Chen and
                  Zhikun Zhang and
                  Tianhao Wang and
                  Michael Backes and
                  Mathias Humbert and
                  Yang Zhang},
  title        = {When Machine Unlearning Jeopardizes Privacy},
  journal      = {CoRR},
  volume       = {abs/2005.02205},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.02205},
  eprinttype    = {arXiv},
  eprint       = {2005.02205},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-02205.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-12273,
  author       = {Carmela Troncoso and
                  Mathias Payer and
                  Jean{-}Pierre Hubaux and
                  Marcel Salath{\'{e}} and
                  James R. Larus and
                  Edouard Bugnion and
                  Wouter Lueks and
                  Theresa Stadler and
                  Apostolos Pyrgelis and
                  Daniele Antonioli and
                  Ludovic Barman and
                  Sylvain Chatel and
                  Kenneth G. Paterson and
                  Srdjan Capkun and
                  David A. Basin and
                  Jan Beutel and
                  Dennis Jackson and
                  Marc Roeschlin and
                  Patrick Leu and
                  Bart Preneel and
                  Nigel P. Smart and
                  Aysajan Abidin and
                  Seda F. G{\"{u}}rses and
                  Michael Veale and
                  Cas Cremers and
                  Michael Backes and
                  Nils Ole Tippenhauer and
                  Reuben Binns and
                  Ciro Cattuto and
                  Alain Barrat and
                  Dario Fiore and
                  Manuel Barbosa and
                  Rui Oliveira and
                  Jos{\'{e}} Pereira},
  title        = {Decentralized Privacy-Preserving Proximity Tracing},
  journal      = {CoRR},
  volume       = {abs/2005.12273},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.12273},
  eprinttype    = {arXiv},
  eprint       = {2005.12273},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-12273.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-00860,
  author       = {Inken Hagestedt and
                  Michael Backes and
                  Andreas Bulling},
  title        = {Adversarial Attacks on Classifiers for Eye-based User Modelling},
  journal      = {CoRR},
  volume       = {abs/2006.00860},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.00860},
  eprinttype    = {arXiv},
  eprint       = {2006.00860},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-00860.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-01043,
  author       = {Xiaoyi Chen and
                  Ahmed Salem and
                  Michael Backes and
                  Shiqing Ma and
                  Yang Zhang},
  title        = {BadNL: Backdoor Attacks Against {NLP} Models},
  journal      = {CoRR},
  volume       = {abs/2006.01043},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.01043},
  eprinttype    = {arXiv},
  eprint       = {2006.01043},
  timestamp    = {Wed, 19 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-01043.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-06721,
  author       = {Kathrin Grosse and
                  Taesung Lee and
                  Youngja Park and
                  Michael Backes and
                  Ian M. Molloy},
  title        = {A new measure for overfitting and its implications for backdooring
                  of deep learning},
  journal      = {CoRR},
  volume       = {abs/2006.06721},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.06721},
  eprinttype    = {arXiv},
  eprint       = {2006.06721},
  timestamp    = {Wed, 02 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-06721.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-07014,
  author       = {Kathrin Grosse and
                  Michael Backes},
  title        = {How many winning tickets are there in one DNN?},
  journal      = {CoRR},
  volume       = {abs/2006.07014},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.07014},
  eprinttype    = {arXiv},
  eprint       = {2006.07014},
  timestamp    = {Wed, 17 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-07014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-06993,
  author       = {Nico D{\"{o}}ttling and
                  Kathrin Grosse and
                  Michael Backes and
                  Ian M. Molloy},
  title        = {Adversarial Examples and Metrics},
  journal      = {CoRR},
  volume       = {abs/2007.06993},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.06993},
  eprinttype    = {arXiv},
  eprint       = {2007.06993},
  timestamp    = {Wed, 02 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-06993.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-04872,
  author       = {Yang Zou and
                  Zhikun Zhang and
                  Michael Backes and
                  Yang Zhang},
  title        = {Privacy Analysis of Deep Learning in the Wild: Membership Inference
                  Attacks against Transfer Learning},
  journal      = {CoRR},
  volume       = {abs/2009.04872},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.04872},
  eprinttype    = {arXiv},
  eprint       = {2009.04872},
  timestamp    = {Fri, 23 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-04872.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-03007,
  author       = {Ahmed Salem and
                  Yannick Sautter and
                  Michael Backes and
                  Mathias Humbert and
                  Yang Zhang},
  title        = {{BAAAN:} Backdoor Attacks Against Autoencoder and GAN-Based Machine
                  Learning Models},
  journal      = {CoRR},
  volume       = {abs/2010.03007},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.03007},
  eprinttype    = {arXiv},
  eprint       = {2010.03007},
  timestamp    = {Tue, 13 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-03007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-03282,
  author       = {Ahmed Salem and
                  Michael Backes and
                  Yang Zhang},
  title        = {Don't Trigger Me! {A} Triggerless Backdoor Attack Against Deep Neural
                  Networks},
  journal      = {CoRR},
  volume       = {abs/2010.03282},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.03282},
  eprinttype    = {arXiv},
  eprint       = {2010.03282},
  timestamp    = {Tue, 12 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-03282.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-15128,
  author       = {Zhikun Zhang and
                  Tianhao Wang and
                  Ninghui Li and
                  Jean Honorio and
                  Michael Backes and
                  Shibo He and
                  Jiming Chen and
                  Yang Zhang},
  title        = {PrivSyn: Differentially Private Data Synthesis},
  journal      = {CoRR},
  volume       = {abs/2012.15128},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.15128},
  eprinttype    = {arXiv},
  eprint       = {2012.15128},
  timestamp    = {Fri, 23 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-15128.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/SalemBHB19,
  author       = {Ahmed Salem and
                  Pascal Berrang and
                  Mathias Humbert and
                  Michael Backes},
  title        = {Privacy-Preserving Similar Patient Queries for Combined Biomedical
                  Data},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2019},
  number       = {1},
  pages        = {47--67},
  year         = {2019},
  url          = {https://doi.org/10.2478/popets-2019-0004},
  doi          = {10.2478/POPETS-2019-0004},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/SalemBHB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/software/BackesBCGLRSSTV19,
  author       = {John Backes and
                  Pauline Bolignano and
                  Byron Cook and
                  Andrew Gacek and
                  Kasper S{\o}e Luckow and
                  Neha Rungta and
                  Martin Sch{\"{a}}f and
                  Cole Schlesinger and
                  Rima Tanash and
                  Carsten Varming and
                  Michael W. Whalen},
  title        = {One-Click Formal Methods},
  journal      = {{IEEE} Softw.},
  volume       = {36},
  number       = {6},
  pages        = {61--65},
  year         = {2019},
  url          = {https://doi.org/10.1109/MS.2019.2930609},
  doi          = {10.1109/MS.2019.2930609},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/software/BackesBCGLRSSTV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Fass0S19,
  author       = {Aurore Fass and
                  Michael Backes and
                  Ben Stock},
  editor       = {David Balenson},
  title        = {JStap: a static pre-filter for malicious JavaScript detection},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {257--269},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359813},
  doi          = {10.1145/3359789.3359813},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/Fass0S19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0001HS19,
  author       = {Michael Backes and
                  Lucjan Hanzlik and
                  Jonas Schneider{-}Bensch},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Membership Privacy for Fully Dynamic Group Signatures},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {2181--2198},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3354257},
  doi          = {10.1145/3319535.3354257},
  timestamp    = {Tue, 10 Nov 2020 20:00:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/0001HS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Fass0S19,
  author       = {Aurore Fass and
                  Michael Backes and
                  Ben Stock},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {HideNoSeek: Camouflaging Malicious JavaScript in Benign ASTs},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {1899--1913},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3345656},
  doi          = {10.1145/3319535.3345656},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Fass0S19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JiaSBZG19,
  author       = {Jinyuan Jia and
                  Ahmed Salem and
                  Michael Backes and
                  Yang Zhang and
                  Neil Zhenqiang Gong},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {MemGuard: Defending against Black-Box Membership Inference Attacks
                  via Adversarial Examples},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {259--274},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3363201},
  doi          = {10.1145/3319535.3363201},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JiaSBZG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DaxKT019,
  author       = {Alexander Dax and
                  Robert K{\"{u}}nnemann and
                  Sven Tangermann and
                  Michael Backes},
  title        = {How to Wrap it up - {A} Formally Verified Proposal for the use of
                  Authenticated Wrapping in PKCS{\#}11},
  booktitle    = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken,
                  NJ, USA, June 25-28, 2019},
  pages        = {62--77},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSF.2019.00012},
  doi          = {10.1109/CSF.2019.00012},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/DaxKT019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/KunnemannE019,
  author       = {Robert K{\"{u}}nnemann and
                  Ilkan Esiyok and
                  Michael Backes},
  title        = {Automated Verification of Accountability in Security Protocols},
  booktitle    = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken,
                  NJ, USA, June 25-28, 2019},
  pages        = {397--413},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSF.2019.00034},
  doi          = {10.1109/CSF.2019.00034},
  timestamp    = {Mon, 09 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/KunnemannE019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/0001DHKS19,
  author       = {Michael Backes and
                  Nico D{\"{o}}ttling and
                  Lucjan Hanzlik and
                  Kamil Kluczniak and
                  Jonas Schneider},
  editor       = {Yuval Ishai and
                  Vincent Rijmen},
  title        = {Ring Signatures: Logarithmic-Size, No Setup - from Standard Assumptions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11478},
  pages        = {281--311},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17659-4\_10},
  doi          = {10.1007/978-3-030-17659-4\_10},
  timestamp    = {Fri, 08 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/0001DHKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/HuangBB019,
  author       = {Jie Huang and
                  Nataniel P. Borges Jr. and
                  Sven Bugiel and
                  Michael Backes},
  title        = {Up-To-Crash: Evaluating Third-Party Library Updatability on Android},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2019, Stockholm, Sweden, June 17-19, 2019},
  pages        = {15--30},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EuroSP.2019.00012},
  doi          = {10.1109/EUROSP.2019.00012},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/HuangBB019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/RahmanS0019,
  author       = {Tahleen A. Rahman and
                  Bartlomiej Surma and
                  Michael Backes and
                  Yang Zhang},
  editor       = {Sarit Kraus},
  title        = {Fairwalk: Towards Fair Graph Embedding},
  booktitle    = {Proceedings of the Twenty-Eighth International Joint Conference on
                  Artificial Intelligence, {IJCAI} 2019, Macao, China, August 10-16,
                  2019},
  pages        = {3289--3295},
  publisher    = {ijcai.org},
  year         = {2019},
  url          = {https://doi.org/10.24963/ijcai.2019/456},
  doi          = {10.24963/IJCAI.2019/456},
  timestamp    = {Tue, 24 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/RahmanS0019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/Hagestedt0HBT0019,
  author       = {Inken Hagestedt and
                  Yang Zhang and
                  Mathias Humbert and
                  Pascal Berrang and
                  Haixu Tang and
                  XiaoFeng Wang and
                  Michael Backes},
  title        = {MBeacon: Privacy-Preserving Beacons for {DNA} Methylation Data},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/mbeacon-privacy-preserving-beacons-for-dna-methylation-data/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/Hagestedt0HBT0019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/Salem0HBF019,
  author       = {Ahmed Salem and
                  Yang Zhang and
                  Mathias Humbert and
                  Pascal Berrang and
                  Mario Fritz and
                  Michael Backes},
  title        = {ML-Leaks: Model and Data Independent Membership Inference Attacks
                  and Defenses on Machine Learning Models},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/ml-leaks-model-and-data-independent-membership-inference-attacks-and-defenses-on-machine-learning-models/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/Salem0HBF019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BackesHHKP19,
  author       = {Michael Backes and
                  Lucjan Hanzlik and
                  Amir Herzberg and
                  Aniket Kate and
                  Ivan Pryvalov},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains Without
                  Trusted Setup},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11442},
  pages        = {286--313},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17253-4\_10},
  doi          = {10.1007/978-3-030-17253-4\_10},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BackesHHKP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/SpeicherS00K19,
  author       = {Patrick Speicher and
                  Marcel Steinmetz and
                  J{\"{o}}rg Hoffmann and
                  Michael Backes and
                  Robert K{\"{u}}nnemann},
  editor       = {Chih{-}Cheng Hung and
                  George A. Papadopoulos},
  title        = {Towards automated network mitigation analysis},
  booktitle    = {Proceedings of the 34th {ACM/SIGAPP} Symposium on Applied Computing,
                  {SAC} 2019, Limassol, Cyprus, April 8-12, 2019},
  pages        = {1971--1978},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3297280.3297473},
  doi          = {10.1145/3297280.3297473},
  timestamp    = {Sun, 02 Jun 2019 21:18:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/SpeicherS00K19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/EskandarianCBBF19,
  author       = {Saba Eskandarian and
                  Jonathan Cogan and
                  Sawyer Birnbaum and
                  Peh Chang Wei Brandon and
                  Dillon Franke and
                  Forest Fraser and
                  Gaspar Garcia Jr. and
                  Eric Gong and
                  Hung T. Nguyen and
                  Taresh K. Sethi and
                  Vishal Subbiah and
                  Michael Backes and
                  Giancarlo Pellegrino and
                  Dan Boneh},
  title        = {Fidelius: Protecting User Secrets from Compromised Browsers},
  booktitle    = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
                  CA, USA, May 19-23, 2019},
  pages        = {264--280},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SP.2019.00036},
  doi          = {10.1109/SP.2019.00036},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/EskandarianCBBF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/NguyenD0B19,
  author       = {Duc Cuong Nguyen and
                  Erik Derr and
                  Michael Backes and
                  Sven Bugiel},
  title        = {Short Text, Large Effect: Measuring the Impact of User Reviews on
                  Android App Security {\&} Privacy},
  booktitle    = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
                  CA, USA, May 19-23, 2019},
  pages        = {555--569},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SP.2019.00012},
  doi          = {10.1109/SP.2019.00012},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/NguyenD0B19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/corr/abs-1910-14219,
  author       = {Robert K{\"{u}}nnemann and
                  Deepak Garg and
                  Michael Backes},
  editor       = {Georgiana Caltais and
                  Jean Krivine},
  title        = {Causality {\&} Control Flow},
  booktitle    = {Proceedings of the 4th Workshop on Formal Reasoning about Causation,
                  Responsibility, and Explanations in Science and Technology, CREST@ETAPS
                  2019, Prague, Czech Republic, 7th April 2019},
  series       = {{EPTCS}},
  volume       = {308},
  pages        = {32--46},
  year         = {2019},
  url          = {https://doi.org/10.4204/EPTCS.308.3},
  doi          = {10.4204/EPTCS.308.3},
  timestamp    = {Thu, 19 Dec 2019 15:19:10 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-14219.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1902-03020,
  author       = {Kathrin Grosse and
                  Thomas Alexander Trost and
                  Marius Mosbach and
                  Michael Backes and
                  Dietrich Klakow},
  title        = {Adversarial Initialization - when your network performs the way {I}
                  want},
  journal      = {CoRR},
  volume       = {abs/1902.03020},
  year         = {2019},
  url          = {http://arxiv.org/abs/1902.03020},
  eprinttype    = {arXiv},
  eprint       = {1902.03020},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1902-03020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-01067,
  author       = {Ahmed Salem and
                  Apratim Bhattacharyya and
                  Michael Backes and
                  Mario Fritz and
                  Yang Zhang},
  title        = {Updates-Leak: Data Set Inference and Reconstruction Attacks in Online
                  Learning},
  journal      = {CoRR},
  volume       = {abs/1904.01067},
  year         = {2019},
  url          = {http://arxiv.org/abs/1904.01067},
  eprinttype    = {arXiv},
  eprint       = {1904.01067},
  timestamp    = {Tue, 24 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1904-01067.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-03758,
  author       = {Marie{-}Therese Walter and
                  David Pfaff and
                  Stefan N{\"{u}}rnberger and
                  Michael Backes},
  title        = {Proconda - Protected Control Data},
  journal      = {CoRR},
  volume       = {abs/1909.03758},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.03758},
  eprinttype    = {arXiv},
  eprint       = {1909.03758},
  timestamp    = {Tue, 17 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-03758.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-08864,
  author       = {Michael Thomas Smith and
                  Kathrin Grosse and
                  Michael Backes and
                  Mauricio A. {\'{A}}lvarez},
  title        = {Adversarial Vulnerability Bounds for Gaussian Process Classification},
  journal      = {CoRR},
  volume       = {abs/1909.08864},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.08864},
  eprinttype    = {arXiv},
  eprint       = {1909.08864},
  timestamp    = {Tue, 24 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-08864.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-10594,
  author       = {Jinyuan Jia and
                  Ahmed Salem and
                  Michael Backes and
                  Yang Zhang and
                  Neil Zhenqiang Gong},
  title        = {MemGuard: Defending against Black-Box Membership Inference Attacks
                  via Adversarial Examples},
  journal      = {CoRR},
  volume       = {abs/1909.10594},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.10594},
  eprinttype    = {arXiv},
  eprint       = {1909.10594},
  timestamp    = {Tue, 17 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-10594.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-03019,
  author       = {Gonzalo Mateo{-}Garcia and
                  Silviu Oprea and
                  Lewis Smith and
                  Josh Veitch{-}Michaelis and
                  Guy Schumann and
                  Yarin Gal and
                  Atilim G{\"{u}}nes Baydin and
                  Dietmar Backes},
  title        = {Flood Detection On Low Cost Orbital Hardware},
  journal      = {CoRR},
  volume       = {abs/1910.03019},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.03019},
  eprinttype    = {arXiv},
  eprint       = {1910.03019},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-03019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001HHKP19,
  author       = {Michael Backes and
                  Lucjan Hanzlik and
                  Amir Herzberg and
                  Aniket Kate and
                  Ivan Pryvalov},
  title        = {Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without
                  Trusted Setup},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {63},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/063},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001HHKP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesDHKS19,
  author       = {Michael Backes and
                  Nico D{\"{o}}ttling and
                  Lucjan Hanzlik and
                  Kamil Kluczniak and
                  Jonas Schneider},
  title        = {Ring Signatures: Logarithmic-Size, No Setup - from Standard Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {196},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/196},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesDHKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaxKTB19,
  author       = {Alexander Dax and
                  Robert K{\"{u}}nnemann and
                  Sven Tangermann and
                  Michael Backes},
  title        = {How to wrap it up - {A} formally verified proposal for the use of
                  authenticated wrapping in PKCS{\textbackslash}{\#}11},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {462},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/462},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaxKTB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/CoferGBWPFPKKAH18,
  author       = {Darren D. Cofer and
                  Andrew Gacek and
                  John Backes and
                  Michael W. Whalen and
                  Lee Pike and
                  Adam Foltzer and
                  Michal Podhradsky and
                  Gerwin Klein and
                  Ihor Kuz and
                  June Andronick and
                  Gernot Heiser and
                  Douglas Stuart},
  title        = {A Formal Approach to Constructing Secure Air Vehicle Software},
  journal      = {Computer},
  volume       = {51},
  number       = {11},
  pages        = {14--23},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2876051},
  doi          = {10.1109/MC.2018.2876051},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/CoferGBWPFPKKAH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/ShiraziSABD18,
  author       = {Fatemeh Shirazi and
                  Milivoj Simeonovski and
                  Muhammad Rizwan Asghar and
                  Michael Backes and
                  Claudia D{\'{\i}}az},
  title        = {A Survey on Routing in Anonymous Communication Protocols},
  journal      = {{ACM} Comput. Surv.},
  volume       = {51},
  number       = {3},
  pages        = {51:1--51:39},
  year         = {2018},
  url          = {https://doi.org/10.1145/3182658},
  doi          = {10.1145/3182658},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/ShiraziSABD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcbb/BackesBHSW18,
  author       = {Michael Backes and
                  Pascal Berrang and
                  Mathias Humbert and
                  Xiaoyu Shen and
                  Verena Wolf},
  title        = {Simulating the Large-Scale Erosion of Genomic Privacy Over Time},
  journal      = {{IEEE} {ACM} Trans. Comput. Biol. Bioinform.},
  volume       = {15},
  number       = {5},
  pages        = {1405--1412},
  year         = {2018},
  url          = {https://doi.org/10.1109/TCBB.2018.2859380},
  doi          = {10.1109/TCBB.2018.2859380},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcbb/BackesBHSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/SpeicherS00K18,
  author       = {Patrick Speicher and
                  Marcel Steinmetz and
                  Michael Backes and
                  J{\"{o}}rg Hoffmann and
                  Robert K{\"{u}}nnemann},
  editor       = {Sheila A. McIlraith and
                  Kilian Q. Weinberger},
  title        = {Stackelberg Planning: Towards Effective Leader-Follower State Space
                  Search},
  booktitle    = {Proceedings of the Thirty-Second {AAAI} Conference on Artificial Intelligence,
                  (AAAI-18), the 30th innovative Applications of Artificial Intelligence
                  (IAAI-18), and the 8th {AAAI} Symposium on Educational Advances in
                  Artificial Intelligence (EAAI-18), New Orleans, Louisiana, USA, February
                  2-7, 2018},
  pages        = {6286--6293},
  publisher    = {{AAAI} Press},
  year         = {2018},
  url          = {https://doi.org/10.1609/aaai.v32i1.12090},
  doi          = {10.1609/AAAI.V32I1.12090},
  timestamp    = {Mon, 04 Sep 2023 12:29:24 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/SpeicherS00K18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/0001HKS18,
  author       = {Michael Backes and
                  Lucjan Hanzlik and
                  Kamil Kluczniak and
                  Jonas Schneider},
  editor       = {Thomas Peyrin and
                  Steven D. Galbraith},
  title        = {Signatures with Flexible Public Key: Introducing Equivalence Classes
                  for Public Keys},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11273},
  pages        = {405--434},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03329-3\_14},
  doi          = {10.1007/978-3-030-03329-3\_14},
  timestamp    = {Fri, 08 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/0001HKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/GacekBWWG18,
  author       = {Andrew Gacek and
                  John Backes and
                  Mike Whalen and
                  Lucas G. Wagner and
                  Elaheh Ghassabani},
  editor       = {Hana Chockler and
