Publications


Below you can find the list of CRC 1223 publications. For more publications on security, privacy and related areas, please visit the publication list @ CISPA.

There is also a new publication database availablable under the following links:

Publications Database: Main Page· privacySFB Section

2020


Towards Query Logs for Privacy Studies: On Deriving Search Queries from Questions

Asia J. Biega , Jana Schmidt , Rishiraj Saha Roy
Proceedings of the 42nd European Conference on Information Retrieval, ECIR 2020. Vol. 12036. Lecture Notes in Computer Science. Springer, 2020

Efficient monitoring of Hyperproperties using prefix trees

Bernd Finkbeiner et al.
International Journal on Software Tools for Technology Transfer (2020).

Synthesis from Hyperproperties

Bernd Finkbeiner et al.
Acta Informatica 57.1 (2020).

On the expressiveness and semantics of information flow types

Vineet Rajani , Deepak Garg
Journal of Computer Security 28.1 (2020).

The high-level benefits of low-level sandboxing

Michael Sammler et al.
Proceedings of the 47th ACM SIGPLAN Symposium on Principles of Programming Languages, POPL 2020.

An Integrated Approach for Effective Injection Vulnerability Analysis of Web Applications through Security Slicing and Hybrid Constraint Solving

Julian Thomé et al.
IEEE Transactions on Software Engineering 46.2 (2020)

Towards Plausible Graph Anonymization

Yang Zhang et al.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, NDSS 2020

2019


Why Does this App Need this Data? Automatic Tightening of Resource Access

Nataniel P. Borges Jr. , Andreas Zeller
Proceedings of the 12th IEEE Conference on Software Testing, Validation and Verification, ICST 2019

ConfLLVM: A Compiler for Enforcing Data Confidentiality in LowLevel Code

Ajay Brahmakshatriya et al.
Proceedings of the Fourteenth EuroSys Conference, EuroSys 2019. ACM, 2019.

Can A User Guess What Her Followers Want?

Abir De et al.
Proceedings of the Workshop on Behavioral EC, ACM EC 2019

Learning User Interface Element Interactions

Christian Degott , Nataniel P. Borges Jr. , Andreas Zeller
Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2019. Association for Computing Machinery, 2019.

Trapdoor hash functions and their applications

Nico Döttling et al.
Proceedings of the 39th Annual International Cryptology Conference, CRYPTO 2019.

Monitoring Hyperproperties

Bernd Finkbeiner et al.
Formal Methods in System Design 54.3 (2019).

FAIRY: A Framework for Understanding Relationships Between Users’ Actions and their Social Feeds

Azin Ghazimatin , Rishiraj Saha Roy , Gerhard Weikum
Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining, WSDM 2019

Reducing Spreading Processes on Networks to Markov Population Models

Gerrit Großmann , Luca Bortolussi
CoRR abs/1906.11508 (2019)

Rejection-Based Simulation of Non-Markovian Agents on Complex Networks

Gerrit Großmann , Luca Bortolussi , Verena Wolf
Studies in Computational Intelligence 881 (2019)

Algorithms for Monitoring Hyperproperties

Christopher Hahn
Proceedings of the 19th International Conference on Runtime Verification, RV 2019. Vol. 11757. Lecture Notes in Computer Science. Springer, 2019.

Constraint-Based Monitoring of Hyperproperties

Christopher Hahn , Marvin Stenger , Leander Tentrup
Proceedings of the 25th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2019. Vol. 11428. Lecture Notes in Computer Science. Springer, 2019.

Time-Conditioned Action Anticipation in One Shot

Qiuhong Ke , Mario Fritz , Bernt Schiele
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2019, IEEE Computer Society, 2019.

Subvector commitments with application to succinct arguments

Russell W.F. Lai , Giulio Malavolta
Proceedings of the 39th Annual International Cryptology Conference, CRYPTO 2019. Springer. 2019.

AccessiLeaks: Investigating Privacy Leaks Exposed by the Android Accessibility Service

Mohammad Naseri et al.
Proceedings on Privacy Enhancing Technologies 2019.2 (2019).

