


default search action
Michael Backes 0001
Person information
- affiliation: CISPA Helmholtz Center for Information Security, Saarbrücken, Germany
- affiliation: Saarland University, Computer Science Department, Saarbrücken, Germany
Other persons with the same name
- Michael Backes 0002
— University of Namibia, Department of Physics, Windhoek, Namibia (and 1 more)
- Michael Backes 0003 — Vestron, Los Angeles, CA, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j34]Xaver Fabian
, Marco Patrignani
, Marco Guarnieri
, Michael Backes
:
Do You Even Lift? Strengthening Compiler Security Guarantees against Spectre Attacks. Proc. ACM Program. Lang. 9(POPL): 893-922 (2025) - [i184]Mingjie Li, Wai Man Si, Michael Backes, Yang Zhang, Yisen Wang:
SaLoRA: Safety-Alignment Preserved Low-Rank Adaptation. CoRR abs/2501.01765 (2025) - [i183]Wenshu Fan, Minxing Zhang, Hongwei Li, Wenbo Jiang, Hanxiao Chen, Xiangyu Yue, Michael Backes, Xiao Zhang:
DivTrackee versus DynTracker: Promoting Diversity in Anti-Facial Recognition against Dynamic FR Strategy. CoRR abs/2501.06533 (2025) - [i182]Xinyue Shen, Yixin Wu, Yiting Qu, Michael Backes, Savvas Zannettou, Yang Zhang:
HateBench: Benchmarking Hate Speech Detectors on LLM-Generated Content and Hate Campaigns. CoRR abs/2501.16750 (2025) - [i181]Yixin Wu, Ziqing Yang, Yun Shen, Michael Backes, Yang Zhang:
Synthetic Artifact Auditing: Tracing LLM-Generated Synthetic Data Usage in Downstream Applications. CoRR abs/2502.00808 (2025) - [i180]Ziqing Yang, Yixin Wu, Rui Wen, Michael Backes, Yang Zhang:
Peering Behind the Shield: Guardrail Identification in Large Language Models. CoRR abs/2502.01241 (2025) - [i179]Wenhao Wang, Adam Dziedzic, Grace C. Kim, Michael Backes, Franziska Boenisch:
Captured by Captions: On Memorization and its Mitigation in CLIP Models. CoRR abs/2502.07830 (2025) - 2024
- [j33]Yixin Wu, Xinlei He, Pascal Berrang, Mathias Humbert, Michael Backes, Neil Zhenqiang Gong, Yang Zhang:
Link Stealing Attacks Against Inductive Graph Neural Networks. Proc. Priv. Enhancing Technol. 2024(4): 818-839 (2024) - [c278]Yiting Qu
, Zhikun Zhang
, Yun Shen
, Michael Backes
, Yang Zhang
:
FAKEPCD: Fake Point Cloud Detection via Source Attribution. AsiaCCS 2024 - [c277]Xinyue Shen
, Zeyuan Chen
, Michael Backes
, Yun Shen
, Yang Zhang
:
"Do Anything Now": Characterizing and Evaluating In-The-Wild Jailbreak Prompts on Large Language Models. CCS 2024: 1671-1685 - [c276]Xinlei He
, Xinyue Shen
, Zeyuan Chen
, Michael Backes
, Yang Zhang
:
MGTBench: Benchmarking Machine-Generated Text Detection. CCS 2024: 2251-2265 - [c275]Rui Wen
, Zheng Li
, Michael Backes
, Yang Zhang
:
Membership Inference Attacks Against In-Context Learning. CCS 2024: 3481-3495 - [c274]Yixin Wu
, Yun Shen
, Michael Backes
, Yang Zhang
:
Image-Perfect Imperfections: Safety, Bias, and Authenticity in the Shadow of Text-To-Image Model Evolution. CCS 2024: 4837-4851 - [c273]Zeyang Sha
, Yicong Tan
, Mingjie Li
, Michael Backes
, Yang Zhang
:
ZeroFake: Zero-Shot Detection of Fake Images Generated and Edited by Text-to-Image Generation Models. CCS 2024: 4852-4866 - [c272]Yuan Xin, Zheng Li, Ning Yu, Dingfan Chen, Mario Fritz, Michael Backes, Yang Zhang:
Inside the Black Box: Detecting Data Leakage in Pre-Trained Language Encoders. ECAI 2024: 3947-3955 - [c271]Junjie Chu, Zeyang Sha, Michael Backes, Yang Zhang:
Reconstruct Your Previous Conversations! Comprehensively Investigating Privacy Leakage Risks in Conversations with GPT Models. EMNLP 2024: 6584-6600 - [c270]Yukun Jiang, Zheng Li, Xinyue Shen, Yugeng Liu, Michael Backes, Yang Zhang:
ModSCAN: Measuring Stereotypical Bias in Large Vision-Language Models from Vision and Language Modalities. EMNLP 2024: 12814-12845 - [c269]Yihan Ma, Xinyue Shen, Yixin Wu, Boyang Zhang, Michael Backes, Yang Zhang:
The Death and Life of Great Prompts: Analyzing the Evolution of LLM Prompts from the Structural Perspective. EMNLP 2024: 21990-22001 - [c268]Ge Han, Ahmed Salem, Zheng Li, Shanqing Guo, Michael Backes, Yang Zhang
:
Detection and Attribution of Models Trained on Generated Data. ICASSP 2024: 4875-4879 - [c267]Wenhao Wang, Muhammad Ahmad Kaleem, Adam Dziedzic, Michael Backes, Nicolas Papernot, Franziska Boenisch:
Memorization in Self-Supervised Learning Improves Downstream Generalization. ICLR 2024 - [c266]Yue Huang, Lichao Sun, Haoran Wang, Siyuan Wu, Qihui Zhang, Yuan Li, Chujie Gao, Yixin Huang, Wenhan Lyu, Yixuan Zhang, Xiner Li, Hanchi Sun, Zhengliang Liu, Yixin Liu, Yijue Wang, Zhikun Zhang, Bertie Vidgen, Bhavya Kailkhura, Caiming Xiong, Chaowei Xiao, Chunyuan Li, Eric P. Xing, Furong Huang, Hao Liu, Heng Ji, Hongyi Wang, Huan Zhang, Huaxiu Yao, Manolis Kellis, Marinka Zitnik, Meng Jiang, Mohit Bansal, James Zou, Jian Pei, Jian Liu, Jianfeng Gao, Jiawei Han, Jieyu Zhao, Jiliang Tang, Jindong Wang, Joaquin Vanschoren, John C. Mitchell, Kai Shu, Kaidi Xu, Kai-Wei Chang, Lifang He, Lifu Huang, Michael Backes, Neil Zhenqiang Gong, Philip S. Yu, Pin-Yu Chen, Quanquan Gu, Ran Xu, Rex Ying, Shuiwang Ji, Suman Jana, Tianlong Chen, Tianming Liu, Tianyi Zhou, William Wang, Xiang Li, Xiangliang Zhang, Xiao Wang, Xing Xie, Xun Chen, Xuyu Wang, Yan Liu, Yanfang Ye, Yinzhi Cao, Yong Chen, Yue Zhao:
Position: TrustLLM: Trustworthiness in Large Language Models. ICML 2024 - [c265]Yukun Jiang, Xinyue Shen, Rui Wen, Zeyang Sha, Junjie Chu, Yugeng Liu, Michael Backes, Yang Zhang:
Games and Beyond: Analyzing the Bullet Chats of Esports Livestreaming. ICWSM 2024: 761-773 - [c264]Hai Huang
, Zhengyu Zhao, Michael Backes, Yun Shen, Yang Zhang:
Composite Backdoor Attacks Against Large Language Models. NAACL-HLT (Findings) 2024: 1459-1472 - [c263]Vincent Hanke, Tom Blanchard, Franziska Boenisch, Iyiola E. Olatunji, Michael Backes, Adam Dziedzic:
Open LLMs are Necessary for Current Private Adaptations and Outperform their Closed Alternatives. NeurIPS 2024 - [c262]Wenhao Wang, Adam Dziedzic, Michael Backes, Franziska Boenisch:
Localizing Memorization in SSL Vision Encoders. NeurIPS 2024 - [c261]Alfusainey Jallow, Michael Schilling, Michael Backes, Sven Bugiel:
Measuring the Effects of Stack Overflow Code Snippet Evolution on Open-Source Software Security. SP 2024: 1083-1101 - [c260]Xinyue Shen, Yiting Qu, Michael Backes, Yang Zhang:
Prompt Stealing Attacks Against Text-to-Image Generation Models. USENIX Security Symposium 2024 - [c259]Yixin Wu, Rui Wen, Michael Backes, Pascal Berrang, Mathias Humbert, Yun Shen, Yang Zhang:
Quantifying Privacy Risks of Prompts in Visual Prompt Learning. USENIX Security Symposium 2024 - [c258]Boyang Zhang, Zheng Li, Ziqing Yang, Xinlei He, Michael Backes, Mario Fritz, Yang Zhang:
SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models. USENIX Security Symposium 2024 - [c257]Rui Zhang, Hongwei Li, Rui Wen, Wenbo Jiang, Yuan Zhang, Michael Backes, Yun Shen, Yang Zhang:
Instruction Backdoor Attacks Against Customized LLMs. USENIX Security Symposium 2024 - [c256]Minxing Zhang, Ning Yu, Rui Wen, Michael Backes, Yang Zhang
:
Generated Distributions Are All You Need for Membership Inference Attacks Against Generative Models. WACV 2024: 4827-4837 - [i178]Lichao Sun, Yue Huang, Haoran Wang, Siyuan Wu, Qihui Zhang, Chujie Gao, Yixin Huang, Wenhan Lyu, Yixuan Zhang, Xiner Li, Zhengliang Liu, Yixin Liu, Yijue Wang, Zhikun Zhang, Bhavya Kailkhura, Caiming Xiong, Chaowei Xiao, Chunyuan Li, Eric P. Xing, Furong Huang, Hao Liu, Heng Ji, Hongyi Wang, Huan Zhang, Huaxiu Yao, Manolis Kellis, Marinka Zitnik, Meng Jiang, Mohit Bansal, James Zou, Jian Pei, Jian Liu, Jianfeng Gao, Jiawei Han, Jieyu Zhao, Jiliang Tang, Jindong Wang, John C. Mitchell, Kai Shu, Kaidi Xu, Kai-Wei Chang, Lifang He, Lifu Huang, Michael Backes, Neil Zhenqiang Gong, Philip S. Yu, Pin-Yu Chen, Quanquan Gu, Ran Xu, Rex Ying, Shuiwang Ji, Suman Jana, Tianlong Chen, Tianming Liu, Tianyi Zhou, William Wang, Xiang Li, Xiangliang Zhang, Xiao Wang, Xing Xie, Xun Chen, Xuyu Wang, Yan Liu, Yanfang Ye, Yinzhi Cao, Yue Zhao:
TrustLLM: Trustworthiness in Large Language Models. CoRR abs/2401.05561 (2024) - [i177]Wenhao Wang, Muhammad Ahmad Kaleem, Adam Dziedzic, Michael Backes, Nicolas Papernot, Franziska Boenisch:
Memorization in Self-Supervised Learning Improves Downstream Generalization. CoRR abs/2401.12233 (2024) - [i176]Junjie Chu, Zeyang Sha, Michael Backes, Yang Zhang
:
Conversation Reconstruction Attack Against GPT Models. CoRR abs/2402.02987 (2024) - [i175]Junjie Chu, Yugeng Liu, Ziqing Yang, Xinyue Shen, Michael Backes, Yang Zhang
:
Comprehensive Assessment of Jailbreak Attacks Against LLMs. CoRR abs/2402.05668 (2024) - [i174]Rui Zhang, Hongwei Li, Rui Wen, Wenbo Jiang
, Yuan Zhang, Michael Backes, Yun Shen, Yang Zhang
:
Rapid Adoption, Hidden Risks: The Dual Impact of Large Language Model Customization. CoRR abs/2402.09179 (2024) - [i173]Yiyong Liu, Rui Wen, Michael Backes, Yang Zhang
:
Efficient Data-Free Model Stealing with Label Diversity. CoRR abs/2404.00108 (2024) - [i172]Yiting Qu, Xinyue Shen, Yixin Wu, Michael Backes, Savvas Zannettou, Yang Zhang
:
UnsafeBench: Benchmarking Image Safety Classifiers on Real-World and AI-Generated Images. CoRR abs/2405.03486 (2024) - [i171]Yixin Wu