                  Georg Weissenbacher},
  title        = {The JKind Model Checker},
  booktitle    = {Computer Aided Verification - 30th International Conference, {CAV}
                  2018, Held as Part of the Federated Logic Conference, FloC 2018, Oxford,
                  UK, July 14-17, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10982},
  pages        = {20--27},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96142-2\_3},
  doi          = {10.1007/978-3-319-96142-2\_3},
  timestamp    = {Fri, 09 Apr 2021 18:35:26 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/GacekBWWG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/FassK0S18,
  author       = {Aurore Fass and
                  Robert P. Krawczyk and
                  Michael Backes and
                  Ben Stock},
  editor       = {Cristiano Giuffrida and
                  S{\'{e}}bastien Bardin and
                  Gregory Blanc},
  title        = {JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 15th International Conference, {DIMVA} 2018, Saclay, France, June
                  28-29, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10885},
  pages        = {303--325},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93411-2\_14},
  doi          = {10.1007/978-3-319-93411-2\_14},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/FassK0S18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/BerrangHZLE018,
  author       = {Pascal Berrang and
                  Mathias Humbert and
                  Yang Zhang and
                  Irina Lehmann and
                  Roland Eils and
                  Michael Backes},
  title        = {Dissecting Privacy Risks in Biomedical Data},
  booktitle    = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2018, London, United Kingdom, April 24-26, 2018},
  pages        = {62--76},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/EuroSP.2018.00013},
  doi          = {10.1109/EUROSP.2018.00013},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/BerrangHZLE018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/SpeicherSKSP0018,
  author       = {Patrick Speicher and
                  Marcel Steinmetz and
                  Robert K{\"{u}}nnemann and
                  Milivoj Simeonovski and
                  Giancarlo Pellegrino and
                  J{\"{o}}rg Hoffmann and
                  Michael Backes},
  title        = {Formally Reasoning about the Cost and Efficacy of Securing the Email
                  Infrastructure},
  booktitle    = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2018, London, United Kingdom, April 24-26, 2018},
  pages        = {77--91},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/EuroSP.2018.00014},
  doi          = {10.1109/EUROSP.2018.00014},
  timestamp    = {Wed, 11 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/SpeicherSKSP0018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/Asghar0S18,
  author       = {Muhammad Rizwan Asghar and
                  Michael Backes and
                  Milivoj Simeonovski},
  title        = {{PRIMA:} Privacy-Preserving Identity and Access Management at Internet-Scale},
  booktitle    = {2018 {IEEE} International Conference on Communications, {ICC} 2018,
                  Kansas City, MO, USA, May 20-24, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICC.2018.8422732},
  doi          = {10.1109/ICC.2018.8422732},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/Asghar0S18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/StockPL0R18,
  author       = {Ben Stock and
                  Giancarlo Pellegrino and
                  Frank Li and
                  Michael Backes and
                  Christian Rossow},
  title        = {Didn't You Hear Me? - Towards More Successful Web Vulnerability Notifications},
  booktitle    = {25th Annual Network and Distributed System Security Symposium, {NDSS}
                  2018, San Diego, California, USA, February 18-21, 2018},
  publisher    = {The Internet Society},
  year         = {2018},
  url          = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_01B-1\_Stock\_paper.pdf},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/StockPL0R18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/OltroggeDSAFRPB18,
  author       = {Marten Oltrogge and
                  Erik Derr and
                  Christian Stransky and
                  Yasemin Acar and
                  Sascha Fahl and
                  Christian Rossow and
                  Giancarlo Pellegrino and
                  Sven Bugiel and
                  Michael Backes},
  title        = {The Rise of the Citizen Developer: Assessing the Security Impact of
                  Online App Generators},
  booktitle    = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
                  21-23 May 2018, San Francisco, California, {USA}},
  pages        = {634--647},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SP.2018.00005},
  doi          = {10.1109/SP.2018.00005},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/OltroggeDSAFRPB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/XuQL0K18,
  author       = {Meng Xu and
                  Chenxiong Qian and
                  Kangjie Lu and
                  Michael Backes and
                  Taesoo Kim},
  title        = {Precise and Scalable Detection of Double-Fetch Bugs in {OS} Kernels},
  booktitle    = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
                  21-23 May 2018, San Francisco, California, {USA}},
  pages        = {661--678},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SP.2018.00017},
  doi          = {10.1109/SP.2018.00017},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/XuQL0K18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacas/KatisFGGBGW18,
  author       = {Andreas Katis and
                  Grigory Fedyukovich and
                  Huajun Guo and
                  Andrew Gacek and
                  John Backes and
                  Arie Gurfinkel and
                  Michael W. Whalen},
  editor       = {Dirk Beyer and
                  Marieke Huisman},
  title        = {Validity-Guided Synthesis of Reactive Systems from Assume-Guarantee
                  Contracts},
  booktitle    = {Tools and Algorithms for the Construction and Analysis of Systems
                  - 24th International Conference, {TACAS} 2018, Held as Part of the
                  European Joint Conferences on Theory and Practice of Software, {ETAPS}
                  2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10806},
  pages        = {176--193},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-89963-3\_10},
  doi          = {10.1007/978-3-319-89963-3\_10},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tacas/KatisFGGBGW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LyastaniSF0B18,
  author       = {Sanam Ghorbani Lyastani and
                  Michael Schilling and
                  Sascha Fahl and
                  Michael Backes and
                  Sven Bugiel},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {Better managed than memorized? Studying the Impact of Managers on
                  Password Strength and Reuse},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {203--220},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/lyastani},
  timestamp    = {Fri, 18 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LyastaniSF0B18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/ZhangHRLP018,
  author       = {Yang Zhang and
                  Mathias Humbert and
                  Tahleen A. Rahman and
                  Cheng{-}Te Li and
                  Jun Pang and
                  Michael Backes},
  editor       = {Pierre{-}Antoine Champin and
                  Fabien Gandon and
                  Mounia Lalmas and
                  Panagiotis G. Ipeirotis},
  title        = {Tagvisor: {A} Privacy Advisor for Sharing Hashtags},
  booktitle    = {Proceedings of the 2018 World Wide Web Conference on World Wide Web,
                  {WWW} 2018, Lyon, France, April 23-27, 2018},
  pages        = {287--296},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3178876.3186095},
  doi          = {10.1145/3178876.3186095},
  timestamp    = {Fri, 16 Apr 2021 10:04:12 +0200},
  biburl       = {https://dblp.org/rec/conf/www/ZhangHRLP018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2018,
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {http://dl.acm.org/citation.cfm?id=3243734},
  isbn         = {978-1-4503-5693-0},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-04122,
  author       = {Yang Zhang and
                  Mathias Humbert and
                  Tahleen A. Rahman and
                  Cheng{-}Te Li and
                  Jun Pang and
                  Michael Backes},
  title        = {Tagvisor: {A} Privacy Advisor for Sharing Hashtags},
  journal      = {CoRR},
  volume       = {abs/1802.04122},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.04122},
  eprinttype    = {arXiv},
  eprint       = {1802.04122},
  timestamp    = {Tue, 24 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-04122.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-10891,
  author       = {Robert K{\"{u}}nnemann and
                  Ilkan Esiyok and
                  Michael Backes},
  title        = {Automated Verification of Accountability in Security Protocols},
  journal      = {CoRR},
  volume       = {abs/1805.10891},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.10891},
  eprinttype    = {arXiv},
  eprint       = {1805.10891},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-10891.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-01246,
  author       = {Ahmed Salem and
                  Yang Zhang and
                  Mathias Humbert and
                  Mario Fritz and
                  Michael Backes},
  title        = {ML-Leaks: Model and Data Independent Membership Inference Attacks
                  and Defenses on Machine Learning Models},
  journal      = {CoRR},
  volume       = {abs/1806.01246},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.01246},
  eprinttype    = {arXiv},
  eprint       = {1806.01246},
  timestamp    = {Tue, 24 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-01246.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-02032,
  author       = {Kathrin Grosse and
                  Michael T. Smith and
                  Michael Backes},
  title        = {Killing Three Birds with one Gaussian Process: Analyzing Attack Vectors
                  on Classification},
  journal      = {CoRR},
  volume       = {abs/1806.02032},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.02032},
  eprinttype    = {arXiv},
  eprint       = {1806.02032},
  timestamp    = {Sat, 13 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-02032.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-00590,
  author       = {Lucjan Hanzlik and
                  Yang Zhang and
                  Kathrin Grosse and
                  Ahmed Salem and
                  Max Augustin and
                  Michael Backes and
                  Mario Fritz},
  title        = {MLCapsule: Guarded Offline Deployment of Machine Learning as a Service},
  journal      = {CoRR},
  volume       = {abs/1808.00590},
  year         = {2018},
  url          = {http://arxiv.org/abs/1808.00590},
  eprinttype    = {arXiv},
  eprint       = {1808.00590},
  timestamp    = {Tue, 24 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1808-00590.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-04774,
  author       = {Saba Eskandarian and
                  Jonathan Cogan and
                  Sawyer Birnbaum and
                  Peh Chang Wei Brandon and
                  Dillon Franke and
                  Forest Fraser and
                  Gaspar Garcia Jr. and
                  Eric Gong and
                  Hung T. Nguyen and
                  Taresh K. Sethi and
                  Vishal Subbiah and
                  Michael Backes and
                  Giancarlo Pellegrino and
                  Dan Boneh},
  title        = {Fidelius: Protecting User Secrets from Compromised Browsers},
  journal      = {CoRR},
  volume       = {abs/1809.04774},
  year         = {2018},
  url          = {http://arxiv.org/abs/1809.04774},
  eprinttype    = {arXiv},
  eprint       = {1809.04774},
  timestamp    = {Fri, 05 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1809-04774.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1812-02606,
  author       = {Kathrin Grosse and
                  David Pfaff and
                  Michael T. Smith and
                  Michael Backes},
  title        = {The Limitations of Model Uncertainty in Adversarial Settings},
  journal      = {CoRR},
  volume       = {abs/1812.02606},
  year         = {2018},
  url          = {http://arxiv.org/abs/1812.02606},
  eprinttype    = {arXiv},
  eprint       = {1812.02606},
  timestamp    = {Sat, 13 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1812-02606.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001HKS18,
  author       = {Michael Backes and
                  Lucjan Hanzlik and
                  Kamil Kluczniak and
                  Jonas Schneider},
  title        = {Signatures with Flexible Public Key: {A} Unified Approach to Privacy-Preserving
                  Signatures (Full Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {191},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/191},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001HKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesHS18,
  author       = {Michael Backes and
                  Lucjan Hanzlik and
                  Jonas Schneider},
  title        = {Membership Privacy for Fully Dynamic Group Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {641},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/641},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesHS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KunnemannG018,
  author       = {Robert K{\"{u}}nnemann and
                  Deepak Garg and
                  Michael Backes},
  title        = {Accountability in Security Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {127},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/127},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KunnemannG018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/AcarBFKMS17,
  author       = {Yasemin Acar and
                  Michael Backes and
                  Sascha Fahl and
                  Doowon Kim and
                  Michelle L. Mazurek and
                  Christian Stransky},
  title        = {How Internet Resources Might Be Helping You Develop Faster but Less
                  Securely},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {15},
  number       = {2},
  pages        = {50--60},
  year         = {2017},
  url          = {https://doi.org/10.1109/MSP.2017.24},
  doi          = {10.1109/MSP.2017.24},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/AcarBFKMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0001HPZ17,
  author       = {Michael Backes and
                  Mathias Humbert and
                  Jun Pang and
                  Yang Zhang},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {walk2friends: Inferring Social Links from Mobility Profiles},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {1943--1957},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3133972},
  doi          = {10.1145/3133956.3133972},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/0001HPZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DerrBFA017,
  author       = {Erik Derr and
                  Sven Bugiel and
                  Sascha Fahl and
                  Yasemin Acar and
                  Michael Backes},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Keep me Updated: An Empirical Study of Third-Party Library Updatability
                  on Android},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {2187--2200},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134059},
  doi          = {10.1145/3133956.3134059},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DerrBFA017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HuangSB017,
  author       = {Jie Huang and
                  Oliver Schranz and
                  Sven Bugiel and
                  Michael Backes},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {The {ART} of App Compartmentalization: Compiler-based Library Privilege
                  Separation on Stock Android},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {1037--1049},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134064},
  doi          = {10.1145/3133956.3134064},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HuangSB017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NguyenWA0WF17,
  author       = {Duc Cuong Nguyen and
                  Dominik Wermke and
                  Yasemin Acar and
                  Michael Backes and
                  Charles Weir and
                  Sascha Fahl},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {A Stitch in Time: Supporting Android Developers in WritingSecure Code},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {1065--1077},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3133977},
  doi          = {10.1145/3133956.3133977},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NguyenWA0WF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PellegrinoJ0BR17,
  author       = {Giancarlo Pellegrino and
                  Martin Johns and
                  Simon Koch and
                  Michael Backes and
                  Christian Rossow},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Deemon: Detecting {CSRF} with Dynamic Analysis and Property Graphs},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {1757--1771},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3133959},
  doi          = {10.1145/3133956.3133959},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/PellegrinoJ0BR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BackesGMS17,
  author       = {Michael Backes and
                  Manuel Gomez{-}Rodriguez and
                  Praveen Manoharan and
                  Bartlomiej Surma},
  title        = {Reconciling Privacy and Utility in Continuous-Time Diffusion Networks},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {292--304},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.29},
  doi          = {10.1109/CSF.2017.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BackesGMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GrossePMBM17,
  author       = {Kathrin Grosse and
                  Nicolas Papernot and
                  Praveen Manoharan and
                  Michael Backes and
                  Patrick D. McDaniel},
  editor       = {Simon N. Foley and
                  Dieter Gollmann and
                  Einar Snekkenes},
  title        = {Adversarial Examples for Malware Detection},
  booktitle    = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
                  in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10493},
  pages        = {62--79},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66399-9\_4},
  doi          = {10.1007/978-3-319-66399-9\_4},
  timestamp    = {Fri, 13 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GrossePMBM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/0001BSSW17,
  author       = {Michael Backes and
                  Sven Bugiel and
                  Oliver Schranz and
                  Philipp von Styp{-}Rekowsky and
                  Sebastian Weisgerber},
  title        = {ARTist: The Android Runtime Instrumentation and Security Toolkit},
  booktitle    = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2017, Paris, France, April 26-28, 2017},
  pages        = {481--495},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/EuroSP.2017.43},
  doi          = {10.1109/EUROSP.2017.43},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/0001BSSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/0001RSSY17,
  author       = {Michael Backes and
                  Konrad Rieck and
                  Malte Skoruppa and
                  Ben Stock and
                  Fabian Yamaguchi},
  title        = {Efficient and Flexible Discovery of {PHP} Application Vulnerabilities},
  booktitle    = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2017, Paris, France, April 26-28, 2017},
  pages        = {334--349},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/EuroSP.2017.14},
  doi          = {10.1109/EUROSP.2017.14},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/0001RSSY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/BackesDKK17,
  author       = {Michael Backes and
                  Jannik Dreier and
                  Steve Kremer and
                  Robert K{\"{u}}nnemann},
  title        = {A Novel Approach for Reasoning about Liveness in Cryptographic Protocols
                  and Its Application to Fair Exchange},
  booktitle    = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2017, Paris, France, April 26-28, 2017},
  pages        = {76--91},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/EuroSP.2017.12},
  doi          = {10.1109/EUROSP.2017.12},
  timestamp    = {Thu, 13 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/BackesDKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/BackesN17,
  author       = {Michael Backes and
                  Mohammad Nauman},
  title        = {{LUNA:} Quantifying and Leveraging Uncertainty in Android Malware
                  Analysis through Bayesian Machine Learning},
  booktitle    = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2017, Paris, France, April 26-28, 2017},
  pages        = {204--217},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/EuroSP.2017.24},
  doi          = {10.1109/EUROSP.2017.24},
  timestamp    = {Thu, 13 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/BackesN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LuWPNL017,
  author       = {Kangjie Lu and
                  Marie{-}Therese Walter and
                  David Pfaff and
                  Stefan N{\"{u}}mberger and
                  Wenke Lee and
                  Michael Backes},
  title        = {Unleashing Use-Before-Initialization Vulnerabilities in the Linux
                  Kernel Using Targeted Stack Spraying},
  booktitle    = {24th Annual Network and Distributed System Security Symposium, {NDSS}
                  2017, San Diego, California, USA, February 26 - March 1, 2017},
  publisher    = {The Internet Society},
  year         = {2017},
  url          = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/unleashing-use-initialization-vulnerabilities-linux-kernel-using-targeted-stack-spraying/},
  timestamp    = {Mon, 01 Feb 2021 08:42:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/LuWPNL017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/Maisuradze0R17,
  author       = {Giorgi Maisuradze and
                  Michael Backes and
                  Christian Rossow},
  title        = {Dachshund: Digging for and Securing (Non-)Blinded Constants in {JIT}
                  Code},
  booktitle    = {24th Annual Network and Distributed System Security Symposium, {NDSS}
                  2017, San Diego, California, USA, February 26 - March 1, 2017},
  publisher    = {The Internet Society},
  year         = {2017},
  url          = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/dachshund-digging-and-securing-non-blinded-constants-jit-code/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/Maisuradze0R17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KruppKRM017,
  author       = {Johannes Krupp and
                  Mohammad Karami and
                  Christian Rossow and
                  Damon McCoy and
                  Michael Backes},
  editor       = {Marc Dacier and
                  Michael D. Bailey and
                  Michalis Polychronakis and
                  Manos Antonakakis},
  title        = {Linking Amplification DDoS Attacks to Booter Services},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 20th International
                  Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10453},
  pages        = {427--449},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66332-6\_19},
  doi          = {10.1007/978-3-319-66332-6\_19},
  timestamp    = {Mon, 20 Nov 2023 09:00:29 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/KruppKRM017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/0001BBEHHL17,
  author       = {Michael Backes and
                  Pascal Berrang and
                  Matthias Bieg and
                  Roland Eils and
                  Carl Herrmann and
                  Mathias Humbert and
                  Irina Lehmann},
  title        = {Identifying Personal {DNA} Methylation Profiles by Genotype Inference},
  booktitle    = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
                  CA, USA, May 22-26, 2017},
  pages        = {957--976},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SP.2017.21},
  doi          = {10.1109/SP.2017.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/0001BBEHHL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/0001BSW17,
  author       = {Michael Backes and
                  Sven Bugiel and
                  Philipp von Styp{-}Rekowsky and
                  Marvin WiBfeld},
  title        = {Seamless In-App Ad Blocking on Stock Android},
  booktitle    = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San
                  Jose, CA, USA, May 25, 2017},
  pages        = {163--168},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SPW.2017.24},
  doi          = {10.1109/SPW.2017.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/0001BSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Acar0FGKMS17,
  author       = {Yasemin Acar and
                  Michael Backes and
                  Sascha Fahl and
                  Simson L. Garfinkel and
                  Doowon Kim and
                  Michelle L. Mazurek and
                  Christian Stransky},
  title        = {Comparing the Usability of Cryptographic APIs},
  booktitle    = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
                  CA, USA, May 22-26, 2017},
  pages        = {154--171},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SP.2017.52},
  doi          = {10.1109/SP.2017.52},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/Acar0FGKMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/FischerBXSA0F17,
  author       = {Felix Fischer and
                  Konstantin B{\"{o}}ttinger and
                  Huang Xiao and
                  Christian Stransky and
                  Yasemin Acar and
                  Michael Backes and
                  Sascha Fahl},
  title        = {Stack Overflow Considered Harmful? The Impact of Copy{\&}Paste
                  on Android Application Security},
  booktitle    = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
                  CA, USA, May 22-26, 2017},
  pages        = {121--136},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SP.2017.31},
  doi          = {10.1109/SP.2017.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/FischerBXSA0F17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/StockJS017,
  author       = {Ben Stock and
                  Martin Johns and
                  Marius Steffens and
                  Michael Backes},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {How the Web Tangled Itself: Uncovering the History of Client-Side
                  Web (In)Security},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {971--987},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/stock},
  timestamp    = {Mon, 01 Feb 2021 08:42:59 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/StockJS017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/StranskyANWKR0G17,
  author       = {Christian Stransky and
                  Yasemin Acar and
                  Duc Cuong Nguyen and
                  Dominik Wermke and
                  Doowon Kim and
                  Elissa M. Redmiles and
                  Michael Backes and
                  Simson L. Garfinkel and
                  Michelle L. Mazurek and
                  Sascha Fahl},
  editor       = {Jos{\'{e}} M. Fernandez and
                  Mathias Payer},
  title        = {Lessons Learned from Using an Online Platform to Conduct Large-Scale,
                  Online Controlled Security Experiments with Software Developers},
  booktitle    = {10th {USENIX} Workshop on Cyber Security Experimentation and Test,
                  {CSET} 2017, Vancouver, BC, Canada, August 14, 2017},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/cset17/workshop-program/presentation/stransky},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/StranskyANWKR0G17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/SimeonovskiPR017,