Person Recognition in Social Media Photos

Seong Joon Oh et al.
IEEE Transactions on Pattern Analysis and Machine Intelligence (2019)

Knockoff Nets: Stealing Functionality of Black-Box Models

Tribhuvanesh Orekondy , Bernt Schiele , Mario Fritz
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2019. IEEE Computer Society, 2019

Applications for In-Situ Feedback on Social Network Notifications

Frederic Raber , Antonio Krüger
Proceedings of the IFIP TC 13 International Conference, INTERACT 2019. Springer, 2019

FriendGroupVR: Design Concepts Using Virtual Reality to Organize Social Network Friends

Frederic Raber , Christopher Schommer , Antonio Krüger
Proceedings of the IFIP TC 13 International Conference, INTERACT 2019. Springer, 2019

OmniWedges: Improved Radar-Based Audience Selection for Social Networks

Frederic Raber , Antonio Krüger
Proceedings of the IFIP TC 13 International Conference, INTERACT 2019. Vol. 10516. Lecture Notes in Computer Science. Springer, 2019

ChainifyDB: How to Blockchainify any Data Management System

Felix Martin Schuhknecht et al. , Lucjan Hanzlik
CoRR abs/1912.04820 (2019)

Blurring the Lines between Blockchains and Database Systems: the Case of Hyperledger Fabric

Ankur Sharma et al.
Proceedings of the 2019 International Conference on Management of Data, SIGMOD Conference 2019

IIFA: Modular Inter-app Intent Information Flow Analysis of Android Applications

Abhishek Tiwari , Sascha Groß , Christian Hammer
Security and Privacy in Communication Networks. Springer, 2019.

LUDroid: A Large Scale Analysis of Android – Web Hybridization

Abhishek Tiwari et al.
Proceedings of the 19th International Working Conference on Source Code Analysis and Manipulation, SCAM 2019.

On the complexity of opinions and online discussions

Utkarsh Upadhyay et al.
Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining, WSDM 2019.

From fine- to coarse-grained dynamic information flow control and back

Marco Vassena et al.
Proceedings of the annual Symposium on Principles of Programming Languages, POPL 2019.

2018


The Complexity of Monitoring Hyperproperties

Borzoo Bonakdarpour , Bernd Finkbeiner
Proceedings of the 31st IEEE Computer Security Foundations Symposium, CSF 2018. IEEE Computer Society, 2018.

MGHyper: Checking Satisfiability of HyperLTL Formulas Beyond the ∃∗∀∗ Fragment

Bernd Finkbeiner , Christopher Hahn , Tobias Hans
Proceedings of the 16th International Symposium on Automated Technology for Verification and Analysis, ATVA 2018. Vol. 11138. Lecture Notes in Computer Science. Springer, 2018.

RVHyper: A Runtime Verification Tool for Temporal Hyperproperties

Bernd Finkbeiner et al.
Proceedings of the 24th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2018. Vol. 10806. Lecture Notes in Computer Science. Springer, 2018.

Synthesizing Reactive Systems from Hyperproperties

Bernd Finkbeiner et al.
Proceedings of the 30th International Conference on Computer Aided Verification, CAV 2018. Vol. 10981. Lecture Notes in Computer Science. Springer, 2018.

Lumping the Approximate Master Equation for Multistate Processes on Complex Networks

Gerrit Großmann et al.
CoRR abs/1804.02981 (2018)

Rejection-Based Simulation of Stochastic Spreading Processes on Complex Networks.

Gerrit Großmann , Verena Wolf
Lecture Notes in Computer Science 11705 (2018).

DroidMate-2: A Platform for Android Test Generation

Nataniel P. Borges Jr. , Jenny Hotzkow , Andreas Zeller
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, ASE 2018. Association for Computing Machinery, 2018.

Guiding App Testing with Mined Interaction Models

Nataniel P. Borges Jr. , Maria Gómez , Andreas Zeller
Proceedings of the 5th International Conference on Mobile Software Engineering and Systems, MOBILESoft 2018. Association for Computing Machinery, 2018.

