Publications

This list of publications is automatically created from my BibTeX database and will be updated semi-regularly as I update that master file. If you need a PDF version of one of these publications that is not online (for various reasons), please send me an email.

For a list of citations, see e.g. my ResearchGate, Google Scholar, ACM Authorizer, Semantic Scholar, or ORCID profiles. For most of the conference papers, I have also given the presentations, and you can find my associated slides here.

(2023). Face to Face with Efficiency: Real-Time Face Recognition Pipelines on Embedded Devices. Proc. MoMM 2023: Advances in Mobile Computing and Multimedia Intelligence.

PDF Cite DOI

(2023). Anonymously Publishing Liveness Signals with Plausible Deniability. Advances in Mobile Computing and Multimedia Intelligence.

PDF Cite DOI

(2023). INFRASPEC – Automated Inspection of Critical Infrastructure. ERCIM NEWS- European Research Consortium for Informatics and Mathematics.

Cite

(2023). A Large-Scale Data Collection and Evaluation Framework for Android Device Security Attributes. IDIMT-2023: 31st Interdisciplinary Information Management Talks.

Cite

(2023). A Survey on Fingerprinting Technologies for Smartphones Based on Embedded Transducers. IEEE Internet of Things.

Cite DOI

(2023). Practical Delegatable Anonymous Credentials From Equivalence Class Signatures. Proceedings on Privacy Enhancing Technologies (PoPETs).

PDF Cite DOI

(2023). Efficient Aggregation of Face Embeddings for Decentralized Face Recognition Deployments. Proceedings of the 9th International Conference on Information Systems Security and Privacy (ICISSP 2023).

Cite DOI

(2023). Digitale Identitäten in der physischen Welt: Eine Abwägung von Privatsphäreschutz und Praktikabilität. HMD Praxis der Wirtschaftsinformatik.

Cite DOI

(2022). Fingerprinting Smartphones Based on Microphone Characteristics from Environment Affected Recordings. IEEE Access.

Cite DOI

(2022). Evaluating Dynamic Tor Onion Services for Privacy Preserving Distributed Digital Identity Systems. Journal of Cyber Security and Mobility.

Cite DOI

(2022). Decentralized, Privacy-Preserving, Single Sign-On. Security and Communication Networks.

Cite DOI URL

(2021). Sweep-to-Unlock: Fingerprinting Smartphones based on Loudspeaker Roll-off Characteristics. IEEE Transactions on Mobile Computing.

Cite DOI URL

(2021). Adversary Models for Mobile Device Authentication. ACM Comput. Surv..

PDF Cite DOI

(2021). On the state of V3 onion services. Proc. FOCI ‘21: ACM SIGCOMM 2021 Workshop on Free and Open Communications on the Internet.

Cite DOI URL

(2021). On the feasibility of short-lived dynamic onion services. 2021 IEEE Security and Privacy Workshops (SPW).

Cite DOI

(2021). Importance of different facial parts for face detection networks. Proc. IWBF 2021: 9th IEEE International Workshop on Biometrics and Forensics.

Cite DOI URL

(2021). The Android Platform Security Model. ACM Transactions on Privacy and Security (TOPS).

PDF Cite DOI

(2021). Experiences and Recommendations from Operating a Tor Exit Node at a University. Proceedings of the 7th International Conference on Information Systems Security and Privacy (ICISSP).

Cite DOI URL

(2021). Analyzing inconsistencies in the Tor consensus. Proc. iiWAS2021: The 23rd International Conference on Information Integration and Web Intelligence.

Cite DOI URL

(2020). Secure Accelerometer-based Pairing of Mobile Devices in Multi-modal Transport. IEEE Access.

Cite DOI

(2020). Privacy-preserving features in the Mobile Driving License. Google Security Blog.

PDF Cite

(2020). Adversary Models for Mobile Device Authentication. arXiv:2009.10150 [cs].

PDF Cite

(2020). Dynamic Taint Tracking Simulation. Proc. ICETE 2019: E-Business and Telecommunications.

PDF Cite DOI

(2020). Dynamic Taint Tracking Simulation. Communications in Computer and Information Science.

Cite URL

(2020). The not so private way of tracing contacts: A first analysis of the NOVID20 Android SDK.

PDF Cite

(2020). DAMFA: Decentralized Anonymous Multi-Factor Authentication. Proc. BSCI: International Symposium on Blockchain and Secure Critical Infrastructure.