  author       = {Milivoj Simeonovski and
                  Giancarlo Pellegrino and
                  Christian Rossow and
                  Michael Backes},
  editor       = {Rick Barrett and
                  Rick Cummings and
                  Eugene Agichtein and
                  Evgeniy Gabrilovich},
  title        = {Who Controls the Internet?: Analyzing Global Threats using Property
                  Graph Traversals},
  booktitle    = {Proceedings of the 26th International Conference on World Wide Web,
                  {WWW} 2017, Perth, Australia, April 3-7, 2017},
  pages        = {647--656},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3038912.3052587},
  doi          = {10.1145/3038912.3052587},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/www/SimeonovskiPR017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/00010KSS17,
  author       = {Michael Backes and
                  J{\"{o}}rg Hoffmann and
                  Robert K{\"{u}}nnemann and
                  Patrick Speicher and
                  Marcel Steinmetz},
  title        = {Simulated Penetration Testing and Mitigation Analysis},
  journal      = {CoRR},
  volume       = {abs/1705.05088},
  year         = {2017},
  url          = {http://arxiv.org/abs/1705.05088},
  eprinttype    = {arXiv},
  eprint       = {1705.05088},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/00010KSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GrosseMP0M17,
  author       = {Kathrin Grosse and
                  Praveen Manoharan and
                  Nicolas Papernot and
                  Michael Backes and
                  Patrick D. McDaniel},
  title        = {On the (Statistical) Detection of Adversarial Examples},
  journal      = {CoRR},
  volume       = {abs/1702.06280},
  year         = {2017},
  url          = {http://arxiv.org/abs/1702.06280},
  eprinttype    = {arXiv},
  eprint       = {1702.06280},
  timestamp    = {Fri, 13 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GrosseMP0M17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-08221,
  author       = {Michael Backes and
                  Mathias Humbert and
                  Jun Pang and
                  Yang Zhang},
  title        = {walk2friends: Inferring Social Links from Mobility Profiles},
  journal      = {CoRR},
  volume       = {abs/1708.08221},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.08221},
  eprinttype    = {arXiv},
  eprint       = {1708.08221},
  timestamp    = {Sat, 31 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-08221.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-08786,
  author       = {Giancarlo Pellegrino and
                  Martin Johns and
                  Simon Koch and
                  Michael Backes and
                  Christian Rossow},
  title        = {Deemon: Detecting {CSRF} with Dynamic Analysis and Property Graphs},
  journal      = {CoRR},
  volume       = {abs/1708.08786},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.08786},
  eprinttype    = {arXiv},
  eprint       = {1708.08786},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-08786.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-04986,
  author       = {Andreas Katis and
                  Grigory Fedyukovich and
                  Huajun Guo and
                  Andrew Gacek and
                  John Backes and
                  Arie Gurfinkel and
                  Michael W. Whalen},
  title        = {Validity-Guided Synthesis of Reactive Systems from Assume-Guarantee
                  Contracts},
  journal      = {CoRR},
  volume       = {abs/1709.04986},
  year         = {2017},
  url          = {http://arxiv.org/abs/1709.04986},
  eprinttype    = {arXiv},
  eprint       = {1709.04986},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1709-04986.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1710-03135,
  author       = {Felix Fischer and
                  Konstantin B{\"{o}}ttinger and
                  Huang Xiao and
                  Christian Stransky and
                  Yasemin Acar and
                  Michael Backes and
                  Sascha Fahl},
  title        = {Stack Overflow Considered Harmful? The Impact of Copy{\&}Paste
                  on Android Application Security},
  journal      = {CoRR},
  volume       = {abs/1710.03135},
  year         = {2017},
  url          = {http://arxiv.org/abs/1710.03135},
  eprinttype    = {arXiv},
  eprint       = {1710.03135},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1710-03135.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1711-05441,
  author       = {Yang Zhang and
                  Mathias Humbert and
                  Bartlomiej Surma and
                  Praveen Manoharan and
                  Jilles Vreeken and
                  Michael Backes},
  title        = {{CTRL+Z:} Recovering Anonymized Social Graphs},
  journal      = {CoRR},
  volume       = {abs/1711.05441},
  year         = {2017},
  url          = {http://arxiv.org/abs/1711.05441},
  eprinttype    = {arXiv},
  eprint       = {1711.05441},
  timestamp    = {Fri, 13 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1711-05441.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-01222,
  author       = {Andrew Gacek and
                  John Backes and
                  Mike Whalen and
                  Lucas G. Wagner and
                  Elaheh Ghassabani},
  title        = {The JKind Model Checker},
  journal      = {CoRR},
  volume       = {abs/1712.01222},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.01222},
  eprinttype    = {arXiv},
  eprint       = {1712.01222},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-01222.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-08940,
  author       = {Sanam Ghorbani Lyastani and
                  Michael Schilling and
                  Sascha Fahl and
                  Sven Bugiel and
                  Michael Backes},
  title        = {Studying the Impact of Managers on Password Strength and Reuse},
  journal      = {CoRR},
  volume       = {abs/1712.08940},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.08940},
  eprinttype    = {arXiv},
  eprint       = {1712.08940},
  timestamp    = {Fri, 18 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-08940.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bioinformatics/StockelKTSBLGKG16,
  author       = {Daniel St{\"{o}}ckel and
                  Tim Kehl and
                  Patrick Trampert and
                  Lara Schneider and
                  Christina Backes and
                  Nicole Ludwig and
                  Andreas Gerasch and
                  Michael Kaufmann and
                  Manfred Gessler and
                  Norbert M. Graf and
                  Eckart Meese and
                  Andreas Keller and
                  Hans{-}Peter Lenhof},
  title        = {Multi-omics enrichment analysis using the GeneTrail2 web service},
  journal      = {Bioinform.},
  volume       = {32},
  number       = {10},
  pages        = {1502--1508},
  year         = {2016},
  url          = {https://doi.org/10.1093/bioinformatics/btv770},
  doi          = {10.1093/BIOINFORMATICS/BTV770},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bioinformatics/StockelKTSBLGKG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Backes16,
  author       = {Michael Backes},
  title        = {Herausforderungen des Internet of Things},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {40},
  number       = {8},
  pages        = {489--490},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11623-016-0642-6},
  doi          = {10.1007/S11623-016-0642-6},
  timestamp    = {Mon, 11 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Backes16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/BackesKMMM16,
  author       = {Michael Backes and
                  Aniket Kate and
                  Praveen Manoharan and
                  Sebastian Meiser and
                  Esfandiar Mohammadi},
  title        = {AnoA: {A} Framework for Analyzing Anonymous Communication Protocols},
  journal      = {J. Priv. Confidentiality},
  volume       = {7},
  number       = {2},
  year         = {2016},
  url          = {https://doi.org/10.29012/jpc.v7i2.651},
  doi          = {10.29012/JPC.V7I2.651},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/BackesKMMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/neuroimage/BackesWLRNEHFSG16,
  author       = {Heiko Backes and
                  Maureen Walberer and
                  Anne Ladwig and
                  Maria A. Rueger and
                  Bernd Neumaier and
                  Heike Endepols and
                  Mathias Hoehn and
                  Gereon R. Fink and
                  Michael Schroeter and
                  Rudolf Graf},
  title        = {Glucose consumption of inflammatory cells masks metabolic deficits
                  in the brain},
  journal      = {NeuroImage},
  volume       = {128},
  pages        = {54--62},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.neuroimage.2015.12.044},
  doi          = {10.1016/J.NEUROIMAGE.2015.12.044},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/neuroimage/BackesWLRNEHFSG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/BackesMS16,
  author       = {Michael Backes and
                  Sebastian Meiser and
                  Marcin Slowik},
  title        = {Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment
                  of Tor Path Selection Algorithms Against Structural Attacks},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2016},
  number       = {2},
  pages        = {40--60},
  year         = {2016},
  url          = {https://doi.org/10.1515/popets-2016-0004},
  doi          = {10.1515/POPETS-2016-0004},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/BackesMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/0001GK16,
  author       = {Michael Backes and
                  Niklas Grimm and
                  Aniket Kate},
  title        = {Data Lineage in Malicious Environments},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {13},
  number       = {2},
  pages        = {178--191},
  year         = {2016},
  url          = {https://doi.org/10.1109/TDSC.2015.2399296},
  doi          = {10.1109/TDSC.2015.2399296},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/0001GK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/0001BSS16,
  author       = {Michael Backes and
                  Sven Bugiel and
                  Oliver Schranz and
                  Philipp von Styp{-}Rekowsky},
  title        = {Boxify: Bringing Full-Fledged App Sandboxing to Stock Android},
  journal      = {login Usenix Mag.},
  volume       = {41},
  number       = {2},
  year         = {2016},
  url          = {https://www.usenix.org/publications/login/summer2016/backes},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/0001BSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0001BD16,
  author       = {Michael Backes and
                  Sven Bugiel and
                  Erik Derr},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Reliable Third-Party Library Detection in Android and its Security
                  Applications},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {356--367},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978333},
  doi          = {10.1145/2976749.2978333},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/0001BD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0001BDG016,
  author       = {Michael Backes and
                  Sven Bugiel and
                  Erik Derr and
                  Sebastian Gerling and
                  Christian Hammer},
  editor       = {Xiaofeng Chen and
                  XiaoFeng Wang and
                  Xinyi Huang},
  title        = {R-Droid: Leveraging Android App Analysis with Static Slice Optimization},
  booktitle    = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016},
  pages        = {129--140},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897845.2897927},
  doi          = {10.1145/2897845.2897927},
  timestamp    = {Mon, 25 Apr 2022 08:42:03 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/0001BDG016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0001BHM16,
  author       = {Michael Backes and
                  Pascal Berrang and
                  Mathias Humbert and
                  Praveen Manoharan},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Membership Privacy in MicroRNA-based Studies},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {319--330},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978355},
  doi          = {10.1145/2976749.2978355},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/0001BHM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0001BHS16,
  author       = {Michael Backes and
                  Sven Bugiel and
                  Jie Huang and
                  Oliver Schranz},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {{POSTER:} The {ART} of App Compartmentalization},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1811--1813},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2989056},
  doi          = {10.1145/2976749.2989056},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/0001BHS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0001KM16,
  author       = {Michael Backes and
                  Robert K{\"{u}}nnemann and
                  Esfandiar Mohammadi},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Computational Soundness for Dalvik Bytecode},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {717--730},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978418},
  doi          = {10.1145/2976749.2978418},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/0001KM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GotzfriedMDN016,
  author       = {Johannes G{\"{o}}tzfried and
                  Tilo M{\"{u}}ller and
                  Gabor Drescher and
                  Stefan N{\"{u}}rnberger and
                  Michael Backes},
  editor       = {Xiaofeng Chen and
                  XiaoFeng Wang and
                  Xinyi Huang},
  title        = {RamCrypt: Kernel-based Address Space Encryption for User-mode Processes},
  booktitle    = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016},
  pages        = {919--924},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897845.2897924},
  doi          = {10.1145/2897845.2897924},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/GotzfriedMDN016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Krupp0R16,
  author       = {Johannes Krupp and
                  Michael Backes and
                  Christian Rossow},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Identifying the Scan and Attack Infrastructures Behind Amplification
                  DDoS Attacks},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1426--1437},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978293},
  doi          = {10.1145/2976749.2978293},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Krupp0R16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SchneiderFS016,
  author       = {Jonas Schneider and
                  Nils Fleischhacker and
                  Dominique Schr{\"{o}}der and
                  Michael Backes},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Efficient Cryptographic Password Hardening Services from Partially
                  Oblivious Commitments},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1192--1203},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978375},
  doi          = {10.1145/2976749.2978375},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SchneiderFS016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/StockPRJ016,
  author       = {Ben Stock and
                  Giancarlo Pellegrino and
                  Christian Rossow and
                  Martin Johns and
                  Michael Backes},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {{POSTER:} Mapping the Landscape of Large-Scale Vulnerability Notifications},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1787--1789},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2989057},
  doi          = {10.1145/2976749.2989057},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/StockPRJ016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/Brengel0R16,
  author       = {Michael Brengel and
                  Michael Backes and
                  Christian Rossow},
  editor       = {Juan Caballero and
                  Urko Zurutuza and
                  Ricardo J. Rodr{\'{\i}}guez},
  title        = {Detecting Hardware-Assisted Virtualization},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 13th International Conference, {DIMVA} 2016, San Sebasti{\'{a}}n,
                  Spain, July 7-8, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9721},
  pages        = {207--227},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40667-1\_11},
  doi          = {10.1007/978-3-319-40667-1\_11},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/Brengel0R16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/0001HKP16,
  author       = {Michael Backes and
                  Amir Herzberg and
                  Aniket Kate and
                  Ivan Pryvalov},
  editor       = {Ioannis G. Askoxylakis and
                  Sotiris Ioannidis and
                  Sokratis K. Katsikas and
                  Catherine Meadows},
  title        = {Anonymous {RAM}},
  booktitle    = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
                  in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9878},
  pages        = {344--362},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45744-4\_17},
  doi          = {10.1007/978-3-319-45744-4\_17},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/0001HKP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fosad/0001BM16,
  author       = {Michael Backes and
                  Pascal Berrang and
                  Praveen Manoharan},
  editor       = {Alessandro Aldini and
                  Javier L{\'{o}}pez and
                  Fabio Martinelli},
  title        = {From Zoos to Safaris - From Closed-World Enforcement to Open-World
                  Assessment of Privacy},
  booktitle    = {Foundations of Security Analysis and Design {VIII} - {FOSAD} 2014/2015/2016
                  Tutorial Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {9808},
  pages        = {87--138},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-43005-8\_3},
  doi          = {10.1007/978-3-319-43005-8\_3},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fosad/0001BM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LuLN016,
  author       = {Kangjie Lu and
                  Wenke Lee and
                  Stefan N{\"{u}}rnberger and
                  Michael Backes},
  title        = {How to Make {ASLR} Win the Clone Wars: Runtime Re-Randomization},
  booktitle    = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  publisher    = {The Internet Society},
  year         = {2016},
  url          = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/how-make-aslr-win-clone-wars-runtime-re-randomization.pdf},
  timestamp    = {Thu, 17 Jun 2021 16:04:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/LuLN016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nfm/BackesWGK16,
  author       = {John D. Backes and
                  Michael W. Whalen and
                  Andrew Gacek and
                  John Komp},
  editor       = {Sanjai Rayadurgam and
                  Oksana Tkachuk},
  title        = {On Implementing Real-Time Specification Patterns Using Observers},
  booktitle    = {{NASA} Formal Methods - 8th International Symposium, {NFM} 2016, Minneapolis,
                  MN, USA, June 7-9, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9690},
  pages        = {19--33},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40648-0\_2},
  doi          = {10.1007/978-3-319-40648-0\_2},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/nfm/BackesWGK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BackesMS16,
  author       = {Michael Backes and
                  Sebastian Meiser and
                  Dominique Schr{\"{o}}der},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Delegatable Functional Signatures},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9614},
  pages        = {357--386},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49384-7\_14},
  doi          = {10.1007/978-3-662-49384-7\_14},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BackesMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/0001HRRSS16,
  author       = {Michael Backes and
                  Thorsten Holz and
                  Christian Rossow and
                  Teemu Rytilahti and
                  Milivoj Simeonovski and
                  Ben Stock},
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {On the Feasibility of TTL-Based Filtering for DRDoS Mitigation},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  pages        = {303--322},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2\_14},
  doi          = {10.1007/978-3-319-45719-2\_14},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/0001HRRSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/YokoyamaITPYMKI16,
  author       = {Akira Yokoyama and
                  Kou Ishii and
                  Rui Tanabe and
                  Yinmin Papa and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto and
                  Takahiro Kasama and
                  Daisuke Inoue and
                  Michael Brengel and
                  Michael Backes and
                  Christian Rossow},
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence
                  for Sandbox Evasion},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  pages        = {165--187},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2\_8},
  doi          = {10.1007/978-3-319-45719-2\_8},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/YokoyamaITPYMKI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/BackesHPS16,
  author       = {Michael Backes and
                  Christian Hammer and
                  David Pfaff and
                  Malte Skoruppa},
  editor       = {Sascha Ossowski},
  title        = {Implementation-level analysis of the JavaScript helios voting client},
  booktitle    = {Proceedings of the 31st Annual {ACM} Symposium on Applied Computing,
                  Pisa, Italy, April 4-8, 2016},
  pages        = {2071--2078},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2851613.2851800},
  doi          = {10.1145/2851613.2851800},
  timestamp    = {Tue, 06 Nov 2018 11:06:49 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/BackesHPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Acar0BFM016,
  author       = {Yasemin Acar and
                  Michael Backes and
                  Sven Bugiel and
                  Sascha Fahl and
                  Patrick D. McDaniel and
                  Matthew Smith},
  title        = {SoK: Lessons Learned from Android Security Research for Appified Software
                  Platforms},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {433--451},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.33},
  doi          = {10.1109/SP.2016.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/Acar0BFM016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AcarBFKMS16,
  author       = {Yasemin Acar and
                  Michael Backes and
                  Sascha Fahl and
                  Doowon Kim and
                  Michelle L. Mazurek and
                  Christian Stransky},
  title        = {You Get Where You're Looking for: The Impact of Information Sources
                  on Code Security},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {289--305},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.25},
  doi          = {10.1109/SP.2016.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/AcarBFKMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/0001BDMOW16,
  author       = {Michael Backes and
                  Sven Bugiel and
                  Erik Derr and
                  Patrick D. McDaniel and
                  Damien Octeau and
                  Sebastian Weisgerber},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {On Demystifying the Android Application Framework: Re-Visiting Android
                  Permission Specification Analysis},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {1101--1118},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/backes\_android},
  timestamp    = {Mon, 01 Feb 2021 08:43:18 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/0001BDMOW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/0001BHHKM16,
  author       = {Michael Backes and
                  Pascal Berrang and
                  Anna Hecksteden and
                  Mathias Humbert and
                  Andreas Keller and
                  Tim Meyer},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression
                  Profiles},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {1223--1240},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/backes\_epigenetics},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/0001BHHKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Maisuradze0R16,
  author       = {Giorgi Maisuradze and
                  Michael Backes and
                  Christian Rossow},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions of
                  {JIT-ROP} Defenses},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {139--156},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/maisuradze},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Maisuradze0R16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/StockPRJ016,
  author       = {Ben Stock and
                  Giancarlo Pellegrino and
                  Christian Rossow and
                  Martin Johns and
                  Michael Backes},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability
                  Notification},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {1015--1032},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/stock},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/StockPRJ016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/0001BGGM16,
  author       = {Michael Backes and
                  Pascal Berrang and
                  Oana Goga and
                  Krishna P. Gummadi and
                  Praveen Manoharan},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Sabrina De Capitani di Vimercati},
  title        = {On Profile Linkability despite Anonymity in Social Media Systems},
  booktitle    = {Proceedings of the 2016 {ACM} on Workshop on Privacy in the Electronic
                  Society, WPES@CCS 2016, Vienna, Austria, October 24 - 28, 2016},
  pages        = {25--35},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2994629},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/0001BGGM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/0001BSSW16,
  author       = {Michael Backes and
                  Sven Bugiel and
                  Oliver Schranz and
                  Philipp von Styp{-}Rekowsky and
                  Sebastian Weisgerber},
  title        = {ARTist: The Android Runtime Instrumentation and Security Toolkit},
  journal      = {CoRR},
  volume       = {abs/1607.06619},
  year         = {2016},
  url          = {http://arxiv.org/abs/1607.06619},
  eprinttype    = {arXiv},
  eprint       = {1607.06619},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/0001BSSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/0001KM16,
  author       = {Michael Backes and
                  Robert K{\"{u}}nnemann and
                  Esfandiar Mohammadi},
  title        = {Computational Soundness for Dalvik Bytecode},
  journal      = {CoRR},
  volume       = {abs/1608.04362},
  year         = {2016},
  url          = {http://arxiv.org/abs/1608.04362},
  eprinttype    = {arXiv},
  eprint       = {1608.04362},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/0001KM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Asghar0S16,
  author       = {Muhammad Rizwan Asghar and
                  Michael Backes and
                  Milivoj Simeonovski},
  title        = {{PRIMA:} Privacy-Preserving Identity and Access Management at Internet-Scale},
  journal      = {CoRR},
  volume       = {abs/1612.01787},
  year         = {2016},
  url          = {http://arxiv.org/abs/1612.01787},
  eprinttype    = {arXiv},
  eprint       = {1612.01787},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Asghar0S16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BackesWGK16,
  author       = {John D. Backes and
