What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Michael Backes
Google Scholar
181
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
On the Effectiveness of Prompt Stealing Attacks on In-the-Wild Prompts.
Yicong Tan
Xinyue Shen
Yun Shen
Michael Backes
Yang Zhang
2025
conf/sp
GPTracker: A Large-Scale Measurement of Misused GPTs.
Xinyue Shen
Yun Shen
Michael Backes
Yang Zhang
2025
conf/ndss
Understanding Data Importance in Machine Learning Attacks: Does Valuable Data Pose Greater Harm?
Rui Wen
Michael Backes
Yang Zhang
2024
journals/popets
Link Stealing Attacks Against Inductive Graph Neural Networks.
Yixin Wu
Xinlei He
Pascal Berrang
Mathias Humbert
Michael Backes
Neil Zhenqiang Gong
Yang Zhang
2024
conf/ccs
"Do Anything Now": Characterizing and Evaluating In-The-Wild Jailbreak Prompts on Large Language Models.
Xinyue Shen
Zeyuan Chen
Michael Backes
Yun Shen
Yang Zhang
2024
conf/ccs
MGTBench: Benchmarking Machine-Generated Text Detection.
Xinlei He
Xinyue Shen
Zeyuan Chen
Michael Backes
Yang Zhang
2024
conf/ccs
ZeroFake: Zero-Shot Detection of Fake Images Generated and Edited by Text-to-Image Generation Models.
Zeyang Sha
Yicong Tan
Mingjie Li
Michael Backes
Yang Zhang
2024
conf/ccs
Membership Inference Attacks Against In-Context Learning.
Rui Wen
Zheng Li
Michael Backes
Yang Zhang
2024
conf/ccs
Image-Perfect Imperfections: Safety, Bias, and Authenticity in the Shadow of Text-To-Image Model Evolution.
Yixin Wu
Yun Shen
Michael Backes
Yang Zhang
2024
conf/uss
SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models.
Boyang Zhang
Zheng Li
Ziqing Yang
Xinlei He
Michael Backes
Mario Fritz
Yang Zhang
2024
conf/uss
Instruction Backdoor Attacks Against Customized LLMs.
Rui Zhang
Hongwei Li
Rui Wen
Wenbo Jiang
Yuan Zhang
Michael Backes
Yun Shen
Yang Zhang
2024
conf/uss
Quantifying Privacy Risks of Prompts in Visual Prompt Learning.
Yixin Wu
Rui Wen
Michael Backes
Pascal Berrang
Mathias Humbert
Yun Shen
Yang Zhang
2024
conf/uss
Prompt Stealing Attacks Against Text-to-Image Generation Models.
Xinyue Shen
Yiting Qu
Michael Backes
Yang Zhang
2024
conf/sp
Measuring the Effects of Stack Overflow Code Snippet Evolution on Open-Source Software Security.
Alfusainey Jallow
Michael Schilling
Michael Backes
Sven Bugiel
2024
conf/asiaccs
FAKEPCD: Fake Point Cloud Detection via Source Attribution.
Yiting Qu
Zhikun Zhang
Yun Shen
Michael Backes
Yang Zhang
2023
conf/ccs
Unsafe Diffusion: On the Generation of Unsafe Images and Hateful Memes From Text-To-Image Models.
Yiting Qu
Xinyue Shen
Xinlei He
Michael Backes
Savvas Zannettou
Yang Zhang
2023
conf/uss
Two-in-One: A Model Hijacking Attack Against Text Generation Models.
Wai Man Si
Michael Backes
Yang Zhang
Ahmed Salem
2023
conf/uss
PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov Models.
Haiming Wang
Zhikun Zhang
Tianhao Wang
Shibo He
Michael Backes
Jiming Chen
Yang Zhang
2023
conf/uss
FACE-AUDITOR: Data Auditing in Facial Recognition Systems.
Min Chen
Zhikun Zhang
Tianhao Wang
Michael Backes
Yang Zhang
2023
conf/uss
UnGANable: Defending Against GAN-based Face Manipulation.
Zheng Li
Ning Yu
Ahmed Salem
Michael Backes
Mario Fritz
Yang Zhang
2023
conf/uss
Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages.
Cristian-Alexandru Staicu
Sazzadur Rahaman
Ágnes Kiss
Michael Backes
2023
conf/sp
On the Evolution of (Hateful) Memes by Means of Multimodal Contrastive Learning.
Yiting Qu
Xinlei He
Shannon Pierson
Michael Backes
Yang Zhang
Savvas Zannettou
2023
conf/ndss
Backdoor Attacks Against Dataset Distillation.
Yugeng Liu
Zheng Li
Michael Backes
Yun Shen
Yang Zhang
2023
conf/ndss
A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites.
Sanam Ghorbani Lyastani
Michael Backes
Sven Bugiel
2022
journals/compsec
Backdoor smoothing: Demystifying backdoor attacks on deep neural networks.
