20052024

Research activity per year

Filter
Conference contribution

Search results

  • 2024

    Ransomware Economics: A Two-Step Approach To Model Ransom Paid

    Meurs, T., Cartwright, E., Cartwright, A., Junger, M., Hoheisel, R., Tews, E. & Abhishta, A., 1 Apr 2024, 2023 APWG Symposium on Electronic Crime Research (eCrime). IEEE, 13 p. (eCrime Researchers Summit, eCrime).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    2 Citations (Scopus)
    2483 Downloads (Pure)
  • 2022

    How Attackers Determine the Ransom in Ransomware Attacks

    Meurs, T., Junger, M., Abhishta, A. & Tews, E., 4 Jun 2022, 7th IEEE European Symposium on Security and Privacy (Euro S&P 2022). ResearchGate, 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    336 Downloads (Pure)
  • Ransomware: How attacker's effort, victim characteristics and context influence ransom requested, payment and financial loss

    Meurs, T., Junger, M., Tews, E. & Abhishta, A., 1 Dec 2022, Symposium on Electronic Crime Research, eCrime 2022.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    325 Downloads (Pure)
  • 2020

    Lost and found: Stopping bluetooth finders from leaking private information

    Weller, M., Classen, J., Ullrich, F., Waßmann, D. & Tews, E., 8 Jul 2020, WiSec 2020 - Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, p. 184-194 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    10 Citations (Scopus)
    451 Downloads (Pure)
  • 2019

    BACRank: Ranking building automation and control system components by business continuity impact

    Esquivel-Vargas, H., Caselli, M., Tews, E., Bucur, D. & Peter, A., 8 Aug 2019, Computer Safety, Reliability, and Security: 38th International Conference, SAFECOMP 2019, Proceedings. Romanovsky, A., Troubitsyna, E. & Bitsch, F. (eds.). Springer, p. 183-199 17 p. (Lecture Notes in Computer Science; vol. 11698).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    3 Citations (Scopus)
    14 Downloads (Pure)
  • 2016

    Disguised Chromium Browser: Robust Browser, Flash and Canvas Fingerprinting Protection

    Baumann, P., Katzenbeisser, S., Stopczynski, M. & Tews, E., 2016, WPES '16. Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society. Association for Computing Machinery, p. 37-46 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    23 Citations (Scopus)
    2 Downloads (Pure)
  • Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet

    Schulz, M., Klapper, P., Hollick, M., Tews, E. & Katzenbeisser, S., 2016, WiSec '16. Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks. Association for Computing Machinery, p. 43-48 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    12 Citations (Scopus)
  • 2014

    A privacy protection system for HbbTV in Smart TVs

    Ghiglieri, M. & Tews, E., 2014, 2014 IEEE 11th Consumer Communications and Networking Conference 2014. IEEE, p. 357-362 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    20 Citations (Scopus)
  • IT-Security in Railway Signalling Systems

    Schlehuber, C., Tews, E. & Katzenbeisser, S., 2014, ISSE 2014 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2014 Conference. Reimer, H., Pohlmann, N. & Schneider, W. (eds.). Springer, p. 56-64 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • MoP-2-MoP - Mobile Private Microblogging

    Senftleben, M., Bucicoiu, M., Tews, E., Armknecht, F., Katzenbeisser, S. & Sadeghi, A.-R., 2014, Financial Cryptography and Data Security: 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers. Christin, N. & Safavi-Naini, R. (eds.). Springer, p. 384-396 13 p. (Lecture Notes in Computer Science; vol. 8437).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    7 Citations (Scopus)
  • Privacy preserving whole genome sequence processing through proxy-aided ORAM

    Karvelas, N. P., Peter, A., Katzenbeisser, S., Tews, E. & Hamacher, K., 2014, 13th Annual ACM Workshop on Privacy in the Electronic Society (WPES 2014). New York: Association for Computing Machinery, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    18 Citations (Scopus)
    21 Downloads (Pure)
  • Quantitative Ansätze zur IT-Risikoanalyse

    Tews, E. & Schlehuber, C., 2014, Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit. Katzenbeisser, S., Lotz, V. & Weippl, E. R. (eds.). Nederlands Centrum Geestelijke Volksgezondheid, Vol. 228. p. 293-303 11 p. (LNI).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    1 Citation (Scopus)
    7820 Downloads (Pure)
  • Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks

    Meyer, C., Somorovsky, J., Weiss, E., Schwenk, J., Schinzel, S. & Tews, E., 2014, Proceedings of the 23rd USENIX Security Symposium. p. 733-748 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    72 Citations (Scopus)
    39 Downloads (Pure)
  • 2013

    Security analysis of a widely deployed locking system

    Weiner, M., Massar, M., Tews, E., Giese, D. & Wieser, W., 2013, 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013. Sadeghi, A.-R., Gligor, V. D. & Yung, M. (eds.). Association for Computing Machinery, p. 929-940 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    5 Citations (Scopus)
    1 Downloads (Pure)
  • 2011