                  Michael W. Whalen and
                  Andrew Gacek and
                  John Komp},
  title        = {On Implementing Real-time Specification Patterns Using Observers},
  journal      = {CoRR},
  volume       = {abs/1604.08155},
  year         = {2016},
  url          = {http://arxiv.org/abs/1604.08155},
  eprinttype    = {arXiv},
  eprint       = {1604.08155},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BackesWGK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GrossePM0M16,
  author       = {Kathrin Grosse and
                  Nicolas Papernot and
                  Praveen Manoharan and
                  Michael Backes and
                  Patrick D. McDaniel},
  title        = {Adversarial Perturbations Against Deep Neural Networks for Malware
                  Classification},
  journal      = {CoRR},
  volume       = {abs/1606.04435},
  year         = {2016},
  url          = {http://arxiv.org/abs/1606.04435},
  eprinttype    = {arXiv},
  eprint       = {1606.04435},
  timestamp    = {Fri, 13 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GrossePM0M16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KatisFGBGW16,
  author       = {Andreas Katis and
                  Grigory Fedyukovich and
                  Andrew Gacek and
                  John D. Backes and
                  Arie Gurfinkel and
                  Michael W. Whalen},
  title        = {Synthesis from Assume-Guarantee Contracts using Skolemized Proofs
                  of Realizability},
  journal      = {CoRR},
  volume       = {abs/1610.05867},
  year         = {2016},
  url          = {http://arxiv.org/abs/1610.05867},
  eprinttype    = {arXiv},
  eprint       = {1610.05867},
  timestamp    = {Tue, 17 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KatisFGBGW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ShiraziSA0D16,
  author       = {Fatemeh Shirazi and
                  Milivoj Simeonovski and
                  Muhammad Rizwan Asghar and
                  Michael Backes and
                  Claudia D{\'{\i}}az},
  title        = {A Survey on Routing in Anonymous Communication Protocols},
  journal      = {CoRR},
  volume       = {abs/1608.05538},
  year         = {2016},
  url          = {http://arxiv.org/abs/1608.05538},
  eprinttype    = {arXiv},
  eprint       = {1608.05538},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ShiraziSA0D16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001HKP16,
  author       = {Michael Backes and
                  Amir Herzberg and
                  Aniket Kate and
                  Ivan Pryvalov},
  title        = {Anonymous {RAM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {678},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/678},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001HKP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jfr/HebertBMHARBBFH15,
  author       = {Paul Hebert and
                  Max Bajracharya and
                  Jeremy Ma and
                  Nicolas Hudson and
                  Alper Aydemir and
                  Jason I. Reid and
                  Charles Bergh and
                  James Borders and
                  Matthew A. Frost and
                  Michael Hagman and
                  John Leichty and
                  Paul Backes and
                  Brett Kennedy and
                  Paul Karplus and
                  Brian W. Satzinger and
                  Katie Byl and
                  Krishna Shankar and
                  Joel W. Burdick},
  title        = {Mobile Manipulation and Mobility as Manipulation - Design and Algorithms
                  of RoboSimian},
  journal      = {J. Field Robotics},
  volume       = {32},
  number       = {2},
  pages        = {255--274},
  year         = {2015},
  url          = {https://doi.org/10.1002/rob.21566},
  doi          = {10.1002/ROB.21566},
  timestamp    = {Wed, 08 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jfr/HebertBMHARBBFH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mscs/0001K15,
  author       = {Michael Backes and
                  Boris K{\"{o}}pf},
  title        = {Quantifying information flow in cryptographic systems},
  journal      = {Math. Struct. Comput. Sci.},
  volume       = {25},
  number       = {2},
  pages        = {457--479},
  year         = {2015},
  url          = {https://doi.org/10.1017/S0960129513000662},
  doi          = {10.1017/S0960129513000662},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mscs/0001K15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/0001KMR15,
  author       = {Michael Backes and
                  Aniket Kate and
                  Sebastian Meiser and
                  Tim Ruffing},
  editor       = {Tal Malkin and
                  Vladimir Kolesnikov and
                  Allison Bishop Lewko and
                  Michalis Polychronakis},
  title        = {Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak
                  Sources},
  booktitle    = {Applied Cryptography and Network Security - 13th International Conference,
                  {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9092},
  pages        = {675--695},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28166-7\_33},
  doi          = {10.1007/978-3-319-28166-7\_33},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/0001KMR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/SimeonovskiBA0M15,
  author       = {Milivoj Simeonovski and
                  Fabian Bendun and
                  Muhammad Rizwan Asghar and
                  Michael Backes and
                  Ninja Marnau and
                  Peter Druschel},
  editor       = {Tal Malkin and
                  Vladimir Kolesnikov and
                  Allison Bishop Lewko and
                  Michalis Polychronakis},
  title        = {Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability
                  of Online Information},
  booktitle    = {Applied Cryptography and Network Security - 13th International Conference,
                  {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9092},
  pages        = {431--453},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28166-7\_21},
  doi          = {10.1007/978-3-319-28166-7\_21},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/SimeonovskiBA0M15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0001GT15,
  author       = {Michael Backes and
                  Martin Gagn{\'{e}} and
                  Sri Aravinda Krishnan Thyagarajan},
  editor       = {Feng Bao and
                  Steven Miller and
                  Sherman S. M. Chow and
                  Danfeng Yao},
  title        = {Fully Secure Inner-Product Proxy Re-Encryption with Constant Size
                  Ciphertext},
  booktitle    = {Proceedings of the 3rd International Workshop on Security in Cloud
                  Computing, SCC@ASIACCS '15, Singapore, Republic of Singapore, April
                  14, 2015},
  pages        = {31--40},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2732516.2732525},
  doi          = {10.1145/2732516.2732525},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/0001GT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0001KMMR15,
  author       = {Michael Backes and
                  Simon Koch and
                  Sebastian Meiser and
                  Esfandiar Mohammadi and
                  Christian Rossow},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {{POSTER:} In the Net of the Spider: Measuring the Anonymity-Impact
                  of Network-level Adversaries Against Tor},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {1626--1628},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2810115},
  doi          = {10.1145/2810103.2810115},
  timestamp    = {Tue, 10 Nov 2020 19:58:09 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/0001KMMR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0001SS15,
  author       = {Michael Backes and
                  Oliver Schranz and
                  Philipp von Styp{-}Rekowsky},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {{POSTER:} Towards Compiler-Assisted Taint Tracking on the Android
                  Runtime {(ART)}},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {1629--1631},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2810129},
  doi          = {10.1145/2810103.2810129},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/0001SS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/0001BMMP15,
  author       = {Michael Backes and
                  Fabian Bendun and
                  Matteo Maffei and
                  Esfandiar Mohammadi and
                  Kim Pecina},
  editor       = {C{\'{e}}dric Fournet and
                  Michael W. Hicks and
                  Luca Vigan{\`{o}}},
  title        = {Symbolic Malleable Zero-Knowledge Proofs},
  booktitle    = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona,
                  Italy, 13-17 July, 2015},
  pages        = {412--426},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CSF.2015.35},
  doi          = {10.1109/CSF.2015.35},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/0001BMMP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/0001MR15,
  author       = {Michael Backes and
                  Esfandiar Mohammadi and
                  Tim Ruffing},
  editor       = {G{\"{u}}nther Pernul and
                  Peter Y. A. Ryan and
                  Edgar R. Weippl},
  title        = {Computational Soundness for Interactive Primitives},
  booktitle    = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
                  in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9326},
  pages        = {125--145},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24174-6\_7},
  doi          = {10.1007/978-3-319-24174-6\_7},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/0001MR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nfm/BackesCMW15,
  author       = {John Backes and
                  Darren D. Cofer and
                  Steven P. Miller and
                  Michael W. Whalen},
  editor       = {Klaus Havelund and
                  Gerard J. Holzmann and
                  Rajeev Joshi},
  title        = {Requirements Analysis of a Quad-Redundant Flight Control System},
  booktitle    = {{NASA} Formal Methods - 7th International Symposium, {NFM} 2015, Pasadena,
                  CA, USA, April 27-29, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9058},
  pages        = {82--96},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17524-9\_7},
  doi          = {10.1007/978-3-319-17524-9\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/nfm/BackesCMW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nfm/GacekKWBC15,
  author       = {Andrew Gacek and
                  Andreas Katis and
                  Michael W. Whalen and
                  John Backes and
                  Darren D. Cofer},
  editor       = {Klaus Havelund and
                  Gerard J. Holzmann and
                  Rajeev Joshi},
  title        = {Towards Realizability Checking of Contracts Using Theories},
  booktitle    = {{NASA} Formal Methods - 7th International Symposium, {NFM} 2015, Pasadena,
                  CA, USA, April 27-29, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9058},
  pages        = {173--187},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17524-9\_13},
  doi          = {10.1007/978-3-319-17524-9\_13},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nfm/GacekKWBC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/0001B0M15,
  author       = {Michael Backes and
                  Fabian Bendun and
                  J{\"{o}}rg Hoffmann and
                  Ninja Marnau},
  editor       = {Riccardo Focardi and
                  Andrew C. Myers},
  title        = {PriCL: Creating a Precedent, a Framework for Reasoning about Privacy
                  Case Law},
  booktitle    = {Principles of Security and Trust - 4th International Conference, {POST}
                  2015, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9036},
  pages        = {344--363},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46666-7\_18},
  doi          = {10.1007/978-3-662-46666-7\_18},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/0001B0M15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/0001BFR15,
  author       = {Michael Backes and
                  Manuel Barbosa and
                  Dario Fiore and
                  Raphael M. Reischuk},
  title        = {{ADSNARK:} Nearly Practical and Privacy-Preserving Proofs on Authenticated
                  Data},
  booktitle    = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
                  CA, USA, May 17-21, 2015},
  pages        = {271--286},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SP.2015.24},
  doi          = {10.1109/SP.2015.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/0001BFR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/0001B0SS15,
  author       = {Michael Backes and
                  Sven Bugiel and
                  Christian Hammer and
                  Oliver Schranz and
                  Philipp von Styp{-}Rekowsky},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Boxify: Full-fledged App Sandboxing for Stock Android},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {691--706},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/backes},
  timestamp    = {Mon, 01 Feb 2021 08:42:57 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/0001B0SS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/0001BHM15,
  author       = {Michael Backes and
                  Fabian Bendun and
                  J{\"{o}}rg Hoffmann and
                  Ninja Marnau},
  title        = {PriCL: Creating a Precedent {A} Framework for Reasoning about Privacy
                  Case Law},
  journal      = {CoRR},
  volume       = {abs/1501.03353},
  year         = {2015},
  url          = {http://arxiv.org/abs/1501.03353},
  eprinttype    = {arXiv},
  eprint       = {1501.03353},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/0001BHM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/0001BM15,
  author       = {Michael Backes and
                  Pascal Berrang and
                  Praveen Manoharan},
  title        = {How well do you blend into the crowd? - d-convergence: {A} novel paradigm
                  for quantifying privacy in the age of Big-Data},
  journal      = {CoRR},
  volume       = {abs/1502.03346},
  year         = {2015},
  url          = {http://arxiv.org/abs/1502.03346},
  eprinttype    = {arXiv},
  eprint       = {1502.03346},
  timestamp    = {Fri, 13 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/0001BM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BackesCMW15,
  author       = {John Backes and
                  Darren D. Cofer and
                  Steven P. Miller and
                  Mike Whalen},
  title        = {Requirements Analysis of a Quad-Redundant Flight Control System},
  journal      = {CoRR},
  volume       = {abs/1502.03343},
  year         = {2015},
  url          = {http://arxiv.org/abs/1502.03343},
  eprinttype    = {arXiv},
  eprint       = {1502.03343},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BackesCMW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GacekKWBC15,
  author       = {Andrew Gacek and
                  Andreas Katis and
                  Michael W. Whalen and
                  John Backes and
                  Darren D. Cofer},
  title        = {Towards Realizability Checking of Contracts using Theories},
  journal      = {CoRR},
  volume       = {abs/1502.03005},
  year         = {2015},
  url          = {http://arxiv.org/abs/1502.03005},
  eprinttype    = {arXiv},
  eprint       = {1502.03005},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GacekKWBC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SimeonovskiBA0M15,
  author       = {Milivoj Simeonovski and
                  Fabian Bendun and
                  Muhammad Rizwan Asghar and
                  Michael Backes and
                  Ninja Marnau and
                  Peter Druschel},
  title        = {Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability
                  of Online Information},
  journal      = {CoRR},
  volume       = {abs/1506.06033},
  year         = {2015},
  url          = {http://arxiv.org/abs/1506.06033},
  eprinttype    = {arXiv},
  eprint       = {1506.06033},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SimeonovskiBA0M15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SimeonovskiBA0M15,
  author       = {Milivoj Simeonovski and
                  Fabian Bendun and
                  Muhammad Rizwan Asghar and
                  Michael Backes and
                  Ninja Marnau and
                  Peter Druschel},
  title        = {Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability
                  of Online Information},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {592},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/592},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SimeonovskiBA0M15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adac/VoigtFBR14,
  author       = {Tobias Voigt and
                  Roland Fried and
                  Michael Backes and
                  Wolfgang Rhode},
  title        = {Threshold optimization for classification in imbalanced data in a
                  problem of gamma-ray astronomy},
  journal      = {Adv. Data Anal. Classif.},
  volume       = {8},
  number       = {2},
  pages        = {195--216},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11634-014-0167-5},
  doi          = {10.1007/S11634-014-0167-5},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/adac/VoigtFBR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BackesHM14,
  author       = {Michael Backes and
                  Catalin Hritcu and
                  Matteo Maffei},
  title        = {Union, intersection and refinement types and reasoning about type
                  disjointness for secure protocol implementations},
  journal      = {J. Comput. Secur.},
  volume       = {22},
  number       = {2},
  pages        = {301--353},
  year         = {2014},
  url          = {https://doi.org/10.3233/JCS-130493},
  doi          = {10.3233/JCS-130493},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BackesHM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/neuroimage/GramerFSTKSVKBG14,
  author       = {Markus Gramer and
                  Delphine Feuerstein and
                  Andre Steimers and
                  Masatoshi Takagaki and
                  Tetsuya Kumagai and
                  Michael Su{\'{e}} and
                  Stefan Vollmar and
                  Matthias Kohl{-}Bareis and
                  Heiko Backes and
                  Rudolf Graf},
  title        = {Device for simultaneous positron emission tomography, laser speckle
                  imaging and {RGB} reflectometry: Validation and application to cortical
                  spreading depression and brain ischemia in rats},
  journal      = {NeuroImage},
  volume       = {94},
  pages        = {250--262},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.neuroimage.2014.03.027},
  doi          = {10.1016/J.NEUROIMAGE.2014.03.027},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/neuroimage/GramerFSTKSVKBG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BackesCKSD14,
  author       = {Michael Backes and
                  Jeremy Clark and
                  Aniket Kate and
                  Milivoj Simeonovski and
                  Peter Druschel},
  editor       = {Ioana Boureanu and
                  Philippe Owesarski and
                  Serge Vaudenay},
  title        = {BackRef: Accountability in Anonymous Communication Networks},
  booktitle    = {Applied Cryptography and Network Security - 12th International Conference,
                  {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8479},
  pages        = {380--400},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07536-5\_23},
  doi          = {10.1007/978-3-319-07536-5\_23},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BackesCKSD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BackesGGNSS14,
  author       = {Michael Backes and
                  Rainer W. Gerling and
                  Sebastian Gerling and
                  Stefan N{\"{u}}rnberger and
                  Dominique Schr{\"{o}}der and
                  Mark Simkin},
  editor       = {Ioana Boureanu and
                  Philippe Owesarski and
                  Serge Vaudenay},
  title        = {WebTrust - {A} Comprehensive Authenticity and Integrity Framework
                  for {HTTP}},
  booktitle    = {Applied Cryptography and Network Security - 12th International Conference,
                  {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8479},
  pages        = {401--418},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07536-5\_24},
  doi          = {10.1007/978-3-319-07536-5\_24},
  timestamp    = {Mon, 26 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BackesGGNSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BackesBG14,
  author       = {Michael Backes and
                  Sven Bugiel and
                  Sebastian Gerling},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Scippa: system-centric {IPC} provenance on Android},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {36--45},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664264},
  doi          = {10.1145/2664243.2664264},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/BackesBG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BackesBGS14,
  author       = {Michael Backes and
                  Sven Bugiel and
                  Sebastian Gerling and
                  Philipp von Styp{-}Rekowsky},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Android security framework: extensible multi-layered access control
                  on Android},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {46--55},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664265},
  doi          = {10.1145/2664243.2664265},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/BackesBGS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BackesHKKNP14,
  author       = {Michael Backes and
                  Thorsten Holz and
                  Benjamin Kollenda and
                  Philipp Koppe and
                  Stefan N{\"{u}}rnberger and
                  Jannik Pewny},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {You Can Run but You Can't Read: Preventing Disclosure Exploits in
                  Executable Code},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1342--1353},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660378},
  doi          = {10.1145/2660267.2660378},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BackesHKKNP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BackesKMM14,
  author       = {Michael Backes and
                  Aniket Kate and
                  Sebastian Meiser and
                  Esfandiar Mohammadi},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {513--524},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660371},
  doi          = {10.1145/2660267.2660371},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BackesKMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BackesMM14,
  author       = {Michael Backes and
                  Praveen Manoharan and
                  Esfandiar Mohammadi},
  title        = {{TUC:} Time-Sensitive and Modular Analysis of Anonymous Communication},
  booktitle    = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
                  Austria, 19-22 July, 2014},
  pages        = {383--397},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSF.2014.34},
  doi          = {10.1109/CSF.2014.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BackesMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/BackesBCK14,
  author       = {Michael Backes and
                  Fabian Bendun and
                  Ashish Choudhury and
                  Aniket Kate},
  editor       = {Magn{\'{u}}s M. Halld{\'{o}}rsson and
                  Shlomi Dolev},
  title        = {Asynchronous {MPC} with a strict honest majority using non-equivocation},
  booktitle    = {{ACM} Symposium on Principles of Distributed Computing, {PODC} '14,
                  Paris, France, July 15-18, 2014},
  pages        = {10--19},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611462.2611490},
  doi          = {10.1145/2611462.2611490},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/podc/BackesBCK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/BackesMR14,
  author       = {Michael Backes and
                  Esfandiar Mohammadi and
                  Tim Ruffing},
  editor       = {Mart{\'{\i}}n Abadi and
                  Steve Kremer},
  title        = {Computational Soundness Results for ProVerif - Bridging the Gap from
                  Trace Properties to Uniformity},
  booktitle    = {Principles of Security and Trust - Third International Conference,
                  {POST} 2014, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13,
                  2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8414},
  pages        = {42--62},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54792-8\_3},
  doi          = {10.1007/978-3-642-54792-8\_3},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/post/BackesMR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/BackesGLL14,
  author       = {Michael Backes and
                  Sebastian Gerling and
                  Stefan Lorenz and
                  Stephan Lukas},
  editor       = {Yookun Cho and
                  Sung Y. Shin and
                  Sang{-}Wook Kim and
                  Chih{-}Cheng Hung and
                  Jiman Hong},
  title        = {X-pire 2.0: a user-controlled expiration date and copy protection
                  mechanism},
  booktitle    = {Symposium on Applied Computing, {SAC} 2014, Gyeongju, Republic of
                  Korea - March 24 - 28, 2014},
  pages        = {1633--1640},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2554850.2554856},
  doi          = {10.1145/2554850.2554856},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/BackesGLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigada/GacekBCSW14,
  author       = {Andrew Gacek and
                  John Backes and
                  Darren D. Cofer and
                  Konrad Slind and
                  Mike Whalen},
  editor       = {Michael B. Feldman and
                  S. Tucker Taft},
  title        = {Resolute: an assurance case language for architecture models},
  booktitle    = {Proceedings of the 2014 {ACM} SIGAda annual conference on High integrity
                  language technology, {HILT} 2014, Portland, Oregon, USA, October 18-21,
                  2014},
  pages        = {19--28},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2663171.2663177},
  doi          = {10.1145/2663171.2663177},
  timestamp    = {Fri, 02 Jun 2023 17:16:28 +0200},
  biburl       = {https://dblp.org/rec/conf/sigada/GacekBCSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/BackesGK14,
  author       = {Michael Backes and
                  Niklas Grimm and
                  Aniket Kate},
  editor       = {Sjouke Mauw and
                  Christian Damsgaard Jensen},
  title        = {Lime: Data Lineage in the Malicious Environment},
  booktitle    = {Security and Trust Management - 10th International Workshop, {STM}
                  2014, Wroclaw, Poland, September 10-11, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8743},
  pages        = {183--187},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11851-2\_13},
  doi          = {10.1007/978-3-319-11851-2\_13},
  timestamp    = {Thu, 23 Sep 2021 11:47:56 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/BackesGK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BackesN14,
  author       = {Michael Backes and
                  Stefan N{\"{u}}rnberger},
  editor       = {Kevin Fu and
                  Jaeyeon Jung},
  title        = {Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing
                  Code Sharing},
  booktitle    = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
                  USA, August 20-22, 2014},
  pages        = {433--447},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/backes},
  timestamp    = {Mon, 01 Feb 2021 08:43:04 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BackesN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BackesBGS14,
  author       = {Michael Backes and
                  Sven Bugiel and
                  Sebastian Gerling and
                  Philipp von Styp{-}Rekowsky},
  title        = {Android Security Framework: Enabling Generic and Extensible Access