Leveraging the crowd to detect and reduce the spread of fake news and misinformation

Jooyeon Kim et al.
Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining, WSDM 2018

Disentangled Person Image Generation

Liqian Ma et al.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2018. IEEE Computer Society, 2018

UniTraX: Protecting Data Privacy with Discoverable Biases

Reinhard Munz et al.
Proceedings of the 7th International Conference on Principles of Security and Trust, POST 2018

Towards Reverse-Engineering Black-Box Neural Networks

Seong Joon Oh et al.
Proceedings of the Sixth International Conference on Learning Representations, ICLR 2018

Connecting Pixels to Privacy and Utility: Automatic Redaction of Private Information in Images

Tribhuvanesh Orekondy , Mario Fritz , Bernt Schiele
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2018. IEEE Computer Society, 2018

Deriving Privacy Settings for Location Sharing: Are Context Factors Always the Best Choice?

Frederic Raber , Antonio Krüger
Proceedings of the IEEE Symposium on Privacy-Aware Computing, PAC 2018

Privacy Perceiver: Using Social Network Posts to Derive Users’ Privacy Measures.

Frederic Raber , Antonio Krüger
Adjunct Publication of the 26th Conference on User Modeling, Adaptation and Personalization, UMAP 2018. Association for Computing Machinery, 2018

The “Retailio” Privacy Wizard: Assisting Users with Privacy Settings for Intelligent Retail Stores

Frederic Raber , David Ziemann , Antonio Krüger
Proceedings of the IEEE Symposium on Privacy-Aware Computing, PAC 2018

Types for Information Flow Control: Labeling Granularity and Semantic Models

Vineet Rajani , Deepak Garg
Proceedings of the 31st IEEE Computer Security Foundations Symposium, CSF 2018. IEEE Computer Society, 2018

Efficient GUI Test Generation by Learning from Tests of Other Apps

Andreas Rau , Jenny Hotzkow , Andreas Zeller
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, ICSE 2018. Association for Computing Machinery, 2018.

Building IR Query Logs from Community Question Answering Forums

Jana Schmidt
Bachelor’s Thesis. 2018

Accelerating Analytical Processing in MVCC using Fine-Granular High-Frequency Virtual Snapshotting

Ankur Sharma , Felix Martin Schuhknecht , Jens Dittrich
Proceedings of the 2018 International Conference on Management of Data, SIGMOD Conference 2018

Adversarial Scene Editing: Automatic Object Removal from Weak Supervision

Rakshith Shetty , Mario Fritz , Bernt Schiele
Proceedings of Advances in Neural Information Processing Systems 31, NIPS 2018. Curran Associates, 2018.

A Hybrid Model for Identity Obfuscation by Face Replacement

Qianru Sun et al.
Proceedings of the 16th European Conference on Computer Vision Computer Vision, ECCV 2018. Vol. 11205. Lecture Notes in Computer Science. Springer, 2018.

Natural and Effective Obfuscation by Head Inpainting

Qianru Sun et al.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2018. IEEE Computer Society, 2018.

Security Slicing for Auditing Common Injection Vulnerabilities

Julian Thomé et al.
Journal of Systems and Software 137 (2018).

Fake news detection in social networks via crowd signals

Sebastian Tschiatschek et al.
Companion Proceedings of the The Web Conference 2018. 2018

Tagvisor: A Privacy Advisor for Sharing Hashtags

Yang Zhang et al.
Proceedings of the 2018 World Wide Web Conference, WWW 2018. International World Wide Web Conferences Steering Committee, 2018

2017


Walk2friends: Inferring Social Links from Mobility Profiles

Michael Backes et al.
Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, CCS 2017. Association for Computing Machinery, 2017

WebPol: Fine-Grained Information Flow Policies for Web Browsers

Abhishek Bichhawat et al.
Proceedings of the 22nd European Symposium on Research in Computer Security, ESORICS 2017. Vol. 10492. Lecture Notes in Computer Science. Springer, 2017.