, Xinlei He, Pascal Berrang, Mathias Humbert, Michael Backes, Neil Zhenqiang Gong, Yang Zhang
:
Link Stealing Attacks Against Inductive Graph Neural Networks. CoRR abs/2405.05784 (2024) - [i170]Xaver Fabian, Marco Patrignani, Marco Guarnieri, Michael Backes:
Do You Even Lift? Strengthening Compiler Security Guarantees Against Spectre Attacks. CoRR abs/2405.10089 (2024) - [i169]Xinyue Shen, Yixin Wu, Michael Backes, Yang Zhang
:
Voice Jailbreak Attacks Against GPT-4o. CoRR abs/2405.19103 (2024) - [i168]Ziqing Yang, Michael Backes, Yang Zhang
, Ahmed Salem:
SOS! Soft Prompt Attack Against Open-Source Large Language Models. CoRR abs/2407.03160 (2024) - [i167]Wai Man Si, Michael Backes, Yang Zhang
:
ICLGuard: Controlling In-Context Learning Behavior for Applicability Authorization. CoRR abs/2407.06955 (2024) - [i166]Boyang Zhang, Yicong Tan, Yun Shen, Ahmed Salem, Michael Backes, Savvas Zannettou, Yang Zhang:
Breaking Agents: Compromising Autonomous LLM Agents Through Malfunction Amplification. CoRR abs/2407.20859 (2024) - [i165]Minxing Zhang, Ahmed Salem, Michael Backes, Yang Zhang
:
Vera Verto: Multimodal Hijacking Attack. CoRR abs/2408.00129 (2024) - [i164]Yuan Xin, Zheng Li, Ning Yu, Dingfan Chen, Mario Fritz, Michael Backes, Yang Zhang:
Inside the Black Box: Detecting Data Leakage in Pre-trained Language Encoders. CoRR abs/2408.11046 (2024) - [i163]Yixin Wu, Yun Shen, Michael Backes, Yang Zhang:
Image-Perfect Imperfections: Safety, Bias, and Authenticity in the Shadow of Text-To-Image Model Evolution. CoRR abs/2408.17285 (2024) - [i162]Rui Wen, Zheng Li, Michael Backes, Yang Zhang:
Membership Inference Attacks Against In-Context Learning. CoRR abs/2409.01380 (2024) - [i161]Rui Wen, Michael Backes, Yang Zhang:
Understanding Data Importance in Machine Learning Attacks: Does Valuable Data Pose Greater Harm? CoRR abs/2409.03741 (2024) - [i160]Atilla Akkus, Mingjie Li, Junjie Chu, Michael Backes, Yang Zhang, Sinem Sav:
Generated Data with Fake Privacy: Hidden Dangers of Fine-tuning Large Language Models on Generated Data. CoRR abs/2409.11423 (2024) - [i159]Wenhao Wang, Adam Dziedzic, Michael Backes, Franziska Boenisch:
Localizing Memorization in SSL Vision Encoders. CoRR abs/2409.19069 (2024) - [i158]Yukun Jiang, Zheng Li, Xinyue Shen, Yugeng Liu, Michael Backes, Yang Zhang:
ModSCAN: Measuring Stereotypical Bias in Large Vision-Language Models from Vision and Language Modalities. CoRR abs/2410.06967 (2024) - [i157]Minxing Zhang, Michael Backes, Xiao Zhang:
Invisibility Cloak: Disappearance under Human Pose Estimation via Backdoor Attacks. CoRR abs/2410.07670 (2024) - [i156]Vincent Hanke, Tom Blanchard, Franziska Boenisch, Iyiola E. Olatunji, Michael Backes, Adam Dziedzic:
Open LLMs are Necessary for Current Private Adaptations and Outperform their Closed Alternatives. CoRR abs/2411.05818 (2024) - [i155]Quan Yuan, Zhikun Zhang, Linkang Du, Min Chen, Mingyang Sun, Yunjun Gao, Michael Backes, Shibo He, Ji-ming Chen:
PSGraph: Differentially Private Streaming Graph Synthesis by Considering Temporal Dynamics. CoRR abs/2412.11369 (2024) - [i154]Zhen Sun, Zongmin Zhang, Xinyue Shen, Ziyi Zhang, Yule Liu, Michael Backes, Yang Zhang, Xinlei He:
Are We in the AI-Generated Text World Already? Quantifying and Monitoring AIGT on Social Media. CoRR abs/2412.18148 (2024) - 2023
- [j32]Michael Thomas Smith
, Kathrin Grosse, Michael Backes, Mauricio A. Álvarez
:
Adversarial vulnerability bounds for Gaussian process classification. Mach. Learn. 112(3): 971-1009 (2023) - [j31]Giorgio Di Tizio
, Patrick Speicher
, Milivoj Simeonovski
, Michael Backes
, Ben Stock
, Robert Künnemann
:
Pareto-optimal Defenses for the Web Infrastructure: Theory and Practice. ACM Trans. Priv. Secur. 26(2): 18:1-18:36 (2023) - [c255]Yiting Qu
, Xinyue Shen
, Xinlei He
, Michael Backes
, Savvas Zannettou
, Yang Zhang
:
Unsafe Diffusion: On the Generation of Unsafe Images and Hateful Memes From Text-To-Image Models. CCS 2023: 3403-3417 - [c254]Zeyang Sha, Xinlei He, Ning Yu, Michael Backes, Yang Zhang
:
Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image Encoders. CVPR 2023: 16373-16383 - [c253]Rui Wen, Zhengyu Zhao, Zhuoran Liu, Michael Backes, Tianhao Wang, Yang Zhang:
Is Adversarial Training Really a Silver Bullet for Mitigating Data Poisoning? ICLR 2023 - [c252]Yihan Ma, Zhikun Zhang, Ning Yu, Xinlei He, Michael Backes, Yun Shen, Yang Zhang:
Generated Graph Detection. ICML 2023: 23412-23428 - [c251]Ziqing Yang, Xinlei He, Zheng Li, Michael Backes, Mathias Humbert, Pascal Berrang, Yang Zhang:
Data Poisoning Attacks Against Multimodal Encoders. ICML 2023: 39299-39313 - [c250]Yugeng Liu, Zheng Li, Michael Backes, Yun Shen, Yang Zhang:
Backdoor Attacks Against Dataset Distillation. NDSS 2023 - [c249]Sanam Ghorbani Lyastani, Michael Backes, Sven Bugiel:
A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites. NDSS 2023 - [c248]Hamed Rasifard
, Rahul Gopinath
, Michael Backes
, Hamed Nemati
:
SEAL: Capability-Based Access Control for Data-Analytic Scenarios. SACMAT 2023: 67-78 - [c247]Yiting Qu, Xinlei He, Shannon Pierson, Michael Backes, Yang Zhang
, Savvas Zannettou:
On the Evolution of (Hateful) Memes by Means of Multimodal Contrastive Learning. SP 2023: 293-310 - [c246]Haiming Wang, Zhikun Zhang, Tianhao Wang, Shibo He, Michael Backes, Jiming Chen, Yang Zhang:
PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov Models. USENIX Security Symposium 2023: 1649-1666 - [c245]Wai Man Si, Michael Backes, Yang Zhang, Ahmed Salem:
Two-in-One: A Model Hijacking Attack Against Text Generation Models. USENIX Security Symposium 2023: 2223-2240 - [c244]Cristian-Alexandru Staicu, Sazzadur Rahaman, Ágnes Kiss, Michael Backes:
Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages. USENIX Security Symposium 2023: 6133-6150 - [c243]Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Yang Zhang:
FACE-AUDITOR: Data Auditing in Facial Recognition Systems. USENIX Security Symposium 2023: 7195-7212 - [c242]Zheng Li, Ning Yu, Ahmed Salem, Michael Backes, Mario Fritz, Yang Zhang:
UnGANable: Defending Against GAN-based Face Manipulation. USENIX Security Symposium 2023: 7213-7230 - [i153]Yugeng Liu, Zheng Li, Michael Backes, Yun Shen, Yang Zhang
:
Backdoor Attacks Against Dataset Distillation. CoRR abs/2301.01197 (2023) - [i152]Xinyue Shen, Yiting Qu, Michael Backes, Yang Zhang
:
Prompt Stealing Attacks Against Text-to-Image Generation Models. CoRR abs/2302.09923 (2023) - [i151]Ziqing Yang, Zeyang Sha, Michael Backes, Yang Zhang
:
From Visual Prompt Learning to Zero-Shot Transfer: Mapping Is All You Need. CoRR abs/2303.05266 (2023) - [i150]Xinlei He, Xinyue Shen, Zeyuan Chen, Michael Backes, Yang Zhang
:
MGTBench: Benchmarking Machine-Generated Text Detection. CoRR abs/2303.14822 (2023) - [i149]Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Yang Zhang
:
FACE-AUDITOR: Data Auditing in Facial Recognition Systems. CoRR abs/2304.02782 (2023) - [i148]Xinyue Shen, Zeyuan Chen, Michael Backes, Yang Zhang
:
In ChatGPT We Trust? Measuring and Characterizing the Reliability of ChatGPT. CoRR abs/2304.08979 (2023) - [i147]Wai Man Si, Michael Backes, Yang Zhang, Ahmed Salem:
Two-in-One: A Model Hijacking Attack Against Text Generation Models. CoRR abs/2305.07406 (2023) - [i146]Yugeng Liu, Zheng Li, Michael Backes, Yun Shen, Yang Zhang:
Watermarking Diffusion Model. CoRR abs/2305.12502 (2023) - [i145]Yiting Qu, Xinyue Shen, Xinlei He, Michael Backes, Savvas Zannettou, Yang Zhang
:
Unsafe Diffusion: On the Generation of Unsafe Images and Hateful Memes From Text-To-Image Models. CoRR abs/2305.13873 (2023) - [i144]Peihua Ma
, Yixin Wu, Ning Yu, Yang Zhang
, Michael Backes, Qin Wang, Cheng-I Wei:
Vision-language models boost food composition compilation. CoRR abs/2306.01747 (2023) - [i143]Yihan Ma, Zhengyu Zhao, Xinlei He, Zheng Li, Michael Backes, Yang Zhang:
Generative Watermarking Against Unauthorized Subject-Driven Image Synthesis. CoRR abs/2306.07754 (2023) - [i142]Yihan Ma, Zhikun Zhang, Ning Yu, Xinlei He, Michael Backes, Yun Shen, Yang Zhang:
Generated Graph Detection. CoRR abs/2306.07758 (2023) - [i141]Matthis Kruse
, Michael Backes, Marco Patrignani:
Secure Composition of Robust and Optimising Compilers. CoRR abs/2307.08681 (2023) - [i140]Wai Man Si, Michael Backes, Yang Zhang
:
Mondrian: Prompt Abstraction Attack Against Large Language Models for Cheaper API Pricing. CoRR abs/2308.03558 (2023) - [i139]Xinyue Shen, Zeyuan Chen, Michael Backes, Yun Shen, Yang Zhang
:
"Do Anything Now": Characterizing and Evaluating In-The-Wild Jailbreak Prompts on Large Language Models. CoRR abs/2308.03825 (2023) - [i138]Bartlomiej Surma, Tahleen A. Rahman, Monique M. B. Breteler, Michael Backes, Yang Zhang
:
You Are How You Walk: Quantifying Privacy Risks in Step Count Data. CoRR abs/2308.04933 (2023) - [i137]Yugeng Liu, Tianshuo Cong, Zhengyu Zhao, Michael Backes, Yun Shen, Yang Zhang
:
Robustness Over Time: Understanding Adversarial Examples' Effectiveness on Longitudinal Versions of Large Language Models. CoRR abs/2308.07847 (2023) - [i136]Minxing Zhang, Michael Backes, Xiao Zhang:
Generating Less Certain Adversarial Examples Improves Robust Generalization. CoRR abs/2310.04539 (2023) - [i135]Yiyong Liu, Michael Backes, Xiao Zhang:
Transferable Availability Poisoning Attacks. CoRR abs/2310.05141 (2023) - [i134]Hai Huang, Zhengyu Zhao, Michael Backes, Yun Shen, Yang Zhang
:
Prompt Backdoors in Visual Prompt Learning. CoRR abs/2310.07632 (2023) - [i133]Hai Huang, Zhengyu Zhao, Michael Backes, Yun Shen, Yang Zhang
:
Composite Backdoor Attacks Against Large Language Models. CoRR abs/2310.07676 (2023) - [i132]Yuan Xin, Michael Backes, Xiao Zhang:
Provably Robust Cost-Sensitive Learning via Randomized Smoothing. CoRR abs/2310.08732 (2023) - [i131]Rui Wen, Tianhao Wang, Michael Backes, Yang Zhang
, Ahmed Salem:
Last One Standing: A Comparative Analysis of Security and Privacy of Soft Prompt Tuning, LoRA, and In-Context Learning. CoRR abs/2310.11397 (2023) - [i130]Zhengyu Zhao, Hanwei Zhang, Renjue Li, Ronan Sicre, Laurent Amsaleg, Michael Backes, Qi Li, Chao Shen:
Revisiting Transferable Adversarial Image Examples: Attack Categorization, Evaluation Guidelines, and New Insights. CoRR abs/2310.11850 (2023) - [i129]Yixin Wu
, Rui Wen, Michael Backes, Pascal Berrang, Mathias Humbert, Yun Shen, Yang Zhang
:
Quantifying Privacy Risks of Prompts in Visual Prompt Learning. CoRR abs/2310.11970 (2023) - [i128]Boyang Zhang, Zheng Li, Ziqing Yang, Xinlei He, Michael Backes, Mario Fritz, Yang Zhang:
SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models. CoRR abs/2310.12665 (2023) - [i127]Yixin Wu, Ning Yu, Michael Backes, Yun Shen, Yang Zhang
:
On the Proactive Generation of Unsafe Images From Text-To-Image Models Using Benign Prompts. CoRR abs/2310.16613 (2023) - [i126]Minxing Zhang, Ning Yu, Rui Wen, Michael Backes, Yang Zhang
:
Generated Distributions Are All You Need for Membership Inference Attacks Against Generative Models. CoRR abs/2310.19410 (2023) - [i125]Boyang Zhang, Xinyue Shen, Wai Man Si, Zeyang Sha, Zeyuan Chen, Ahmed Salem, Yun Shen, Michael Backes, Yang Zhang:
Comprehensive Assessment of Toxicity in ChatGPT. CoRR abs/2311.14685 (2023) - [i124]Yiting Qu, Zhikun Zhang, Yun Shen, Michael Backes, Yang Zhang
:
FAKEPCD: Fake Point Cloud Detection via Source Attribution. CoRR abs/2312.11213 (2023) - 2022
- [j30]Kathrin Grosse
, Taesung Lee, Battista Biggio
, Youngja Park, Michael Backes, Ian M. Molloy:
Backdoor smoothing: Demystifying backdoor attacks on deep neural networks. Comput. Secur. 120: 102814 (2022) - [c241]Min Chen
, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, Yang Zhang
:
Graph Unlearning. CCS 2022: 499-513 - [c240]Hai Huang
, Zhikun Zhang, Yun Shen, Michael Backes, Qi Li, Yang Zhang
:
On the Privacy Risks of Cell-Based NAS Architectures. CCS 2022: 1427-1441 - [c239]Zheng Li, Yiyong Liu, Xinlei He, Ning Yu, Michael Backes, Yang Zhang
:
Auditing Membership Leakages of Multi-Exit Networks. CCS 2022: 1917-1931 - [c238]Yiyong Liu, Zhengyu Zhao, Michael Backes, Yang Zhang
:
Membership Inference Attacks by Exploiting Loss Trajectory. CCS 2022: 2085-2098 - [c237]Trung Tin Nguyen, Michael Backes, Ben Stock
:
Freely Given Consent?: Studying Consent Notice of Third-Party Tracking and Its Violations of GDPR in Android Apps. CCS 2022: 2369-2383 - [c236]Yun Shen, Yufei Han, Zhikun Zhang, Min Chen
, Ting Yu, Michael Backes, Yang Zhang
, Gianluca Stringhini:
Finding MNEMON: Reviving Memories of Node Embeddings. CCS 2022: 2643-2657 - [c235]Wai Man Si, Michael Backes, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Savvas Zannettou, Yang Zhang
:
Why So Toxic?: Measuring and Triggering Toxic Behavior in Open-Domain Chatbots. CCS 2022: 2659-2673 - [c234]Michael Backes, Pascal Berrang, Lucjan Hanzlik, Ivan Pryvalov:
A Framework for Constructing Single Secret Leader Election from MPC. ESORICS (2) 2022: 672-691 - [c233]Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang
:
Dynamic Backdoor Attacks Against Machine Learning Models. EuroS&P 2022: 703-718 - [c232]Xinyue Shen, Xinlei He, Michael Backes, Jeremy Blackburn, Savvas Zannettou, Yang Zhang:
On Xing Tian and the Perseverance of Anti-China Sentiment Online. ICWSM 2022: 944-955 - [c231]Ahmed Salem, Michael Backes, Yang Zhang:
Get a Model! Model Hijacking Attack Against Machine Learning Models. NDSS 2022 - [c230]Lukas Bieringer, Kathrin Grosse, Michael Backes, Battista Biggio, Katharina Krombholz:
Industrial practitioners' mental models of adversarial machine learning. SOUPS @ USENIX Security Symposium 2022: 97-116 - [c229]Yugeng Liu, Rui Wen, Xinlei He, Ahmed Salem, Zhikun Zhang, Michael Backes, Emiliano De Cristofaro, Mario Fritz, Yang Zhang:
ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models. USENIX Security Symposium 2022: 4525-4542 - [c228]Zhikun Zhang, Min Chen, Michael Backes, Yun Shen, Yang Zhang:
Inference Attacks Against Graph Neural Networks. USENIX Security Symposium 2022: 4543-4560 - [i123]Zeyang Sha, Xinlei He, Ning Yu, Michael Backes, Yang Zhang:
Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image Encoders. CoRR abs/2201.07513 (2022) - [i122]Yun Shen, Yufei Han, Zhikun Zhang, Min Chen, Ting Yu, Michael Backes, Yang Zhang
, Gianluca Stringhini:
Finding MNEMON: Reviving Memories of Node Embeddings. CoRR abs/2204.06963 (2022) - [i121]Xinyue Shen, Xinlei He, Michael Backes, Jeremy Blackburn, Savvas Zannettou, Yang Zhang
:
On Xing Tian and the Perseverance of Anti-China Sentiment Online. CoRR abs/2204.08935 (2022) - [i120]Zheng Li, Yiyong Liu, Xinlei He, Ning Yu, Michael Backes, Yang Zhang
:
Auditing Membership Leakages of Multi-Exit Networks. CoRR abs/2208.11180 (2022) - [i119]Yiyong Liu, Zhengyu Zhao, Michael Backes, Yang Zhang
:
Membership Inference Attacks by Exploiting Loss Trajectory. CoRR abs/2208.14933 (2022) - [i118]Hai Huang, Zhikun Zhang, Yun Shen, Michael Backes, Qi Li, Yang Zhang
:
On the Privacy Risks of Cell-Based NAS Architectures. CoRR abs/2209.01688 (2022) - [i117]Wai Man Si, Michael Backes, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Savvas Zannettou, Yang Zhang
:
Why So Toxic? Measuring and Triggering Toxic Behavior in Open-Domain Chatbots. CoRR abs/2209.03463 (2022) - [i116]Ziqing Yang, Xinlei He, Zheng Li, Michael Backes, Mathias Humbert, Pascal Berrang, Yang Zhang:
Data Poisoning Attacks Against Multimodal Encoders. CoRR abs/2209.15266 (2022) - [i115]Haiming Wang, Zhikun Zhang, Tianhao Wang, Shibo He, Michael Backes, Jiming Chen, Yang Zhang
:
PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov Model. CoRR abs/2210.00581 (2022) - [i114]Zheng Li, Ning Yu, Ahmed Salem, Michael Backes, Mario Fritz, Yang Zhang
:
UnGANable: Defending Against GAN-based Face Manipulation. CoRR abs/2210.00957 (2022) - [i113]Yixin Wu
, Ning Yu, Zheng Li, Michael Backes, Yang Zhang
:
Membership Inference Attacks Against Text-to-image Generation Models. CoRR abs/2210.00968 (2022) - [i112]Xinyue Shen, Xinlei He, Zheng Li, Yun Shen, Michael Backes, Yang Zhang
:
Backdoor Attacks in the Supply Chain of Masked Image Modeling. CoRR abs/2210.01632 (2022) - [i111]Sanam Ghorbani Lyastani, Michael Backes, Sven Bugiel:
A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites (Extended Version). CoRR abs/2210.09373 (2022) - [i110]Zhengyu Zhao, Hanwei Zhang, Renjue Li, Ronan Sicre, Laurent Amsaleg, Michael Backes:
Towards Good Practices in Evaluating Transfer Adversarial Attacks. CoRR abs/2211.09565 (2022) - [i109]Yiting Qu, Xinlei He, Shannon Pierson, Michael Backes, Yang Zhang, Savvas Zannettou:
On the Evolution of (Hateful) Memes by Means of Multimodal Contrastive Learning. CoRR abs/2212.06573 (2022) - [i108]Michael Backes, Pascal Berrang, Lucjan Hanzlik, Ivan Pryvalov:
A framework for constructing Single Secret Leader Election from MPC. IACR Cryptol. ePrint Arch. 2022: 1040 (2022) - 2021
- [c227]Xiaoyi Chen
, Ahmed Salem, Dingfan Chen, Michael Backes, Shiqing Ma, Qingni Shen, Zhonghai Wu, Yang Zhang
:
BadNL: Backdoor Attacks against NLP Models with Semantic-preserving Improvements. ACSAC 2021: 554-569 - [c226]Trung Tin Nguyen, Duc Cuong Nguyen, Michael Schilling, Gang Wang, Michael Backes:
Measuring User Perception for Detecting Unexpected Access to Sensitive Resource in Mobile Apps. AsiaCCS 2021: 578-592 - [c225]Min Chen
, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, Yang Zhang
:
When Machine Unlearning Jeopardizes Privacy. CCS 2021: 896-911 - [c224]Aurore Fass, Dolière Francis Somé
, Michael Backes, Ben Stock
:
DoubleX: Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale. CCS 2021: 1789-1804 - [c223]Sebastian Roth
, Lea Gröber, Michael Backes, Katharina Krombholz, Ben Stock
:
12 Angry Developers - A Qualitative Study on Developers' Struggles with CSP. CCS 2021: 3085-3103 - [c222]Robert Künnemann, Deepak Garg, Michael Backes:
Accountability in the Decentralised-Adversary Setting. CSF 2021: 1-16 - [c221]Lucjan Hanzlik, Yang Zhang
, Kathrin Grosse, Ahmed Salem, Maximilian Augustin, Michael Backes, Mario Fritz:
MLCapsule: Guarded Offline Deployment of Machine Learning as a Service. CVPR Workshops 2021: 3300-3309 - [c220]Marvin Moog, Markus Demmel, Michael Backes, Aurore Fass:
Statically Detecting JavaScript Obfuscation and Minification Techniques in the Wild. DSN 2021: 569-580 - [c219]Kathrin Grosse, Michael Backes:
Do winning tickets exist before DNN training? SDM 2021: 549-557 - [c218]Yusra Elbitar, Michael Schilling, Trung Tin Nguyen, Michael Backes, Sven Bugiel:
Explanation Beats Context: The Effect of Timing & Rationales on Users' Runtime Permission Decisions. USENIX Security Symposium 2021: 785-802 - [c217]Zhikun Zhang, Tianhao Wang, Ninghui Li, Jean Honorio
, Michael Backes, Shibo He, Jiming Chen, Yang Zhang:
PrivSyn: Differentially Private Data Synthesis. USENIX Security Symposium 2021: 929-946 - [c216]Xinlei He, Jinyuan Jia, Michael Backes, Neil Zhenqiang Gong, Yang Zhang:
Stealing Links from Graph Neural Networks. USENIX Security Symposium 2021: 2669-2686 - [c215]Jie Huang, Michael Backes, Sven Bugiel:
A11y and Privacy don't have to be mutually exclusive: Constraining Accessibility Service Misuse on Android. USENIX Security Symposium 2021: 3631-3648 - [c214]Trung Tin Nguyen, Michael Backes, Ninja Marnau, Ben Stock:
Share First, Ask Later (or Never?) Studying Violations of GDPR's Explicit Consent in Android Apps. USENIX Security Symposium 2021: 3667-3684 - [c213]Marten Oltrogge, Nicolas Huaman, Sabrina Amft
, Yasemin Acar, Michael Backes, Sascha Fahl:
Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications. USENIX Security Symposium 2021: 4347-4364 - [i107]Yugeng Liu, Rui Wen, Xinlei He, Ahmed Salem, Zhikun Zhang, Michael Backes, Emiliano De Cristofaro, Mario Fritz, Yang Zhang:
ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models. CoRR abs/2102.02551 (2021) - [i106]Xinlei He, Rui Wen, Yixin Wu, Michael Backes, Yun Shen, Yang Zhang:
Node-Level Membership Inference Attacks Against Graph Neural Networks. CoRR abs/2102.05429 (2021) - [i105]Min Chen
, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, Yang Zhang:
Graph Unlearning. CoRR abs/2103.14991 (2021) - [i104]Lukas Bieringer, Kathrin Grosse, Michael Backes, Katharina Krombholz:
Mental Models of Adversarial Machine Learning. CoRR abs/2105.03726 (2021) - [i103]Zhikun Zhang, Min Chen, Michael Backes, Yun Shen, Yang Zhang:
Inference Attacks Against Graph Neural Networks. CoRR abs/2110.02631 (2021) - [i102]Oliver Schranz, Sebastian Weisgerber, Erik Derr, Michael Backes, Sven Bugiel:
Towards a Principled Approach for Dynamic Analysis of Android's Middleware. CoRR abs/2110.05619 (2021) - [i101]Ahmed Salem, Michael Backes, Yang Zhang:
Get a Model! Model Hijacking Attack Against Machine Learning Models. CoRR abs/2111.04394 (2021) - [i100]Cristian-Alexandru Staicu, Sazzadur Rahaman, Ágnes Kiss, Michael Backes:
Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages. CoRR abs/2111.11169 (2021) - 2020
- [j29]Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James R. Larus, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth G. Paterson, Srdjan Capkun, David A. Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel P. Smart, Aysajan Abidin, Seda Gurses, Michael Veale, Cas Cremers, Michael Backes, Nils Ole Tippenhauer, Reuben Binns, Ciro Cattuto, Alain Barrat, Dario Fiore, Manuel Barbosa, Rui Oliveira, José Pereira:
Decentralized Privacy-Preserving Proximity Tracing. IEEE Data Eng. Bull. 43(2): 36-66 (2020) - [c212]Ilkan Esiyok
, Lucjan Hanzlik, Robert Künnemann, Lena Marie Budde, Michael Backes:
TrollThrottle - Raising the Cost of Astroturfing. ACNS (2) 2020: 456-476 - [c211]Duc Cuong Nguyen, Erik Derr, Michael Backes, Sven Bugiel:
Up2Dep: Android Tool Support to Fix Insecure Code Dependencies. ACSAC 2020: 263-276 - [c210]Sebastian Roth
, Michael Backes, Ben Stock
:
Assessing the Impact of Script Gadgets on CSP at Scale. AsiaCCS 2020: 420-431 - [c209]Inken Hagestedt, Michael Backes, Andreas Bulling
:
Adversarial Attacks on Classifiers for Eye-based User Modelling. ETRA Adjunct 2020: 44:1-44:3 - [c208]Inken Hagestedt, Mathias Humbert, Pascal Berrang, Irina Lehmann, Roland Eils
, Michael Backes, Yang Zhang
:
Membership Inference Against DNA Methylation Databases. EuroS&P 2020: 509-520 - [c207]Kathrin Grosse, Thomas Alexander Trost, Marius Mosbach, Michael Backes, Dietrich Klakow:
On the Security Relevance of Initial Weights in Deep Neural Networks. ICANN (1) 2020: 3-14 - [c206]Kathrin Grosse, Michael T. Smith, Michael Backes:
Killing Four Birds with one Gaussian Process: The Relation between different Test-Time Attacks. ICPR 2020: 4696-4703 - [c205]Yang Zhang, Mathias Humbert, Bartlomiej Surma, Praveen Manoharan
, Jilles Vreeken, Michael Backes:
Towards Plausible Graph Anonymization. NDSS 2020 - [c204]Sanam Ghorbani Lyastani, Michael Schilling, Michaela Neumayr, Michael Backes, Sven Bugiel:
Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication. SP 2020: 268-285 - [c203]Stefano Calzavara, Sebastian Roth, Alvise Rabitti, Michael Backes, Ben Stock:
A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web. USENIX Security Symposium 2020: 683-697 - [c202]Ahmed Salem, Apratim Bhattacharya, Michael Backes, Mario Fritz, Yang Zhang:
Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning. USENIX Security Symposium 2020: 1291-1308 - [i99]Tahleen A. Rahman, Mario Fritz, Michael Backes, Yang Zhang:
Everything About You: A Multimodal Approach towards Friendship Inference in Online Social Networks. CoRR abs/2003.00996 (2020) - [i98]Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang:
Dynamic Backdoor Attacks Against Machine Learning Models. CoRR abs/2003.03675 (2020) - [i97]Ilkan Esiyok, Lucjan Hanzlik, Robert Künnemann, Lena Marie Budde, Michael Backes:
Trollthrottle - Raising the Cost of Astroturfing. CoRR abs/2004.08836 (2020) - [i96]Xinlei He, Jinyuan Jia, Michael Backes, Neil Zhenqiang Gong, Yang Zhang:
Stealing Links from Graph Neural Networks. CoRR abs/2005.02131 (2020) - [i95]Min Chen
, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, Yang Zhang:
When Machine Unlearning Jeopardizes Privacy. CoRR abs/2005.02205 (2020) - [i94]Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James R. Larus, Edouard Bugnion, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth G. Paterson, Srdjan Capkun, David A. Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel P. Smart, Aysajan Abidin, Seda F. Gürses, Michael Veale, Cas Cremers, Michael Backes, Nils Ole Tippenhauer, Reuben Binns, Ciro Cattuto, Alain Barrat, Dario Fiore, Manuel Barbosa
, Rui Oliveira, José Pereira
:
Decentralized Privacy-Preserving Proximity Tracing. CoRR abs/2005.12273 (2020) - [i93]Inken Hagestedt, Michael Backes, Andreas Bulling:
Adversarial Attacks on Classifiers for Eye-based User Modelling. CoRR abs/2006.00860 (2020) - [i92]Xiaoyi Chen, Ahmed Salem, Michael Backes, Shiqing Ma, Yang Zhang:
BadNL: Backdoor Attacks Against NLP Models. CoRR abs/2006.01043 (2020) - [i91]Kathrin Grosse, Taesung Lee, Youngja Park, Michael Backes, Ian M. Molloy:
A new measure for overfitting and its implications for backdooring of deep learning. CoRR abs/2006.06721 (2020) - [i90]Kathrin Grosse, Michael Backes:
How many winning tickets are there in one DNN? CoRR abs/2006.07014 (2020) - [i89]Nico Döttling, Kathrin Grosse, Michael Backes, Ian M. Molloy:
Adversarial Examples and Metrics. CoRR abs/2007.06993 (2020) - [i88]Yang Zou, Zhikun Zhang, Michael Backes, Yang Zhang:
Privacy Analysis of Deep Learning in the Wild: Membership Inference Attacks against Transfer Learning. CoRR abs/2009.04872 (2020) - [i87]Ahmed Salem, Yannick Sautter, Michael Backes, Mathias Humbert, Yang Zhang:
BAAAN: Backdoor Attacks Against Autoencoder and GAN-Based Machine Learning Models. CoRR abs/2010.03007 (2020) - [i86]Ahmed Salem, Michael Backes, Yang Zhang:
Don't Trigger Me! A Triggerless Backdoor Attack Against Deep Neural Networks. CoRR abs/2010.03282 (2020) - [i85]Zhikun Zhang, Tianhao Wang, Ninghui Li, Jean Honorio, Michael Backes, Shibo He, Jiming Chen, Yang Zhang:
PrivSyn: Differentially Private Data Synthesis. CoRR abs/2012.15128 (2020)
2010 – 2019
- 2019
- [j28]Ahmed Salem, Pascal Berrang, Mathias Humbert, Michael Backes:
Privacy-Preserving Similar Patient Queries for Combined Biomedical Data. Proc. Priv. Enhancing Technol. 2019(1): 47-67 (2019) - [c201]Aurore Fass, Michael Backes, Ben Stock
:
JStap: a static pre-filter for malicious JavaScript detection. ACSAC 2019: 257-269 - [c200]Jinyuan Jia, Ahmed Salem, Michael Backes, Yang Zhang
, Neil Zhenqiang Gong:
MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples. CCS 2019: 259-274 - [c199]Aurore Fass, Michael Backes, Ben Stock
:
HideNoSeek: Camouflaging Malicious JavaScript in Benign ASTs. CCS 2019: 1899-1913 - [c198]Michael Backes, Lucjan Hanzlik, Jonas Schneider-Bensch:
Membership Privacy for Fully Dynamic Group Signatures. CCS 2019: 2181-2198 - [c197]Alexander Dax, Robert Künnemann, Sven Tangermann, Michael Backes:
How to Wrap it up - A Formally Verified Proposal for the use of Authenticated Wrapping in PKCS#11. CSF 2019: 62-77 - [c196]Robert Künnemann, Ilkan Esiyok
, Michael Backes:
Automated Verification of Accountability in Security Protocols. CSF 2019: 397-413 - [c195]Michael Backes, Nico Döttling, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider:
Ring Signatures: Logarithmic-Size, No Setup - from Standard Assumptions. EUROCRYPT (3) 2019: 281-311 - [c194]Jie Huang, Nataniel P. Borges Jr.