                  Control on Android},
  journal      = {CoRR},
  volume       = {abs/1404.1395},
  year         = {2014},
  url          = {http://arxiv.org/abs/1404.1395},
  eprinttype    = {arXiv},
  eprint       = {1404.1395},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BackesBGS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BackesGK14,
  author       = {Michael Backes and
                  Niklas Grimm and
                  Aniket Kate},
  title        = {Lime: Data Lineage in the Malicious Environment},
  journal      = {CoRR},
  volume       = {abs/1408.1076},
  year         = {2014},
  url          = {http://arxiv.org/abs/1408.1076},
  eprinttype    = {arXiv},
  eprint       = {1408.1076},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BackesGK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GacekBCSW14,
  author       = {Andrew Gacek and
                  John Backes and
                  Darren D. Cofer and
                  Konrad Slind and
                  Mike Whalen},
  title        = {Resolute: An Assurance Case Language for Architecture Models},
  journal      = {CoRR},
  volume       = {abs/1409.4629},
  year         = {2014},
  url          = {http://arxiv.org/abs/1409.4629},
  eprinttype    = {arXiv},
  eprint       = {1409.4629},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GacekBCSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesDFGMS14,
  author       = {Michael Backes and
                  {\"{O}}zg{\"{u}}r Dagdelen and
                  Marc Fischlin and
                  Sebastian Gajek and
                  Sebastian Meiser and
                  Dominique Schr{\"{o}}der},
  title        = {Operational Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {820},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/820},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesDFGMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesFR14,
  author       = {Michael Backes and
                  Dario Fiore and
                  Raphael M. Reischuk},
  title        = {Nearly Practical and Privacy-Preserving Proofs on Authenticated Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {617},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/617},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesFR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesKMM14,
  author       = {Michael Backes and
                  Aniket Kate and
                  Sebastian Meiser and
                  Esfandiar Mohammadi},
  title        = {(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {621},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/621},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesKMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesKMMM14,
  author       = {Michael Backes and
                  Aniket Kate and
                  Praveen Manoharan and
                  Sebastian Meiser and
                  Esfandiar Mohammadi},
  title        = {AnoA: {A} Framework For Analyzing Anonymous Communication Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {87},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/087},
  timestamp    = {Fri, 13 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesKMMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bioinformatics/StockelMKGBRKKL13,
  author       = {Daniel St{\"{o}}ckel and
                  Oliver M{\"{u}}ller and
                  Tim Kehl and
                  Andreas Gerasch and
                  Christina Backes and
                  Alexander Rurainski and
                  Andreas Keller and
                  Michael Kaufmann and
                  Hans{-}Peter Lenhof},
  title        = {NetworkTrail - a web service for identifying and visualizing deregulated
                  subnetworks},
  journal      = {Bioinform.},
  volume       = {29},
  number       = {13},
  pages        = {1702--1703},
  year         = {2013},
  url          = {https://doi.org/10.1093/bioinformatics/btt204},
  doi          = {10.1093/BIOINFORMATICS/BTT204},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bioinformatics/StockelMKGBRKKL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sadm/ThielerBFR13,
  author       = {Anita Monika Thieler and
                  Michael Backes and
                  Roland Fried and
                  Wolfgang Rhode},
  title        = {Periodicity detection in irregularly sampled light curves by robust
                  regression and outlier detection},
  journal      = {Stat. Anal. Data Min.},
  volume       = {6},
  number       = {1},
  pages        = {73--89},
  year         = {2013},
  url          = {https://doi.org/10.1002/sam.11178},
  doi          = {10.1002/SAM.11178},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sadm/ThielerBFR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BackesFR13,
  author       = {Michael Backes and
                  Dario Fiore and
                  Raphael M. Reischuk},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Verifiable delegation of computation on outsourced data},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {863--874},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516681},
  doi          = {10.1145/2508859.2516681},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BackesFR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BackesKMMM13,
  author       = {Michael Backes and
                  Aniket Kate and
                  Praveen Manoharan and
                  Sebastian Meiser and
                  Esfandiar Mohammadi},
  title        = {AnoA: {A} Framework for Analyzing Anonymous Communication Protocols},
  booktitle    = {2013 {IEEE} 26th Computer Security Foundations Symposium, New Orleans,
                  LA, USA, June 26-28, 2013},
  pages        = {163--178},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CSF.2013.18},
  doi          = {10.1109/CSF.2013.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BackesKMMM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BackesDK13,
  author       = {Michael Backes and
                  Amit Datta and
                  Aniket Kate},
  editor       = {Ed Dawson},
  title        = {Asynchronous Computational {VSS} with Reduced Communication Complexity},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2013 - The Cryptographers' Track at
                  the {RSA} Conference 2013, San Francisco,CA, USA, February 25-March
                  1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7779},
  pages        = {259--276},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36095-4\_17},
  doi          = {10.1007/978-3-642-36095-4\_17},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BackesDK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BackesFM13,
  author       = {Michael Backes and
                  Dario Fiore and
                  Esfandiar Mohammadi},
  editor       = {Jason Crampton and
                  Sushil Jajodia and
                  Keith Mayes},
  title        = {Privacy-Preserving Accountable Computation},
  booktitle    = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
                  in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8134},
  pages        = {38--56},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40203-6\_3},
  doi          = {10.1007/978-3-642-40203-6\_3},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BackesFM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BackesGHMS13,
  author       = {Michael Backes and
                  Sebastian Gerling and
                  Christian Hammer and
                  Matteo Maffei and
                  Philipp von Styp{-}Rekowsky},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Georgios V. Lioudakis and
                  Nora Cuppens{-}Boulahia and
                  Simon N. Foley and
                  William M. Fitzgerald},
  title        = {AppGuard - Fine-Grained Policy Enforcement for Untrusted Android Applications},
  booktitle    = {Data Privacy Management and Autonomous Spontaneous Security - 8th
                  International Workshop, {DPM} 2013, and 6th International Workshop,
                  {SETOP} 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8247},
  pages        = {213--231},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-54568-9\_14},
  doi          = {10.1007/978-3-642-54568-9\_14},
  timestamp    = {Sun, 25 Oct 2020 22:34:56 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/BackesGHMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BackesM13,
  author       = {Michael Backes and
                  Sebastian Meiser},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Georgios V. Lioudakis and
                  Nora Cuppens{-}Boulahia and
                  Simon N. Foley and
                  William M. Fitzgerald},
  title        = {Differentially Private Smart Metering with Battery Recharging},
  booktitle    = {Data Privacy Management and Autonomous Spontaneous Security - 8th
                  International Workshop, {DPM} 2013, and 6th International Workshop,
                  {SETOP} 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8247},
  pages        = {194--212},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-54568-9\_13},
  doi          = {10.1007/978-3-642-54568-9\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BackesM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/Styp-RekowskyGBH13,
  author       = {Philipp von Styp{-}Rekowsky and
                  Sebastian Gerling and
                  Michael Backes and
                  Christian Hammer},
  editor       = {Jan J{\"{u}}rjens and
                  Benjamin Livshits and
                  Riccardo Scandariato},
  title        = {Idea: Callee-Site Rewriting of Sealed System Libraries},
  booktitle    = {Engineering Secure Software and Systems - 5th International Symposium,
                  ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7781},
  pages        = {33--41},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36563-8\_3},
  doi          = {10.1007/978-3-642-36563-8\_3},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/essos/Styp-RekowskyGBH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BackesDK13,
  author       = {Michael Backes and
                  Goran Doychev and
                  Boris K{\"{o}}pf},
  title        = {Preventing Side-Channel Leaks in Web Traffic: {A} Formal Approach},
  booktitle    = {20th Annual Network and Distributed System Security Symposium, {NDSS}
                  2013, San Diego, California, USA, February 24-27, 2013},
  publisher    = {The Internet Society},
  year         = {2013},
  url          = {https://www.ndss-symposium.org/ndss2013/preventing-side-channel-leaks-web-traffic-formal-approach},
  timestamp    = {Mon, 01 Feb 2021 08:42:13 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/BackesDK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/BackesBU13,
  author       = {Michael Backes and
                  Fabian Bendun and
                  Dominique Unruh},
  editor       = {David A. Basin and
                  John C. Mitchell},
  title        = {Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker
                  Assumptions and Mechanized Verification},
  booktitle    = {Principles of Security and Trust - Second International Conference,
                  {POST} 2013, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7796},
  pages        = {206--225},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36830-1\_11},
  doi          = {10.1007/978-3-642-36830-1\_11},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/BackesBU13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacas/BackesGHMS13,
  author       = {Michael Backes and
                  Sebastian Gerling and
                  Christian Hammer and
                  Matteo Maffei and
                  Philipp von Styp{-}Rekowsky},
  editor       = {Nir Piterman and
                  Scott A. Smolka},
  title        = {AppGuard - Enforcing User Requirements on Android Apps},
  booktitle    = {Tools and Algorithms for the Construction and Analysis of Systems
                  - 19th International Conference, {TACAS} 2013, Held as Part of the
                  European Joint Conferences on Theory and Practice of Software, {ETAPS}
                  2013, Rome, Italy, March 16-24, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7795},
  pages        = {543--548},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36742-7\_39},
  doi          = {10.1007/978-3-642-36742-7\_39},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/tacas/BackesGHMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/BackesGS13,
  author       = {Michael Backes and
                  Martin Gagn{\'{e}} and
                  Malte Skoruppa},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Sara Foresti},
  title        = {Using mobile device communication to strengthen e-Voting protocols},
  booktitle    = {Proceedings of the 12th annual {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2013, Berlin, Germany, November 4, 2013},
  pages        = {237--242},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517840.2517863},
  doi          = {10.1145/2517840.2517863},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/BackesGS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BackesCDKS13,
  author       = {Michael Backes and
                  Jeremy Clark and
                  Peter Druschel and
                  Aniket Kate and
                  Milivoj Simeonovski},
  title        = {Introducing Accountability to Anonymity Networks},
  journal      = {CoRR},
  volume       = {abs/1311.3151},
  year         = {2013},
  url          = {http://arxiv.org/abs/1311.3151},
  eprinttype    = {arXiv},
  eprint       = {1311.3151},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BackesCDKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesBCK13,
  author       = {Michael Backes and
                  Fabian Bendun and
                  Ashish Choudhury and
                  Aniket Kate},
  title        = {Asynchronous {MPC} with t{\textless}n/2 Using Non-equivocation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {745},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/745},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesBCK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesFR13,
  author       = {Michael Backes and
                  Dario Fiore and
                  Raphael M. Reischuk},
  title        = {Verifiable Delegation of Computation on Outsourced Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {469},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/469},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesFR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesKMR13,
  author       = {Michael Backes and
                  Aniket Kate and
                  Sebastian Meiser and
                  Tim Ruffing},
  title        = {Differential Indistinguishability for Cryptographic Primitives with
                  Imperfect Randomness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {808},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/808},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesKMR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesMM13,
  author       = {Michael Backes and
                  Praveen Manoharan and
                  Esfandiar Mohammadi},
  title        = {{TUC:} Time-sensitive and Modular Analysis of Anonymous Communication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {664},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/664},
  timestamp    = {Fri, 13 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesMM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesMS13,
  author       = {Michael Backes and
                  Sebastian Meiser and
                  Dominique Schr{\"{o}}der},
  title        = {Highly Controlled, Fine-grained Delegation of Signing Capabilities},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {408},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/408},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bmcbi/LacznyLHLBGKVKMSMLK12,
  author       = {Cedric Laczny and
                  Petra Leidinger and
                  Jan Haas and
                  Nicole Ludwig and
                  Christina Backes and
                  Andreas Gerasch and
                  Michael Kaufmann and
                  Britta Vogel and
                  Hugo A. Katus and
                  Benjamin Meder and
                  Cord St{\"{a}}hler and
                  Eckart Meese and
                  Hans{-}Peter Lenhof and
                  Andreas Keller},
  title        = {miRTrail - a comprehensive webserver for analyzing gene and miRNA
                  patterns to enhance the understanding of regulatory mechanisms in
                  diseases},
  journal      = {{BMC} Bioinform.},
  volume       = {13},
  pages        = {36},
  year         = {2012},
  url          = {https://doi.org/10.1186/1471-2105-13-36},
  doi          = {10.1186/1471-2105-13-36},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bmcbi/LacznyLHLBGKVKMSMLK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/MyersB12,
  author       = {Andrew C. Myers and
                  Michael Backes},
  title        = {Preface},
  journal      = {J. Comput. Secur.},
  volume       = {20},
  number       = {6},
  pages        = {635--636},
  year         = {2012},
  url          = {https://doi.org/10.3233/JCS-2012-0445},
  doi          = {10.3233/JCS-2012-0445},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/MyersB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BackesGKT12,
  author       = {Michael Backes and
                  Ian Goldberg and
                  Aniket Kate and
                  Tomas Toft},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Adding query privacy to robust DHTs},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {30--31},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414473},
  doi          = {10.1145/2414456.2414473},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BackesGKT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BackesMU12,
  author       = {Michael Backes and
                  Ankit Malik and
                  Dominique Unruh},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Computational soundness without protocol restrictions},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {699--711},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382270},
  doi          = {10.1145/2382196.2382270},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BackesMU12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BackesBBGKSB12,
  author       = {Michael Backes and
                  Gilles Barthe and
                  Matthias Berg and
                  Benjamin Gr{\'{e}}goire and
                  C{\'{e}}sar Kunz and
                  Malte Skoruppa and
                  Santiago Zanella B{\'{e}}guelin},
  editor       = {Stephen Chong},
  title        = {Verified Security of Merkle-Damg{\aa}rd},
  booktitle    = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge,
                  MA, USA, June 25-27, 2012},
  pages        = {354--368},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CSF.2012.14},
  doi          = {10.1109/CSF.2012.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BackesBBGKSB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BackesGKM12,
  author       = {Michael Backes and
                  Ian Goldberg and
                  Aniket Kate and
                  Esfandiar Mohammadi},
  editor       = {Stephen Chong},
  title        = {Provably Secure and Practical Onion Routing},
  booktitle    = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge,
                  MA, USA, June 25-27, 2012},
  pages        = {369--385},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CSF.2012.32},
  doi          = {10.1109/CSF.2012.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BackesGKM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gfkl/VoigtF0R12,
  author       = {Tobias Voigt and
                  Roland Fried and
                  Michael Backes and
                  Wolfgang Rhode},
  editor       = {Myra Spiliopoulou and
                  Lars Schmidt{-}Thieme and
                  Ruth Janning},
  title        = {Gamma-Hadron-Separation in the {MAGIC} Experiment},
  booktitle    = {Data Analysis, Machine Learning and Knowledge Discovery - Proceedings
                  of the 36th Annual Conference of the Gesellschaft f{\"{u}}r Klassifikation
                  e. V., Hildesheim, Germany, August 2012},
  series       = {Studies in Classification, Data Analysis, and Knowledge Organization},
  pages        = {115--124},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-319-01595-8\_13},
  doi          = {10.1007/978-3-319-01595-8\_13},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gfkl/VoigtF0R12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isvc/MainbergerSBWB12,
  author       = {Markus Mainberger and
                  Christian Schmaltz and
                  Matthias Berg and
                  Joachim Weickert and
                  Michael Backes},
  editor       = {George Bebis and
                  Richard Boyle and
                  Bahram Parvin and
                  Darko Koracin and
                  Charless C. Fowlkes and
                  Sen Wang and
                  Min{-}Hyung Choi and
                  Stephan Mantler and
                  J{\"{u}}rgen P. Schulze and
                  Daniel Acevedo and
                  Klaus Mueller and
                  Michael E. Papka},
  title        = {Diffusion-Based Image Compression in Steganography},
  booktitle    = {Advances in Visual Computing - 8th International Symposium, {ISVC}
                  2012, Rethymnon, Crete, Greece, July 16-18, 2012, Revised Selected
                  Papers, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7432},
  pages        = {219--228},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33191-6\_22},
  doi          = {10.1007/978-3-642-33191-6\_22},
  timestamp    = {Fri, 04 Nov 2022 09:06:17 +0100},
  biburl       = {https://dblp.org/rec/conf/isvc/MainbergerSBWB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BackesMP12,
  author       = {Michael Backes and
                  Matteo Maffei and
                  Kim Pecina},
  title        = {Automated Synthesis of Secure Distributed Applications},
  booktitle    = {19th Annual Network and Distributed System Security Symposium, {NDSS}
                  2012, San Diego, California, USA, February 5-8, 2012},
  publisher    = {The Internet Society},
  year         = {2012},
  url          = {https://www.ndss-symposium.org/ndss2012/automated-synthesis-secure-distributed-applications},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/BackesMP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nfm/BackesBH12,
  author       = {Michael Backes and
                  Alex Busenius and
                  Catalin Hritcu},
  editor       = {Alwyn Goodloe and
                  Suzette Person},
  title        = {On the Development and Formalization of an Extensible Code Generator
                  for Real Life Security Protocols},
  booktitle    = {{NASA} Formal Methods - 4th International Symposium, {NFM} 2012, Norfolk,
                  VA, USA, April 3-5, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7226},
  pages        = {371--387},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28891-3\_34},
  doi          = {10.1007/978-3-642-28891-3\_34},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/nfm/BackesBH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/BackesBK12,
  author       = {Michael Backes and
                  Fabian Bendun and
                  Aniket Kate},
  editor       = {Darek Kowalski and
                  Alessandro Panconesi},
  title        = {Brief announcement: distributed cryptography using trinc},
  booktitle    = {{ACM} Symposium on Principles of Distributed Computing, {PODC} '12,
                  Funchal, Madeira, Portugal, July 16-18, 2012},
  pages        = {91--92},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2332432.2332448},
  doi          = {10.1145/2332432.2332448},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/BackesBK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BackesKMP12,
  author       = {Michael Backes and
                  Aniket Kate and
                  Matteo Maffei and
                  Kim Pecina},
  title        = {ObliviAd: Provably Secure and Practical Online Behavioral Advertising},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012,
                  San Francisco, California, {USA}},
  pages        = {257--271},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SP.2012.25},
  doi          = {10.1109/SP.2012.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/BackesKMP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/BackesKM12,
  author       = {Michael Backes and
                  Aniket Kate and
                  Esfandiar Mohammadi},
  editor       = {Ting Yu and
                  Nikita Borisov},
  title        = {Ace: an efficient key-exchange protocol for onion routing},
  booktitle    = {Proceedings of the 11th annual {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2012, Raleigh, NC, USA, October 15, 2012},
  pages        = {55--64},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381966.2381974},
  doi          = {10.1145/2381966.2381974},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/BackesKM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/ReischukBG12,
  author       = {Raphael M. Reischuk and
                  Michael Backes and
                  Johannes Gehrke},
  editor       = {Alain Mille and
                  Fabien Gandon and
                  Jacques Misselis and
                  Michael Rabinovich and
                  Steffen Staab},
  title        = {{SAFE} extensibility of data-driven web applications},
  booktitle    = {Proceedings of the 21st World Wide Web Conference 2012, {WWW} 2012,
                  Lyon, France, April 16-20, 2012},
  pages        = {799--808},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2187836.2187944},
  doi          = {10.1145/2187836.2187944},
  timestamp    = {Fri, 16 Apr 2021 10:04:12 +0200},
  biburl       = {https://dblp.org/rec/conf/www/ReischukBG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesBU12,
  author       = {Michael Backes and
                  Fabian Bendun and
                  Dominique Unruh},
  title        = {Computational Soundness of Symbolic Zero-knowledge Proofs: Weaker
                  Assumptions and Mechanized Verification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {81},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/081},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesBU12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesDK12,
  author       = {Michael Backes and
                  Amit Datta and
                  Aniket Kate},
  title        = {Asynchronous Computational {VSS} with Reduced Communication Complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {619},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/619},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesDK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesM12,
  author       = {Michael Backes and
                  Sebastian Meiser},
  title        = {Differentially Private Smart Metering with Battery Recharging},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {183},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/183},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesMU12,
  author       = {Michael Backes and
                  Ankit Malik and
                  Dominique Unruh},
  title        = {Computational Soundness without Protocol Restrictions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {486},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/486},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesMU12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BackesCJST11,
  author       = {Michael Backes and
                  Iliano Cervesato and
                  Aaron D. Jaggard and
                  Andre Scedrov and
                  Joe{-}Kai Tsay},
  title        = {Cryptographically sound security proofs for basic and public-key Kerberos},
  journal      = {Int. J. Inf. Sec.},
  volume       = {10},
  number       = {2},
  pages        = {107--134},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10207-011-0125-6},
  doi          = {10.1007/S10207-011-0125-6},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BackesCJST11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BackesKP11,
  author       = {Michael Backes and
                  Aniket Kate and
                  Arpita Patra},
  editor       = {Dong Hoon Lee and
