Acoustic {Side-Channel} Attacks on Printers M Backes, M Dürmuth, S Gerling, M Pinkal, C Sporleder 19th USENIX Security Symposium (USENIX Security 10), 2010 | 252 | 2010 |
Quantifying the security of graphical passwords: The case of android unlock patterns S Uellenbeck, M Dürmuth, C Wolf, T Holz Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 249 | 2013 |
Adaptive password-strength meters from markov models. C Castelluccia, M Dürmuth, D Perito NDSS, 2012 | 223 | 2012 |
Rethinking Access Control and Authentication for the Home Internet of Things ({{{{{IoT}}}}}) W He, M Golla, R Padhi, J Ofek, M Dürmuth, E Fernandes, B Ur 27th USENIX Security Symposium (USENIX Security 18), 255-272, 2018 | 174 | 2018 |
Compromising reflections-or-how to read LCD monitors around the corner M Backes, M Dürmuth, D Unruh 2008 IEEE Symposium on Security and Privacy (sp 2008), 158-169, 2008 | 161 | 2008 |
A provably secure and efficient countermeasure against timing attacks B Köpf, M Dürmuth 2009 22nd IEEE Computer Security Foundations Symposium, 324-335, 2009 | 138 | 2009 |
Tempest in a teapot: Compromising reflections revisited M Backes, T Chen, M Dürmuth, HPA Lensch, M Welk 2009 30th IEEE Symposium on Security and Privacy, 315-327, 2009 | 131 | 2009 |
Who Are You? A Statistical Approach to Measuring User Authenticity. D Freeman, S Jain, M Dürmuth, B Biggio, G Giacinto NDSS 16, 21-24, 2016 | 114 | 2016 |
OMEN: Faster password guessing using an ordered markov enumerator M Dürmuth, F Angelstorf, C Castelluccia, D Perito, A Chaabane International symposium on engineering secure software and systems, 119-132, 2015 | 101 | 2015 |
An algebra for composing enterprise privacy policies M Backes, M Dürmuth, R Steinwandt European Symposium on Research in Computer Security, 33-52, 2004 | 75 | 2004 |
On the accuracy of password strength meters M Golla, M Dürmuth Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 69 | 2018 |
Deniable encryption with negligible detection probability: An interactive construction M Dürmuth, DM Freeman Annual International Conference on the Theory and Applications of …, 2011 | 63 | 2011 |
A cryptographically sound Dolev-Yao style security proof of an electronic payment system M Backes, M Durmuth 18th IEEE Computer Security Foundations Workshop (CSFW'05), 78-93, 2005 | 63 | 2005 |
Speaker recognition in encrypted voice streams M Backes, G Doychev, M Dürmuth, B Köpf European Symposium on Research in Computer Security, 508-523, 2010 | 62 | 2010 |
When privacy meets security: Leveraging personal information for password cracking C Castelluccia, A Chaabane, M Dürmuth, D Perito arXiv preprint arXiv:1304.6584, 2013 | 57 | 2013 |
OAEP is secure under key-dependent messages M Backes, M Dürmuth, D Unruh International Conference on the Theory and Application of Cryptology and …, 2008 | 53 | 2008 |
Evaluation of standardized password-based key derivation against parallel processing platforms M Dürmuth, T Güneysu, M Kasper, C Paar, T Yalcin, R Zimmermann European Symposium on Research in Computer Security, 716-733, 2012 | 47 | 2012 |
" What was that site doing with my Facebook password?" Designing Password-Reuse Notifications M Golla, M Wei, J Hainline, L Filipe, M Dürmuth, E Redmiles, B Ur Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 43 | 2018 |
On the security of cracking-resistant password vaults M Golla, B Beuscher, M Dürmuth Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 42 | 2016 |
Conditional reactive simulatability M Backes, M Dürmuth, D Hofheinz, R Küsters European Symposium on Research in Computer Security, 424-443, 2006 | 40 | 2006 |