Cite URL

(2019). CORMORANT: Ubiquitous Risk-Aware Multi-Modal Biometric Authentication across Mobile Devices. Proc. ACM Interactive, Mobile, Wearable and Ubiquitous Technologies.

PDF Cite DOI

(2019). Disposable dynamic accumulators: toward practical privacy-preserving mobile eIDs with scalable revocation. International Journal of Information Security.

Cite DOI

(2019). The Android Platform Security Model. arXiv:1904.05572 [cs].

PDF

(2019). KinPhy: A Kinetic in-Band Channel for Millimetre-Wave Networks. Proceedings of the 17th Conference on Embedded Networked Sensor Systems.

PDF Cite DOI

(2019). Insider Attack Resistance in the Android Ecosystem. Enigma 2019.

(2018). Android Pie à la mode: Security & Privacy.

PDF

(2018). Investigating the impact of network security on the line current differential protection system. The Journal of Engineering.

PDF DOI

(2018). Design, Implementation, and Evaluation of Secure Communication for Line Current Differential Protection Systems over Packet Switched Networks. International Journal of Critical Infrastructure Protection.

PDF DOI

(2018). Bridging the Gap in Privacy-Preserving Revocation: Practical and Scalable Revocation of Mobile eIDs. Proceedings of the 33rd Annual ACM Symposium on Applied Computing (SAC ‘18).

PDF Cite DOI

(2018). Mobile Match-on-Card Authentication Using Offline-Simplified Models with Gait and Face Biometrics. IEEE Transactions on Mobile Computing.

DOI

(2018). Wie sicher ist die schöne, neue und vernetzte Welt?. Automatisierung: Wechselwirkung mit Kunst, Wissenschaft und Gesellschaft.

(2018). Sulong, and Thanks For All the Bugs: Finding Errors in C Programs by Abstracting from the Native Execution Model. Proceedings of the Twenty-Third International Conference on Architectural Support for Programming Languages and Operating Systems.

Cite DOI

(2018). Sulong, and Thanks For All the Bugs: Finding Errors in C Programs by Abstracting from the Native Execution Model. Proceedings of the Twenty-Third International Conference on Architectural Support for Programming Languages and Operating Systems.

DOI

(2018). Recovery of Encrypted Mobile Device Backups from Partially Trusted Cloud Servers. Proc. ARES 2018: 13th International Conference on Availability, Reliability and Security.

Cite URL

(2018). Introspection for C and its Applications to Library Robustness. The Art, Science, and Engineering of Programming, 2018.

Cite URL

(2017). Smartphone-based Gait Recognition: From Authentication to Imitation. IEEE Transactions on Mobile Computing (IEEE TMC).

DOI

(2017). Real-world Identification for an Extensible and Privacy-preserving Mobile eID. Privacy and Identity Management. The Smart Revolution. Privacy and Identity 2017.

PDF Cite DOI

(2017). Extensibility in a Privacy-preserving eID: Towards a Mobile eID System for Real-world Identification and Offline Verification. IFIP Summer School 2017: Privacy and Identity Management – the Smart World Revolution (Pre-proceedings).

PDF Cite

(2017). Protecting Touch: Authenticated App-To-Server Channels for Mobile Devices Using NFC Tags. Information.

PDF Cite DOI

(2017). A Large-Scale, Long-Term Analysis of Mobile Device Usage Characteristics. Proc. ACM Interactive, Mobile, Wearable and Ubiquitous Technologies.

PDF Cite DOI

(2017). ShakeUnlock: Securely Transfer Authentication States Between Mobile Devices. IEEE Transactions on Mobile Computing (IEEE TMC).

DOI

(2016). Real-World Identification: Towards a Privacy-Aware Mobile eID for Physical and Offline Verification. Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016).

DOI

(2016). Mobile Gait Match-on-Card Authentication from Acceleration Data with Offline-Simplified Models. Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016).

DOI

(2016). DAMN - A Debugging and Manipulation Tool for Android Applications. Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016).

DOI

(2016). Accelerometer based Gait Recognition using Adapted Gaussian Mixture Models. Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016).

DOI

(2016). Location-based Risk Assessment for Mobile Authentication. 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp Adjunct 2016, Heidelberg, Germany, September 12-16, 2016.

DOI

(2016). Eyewear Computing – Augmenting the Human with Head-mounted Wearable Assistants (Dagstuhl Seminar 16042). Dagstuhl Reports.