                  Xiaoyun Wang},
  title        = {Computational Verifiable Secret Sharing Revisited},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Seoul, South Korea, December 4-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7073},
  pages        = {590--609},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25385-0\_32},
  doi          = {10.1007/978-3-642-25385-0\_32},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BackesKP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BackesBK11,
  author       = {Michael Backes and
                  Matthias Berg and
                  Boris K{\"{o}}pf},
  editor       = {Bruce S. N. Cheung and
                  Lucas Chi Kwong Hui and
                  Ravi S. Sandhu and
                  Duncan S. Wong},
  title        = {Non-uniform distributions in quantitative information-flow},
  booktitle    = {Proceedings of the 6th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24,
                  2011},
  pages        = {367--375},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1966913.1966960},
  doi          = {10.1145/1966913.1966960},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BackesBK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cpp/BackesHT11,
  author       = {Michael Backes and
                  Catalin Hritcu and
                  Thorsten Tarrach},
  editor       = {Jean{-}Pierre Jouannaud and
                  Zhong Shao},
  title        = {Automatically Verifying Typing Constraints for a Data Processing Language},
  booktitle    = {Certified Programs and Proofs - First International Conference, {CPP}
                  2011, Kenting, Taiwan, December 7-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7086},
  pages        = {296--313},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25379-9\_22},
  doi          = {10.1007/978-3-642-25379-9\_22},
  timestamp    = {Thu, 14 Oct 2021 10:14:33 +0200},
  biburl       = {https://dblp.org/rec/conf/cpp/BackesHT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BackesMP11,
  author       = {Michael Backes and
                  Matteo Maffei and
                  Kim Pecina},
  title        = {A Security {API} for Distributed Social Networks},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2011, San Diego, California, USA, 6th February - 9th February
                  2011},
  publisher    = {The Internet Society},
  year         = {2011},
  url          = {https://www.ndss-symposium.org/ndss2011/security-api-distributed-social-networks-paper},
  timestamp    = {Mon, 01 Feb 2021 08:42:10 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/BackesMP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/BackesMP11,
  author       = {Michael Backes and
                  Matteo Maffei and
                  Kim Pecina},
  editor       = {Cyril Gavoille and
                  Pierre Fraigniaud},
  title        = {Securing social networks},
  booktitle    = {Proceedings of the 30th Annual {ACM} Symposium on Principles of Distributed
                  Computing, {PODC} 2011, San Jose, CA, USA, June 6-8, 2011},
  pages        = {341--342},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1993806.1993874},
  doi          = {10.1145/1993806.1993874},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/BackesMP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tosca/BackesHM11,
  author       = {Michael Backes and
                  Catalin Hritcu and
                  Matteo Maffei},
  editor       = {Sebastian M{\"{o}}dersheim and
                  Catuscia Palamidessi},
  title        = {Union and Intersection Types for Secure Protocol Implementations},
  booktitle    = {Theory of Security and Applications - Joint Workshop, {TOSCA} 2011,
                  Saarbr{\"{u}}cken, Germany, March 31 - April 1, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6993},
  pages        = {1--28},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27375-9\_1},
  doi          = {10.1007/978-3-642-27375-9\_1},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/tosca/BackesHM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tosca/BackesMPR11,
  author       = {Michael Backes and
                  Matteo Maffei and
                  Kim Pecina and
                  Raphael M. Reischuk},
  editor       = {Sebastian M{\"{o}}dersheim and
                  Catuscia Palamidessi},
  title        = {{G2C:} Cryptographic Protocols from Goal-Driven Specifications},
  booktitle    = {Theory of Security and Applications - Joint Workshop, {TOSCA} 2011,
                  Saarbr{\"{u}}cken, Germany, March 31 - April 1, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6993},
  pages        = {57--77},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27375-9\_4},
  doi          = {10.1007/978-3-642-27375-9\_4},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tosca/BackesMPR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1106-4184,
  author       = {Michael Backes and
                  Sebastian Gerling and
                  Philipp von Styp{-}Rekowsky},
  title        = {A Novel Attack against Android Phones},
  journal      = {CoRR},
  volume       = {abs/1106.4184},
  year         = {2011},
  url          = {http://arxiv.org/abs/1106.4184},
  eprinttype    = {arXiv},
  eprint       = {1106.4184},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1106-4184.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1107-1072,
  author       = {Michael Backes and
                  Ian Goldberg and
                  Aniket Kate and
                  Tomas Toft},
  title        = {Adding Query Privacy to Robust DHTs},
  journal      = {CoRR},
  volume       = {abs/1107.1072},
  year         = {2011},
  url          = {http://arxiv.org/abs/1107.1072},
  eprinttype    = {arXiv},
  eprint       = {1107.1072},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1107-1072.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1112-2649,
  author       = {Julian Backes and
                  Michael Backes and
                  Markus D{\"{u}}rmuth and
                  Sebastian Gerling and
                  Stefan Lorenz},
  title        = {X-pire! - {A} digital expiration date for images in social networks},
  journal      = {CoRR},
  volume       = {abs/1112.2649},
  year         = {2011},
  url          = {http://arxiv.org/abs/1112.2649},
  eprinttype    = {arXiv},
  eprint       = {1112.2649},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1112-2649.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesGKM11,
  author       = {Michael Backes and
                  Ian Goldberg and
                  Aniket Kate and
                  Esfandiar Mohammadi},
  title        = {Provably Secure and Practical Onion Routing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {308},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/308},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesGKM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesKP11,
  author       = {Michael Backes and
                  Aniket Kate and
                  Arpita Patra},
  title        = {Computational Verifiable Secret Sharing Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {281},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/281},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesKP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BackesU10,
  author       = {Michael Backes and
                  Dominique Unruh},
  title        = {Computational soundness of symbolic zero-knowledge proofs},
  journal      = {J. Comput. Secur.},
  volume       = {18},
  number       = {6},
  pages        = {1077--1155},
  year         = {2010},
  url          = {https://doi.org/10.3233/JCS-2009-0392},
  doi          = {10.3233/JCS-2009-0392},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BackesU10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BackesMU10,
  author       = {Michael Backes and
                  Matteo Maffei and
                  Dominique Unruh},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {Computationally sound verification of source code},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {387--398},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866351},
  doi          = {10.1145/1866307.1866351},
  timestamp    = {Tue, 10 Nov 2020 20:00:21 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BackesMU10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BackesCK10,
  author       = {Michael Backes and
                  Oana Ciobotaru and
                  Anton Krohmer},
  editor       = {Dimitris Gritzalis and
                  Bart Preneel and
                  Marianthi Theoharidou},
  title        = {RatFish: {A} File Sharing Protocol Provably Secure against Rational
                  Users},
  booktitle    = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
                  in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6345},
  pages        = {607--625},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15497-3\_37},
  doi          = {10.1007/978-3-642-15497-3\_37},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BackesCK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BackesDDK10,
  author       = {Michael Backes and
                  Goran Doychev and
                  Markus D{\"{u}}rmuth and
                  Boris K{\"{o}}pf},
  editor       = {Dimitris Gritzalis and
                  Bart Preneel and
                  Marianthi Theoharidou},
  title        = {Speaker Recognition in Encrypted Voice Streams},
  booktitle    = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
                  in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6345},
  pages        = {508--523},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15497-3\_31},
  doi          = {10.1007/978-3-642-15497-3\_31},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/BackesDDK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/BackesMM10,
  author       = {Michael Backes and
                  Matteo Maffei and
                  Esfandiar Mohammadi},
  editor       = {Kamal Lodaya and
                  Meena Mahajan},
  title        = {Computationally Sound Abstraction and Verification of Secure Multi-Party
                  Computations},
  booktitle    = {{IARCS} Annual Conference on Foundations of Software Technology and
                  Theoretical Computer Science, {FSTTCS} 2010, December 15-18, 2010,
                  Chennai, India},
  series       = {LIPIcs},
  volume       = {8},
  pages        = {352--363},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2010},
  url          = {https://doi.org/10.4230/LIPIcs.FSTTCS.2010.352},
  doi          = {10.4230/LIPICS.FSTTCS.2010.352},
  timestamp    = {Tue, 11 Feb 2020 15:52:14 +0100},
  biburl       = {https://dblp.org/rec/conf/fsttcs/BackesMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/BackesLMP10,
  author       = {Michael Backes and
                  Stefan Lorenz and
                  Matteo Maffei and
                  Kim Pecina},
  editor       = {Mikhail J. Atallah and
                  Nicholas J. Hopper},
  title        = {Anonymous Webs of Trust},
  booktitle    = {Privacy Enhancing Technologies, 10th International Symposium, {PETS}
                  2010, Berlin, Germany, July 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6205},
  pages        = {130--148},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14527-8\_8},
  doi          = {10.1007/978-3-642-14527-8\_8},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/BackesLMP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/BackesLMP10,
  author       = {Michael Backes and
                  Stefan Lorenz and
                  Matteo Maffei and
                  Kim Pecina},
  editor       = {Andr{\'{e}}a W. Richa and
                  Rachid Guerraoui},
  title        = {Brief announcement: anonymity and trust in distributed systems},
  booktitle    = {Proceedings of the 29th Annual {ACM} Symposium on Principles of Distributed
                  Computing, {PODC} 2010, Zurich, Switzerland, July 25-28, 2010},
  pages        = {237--238},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1835698.1835753},
  doi          = {10.1145/1835698.1835753},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/BackesLMP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BackesDGPS10,
  author       = {Michael Backes and
                  Markus D{\"{u}}rmuth and
                  Sebastian Gerling and
                  Manfred Pinkal and
                  Caroline Sporleder},
  title        = {Acoustic Side-Channel Attacks on Printers},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {307--322},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Backes.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BackesDGPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesMU10,
  author       = {Michael Backes and
                  Matteo Maffei and
                  Dominique Unruh},
  title        = {Computationally Sound Verification of Source Code},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {416},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/416},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesMU10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bioinformatics/KellerBGKKML09,
  author       = {Andreas Keller and
                  Christina Backes and
                  Andreas Gerasch and
                  Michael Kaufmann and
                  Oliver Kohlbacher and
                  Eckart Meese and
                  Hans{-}Peter Lenhof},
  title        = {A novel algorithm for detecting differentially regulated paths based
                  on gene set enrichment analysis},
  journal      = {Bioinform.},
  volume       = {25},
  number       = {21},
  pages        = {2787--2794},
  year         = {2009},
  url          = {https://doi.org/10.1093/bioinformatics/btp510},
  doi          = {10.1093/BIOINFORMATICS/BTP510},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bioinformatics/KellerBGKKML09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BackesHU09,
  author       = {Michael Backes and
                  Dennis Hofheinz and
                  Dominique Unruh},
  editor       = {Ehab Al{-}Shaer and
                  Somesh Jha and
                  Angelos D. Keromytis},
  title        = {CoSP: a general framework for computational soundness proofs},
  booktitle    = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages        = {66--78},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1653662.1653672},
  doi          = {10.1145/1653662.1653672},
  timestamp    = {Tue, 10 Nov 2020 19:58:07 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BackesHU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BackesGHM09,
  author       = {Michael Backes and
                  Martin P. Grochulla and
                  Catalin Hritcu and
                  Matteo Maffei},
  title        = {Achieving Security Despite Compromise Using Zero-knowledge},
  booktitle    = {Proceedings of the 22nd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2009, Port Jefferson, New York, USA, July 8-10, 2009},
  pages        = {308--323},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CSF.2009.24},
  doi          = {10.1109/CSF.2009.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BackesGHM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BackesDHU09,
  author       = {Michael Backes and
                  Peter Druschel and
                  Andreas Haeberlen and
                  Dominique Unruh},
  title        = {{CSAR:} {A} Practical and Provable Technique to Make Randomized Systems
                  Accountable},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2009, San Diego, California, USA, 8th February - 11th February
                  2009},
  publisher    = {The Internet Society},
  year         = {2009},
  url          = {https://www.ndss-symposium.org/ndss2009/csar-practical-and-provable-technique-make-randomized-systems-accountable/},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/BackesDHU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/BackesHLMTW09,
  author       = {Michael Backes and
                  Marek Hamerlik and
                  Alessandro Linari and
                  Matteo Maffei and
                  Christos Tryfonopoulos and
                  Gerhard Weikum},
  editor       = {Robert Meersman and
                  Tharam S. Dillon and
                  Pilar Herrero},
  title        = {Anonymity and Censorship Resistance in Unstructured Overlay Networks},
  booktitle    = {On the Move to Meaningful Internet Systems: {OTM} 2009, Confederated
                  International Conferences, CoopIS, DOA, IS, and {ODBASE} 2009, Vilamoura,
                  Portugal, November 1-6, 2009, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5870},
  pages        = {147--164},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05148-7\_12},
  doi          = {10.1007/978-3-642-05148-7\_12},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/otm/BackesHLMTW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BackesCDLW09,
  author       = {Michael Backes and
                  Tongbo Chen and
                  Markus D{\"{u}}rmuth and
                  Hendrik P. A. Lensch and
                  Martin Welk},
  title        = {Tempest in a Teapot: Compromising Reflections Revisited},
  booktitle    = {30th {IEEE} Symposium on Security and Privacy {(SP} 2009), 17-20 May
                  2009, Oakland, California, {USA}},
  pages        = {315--327},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SP.2009.20},
  doi          = {10.1109/SP.2009.20},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BackesCDLW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BackesKR09,
  author       = {Michael Backes and
                  Boris K{\"{o}}pf and
                  Andrey Rybalchenko},
  title        = {Automatic Discovery and Quantification of Information Leaks},
  booktitle    = {30th {IEEE} Symposium on Security and Privacy {(SP} 2009), 17-20 May
                  2009, Oakland, California, {USA}},
  pages        = {141--153},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SP.2009.18},
  doi          = {10.1109/SP.2009.18},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BackesKR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Backes09,
  author       = {Michael Backes},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Design and Verification of Anonymous Trust Protocols},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {149--156},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_18},
  doi          = {10.1007/978-3-642-36213-2\_18},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Backes09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BackesM09,
  author       = {Michael Backes and
                  Matteo Maffei},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Design and Verification of Anonymous Trust Protocols},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {143--148},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_17},
  doi          = {10.1007/978-3-642-36213-2\_17},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BackesM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2009,
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1},
  doi          = {10.1007/978-3-642-04444-1},
  isbn         = {978-3-642-04443-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesHU09,
  author       = {Michael Backes and
                  Dennis Hofheinz and
                  Dominique Unruh},
  title        = {CoSP: {A} General Framework For Computational Soundness Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {80},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/080},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesHU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bmcbi/KellerBAGKKKL08,
  author       = {Andreas Keller and
                  Christina Backes and
                  Maher Al{-}Awadhi and
                  Andreas Gerasch and
                  Jan K{\"{u}}ntzer and
                  Oliver Kohlbacher and
                  Michael Kaufmann and
                  Hans{-}Peter Lenhof},
  title        = {GeneTrailExpress: a web-based pipeline for the statistical evaluation
                  of microarray experiments},
  journal      = {{BMC} Bioinform.},
  volume       = {9},
  year         = {2008},
  url          = {https://doi.org/10.1186/1471-2105-9-552},
  doi          = {10.1186/1471-2105-9-552},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bmcbi/KellerBAGKKKL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BackesDHK08,
  author       = {Michael Backes and
                  Markus D{\"{u}}rmuth and
                  Dennis Hofheinz and
                  Ralf K{\"{u}}sters},
  title        = {Conditional reactive simulatability},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {2},
  pages        = {155--169},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-007-0046-6},
  doi          = {10.1007/S10207-007-0046-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BackesDHK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BackesP08,
  author       = {Michael Backes and
                  Birgit Pfitzmann},
  title        = {Limits of the {BRSIM/UC} soundness of Dolev-Yao-style {XOR}},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {1},
  pages        = {33--54},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-007-0040-z},
  doi          = {10.1007/S10207-007-0040-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BackesP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BackesPS08,
  author       = {Michael Backes and
                  Birgit Pfitzmann and
                  Andre Scedrov},
  title        = {Key-dependent message security under active attacks - BRSIM/UC-soundness
                  of Dolev-Yao-style encryption with key cycles},
  journal      = {J. Comput. Secur.},
  volume       = {16},
  number       = {5},
  pages        = {497--530},
  year         = {2008},
  url          = {https://doi.org/10.3233/JCS-2008-0332},
  doi          = {10.3233/JCS-2008-0332},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BackesPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BackesDU08,
  author       = {Michael Backes and
                  Markus D{\"{u}}rmuth and
                  Dominique Unruh},
  editor       = {Josef Pieprzyk},
  title        = {{OAEP} Is Secure under Key-Dependent Messages},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Melbourne, Australia, December 7-11, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5350},
  pages        = {506--523},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89255-7\_31},
  doi          = {10.1007/978-3-540-89255-7\_31},
  timestamp    = {Sun, 02 Jun 2019 21:16:53 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BackesDU08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BackesU08,
  author       = {Michael Backes and
                  Dominique Unruh},
  editor       = {Josef Pieprzyk},
  title        = {Limits of Constructive Security Proofs},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Melbourne, Australia, December 7-11, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5350},
  pages        = {290--307},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89255-7\_18},
  doi          = {10.1007/978-3-540-89255-7\_18},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BackesU08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/BackesLMP08,
  author       = {Michael Backes and
                  Stefan Lorenz and
                  Matteo Maffei and
                  Kim Pecina},
  editor       = {Aarti Gupta and
                  Sharad Malik},
  title        = {The {CASPA} Tool: Causality-Based Abstraction for Security Protocol
                  Analysis},
  booktitle    = {Computer Aided Verification, 20th International Conference, {CAV}
                  2008, Princeton, NJ, USA, July 7-14, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5123},
  pages        = {419--422},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70545-1\_39},
  doi          = {10.1007/978-3-540-70545-1\_39},
  timestamp    = {Sat, 30 Sep 2023 09:35:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/BackesLMP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BackesHM08,
  author       = {Michael Backes and
                  Catalin Hritcu and
                  Matteo Maffei},
  editor       = {Peng Ning and
                  Paul F. Syverson and
                  Somesh Jha},
  title        = {Type-checking zero-knowledge},
  booktitle    = {Proceedings of the 2008 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  pages        = {357--370},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455770.1455816},
  doi          = {10.1145/1455770.1455816},
  timestamp    = {Tue, 10 Nov 2020 19:59:27 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BackesHM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BackesHM08,
  author       = {Michael Backes and
                  Catalin Hritcu and
                  Matteo Maffei},
  title        = {Automated Verification of Remote Electronic Voting Protocols in the
                  Applied Pi-Calculus},
  booktitle    = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008},
  pages        = {195--209},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSF.2008.26},
  doi          = {10.1109/CSF.2008.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BackesHM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BackesU08,
  author       = {Michael Backes and
                  Dominique Unruh},
  title        = {Computational Soundness of Symbolic Zero-Knowledge Proofs Against
                  Active Attackers},
  booktitle    = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008},
  pages        = {255--269},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSF.2008.20},
  doi          = {10.1109/CSF.2008.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BackesU08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BackesK08,
  author       = {Michael Backes and
                  Boris K{\"{o}}pf},
  editor       = {Sushil Jajodia and
                  Javier L{\'{o}}pez},
  title        = {Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks},
  booktitle    = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research
                  in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5283},
  pages        = {517--532},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88313-5\_33},
  doi          = {10.1007/978-3-540-88313-5\_33},
  timestamp    = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BackesK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lpar/BackesBU08,
  author       = {Michael Backes and
                  Matthias Berg and
                  Dominique Unruh},
  editor       = {Iliano Cervesato and
                  Helmut Veith and
                  Andrei Voronkov},
  title        = {A Formal Language for Cryptographic Pseudocode},
  booktitle    = {Logic for Programming, Artificial Intelligence, and Reasoning, 15th
                  International Conference, {LPAR} 2008, Doha, Qatar, November 22-27,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5330},
  pages        = {353--376},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89439-1\_26},
  doi          = {10.1007/978-3-540-89439-1\_26},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/lpar/BackesBU08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/BackesHLMTW08,
  author       = {Michael Backes and
                  Marek Hamerlik and
                  Alessandro Linari and
                  Matteo Maffei and
                  Christos Tryfonopoulos and
                  Gerhard Weikum},
  editor       = {Rida A. Bazzi and
                  Boaz Patt{-}Shamir},
  title        = {Anonymous and censorship resistant content sharing in unstructured
                  overlays},
  booktitle    = {Proceedings of the Twenty-Seventh Annual {ACM} Symposium on Principles
                  of Distributed Computing, {PODC} 2008, Toronto, Canada, August 18-21,
                  2008},
  pages        = {429},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1400751.1400822},
  doi          = {10.1145/1400751.1400822},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/BackesHLMTW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BackesDU08,
  author       = {Michael Backes and
                  Markus D{\"{u}}rmuth and
                  Dominique Unruh},
  title        = {Compromising Reflections-or-How to Read {LCD} Monitors around the
                  Corner},
  booktitle    = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May
                  2008, Oakland, California, {USA}},
  pages        = {158--169},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SP.2008.25},