Kathrin Grosse
Taesung Lee
Battista Biggio
Youngja Park
Michael Backes
Ian M. Molloy
2022
conf/ccs
Finding MNEMON: Reviving Memories of Node Embeddings.
Yun Shen
Yufei Han
Zhikun Zhang
Min Chen
Ting Yu
Michael Backes
Yang Zhang
Gianluca Stringhini
2022
conf/ccs
Why So Toxic?: Measuring and Triggering Toxic Behavior in Open-Domain Chatbots.
Wai Man Si
Michael Backes
Jeremy Blackburn
Emiliano De Cristofaro
Gianluca Stringhini
Savvas Zannettou
Yang Zhang
2022
conf/ccs
Freely Given Consent?: Studying Consent Notice of Third-Party Tracking and Its Violations of GDPR in Android Apps.
Trung Tin Nguyen
Michael Backes
Ben Stock
2022
conf/ccs
Graph Unlearning.
Min Chen
Zhikun Zhang
Tianhao Wang
Michael Backes
Mathias Humbert
Yang Zhang
2022
conf/ccs
Membership Inference Attacks by Exploiting Loss Trajectory.
Yiyong Liu
Zhengyu Zhao
Michael Backes
Yang Zhang
2022
conf/ccs
Auditing Membership Leakages of Multi-Exit Networks.
Zheng Li
Yiyong Liu
Xinlei He
Ning Yu
Michael Backes
Yang Zhang
2022
conf/ccs
On the Privacy Risks of Cell-Based NAS Architectures.
Hai Huang
Zhikun Zhang
Yun Shen
Michael Backes
Qi Li
Yang Zhang
2022
conf/uss
Inference Attacks Against Graph Neural Networks.
Zhikun Zhang
Min Chen
Michael Backes
Yun Shen
Yang Zhang
2022
conf/uss
ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models.
Yugeng Liu
Rui Wen
Xinlei He
Ahmed Salem
Zhikun Zhang
Michael Backes
Emiliano De Cristofaro
Mario Fritz
Yang Zhang
2022
conf/soups
Industrial practitioners' mental models of adversarial machine learning.
Lukas Bieringer
Kathrin Grosse
Michael Backes
Battista Biggio
Katharina Krombholz
2022
conf/eurosp
Dynamic Backdoor Attacks Against Machine Learning Models.
Ahmed Salem
Rui Wen
Michael Backes
Shiqing Ma
Yang Zhang
2022
conf/esorics
A Framework for Constructing Single Secret Leader Election from MPC.
Michael Backes
Pascal Berrang
Lucjan Hanzlik
Ivan Pryvalov
2022
conf/ndss
Get a Model! Model Hijacking Attack Against Machine Learning Models.
Ahmed Salem
Michael Backes
Yang Zhang
2021
conf/ccs
12 Angry Developers - A Qualitative Study on Developers' Struggles with CSP.
Sebastian Roth
Lea Gröber
Michael Backes
Katharina Krombholz
Ben Stock
2021
conf/ccs
When Machine Unlearning Jeopardizes Privacy.
Min Chen
Zhikun Zhang
Tianhao Wang
Michael Backes
Mathias Humbert
Yang Zhang
2021
conf/ccs
DoubleX: Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale.
Aurore Fass
Dolière Francis Somé
Michael Backes
Ben Stock
2021
conf/uss
PrivSyn: Differentially Private Data Synthesis.
Zhikun Zhang
Tianhao Wang
Ninghui Li
Jean Honorio
Michael Backes
Shibo He
Jiming Chen
Yang Zhang
2021
conf/uss
A11y and Privacy don't have to be mutually exclusive: Constraining Accessibility Service Misuse on Android.
Jie Huang
Michael Backes
Sven Bugiel
2021
conf/uss
Stealing Links from Graph Neural Networks.
Xinlei He
Jinyuan Jia
Michael Backes
Neil Zhenqiang Gong
Yang Zhang
2021
conf/uss
Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications.
Marten Oltrogge
Nicolas Huaman
Sabrina Amft
Yasemin Acar
Michael Backes
Sascha Fahl
2021
conf/uss
Share First, Ask Later (or Never?) Studying Violations of GDPR's Explicit Consent in Android Apps.
Trung Tin Nguyen
Michael Backes
Ninja Marnau
Ben Stock
2021
conf/uss
Explanation Beats Context: The Effect of Timing & Rationales on Users' Runtime Permission Decisions.
Yusra Elbitar
Michael Schilling
Trung Tin Nguyen
Michael Backes
Sven Bugiel
2021
conf/asiaccs
Measuring User Perception for Detecting Unexpected Access to Sensitive Resource in Mobile Apps.
Trung Tin Nguyen
Duc Cuong Nguyen
Michael Schilling
Gang Wang
Michael Backes
2021
conf/dsn
Statically Detecting JavaScript Obfuscation and Minification Techniques in the Wild.
Marvin Moog
Markus Demmel
Michael Backes
Aurore Fass
2021
conf/acsac
BadNL: Backdoor Attacks against NLP Models with Semantic-preserving Improvements.
