Forschung

Kontakt

Universität Oldenburg
Fakultät II – Department für Informatik
Abteilung Safety-Security-Interaction
26111 Oldenburg

Sekretariat

Ingrid Ahlhorn

+49 (0) 441 - 798 2426

I 11 0-014

Industriestrasse 11, 26121 Oldenburg

Forschung

Forschung

Unser Forschungsfokus liegt auf der Entwicklung und der Analyse von IT-Sicherheitstechnologien im Zusammenspiel mit der funktionalen Sicherheit von sowie der Benutzerinteraktion mit den zu schützenden Systemen. Als Anwendungsbereiche schauen wir uns speziell das Internet der Dinge sowie sicherheitskritische Systeme an. Insbesondere im Bereich des Internets der Dinge kommt das komplexe Thema der Datensicherheit und der 'Privacy-Enhancing Technologies' hinzu.

Aktuelle Publikationen

Im Folgenden werden die Publikationen der letzten drei Jahre aufgelistet. Eine vollständige Liste, inklusive BibTex-Format, ist auf der Seite Publikationen zu finden.

2024

  • A. El Khairi, M. Caselli, A. Peter, A. Continella, „ReplicaWatcher: Training-less Anomaly Detection in Containerized Microservices” in Proc. of the 31th Annual Network and Distributed System Security Symposium (NDSS 2024), ACM, 2024, to appear.
  • P. Jakubeit, A. Peter, M. van Steen, „RoomKey: Extracting a Volatile Key with Information from the Local WiFi Environment Reconstructable within a Designated Area”. In Proc. of the 10th International Conference on Information Systems Security and Privacy (ICISSP 2024), SciTePress, 2024, to appear.

2023

  • A. Bassit, F. Hahn, R. Veldhuis, A. Peter, „Improved Multiplication-Free Biometric Recognition Under Encryption” in IEEE Transactions on Biometrics, Behavior, and Identity Science (T-BIOM), IEEE, 2023. (» PDF)
  • V. Stanciu, M. van Steen, C. Dobre, A. Peter, „Privacy-friendly statistical counting for pedestrian dynamics” in Computer Communications, vol. 211, pp. 178-192, Elsevier, 2023. (» PDF)
  • J. Starink, M. Huisman, A. Peter, A. Continella, „Understanding and Measuring Inter-Process Code Injection in Windows Malware” in Proc. of the 19th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2023), Springer, 2023, to appear.
  • A. Bassit, F. Hahn, Z. Rezgui, U. Kelly, R. Veldhuis, A. Peter, „Template Recovery Attack on Homomorphically Encrypted Biometric Recognition Systems with Unprotected Threshold Comparison” in Proc. of the 2023 International Joint Conference on Biometrics (IJCB 2023), IEEE, 2023, to appear.
  • P. Jakubeit, A. Peter, M. van Steen, „LocKey: Location-based Key Extraction from the WiFi Environment in the User’s Vicinity”  in Proc. of the 18th International Conference on Information Security Practice and Experience (ISPEC 2023), Springer, 2023. (» PDF)
  • C. Sabater, F. Hahn, A. Peter, J. Ramon, „Private Sampling with Identifiable Cheaters” in Proceedings on Privacy Enhancing Technologies (PoPETs), 2023. (» PDF)
  • P. Jakubeit, A. Peter, M. van Steen, "The Measurable Environment as Nonintrusive Authentication Factor on the Example of WiFi Beacon Frames" in Proc. of the 5th International Workshop on Emerging Technologies for Authorization and Authentication (ETAA 2022), Springer, 2023. (» PDF)