PDF DOI

(2015). Towards Device-to-User Authentication: Protecting Against Phishing Hardware by Ensuring Mobile Device Authenticity using Vibration Patterns. Proc. MUM 2015: 14th International Conference on Mobile and Ubiquitous Multimedia.

(2015). Proceedings of the 14th International Conference on Mobile and Ubiquitous Multimedia (MUM '15). ACM.

PDF Cite DOI

(2015). Confidence and Risk Estimation Plugins for Multi-Modal Authentication on Mobile Devices using CORMORANT. 13th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2015).

DOI

(2015). A password-authenticated secure channel for App to Java Card applet communication. International Journal of Pervasive Computing and Communications.

Cite DOI

(2015). Only play in your comfort zone: interaction methods for improving security awareness on mobile devices. Personal and Ubiquitous Computing.

DOI

(2015). Cross Pocket Gait Authentication using Mobile Phone Based Accelerometer Sensor. Proc. EUROCAST 2015: 15th International Conference on Computer Aided Systems Theory.

DOI

(2015). Optimal Derotation of Shared Acceleration Time Series by Determining Relative Spatial Alignment. International Journal of Pervasive Computing and Communications (IJPCC).

DOI

(2015). CORMORANT: Towards Continuous Risk-aware Multi-modal Cross-device Authentication. Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers: Adjunct Publication (UbiComp 2015).

PDF DOI

(2014). ShakeUnlock: Securely Unlock Mobile Devices by Shaking them Together. Proc. MoMM 2014: 12th International Conference on Advances in Mobile Computing and Multimedia.

DOI

(2014). Orientation Independent Cell Phone Based Gait Authentication. Proc. MoMM 2014: 12th International Conference on Advances in Mobile Computing and Multimedia.

DOI

(2014). Optimal Derotation of Shared Acceleration Time Series by Determining Relative Spatial Alignment. Proc. iiWAS 2014: 16th International Conference on Information Integration and Web-based Applications & Services.

(2014). Mobile Device Usage Characteristics: The Effect of Context and Form Factor on Locked and Unlocked Usage. Proc. MoMM 2014: 12th International Conference on Advances in Mobile Computing and Multimedia.

DOI

(2014). Mobile Application to Java Card Applet Communication using a Password-authenticated Secure Channel. Proc. MoMM 2014: 12th International Conference on Advances in Mobile Computing and Multimedia.

DOI

(2014). A Survey of User Interaction for Spontaneous Device Association. ACM Computing Surveys.

DOI

(2014). Special Issue on Security and Trust in Context-Aware Applications.

(2014). Managing the life cycle of Java Card applets in other Java virtual machines. International Journal of Pervasive Computing and Communications (IJPCC).

DOI

(2014). Diversity in Locked and Unlocked Mobile Device Usage. Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication (UbiComp 2014).

DOI

(2014). An Architecture for Secure Mobile Devices. Security and Communication Networks.

PDF DOI

(2014). A Practical Hardware-Assisted Approach to Customize Trusted Boot for Mobile Devices. Information Security Conference (ISC 2014).

(2013). Visualizations and Switching Mechanisms for Security Zones. Proc. MoMM 2013: 11th International Conference on Advances in MobileComputing and Multimedia.

(2013). Requirements for an Open Ecosystem for Embedded Tamper ResistantHardware on Mobile Devices. Proc. MoMM 2013: 11th International Conference on Advances in MobileComputing and Multimedia.

(2013). Range Face Segmentation: Face Detection and Segmentation for Authenticationin Mobile Device Range Images. Proc. MoMM 2013: 11th International Conference on Advances in MobileComputing and Multimedia.

(2013). An Analysis Of Different Approaches To Gait Recognition Using CellPhone Based Accelerometer. Proc. MoMM 2013: 11th International Conference on Advances in MobileComputing and Multimedia.

(2013). (Ab)using foreign VMs: Running Java Card Applets in non-Java CardVirtual Machines. Proc. MoMM 2013: 11th International Conference on Advances in MobileComputing and Multimedia.

(2013). When Users Cannot Verify Digital Signatures: On the Difficultiesof Securing Mobile Devices. Proc. HPCC 2013: 15th IEEE International Conference on High PerformanceComputing and Communications.

(2013). UACAP: A Unified Auxiliary Channel Authentication Protocol. IEEE Transactions on Mobile Computing.