Xiaoyi Chen
Ahmed Salem
Dingfan Chen
Michael Backes
Shiqing Ma
Qingni Shen
Zhonghai Wu
Yang Zhang
2020
conf/ccs
Assessing the Impact of Script Gadgets on CSP at Scale.
Sebastian Roth
Michael Backes
Ben Stock
2020
conf/uss
A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web.
Stefano Calzavara
Sebastian Roth
Alvise Rabitti
Michael Backes
Ben Stock
2020
conf/uss
Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning.
Ahmed Salem
Apratim Bhattacharya
Michael Backes
Mario Fritz
Yang Zhang
2020
conf/sp
Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication.
Sanam Ghorbani Lyastani
Michael Schilling
Michaela Neumayr
Michael Backes
Sven Bugiel
2020
conf/acns
TrollThrottle - Raising the Cost of Astroturfing.
Ilkan Esiyok
Lucjan Hanzlik
Robert Künnemann
Lena Marie Budde
Michael Backes
2020
conf/eurosp
Membership Inference Against DNA Methylation Databases.
Inken Hagestedt
Mathias Humbert
Pascal Berrang
Irina Lehmann
Roland Eils
Michael Backes
Yang Zhang
2020
conf/ndss
Towards Plausible Graph Anonymization.
Yang Zhang
Mathias Humbert
Bartlomiej Surma
Praveen Manoharan
Jilles Vreeken
Michael Backes
2020
conf/acsac
Up2Dep: Android Tool Support to Fix Insecure Code Dependencies.
Duc Cuong Nguyen
Erik Derr
Michael Backes
Sven Bugiel
2019
journals/popets
Privacy-Preserving Similar Patient Queries for Combined Biomedical Data.
Ahmed Salem
Pascal Berrang
Mathias Humbert
Michael Backes
2019
conf/ccs
MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples.
Jinyuan Jia
Ahmed Salem
Michael Backes
Yang Zhang
Neil Zhenqiang Gong
2019
conf/ccs
HideNoSeek: Camouflaging Malicious JavaScript in Benign ASTs.
Aurore Fass
Michael Backes
Ben Stock
2019
conf/ccs
Membership Privacy for Fully Dynamic Group Signatures.
Michael Backes
Lucjan Hanzlik
Jonas Schneider-Bensch
2019
conf/sp
Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security & Privacy.
Duc Cuong Nguyen
Erik Derr
Michael Backes
Sven Bugiel
2019
conf/sp
Fidelius: Protecting User Secrets from Compromised Browsers.
Saba Eskandarian
Jonathan Cogan
Sawyer Birnbaum
Peh Chang Wei Brandon
Dillon Franke
Forest Fraser
Gaspar Garcia Jr.
Eric Gong
Hung T. Nguyen
Taresh K. Sethi
Vishal Subbiah
Michael Backes
Giancarlo Pellegrino
Dan Boneh
2019
conf/eurosp
Up-To-Crash: Evaluating Third-Party Library Updatability on Android.
Jie Huang
Nataniel P. Borges Jr.
Sven Bugiel
Michael Backes
2019
conf/ndss
ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models.
Ahmed Salem
Yang Zhang
Mathias Humbert
Pascal Berrang
Mario Fritz
Michael Backes
2019
conf/ndss
MBeacon: Privacy-Preserving Beacons for DNA Methylation Data.
Inken Hagestedt
Yang Zhang
Mathias Humbert
Pascal Berrang
Haixu Tang
XiaoFeng Wang
Michael Backes
2019
conf/pkc
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains Without Trusted Setup.
Michael Backes
Lucjan Hanzlik
Amir Herzberg
Aniket Kate
Ivan Pryvalov
2019
conf/eurocrypt
Ring Signatures: Logarithmic-Size, No Setup - from Standard Assumptions.
Michael Backes
Nico Döttling
Lucjan Hanzlik
Kamil Kluczniak
Jonas Schneider
2019
conf/acsac
JStap: a static pre-filter for malicious JavaScript detection.
Aurore Fass
Michael Backes
Ben Stock
2018
conf/uss
Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse.
Sanam Ghorbani Lyastani
Michael Schilling
Sascha Fahl
Michael Backes
Sven Bugiel
2018
conf/sp
The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators.
Marten Oltrogge
Erik Derr
Christian Stransky
Yasemin Acar
Sascha Fahl
Christian Rossow
Giancarlo Pellegrino
Sven Bugiel
Michael Backes
2018
conf/sp
Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels.
Meng Xu
Chenxiong Qian
Kangjie Lu
Michael Backes
Taesoo Kim
2018
conf/eurosp
Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure.
Patrick Speicher
Marcel Steinmetz
Robert Künnemann
Milivoj Simeonovski
Giancarlo Pellegrino
Jörg Hoffmann
Michael Backes
2018
conf/eurosp
Dissecting Privacy Risks in Biomedical Data.
Pascal Berrang
Mathias Humbert
Yang Zhang
Irina Lehmann
Roland Eils
Michael Backes
2018
conf/ndss
Didn't You Hear Me? - Towards More Successful Web Vulnerability Notifications.
