Forschung

Kontakt

Universität Oldenburg
Fakultät II – Department für Informatik
Abteilung Safety-Security-Interaction
26111 Oldenburg

Sekretariat

Ingrid Ahlhorn

+49 (0) 441 - 798 2426

A05 1-134

Uhlhornsweg 84,  26129 Oldenburg

Forschung

Forschung

Unser Forschungsfokus liegt auf der Entwicklung und der Analyse von IT-Sicherheitstechnologien im Zusammenspiel mit der funktionalen Sicherheit von sowie der Benutzerinteraktion mit den zu schützenden Systemen. Als Anwendungsbereiche schauen wir uns speziell das Internet der Dinge sowie sicherheitskritische Systeme an. Insbesondere im Bereich des Internets der Dinge kommt das komplexe Thema der Datensicherheit und der 'Privacy-Enhancing Technologies' hinzu.

Aktuelle Publikationen

Im Folgenden werden die Publikationen der letzten drei Jahre aufgelistet. Eine vollständige Liste, inklusive BibTex-Format, ist auf der Seite Publikationen zu finden.

2022

  • V. Stanciu, M. van Steen, C. Dobre, und A. Peter, "Anonymized Counting of Nonstationary Wi-Fi Devices When Monitoring Crowds" in Proc. of the 25th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM 2022), 2022, to appear.
  • A. Bassit, F. Hahn, R. Veldhuis, und A. Peter, "Multiplication-Free Biometric Recognition for Faster Processing under Encryption" in Proc. of the 2022 International Joint Conference on Biometrics (IJCB 2022), 2022, to appear.
  • A. Bassit, F. Hahn, R. Veldhuis, und A. Peter, "Hybrid Biometric Template Protection: Resolving the Agony of Choice between Bloom Filters and Homomorphic Encryption" in IET Biometrics, 2022. (» PDF)
  • T. Bontekoe, M. Everts, und A. Peter, "Balancing privacy and accountability in digital payment methods using zk-SNARKs" in Proc. of the 19th Annual International Conference on Privacy, Security, and Trust (PST 2022), 2022, to appear.
  • M. Dijkslag, M. Damie, F. Hahn, und A. Peter, "Passive query-recovery attack against secure conjunctive keyword search schemes" in Proc. of the 20th International Conference on Applied Cryptography and Network Security (ACNS 2022). Springer, 2022. (» PDF)
  • H. Esquivel-Vargas, J. Castellanos, M. Caselli, N. Tippenhauer, und A. Peter, "Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge" in Proc. of the 20th International Conference on Applied Cryptography and Network Security (ACNS 2022). Springer, 2022. (» PDF)
  • J. Weener, F. Hahn, und A. Peter, "Libertas: Backward Private Dynamic Searchable Symmetric Encryption Supporting Wildcards" in Proc. of the 36th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2022). Springer, 2022. (» PDF)
  • T. van Ede, H. Aghakhani, N. Spahn, R. Bortolameotti, M. Cova, A. Continella, M. van Steen, A. Peter, C. Kruegel, und G. Vigna, "DEEPCASE: Semi-Supervised Contextual Analysis of Security Events" in Proc. of the IEEE Symposium on Security and Privacy (S&P 2022). IEEE, 2022. (» PDF)

2021

  • M. Damie, F. Hahn, und A. Peter, "A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents" in Proc. of the 30th USENIX Security Symposium (USENIX Security 2021), 2021, pp. 143-160. (» PDF)
  • V. Stanciu, M. van Steen, C. Dobre, und A. Peter, "Privacy-Preserving Crowd-Monitoring Using Bloom Filters and Homomorphic Encryption" in Proc. of the 4th International Workshop on Edge Systems, Analytics and Networking (EdgeSys 2021), 2021, pp. 37-42. (» PDF)
  • Z. Shang, S. Oya, A. Peter, und F. Kerschbaum, "Obfuscated Access and Search Patterns in Searchable Encryption" in Proc. of the 28th Annual Network and Distributed System Security Symposium (NDSS 2021), 2021. (» PDF)
  • A. Bassit, F. Hahn, C. Zeinstra, R. Veldhuis, und A. Peter, "Bloom Filter vs Homomorphic Encryption: Which approach protects the biometric data and satisfies ISO/IEC 24745?" in Proc. of the 20th International Conference of the Biometrics Special Interest Group (BIOSIG 2021), 2021, pp. 1-6. (» PDF)
  • H. Esquivel-Vargas, M. Caselli, und A. Peter, "BACGraph: Automatic Extraction of Object Relationships in the BACnet Protocol" in Proc. of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S 2021), 2021, pp. 45-48. (» PDF)
  • R. G. Roessink, A. Peter, und F. Hahn, "Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements" in Proc. of the 19th International Conference on Applied Cryptography and Network Security (ACNS 2021), 2021, pp. 155-183. (» PDF)
  • A. Bassit, F. Hahn, J. Peeters, T. Kevenaar, R. Veldhuis, und A. Peter, "Fast and Accurate Likelihood Ratio-Based Biometric Verification Secure Against Malicious Adversaries" IEEE Transactions on Information Forensics and Security (TIFS), vol. 16, pp. 5045-5060, 2021. (» PDF)
  • F. Engelmann, L. Müller, A. Peter, F. Kargl, und C. Bösch, "SwapCT: Swap confidential transactions for privacy-preserving multi-token exchanges" Proceedings on Privacy Enhancing Technologies (PoPETs), vol. 2021, iss. 4, pp. 270-290, 2021. (» PDF)

2020

  • V. Legoy, M. Caselli, C. Seifert, und A. Peter, "Automated Retrieval of ATT&CK Tactics and Techniques for Cyber Threat Reports" arXiv preprint arXiv:2004.14322, 2020. (» PDF)
  • R. Bortolameotti, T. Van Ede, A. Continella, T. Hupperich, M. H. Everts, R. Rafati, W. Jonker, P. Hartel, und A. Peter, "HeadPrint: detecting anomalous communications through header-based application fingerprinting" in Proc. of the 35th Annual ACM Symposium on Applied Computing (SAC 2020), 2020, pp. 1696-1705. (» PDF)
  • V. Stanciu, M. van Steen, C. Dobre, und A. Peter, "K-Anonymous Crowd Flow Analytics" in Proc. of the 17th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous 2020), 2020. (» PDF)
  • H. Esquivel-Vargas, M. Caselli, G. J. Laanstra, und A. Peter, "Putting Attacks in Context: A Building Automation Testbed for Impact Assessment from the Victim’s Perspective" in Proc. of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2020), 2020, pp. 44-64. (» PDF)
  • T. van Ede, R. Bortolameotti, A. Continella, J. Ren, D. J. Dubois, M. Lindorfer, D. Choffnes, M. van Steen, und A. Peter, "FlowPrint: Semi-supervised mobile-app fingerprinting on encrypted network traffic" in Proc. of the 27th Annual Network and Distributed System Security Symposium (NDSS 2020), 2020. (» PDF)
  • T. van de Kamp, A. Peter, und W. Jonker, "A multi-authority approach to various predicate encryption types" Designs, Codes and Cryptography (DESI), vol. 88, iss. 2, pp. 363-390, 2020. (» PDF)
(Stand: 16.03.2023)  |