    Breaking DVB-CSA

    Tews, E., Wälde, J. & Weiner, M., 2011, Research in Cryptology: 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers. Armknecht, F. & Lucks, S. (eds.). Springer, p. 45-61 17 p. (Lecture Notes in Computer Science; vol. 7242).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    5 Citations (Scopus)
    3364 Downloads (Pure)
  • Interactive decryption of DECT phone calls

    McHardy, P., Schuler, A. & Tews, E., 2011, Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011. Gollmann, D., Westhoff, D., Tsudik, G. & Asokan, N. (eds.). Association for Computing Machinery, p. 71-78 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    8 Citations (Scopus)
    10 Downloads (Pure)
  • 2010

    Cryptanalysis of the DECT Standard Cipher

    Nohl, K., Tews, E. & Weinmann, R.-P., 2010, Fast Software Encryption: 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers. Hong, S. & Iwata, T. (eds.). Berlin: Springer, p. 1-18 18 p. (Lecture Notes in Computer Science; vol. 6147).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    23 Citations (Scopus)
    4 Downloads (Pure)
  • FPGA Implementation of an Improved Attack against the DECT Standard Cipher

    Weiner, M., Tews, E., Heinz, B. & Heyszl, J., 2010, Information Security and Cryptology - ICISC 2010: 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers. Rhee, K. H. & Nyang, D. (eds.). Berlin: Springer, p. 177-188 12 p. (Lecture Notes in Computer Science; vol. 6829).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    7 Citations (Scopus)
  • 2009

    Attacks on the DECT Authentication Mechanisms

    Lucks, S., Schuler, A., Tews, E., Weinmann, R.-P. & Wenzel, M., 2009, Topics in Cryptology - CT-RSA 2009: The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings. Fischlin, M. (ed.). Berlin: Springer, p. 48-65 18 p. (Lecture Notes in Computer Science; vol. 5473).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    17 Citations (Scopus)
    1 Downloads (Pure)
  • Practical attacks against WEP and WPA

    Tews, E. & Beck, M., 2009, Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009. Basin, D. A., Capkun, S. & Lee, W. (eds.). Association for Computing Machinery, p. 79-86 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    145 Citations (Scopus)
    92 Downloads (Pure)
  • 2008

    Describing Data Format Exploits Using Bitstream Segment Graphs

    Hartle, M., Schumann, D., Botchak, A., Tews, E. & Mühlhäuser, M., 2008, The Third International Multi-Conference on Computing in the Global Information Technology, ICCGI 2008. Piscataway, NJ: IEEE, p. 119-124 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    1 Citation (Scopus)
    8 Downloads (Pure)
  • Side Channels in the McEliece PKC

    Strenzke, F., Tews, E., Molter, H. G., Overbeck, R. & Shoufan, A., 2008, Post-Quantum Cryptography: Second International Workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008, Proceedings. Buchmann, J. A. & Ding, J. (eds.). Berlin: Springer, p. 216-229 14 p. (Lecture Notes in Computer Science; vol. 5299).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    60 Citations (Scopus)
  • 2007

    Breaking 104 Bit WEP in Less Than 60 Seconds

    Tews, E., Weinmann, R.-P. & Pyshkin, A., 2007, Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers. Kim, S., Yung, M. & Lee, H.-W. (eds.). Berlin: Springer, p. 188-202 15 p. (Lecture Notes in Computer Science; vol. 4867).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    100 Citations (Scopus)
    72 Downloads (Pure)
  • Security of Invertible Media Authentication Schemes Revisited

    Dönigus, D., Endler, S., Fischlin, M., Hülsing, A., Jäger, P., Lehmann, A., Podrazhansky, S., Schipp, S., Tews, E., Vowe, S., Walthart, M. & Weidemann, F., 2007, Information Hiding: 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers. Furon, T., Cayre, F., Doërr, G. J. & Bas, P. (eds.). Berlin: Springer, p. 189-203 15 p. (Lecture Notes in Computer Science; vol. 4567).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • 2006

    Bluetooth Interaction Support in Lectures

    Bär, H., Rößling, G., Tews, E. & Lecher, E., 2006, Proceedings of the IADIS International Conference Mobile learning 2006. Isaías, P., Kommers, P. & Sánchez, I. A. (eds.). IADIS, p. 360-364 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    8 Citations (Scopus)
  • 2005

    Improving Feedback and Classroom Interaction Using Mobile Phones

    Bär, H., Tews, E. & Rößling, G., 2005, Mobile Learning 2005 Proceedings: Proceedings of the IADIS International Conference on Mobile Learning . Isaías, P., Borg, C., Kommers, P. & Bonanno, P. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
  • Interaction during lectures using mobile phones

    Bär, H., Mühlhäuser, M., Tews, E. & Rößling, G., 2005, Proceedings of ED-Media 2005, World Conference on Educational Multimedia, Hypermedia & Telecommunications: June 27 - July 2, 2005 Montréal, Canada. Kommers, P. (ed.). Association for the Advancement of Computing in Education, p. 3767-3772 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    41 Downloads (Pure)