  doi          = {10.1109/SP.2008.25},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BackesDU08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BackesMU08,
  author       = {Michael Backes and
                  Matteo Maffei and
                  Dominique Unruh},
  title        = {Zero-Knowledge in the Applied Pi-calculus and Automated Verification
                  of the Direct Anonymous Attestation Protocol},
  booktitle    = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May
                  2008, Oakland, California, {USA}},
  pages        = {202--215},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SP.2008.23},
  doi          = {10.1109/SP.2008.23},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BackesMU08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesK08,
  author       = {Michael Backes and
                  Boris K{\"{o}}pf},
  title        = {Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {162},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/162},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesU08,
  author       = {Michael Backes and
                  Dominique Unruh},
  title        = {Computational soundness of symbolic zero-knowledge proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {152},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/152},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesU08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bmcbi/KuntzerBBGKKL07,
  author       = {Jan K{\"{u}}ntzer and
                  Christina Backes and
                  Torsten Blum and
                  Andreas Gerasch and
                  Michael Kaufmann and
                  Oliver Kohlbacher and
                  Hans{-}Peter Lenhof},
  title        = {{BNDB} - The Biochemical Network Database},
  journal      = {{BMC} Bioinform.},
  volume       = {8},
  year         = {2007},
  url          = {https://doi.org/10.1186/1471-2105-8-367},
  doi          = {10.1186/1471-2105-8-367},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bmcbi/KuntzerBBGKKL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/BackesPW07,
  author       = {Michael Backes and
                  Birgit Pfitzmann and
                  Michael Waidner},
  title        = {The reactive simulatability {(RSIM)} framework for asynchronous systems},
  journal      = {Inf. Comput.},
  volume       = {205},
  number       = {12},
  pages        = {1685--1720},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.ic.2007.05.002},
  doi          = {10.1016/J.IC.2007.05.002},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/BackesPW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BackesGP07,
  author       = {Michael Backes and
                  Stefanos Gritzalis and
                  Bart Preneel},
  title        = {Preface},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {6},
  pages        = {359--360},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-007-0034-x},
  doi          = {10.1007/S10207-007-0034-X},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BackesGP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BackesBW07,
  author       = {Michael Backes and
                  David A. Basin and
                  Michael Waidner},
  title        = {Preface},
  journal      = {J. Comput. Secur.},
  volume       = {15},
  number       = {6},
  pages        = {561},
  year         = {2007},
  url          = {https://doi.org/10.3233/jcs-2007-15601},
  doi          = {10.3233/JCS-2007-15601},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BackesBW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BackesCFM07,
  author       = {Michael Backes and
                  Agostino Cortesi and
                  Riccardo Focardi and
                  Matteo Maffei},
  editor       = {Peng Ning and
                  Vijay Atluri and
                  Virgil D. Gligor and
                  Heiko Mantel},
  title        = {A calculus of challenges and responses},
  booktitle    = {Proceedings of the 2007 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2007, Fairfax, VA, USA, November 2, 2007},
  pages        = {51--60},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314436.1314444},
  doi          = {10.1145/1314436.1314444},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BackesCFM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BackesCM07,
  author       = {Michael Backes and
                  Agostino Cortesi and
                  Matteo Maffei},
  title        = {Causality-based Abstraction of Multiplicity in Security Protocols},
  booktitle    = {20th {IEEE} Computer Security Foundations Symposium, {CSF} 2007, 6-8
                  July 2007, Venice, Italy},
  pages        = {355--369},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/CSF.2007.11},
  doi          = {10.1109/CSF.2007.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BackesCM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BackesPS07,
  author       = {Michael Backes and
                  Birgit Pfitzmann and
                  Andre Scedrov},
  title        = {Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness
                  of Symbolic Encryption with Key Cycles},
  booktitle    = {20th {IEEE} Computer Security Foundations Symposium, {CSF} 2007, 6-8
                  July 2007, Venice, Italy},
  pages        = {112--124},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/CSF.2007.23},
  doi          = {10.1109/CSF.2007.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BackesPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/BackesDK07,
  author       = {Michael Backes and
                  Markus D{\"{u}}rmuth and
                  Ralf K{\"{u}}sters},
  editor       = {Vikraman Arvind and
                  Sanjiva Prasad},
  title        = {On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography},
  booktitle    = {{FSTTCS} 2007: Foundations of Software Technology and Theoretical
                  Computer Science, 27th International Conference, New Delhi, India,
                  December 12-14, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4855},
  pages        = {108--120},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77050-3\_9},
  doi          = {10.1007/978-3-540-77050-3\_9},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/fsttcs/BackesDK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BackesDU07,
  author       = {Michael Backes and
                  Markus D{\"{u}}rmuth and
                  Dominique Unruh},
  title        = {Information Flow in the Peer-Reviewing Process},
  booktitle    = {2007 {IEEE} Symposium on Security and Privacy (S{\&}P 2007), 20-23
                  May 2007, Oakland, California, {USA}},
  pages        = {187--191},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SP.2007.24},
  doi          = {10.1109/SP.2007.24},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BackesDU07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BackesMU07,
  author       = {Michael Backes and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Dominique Unruh},
  editor       = {Salil P. Vadhan},
  title        = {On the Necessity of Rewinding in Secure Multiparty Computation},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {157--173},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_9},
  doi          = {10.1007/978-3-540-70936-7\_9},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BackesMU07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secco/2005,
  editor       = {Michael Backes and
                  Andre Scedrov},
  title        = {Proceedings of the International Workshop on Security and Concurrency,
                  SecCo@CONCUR 2005, San Francisco, CA, USA, August 22, 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {180},
  number       = {1},
  publisher    = {Elsevier},
  year         = {2007},
  url          = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/180/issue/1},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secco/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/BackesMU07,
  author       = {Michael Backes and
                  Matteo Maffei and
                  Dominique Unruh},
  editor       = {Liqun Chen and
                  Steve Kremer and
                  Mark Dermot Ryan},
  title        = {Zero-Knowledge in the Applied Pi-calculus and Automated Verification
                  of the Direct Anonymous Attestation Protocol},
  booktitle    = {Formal Protocol Verification Applied, 14.10. - 19.10.2007},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {07421},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2007},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2008/1415},
  timestamp    = {Sun, 22 Jan 2023 01:36:25 +0100},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/BackesMU07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesDK07,
  author       = {Michael Backes and
                  Markus D{\"{u}}rmuth and
                  Ralf K{\"{u}}sters},
  title        = {On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {233},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/233},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesDK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesMU07,
  author       = {Michael Backes and
                  Matteo Maffei and
                  Dominique Unruh},
  title        = {Zero-Knowledge in the Applied Pi-calculus and Automated Verification
                  of the Direct Anonymous Attestation Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {289},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/289},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesMU07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesU07,
  author       = {Michael Backes and
                  Dominique Unruh},
  title        = {On the Security of Protocols with Logarithmic Communication Complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {169},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/169},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesU07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jib/KuntzerBGBHKKL06,
  author       = {Jan K{\"{u}}ntzer and
                  Torsten Blum and
                  Andreas Gerasch and
                  Christina Backes and
                  Andreas Hildebrandt and
                  Michael Kaufmann and
                  Oliver Kohlbacher and
                  Hans{-}Peter Lenhof},
  title        = {{BN++} - {A} Biological Information System},
  journal      = {J. Integr. Bioinform.},
  volume       = {3},
  number       = {2},
  year         = {2006},
  url          = {https://doi.org/10.2390/biecoll-jib-2006-34},
  doi          = {10.2390/BIECOLL-JIB-2006-34},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jib/KuntzerBGBHKKL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/BackesDDMT06,
  author       = {Michael Backes and
                  Anupam Datta and
                  Ante Derek and
                  John C. Mitchell and
                  Mathieu Turuani},
  title        = {Compositional analysis of contract-signing protocols},
  journal      = {Theor. Comput. Sci.},
  volume       = {367},
  number       = {1-2},
  pages        = {33--56},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.tcs.2006.08.039},
  doi          = {10.1016/J.TCS.2006.08.039},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/BackesDDMT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BackesL06,
  author       = {Michael Backes and
                  Peeter Laud},
  editor       = {Ari Juels and
                  Rebecca N. Wright and
                  Sabrina De Capitani di Vimercati},
  title        = {Computationally sound secrecy proofs by mechanized flow analysis},
  booktitle    = {Proceedings of the 13th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3,
                  2006},
  pages        = {370--379},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180405.1180450},
  doi          = {10.1145/1180405.1180450},
  timestamp    = {Wed, 24 Feb 2021 17:28:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BackesL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/SprengerBBPW06,
  author       = {Christoph Sprenger and
                  Michael Backes and
                  David A. Basin and
                  Birgit Pfitzmann and
                  Michael Waidner},
  title        = {Cryptographically Sound Theorem Proving},
  booktitle    = {19th {IEEE} Computer Security Foundations Workshop, {(CSFW-19} 2006),
                  5-7 July 2006, Venice, Italy},
  pages        = {153--166},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/CSFW.2006.10},
  doi          = {10.1109/CSFW.2006.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/SprengerBBPW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BackesCJST06,
  author       = {Michael Backes and
                  Iliano Cervesato and
                  Aaron D. Jaggard and
                  Andre Scedrov and
                  Joe{-}Kai Tsay},
  editor       = {Dieter Gollmann and
                  Jan Meier and
                  Andrei Sabelfeld},
  title        = {Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos},
  booktitle    = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research
                  in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4189},
  pages        = {362--383},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11863908\_23},
  doi          = {10.1007/11863908\_23},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BackesCJST06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BackesCO06,
  author       = {Michael Backes and
                  Christian Cachin and
                  Alina Oprea},
  editor       = {Dieter Gollmann and
                  Jan Meier and
                  Andrei Sabelfeld},
  title        = {Secure Key-Updating for Lazy Revocation},
  booktitle    = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research
                  in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4189},
  pages        = {327--346},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11863908\_21},
  doi          = {10.1007/11863908\_21},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BackesCO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BackesDHK06,
  author       = {Michael Backes and
                  Markus D{\"{u}}rmuth and
                  Dennis Hofheinz and
                  Ralf K{\"{u}}sters},
  editor       = {Dieter Gollmann and
                  Jan Meier and
                  Andrei Sabelfeld},
  title        = {Conditional Reactive Simulatability},
  booktitle    = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research
                  in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4189},
  pages        = {424--443},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11863908\_26},
  doi          = {10.1007/11863908\_26},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BackesDHK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BackesPW06,
  author       = {Michael Backes and
                  Birgit Pfitzmann and
                  Michael Waidner},
  editor       = {Dieter Gollmann and
                  Jan Meier and
                  Andrei Sabelfeld},
  title        = {Limits of the {BRSIM/UC} Soundness of Dolev-Yao Models with Hashes},
  booktitle    = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research
                  in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4189},
  pages        = {404--423},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11863908\_25},
  doi          = {10.1007/11863908\_25},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BackesPW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fm/BackesPW06,
  author       = {Michael Backes and
                  Birgit Pfitzmann and
                  Michael Waidner},
  editor       = {Jayadev Misra and
                  Tobias Nipkow and
                  Emil Sekerinski},
  title        = {Formal Methods and Cryptography},
  booktitle    = {{FM} 2006: Formal Methods, 14th International Symposium on Formal
                  Methods, Hamilton, Canada, August 21-27, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4085},
  pages        = {612--616},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11813040\_44},
  doi          = {10.1007/11813040\_44},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/fm/BackesPW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fossacs/BackesMPV06,
  author       = {Michael Backes and
                  Sebastian M{\"{o}}dersheim and
                  Birgit Pfitzmann and
                  Luca Vigan{\`{o}}},
  editor       = {Luca Aceto and
                  Anna Ing{\'{o}}lfsd{\'{o}}ttir},
  title        = {Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging
                  Scenario},
  booktitle    = {Foundations of Software Science and Computation Structures, 9th International
                  Conference, {FOSSACS} 2006, Held as Part of the Joint European Conferences
                  on Theory and Practice of Software, {ETAPS} 2006, Vienna, Austria,
                  March 25-31, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3921},
  pages        = {428--445},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11690634\_29},
  doi          = {10.1007/11690634\_29},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/fossacs/BackesMPV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/BackesP06,
  author       = {Michael Backes and
                  Birgit Pfitzmann},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Kai Rannenberg and
                  Louise Yngstr{\"{o}}m and
                  Stefan Lindskog},
  title        = {On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol},
  booktitle    = {Security and Privacy in Dynamic Environments, Proceedings of the {IFIP}
                  {TC-11} 21st International Information Security Conference {(SEC}
                  2006), 22-24 May 2006, Karlstad, Sweden},
  series       = {{IFIP}},
  volume       = {201},
  pages        = {233--245},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/0-387-33406-8\_20},
  doi          = {10.1007/0-387-33406-8\_20},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/BackesP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2006,
  editor       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  Michael Backes and
                  Stefanos Gritzalis and
                  Bart Preneel},
  title        = {Information Security, 9th International Conference, {ISC} 2006, Samos
                  Island, Greece, August 30 - September 2, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4176},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11836810},
  doi          = {10.1007/11836810},
  isbn         = {3-540-38341-7},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesCJST06,
  author       = {Michael Backes and
                  Iliano Cervesato and
                  Aaron D. Jaggard and
                  Andre Scedrov and
                  Joe{-}Kai Tsay},
  title        = {Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {219},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/219},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesCJST06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesDHK06,
  author       = {Michael Backes and
                  Markus D{\"{u}}rmuth and
                  Dennis Hofheinz and
                  Ralf K{\"{u}}sters},
  title        = {Conditional Reactive Simulatability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {132},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/132},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesDHK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesL06,
  author       = {Michael Backes and
                  Peeter Laud},
  title        = {Computationally Sound Secrecy Proofs by Mechanized Flow Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {266},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/266},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesMPV06,
  author       = {Michael Backes and
                  Sebastian M{\"{o}}dersheim and
                  Birgit Pfitzmann and
                  Luca Vigan{\`{o}}},
  title        = {Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging
                  Scenario},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {58},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/058},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesMPV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesMU06,
  author       = {Michael Backes and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Dominique Unruh},
  title        = {On the Necessity of Rewinding in Secure Multiparty Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {315},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/315},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesMU06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesPW06,
  author       = {Michael Backes and
                  Birgit Pfitzmann and
                  Michael Waidner},
  title        = {Limits of the Reactive Simulatability/UC of Dolev-Yao Models with
                  Hashes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {68},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/068},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesPW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SprengerBBPW06,
  author       = {Christoph Sprenger and
                  Michael Backes and
                  David A. Basin and
                  Birgit Pfitzmann and
                  Michael Waidner},
  title        = {Cryptographically Sound Theorem Proving},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {47},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/047},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SprengerBBPW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BackesPW05,
  author       = {Michael Backes and
                  Birgit Pfitzmann and
                  Michael Waidner},
  title        = {Symmetric authentication in a simulatable Dolev-Yao-style cryptographic
                  library},
  journal      = {Int. J. Inf. Sec.},
  volume       = {4},
  number       = {3},
  pages        = {135--154},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10207-004-0056-6},
  doi          = {10.1007/S10207-004-0056-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BackesPW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BackesPW05a,
  author       = {Michael Backes and
                  Birgit Pfitzmann and
                  Michael Waidner},
  title        = {Reactively secure signature schemes},
  journal      = {Int. J. Inf. Sec.},
  volume       = {4},
  number       = {4},
  pages        = {242--252},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10207-004-0062-8},
  doi          = {10.1007/S10207-004-0062-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BackesPW05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/Backes05,
  author       = {Michael Backes},
  title        = {Unifying simulatability definitions in cryptographic systems under
                  different timing assumptions},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {64},
  number       = {2},
  pages        = {157--188},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.jlap.2004.09.002},
  doi          = {10.1016/J.JLAP.2004.09.002},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/Backes05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BackesP05,
  author       = {Michael Backes and
                  Birgit Pfitzmann},
  title        = {Relating Symbolic and Cryptographic Secrecy},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {2},
  number       = {2},
  pages        = {109--123},
  year         = {2005},
  url          = {https://doi.org/10.1109/TDSC.2005.25},
  doi          = {10.1109/TDSC.2005.25},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/BackesP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BackesHMU05,
  author       = {Michael Backes and
                  Dennis Hofheinz and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Dominique Unruh},
  editor       = {Vijay Atluri and
                  Pierangela Samarati and
                  Ralf K{\"{u}}sters and
                  John C. Mitchell},
  title        = {On fairness in simulatability-based cryptographic systems},
  booktitle    = {Proceedings of the 2005 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2005, Fairfax, VA, USA, November 11, 2005},
  pages        = {13--22},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1103576.1103579},
  doi          = {10.1145/1103576.1103579},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BackesHMU05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BackesD05,
  author       = {Michael Backes and
                  Markus D{\"{u}}rmuth},
  title        = {A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic
                  Payment System},
  booktitle    = {18th {IEEE} Computer Security Foundations Workshop, {(CSFW-18} 2005),
                  20-22 June 2005, Aix-en-Provence, France},
  pages        = {78--93},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSFW.2005.5},
  doi          = {10.1109/CSFW.2005.5},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BackesD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BackesDDMT05,
  author       = {Michael Backes and
                  Anupam Datta and
                  Ante Derek and
                  John C. Mitchell and
                  Mathieu Turuani},
  title        = {Compositional Analysis of Contract Signing Protocols},
  booktitle    = {18th {IEEE} Computer Security Foundations Workshop, {(CSFW-18} 2005),
                  20-22 June 2005, Aix-en-Provence, France},
  pages        = {94--110},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSFW.2005.12},
  doi          = {10.1109/CSFW.2005.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BackesDDMT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Backes05,
  author       = {Michael Backes},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {Quantifying Probabilistic Information Flow in Computational Reactive
                  Systems},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {336--354},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_20},
  doi          = {10.1007/11555827\_20},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Backes05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BackesP05,
  author       = {Michael Backes and
                  Birgit Pfitzmann},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {Limits of the Cryptographic Realization of Dolev-Yao-Style {XOR}},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {178--196},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_11},
  doi          = {10.1007/11555827\_11},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BackesP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sisw/BackesCO05,
  author       = {Michael Backes and
                  Christian Cachin and
                  Alina Oprea},
  title        = {Lazy Revocation in Cryptographic File Systems},
  booktitle    = {3rd International {IEEE} Security in Storage Workshop {(SISW} 2005),
                  December 13, 2005, San Francisco, California, {USA}},
  pages        = {1--11},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/SISW.2005.7},
  doi          = {10.1109/SISW.2005.7},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sisw/BackesCO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BackesP05,
  author       = {Michael Backes and
                  Birgit Pfitzmann},
  title        = {Relating Symbolic and Cryptographic Secrecy},
  booktitle    = {2005 {IEEE} Symposium on Security and Privacy (S{\&}P 2005), 8-11
                  May 2005, Oakland, CA, {USA}},
  pages        = {171--182},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/SP.2005.17},
  doi          = {10.1109/SP.2005.17},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BackesP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sws/BackesG05,
  author       = {Michael Backes and
                  Thomas Gro{\ss}},
  editor       = {Ernesto Damiani and
                  Hiroshi Maruyama},
  title        = {Tailoring the Dolev-Yao abstraction to web services realities},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop On Secure Web Services, {SWS}
                  2005, Fairfax, VA, USA, November 11, 2005},
  pages        = {65--74},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1103022.1103035},
  doi          = {10.1145/1103022.1103035},
  timestamp    = {Tue, 12 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sws/BackesG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BackesC05,
  author       = {Michael Backes and
                  Christian Cachin},