, Sven Bugiel, Michael Backes:
Up-To-Crash: Evaluating Third-Party Library Updatability on Android. EuroS&P 2019: 15-30 - [c193]Tahleen A. Rahman, Bartlomiej Surma, Michael Backes, Yang Zhang
:
Fairwalk: Towards Fair Graph Embedding. IJCAI 2019: 3289-3295 - [c192]Inken Hagestedt, Yang Zhang, Mathias Humbert, Pascal Berrang, Haixu Tang, XiaoFeng Wang, Michael Backes:
MBeacon: Privacy-Preserving Beacons for DNA Methylation Data. NDSS 2019 - [c191]Ahmed Salem, Yang Zhang, Mathias Humbert, Pascal Berrang, Mario Fritz, Michael Backes:
ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models. NDSS 2019 - [c190]Michael Backes, Lucjan Hanzlik, Amir Herzberg, Aniket Kate, Ivan Pryvalov:
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains Without Trusted Setup. Public Key Cryptography (1) 2019: 286-313 - [c189]Patrick Speicher, Marcel Steinmetz
, Jörg Hoffmann, Michael Backes, Robert Künnemann:
Towards automated network mitigation analysis. SAC 2019: 1971-1978 - [c188]Saba Eskandarian, Jonathan Cogan, Sawyer Birnbaum, Peh Chang Wei Brandon, Dillon Franke, Forest Fraser, Gaspar Garcia Jr., Eric Gong, Hung T. Nguyen, Taresh K. Sethi, Vishal Subbiah, Michael Backes, Giancarlo Pellegrino, Dan Boneh:
Fidelius: Protecting User Secrets from Compromised Browsers. IEEE Symposium on Security and Privacy 2019: 264-280 - [c187]Duc Cuong Nguyen, Erik Derr, Michael Backes, Sven Bugiel:
Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security & Privacy. IEEE Symposium on Security and Privacy 2019: 555-569 - [c186]Robert Künnemann, Deepak Garg, Michael Backes:
Causality & Control Flow. CREST@ETAPS 2019: 32-46 - [i84]Kathrin Grosse, Thomas Alexander Trost, Marius Mosbach, Michael Backes, Dietrich Klakow:
Adversarial Initialization - when your network performs the way I want. CoRR abs/1902.03020 (2019) - [i83]Ahmed Salem, Apratim Bhattacharyya, Michael Backes, Mario Fritz, Yang Zhang:
Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning. CoRR abs/1904.01067 (2019) - [i82]Marie-Therese Walter, David Pfaff, Stefan Nürnberger, Michael Backes:
Proconda - Protected Control Data. CoRR abs/1909.03758 (2019) - [i81]Michael Thomas Smith, Kathrin Grosse, Michael Backes, Mauricio A. Álvarez:
Adversarial Vulnerability Bounds for Gaussian Process Classification. CoRR abs/1909.08864 (2019) - [i80]Jinyuan Jia, Ahmed Salem, Michael Backes, Yang Zhang, Neil Zhenqiang Gong:
MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples. CoRR abs/1909.10594 (2019) - [i79]Michael Backes, Lucjan Hanzlik, Amir Herzberg, Aniket Kate, Ivan Pryvalov:
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup. IACR Cryptol. ePrint Arch. 2019: 63 (2019) - [i78]Michael Backes, Nico Döttling, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider:
Ring Signatures: Logarithmic-Size, No Setup - from Standard Assumptions. IACR Cryptol. ePrint Arch. 2019: 196 (2019) - [i77]Alexander Dax, Robert Künnemann, Sven Tangermann, Michael Backes:
How to wrap it up - A formally verified proposal for the use of authenticated wrapping in PKCS\#11. IACR Cryptol. ePrint Arch. 2019: 462 (2019) - 2018
- [j27]Fatemeh Shirazi, Milivoj Simeonovski, Muhammad Rizwan Asghar
, Michael Backes, Claudia Díaz:
A Survey on Routing in Anonymous Communication Protocols. ACM Comput. Surv. 51(3): 51:1-51:39 (2018) - [j26]Michael Backes, Pascal Berrang
, Mathias Humbert
, Xiaoyu Shen
, Verena Wolf:
Simulating the Large-Scale Erosion of Genomic Privacy Over Time. IEEE ACM Trans. Comput. Biol. Bioinform. 15(5): 1405-1412 (2018) - [c185]Patrick Speicher, Marcel Steinmetz, Michael Backes, Jörg Hoffmann, Robert Künnemann:
Stackelberg Planning: Towards Effective Leader-Follower State Space Search. AAAI 2018: 6286-6293 - [c184]Michael Backes, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider:
Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys. ASIACRYPT (2) 2018: 405-434 - [c183]Aurore Fass, Robert P. Krawczyk, Michael Backes, Ben Stock:
JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript. DIMVA 2018: 303-325 - [c182]Pascal Berrang, Mathias Humbert, Yang Zhang
, Irina Lehmann, Roland Eils
, Michael Backes:
Dissecting Privacy Risks in Biomedical Data. EuroS&P 2018: 62-76 - [c181]Patrick Speicher, Marcel Steinmetz
, Robert Künnemann, Milivoj Simeonovski, Giancarlo Pellegrino, Jörg Hoffmann, Michael Backes:
Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure. EuroS&P 2018: 77-91 - [c180]Muhammad Rizwan Asghar
, Michael Backes, Milivoj Simeonovski:
PRIMA: Privacy-Preserving Identity and Access Management at Internet-Scale. ICC 2018: 1-6 - [c179]Ben Stock, Giancarlo Pellegrino, Frank Li, Michael Backes, Christian Rossow:
Didn't You Hear Me? - Towards More Successful Web Vulnerability Notifications. NDSS 2018 - [c178]Marten Oltrogge, Erik Derr, Christian Stransky, Yasemin Acar, Sascha Fahl, Christian Rossow, Giancarlo Pellegrino, Sven Bugiel, Michael Backes:
The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators. IEEE Symposium on Security and Privacy 2018: 634-647 - [c177]Meng Xu, Chenxiong Qian, Kangjie Lu, Michael Backes, Taesoo Kim:
Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels. IEEE Symposium on Security and Privacy 2018: 661-678 - [c176]Sanam Ghorbani Lyastani, Michael Schilling, Sascha Fahl, Michael Backes, Sven Bugiel:
Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse. USENIX Security Symposium 2018: 203-220 - [c175]Yang Zhang
, Mathias Humbert, Tahleen A. Rahman, Cheng-Te Li, Jun Pang, Michael Backes:
Tagvisor: A Privacy Advisor for Sharing Hashtags. WWW 2018: 287-296 - [e6]David Lie, Mohammad Mannan, Michael Backes, XiaoFeng Wang:
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, October 15-19, 2018. ACM 2018, ISBN 978-1-4503-5693-0 [contents] - [i76]Yang Zhang, Mathias Humbert, Tahleen A. Rahman, Cheng-Te Li, Jun Pang, Michael Backes:
Tagvisor: A Privacy Advisor for Sharing Hashtags. CoRR abs/1802.04122 (2018) - [i75]Robert Künnemann, Ilkan Esiyok, Michael Backes:
Automated Verification of Accountability in Security Protocols. CoRR abs/1805.10891 (2018) - [i74]Ahmed Salem, Yang Zhang, Mathias Humbert, Mario Fritz, Michael Backes:
ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models. CoRR abs/1806.01246 (2018) - [i73]Kathrin Grosse, Michael T. Smith, Michael Backes:
Killing Three Birds with one Gaussian Process: Analyzing Attack Vectors on Classification. CoRR abs/1806.02032 (2018) - [i72]Lucjan Hanzlik, Yang Zhang, Kathrin Grosse, Ahmed Salem, Max Augustin, Michael Backes, Mario Fritz:
MLCapsule: Guarded Offline Deployment of Machine Learning as a Service. CoRR abs/1808.00590 (2018) - [i71]Saba Eskandarian, Jonathan Cogan, Sawyer Birnbaum, Peh Chang Wei Brandon, Dillon Franke, Forest Fraser, Gaspar Garcia Jr., Eric Gong, Hung T. Nguyen, Taresh K. Sethi, Vishal Subbiah, Michael Backes, Giancarlo Pellegrino, Dan Boneh:
Fidelius: Protecting User Secrets from Compromised Browsers. CoRR abs/1809.04774 (2018) - [i70]Kathrin Grosse, David Pfaff, Michael T. Smith, Michael Backes:
The Limitations of Model Uncertainty in Adversarial Settings. CoRR abs/1812.02606 (2018) - [i69]Robert Künnemann, Deepak Garg, Michael Backes:
Accountability in Security Protocols. IACR Cryptol. ePrint Arch. 2018: 127 (2018) - [i68]Michael Backes, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider:
Signatures with Flexible Public Key: A Unified Approach to Privacy-Preserving Signatures (Full Version). IACR Cryptol. ePrint Arch. 2018: 191 (2018) - [i67]Michael Backes, Lucjan Hanzlik, Jonas Schneider:
Membership Privacy for Fully Dynamic Group Signatures. IACR Cryptol. ePrint Arch. 2018: 641 (2018) - 2017
- [j25]Yasemin Acar, Michael Backes, Sascha Fahl, Doowon Kim
, Michelle L. Mazurek, Christian Stransky:
How Internet Resources Might Be Helping You Develop Faster but Less Securely. IEEE Secur. Priv. 15(2): 50-60 (2017) - [c174]Jie Huang, Oliver Schranz, Sven Bugiel, Michael Backes:
The ART of App Compartmentalization: Compiler-based Library Privilege Separation on Stock Android. CCS 2017: 1037-1049 - [c173]Duc Cuong Nguyen, Dominik Wermke, Yasemin Acar, Michael Backes, Charles Weir
, Sascha Fahl:
A Stitch in Time: Supporting Android Developers in WritingSecure Code. CCS 2017: 1065-1077 - [c172]Giancarlo Pellegrino
, Martin Johns
, Simon Koch
, Michael Backes, Christian Rossow:
Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs. CCS 2017: 1757-1771 - [c171]Michael Backes, Mathias Humbert, Jun Pang, Yang Zhang
:
walk2friends: Inferring Social Links from Mobility Profiles. CCS 2017: 1943-1957 - [c170]Erik Derr, Sven Bugiel, Sascha Fahl, Yasemin Acar, Michael Backes:
Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android. CCS 2017: 2187-2200 - [c169]Michael Backes, Manuel Gomez-Rodriguez
, Praveen Manoharan
, Bartlomiej Surma:
Reconciling Privacy and Utility in Continuous-Time Diffusion Networks. CSF 2017: 292-304 - [c168]Kathrin Grosse, Nicolas Papernot, Praveen Manoharan, Michael Backes, Patrick D. McDaniel:
Adversarial Examples for Malware Detection. ESORICS (2) 2017: 62-79 - [c167]Michael Backes, Jannik Dreier, Steve Kremer
, Robert Künnemann:
A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and Its Application to Fair Exchange. EuroS&P 2017: 76-91 - [c166]Michael Backes, Mohammad Nauman
:
LUNA: Quantifying and Leveraging Uncertainty in Android Malware Analysis through Bayesian Machine Learning. EuroS&P 2017: 204-217 - [c165]Michael Backes, Konrad Rieck, Malte Skoruppa, Ben Stock
, Fabian Yamaguchi:
Efficient and Flexible Discovery of PHP Application Vulnerabilities. EuroS&P 2017: 334-349 - [c164]Michael Backes, Sven Bugiel, Oliver Schranz, Philipp von Styp-Rekowsky, Sebastian Weisgerber:
ARTist: The Android Runtime Instrumentation and Security Toolkit. EuroS&P 2017: 481-495 - [c163]Kangjie Lu, Marie-Therese Walter, David Pfaff, Stefan Nümberger, Wenke Lee, Michael Backes:
Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying. NDSS 2017 - [c162]Giorgi Maisuradze, Michael Backes, Christian Rossow:
Dachshund: Digging for and Securing (Non-)Blinded Constants in JIT Code. NDSS 2017 - [c161]Johannes Krupp, Mohammad Karami, Christian Rossow, Damon McCoy, Michael Backes:
Linking Amplification DDoS Attacks to Booter Services. RAID 2017: 427-449 - [c160]Felix Fischer, Konstantin Böttinger, Huang Xiao, Christian Stransky, Yasemin Acar, Michael Backes, Sascha Fahl:
Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security. IEEE Symposium on Security and Privacy 2017: 121-136 - [c159]Yasemin Acar, Michael Backes, Sascha Fahl, Simson L. Garfinkel
, Doowon Kim
, Michelle L. Mazurek, Christian Stransky:
Comparing the Usability of Cryptographic APIs. IEEE Symposium on Security and Privacy 2017: 154-171 - [c158]Michael Backes, Sven Bugiel, Philipp von Styp-Rekowsky, Marvin WiBfeld:
Seamless In-App Ad Blocking on Stock Android. IEEE Symposium on Security and Privacy Workshops 2017: 163-168 - [c157]Michael Backes, Pascal Berrang, Matthias Bieg, Roland Eils
, Carl Herrmann
, Mathias Humbert, Irina Lehmann:
Identifying Personal DNA Methylation Profiles by Genotype Inference. IEEE Symposium on Security and Privacy 2017: 957-976 - [c156]Ben Stock, Martin Johns, Marius Steffens, Michael Backes:
How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security. USENIX Security Symposium 2017: 971-987 - [c155]Christian Stransky, Yasemin Acar, Duc Cuong Nguyen, Dominik Wermke, Doowon Kim
, Elissa M. Redmiles, Michael Backes, Simson L. Garfinkel, Michelle L. Mazurek, Sascha Fahl:
Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers. CSET @ USENIX Security Symposium 2017 - [c154]Milivoj Simeonovski, Giancarlo Pellegrino
, Christian Rossow, Michael Backes:
Who Controls the Internet?: Analyzing Global Threats using Property Graph Traversals. WWW 2017: 647-656 - [i66]Kathrin Grosse, Praveen Manoharan, Nicolas Papernot, Michael Backes, Patrick D. McDaniel:
On the (Statistical) Detection of Adversarial Examples. CoRR abs/1702.06280 (2017) - [i65]Michael Backes, Jörg Hoffmann, Robert Künnemann, Patrick Speicher, Marcel Steinmetz:
Simulated Penetration Testing and Mitigation Analysis. CoRR abs/1705.05088 (2017) - [i64]Michael Backes, Mathias Humbert, Jun Pang, Yang Zhang:
walk2friends: Inferring Social Links from Mobility Profiles. CoRR abs/1708.08221 (2017) - [i63]Giancarlo Pellegrino, Martin Johns, Simon Koch, Michael Backes, Christian Rossow:
Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs. CoRR abs/1708.08786 (2017) - [i62]Felix Fischer, Konstantin Böttinger, Huang Xiao, Christian Stransky, Yasemin Acar, Michael Backes, Sascha Fahl:
Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security. CoRR abs/1710.03135 (2017) - [i61]Yang Zhang, Mathias Humbert, Bartlomiej Surma, Praveen Manoharan, Jilles Vreeken, Michael Backes:
CTRL+Z: Recovering Anonymized Social Graphs. CoRR abs/1711.05441 (2017) - [i60]Sanam Ghorbani Lyastani, Michael Schilling, Sascha Fahl, Sven Bugiel, Michael Backes:
Studying the Impact of Managers on Password Strength and Reuse. CoRR abs/1712.08940 (2017) - 2016
- [j24]Michael Backes:
Herausforderungen des Internet of Things. Datenschutz und Datensicherheit 40(8): 489-490 (2016) - [j23]Michael Backes, Aniket Kate, Praveen Manoharan
, Sebastian Meiser, Esfandiar Mohammadi:
AnoA: A Framework for Analyzing Anonymous Communication Protocols. J. Priv. Confidentiality 7(2) (2016) - [j22]Michael Backes, Sebastian Meiser, Marcin Slowik:
Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms Against Structural Attacks. Proc. Priv. Enhancing Technol. 2016(2): 40-60 (2016) - [j21]Michael Backes, Niklas Grimm, Aniket Kate:
Data Lineage in Malicious Environments. IEEE Trans. Dependable Secur. Comput. 13(2): 178-191 (2016) - [j20]Michael Backes, Sven Bugiel, Oliver Schranz, Philipp von Styp-Rekowsky:
Boxify: Bringing Full-Fledged App Sandboxing to Stock Android. login Usenix Mag. 41(2) (2016) - [c153]Michael Backes, Sven Bugiel, Erik Derr, Sebastian Gerling
, Christian Hammer
:
R-Droid: Leveraging Android App Analysis with Static Slice Optimization. AsiaCCS 2016: 129-140 - [c152]Michael Backes, Pascal Berrang, Mathias Humbert, Praveen Manoharan
:
Membership Privacy in MicroRNA-based Studies. CCS 2016: 319-330 - [c151]Michael Backes, Sven Bugiel, Erik Derr:
Reliable Third-Party Library Detection in Android and its Security Applications. CCS 2016: 356-367 - [c150]Michael Backes, Robert Künnemann, Esfandiar Mohammadi:
Computational Soundness for Dalvik Bytecode. CCS 2016: 717-730 - [c149]Johannes Götzfried, Tilo Müller, Gabor Drescher, Stefan Nürnberger, Michael Backes:
RamCrypt: Kernel-based Address Space Encryption for User-mode Processes. AsiaCCS 2016: 919-924 - [c148]Jonas Schneider, Nils Fleischhacker
, Dominique Schröder
, Michael Backes:
Efficient Cryptographic Password Hardening Services from Partially Oblivious Commitments. CCS 2016: 1192-1203 - [c147]Johannes Krupp
, Michael Backes, Christian Rossow:
Identifying the Scan and Attack Infrastructures Behind Amplification DDoS Attacks. CCS 2016: 1426-1437 - [c146]Ben Stock, Giancarlo Pellegrino
, Christian Rossow, Martin Johns, Michael Backes:
POSTER: Mapping the Landscape of Large-Scale Vulnerability Notifications. CCS 2016: 1787-1789 - [c145]Michael Backes, Sven Bugiel, Jie Huang, Oliver Schranz:
POSTER: The ART of App Compartmentalization. CCS 2016: 1811-1813 - [c144]Michael Brengel, Michael Backes, Christian Rossow:
Detecting Hardware-Assisted Virtualization. DIMVA 2016: 207-227 - [c143]Michael Backes, Amir Herzberg
, Aniket Kate, Ivan Pryvalov:
Anonymous RAM. ESORICS (1) 2016: 344-362 - [c142]Michael Backes, Pascal Berrang, Praveen Manoharan
:
From Zoos to Safaris - From Closed-World Enforcement to Open-World Assessment of Privacy. FOSAD 2016: 87-138 - [c141]Kangjie Lu, Wenke Lee, Stefan Nürnberger, Michael Backes:
How to Make ASLR Win the Clone Wars: Runtime Re-Randomization. NDSS 2016 - [c140]Michael Backes, Sebastian Meiser, Dominique Schröder
:
Delegatable Functional Signatures. Public Key Cryptography (1) 2016: 357-386 - [c139]Akira Yokoyama, Kou Ishii, Rui Tanabe
, Yinmin Papa, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Daisuke Inoue, Michael Brengel, Michael Backes, Christian Rossow:
SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion. RAID 2016: 165-187 - [c138]Michael Backes, Thorsten Holz
, Christian Rossow, Teemu Rytilahti, Milivoj Simeonovski, Ben Stock:
On the Feasibility of TTL-Based Filtering for DRDoS Mitigation. RAID 2016: 303-322 - [c137]Michael Backes, Christian Hammer
, David Pfaff, Malte Skoruppa:
Implementation-level analysis of the JavaScript helios voting client. SAC 2016: 2071-2078 - [c136]Yasemin Acar, Michael Backes, Sascha Fahl, Doowon Kim
, Michelle L. Mazurek, Christian Stransky:
You Get Where You're Looking for: The Impact of Information Sources on Code Security. IEEE Symposium on Security and Privacy 2016: 289-305 - [c135]Yasemin Acar, Michael Backes, Sven Bugiel, Sascha Fahl, Patrick D. McDaniel, Matthew Smith
:
SoK: Lessons Learned from Android Security Research for Appified Software Platforms. IEEE Symposium on Security and Privacy 2016: 433-451 - [c134]Giorgi Maisuradze, Michael Backes, Christian Rossow:
What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions of JIT-ROP Defenses. USENIX Security Symposium 2016: 139-156 - [c133]Ben Stock, Giancarlo Pellegrino, Christian Rossow, Martin Johns, Michael Backes:
Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification. USENIX Security Symposium 2016: 1015-1032 - [c132]Michael Backes, Sven Bugiel, Erik Derr, Patrick D. McDaniel, Damien Octeau, Sebastian Weisgerber:
On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis. USENIX Security Symposium 2016: 1101-1118 - [c131]Michael Backes, Pascal Berrang, Anna Hecksteden, Mathias Humbert, Andreas Keller, Tim Meyer:
Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles. USENIX Security Symposium 2016: 1223-1240 - [c130]Michael Backes, Pascal Berrang, Oana Goga, Krishna P. Gummadi
, Praveen Manoharan
:
On Profile Linkability despite Anonymity in Social Media Systems. WPES@CCS 2016: 25-35 - [i59]Kathrin Grosse, Nicolas Papernot, Praveen Manoharan, Michael Backes, Patrick D. McDaniel:
Adversarial Perturbations Against Deep Neural Networks for Malware Classification. CoRR abs/1606.04435 (2016) - [i58]Michael Backes, Sven Bugiel, Oliver Schranz, Philipp von Styp-Rekowsky, Sebastian Weisgerber:
ARTist: The Android Runtime Instrumentation and Security Toolkit. CoRR abs/1607.06619 (2016) - [i57]Michael Backes, Robert Künnemann, Esfandiar Mohammadi:
Computational Soundness for Dalvik Bytecode. CoRR abs/1608.04362 (2016) - [i56]Fatemeh Shirazi, Milivoj Simeonovski, Muhammad Rizwan Asghar, Michael Backes, Claudia Díaz:
A Survey on Routing in Anonymous Communication Protocols. CoRR abs/1608.05538 (2016) - [i55]Muhammad Rizwan Asghar, Michael Backes, Milivoj Simeonovski:
PRIMA: Privacy-Preserving Identity and Access Management at Internet-Scale. CoRR abs/1612.01787 (2016) - [i54]Michael Backes, Amir Herzberg, Aniket Kate, Ivan Pryvalov:
Anonymous RAM. IACR Cryptol. ePrint Arch. 2016: 678 (2016) - 2015
- [j19]Michael Backes, Boris Köpf:
Quantifying information flow in cryptographic systems. Math. Struct. Comput. Sci. 25(2): 457-479 (2015) - [c129]Milivoj Simeonovski, Fabian Bendun, Muhammad Rizwan Asghar
, Michael Backes, Ninja Marnau, Peter Druschel:
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information. ACNS 2015: 431-453 - [c128]Michael Backes, Aniket Kate, Sebastian Meiser, Tim Ruffing
:
Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources. ACNS 2015: 675-695 - [c127]Michael Backes, Martin Gagné, Sri Aravinda Krishnan Thyagarajan
:
Fully Secure Inner-Product Proxy Re-Encryption with Constant Size Ciphertext. SCC@ASIACCS 2015: 31-40 - [c126]Michael Backes, Simon Koch, Sebastian Meiser, Esfandiar Mohammadi, Christian Rossow:
POSTER: In the Net of the Spider: Measuring the Anonymity-Impact of Network-level Adversaries Against Tor. CCS 2015: 1626-1628 - [c125]Michael Backes, Oliver Schranz, Philipp von Styp-Rekowsky:
POSTER: Towards Compiler-Assisted Taint Tracking on the Android Runtime (ART). CCS 2015: 1629-1631 - [c124]Michael Backes, Fabian Bendun, Matteo Maffei, Esfandiar Mohammadi, Kim Pecina:
Symbolic Malleable Zero-Knowledge Proofs. CSF 2015: 412-426 - [c123]Michael Backes, Esfandiar Mohammadi, Tim Ruffing
:
Computational Soundness for Interactive Primitives. ESORICS (1) 2015: 125-145 - [c122]Michael Backes, Fabian Bendun, Jörg Hoffmann, Ninja Marnau:
PriCL: Creating a Precedent, a Framework for Reasoning about Privacy Case Law. POST 2015: 344-363 - [c121]Michael Backes, Manuel Barbosa
, Dario Fiore, Raphael M. Reischuk:
ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data. IEEE Symposium on Security and Privacy 2015: 271-286 - [c120]Michael Backes, Sven Bugiel, Christian Hammer, Oliver Schranz, Philipp von Styp-Rekowsky:
Boxify: Full-fledged App Sandboxing for Stock Android. USENIX Security Symposium 2015: 691-706 - [i53]Michael Backes, Fabian Bendun, Jörg Hoffmann, Ninja Marnau:
PriCL: Creating a Precedent A Framework for Reasoning about Privacy Case Law. CoRR abs/1501.03353 (2015) - [i52]Michael Backes, Pascal Berrang, Praveen Manoharan:
How well do you blend into the crowd? - d-convergence: A novel paradigm for quantifying privacy in the age of Big-Data. CoRR abs/1502.03346 (2015) - [i51]Milivoj Simeonovski, Fabian Bendun, Muhammad Rizwan Asghar, Michael Backes, Ninja Marnau, Peter Druschel:
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information. CoRR abs/1506.06033 (2015) - [i50]Milivoj Simeonovski, Fabian Bendun, Muhammad Rizwan Asghar, Michael Backes, Ninja Marnau, Peter Druschel:
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information. IACR Cryptol. ePrint Arch. 2015: 592 (2015) - 2014
- [j18]Michael Backes, Catalin Hritcu, Matteo Maffei:
Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations. J. Comput. Secur. 22(2): 301-353 (2014) - [c119]Michael Backes, Jeremy Clark, Aniket Kate, Milivoj Simeonovski, Peter Druschel:
BackRef: Accountability in Anonymous Communication Networks. ACNS 2014: 380-400 - [c118]Michael Backes, Rainer W. Gerling, Sebastian Gerling, Stefan Nürnberger, Dominique Schröder
, Mark Simkin:
WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP. ACNS 2014: 401-418 - [c117]Michael Backes, Sven Bugiel, Sebastian Gerling
:
Scippa: system-centric IPC provenance on Android. ACSAC 2014: 36-45 - [c116]Michael Backes, Sven Bugiel, Sebastian Gerling