Ben Stock
Giancarlo Pellegrino
Frank Li
Michael Backes
Christian Rossow
2018
conf/asiacrypt
Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys.
Michael Backes
Lucjan Hanzlik
Kamil Kluczniak
Jonas Schneider
2017
conf/ccs
walk2friends: Inferring Social Links from Mobility Profiles.
Michael Backes
Mathias Humbert
Jun Pang
Yang Zhang
2017
conf/ccs
The ART of App Compartmentalization: Compiler-based Library Privilege Separation on Stock Android.
Jie Huang
Oliver Schranz
Sven Bugiel
Michael Backes
2017
conf/ccs
Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs.
Giancarlo Pellegrino
Martin Johns
Simon Koch
Michael Backes
Christian Rossow
2017
conf/ccs
Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android.
Erik Derr
Sven Bugiel
Sascha Fahl
Yasemin Acar
Michael Backes
2017
conf/ccs
A Stitch in Time: Supporting Android Developers in WritingSecure Code.
Duc Cuong Nguyen
Dominik Wermke
Yasemin Acar
Michael Backes
Charles Weir
Sascha Fahl
2017
conf/uss
Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers.
Christian Stransky
Yasemin Acar
Duc Cuong Nguyen
Dominik Wermke
Doowon Kim
Elissa M. Redmiles
Michael Backes
Simson L. Garfinkel
Michelle L. Mazurek
Sascha Fahl
2017
conf/uss
How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security.
Ben Stock
Martin Johns
Marius Steffens
Michael Backes
2017
conf/sp
Seamless In-App Ad Blocking on Stock Android.
Michael Backes
Sven Bugiel
Philipp von Styp-Rekowsky
Marvin WiBfeld
2017
conf/sp
Identifying Personal DNA Methylation Profiles by Genotype Inference.
Michael Backes
Pascal Berrang
Matthias Bieg
Roland Eils
Carl Herrmann
Mathias Humbert
Irina Lehmann
2017
conf/sp
Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security.
Felix Fischer
Konstantin Böttinger
Huang Xiao
Christian Stransky
Yasemin Acar
Michael Backes
Sascha Fahl
2017
conf/sp
Comparing the Usability of Cryptographic APIs.
Yasemin Acar
Michael Backes
Sascha Fahl
Simson L. Garfinkel
Doowon Kim
Michelle L. Mazurek
Christian Stransky
2017
conf/eurosp
A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and Its Application to Fair Exchange.
Michael Backes
Jannik Dreier
Steve Kremer
Robert Künnemann
2017
conf/eurosp
LUNA: Quantifying and Leveraging Uncertainty in Android Malware Analysis through Bayesian Machine Learning.
Michael Backes
Mohammad Nauman
2017
conf/eurosp
Efficient and Flexible Discovery of PHP Application Vulnerabilities.
Michael Backes
Konrad Rieck
Malte Skoruppa
Ben Stock
Fabian Yamaguchi
2017
conf/eurosp
ARTist: The Android Runtime Instrumentation and Security Toolkit.
Michael Backes
Sven Bugiel
Oliver Schranz
Philipp von Styp-Rekowsky
Sebastian Weisgerber
2017
conf/esorics
Adversarial Examples for Malware Detection.
Kathrin Grosse
Nicolas Papernot
Praveen Manoharan
Michael Backes
Patrick D. McDaniel
2017
conf/ndss
Dachshund: Digging for and Securing (Non-)Blinded Constants in JIT Code.
Giorgi Maisuradze
Michael Backes
Christian Rossow
2017
conf/ndss
Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying.
Kangjie Lu
Marie-Therese Walter
David Pfaff
Stefan Nümberger
Wenke Lee
Michael Backes
2016
journals/popets
Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms Against Structural Attacks.
Michael Backes
Sebastian Meiser
Marcin Slowik
2016
conf/ccs
Membership Privacy in MicroRNA-based Studies.
Michael Backes
Pascal Berrang
Mathias Humbert
Praveen Manoharan
2016
conf/ccs
Computational Soundness for Dalvik Bytecode.
Michael Backes
Robert Künnemann
Esfandiar Mohammadi
2016
conf/ccs
Identifying the Scan and Attack Infrastructures Behind Amplification DDoS Attacks.
Johannes Krupp
Michael Backes
Christian Rossow
2016
conf/ccs
RamCrypt: Kernel-based Address Space Encryption for User-mode Processes.
Johannes Götzfried
Tilo Müller
Gabor Drescher
Stefan Nürnberger
Michael Backes
2016
conf/ccs
R-Droid: Leveraging Android App Analysis with Static Slice Optimization.
Michael Backes
Sven Bugiel
Erik Derr
Sebastian Gerling
Christian Hammer
2016
conf/ccs
Efficient Cryptographic Password Hardening Services from Partially Oblivious Commitments.
