Erik Tews

Dr.-Ing.

20052019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

  • 23 Conference contribution
  • 3 Article
  • 2 PhD Thesis - Research external, graduation external
  • 1 Paper
2019

BACRank: Ranking building automation and control system components by business continuity impact

Esquivel-Vargas, H., Caselli, M., Tews, E., Bucur, D. & Peter, A., 8 Aug 2019, Computer Safety, Reliability, and Security: 38th International Conference, SAFECOMP 2019, Proceedings. Romanovsky, A., Troubitsyna, E. & Bitsch, F. (eds.). Springer Verlag, p. 183-199 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11698 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2018

Introducing the Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics

Mayoral Vilches, V., Alzola Kirschgens, L., Bilbao Calvo, A., Hernández Cordero, A., Izquierdo Pisón, R., Mayoral Vilches, D., Muñiz Rosas, A., Olalde Mendia, G., Usategi San Juan, L., Zamalloa Ugarte, I., Gil-Uriarte, E., Tews, E. & Peter, A., 2018.

Research output: Contribution to conferencePaper

2016

Disguised Chromium Browser: Robust Browser, Flash and Canvas Fingerprinting Protection

Baumann, P., Katzenbeisser, S., Stopczynski, M. & Tews, E., 2016, WPES '16. Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society. Association for Computing Machinery (ACM), p. 37-46 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)
2 Downloads (Pure)

On the Privacy and Performance of Mobile Anonymous Microblogging

Senftleben, M., Barroso, A., Bucicoiu, M., Hollick, M., Katzenbeisser, S. & Tews, E., 2016, In : IEEE transactions on information forensics and security. 11, 7, p. 1578-1591 14 p.

Research output: Contribution to journalArticleAcademicpeer-review

2 Citations (Scopus)

Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet

Schulz, M., Klapper, P., Hollick, M., Tews, E. & Katzenbeisser, S., 2016, WiSec '16. Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks. Association for Computing Machinery (ACM), p. 43-48 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

7 Citations (Scopus)
2014

A privacy protection system for HbbTV in Smart TVs

Ghiglieri, M. & Tews, E., 2014, 2014 IEEE 11th Consumer Communications and Networking Conference 2014. IEEE, p. 357-362 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

11 Citations (Scopus)

IT-Security in Railway Signalling Systems

Schlehuber, C., Tews, E. & Katzenbeisser, S., 2014, ISSE 2014 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2014 Conference. Reimer, H., Pohlmann, N. & Schneider, W. (eds.). Springer, p. 56-64 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

MoP-2-MoP - Mobile Private Microblogging

Senftleben, M., Bucicoiu, M., Tews, E., Armknecht, F., Katzenbeisser, S. & Sadeghi, A-R., 2014, Financial Cryptography and Data Security: 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers. Christin, N. & Safavi-Naini, R. (eds.). Springer, p. 384-396 13 p. (Lecture Notes in Computer Science; vol. 8437).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)

Privacy preserving whole genome sequence processing through proxy-aided ORAM

Karvelas, N. P., Peter, A., Katzenbeisser, S., Tews, E., Tews, E. & Hamacher, K., 2014, 13th Annual ACM Workshop on Privacy in the Electronic Society (WPES 2014). New York: Association for Computing Machinery (ACM), p. 1-10 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

13 Citations (Scopus)

Quantitative Ansätze zur IT-Risikoanalyse

Tews, E. & Schlehuber, C., 2014, Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit. Katzenbeisser, S., Lotz, V. & Weippl, E. R. (eds.). Nederlands Centrum Geestelijke Volksgezondheid, Vol. 228. p. 293-303 11 p. (LNI).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
567 Downloads (Pure)

Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks

Meyer, C., Somorovsky, J., Weiss, E., Schwenk, J., Schinzel, S. & Tews, E., 2014, Proceedings of the 23rd USENIX Security Symposium. p. 733-748 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
46 Citations (Scopus)
7 Downloads (Pure)
2013

Efficiently outsourcing multiparty computation under multiple keys

Peter, A., Tews, E., Tews, E. & Katzenbeisser, S., 1 Nov 2013, In : IEEE transactions on information forensics and security. 8, 12, p. 2046-2058 13 p.

Research output: Contribution to journalArticleAcademicpeer-review

78 Citations (Scopus)

Security analysis of a widely deployed locking system

Weiner, M., Massar, M., Tews, E., Giese, D. & Wieser, W., 2013, 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013. Sadeghi, A-R., Gligor, V. D. & Yung, M. (eds.). Association for Computing Machinery (ACM), p. 929-940 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)
1 Downloads (Pure)
2012

DECT security analysis

Tews, E., May 2012, Darmstadt: TU-Prints. 75 p.