Learning to Un-Rank: Quantifying Search Exposure for Users in Online Communities

Asia J. Biega et al.
Proceedings of the ACM on Conference on Information and Knowledge Management, CIKM 2017

Privacy through Solidarity: A User-UtilityPreserving Framework to Counter Profiling

Asia J. Biega , , Rishiraj Saha Roy , Gerhard Weikum
Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2017

Data Flow Oriented UI Testing: Exploiting Data Flows and UI Elements to Test Android Applications

Nataniel P. Borges Jr.
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2017. Association for Computing Machinery, 2017.

Privacy of Hidden Profiles: Utility-Preserving Profile Removal in Online Forums

Sedigheh Eslami et al.
Proceedings of the ACM on Conference on Information and Knowledge Management, CIKM 2017

Utility-Preserving Profile Removal in Online Forums

Sedigheh Eslami
Master’s Thesis. 2017

EAHyper: Satisfiability, Implication, and Equivalence Checking of Hyperproperties

Bernd Finkbeiner , Christopher Hahn , Marvin Stenger
Proceedings of the 29th International Conference on Computer Aided Verification, CAV 2017. Vol. 10427. Lecture Notes in Computer Science. Springer, 2017.

Monitoring Hyperproperties

Bernd Finkbeiner et al.
Proceedings of the 17th International Conference on Runtime Verification, RV 2017. Vol. 10548. Lecture Notes in Computer Science. Springer, 2017.

Secure Composition of PKIs with Public Key Protocols

Bernd Finkbeiner et al.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, CSF 2017.

Diffix: High-Utility Database Anonymization

Paul Francis , Sebastian Probst Eide , Reinhard Munz
Proceedings of the 5th Annual Privacy Forum, APF 2017

STD2P: RGBD Semantic Segmentation Using Spatio-Temporal Data-Driven Pooling

Yang He et al.
Proceedings of the 30th IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2017. IEEE Computer Society, 2017

Lumping of Degree-Based Mean Field and Pair Approximation Equations for Multi-State Contact Processes

Charalampos Kyriakopoulos et al.
CoRR abs/1706.06964 (2017)

SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks

Giulio Malavolta et al.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, NDSS 2017. Internet Society, 2017.

Detecting Information Flow by Mutating Input Data

Björn Mathis et al.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, ASE 2017. IEEE Press, 2017.

Adversarial Image Perturbation for Privacy Protection – A Game Theory Perspective

Seong Joon Oh , Mario Fritz , Bernt Schiele
Proceedings of the IEEE International Conference on Computer Vision, ICCV 2017. IEEE Computer Society, 2017

Exploiting Saliency for Object Segmentation from Image Level Labels

Seong Joon Oh et al.
Proceedings of the 30th IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2017. IEEE Computer Society, 2017.

Towards a Visual Privacy Advisor: Understanding and Predicting Privacy Risks in Images

Tribhuvanesh Orekondy , Bernt Schiele , Mario Fritz
Proceedings of the IEEE International Conference on Computer Vision, ICCV 2017. IEEE Computer Society, 2017.

Fine-grained Privacy Setting Prediction using a Privacy Attitude Questionnaire and Machine Learning

Frederic Raber et al.
Proceedings of the IFIP Conference on Human-Computer Interaction, INTERACT 2017. Vol. 10516. Lecture Notes in Computer Science. Springer, 2017.

Towards Understanding the Influence of Personality on Mobile App Permission Settings

Frederic Raber , Antonio Krüger
Proceedings of the 16th IFIP TC 13 International Conference, INTERACT 2017. Vol. 10516. Lecture Notes in Computer Science. Springer, 2017

URetail: Privacy User Interfaces for Intelligent Retail Store

Frederic Raber , Nils Vossebein
Proceedings of the IFIP TC 13 International Conference, INTERACT 2017. Vol. 10516. Lecture Notes in Computer Science. Springer, 2017

Type systems for information flow control: the question of granularity

Vineet Rajani et al.
SIGLOG News 4.1 (2017).