DOI

(2013). Towards Secure Personal Device Unlock using Stereo Camera Pan Shots. Proc. EUROCAST 2013: 14th International Conference on ComputerAidedSystems Theory.

(2013). Towards pan shot face unlock: Using biometric face information fromdifferent perspectives to unlock mobile devices. International Journal of Pervasive Computing and Communications (IJPCC).

DOI

(2013). 'My Life, Shared' - Trust and Privacy in the Age of Ubiquitous ExperienceSharing (Dagstuhl Seminar 13312). Dagstuhl Reports.

PDF DOI

(2012). Towards Face Unlock: On the Difficulty of Reliably Detecting Faceson Mobile Phones. Proc. MoMM 2012: 10th International Conference on Advances in MobileComputing and Multimedia.

(2012). SAPHE - Simple Accelerometer based wireless Pairing with HEuristictrees. Proc. MoMM 2012: 10th International Conference on Advances in MobileComputing and Multimedia.

(2012). Unify localization using user interface description languages anda navigation context-aware translation tool. Proc. EICS 2012: 4th ACM SIGCHI symposium on Engineering interactivecomputing systems.

DOI

(2012). Towards usable authentication on mobile phones: An evaluation ofspeaker and face recognition on off-the-shelf handsets. Proc. IWSSI/SPMU 2012: 4th International Workshop on Security andPrivacy in Spontaneous Interaction and Mobile Phone Use, colocatedwith Pervasive 2012.

(2012). Towards a Practical, Scalable Self-Localization System for Android Phones based on WLAN Fingerprinting. Proc. ICDCSW 2012: 32nd International Conference on DistributedComputing Systems Workshops.

DOI

(2012). Air-Writing: A Platform for Scalable, Privacy-Preserving, SpatialGroup Messaging. International Journal of Pervasive Computing and Communications (IJPCC).

DOI

(2011). Private Notes: Encrypted XML Notes Synchronization and Sharingwith Untrusted Web Services. Proc. iiWAS2011: 13th International Conference on Information Integrationand Web-based Applications & Services.

(2011). Feature interaction analysis in mobile phones: on the borderlinebetween application functionalities and platform components. Proc. MoMM 2011: 9th International Conference on Advances in MobileComputing and Multimedia.

(2011). A Critical Review of Applied MDA for Embedded Devices: Identificationof Problem Classes and Discussing Porting Efforts in Practice. Proc. MODELS 2011: ACM/IEEE 14th International Conference on ModelDriven Engineering Languages and Systems.

(2011). A framework for on-device privilege escalation exploit executionon Android. Proc. IWSSI/SPMU 2011: 3rd International Workshop on Security andPrivacy in Spontaneous Interaction and Mobile Phone Use, colocatedwith Pervasive 2011.

(2011). Mobile Platform Architecture Review: Android, iPhone, Qt. Proc. EUROCAST 2011: 13th International Conference on ComputerAided Systems Theory, Part II.

(2011). Evaluation of Descriptive User Interface Methodologies for MobileDevices. Proc. EUROCAST 2011: 13th International Conference on ComputerAided Systems Theory, Part II.

(2011). emphFriends Radar: Towards a Private P2P Location Sharing Platform. Proc. EUROCAST 2011: 13th International Conference on ComputerAided Systems Theory, Part II.

(2011). Global indexing of indoor localization data.

(2010). Air-Writing: A Platform for Scalable, Privacy-Preserving, SpatialGroup Messaging. Proc. iiWAS2010: 12th International Conference on Information Integrationand Web-based Applications & Services.

(2010). User Created Machine-readable Policies for Energy Efficiency in SmartHomes. Proc. UCSE 2010, co-located with Ubicomp 2010.

(2009). Shake well before use: Intuitive and Secure Pairing of Mobile Devices. IEEE Transactions on Mobile Computing.

(2009). On Structural Identification of 2D Regression Functions for In-doorBluetooth Localization. Proc. EUROCAST 2009.

(2009). Special Issue: Secure Spontaneous Interaction.

(2008). Towards Alternative User Interfaces for Capturing and Managing Taskswith Mobile Devices. Proc. MoMM 2008: 6th International Conference on Advances in MobileComputing and Multimedia.

(2008). Spontaneous Mobile Device Authentication based on Sensor Data. Information Security Technical Report.

DOI

(2008). Peer-it: Stick-on solutions for networks of things. Pervasive and Mobile Computing.