Research output: ThesisPhD Thesis - Research external, graduation external

Open Access
File
3 Downloads (Pure)
2011

Breaking DVB-CSA

Tews, E., Wälde, J. & Weiner, M., 2011, Research in Cryptology: 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers. Armknecht, F. & Lucks, S. (eds.). Springer, p. 45-61 17 p. (Lecture Notes in Computer Science; vol. 7242).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
4 Citations (Scopus)
894 Downloads (Pure)

Interactive decryption of DECT phone calls

McHardy, P., Schuler, A. & Tews, E., 2011, Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011. Gollmann, D., Westhoff, D., Tsudik, G. & Asokan, N. (eds.). Association for Computing Machinery (ACM), p. 71-78 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)
2010

Cryptanalysis of the DECT Standard Cipher

Nohl, K., Tews, E. & Weinmann, R-P., 2010, Fast Software Encryption: 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers. Hong, S. & Iwata, T. (eds.). Berlin: Springer, p. 1-18 18 p. (Lecture Notes in Computer Science; vol. 6147).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

16 Citations (Scopus)

FPGA Implementation of an Improved Attack against the DECT Standard Cipher

Weiner, M., Tews, E., Heinz, B. & Heyszl, J., 2010, Information Security and Cryptology - ICISC 2010: 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers. Rhee, K. H. & Nyang, D. (eds.). Berlin: Springer, p. 177-188 12 p. (Lecture Notes in Computer Science; vol. 6829).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)

Kann man mit DECT noch vertraulich telefonieren?

Nohl, K. & Tews, E., 2010, In : Datenschutz und Datensicherheit. 34, 11, p. 758-760 3 p.

Research output: Contribution to journalArticleProfessional

2009

Attacks on the DECT Authentication Mechanisms

Lucks, S., Schuler, A., Tews, E., Weinmann, R-P. & Wenzel, M., 2009, Topics in Cryptology - CT-RSA 2009: The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings. Fischlin, M. (ed.). Berlin: Springer, p. 48-65 18 p. (Lecture Notes in Computer Science; vol. 5473).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

14 Citations (Scopus)

Practical attacks against WEP and WPA

Tews, E. & Beck, M., 2009, Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009. Basin, D. A., Capkun, S. & Lee, W. (eds.). Association for Computing Machinery (ACM), p. 79-86 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

106 Citations (Scopus)
2008

Describing Data Format Exploits Using Bitstream Segment Graphs

Hartle, M., Schumann, D., Botchak, A., Tews, E. & Mühlhäuser, M., 2008, The Third International Multi-Conference on Computing in the Global Information Technology, ICCGI 2008. Piscataway, NJ: IEEE, p. 119-124 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

Side Channels in the McEliece PKC

Strenzke, F., Tews, E., Molter, H. G., Overbeck, R. & Shoufan, A., 2008, Post-Quantum Cryptography: Second International Workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008, Proceedings. Buchmann, J. A. & Ding, J. (eds.). Berlin: Springer, p. 216-229 14 p. (Lecture Notes in Computer Science; vol. 5299).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

44 Citations (Scopus)
2007

Attacks on the WEP protocol

Tews, E., 15 Dec 2007, TU Darmstadt.

Research output: ThesisPhD Thesis - Research external, graduation external

Open Access
File
20 Downloads (Pure)

Breaking 104 Bit WEP in Less Than 60 Seconds

Tews, E., Weinmann, R-P. & Pyshkin, A., 2007, Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers. Kim, S., Yung, M. & Lee, H-W. (eds.). Berlin: Springer, p. 188-202 15 p. (Lecture Notes in Computer Science; vol. 4867).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
83 Citations (Scopus)
12 Downloads (Pure)

Security of Invertible Media Authentication Schemes Revisited

Dönigus, D., Endler, S., Fischlin, M., Hülsing, A., Jäger, P., Lehmann, A., Podrazhansky, S., Schipp, S., Tews, E., Vowe, S., Walthart, M. & Weidemann, F., 2007, Information Hiding: 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers. Furon, T., Cayre, F., Doërr, G. J. & Bas, P. (eds.). Berlin: Springer, p. 189-203 15 p. (Lecture Notes in Computer Science; vol. 4567).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2006

Bluetooth Interaction Support in Lectures

Bär, H., Rößling, G., Tews, E. & Lecher, E., 2006, Proceedings of the IADIS International Conference Mobile learning 2006. Isaías, P., Kommers, P. & Sánchez, I. A. (eds.). IADIS, p. 360-364 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)
2005

Improving Feedback and Classroom Interaction Using Mobile Phones

Bär, H., Tews, E. & Rößling, G., 2005, Mobile Learning 2005 Proceedings: Proceedings of the IADIS International Conference on Mobile Learning . Isaías, P., Borg, C., Kommers, P. & Bonanno, P. (eds.).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access

Interaction during lectures using mobile phones

Bär, H., Mühlhäuser, M., Tews, E. & Rößling, G., 2005, Proceedings of ED-Media 2005, World Conference on Educational Multimedia, Hypermedia & Telecommunications: June 27 - July 2, 2005 Montréal, Canada. Kommers, P. (ed.). Association for the Advancement of Computing in Education, p. 3767-3772 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
8 Downloads (Pure)