2022

  • V. Stanciu, M. van Steen, C. Dobre, und A. Peter, "Anonymized Counting of Nonstationary Wi-Fi Devices When Monitoring Crowds" in Proc. of the 25th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM 2022), 2022. (» PDF)
  • F. Mazzone, L. van den Heuvel, M. Huber, C. Verdecchia, M. Everts, F. Hahn, und A. Peter, "Repeated Knowledge Distillation with Confidence Masking to Mitigate Membership Inference Attacks" in Proc. of the 15th ACM Workshop on Artificial Intelligence and Security (AISec 2022), 2022. (» PDF)
  • A. El Khairi, M. Caselli, C. Knierim, A. Peter, und A. Continella, "Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection" in Proc. of the 13th ACM Cloud Computing Security Workshop (CCSW 2022), 2022. (» PDF)
  • A. Bassit, F. Hahn, R. Veldhuis, und A. Peter, "Multiplication-Free Biometric Recognition for Faster Processing under Encryption" in Proc. of the 2022 International Joint Conference on Biometrics (IJCB 2022), 2022. (» PDF)
  • A. Bassit, F. Hahn, R. Veldhuis, und A. Peter, "Hybrid Biometric Template Protection: Resolving the Agony of Choice between Bloom Filters and Homomorphic Encryption" in IET Biometrics, 2022. (» PDF)
  • T. Bontekoe, M. Everts, und A. Peter, "Balancing privacy and accountability in digital payment methods using zk-SNARKs" in Proc. of the 19th Annual International Conference on Privacy, Security, and Trust (PST 2022), 2022. (» PDF)
  • M. van Steen, V. Stanciu, N. Shafaeipour, C. Chilipirea, C. Dobre, A. Peter, und M. Wang, "Challenges in Automated Measurement of Pedestrian Dynamics" in Proc. of the 22nd IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS 2022), 2022. (» PDF)
  • M. Dijkslag, M. Damie, F. Hahn, und A. Peter, "Passive query-recovery attack against secure conjunctive keyword search schemes" in Proc. of the 20th International Conference on Applied Cryptography and Network Security (ACNS 2022). Springer, 2022. (» PDF)
  • H. Esquivel-Vargas, J. Castellanos, M. Caselli, N. Tippenhauer, und A. Peter, "Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge" in Proc. of the 20th International Conference on Applied Cryptography and Network Security (ACNS 2022). Springer, 2022. (» PDF)
  • J. Weener, F. Hahn, und A. Peter, "Libertas: Backward Private Dynamic Searchable Symmetric Encryption Supporting Wildcards" in Proc. of the 36th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2022). Springer, 2022. (» PDF)
  • T. van Ede, H. Aghakhani, N. Spahn, R. Bortolameotti, M. Cova, A. Continella, M. van Steen, A. Peter, C. Kruegel, und G. Vigna, "DEEPCASE: Semi-Supervised Contextual Analysis of Security Events" in Proc. of the IEEE Symposium on Security and Privacy (S&P 2022). IEEE, 2022. (» PDF)

2021

  • M. Damie, F. Hahn, und A. Peter, "A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents" in Proc. of the 30th USENIX Security Symposium (USENIX Security 2021), 2021, pp. 143-160. (» PDF)
  • V. Stanciu, M. van Steen, C. Dobre, und A. Peter, "Privacy-Preserving Crowd-Monitoring Using Bloom Filters and Homomorphic Encryption" in Proc. of the 4th International Workshop on Edge Systems, Analytics and Networking (EdgeSys 2021), 2021, pp. 37-42. (» PDF)
  • Z. Shang, S. Oya, A. Peter, und F. Kerschbaum, "Obfuscated Access and Search Patterns in Searchable Encryption" in Proc. of the 28th Annual Network and Distributed System Security Symposium (NDSS 2021), 2021. (» PDF)
  • A. Bassit, F. Hahn, C. Zeinstra, R. Veldhuis, und A. Peter, "Bloom Filter vs Homomorphic Encryption: Which approach protects the biometric data and satisfies ISO/IEC 24745?" in Proc. of the 20th International Conference of the Biometrics Special Interest Group (BIOSIG 2021), 2021, pp. 1-6. (» PDF)
  • H. Esquivel-Vargas, M. Caselli, und A. Peter, "BACGraph: Automatic Extraction of Object Relationships in the BACnet Protocol" in Proc. of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S 2021), 2021, pp. 45-48. (» PDF)
  • R. G. Roessink, A. Peter, und F. Hahn, "Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements" in Proc. of the 19th International Conference on Applied Cryptography and Network Security (ACNS 2021), 2021, pp. 155-183. (» PDF)
  • A. Bassit, F. Hahn, J. Peeters, T. Kevenaar, R. Veldhuis, und A. Peter, "Fast and Accurate Likelihood Ratio-Based Biometric Verification Secure Against Malicious Adversaries" IEEE Transactions on Information Forensics and Security (TIFS), vol. 16, pp. 5045-5060, 2021. (» PDF)
  • F. Engelmann, L. Müller, A. Peter, F. Kargl, und C. Bösch, "SwapCT: Swap confidential transactions for privacy-preserving multi-token exchanges" Proceedings on Privacy Enhancing Technologies (PoPETs), vol. 2021, iss. 4, pp. 270-290, 2021. (» PDF)
(Stand: 20.08.2024)  | 
Zum Seitananfang scrollen Scroll to the top of the page