Jonas Schneider
Nils Fleischhacker
Dominique Schröder
Michael Backes
2016
conf/ccs
Reliable Third-Party Library Detection in Android and its Security Applications.
Michael Backes
Sven Bugiel
Erik Derr
2016
conf/ccs
POSTER: Mapping the Landscape of Large-Scale Vulnerability Notifications.
Ben Stock
Giancarlo Pellegrino
Christian Rossow
Martin Johns
Michael Backes
2016
conf/ccs
POSTER: The ART of App Compartmentalization.
Michael Backes
Sven Bugiel
Jie Huang
Oliver Schranz
2016
conf/uss
What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions of JIT-ROP Defenses.
Giorgi Maisuradze
Michael Backes
Christian Rossow
2016
conf/uss
On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis.
Michael Backes
Sven Bugiel
Erik Derr
Patrick D. McDaniel
Damien Octeau
Sebastian Weisgerber
2016
conf/uss
Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification.
Ben Stock
Giancarlo Pellegrino
Christian Rossow
Martin Johns
Michael Backes
2016
conf/uss
Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles.
Michael Backes
Pascal Berrang
Anna Hecksteden
Mathias Humbert
Andreas Keller
Tim Meyer
2016
conf/sp
SoK: Lessons Learned from Android Security Research for Appified Software Platforms.
Yasemin Acar
Michael Backes
Sven Bugiel
Sascha Fahl
Patrick D. McDaniel
Matthew Smith
2016
conf/sp
You Get Where You're Looking for: The Impact of Information Sources on Code Security.
Yasemin Acar
Michael Backes
Sascha Fahl
Doowon Kim
Michelle L. Mazurek
Christian Stransky
2016
conf/esorics
Anonymous RAM.
Michael Backes
Amir Herzberg
Aniket Kate
Ivan Pryvalov
2016
conf/ndss
How to Make ASLR Win the Clone Wars: Runtime Re-Randomization.
Kangjie Lu
Wenke Lee
Stefan Nürnberger
Michael Backes
2016
conf/pkc
Delegatable Functional Signatures.
Michael Backes
Sebastian Meiser
Dominique Schröder
2015
conf/ccs
Fully Secure Inner-Product Proxy Re-Encryption with Constant Size Ciphertext.
Michael Backes
Martin Gagné
Sri Aravinda Krishnan Thyagarajan
2015
conf/ccs
POSTER: Towards Compiler-Assisted Taint Tracking on the Android Runtime (ART).
Michael Backes
Oliver Schranz
Philipp von Styp-Rekowsky
2015
conf/ccs
POSTER: In the Net of the Spider: Measuring the Anonymity-Impact of Network-level Adversaries Against Tor.
Michael Backes
Simon Koch
Sebastian Meiser
Esfandiar Mohammadi
Christian Rossow
2015
conf/uss
Boxify: Full-fledged App Sandboxing for Stock Android.
Michael Backes
Sven Bugiel
Christian Hammer
Oliver Schranz
Philipp von Styp-Rekowsky
2015
conf/sp
ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data.
Michael Backes
Manuel Barbosa
Dario Fiore
Raphael M. Reischuk
2015
conf/acns
Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources.
Michael Backes
Aniket Kate
Sebastian Meiser
Tim Ruffing
2015
conf/acns
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
Milivoj Simeonovski
Fabian Bendun
Muhammad Rizwan Asghar
Michael Backes
Ninja Marnau
Peter Druschel
2015
conf/esorics
Computational Soundness for Interactive Primitives.
Michael Backes
Esfandiar Mohammadi
Tim Ruffing
2014
conf/ccs
(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection.
Michael Backes
Aniket Kate
Sebastian Meiser
Esfandiar Mohammadi
2014
conf/ccs
You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code.
Michael Backes
Thorsten Holz
Benjamin Kollenda
Philipp Koppe
Stefan Nürnberger
Jannik Pewny
2014
conf/uss
Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing.
Michael Backes
Stefan Nürnberger
2014
conf/acns
WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP.
Michael Backes
Rainer W. Gerling
Sebastian Gerling
Stefan Nürnberger
Dominique Schröder
Mark Simkin
2014
conf/acns
BackRef: Accountability in Anonymous Communication Networks.
Michael Backes
Jeremy Clark
Aniket Kate
Milivoj Simeonovski
Peter Druschel
2014
conf/acsac
Android security framework: extensible multi-layered access control on Android.
Michael Backes
Sven Bugiel
Sebastian Gerling
Philipp von Styp-Rekowsky
2014
conf/acsac
Scippa: system-centric IPC provenance on Android.
Michael Backes
Sven Bugiel
Sebastian Gerling
2013
conf/ccs
Verifiable delegation of computation on outsourced data.
Michael Backes
Dario Fiore
Raphael M. Reischuk
2013
conf/esorics
AppGuard - Fine-Grained Policy Enforcement for Untrusted Android Applications.
Michael Backes
Sebastian Gerling
Christian Hammer
Matteo Maffei
Philipp von Styp-Rekowsky
2013
conf/esorics
Privacy-Preserving Accountable Computation.
Michael Backes
Dario Fiore
Esfandiar Mohammadi
2013
conf/esorics
Differentially Private Smart Metering with Battery Recharging.
Michael Backes
Sebastian Meiser
2013
conf/ndss
Preventing Side-Channel Leaks in Web Traffic: A Formal Approach.
Michael Backes
Goran Doychev
Boris Köpf
2013
conf/ctrsa
Asynchronous Computational VSS with Reduced Communication Complexity.
Michael Backes
Amit Datta
Aniket Kate
2012
conf/ccs
Adding query privacy to robust DHTs.
Michael Backes
Ian Goldberg
Aniket Kate
Tomas Toft
2012
conf/ccs
Computational soundness without protocol restrictions.
Michael Backes
Ankit Malik
Dominique Unruh
2012
conf/sp
ObliviAd: Provably Secure and Practical Online Behavioral Advertising.
Michael Backes
Aniket Kate
Matteo Maffei
Kim Pecina
2012
conf/ndss
Automated Synthesis of Secure Distributed Applications.
Michael Backes
Matteo Maffei
Kim Pecina
2011
conf/ccs
Non-uniform distributions in quantitative information-flow.
Michael Backes
Matthias Berg
Boris Köpf
2011
conf/ndss
A Security API for Distributed Social Networks.
Michael Backes
Matteo Maffei
Kim Pecina
2011
conf/asiacrypt
Computational Verifiable Secret Sharing Revisited.
Michael Backes
Aniket Kate
Arpita Patra
2010
conf/ccs
Computationally sound verification of source code.
Michael Backes
Matteo Maffei
Dominique Unruh
2010
conf/uss
Acoustic Side-Channel Attacks on Printers.
Michael Backes
Markus Dürmuth
Sebastian Gerling
Manfred Pinkal
Caroline Sporleder
2010
conf/esorics
Speaker Recognition in Encrypted Voice Streams.
Michael Backes
Goran Doychev
Markus Dürmuth
Boris Köpf
2010
conf/esorics
RatFish: A File Sharing Protocol Provably Secure against Rational Users.
Michael Backes
Oana Ciobotaru
Anton Krohmer
2009
conf/ccs
CoSP: a general framework for computational soundness proofs.
Michael Backes
Dennis Hofheinz
Dominique Unruh
2009
conf/sp
Automatic Discovery and Quantification of Information Leaks.
Michael Backes
Boris Köpf
Andrey Rybalchenko
2009
conf/sp
Tempest in a Teapot: Compromising Reflections Revisited.
Michael Backes
Tongbo Chen
Markus Dürmuth
Hendrik P. A. Lensch
Martin Welk
2009
conf/ndss
CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable.
Michael Backes
Peter Druschel
Andreas Haeberlen
Dominique Unruh
2008
conf/ccs
Type-checking zero-knowledge.
Michael Backes
Catalin Hritcu
Matteo Maffei
2008
conf/sp
Compromising Reflections-or-How to Read LCD Monitors around the Corner.
Michael Backes
Markus Dürmuth
Dominique Unruh
2008
conf/sp
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol.
Michael Backes
Matteo Maffei
Dominique Unruh
2008
conf/esorics
Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks.
Michael Backes
Boris Köpf
2008
conf/asiacrypt
OAEP Is Secure under Key-Dependent Messages.
Michael Backes
Markus Dürmuth
Dominique Unruh
2008
conf/asiacrypt
Limits of Constructive Security Proofs.
Michael Backes
Dominique Unruh
2007
conf/ccs
A calculus of challenges and responses.
Michael Backes
Agostino Cortesi
Riccardo Focardi
Matteo Maffei
2007
conf/sp
Information Flow in the Peer-Reviewing Process.
Michael Backes
Markus Dürmuth
Dominique Unruh
2007
conf/tcc
On the Necessity of Rewinding in Secure Multiparty Computation.
Michael Backes
Jörn Müller-Quade
Dominique Unruh
2006
conf/ccs
Computationally sound secrecy proofs by mechanized flow analysis.
Michael Backes
Peeter Laud
2006
conf/sec
On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol.
Michael Backes
Birgit Pfitzmann
2006
conf/esorics
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes.
Michael Backes
Birgit Pfitzmann
Michael Waidner
2006
conf/esorics
Conditional Reactive Simulatability.
Michael Backes
Markus Dürmuth
Dennis Hofheinz
Ralf Küsters
2006
conf/esorics
Secure Key-Updating for Lazy Revocation.
Michael Backes
Christian Cachin
Alina Oprea
2006
conf/esorics
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos.
Michael Backes
Iliano Cervesato
Aaron D. Jaggard
Andre Scedrov
Joe-Kai Tsay
2005
conf/ccs
On fairness in simulatability-based cryptographic systems.
Michael Backes
Dennis Hofheinz
Jörn Müller-Quade
Dominique Unruh
2005
conf/sp
Relating Symbolic and Cryptographic Secrecy.
Michael Backes
Birgit Pfitzmann
2005
conf/esorics
Quantifying Probabilistic Information Flow in Computational Reactive Systems.
Michael Backes
2005
conf/esorics
Limits of the Cryptographic Realization of Dolev-Yao-Style XOR.
Michael Backes
Birgit Pfitzmann
2005
conf/tcc
Public-Key Steganography with Active Attacks.
Michael Backes
Christian Cachin
2004
conf/esorics
A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol.
Michael Backes
2004
conf/esorics
An Algebra for Composing Enterprise Privacy Policies.
Michael Backes
Markus Dürmuth
Rainer Steinwandt
2004
conf/tcc
A General Composition Theorem for Secure Reactive Systems.
Michael Backes
Birgit Pfitzmann
Michael Waidner
2003
conf/ccs
A composable cryptographic library with nested operations.
Michael Backes
Birgit Pfitzmann
Michael Waidner
2003
conf/ccs
Relating cryptography and formal methods: a panel.
Michael Backes
Catherine Meadows
John C. Mitchell
2003
conf/nspw
From absence of certain vulnerabilities towards security proofs: pushing the limits of formal verification.
Michael Backes
Matthias Schunter
2003
conf/sp
Intransitive Non-Interference for Cryptographic Purpose.
Michael Backes
Birgit Pfitzmann
2003
conf/esorics
A Toolkit for Managing Enterprise Privacy Policies.
Michael Backes
Birgit Pfitzmann
Matthias Schunter
2003
conf/esorics
Symmetric Authentication within a Simulatable Cryptographic Library.
Michael Backes
Birgit Pfitzmann
Michael Waidner
2003
conf/dsn
Reliable Broadcast in a Computational Hybrid Model with Byzantine Faults, Crashes, and Recoveries.
Michael Backes
Christian Cachin
2002
conf/esorics
Computational Probabilistic Non-interference.
Michael Backes
Birgit Pfitzmann
Coauthors
Aaron D. Jaggard
(1)
Ágnes Kiss
(1)
Agostino Cortesi
(1)
Ahmed Salem
(10)
Alfusainey Jallow
(1)
Alina Oprea
(1)
Alvise Rabitti
(1)
Amir Herzberg
(2)
Amit Datta
(1)
Andre Scedrov
(1)
Andreas Haeberlen
(1)
Andreas Keller
(1)
Andrey Rybalchenko
(1)
Aniket Kate
(9)
Ankit Malik
(1)
Anna Hecksteden
(1)
Anton Krohmer
(1)
Apratim Bhattacharya
(1)
Arpita Patra
(1)
Aurore Fass
(4)
Bartlomiej Surma
(1)
Battista Biggio
(2)
Ben Stock
(13)
Benjamin Kollenda
(1)
Birgit Pfitzmann
(10)
Boris Köpf
(5)
Boyang Zhang
(1)
Carl Herrmann
(1)
Caroline Sporleder
(1)
Catalin Hritcu
(1)
Catherine Meadows
(1)
Charles Weir
(1)
Chenxiong Qian
(1)
Christian Cachin
(3)
Christian Hammer
(3)
Christian Rossow
(9)
Christian Stransky
(5)
Cristian-Alexandru Staicu
(1)
Damien Octeau
(1)
Dan Boneh
(1)
Dario Fiore
(3)
David Pfaff
(1)
Dennis Hofheinz
(3)
Dillon Franke
(1)
Dingfan Chen
(1)
Dolière Francis Somé
(1)
Dominik Wermke
(2)
Dominique Schröder
(3)
Dominique Unruh
(11)
Doowon Kim
(3)
Duc Cuong Nguyen
(5)
Elissa M. Redmiles
(1)
Emiliano De Cristofaro
(2)
Eric Gong
(1)
Erik Derr
(7)
Esfandiar Mohammadi
(5)
Fabian Bendun
(1)
Fabian Yamaguchi
(1)
Felix Fischer
(1)
Forest Fraser
(1)
Frank Li
(1)
Gabor Drescher
(1)
Gang Wang
(1)
Gaspar Garcia Jr.