(2008). Building Flexible Manufacturing Systems Based on Peer-Its. EURASIP Journal on Embedded Systems.

PDF DOI

(2007). Shake well before use: two implementations for implicit context authentication. Adjunct Proc. Ubicomp 2007.

(2007). Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction. Proc. Ubicomp 2007: 9th International Conference on UbiquitousComputing.

(2007). The Candidate Key Protocol for Generating Secret Shared Keys FromSimilar Sensor Data Streams. Proc. ESAS 2007: 4th European Workshop on Security and Privacyin Ad hoc and Sensor Networks.

(2007). Shake well before use: Authentication based on Accelerometer Data. Proc. Pervasive 2007: 5th International Conference on PervasiveComputing.

PDF Video

(2007). A Human-Verifiable Authentication Protocol Using Visible Laser Light. Proc. ARES 2007: 2nd International Conference on Availability,Reliability and Security.

(2007). Using a Spatial Context Authentication Proxy for Establishing SecureWireless Connections. Journal of Mobile Multimedia.

(2007). Towards an Open Source Toolkit for Ubiquitous Device Authentication. Workshops Proc. PerCom 2007: 5th IEEE International Conferenceon Pervasive Computing and Communications.

(2007). On the Security of Ultrasound as Out-of-band Channel. Proc. IPDPS 2007: 21st IEEE International Parallel and DistributedProcessing Symposium.

(2007). Extending the Growing Neural Gas Classifier for Context Recognition. Proc. EUROCAST 2007: 11th International Conference on ComputerAided Systems Theory.

(2006). A Context Authentication Proxy for IPSec using Spatial Reference. Proc. TwUC 2006: 1st International Workshop on Trustworthy UbiquitousComputing.

(2006). An Authentication Protocol using Ultrasonic Ranging.

PDF

(2005). Technische Hintergründe f̈̊ das rechtliche Handeln im Internet. Aktuelles zum Internet-Recht.

(2005). Bridging the Gap with P2P Patterns. Proceedings of the Workshop on Smart Object Systems.

(2005). Eine Architektur zur Kontextvorhersage. Ausgezeichnete Informatikdissertationen 2004.

(2005). Context Prediction based on Context Histories: Expected Benefits,Issues and Current State-of-the-Art. Proc. ECHISE 2005: 1st International Workshop on Exploiting ContextHistories in Smart Environments.

(2005). Advances in Pervasive Computing: Adjunct Proceedings of the 3rd InternationalConference on Pervasive Computing.

(2005). An Architecture for Context Prediction.

(2004). An Architecture for Context Prediction.

(2004). Recognizing and Predicting Context by Learning from User Behavior. Radiomatics: Journal of Communication Engineering, special issueon Advances in Mobile Multimedia.

(2004). Digital Aura. Advances in Pervasive Computing.

(2004). An Architecture for Context Prediction. Advances in Pervasive Computing.

(2004). A Notebook Sensory Data Set for Context Recognition. Proceedings of the Benchmarks and a Database for Context RecognitionWorkshop.

(2004). A Context Prediction Code and Data Base. Proceedings of the Benchmarks and a Database for Context RecognitionWorkshop.

(2004). A Light-Weight Component Model for Peer-to-Peer Applications. Proceedings MDC04: 2nd International Workshop on Mobile DistributedComputing.

(2004). The Peer-to-Peer Coordination Framework --- Architecture Reference.

(2004). A Peer-to-Peer Light-Weight Component Model for Context-Aware SmartSpace Applications. International Journal of Wireless and Mobile Computing (IJWMC),special issue on Mobile Distributed Computing.

(2003). Feature Extraction in Wireless Personal and Local Area Networks. Proc. MWCN 2003: 5th International Conference on Mobile and WirelessCommunications Networks.

(2003). Recognizing and Predicting Context by Learning from User Behavior. Proc. MoMM 2003: 1st International Conference On Advances in MobileMultimedia.

PDF

(2003). Securing Passive Objects in Mobile Ad-Hoc Peer-to-Peer Networks. Electronic Notes in Theoretical Computer Science.

(2002). DEVS Simulation of Spiking Neural Networks. Cybernetics and Systems: Proc. EMCSR 2002: 16th European Meetingon Cybernetics and Systems Research.

(2002). Generic Heuristics for Combinatorial Optimization Problems. Proceedings of the 9th International Conference on Operational Research(KOI2002).