20052019
If you made any changes in Pure these will be visible here soon.

Research Output 2005 2019

  • 23 Conference contribution
  • 3 Article
  • 2 PhD Thesis - Research external, graduation external
  • 1 Paper
2019

BACRank: Ranking building automation and control system components by business continuity impact

Esquivel-Vargas, H., Caselli, M., Tews, E., Bucur, D. & Peter, A., 8 Aug 2019, Computer Safety, Reliability, and Security: 38th International Conference, SAFECOMP 2019, Proceedings. Romanovsky, A., Troubitsyna, E. & Bitsch, F. (eds.). Springer Verlag, p. 183-199 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11698 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Automation
Ranking
Control System
Control systems
Industry
2018

Introducing the Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics

Mayoral Vilches, V., Alzola Kirschgens, L., Bilbao Calvo, A., Hernández Cordero, A., Izquierdo Pisón, R., Mayoral Vilches, D., Muñiz Rosas, A., Olalde Mendia, G., Usategi San Juan, L., Zamalloa Ugarte, I., Gil-Uriarte, E., Tews, E. & Peter, A., 2018.

Research output: Contribution to conferencePaperAcademicpeer-review

2016
3 Citations (Scopus)
2 Downloads (Pure)

Disguised Chromium Browser: Robust Browser, Flash and Canvas Fingerprinting Protection

Baumann, P., Katzenbeisser, S., Stopczynski, M. & Tews, E., 2016, WPES '16. Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society. Association for Computing Machinery (ACM), p. 37-46 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Chromium
Defects
2 Citations (Scopus)

On the Privacy and Performance of Mobile Anonymous Microblogging

Senftleben, M., Barroso, A., Bucicoiu, M., Hollick, M., Katzenbeisser, S. & Tews, E., 2016, In : IEEE transactions on information forensics and security. 11, 7, p. 1578-1591 14 p.

Research output: Contribution to journalArticleAcademicpeer-review

4 Citations (Scopus)

Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet

Schulz, M., Klapper, P., Hollick, M., Tews, E. & Katzenbeisser, S., 2016, WiSec '16. Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks. Association for Computing Machinery (ACM), p. 43-48 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Ethernet
Wire
Cables
Home networks
Electromagnetic waves
2014
10 Citations (Scopus)

A privacy protection system for HbbTV in Smart TVs

Ghiglieri, M. & Tews, E., 2014, 2014 IEEE 11th Consumer Communications and Networking Conference 2014. IEEE, p. 357-362 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Radio stations
Internet
Set-top boxes
Consumer behavior
Local area networks

IT-Security in Railway Signalling Systems

Schlehuber, C., Tews, E. & Katzenbeisser, S., 2014, ISSE 2014 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2014 Conference. Reimer, H., Pohlmann, N. & Schneider, W. (eds.). Springer, p. 56-64 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Critical infrastructures
Risk analysis
Security systems
Rails
Automation
6 Citations (Scopus)

MoP-2-MoP - Mobile Private Microblogging

Senftleben, M., Bucicoiu, M., Tews, E., Armknecht, F., Katzenbeisser, S. & Sadeghi, A-R., 2014, Financial Cryptography and Data Security: 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers. Christin, N. & Safavi-Naini, R. (eds.). Springer, p. 384-396 13 p. (Lecture Notes in Computer Science; vol. 8437).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Radio links
Peer to peer networks
Smartphones
Cryptography
Synchronization
13 Citations (Scopus)

Privacy preserving whole genome sequence processing through proxy-aided ORAM

Karvelas, N. P., Peter, A., Katzenbeisser, S., Tews, E., Tews, E. & Hamacher, K., 2014, 13th Annual ACM Workshop on Privacy in the Electronic Society (WPES 2014). New York: Association for Computing Machinery (ACM), p. 1-10 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

56 Downloads (Pure)

Quantitative Ansätze zur IT-Risikoanalyse

Tews, E. & Schlehuber, C., 2014, Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit. Katzenbeisser, S., Lotz, V. & Weippl, E. R. (eds.). Nederlands Centrum Geestelijke Volksgezondheid, Vol. 228. p. 293-303 11 p. (LNI).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
3 Downloads (Pure)

Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks

Meyer, C., Somorovsky, J., Weiss, E., Schwenk, J., Schinzel, S. & Tews, E., 2014, Proceedings of the 23rd USENIX Security Symposium. p. 733-748 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Switching networks
Particle accelerators
Hardware security
2013
62 Citations (Scopus)

Efficiently outsourcing multiparty computation under multiple keys

Peter, A., Tews, E., Tews, E. & Katzenbeisser, S., 1 Nov 2013, In : IEEE transactions on information forensics and security. 8, 12, p. 2046-2058 13 p.

Research output: Contribution to journalArticleAcademicpeer-review

2 Citations (Scopus)
1 Downloads (Pure)

Security analysis of a widely deployed locking system

Weiner, M., Massar, M., Tews, E., Giese, D. & Wieser, W., 2013, 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013. Sadeghi, A-R., Gligor, V. D. & Yung, M. (eds.). Association for Computing Machinery (ACM), p. 929-940 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Defects
Access control
Cryptography
Side channel attack
2012
2 Downloads (Pure)

DECT security analysis

Tews, E., May 2012, Darmstadt: TU-Prints. 75 p.

Research output: ThesisPhD Thesis - Research external, graduation externalAcademic

Open Access
File
Cordless telephones
Authentication
2011
3 Citations (Scopus)
548 Downloads (Pure)

Breaking DVB-CSA

Tews, E., Wälde, J. & Weiner, M., 2011, Research in Cryptology: 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers. Armknecht, F. & Lucks, S. (eds.). Springer, p. 45-61 17 p. (Lecture Notes in Computer Science; vol. 7242).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Digital video broadcasting (DVB)
Digital television
Cryptography
Entropy
Hardware
6 Citations (Scopus)

Interactive decryption of DECT phone calls

McHardy, P., Schuler, A. & Tews, E., 2011, Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011. Gollmann, D., Westhoff, D., Tsudik, G. & Asokan, N. (eds.). Association for Computing Machinery (ACM), p. 71-78 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2010
13 Citations (Scopus)

Cryptanalysis of the DECT Standard Cipher

Nohl, K., Tews, E. & Weinmann, R-P., 2010, Fast Software Encryption: 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers. Hong, S. & Iwata, T. (eds.). Berlin: Springer, p. 1-18 18 p. (Lecture Notes in Computer Science; vol. 6147).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Cordless telephones
Firmware
Computer hardware
4 Citations (Scopus)

FPGA Implementation of an Improved Attack against the DECT Standard Cipher

Weiner, M., Tews, E., Heinz, B. & Heyszl, J., 2010, Information Security and Cryptology - ICISC 2010: 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers. Rhee, K. H. & Nyang, D. (eds.). Berlin: Springer, p. 177-188 12 p. (Lecture Notes in Computer Science; vol. 6829).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Cordless telephones
Field programmable gate arrays (FPGA)
Linear equations
Costs

Kann man mit DECT noch vertraulich telefonieren?

Nohl, K. & Tews, E., 2010, In : Datenschutz und Datensicherheit. 34, 11, p. 758-760 3 p.

Research output: Contribution to journalArticleProfessional

2009
12 Citations (Scopus)

Attacks on the DECT Authentication Mechanisms

Lucks, S., Schuler, A., Tews, E., Weinmann, R-P. & Wenzel, M., 2009, Topics in Cryptology - CT-RSA 2009: The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings. Fischlin, M. (ed.). Berlin: Springer, p. 48-65 18 p. (Lecture Notes in Computer Science; vol. 5473).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

98 Citations (Scopus)

Practical attacks against WEP and WPA

Tews, E. & Beck, M., 2009, Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009. Basin, D. A., Capkun, S. & Lee, W. (eds.). Association for Computing Machinery (ACM), p. 79-86 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2008
1 Citation (Scopus)

Describing Data Format Exploits Using Bitstream Segment Graphs

Hartle, M., Schumann, D., Botchak, A., Tews, E. & Mühlhäuser, M., 2008, The Third International Multi-Conference on Computing in the Global Information Technology, ICCGI 2008. Piscataway, NJ: IEEE, p. 119-124 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Firmware
Processing
42 Citations (Scopus)

Side Channels in the McEliece PKC

Strenzke, F., Tews, E., Molter, H. G., Overbeck, R. & Shoufan, A., 2008, Post-Quantum Cryptography: Second International Workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008, Proceedings. Buchmann, J. A. & Ding, J. (eds.). Berlin: Springer, p. 216-229 14 p. (Lecture Notes in Computer Science; vol. 5299).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Cryptography
Quantum computers
Side channel attack
2007
17 Downloads (Pure)

Attacks on the WEP protocol

Tews, E., 15 Dec 2007, TU Darmstadt.

Research output: ThesisPhD Thesis - Research external, graduation externalAcademic

Open Access
File
79 Citations (Scopus)
9 Downloads (Pure)

Breaking 104 Bit WEP in Less Than 60 Seconds

Tews, E., Weinmann, R-P. & Pyshkin, A., 2007, Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers. Kim, S., Yung, M. & Lee, H-W. (eds.). Berlin: Springer, p. 188-202 15 p. (Lecture Notes in Computer Science; vol. 4867).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Program processors
Network protocols
Recovery

Security of Invertible Media Authentication Schemes Revisited

Dönigus, D., Endler, S., Fischlin, M., Hülsing, A., Jäger, P., Lehmann, A., Podrazhansky, S., Schipp, S., Tews, E., Vowe, S., Walthart, M. & Weidemann, F., 2007, Information Hiding: 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers. Furon, T., Cayre, F., Doërr, G. J. & Bas, P. (eds.). Berlin: Springer, p. 189-203 15 p. (Lecture Notes in Computer Science; vol. 4567).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Authentication
Cryptography
Hoppers
Medical applications
Repair
2006
6 Citations (Scopus)

Bluetooth Interaction Support in Lectures

Bär, H., Rößling, G., Tews, E. & Lecher, E., 2006, Proceedings of the IADIS International Conference Mobile learning 2006. Isaías, P., Kommers, P. & Sánchez, I. A. (eds.). IADIS, p. 360-364 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Bluetooth
Students
Global system for mobile communications
Mobile phones
2005

Improving Feedback and Classroom Interaction Using Mobile Phones

Bär, H., Tews, E. & Rößling, G., 2005, Mobile Learning 2005 Proceedings: Proceedings of the IADIS International Conference on Mobile Learning . Isaías, P., Borg, C., Kommers, P. & Bonanno, P. (eds.).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
4 Downloads (Pure)

Interaction during lectures using mobile phones

Bär, H., Mühlhäuser, M., Tews, E. & Rößling, G., 2005, Proceedings of ED-Media 2005, World Conference on Educational Multimedia, Hypermedia & Telecommunications: June 27 - July 2, 2005 Montréal, Canada. Kommers, P. (ed.). Association for the Advancement of Computing in Education, p. 3767-3772 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Mobile phones
Students
Personal digital assistants
Concretes
Costs