  editor       = {Joe Kilian},
  title        = {Public-Key Steganography with Active Attacks},
  booktitle    = {Theory of Cryptography, Second Theory of Cryptography Conference,
                  {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3378},
  pages        = {210--226},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30576-7\_12},
  doi          = {10.1007/978-3-540-30576-7\_12},
  timestamp    = {Sun, 02 Jun 2019 21:21:22 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BackesC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/BackesCS05,
  author       = {Michael Backes and
                  Jan Camenisch and
                  Dieter Sommer},
  editor       = {Vijay Atluri and
                  Sabrina De Capitani di Vimercati and
                  Roger Dingledine},
  title        = {Anonymous yet accountable access control},
  booktitle    = {Proceedings of the 2005 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2005, Alexandria, VA, USA, November 7, 2005},
  pages        = {40--46},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102199.1102208},
  doi          = {10.1145/1102199.1102208},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/BackesCS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/Backes06,
  author       = {Michael Backes},
  editor       = {Mart{\'{\i}}n H{\"{o}}tzel Escard{\'{o}} and
                  Achim Jung and
                  Michael W. Mislove},
  title        = {Real-or-random Key Secrecy of the Otway-Rees Protocol via a Symbolic
                  Security Proof},
  booktitle    = {Proceedings of the 21st Annual Conference on Mathematical Foundations
                  of Programming Semantics, {MFPS} 2005, Birmingham, UK, May 18-21,
                  2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {155},
  pages        = {111--145},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.entcs.2005.11.054},
  doi          = {10.1016/J.ENTCS.2005.11.054},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/Backes06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/BackesS07,
  author       = {Michael Backes and
                  Andre Scedrov},
  editor       = {Michael Backes and
                  Andre Scedrov},
  title        = {Preface},
  booktitle    = {Proceedings of the International Workshop on Security and Concurrency,
                  SecCo@CONCUR 2005, San Francisco, CA, USA, August 22, 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {180},
  number       = {1},
  pages        = {1--2},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.entcs.2005.05.043},
  doi          = {10.1016/J.ENTCS.2005.05.043},
  timestamp    = {Tue, 31 Jan 2023 13:51:04 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/BackesS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesCO05,
  author       = {Michael Backes and
                  Christian Cachin and
                  Alina Oprea},
  title        = {Secure Key-Updating for Lazy Revocation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {334},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/334},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesCO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesHMU05,
  author       = {Michael Backes and
                  Dennis Hofheinz and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Dominique Unruh},
  title        = {On Fairness in Simulatability-based Cryptographic Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {294},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/294},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesHMU05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesP05,
  author       = {Michael Backes and
                  Birgit Pfitzmann},
  title        = {Limits of the Cryptographic Realization of Dolev-Yao-style {XOR}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {220},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/220},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesPS05,
  author       = {Michael Backes and
                  Birgit Pfitzmann and
                  Andre Scedrov},
  title        = {Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness
                  of Symbolic Encryption with Key Cycles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {421},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/421},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesPS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/de/Backes2004,
  author       = {Michael Backes},
  title        = {Cryptographically sound analysis of security protocols},
  school       = {Saarland University, Saarbr{\"{u}}cken, Germany},
  year         = {2004},
  url          = {http://scidok.sulb.uni-saarland.de/volltexte/2004/296/index.html},
  urn          = {urn:nbn:de:bsz:291-scidok-2966},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/de/Backes2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BackesP04,
  author       = {Michael Backes and
                  Birgit Pfitzmann},
  title        = {Computational probabilistic noninterference},
  journal      = {Int. J. Inf. Sec.},
  volume       = {3},
  number       = {1},
  pages        = {42--60},
  year         = {2004},
  url          = {https://doi.org/10.1007/s10207-004-0039-7},
  doi          = {10.1007/S10207-004-0039-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BackesP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BackesPW04,
  author       = {Michael Backes and
                  Birgit Pfitzmann and
                  Michael Waidner},
  title        = {Polynomial liveness},
  journal      = {J. Comput. Secur.},
  volume       = {12},
  number       = {3-4},
  pages        = {589--617},
  year         = {2004},
  url          = {https://doi.org/10.3233/jcs-2004-123-409},
  doi          = {10.3233/JCS-2004-123-409},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BackesPW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/BackesP04,
  author       = {Michael Backes and
                  Birgit Pfitzmann},
  title        = {A cryptographically sound security proof of the Needham-Schroeder-Lowe
                  public-key protocol},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {22},
  number       = {10},
  pages        = {2075--2086},
  year         = {2004},
  url          = {https://doi.org/10.1109/JSAC.2004.836016},
  doi          = {10.1109/JSAC.2004.836016},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/BackesP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BackesP04,
  author       = {Michael Backes and
                  Birgit Pfitzmann},
  title        = {Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic
                  Library},
  booktitle    = {17th {IEEE} Computer Security Foundations Workshop, {(CSFW-17} 2004),
                  28-30 June 2004, Pacific Grove, CA, {USA}},
  pages        = {204--218},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CSFW.2004.20},
  doi          = {10.1109/CSFW.2004.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BackesP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Backes04,
  author       = {Michael Backes},
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees
                  Protocol},
  booktitle    = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  pages        = {89--108},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30108-0\_6},
  doi          = {10.1007/978-3-540-30108-0\_6},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Backes04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BackesDS04,
  author       = {Michael Backes and
                  Markus D{\"{u}}rmuth and
                  Rainer Steinwandt},
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {An Algebra for Composing Enterprise Privacy Policies},
  booktitle    = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  pages        = {33--52},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30108-0\_3},
  doi          = {10.1007/978-3-540-30108-0\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BackesDS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fosad/BackesPW04,
  author       = {Michael Backes and
                  Birgit Pfitzmann and
                  Michael Waidner},
  editor       = {Alessandro Aldini and
                  Roberto Gorrieri and
                  Fabio Martinelli},
  title        = {Justifying a Dolev-Yao Model Under Active Attacks},
  booktitle    = {Foundations of Security Analysis and Design III, {FOSAD} 2004/2005
                  Tutorial Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {3655},
  pages        = {1--41},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11554578\_1},
  doi          = {10.1007/11554578\_1},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/fosad/BackesPW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/BackesH04,
  author       = {Michael Backes and
                  Dennis Hofheinz},
  editor       = {Kan Zhang and
                  Yuliang Zheng},
  title        = {How to Break and Repair a Universally Composable Signature Functionality},
  booktitle    = {Information Security, 7th International Conference, {ISC} 2004, Palo
                  Alto, CA, USA, September 27-29, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3225},
  pages        = {61--72},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30144-8\_6},
  doi          = {10.1007/978-3-540-30144-8\_6},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/BackesH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/BackesPW04,
  author       = {Michael Backes and
                  Birgit Pfitzmann and
                  Michael Waidner},
  editor       = {Kan Zhang and
                  Yuliang Zheng},
  title        = {Low-Level Ideal Signatures and General Integrity Idealization},
  booktitle    = {Information Security, 7th International Conference, {ISC} 2004, Palo
                  Alto, CA, USA, September 27-29, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3225},
  pages        = {39--51},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30144-8\_4},
  doi          = {10.1007/978-3-540-30144-8\_4},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/BackesPW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/BackesDK04,
  author       = {Michael Backes and
                  Markus D{\"{u}}rmuth and
                  G{\"{u}}nter Karjoth},
  title        = {Unification in Privacy Policy Evaluation - Translating {EPAL} into
                  Prolog},
  booktitle    = {5th {IEEE} International Workshop on Policies for Distributed Systems
                  and Networks {(POLICY} 2004), 7-9 June 2004, Yorktown Heights, NY,
                  {USA}},
  pages        = {185--188},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/POLICY.2004.1309165},
  doi          = {10.1109/POLICY.2004.1309165},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/BackesDK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/BackesKBS04,
  author       = {Michael Backes and
                  G{\"{u}}nter Karjoth and
                  Walid Bagga and
                  Matthias Schunter},
  editor       = {Hisham Haddad and
                  Andrea Omicini and
                  Roger L. Wainwright and
                  Lorie M. Liebrock},
  title        = {Efficient comparison of enterprise privacy policies},
  booktitle    = {Proceedings of the 2004 {ACM} Symposium on Applied Computing (SAC),
                  Nicosia, Cyprus, March 14-17, 2004},
  pages        = {375--382},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/967900.967983},
  doi          = {10.1145/967900.967983},
  timestamp    = {Tue, 06 Nov 2018 11:06:44 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/BackesKBS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BackesPW04,
  author       = {Michael Backes and
                  Birgit Pfitzmann and
                  Michael Waidner},
  editor       = {Moni Naor},
  title        = {A General Composition Theorem for Secure Reactive Systems},
  booktitle    = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC}
                  2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2951},
  pages        = {336--354},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24638-1\_19},
  doi          = {10.1007/978-3-540-24638-1\_19},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BackesPW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2004,
  editor       = {Vijayalakshmi Atluri and
                  Michael Backes and
                  David A. Basin and
                  Michael Waidner},
  title        = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security
                  Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {http://dl.acm.org/citation.cfm?id=1030083},
  isbn         = {1-58113-971-3},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesP04,
  author       = {Michael Backes and
                  Birgit Pfitzmann},
  title        = {Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic
                  Library},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {59},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/059},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesP04a,
  author       = {Michael Backes and
                  Birgit Pfitzmann},
  title        = {Relating Symbolic and Cryptographic Secrecy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {300},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/300},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesP04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesPW04,
  author       = {Michael Backes and
                  Birgit Pfitzmann and
                  Michael Waidner},
  title        = {The Reactive Simulatability {(RSIM)} Framework for Asynchronous Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {82},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/082},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesPW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bpm/BackesPW03,
  author       = {Michael Backes and
                  Birgit Pfitzmann and
                  Michael Waidner},
  editor       = {Wil M. P. van der Aalst and
                  Arthur H. M. ter Hofstede and
                  Mathias Weske},
  title        = {Security in Business Process Engineering},
  booktitle    = {Business Process Management, International Conference, {BPM} 2003,
                  Eindhoven, The Netherlands, June 26-27, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2678},
  pages        = {168--183},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-44895-0\_12},
  doi          = {10.1007/3-540-44895-0\_12},
  timestamp    = {Sat, 19 Oct 2019 20:23:19 +0200},
  biburl       = {https://dblp.org/rec/conf/bpm/BackesPW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BackesMM03,
  author       = {Michael Backes and
                  Catherine Meadows and
                  John C. Mitchell},
  editor       = {Michael Backes and
                  David A. Basin},
  title        = {Relating cryptography and formal methods: a panel},
  booktitle    = {Proceedings of the 2003 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2003, Washington, DC, USA, October 30, 2003},
  pages        = {61--66},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/1035429.1035436},
  doi          = {10.1145/1035429.1035436},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BackesMM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BackesPW03,
  author       = {Michael Backes and
                  Birgit Pfitzmann and
                  Michael Waidner},
  editor       = {Sushil Jajodia and
                  Vijayalakshmi Atluri and
                  Trent Jaeger},
  title        = {A composable cryptographic library with nested operations},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003},
  pages        = {220--230},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/948109.948140},
  doi          = {10.1145/948109.948140},
  timestamp    = {Tue, 10 Nov 2020 20:00:42 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BackesPW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/concur/Backes03,
  author       = {Michael Backes},
  editor       = {Roberto M. Amadio and
                  Denis Lugiez},
  title        = {Unifying Simulatability Definitions in Cryptographic Systems under
                  Different Timing Assumptions},
  booktitle    = {{CONCUR} 2003 - Concurrency Theory, 14th International Conference,
                  Marseille, France, September 3-5, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2761},
  pages        = {346--360},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45187-7\_23},
  doi          = {10.1007/978-3-540-45187-7\_23},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/concur/Backes03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/BackesC03,
  author       = {Michael Backes and
                  Christian Cachin},
  title        = {Reliable Broadcast in a Computational Hybrid Model with Byzantine
                  Faults, Crashes, and Recoveries},
  booktitle    = {2003 International Conference on Dependable Systems and Networks {(DSN}
                  2003), 22-25 June 2003, San Francisco, CA, USA, Proceedings},
  pages        = {37--46},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/DSN.2003.1209914},
  doi          = {10.1109/DSN.2003.1209914},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/BackesC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BackesPS03,
  author       = {Michael Backes and
                  Birgit Pfitzmann and
                  Matthias Schunter},
  editor       = {Einar Snekkenes and
                  Dieter Gollmann},
  title        = {A Toolkit for Managing Enterprise Privacy Policies},
  booktitle    = {Computer Security - {ESORICS} 2003, 8th European Symposium on Research
                  in Computer Security, Gj{\o}vik, Norway, October 13-15, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2808},
  pages        = {162--180},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39650-5\_10},
  doi          = {10.1007/978-3-540-39650-5\_10},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BackesPS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BackesPW03,
  author       = {Michael Backes and
                  Birgit Pfitzmann and
                  Michael Waidner},
  editor       = {Einar Snekkenes and
                  Dieter Gollmann},
  title        = {Symmetric Authentication within a Simulatable Cryptographic Library},
  booktitle    = {Computer Security - {ESORICS} 2003, 8th European Symposium on Research
                  in Computer Security, Gj{\o}vik, Norway, October 13-15, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2808},
  pages        = {271--290},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39650-5\_16},
  doi          = {10.1007/978-3-540-39650-5\_16},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BackesPW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/BackesP03,
  author       = {Michael Backes and
                  Birgit Pfitzmann},
  editor       = {Paritosh K. Pandya and
                  Jaikumar Radhakrishnan},
  title        = {A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe
                  Public-Key Protocol},
  booktitle    = {{FST} {TCS} 2003: Foundations of Software Technology and Theoretical
                  Computer Science, 23rd Conference, Mumbai, India, December 15-17,
                  2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2914},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24597-1\_1},
  doi          = {10.1007/978-3-540-24597-1\_1},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/fsttcs/BackesP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/BackesPW03,
  author       = {Michael Backes and
                  Birgit Pfitzmann and
                  Michael Waidner},
  editor       = {Colin Boyd and
                  Wenbo Mao},
  title        = {Reactively Secure Signature Schemes},
  booktitle    = {Information Security, 6th International Conference, {ISC} 2003, Bristol,
                  UK, October 1-3, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2851},
  pages        = {84--95},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10958513\_7},
  doi          = {10.1007/10958513\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/BackesPW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/BackesS03,
  author       = {Michael Backes and
                  Matthias Schunter},
  editor       = {Christian Hempelmann and
                  Victor Raskin},
  title        = {From absence of certain vulnerabilities towards security proofs: pushing
                  the limits of formal verification},
  booktitle    = {Proceedings of the New Security Paradigms Workshop 2003, August 18-21,
                  2002, Ascona, Switzerland},
  pages        = {67--74},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/986655.986666},
  doi          = {10.1145/986655.986666},
  timestamp    = {Wed, 14 Nov 2018 10:52:51 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/BackesS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/BackesCS03,
  author       = {Michael Backes and
                  Christian Cachin and
                  Reto Strobl},
  editor       = {Elizabeth Borowsky and
                  Sergio Rajsbaum},
  title        = {Proactive secure message transmission in asynchronous networks},
  booktitle    = {Proceedings of the Twenty-Second {ACM} Symposium on Principles of
                  Distributed Computing, {PODC} 2003, Boston, Massachusetts, USA, July
                  13-16, 2003},
  pages        = {223--232},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/872035.872069},
  doi          = {10.1145/872035.872069},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/BackesCS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BackesP03,
  author       = {Michael Backes and
                  Birgit Pfitzmann},
  title        = {Intransitive Non-Interference for Cryptographic Purpose},
  booktitle    = {2003 {IEEE} Symposium on Security and Privacy (S{\&}P 2003), 11-14
                  May 2003, Berkeley, CA, {USA}},
  pages        = {140},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SECPRI.2003.1199333},
  doi          = {10.1109/SECPRI.2003.1199333},
  timestamp    = {Thu, 21 Sep 2023 15:57:30 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BackesP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stacs/BackesJ03,
  author       = {Michael Backes and
                  Christian Jacobi},
  editor       = {Helmut Alt and
                  Michel Habib},
  title        = {Cryptographically Sound and Machine-Assisted Verification of Security
                  Protocols},
  booktitle    = {{STACS} 2003, 20th Annual Symposium on Theoretical Aspects of Computer
                  Science, Berlin, Germany, February 27 - March 1, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2607},
  pages        = {675--686},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36494-3\_59},
  doi          = {10.1007/3-540-36494-3\_59},
  timestamp    = {Thu, 14 Oct 2021 10:38:16 +0200},
  biburl       = {https://dblp.org/rec/conf/stacs/BackesJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2003fmse,
  editor       = {Michael Backes and
                  David A. Basin},
  title        = {Proceedings of the 2003 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2003, Washington, DC, USA, October 30, 2003},
  publisher    = {{ACM}},
  year         = {2003},
  isbn         = {1-58113-781-8},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2003fmse.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Backes03,
  author       = {Michael Backes},
  title        = {Unifying Simulatability Definitions in Cryptographic Systems under
                  Different Timing Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {114},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/114},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Backes03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesC03,
  author       = {Michael Backes and
                  Christian Cachin},
  title        = {Public-Key Steganography with Active Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {231},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/231},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesH03,
  author       = {Michael Backes and
                  Dennis Hofheinz},
  title        = {How to Break and Repair a Universally Composable Signature Functionality},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {240},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/240},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesP03,
  author       = {Michael Backes and
                  Birgit Pfitzmann},
  title        = {A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe
                  Public-Key Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {121},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/121},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesPW03,
  author       = {Michael Backes and
                  Birgit Pfitzmann and
                  Michael Waidner},
  title        = {A Universally Composable Cryptographic Library},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {15},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/015},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesPW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesPW03a,
  author       = {Michael Backes and
                  Birgit Pfitzmann and
                  Michael Waidner},
  title        = {Symmetric Authentication Within a Simulatable Cryptographic Library},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {145},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/145},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesPW03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BackesPSW02,
  author       = {Michael Backes and
                  Birgit Pfitzmann and
                  Michael Steiner and
                  Michael Waidner},
  title        = {Polynomial Fairness and Liveness},
  booktitle    = {15th {IEEE} Computer Security Foundations Workshop {(CSFW-15} 2002),
                  24-26 June 2002, Cape Breton, Nova Scotia, Canada},
  pages        = {160--174},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSFW.2002.1021814},
  doi          = {10.1109/CSFW.2002.1021814},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BackesPSW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BackesP02,
  author       = {Michael Backes and
                  Birgit Pfitzmann},
  editor       = {Dieter Gollmann and
                  G{\"{u}}nter Karjoth and
                  Michael Waidner},
  title        = {Computational Probabilistic Non-interference},
  booktitle    = {Computer Security - {ESORICS} 2002, 7th European Symposium on Research
                  in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2502},
  pages        = {1--23},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45853-0\_1},
  doi          = {10.1007/3-540-45853-0\_1},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BackesP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fm/BackesJP02,
  author       = {Michael Backes and
                  Christian Jacobi and
                  Birgit Pfitzmann},
  editor       = {Lars{-}Henrik Eriksson and
                  Peter A. Lindsay},
  title        = {Deriving Cryptographically Sound Implementations Using Composition
                  and Formally Verified Bisimulation},
  booktitle    = {{FME} 2002: Formal Methods - Getting {IT} Right, International Symposium
                  of Formal Methods Europe, Copenhagen, Denmark, July 22-24, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2391},
  pages        = {310--329},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45614-7\_18},
  doi          = {10.1007/3-540-45614-7\_18},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/fm/BackesJP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/siggraph/WahrmanHBC88,
  author       = {Michael Wahrman and
                  Richard Hollander and
                  Michael Backes and
                  Martha Coolidge},
  editor       = {Richard L. Phillips},
  title        = {The reality of computer graphics in the motion picture industry},
  booktitle    = {Panel Proceedings of the 15th Annual Conference on Computer Graphics
                  and Interactive Techniques, {SIGGRAPH} 1988, Atlanta, GA, USA, August
                  1-5, 1988},
  pages        = {7},
  publisher    = {{ACM}},
  year         = {1988},
  url          = {https://doi.org/10.1145/1402242.1402249},
  doi          = {10.1145/1402242.1402249},
  timestamp    = {Fri, 12 Mar 2021 11:26:26 +0100},
  biburl       = {https://dblp.org/rec/conf/siggraph/WahrmanHBC88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics