What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Alexandra Dmitrienko
Google Scholar
43
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sec
Impact Analysis of Sybil Attacks in the Tor Network.
Christoph Sendner
Dominik Schreider
Alexandra Dmitrienko
2025
conf/sec
Time-Aware Face Anti-spoofing with Rotation Invariant Local Binary Patterns and Deep Learning.
Moritz Finke
Alexandra Dmitrienko
2025
conf/host
RLFuzz: Accelerating Hardware Fuzzing with Deep Reinforcement Learning.
Raphael Götz
Christoph Sendner
Nico Ruck
Mohamadreza Rostami
Alexandra Dmitrienko
Ahmad-Reza Sadeghi
2025
conf/asiaccs
AuthentiSafe: Lightweight and Future-Proof Device-to-Device Authentication for IoT.
Lukas Petzi
Torsten Krauß
Alexandra Dmitrienko
Gene Tsudik
2025
conf/uss
TwinBreak: Jailbreaking LLM Security Alignments based on Twin Prompts.
Torsten Krauß
Hamid Dashtbani
Alexandra Dmitrienko
2024
conf/uss
Verify your Labels! Trustworthy Predictions and Datasets via Confidence Scores.
Torsten Krauß
Jasper Stang
Alexandra Dmitrienko
2024
conf/uss
ClearStamp: A Human-Visible and Robust Model-Ownership Proof based on Transposed Model Training.
Torsten Krauß
Jasper Stang
Alexandra Dmitrienko
2024
conf/sp
PUF-Based Authentication in IoT Against Strong Physical Adversary Using Zero-Knowledge Proofs.
Lukas Petzi
Alexandra Dmitrienko
Ivan Visconti
2024
conf/sp
Large-Scale Study of Vulnerability Scanners for Ethereum Smart Contracts.
Christoph Sendner
Lukas Petzi
Jasper Stang
Alexandra Dmitrienko
2024
conf/asiaccs
Cloud-Based Machine Learning Models as Covert Communication Channels.
Torsten Krauß
Jasper Stang
Alexandra Dmitrienko
2024
conf/asiaccs
Federated Learning Security: From Dusk to Dawn.
Alexandra Dmitrienko
2024
conf/ndss
CrowdGuard: Federated Backdoor Detection in Federated Learning.
Phillip Rieger
Torsten Krauß
Markus Miettinen
Alexandra Dmitrienko
Ahmad-Reza Sadeghi
2024
conf/ndss
MirageFlow: A New Bandwidth Inflation Attack on Tor.
Christoph Sendner
Jasper Stang
Alexandra Dmitrienko
Raveen Wijewickrama
Murtuza Jadliwala
2024
conf/ndss
FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated Learning.
Hossein Fereidooni
Alessandro Pegoraro
Phillip Rieger
Alexandra Dmitrienko
Ahmad-Reza Sadeghi
2024
conf/ndss
Automatic Adversarial Adaption for Stealthy Poisoning Attacks in Federated Learning.
Torsten Krauß
Jan König
Alexandra Dmitrienko
Christian Kanzow
2023
conf/ccs
MESAS: Poisoning Defense for Federated Learning Resilient against Adaptive Attackers.
Torsten Krauß
Alexandra Dmitrienko
2023
conf/esorics
Security of NVMe Offloaded Data in Large-Scale Machine Learning.
Torsten Krauß
Raphael Götz
Alexandra Dmitrienko
2023
conf/ndss
AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms.
Hossein Fereidooni
Jan König
Phillip Rieger
Marco Chilese
Bora Gökbakan
Moritz Finke
Alexandra Dmitrienko
Ahmad-Reza Sadeghi
2023
conf/ndss
Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning.
Christoph Sendner
Huili Chen
Hossein Fereidooni
Lukas Petzi
Jan König
Jasper Stang
Alexandra Dmitrienko
Ahmad-Reza Sadeghi
Farinaz Koushanfar
2022
conf/uss
SCRAPS: Scalable Collective Remote Attestation for Pub-Sub IoT Networks with Untrusted Proxy Verifier.
Lukas Petzi
Ala Eddine Ben Yahya
Alexandra Dmitrienko
Gene Tsudik
Thomas Prantl
Samuel Kounev
2022
conf/cns
Ransomware Detection in Databases through Dynamic Analysis of Query Sequences.
Christoph Sendner
Lukas Iffländer
Sebastian Schindler
Michael Jobst
Alexandra Dmitrienko
Samuel Kounev
2022
conf/ndss
FedCRI: Federated Mobile Cyber-Risk Intelligence.
Hossein Fereidooni
Alexandra Dmitrienko
Phillip Rieger
Markus Miettinen
Ahmad-Reza Sadeghi
Felix Madlener
2021
conf/ndss
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers.
Christoph Hagen
Christian Weinert
Christoph Sendner
Alexandra Dmitrienko
Thomas Schneider
2021
conf/wisec
RIP StrandHogg: a practical StrandHogg attack detection method on Android.
Jasper Stang
Alexandra Dmitrienko
Sascha Roth
2020
conf/esorics
LegIoT: Ledgered Trust Management Platform for IoT.
Jens Neureither
Alexandra Dmitrienko
David Koisser
Ferdinand Brasser
Ahmad-Reza Sadeghi
2019
conf/acsac
DR.SGX: automated and adjustable side-channel protection for SGX using data location randomization.
Ferdinand Brasser
Srdjan Capkun
Alexandra Dmitrienko
Tommaso Frassetto
Kari Kostiainen
Ahmad-Reza Sadeghi
2018
conf/acsac
SmarTor: Smarter Tor with Smart Contracts: Improving resilience of topology distribution in the Tor network.
André Greubel
Alexandra Dmitrienko
Samuel Kounev
2017
journals/popets
Phonion: Practical Protection of Metadata in Telephony Networks.
Stephan Heuser
Bradley Reaves
Praveen Kumar Pendyala
Henry Carter
Alexandra Dmitrienko
William Enck
Negar Kiyavash
Ahmad-Reza Sadeghi
Patrick Traynor
2017
conf/ccs
Secure Wallet-Assisted Offline Bitcoin Payments with Double-Spender Revocation.
Alexandra Dmitrienko
David Noack
Moti Yung
2015
conf/fc
Market-Driven Code Provisioning to Mobile Secure Hardware.
Alexandra Dmitrienko
Stephan Heuser
Thien Duc Nguyen
Marcos da Silva Ramos
Andre Rein
Ahmad-Reza Sadeghi
2014
conf/fc
On the (In)Security of Mobile Two-Factor Authentication.
Alexandra Dmitrienko
Christopher Liebchen
Christian Rossow
Ahmad-Reza Sadeghi
2014
conf/fc
On Offline Payments with Bitcoin (Poster Abstract).
Alexandra Dmitrienko
David Noack
Ahmad-Reza Sadeghi
Moti Yung
2013
conf/ccs
Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARM.
Lucas Vincenzo Davi
Alexandra Dmitrienko
Stefan Nürnberger
Ahmad-Reza Sadeghi
2013
conf/sp
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization.
Kevin Z. Snow
Fabian Monrose
Lucas Davi
Alexandra Dmitrienko
Christopher Liebchen
Ahmad-Reza Sadeghi
2013
conf/acns
CrowdShare: Secure Mobile Resource Sharing.
N. Asokan
Alexandra Dmitrienko
Marcin Nagy
Elena Reshetova
Ahmad-Reza Sadeghi
Thomas Schneider
Stanislaus Stelle
2013
conf/acsac
Do I know you?: efficient and privacy-preserving common friend-finder protocols and applications.
Marcin Nagy
Emiliano De Cristofaro
Alexandra Dmitrienko
N. Asokan
Ahmad-Reza Sadeghi
2012
conf/ndss
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
Lucas Davi
Alexandra Dmitrienko
Manuel Egele
Thomas Fischer
Thorsten Holz
Ralf Hund
Stefan Nürnberger
Ahmad-Reza Sadeghi
2012
conf/ndss
Towards Taming Privilege-Escalation Attacks on Android.