Speaking the Same Language: Matching Machine to Human Captions by Adversarial Training

Rakshith Shetty et al.
Proceedings of the IEEE International Conference on Computer Vision, ICCV 2017. IEEE Computer Society, 2017.

A Domain Based Approach to Social Relation Recognition

Qianru Sun , Bernt Schiele , Mario Fritz
Proceedings of the 30th IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2017. IEEE Computer Society, 2017.

JoanAudit: A Tool for Auditing Common Injection Vulnerabilities

Julian Thomé et al.
Proceedings of the 11th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering 2017, ESEC/FSE 2017. ACM, 2017.

Search-driven String Constraint Solving for Vulnerability Detection

Julian Thomé et al.
Proceedings of the 39th International Conference on Software Engineering, ICSE 2017. ACM, 2017.

Uncovering the Dynamics of Crowdlearning and the Value of Knowledge

Utkarsh Upadhyay , Isabel Valera , Manuel Gomez-Rodriguez
Proceedings of the Tenth ACM International Conference on Web Search and Data Mining, WSDM 2017.

2016


I-Pic: A Platform for Privacy-Compliant Image Capture

Paarijaat Aditya et al.
Proceedings of the 4th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2016. ACM, 2016

AnoA: A Framework for Analyzing Anonymous Communication Protocols

Michael Backes et al.
Journal of Privacy and Confidentiality 7.2 (2016).

Anonymous RAM

Michael Backes et al.
Proceedings of the 21st European Symposium on Research in Computer Security, ESORICS 2016.

Computational Soundness for Dalvik Bytecode

Michael Backes , Robert Künnemann , Esfandiar Mohammadi
Proceedings of the 23rd ACM Conference on Computer and Communications Security, CCS 2016.

From Zoos to Safaris - From Closed-World Enforcement to Open-World Assessment of Privacy

Michael Backes , Pascal Berrang , Praveen Manoharan
Foundations of Security Analysis and Design VIII: FOSAD 2014/2015/2016 Tutorial Lectures. Springer, 2016

On Profile Linkability despite Anonymity in Social Media Systems

Michael Backes et al.
Proceedings of the ACM Workshop on Privacy in the Electronic Society, WPES 2016

Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms Against Structural Attacks

Michael Backes , Sebastian Meiser , Marcin Slowik
PoPETs 2016.2 (2016).

R-Susceptibility: An IR-Centric Approach to Assessing Privacy Risks for Users in Online Communities

Asia J. Biega et al.
Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval, SIGIR 2016

Retrieving a Web User’s Personal Information

Angeeka Biswas
Master’s Thesis. 2016

Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement

Cecylia Bocovich , Ian Goldberg
Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, CCS 2016. Association for Computing Machinery, 2016.

Deciding Hyperproperties

Bernd Finkbeiner , Christopher Hahn
Proceedings of the 27th International Conference on Concurrency Theory, CONCUR 2016. Vol. 59. LIPIcs. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2016.

Recognition of Ongoing Complex Activities by Sequence Prediction Over a Hierarchical Label Space

Wenbin Li , Mario Fritz
Proceedings of the IEEE Winter Conference on Applications of Computer Vision, WACV 2016, IEEE Computer Society, 2016.

Faceless Person Recognition: Privacy Implications in Social Media

Seong Joon Oh et al.
Proceedings of the 14th European Conference on Computer Vision, ECCV 2016. Vol. 9907. Lecture Notes in Computer Science. Springer, 2016.

RUMA has it: Rewired User-space Memory Access is Possible!

Felix Martin Schuhknecht , Jens Dittrich , Ankur Sharma
PVLDB 9.10 (2016)

Sok: Towards grounding censorship circumvention in empiricism

Michael Carl Tschantz , Sadia Afroz , Vern Paxson et al.
Proceedings of the 37th IEEE Symposium on Security and Privacy, SP 2016. IEEE. 2016.