(1)
Giancarlo Pellegrino
(7)
Gianluca Stringhini
(2)
Giorgi Maisuradze
(2)
Goran Doychev
(2)
Hai Huang
(1)
Haiming Wang
(1)
Haixu Tang
(1)
Hendrik P. A. Lensch
(1)
Hongwei Li
(1)
Huang Xiao
(1)
Hung T. Nguyen
(1)
Ian Goldberg
(1)
Ian M. Molloy
(1)
Iliano Cervesato
(1)
Ilkan Esiyok
(1)
Inken Hagestedt
(2)
Irina Lehmann
(3)
Ivan Pryvalov
(3)
Jannik Dreier
(1)
Jannik Pewny
(1)
Jean Honorio
(1)
Jeremy Blackburn
(1)
Jeremy Clark
(1)
Jie Huang
(4)
Jilles Vreeken
(1)
Jiming Chen
(2)
Jinyuan Jia
(2)
Joe-Kai Tsay
(1)
Johannes Götzfried
(1)
Johannes Krupp
(1)
John C. Mitchell
(1)
Jonas Schneider
(3)
Jonas Schneider-Bensch
(1)
Jonathan Cogan
(1)
Jörg Hoffmann
(1)
Jörn Müller-Quade
(2)
Jun Pang
(1)
Kamil Kluczniak
(2)
Kangjie Lu
(3)
Katharina Krombholz
(2)
Kathrin Grosse
(3)
Kim Pecina
(3)
Konrad Rieck
(1)
Konstantin Böttinger
(1)
Lea Gröber
(1)
Lena Marie Budde
(1)
Lucjan Hanzlik
(6)
Lukas Bieringer
(1)
Malte Skoruppa
(1)
Manfred Pinkal
(1)
Manuel Barbosa
(1)
Marcel Steinmetz
(1)
Marcin Slowik
(1)
Marie-Therese Walter
(1)
Mario Fritz
(5)
Marius Steffens
(1)
Mark Simkin
(1)
Markus Demmel
(1)
Markus Dürmuth
(8)
Marten Oltrogge
(2)
Martin Gagné
(1)
Martin Johns
(4)
Martin Welk
(1)
Marvin Moog
(1)
Marvin WiBfeld
(1)
Mathias Humbert
(14)
Matteo Maffei
(8)
Matthew Smith
(1)
Matthias Berg
(1)
Matthias Bieg
(1)
Matthias Schunter
(2)
Meng Xu
(1)
Michael Backes
(181)
Michael Schilling
(5)
Michael Waidner
(4)
Michaela Neumayr
(1)
Michelle L. Mazurek
(3)
Milivoj Simeonovski
(3)
Min Chen
(5)
Mingjie Li
(1)
Mohammad Nauman
(1)
Muhammad Rizwan Asghar
(1)
Nataniel P. Borges Jr.
(1)
Neil Zhenqiang Gong
(3)
Nico Döttling
(1)
Nicolas Huaman
(1)
Nicolas Papernot
(1)
Nils Fleischhacker
(1)
Ning Yu
(2)
Ninghui Li
(1)
Ninja Marnau
(2)
Oana Ciobotaru
(1)
Oliver Schranz
(5)
Pascal Berrang
(11)
Patrick D. McDaniel
(3)
Patrick Speicher
(1)
Peeter Laud
(1)
Peh Chang Wei Brandon
(1)
Peter Druschel
(3)
Philipp Koppe
(1)
Philipp von Styp-Rekowsky
(6)
Praveen Manoharan
(3)
Qi Li
(1)
Qingni Shen
(1)
Rainer Steinwandt
(1)
Rainer W. Gerling
(1)
Ralf Küsters
(1)
Raphael M. Reischuk
(2)
Riccardo Focardi
(1)
Robert Künnemann
(4)
Roland Eils
(3)
Rui Wen
(6)
Rui Zhang
(1)
Saba Eskandarian
(1)
Sabrina Amft
(1)
Sanam Ghorbani Lyastani
(3)
Sascha Fahl
(10)
Savvas Zannettou
(3)
Sawyer Birnbaum
(1)
Sazzadur Rahaman
(1)
Sebastian Gerling
(6)
Sebastian Meiser
(6)
Sebastian Roth
(3)
Sebastian Weisgerber
(2)
Shannon Pierson
(1)
Shibo He
(2)
Shiqing Ma
(2)
Simon Koch
(2)
Simson L. Garfinkel
(2)
Sri Aravinda Krishnan Thyagarajan
(1)
Stefan Nümberger
(1)
Stefan Nürnberger
(5)
Stefano Calzavara
(1)
Steve Kremer
(1)
Sven Bugiel
(22)
Taesoo Kim
(1)
Taesung Lee
(1)
Taresh K. Sethi
(1)
Thorsten Holz
(1)
Tianhao Wang
(5)
Tilo Müller
(1)
Tim Meyer
(1)
Tim Ruffing
(2)
Ting Yu
(1)
Tomas Toft
(1)
Tongbo Chen
(1)
Trung Tin Nguyen
(4)
Vishal Subbiah
(1)
Wai Man Si
(2)
Wenbo Jiang
(1)
Wenke Lee
(2)
XiaoFeng Wang
(1)
Xiaoyi Chen
(1)
Xinlei He
(8)
Xinyue Shen
(6)
Yang Zhang
(43)
Yasemin Acar
(9)
Yicong Tan
(2)
Yiting Qu
(4)
Yixin Wu
(3)
Yiyong Liu
(2)
Youngja Park
(1)
Yuan Zhang
(1)
Yufei Han
(1)
Yugeng Liu
(2)
Yun Shen
(11)
Yusra Elbitar
(1)
Zeyang Sha
(1)
Zeyuan Chen
(2)
Zheng Li
(5)
Zhengyu Zhao
(1)
Zhikun Zhang
(10)
Zhonghai Wu
(1)
Ziqing Yang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to