Sven Bugiel
Lucas Davi
Alexandra Dmitrienko
Thomas Fischer
Ahmad-Reza Sadeghi
Bhargava Shastry
2011
conf/ccs
Practical and lightweight domain isolation on Android.
Sven Bugiel
Lucas Davi
Alexandra Dmitrienko
Stephan Heuser
Ahmad-Reza Sadeghi
Bhargava Shastry
2011
conf/ccs
Poster: the quest for security against privilege escalation attacks on android.
Sven Bugiel
Lucas Davi
Alexandra Dmitrienko
Thomas Fischer
Ahmad-Reza Sadeghi
Bhargava Shastry
2011
conf/ccs
Trusted virtual domains on OKL4: secure information sharing on smartphones.
Lucas Davi
Alexandra Dmitrienko
Christoph Kowalski
Marcel Winandy
2011
conf/ccs
Poster: control-flow integrity for smartphones.
Lucas Davi
Alexandra Dmitrienko
Manuel Egele
Thomas Fischer
Thorsten Holz
Ralf Hund
Stefan Nürnberger
Ahmad-Reza Sadeghi
2010
conf/ccs
Return-oriented programming without returns.
Stephen Checkoway
Lucas Davi
Alexandra Dmitrienko
Ahmad-Reza Sadeghi
Hovav Shacham
Marcel Winandy
Coauthors
Ahmad-Reza Sadeghi
(22)
Ala Eddine Ben Yahya
(1)
Alessandro Pegoraro
(1)
Alexandra Dmitrienko
(43)
André Greubel
(1)
Andre Rein
(1)
Bhargava Shastry
(3)
Bora Gökbakan
(1)
Bradley Reaves
(1)
Christian Kanzow
(1)
Christian Rossow
(1)
Christian Weinert
(1)
Christoph Hagen
(1)
Christoph Kowalski
(1)
Christoph Sendner
(7)
Christopher Liebchen
(2)
David Koisser
(1)
David Noack
(2)
Dominik Schreider
(1)
Elena Reshetova
(1)
Emiliano De Cristofaro
(1)
Fabian Monrose
(1)
Farinaz Koushanfar
(1)
Felix Madlener
(1)
Ferdinand Brasser
(2)
Gene Tsudik
(2)
Hamid Dashtbani
(1)
Henry Carter
(1)
Hossein Fereidooni
(4)
Hovav Shacham
(1)
Huili Chen
(1)
Ivan Visconti
(1)
Jan König
(3)
Jasper Stang
(7)
Jens Neureither
(1)
Kari Kostiainen
(1)
Kevin Z. Snow
(1)
Lucas Davi
(8)
Lucas Vincenzo Davi
(1)
Lukas Iffländer
(1)
Lukas Petzi
(5)
Manuel Egele
(2)
Marcel Winandy
(2)
Marcin Nagy
(2)
Marco Chilese
(1)
Marcos da Silva Ramos
(1)
Markus Miettinen
(2)
Michael Jobst
(1)
Mohamadreza Rostami
(1)
Moritz Finke
(2)
Moti Yung
(2)
Murtuza Jadliwala
(1)
N. Asokan
(2)
Negar Kiyavash
(1)
Nico Ruck
(1)
Patrick Traynor
(1)
Phillip Rieger
(4)
Praveen Kumar Pendyala
(1)
Ralf Hund
(2)
Raphael Götz
(2)
Raveen Wijewickrama
(1)
Samuel Kounev
(3)
Sascha Roth
(1)
Sebastian Schindler
(1)
Srdjan Capkun
(1)
Stanislaus Stelle
(1)
Stefan Nürnberger
(3)
Stephan Heuser
(3)
Stephen Checkoway
(1)
Sven Bugiel
(3)
Thien Duc Nguyen
(1)
Thomas Fischer
(4)
Thomas Prantl
(1)
Thomas Schneider
(2)
Thorsten Holz
(2)
Tommaso Frassetto
(1)
Torsten Krauß
(9)
William Enck
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to