


Остановите войну!
for scientists:
Michael Backes 0001
Person information

- affiliation: CISPA Helmholtz Center for Information Security, Saarbrücken, Germany
- affiliation: Saarland University, Computer Science Department, Saarbrücken, Germany
Other persons with the same name
- Michael Backes 0002
— University of Namibia, Department of Physics, Windhoek, Namibia (and 1 more)
- Michael Backes 0003 — Los Angeles, CA, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [i110]Zeyang Sha, Xinlei He, Ning Yu, Michael Backes, Yang Zhang:
Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image Encoders. CoRR abs/2201.07513 (2022) - [i109]Yun Shen, Yufei Han, Zhikun Zhang, Min Chen, Ting Yu, Michael Backes, Yang Zhang, Gianluca Stringhini:
Finding MNEMON: Reviving Memories of Node Embeddings. CoRR abs/2204.06963 (2022) - [i108]Xinyue Shen, Xinlei He, Michael Backes, Jeremy Blackburn, Savvas Zannettou, Yang Zhang:
On Xing Tian and the Perseverance of Anti-China Sentiment Online. CoRR abs/2204.08935 (2022) - 2021
- [c226]Xiaoyi Chen, Ahmed Salem, Dingfan Chen, Michael Backes, Shiqing Ma, Qingni Shen, Zhonghai Wu, Yang Zhang:
BadNL: Backdoor Attacks against NLP Models with Semantic-preserving Improvements. ACSAC 2021: 554-569 - [c225]Trung Tin Nguyen, Duc Cuong Nguyen, Michael Schilling, Gang Wang, Michael Backes:
Measuring User Perception for Detecting Unexpected Access to Sensitive Resource in Mobile Apps. AsiaCCS 2021: 578-592 - [c224]Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, Yang Zhang:
When Machine Unlearning Jeopardizes Privacy. CCS 2021: 896-911 - [c223]Aurore Fass, Dolière Francis Somé, Michael Backes, Ben Stock:
DoubleX: Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale. CCS 2021: 1789-1804 - [c222]Sebastian Roth, Lea Gröber, Michael Backes, Katharina Krombholz, Ben Stock:
12 Angry Developers - A Qualitative Study on Developers' Struggles with CSP. CCS 2021: 3085-3103 - [c221]Robert Künnemann, Deepak Garg, Michael Backes:
Accountability in the Decentralised-Adversary Setting. CSF 2021: 1-16 - [c220]Lucjan Hanzlik, Yang Zhang, Kathrin Grosse, Ahmed Salem, Maximilian Augustin, Michael Backes, Mario Fritz:
MLCapsule: Guarded Offline Deployment of Machine Learning as a Service. CVPR Workshops 2021: 3300-3309 - [c219]Marvin Moog, Markus Demmel, Michael Backes, Aurore Fass:
Statically Detecting JavaScript Obfuscation and Minification Techniques in the Wild. DSN 2021: 569-580 - [c218]Kathrin Grosse, Michael Backes:
Do winning tickets exist before DNN training? SDM 2021: 549-557 - [c217]Yusra Elbitar, Michael Schilling, Trung Tin Nguyen, Michael Backes, Sven Bugiel:
Explanation Beats Context: The Effect of Timing & Rationales on Users' Runtime Permission Decisions. USENIX Security Symposium 2021: 785-802 - [c216]Zhikun Zhang, Tianhao Wang, Ninghui Li, Jean Honorio, Michael Backes, Shibo He, Jiming Chen, Yang Zhang:
PrivSyn: Differentially Private Data Synthesis. USENIX Security Symposium 2021: 929-946 - [c215]Xinlei He, Jinyuan Jia, Michael Backes, Neil Zhenqiang Gong, Yang Zhang:
Stealing Links from Graph Neural Networks. USENIX Security Symposium 2021: 2669-2686 - [c214]Jie Huang, Michael Backes, Sven Bugiel:
A11y and Privacy don't have to be mutually exclusive: Constraining Accessibility Service Misuse on Android. USENIX Security Symposium 2021: 3631-3648 - [c213]Trung Tin Nguyen, Michael Backes, Ninja Marnau, Ben Stock:
Share First, Ask Later (or Never?) Studying Violations of GDPR's Explicit Consent in Android Apps. USENIX Security Symposium 2021: 3667-3684 - [c212]Marten Oltrogge, Nicolas Huaman, Sabrina Amft, Yasemin Acar, Michael Backes, Sascha Fahl:
Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications. USENIX Security Symposium 2021: 4347-4364 - [i107]Yugeng Liu, Rui Wen, Xinlei He, Ahmed Salem, Zhikun Zhang, Michael Backes, Emiliano De Cristofaro, Mario Fritz, Yang Zhang:
ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models. CoRR abs/2102.02551 (2021) - [i106]Xinlei He, Rui Wen, Yixin Wu, Michael Backes, Yun Shen, Yang Zhang:
Node-Level Membership Inference Attacks Against Graph Neural Networks. CoRR abs/2102.05429 (2021) - [i105]Min Chen
, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, Yang Zhang:
Graph Unlearning. CoRR abs/2103.14991 (2021) - [i104]Lukas Bieringer, Kathrin Grosse, Michael Backes, Katharina Krombholz:
Mental Models of Adversarial Machine Learning. CoRR abs/2105.03726 (2021) - [i103]Zhikun Zhang, Min Chen, Michael Backes, Yun Shen, Yang Zhang:
Inference Attacks Against Graph Neural Networks. CoRR abs/2110.02631 (2021) - [i102]Oliver Schranz, Sebastian Weisgerber, Erik Derr, Michael Backes, Sven Bugiel:
Towards a Principled Approach for Dynamic Analysis of Android's Middleware. CoRR abs/2110.05619 (2021) - [i101]Ahmed Salem, Michael Backes, Yang Zhang:
Get a Model! Model Hijacking Attack Against Machine Learning Models. CoRR abs/2111.04394 (2021) - [i100]Cristian-Alexandru Staicu, Sazzadur Rahaman, Ágnes Kiss, Michael Backes:
Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages. CoRR abs/2111.11169 (2021) - 2020
- [j30]Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James R. Larus, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth G. Paterson, Srdjan Capkun, David A. Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel P. Smart, Aysajan Abidin, Seda Gurses, Michael Veale, Cas Cremers, Michael Backes, Nils Ole Tippenhauer, Reuben Binns, Ciro Cattuto, Alain Barrat, Dario Fiore, Manuel Barbosa, Rui Oliveira, José Pereira:
Decentralized Privacy-Preserving Proximity Tracing. IEEE Data Eng. Bull. 43(2): 36-66 (2020) - [c211]Ilkan Esiyok, Lucjan Hanzlik, Robert Künnemann, Lena Marie Budde, Michael Backes:
TrollThrottle - Raising the Cost of Astroturfing. ACNS (2) 2020: 456-476 - [c210]Duc Cuong Nguyen, Erik Derr, Michael Backes, Sven Bugiel:
Up2Dep: Android Tool Support to Fix Insecure Code Dependencies. ACSAC 2020: 263-276 - [c209]Sebastian Roth, Michael Backes, Ben Stock:
Assessing the Impact of Script Gadgets on CSP at Scale. AsiaCCS 2020: 420-431 - [c208]Inken Hagestedt, Michael Backes, Andreas Bulling
:
Adversarial Attacks on Classifiers for Eye-based User Modelling. ETRA Adjunct 2020: 44:1-44:3 - [c207]Inken Hagestedt, Mathias Humbert, Pascal Berrang, Irina Lehmann, Roland Eils, Michael Backes, Yang Zhang:
Membership Inference Against DNA Methylation Databases. EuroS&P 2020: 509-520 - [c206]Kathrin Grosse, Thomas Alexander Trost, Marius Mosbach, Michael Backes, Dietrich Klakow:
On the Security Relevance of Initial Weights in Deep Neural Networks. ICANN (1) 2020: 3-14 - [c205]Kathrin Grosse, Michael T. Smith, Michael Backes:
Killing Four Birds with one Gaussian Process: The Relation between different Test-Time Attacks. ICPR 2020: 4696-4703 - [c204]Yang Zhang, Mathias Humbert, Bartlomiej Surma, Praveen Manoharan
, Jilles Vreeken, Michael Backes:
Towards Plausible Graph Anonymization. NDSS 2020 - [c203]Sanam Ghorbani Lyastani, Michael Schilling, Michaela Neumayr, Michael Backes, Sven Bugiel:
Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication. IEEE Symposium on Security and Privacy 2020: 268-285 - [c202]Stefano Calzavara, Sebastian Roth, Alvise Rabitti, Michael Backes, Ben Stock:
A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web. USENIX Security Symposium 2020: 683-697 - [c201]Ahmed Salem, Apratim Bhattacharya, Michael Backes, Mario Fritz, Yang Zhang:
Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning. USENIX Security Symposium 2020: 1291-1308 - [i99]Tahleen A. Rahman, Mario Fritz, Michael Backes, Yang Zhang:
Everything About You: A Multimodal Approach towards Friendship Inference in Online Social Networks. CoRR abs/2003.00996 (2020) - [i98]Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang:
Dynamic Backdoor Attacks Against Machine Learning Models. CoRR abs/2003.03675 (2020) - [i97]Ilkan Esiyok, Lucjan Hanzlik, Robert Künnemann, Lena Marie Budde, Michael Backes:
Trollthrottle - Raising the Cost of Astroturfing. CoRR abs/2004.08836 (2020) - [i96]Xinlei He, Jinyuan Jia, Michael Backes, Neil Zhenqiang Gong, Yang Zhang:
Stealing Links from Graph Neural Networks. CoRR abs/2005.02131 (2020) - [i95]Min Chen
, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, Yang Zhang:
When Machine Unlearning Jeopardizes Privacy. CoRR abs/2005.02205 (2020) - [i94]Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James R. Larus, Edouard Bugnion, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth G. Paterson, Srdjan Capkun, David A. Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel P. Smart, Aysajan Abidin, Seda F. Gürses, Michael Veale, Cas Cremers, Michael Backes, Nils Ole Tippenhauer, Reuben Binns, Ciro Cattuto, Alain Barrat, Dario Fiore, Manuel Barbosa, Rui Oliveira, José Pereira:
Decentralized Privacy-Preserving Proximity Tracing. CoRR abs/2005.12273 (2020) - [i93]Inken Hagestedt, Michael Backes, Andreas Bulling:
Adversarial Attacks on Classifiers for Eye-based User Modelling. CoRR abs/2006.00860 (2020) - [i92]Xiaoyi Chen, Ahmed Salem, Michael Backes, Shiqing Ma, Yang Zhang:
BadNL: Backdoor Attacks Against NLP Models. CoRR abs/2006.01043 (2020) - [i91]Kathrin Grosse, Taesung Lee, Youngja Park, Michael Backes, Ian M. Molloy:
A new measure for overfitting and its implications for backdooring of deep learning. CoRR abs/2006.06721 (2020) - [i90]Kathrin Grosse, Michael Backes:
How many winning tickets are there in one DNN? CoRR abs/2006.07014 (2020) - [i89]Nico Döttling, Kathrin Grosse, Michael Backes, Ian M. Molloy:
Adversarial Examples and Metrics. CoRR abs/2007.06993 (2020) - [i88]Yang Zou, Zhikun Zhang, Michael Backes, Yang Zhang:
Privacy Analysis of Deep Learning in the Wild: Membership Inference Attacks against Transfer Learning. CoRR abs/2009.04872 (2020) - [i87]Ahmed Salem, Yannick Sautter, Michael Backes, Mathias Humbert, Yang Zhang:
BAAAN: Backdoor Attacks Against Autoencoder and GAN-Based Machine Learning Models. CoRR abs/2010.03007 (2020) - [i86]Ahmed Salem, Michael Backes, Yang Zhang:
Don't Trigger Me! A Triggerless Backdoor Attack Against Deep Neural Networks. CoRR abs/2010.03282 (2020) - [i85]Zhikun Zhang, Tianhao Wang, Ninghui Li, Jean Honorio, Michael Backes, Shibo He, Jiming Chen, Yang Zhang:
PrivSyn: Differentially Private Data Synthesis. CoRR abs/2012.15128 (2020)
2010 – 2019
- 2019
- [j29]Ahmed Salem, Pascal Berrang, Mathias Humbert, Michael Backes:
Privacy-Preserving Similar Patient Queries for Combined Biomedical Data. Proc. Priv. Enhancing Technol. 2019(1): 47-67 (2019) - [c200]Aurore Fass, Michael Backes, Ben Stock:
JStap: a static pre-filter for malicious JavaScript detection. ACSAC 2019: 257-269 - [c199]Jinyuan Jia, Ahmed Salem, Michael Backes, Yang Zhang, Neil Zhenqiang Gong:
MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples. CCS 2019: 259-274 - [c198]Aurore Fass, Michael Backes, Ben Stock:
HideNoSeek: Camouflaging Malicious JavaScript in Benign ASTs. CCS 2019: 1899-1913 - [c197]Michael Backes, Lucjan Hanzlik, Jonas Schneider-Bensch:
Membership Privacy for Fully Dynamic Group Signatures. CCS 2019: 2181-2198 - [c196]Alexander Dax, Robert Künnemann, Sven Tangermann, Michael Backes:
How to Wrap it up - A Formally Verified Proposal for the use of Authenticated Wrapping in PKCS#11. CSF 2019: 62-77 - [c195]Robert Künnemann, Ilkan Esiyok, Michael Backes:
Automated Verification of Accountability in Security Protocols. CSF 2019: 397-413 - [c194]Michael Backes, Nico Döttling, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider:
Ring Signatures: Logarithmic-Size, No Setup - from Standard Assumptions. EUROCRYPT (3) 2019: 281-311 - [c193]Jie Huang, Nataniel P. Borges Jr.
, Sven Bugiel, Michael Backes:
Up-To-Crash: Evaluating Third-Party Library Updatability on Android. EuroS&P 2019: 15-30 - [c192]Tahleen A. Rahman, Bartlomiej Surma, Michael Backes, Yang Zhang:
Fairwalk: Towards Fair Graph Embedding. IJCAI 2019: 3289-3295 - [c191]Inken Hagestedt, Yang Zhang, Mathias Humbert, Pascal Berrang, Haixu Tang, XiaoFeng Wang, Michael Backes:
MBeacon: Privacy-Preserving Beacons for DNA Methylation Data. NDSS 2019 - [c190]Ahmed Salem, Yang Zhang, Mathias Humbert, Pascal Berrang, Mario Fritz, Michael Backes:
ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models. NDSS 2019 - [c189]Michael Backes, Lucjan Hanzlik, Amir Herzberg, Aniket Kate, Ivan Pryvalov:
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains Without Trusted Setup. Public Key Cryptography (1) 2019: 286-313 - [c188]Patrick Speicher, Marcel Steinmetz, Jörg Hoffmann, Michael Backes, Robert Künnemann:
Towards automated network mitigation analysis. SAC 2019: 1971-1978 - [c187]Saba Eskandarian, Jonathan Cogan, Sawyer Birnbaum, Peh Chang Wei Brandon, Dillon Franke, Forest Fraser, Gaspar Garcia Jr., Eric Gong, Hung T. Nguyen, Taresh K. Sethi, Vishal Subbiah, Michael Backes, Giancarlo Pellegrino, Dan Boneh:
Fidelius: Protecting User Secrets from Compromised Browsers. IEEE Symposium on Security and Privacy 2019: 264-280 - [c186]Duc Cuong Nguyen, Erik Derr, Michael Backes, Sven Bugiel:
Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security & Privacy. IEEE Symposium on Security and Privacy 2019: 555-569 - [c185]Robert Künnemann, Deepak Garg, Michael Backes:
Causality & Control Flow. CREST@ETAPS 2019: 32-46 - [i84]Kathrin Grosse, Thomas Alexander Trost, Marius Mosbach, Michael Backes, Dietrich Klakow:
Adversarial Initialization - when your network performs the way I want. CoRR abs/1902.03020 (2019) - [i83]Ahmed Salem, Apratim Bhattacharyya, Michael Backes, Mario Fritz, Yang Zhang:
Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning. CoRR abs/1904.01067 (2019) - [i82]Marie-Therese Walter, David Pfaff, Stefan Nürnberger, Michael Backes:
Proconda - Protected Control Data. CoRR abs/1909.03758 (2019) - [i81]Michael Thomas Smith, Kathrin Grosse, Michael Backes, Mauricio A. Álvarez:
Adversarial Vulnerability Bounds for Gaussian Process Classification. CoRR abs/1909.08864 (2019) - [i80]Jinyuan Jia, Ahmed Salem, Michael Backes, Yang Zhang, Neil Zhenqiang Gong:
MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples. CoRR abs/1909.10594 (2019) - [i79]Michael Backes, Lucjan Hanzlik, Amir Herzberg, Aniket Kate, Ivan Pryvalov:
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup. IACR Cryptol. ePrint Arch. 2019: 63 (2019) - [i78]Michael Backes, Nico Döttling, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider:
Ring Signatures: Logarithmic-Size, No Setup - from Standard Assumptions. IACR Cryptol. ePrint Arch. 2019: 196 (2019) - [i77]Alexander Dax, Robert Künnemann, Sven Tangermann, Michael Backes:
How to wrap it up - A formally verified proposal for the use of authenticated wrapping in PKCS\#11. IACR Cryptol. ePrint Arch. 2019: 462 (2019) - 2018
- [j28]Fatemeh Shirazi, Milivoj Simeonovski, Muhammad Rizwan Asghar
, Michael Backes, Claudia Díaz:
A Survey on Routing in Anonymous Communication Protocols. ACM Comput. Surv. 51(3): 51:1-51:39 (2018) - [j27]Michael Backes, Pascal Berrang
, Mathias Humbert
, Xiaoyu Shen
, Verena Wolf:
Simulating the Large-Scale Erosion of Genomic Privacy Over Time. IEEE ACM Trans. Comput. Biol. Bioinform. 15(5): 1405-1412 (2018) - [c184]Patrick Speicher, Marcel Steinmetz, Michael Backes, Jörg Hoffmann, Robert Künnemann:
Stackelberg Planning: Towards Effective Leader-Follower State Space Search. AAAI 2018: 6286-6293 - [c183]Michael Backes, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider:
Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys. ASIACRYPT (2) 2018: 405-434 - [c182]Aurore Fass, Robert P. Krawczyk, Michael Backes, Ben Stock:
JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript. DIMVA 2018: 303-325 - [c181]Pascal Berrang, Mathias Humbert, Yang Zhang, Irina Lehmann, Roland Eils, Michael Backes:
Dissecting Privacy Risks in Biomedical Data. EuroS&P 2018: 62-76 - [c180]Patrick Speicher, Marcel Steinmetz, Robert Künnemann, Milivoj Simeonovski, Giancarlo Pellegrino, Jörg Hoffmann, Michael Backes:
Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure. EuroS&P 2018: 77-91 - [c179]Muhammad Rizwan Asghar, Michael Backes, Milivoj Simeonovski:
PRIMA: Privacy-Preserving Identity and Access Management at Internet-Scale. ICC 2018: 1-6 - [c178]Ben Stock, Giancarlo Pellegrino, Frank Li, Michael Backes, Christian Rossow:
Didn't You Hear Me? - Towards More Successful Web Vulnerability Notifications. NDSS 2018 - [c177]Marten Oltrogge, Erik Derr, Christian Stransky, Yasemin Acar, Sascha Fahl, Christian Rossow, Giancarlo Pellegrino, Sven Bugiel, Michael Backes:
The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators. IEEE Symposium on Security and Privacy 2018: 634-647 - [c176]Meng Xu, Chenxiong Qian, Kangjie Lu, Michael Backes, Taesoo Kim:
Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels. IEEE Symposium on Security and Privacy 2018: 661-678 - [c175]Sanam Ghorbani Lyastani, Michael Schilling, Sascha Fahl, Michael Backes, Sven Bugiel:
Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse. USENIX Security Symposium 2018: 203-220 - [c174]Yang Zhang, Mathias Humbert, Tahleen A. Rahman, Cheng-Te Li, Jun Pang, Michael Backes:
Tagvisor: A Privacy Advisor for Sharing Hashtags. WWW 2018: 287-296 - [e5]David Lie, Mohammad Mannan, Michael Backes, XiaoFeng Wang:
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, October 15-19, 2018. ACM 2018, ISBN 978-1-4503-5693-0 [contents] - [i76]Yang Zhang, Mathias Humbert, Tahleen A. Rahman, Cheng-Te Li, Jun Pang, Michael Backes:
Tagvisor: A Privacy Advisor for Sharing Hashtags. CoRR abs/1802.04122 (2018) - [i75]Robert Künnemann, Ilkan Esiyok, Michael Backes:
Automated Verification of Accountability in Security Protocols. CoRR abs/1805.10891 (2018) - [i74]Ahmed Salem, Yang Zhang, Mathias Humbert, Mario Fritz, Michael Backes:
ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models. CoRR abs/1806.01246 (2018) - [i73]Kathrin Grosse, Michael T. Smith, Michael Backes:
Killing Three Birds with one Gaussian Process: Analyzing Attack Vectors on Classification. CoRR abs/1806.02032 (2018) - [i72]Lucjan Hanzlik, Yang Zhang, Kathrin Grosse, Ahmed Salem, Max Augustin, Michael Backes, Mario Fritz:
MLCapsule: Guarded Offline Deployment of Machine Learning as a Service. CoRR abs/1808.00590 (2018) - [i71]Saba Eskandarian, Jonathan Cogan, Sawyer Birnbaum, Peh Chang Wei Brandon, Dillon Franke, Forest Fraser, Gaspar Garcia Jr., Eric Gong, Hung T. Nguyen, Taresh K. Sethi, Vishal Subbiah, Michael Backes, Giancarlo Pellegrino, Dan Boneh:
Fidelius: Protecting User Secrets from Compromised Browsers. CoRR abs/1809.04774 (2018) - [i70]Kathrin Grosse, David Pfaff, Michael T. Smith, Michael Backes:
The Limitations of Model Uncertainty in Adversarial Settings. CoRR abs/1812.02606 (2018) - [i69]Robert Künnemann, Deepak Garg, Michael Backes:
Accountability in Security Protocols. IACR Cryptol. ePrint Arch. 2018: 127 (2018) - [i68]Michael Backes, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider:
Signatures with Flexible Public Key: A Unified Approach to Privacy-Preserving Signatures (Full Version). IACR Cryptol. ePrint Arch. 2018: 191 (2018) - [i67]Michael Backes, Lucjan Hanzlik, Jonas Schneider:
Membership Privacy for Fully Dynamic Group Signatures. IACR Cryptol. ePrint Arch. 2018: 641 (2018) - 2017
- [j26]Yasemin Acar, Michael Backes, Sascha Fahl, Doowon Kim, Michelle L. Mazurek, Christian Stransky:
How Internet Resources Might Be Helping You Develop Faster but Less Securely. IEEE Secur. Priv. 15(2): 50-60 (2017) - [c173]Jie Huang, Oliver Schranz, Sven Bugiel, Michael Backes:
The ART of App Compartmentalization: Compiler-based Library Privilege Separation on Stock Android. CCS 2017: 1037-1049 - [c172]Duc Cuong Nguyen, Dominik Wermke, Yasemin Acar, Michael Backes, Charles Weir
, Sascha Fahl:
A Stitch in Time: Supporting Android Developers in WritingSecure Code. CCS 2017: 1065-1077 - [c171]Giancarlo Pellegrino, Martin Johns, Simon Koch
, Michael Backes, Christian Rossow:
Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs. CCS 2017: 1757-1771 - [c170]Michael Backes, Mathias Humbert, Jun Pang, Yang Zhang:
walk2friends: Inferring Social Links from Mobility Profiles. CCS 2017: 1943-1957 - [c169]Erik Derr, Sven Bugiel, Sascha Fahl, Yasemin Acar, Michael Backes:
Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android. CCS 2017: 2187-2200 - [c168]Michael Backes, Manuel Gomez-Rodriguez
, Praveen Manoharan
, Bartlomiej Surma:
Reconciling Privacy and Utility in Continuous-Time Diffusion Networks. CSF 2017: 292-304 - [c167]Kathrin Grosse, Nicolas Papernot, Praveen Manoharan, Michael Backes, Patrick D. McDaniel:
Adversarial Examples for Malware Detection. ESORICS (2) 2017: 62-79 - [c166]Michael Backes, Jannik Dreier, Steve Kremer, Robert Künnemann:
A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and Its Application to Fair Exchange. EuroS&P 2017: 76-91 - [c165]Michael Backes, Mohammad Nauman:
LUNA: Quantifying and Leveraging Uncertainty in Android Malware Analysis through Bayesian Machine Learning. EuroS&P 2017: 204-217 - [c164]Michael Backes, Konrad Rieck, Malte Skoruppa, Ben Stock, Fabian Yamaguchi:
Efficient and Flexible Discovery of PHP Application Vulnerabilities. EuroS&P 2017: 334-349 - [c163]Michael Backes, Sven Bugiel, Oliver Schranz, Philipp von Styp-Rekowsky, Sebastian Weisgerber:
ARTist: The Android Runtime Instrumentation and Security Toolkit. EuroS&P 2017: 481-495 - [c162]Kangjie Lu, Marie-Therese Walter, David Pfaff, Stefan Nümberger, Wenke Lee, Michael Backes:
Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying. NDSS 2017 - [c161]Giorgi Maisuradze, Michael Backes, Christian Rossow:
Dachshund: Digging for and Securing (Non-)Blinded Constants in JIT Code. NDSS 2017 - [c160]Johannes Krupp, Mohammad Karami, Christian Rossow, Damon McCoy, Michael Backes:
Linking Amplification DDoS Attacks to Booter Services. RAID 2017: 427-449 - [c159]Felix Fischer, Konstantin Böttinger, Huang Xiao, Christian Stransky, Yasemin Acar, Michael Backes, Sascha Fahl:
Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security. IEEE Symposium on Security and Privacy 2017: 121-136 - [c158]Yasemin Acar, Michael Backes, Sascha Fahl, Simson L. Garfinkel, Doowon Kim, Michelle L. Mazurek, Christian Stransky:
Comparing the Usability of Cryptographic APIs. IEEE Symposium on Security and Privacy 2017: 154-171 - [c157]Michael Backes, Sven Bugiel, Philipp von Styp-Rekowsky, Marvin WiBfeld:
Seamless In-App Ad Blocking on Stock Android. IEEE Symposium on Security and Privacy Workshops 2017: 163-168 - [c156]Michael Backes, Pascal Berrang, Matthias Bieg, Roland Eils, Carl Herrmann
, Mathias Humbert, Irina Lehmann:
Identifying Personal DNA Methylation Profiles by Genotype Inference. IEEE Symposium on Security and Privacy 2017: 957-976 - [c155]Ben Stock, Martin Johns, Marius Steffens, Michael Backes:
How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security. USENIX Security Symposium 2017: 971-987 - [c154]