, Philipp von Styp-Rekowsky:
Android security framework: extensible multi-layered access control on Android. ACSAC 2014: 46-55 - [c115]Michael Backes, Aniket Kate, Sebastian Meiser, Esfandiar Mohammadi:
(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection. CCS 2014: 513-524 - [c114]Michael Backes, Thorsten Holz
, Benjamin Kollenda, Philipp Koppe, Stefan Nürnberger, Jannik Pewny:
You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code. CCS 2014: 1342-1353 - [c113]Michael Backes, Praveen Manoharan
, Esfandiar Mohammadi:
TUC: Time-Sensitive and Modular Analysis of Anonymous Communication. CSF 2014: 383-397 - [c112]Michael Backes, Fabian Bendun, Ashish Choudhury
, Aniket Kate:
Asynchronous MPC with a strict honest majority using non-equivocation. PODC 2014: 10-19 - [c111]Michael Backes, Esfandiar Mohammadi, Tim Ruffing
:
Computational Soundness Results for ProVerif - Bridging the Gap from Trace Properties to Uniformity. POST 2014: 42-62 - [c110]Michael Backes, Sebastian Gerling
, Stefan Lorenz, Stephan Lukas:
X-pire 2.0: a user-controlled expiration date and copy protection mechanism. SAC 2014: 1633-1640 - [c109]Michael Backes, Niklas Grimm, Aniket Kate:
Lime: Data Lineage in the Malicious Environment. STM 2014: 183-187 - [c108]Michael Backes, Stefan Nürnberger:
Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing. USENIX Security Symposium 2014: 433-447 - [i49]Michael Backes, Sven Bugiel, Sebastian Gerling, Philipp von Styp-Rekowsky:
Android Security Framework: Enabling Generic and Extensible Access Control on Android. CoRR abs/1404.1395 (2014) - [i48]Michael Backes, Niklas Grimm, Aniket Kate:
Lime: Data Lineage in the Malicious Environment. CoRR abs/1408.1076 (2014) - [i47]Michael Backes, Aniket Kate, Praveen Manoharan, Sebastian Meiser, Esfandiar Mohammadi:
AnoA: A Framework For Analyzing Anonymous Communication Protocols. IACR Cryptol. ePrint Arch. 2014: 87 (2014) - [i46]Michael Backes, Dario Fiore, Raphael M. Reischuk:
Nearly Practical and Privacy-Preserving Proofs on Authenticated Data. IACR Cryptol. ePrint Arch. 2014: 617 (2014) - [i45]Michael Backes, Aniket Kate, Sebastian Meiser, Esfandiar Mohammadi:
(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection. IACR Cryptol. ePrint Arch. 2014: 621 (2014) - [i44]Michael Backes, Özgür Dagdelen, Marc Fischlin, Sebastian Gajek, Sebastian Meiser, Dominique Schröder:
Operational Signature Schemes. IACR Cryptol. ePrint Arch. 2014: 820 (2014) - 2013
- [c107]Michael Backes, Dario Fiore, Raphael M. Reischuk:
Verifiable delegation of computation on outsourced data. CCS 2013: 863-874 - [c106]Michael Backes, Aniket Kate, Praveen Manoharan
, Sebastian Meiser, Esfandiar Mohammadi:
AnoA: A Framework for Analyzing Anonymous Communication Protocols. CSF 2013: 163-178 - [c105]Michael Backes, Amit Datta, Aniket Kate:
Asynchronous Computational VSS with Reduced Communication Complexity. CT-RSA 2013: 259-276 - [c104]Michael Backes, Dario Fiore, Esfandiar Mohammadi:
Privacy-Preserving Accountable Computation. ESORICS 2013: 38-56 - [c103]Michael Backes, Sebastian Meiser:
Differentially Private Smart Metering with Battery Recharging. DPM/SETOP 2013: 194-212 - [c102]Michael Backes, Sebastian Gerling, Christian Hammer
, Matteo Maffei, Philipp von Styp-Rekowsky:
AppGuard - Fine-Grained Policy Enforcement for Untrusted Android Applications. DPM/SETOP 2013: 213-231 - [c101]Philipp von Styp-Rekowsky, Sebastian Gerling, Michael Backes, Christian Hammer
:
Idea: Callee-Site Rewriting of Sealed System Libraries. ESSoS 2013: 33-41 - [c100]Michael Backes, Goran Doychev, Boris Köpf:
Preventing Side-Channel Leaks in Web Traffic: A Formal Approach. NDSS 2013 - [c99]Michael Backes, Fabian Bendun, Dominique Unruh
:
Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized Verification. POST 2013: 206-225 - [c98]Michael Backes, Sebastian Gerling, Christian Hammer
, Matteo Maffei, Philipp von Styp-Rekowsky:
AppGuard - Enforcing User Requirements on Android Apps. TACAS 2013: 543-548 - [c97]Michael Backes, Martin Gagné, Malte Skoruppa:
Using mobile device communication to strengthen e-Voting protocols. WPES 2013: 237-242 - [i43]Michael Backes, Jeremy Clark, Peter Druschel, Aniket Kate, Milivoj Simeonovski:
Introducing Accountability to Anonymity Networks. CoRR abs/1311.3151 (2013) - [i42]Michael Backes, Sebastian Meiser, Dominique Schröder:
Highly Controlled, Fine-grained Delegation of Signing Capabilities. IACR Cryptol. ePrint Arch. 2013: 408 (2013) - [i41]Michael Backes, Dario Fiore, Raphael M. Reischuk:
Verifiable Delegation of Computation on Outsourced Data. IACR Cryptol. ePrint Arch. 2013: 469 (2013) - [i40]Michael Backes, Praveen Manoharan, Esfandiar Mohammadi:
TUC: Time-sensitive and Modular Analysis of Anonymous Communication. IACR Cryptol. ePrint Arch. 2013: 664 (2013) - [i39]Michael Backes, Fabian Bendun, Ashish Choudhury, Aniket Kate:
Asynchronous MPC with t<n/2 Using Non-equivocation. IACR Cryptol. ePrint Arch. 2013: 745 (2013) - [i38]Michael Backes, Aniket Kate, Sebastian Meiser, Tim Ruffing:
Differential Indistinguishability for Cryptographic Primitives with Imperfect Randomness. IACR Cryptol. ePrint Arch. 2013: 808 (2013) - 2012
- [j17]Andrew C. Myers, Michael Backes:
Preface. J. Comput. Secur. 20(6): 635-636 (2012) - [c96]Michael Backes, Ian Goldberg, Aniket Kate, Tomas Toft:
Adding query privacy to robust DHTs. AsiaCCS 2012: 30-31 - [c95]Michael Backes, Ankit Malik, Dominique Unruh
:
Computational soundness without protocol restrictions. CCS 2012: 699-711 - [c94]Michael Backes, Gilles Barthe
, Matthias Berg, Benjamin Grégoire, César Kunz, Malte Skoruppa, Santiago Zanella-Béguelin:
Verified Security of Merkle-Damgård. CSF 2012: 354-368 - [c93]Michael Backes, Ian Goldberg, Aniket Kate, Esfandiar Mohammadi:
Provably Secure and Practical Onion Routing. CSF 2012: 369-385 - [c92]Markus Mainberger, Christian Schmaltz, Matthias Berg, Joachim Weickert, Michael Backes:
Diffusion-Based Image Compression in Steganography. ISVC (2) 2012: 219-228 - [c91]Michael Backes, Matteo Maffei, Kim Pecina:
Automated Synthesis of Secure Distributed Applications. NDSS 2012 - [c90]Michael Backes, Alex Busenius, Catalin Hritcu:
On the Development and Formalization of an Extensible Code Generator for Real Life Security Protocols. NASA Formal Methods 2012: 371-387 - [c89]Michael Backes, Fabian Bendun, Aniket Kate:
Brief announcement: distributed cryptography using trinc. PODC 2012: 91-92 - [c88]Michael Backes, Aniket Kate, Matteo Maffei, Kim Pecina:
ObliviAd: Provably Secure and Practical Online Behavioral Advertising. IEEE Symposium on Security and Privacy 2012: 257-271 - [c87]Michael Backes, Aniket Kate, Esfandiar Mohammadi:
Ace: an efficient key-exchange protocol for onion routing. WPES 2012: 55-64 - [c86]Raphael M. Reischuk, Michael Backes, Johannes Gehrke:
SAFE extensibility of data-driven web applications. WWW 2012: 799-808 - [i37]Michael Backes, Fabian Bendun, Dominique Unruh:
Computational Soundness of Symbolic Zero-knowledge Proofs: Weaker Assumptions and Mechanized Verification. IACR Cryptol. ePrint Arch. 2012: 81 (2012) - [i36]Michael Backes, Sebastian Meiser:
Differentially Private Smart Metering with Battery Recharging. IACR Cryptol. ePrint Arch. 2012: 183 (2012) - [i35]Michael Backes, Ankit Malik, Dominique Unruh:
Computational Soundness without Protocol Restrictions. IACR Cryptol. ePrint Arch. 2012: 486 (2012) - [i34]Michael Backes, Amit Datta, Aniket Kate:
Asynchronous Computational VSS with Reduced Communication Complexity. IACR Cryptol. ePrint Arch. 2012: 619 (2012) - 2011
- [j16]Michael Backes, Iliano Cervesato
, Aaron D. Jaggard
, Andre Scedrov
, Joe-Kai Tsay:
Cryptographically sound security proofs for basic and public-key Kerberos. Int. J. Inf. Sec. 10(2): 107-134 (2011) - [c85]Michael Backes, Aniket Kate, Arpita Patra:
Computational Verifiable Secret Sharing Revisited. ASIACRYPT 2011: 590-609 - [c84]Michael Backes, Matthias Berg, Boris Köpf:
Non-uniform distributions in quantitative information-flow. AsiaCCS 2011: 367-375 - [c83]Michael Backes, Catalin Hritcu, Thorsten Tarrach:
Automatically Verifying Typing Constraints for a Data Processing Language. CPP 2011: 296-313 - [c82]Michael Backes, Matteo Maffei, Kim Pecina:
A Security API for Distributed Social Networks. NDSS 2011 - [c81]Michael Backes, Matteo Maffei, Kim Pecina:
Securing social networks. PODC 2011: 341-342 - [c80]Michael Backes, Catalin Hritcu, Matteo Maffei:
Union and Intersection Types for Secure Protocol Implementations. TOSCA 2011: 1-28 - [c79]Michael Backes, Matteo Maffei, Kim Pecina, Raphael M. Reischuk:
G2C: Cryptographic Protocols from Goal-Driven Specifications. TOSCA 2011: 57-77 - [i33]Michael Backes, Sebastian Gerling, Philipp von Styp-Rekowsky:
A Novel Attack against Android Phones. CoRR abs/1106.4184 (2011) - [i32]Michael Backes, Ian Goldberg, Aniket Kate, Tomas Toft:
Adding Query Privacy to Robust DHTs. CoRR abs/1107.1072 (2011) - [i31]Julian Backes, Michael Backes, Markus Dürmuth, Sebastian Gerling, Stefan Lorenz:
X-pire! - A digital expiration date for images in social networks. CoRR abs/1112.2649 (2011) - [i30]Michael Backes, Aniket Kate, Arpita Patra:
Computational Verifiable Secret Sharing Revisited. IACR Cryptol. ePrint Arch. 2011: 281 (2011) - [i29]Michael Backes, Ian Goldberg, Aniket Kate, Esfandiar Mohammadi:
Provably Secure and Practical Onion Routing. IACR Cryptol. ePrint Arch. 2011: 308 (2011) - 2010
- [j15]Michael Backes, Dominique Unruh
:
Computational soundness of symbolic zero-knowledge proofs. J. Comput. Secur. 18(6): 1077-1155 (2010) - [c78]Michael Backes, Matteo Maffei, Dominique Unruh
:
Computationally sound verification of source code. CCS 2010: 387-398 - [c77]Michael Backes, Goran Doychev, Markus Dürmuth
, Boris Köpf:
Speaker Recognition in Encrypted Voice Streams. ESORICS 2010: 508-523 - [c76]Michael Backes, Oana Ciobotaru, Anton Krohmer:
RatFish: A File Sharing Protocol Provably Secure against Rational Users. ESORICS 2010: 607-625 - [c75]Michael Backes, Matteo Maffei, Esfandiar Mohammadi:
Computationally Sound Abstraction and Verification of Secure Multi-Party Computations. FSTTCS 2010: 352-363 - [c74]Michael Backes, Stefan Lorenz, Matteo Maffei, Kim Pecina:
Anonymous Webs of Trust. Privacy Enhancing Technologies 2010: 130-148 - [c73]Michael Backes, Stefan Lorenz, Matteo Maffei, Kim Pecina:
Brief announcement: anonymity and trust in distributed systems. PODC 2010: 237-238 - [c72]Michael Backes, Markus Dürmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder:
Acoustic Side-Channel Attacks on Printers. USENIX Security Symposium 2010: 307-322 - [i28]Michael Backes, Matteo Maffei, Dominique Unruh:
Computationally Sound Verification of Source Code. IACR Cryptol. ePrint Arch. 2010: 416 (2010)
2000 – 2009
- 2009
- [c71]Michael Backes, Dennis Hofheinz, Dominique Unruh
:
CoSP: a general framework for computational soundness proofs. CCS 2009: 66-78 - [c70]Michael Backes, Martin P. Grochulla, Catalin Hritcu, Matteo Maffei:
Achieving Security Despite Compromise Using Zero-knowledge. CSF 2009: 308-323 - [c69]Michael Backes, Peter Druschel, Andreas Haeberlen, Dominique Unruh:
CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable. NDSS 2009 - [c68]Michael Backes, Marek Hamerlik, Alessandro Linari, Matteo Maffei, Christos Tryfonopoulos
, Gerhard Weikum:
Anonymity and Censorship Resistance in Unstructured Overlay Networks. OTM Conferences (1) 2009: 147-164 - [c67]Michael Backes, Boris Köpf, Andrey Rybalchenko:
Automatic Discovery and Quantification of Information Leaks. SP 2009: 141-153 - [c66]Michael Backes, Tongbo Chen, Markus Dürmuth, Hendrik P. A. Lensch, Martin Welk
:
Tempest in a Teapot: Compromising Reflections Revisited. SP 2009: 315-327 - [c65]Michael Backes, Matteo Maffei:
Design and Verification of Anonymous Trust Protocols. Security Protocols Workshop 2009: 143-148 - [c64]Michael Backes:
Design and Verification of Anonymous Trust Protocols. Security Protocols Workshop 2009: 149-156 - [e5]Michael Backes, Peng Ning:
Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings. Lecture Notes in Computer Science 5789, Springer 2009, ISBN 978-3-642-04443-4 [contents] - [i27]Michael Backes, Dennis Hofheinz, Dominique Unruh:
CoSP: A General Framework For Computational Soundness Proofs. IACR Cryptol. ePrint Arch. 2009: 80 (2009) - 2008
- [j14]Michael Backes, Birgit Pfitzmann:
Limits of the BRSIM/UC soundness of Dolev-Yao-style XOR. Int. J. Inf. Sec. 7(1): 33-54 (2008) - [j13]Michael Backes, Markus Dürmuth, Dennis Hofheinz, Ralf Küsters:
Conditional reactive simulatability. Int. J. Inf. Sec. 7(2): 155-169 (2008) - [j12]Michael Backes, Birgit Pfitzmann, Andre Scedrov
:
Key-dependent message security under active attacks - BRSIM/UC-soundness of Dolev-Yao-style encryption with key cycles. J. Comput. Secur. 16(5): 497-530 (2008) - [c63]Michael Backes, Dominique Unruh
:
Limits of Constructive Security Proofs. ASIACRYPT 2008: 290-307 - [c62]Michael Backes, Markus Dürmuth, Dominique Unruh
:
OAEP Is Secure under Key-Dependent Messages. ASIACRYPT 2008: 506-523 - [c61]Michael Backes, Stefan Lorenz, Matteo Maffei, Kim Pecina:
The CASPA Tool: Causality-Based Abstraction for Security Protocol Analysis. CAV 2008: 419-422 - [c60]Michael Backes, Catalin Hritcu, Matteo Maffei:
Type-checking zero-knowledge. CCS 2008: 357-370 - [c59]Michael Backes, Catalin Hritcu, Matteo Maffei:
Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus. CSF 2008: 195-209 - [c58]Michael Backes, Dominique Unruh
:
Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers. CSF 2008: 255-269 - [c57]Michael Backes, Boris Köpf:
Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks. ESORICS 2008: 517-532 - [c56]Michael Backes, Matthias Berg, Dominique Unruh
:
A Formal Language for Cryptographic Pseudocode. LPAR 2008: 353-376 - [c55]Michael Backes, Marek Hamerlik, Alessandro Linari, Matteo Maffei, Christos Tryfonopoulos, Gerhard Weikum:
Anonymous and censorship resistant content sharing in unstructured overlays. PODC 2008: 429 - [c54]Michael Backes, Markus Dürmuth, Dominique Unruh
:
Compromising Reflections-or-How to Read LCD Monitors around the Corner. SP 2008: 158-169 - [c53]Michael Backes, Matteo Maffei, Dominique Unruh
:
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol. SP 2008: 202-215 - [i26]Michael Backes, Dominique Unruh:
Computational soundness of symbolic zero-knowledge proofs. IACR Cryptol. ePrint Arch. 2008: 152 (2008) - [i25]Michael Backes, Boris Köpf:
Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks. IACR Cryptol. ePrint Arch. 2008: 162 (2008) - 2007
- [j11]Michael Backes, Birgit Pfitzmann, Michael Waidner
:
The reactive simulatability (RSIM) framework for asynchronous systems. Inf. Comput. 205(12): 1685-1720 (2007) - [j10]Michael Backes, Stefanos Gritzalis
, Bart Preneel:
Preface. Int. J. Inf. Sec. 6(6): 359-360 (2007) - [j9]Michael Backes, David A. Basin, Michael Waidner
:
Preface. J. Comput. Secur. 15(6): 561 (2007) - [c52]Michael Backes, Agostino Cortesi
, Riccardo Focardi
, Matteo Maffei:
A calculus of challenges and responses. FMSE 2007: 51-60 - [c51]Michael Backes, Birgit Pfitzmann, Andre Scedrov
:
Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles. CSF 2007: 112-124 - [c50]Michael Backes, Agostino Cortesi
, Matteo Maffei:
Causality-based Abstraction of Multiplicity in Security Protocols. CSF 2007: 355-369 - [c49]Michael Backes, Markus Dürmuth, Ralf Küsters:
On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography. FSTTCS 2007: 108-120 - [c48]Michael Backes, Markus Dürmuth, Dominique Unruh
:
Information Flow in the Peer-Reviewing Process. S&P 2007: 187-191 - [c47]Michael Backes, Jörn Müller-Quade, Dominique Unruh:
On the Necessity of Rewinding in Secure Multiparty Computation. TCC 2007: 157-173 - [e4]Michael Backes, Andre Scedrov:
Proceedings of the International Workshop on Security and Concurrency, SecCo@CONCUR 2005, San Francisco, CA, USA, August 22, 2005. Electronic Notes in Theoretical Computer Science 180(1), Elsevier 2007 [contents] - [i24]Michael Backes, Matteo Maffei, Dominique Unruh:
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol. Formal Protocol Verification Applied 2007 - [i23]Michael Backes, Dominique Unruh:
On the Security of Protocols with Logarithmic Communication Complexity. IACR Cryptol. ePrint Arch. 2007: 169 (2007) - [i22]Michael Backes, Markus Dürmuth, Ralf Küsters:
On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography. IACR Cryptol. ePrint Arch. 2007: 233 (2007) - [i21]Michael Backes, Matteo Maffei, Dominique Unruh:
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol. IACR Cryptol. ePrint Arch. 2007: 289 (2007) - 2006
- [j8]Michael Backes, Anupam Datta, Ante Derek, John C. Mitchell
, Mathieu Turuani:
Compositional analysis of contract-signing protocols. Theor. Comput. Sci. 367(1-2): 33-56 (2006) - [c46]Michael Backes, Peeter Laud
:
Computationally sound secrecy proofs by mechanized flow analysis. CCS 2006: 370-379 - [c45]Christoph Sprenger
, Michael Backes, David A. Basin, Birgit Pfitzmann, Michael Waidner
:
Cryptographically Sound Theorem Proving. CSFW 2006: 153-166 - [c44]Michael Backes, Christian Cachin, Alina Oprea:
Secure Key-Updating for Lazy Revocation. ESORICS 2006: 327-346 - [c43]Michael Backes, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay:
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos. ESORICS 2006: 362-383 - [c42]Michael Backes, Birgit Pfitzmann, Michael Waidner
:
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes. ESORICS 2006: 404-423 - [c41]Michael Backes, Markus Dürmuth, Dennis Hofheinz, Ralf Küsters:
Conditional Reactive Simulatability. ESORICS 2006: 424-443 - [c40]Michael Backes, Birgit Pfitzmann, Michael Waidner
:
Formal Methods and Cryptography. FM 2006: 612-616 - [c39]Michael Backes, Sebastian Mödersheim
, Birgit Pfitzmann, Luca Viganò:
Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario. FoSSaCS 2006: 428-445 - [c38]Michael Backes, Birgit Pfitzmann:
On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol. SEC 2006: 233-245 - [e3]Sokratis K. Katsikas, Javier López, Michael Backes, Stefanos Gritzalis, Bart Preneel:
Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings. Lecture Notes in Computer Science 4176, Springer 2006, ISBN 3-540-38341-7 [contents] - [i20]Christoph Sprenger, Michael Backes, David A. Basin, Birgit Pfitzmann, Michael Waidner:
Cryptographically Sound Theorem Proving. IACR Cryptol. ePrint Arch. 2006: 47 (2006) - [i19]Michael Backes, Sebastian Mödersheim, Birgit Pfitzmann, Luca Viganò:
Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario. IACR Cryptol. ePrint Arch. 2006: 58 (2006) - [i18]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes. IACR Cryptol. ePrint Arch. 2006: 68 (2006) - [i17]Michael Backes, Markus Dürmuth, Dennis Hofheinz, Ralf Küsters:
Conditional Reactive Simulatability. IACR Cryptol. ePrint Arch. 2006: 132 (2006) - [i16]Michael Backes, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay:
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos. IACR Cryptol. ePrint Arch. 2006: 219 (2006) - [i15]Michael Backes, Peeter Laud:
Computationally Sound Secrecy Proofs by Mechanized Flow Analysis. IACR Cryptol. ePrint Arch. 2006: 266 (2006) - [i14]Michael Backes, Jörn Müller-Quade, Dominique Unruh:
On the Necessity of Rewinding in Secure Multiparty Computation. IACR Cryptol. ePrint Arch. 2006: 315 (2006) - 2005
- [j7]Michael Backes, Birgit Pfitzmann, Michael Waidner
:
Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library. Int. J. Inf. Sec. 4(3): 135-154 (2005) - [j6]Michael Backes, Birgit Pfitzmann, Michael Waidner
:
Reactively secure signature schemes. Int. J. Inf. Sec. 4(4): 242-252 (2005) - [j5]Michael Backes:
Unifying simulatability definitions in cryptographic systems under different timing assumptions. J. Log. Algebraic Methods Program. 64(2): 157-188 (2005) - [j4]Michael Backes, Birgit Pfitzmann:
Relating Symbolic and Cryptographic Secrecy. IEEE Trans. Dependable Secur. Comput. 2(2): 109-123 (2005) - [c37]Michael Backes, Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh
:
On fairness in simulatability-based cryptographic systems. FMSE 2005: 13-22 - [c36]Michael Backes, Markus Dürmuth:
A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System. CSFW 2005: 78-93 - [c35]Michael Backes, Anupam Datta, Ante Derek, John C. Mitchell, Mathieu Turuani:
Compositional Analysis of Contract Signing Protocols. CSFW 2005: 94-110 - [c34]Michael Backes, Birgit Pfitzmann:
Limits of the Cryptographic Realization of Dolev-Yao-Style XOR. ESORICS 2005: 178-196 - [c33]Michael Backes:
Quantifying Probabilistic Information Flow in Computational Reactive Systems. ESORICS 2005: 336-354 - [c32]Michael Backes, Christian Cachin, Alina Oprea:
Lazy Revocation in Cryptographic File Systems. IEEE Security in Storage Workshop 2005: 1-11 - [c31]Michael Backes, Birgit Pfitzmann:
Relating Symbolic and Cryptographic Secrecy. S&P 2005: 171-182 - [c30]Michael Backes, Thomas Groß:
Tailoring the Dolev-Yao abstraction to web services realities. SWS 2005: 65-74 - [c29]Michael Backes, Christian Cachin:
Public-Key Steganography with Active Attacks. TCC 2005: 210-226 - [c28]Michael Backes, Jan Camenisch, Dieter Sommer:
Anonymous yet accountable access control. WPES 2005: 40-46 - [c27]Michael Backes, Andre Scedrov:
Preface. SecCO@CONCUR 2005: 1-2 - [c26]Michael Backes:
Real-or-random Key Secrecy of the Otway-Rees Protocol via a Symbolic Security Proof. MFPS 2005: 111-145 - [i13]Michael Backes, Birgit Pfitzmann:
Limits of the Cryptographic Realization of Dolev-Yao-style XOR. IACR Cryptol. ePrint Arch. 2005: 220 (2005) - [i12]Michael Backes, Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh:
On Fairness in Simulatability-based Cryptographic Systems. IACR Cryptol. ePrint Arch. 2005: 294 (2005) - [i11]Michael Backes, Christian Cachin, Alina Oprea:
Secure Key-Updating for Lazy Revocation. IACR Cryptol. ePrint Arch. 2005: 334 (2005) - [i10]Michael Backes, Birgit Pfitzmann, Andre Scedrov:
Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles. IACR Cryptol. ePrint Arch. 2005: 421 (2005) - 2004
- [b1]Michael Backes:
Cryptographically sound analysis of security protocols. Saarland University, Saarbrücken, Germany, 2004, pp. 1-153 - [j3]Michael Backes, Birgit Pfitzmann:
Computational probabilistic noninterference. Int. J. Inf. Sec. 3(1): 42-60 (2004) - [j2]Michael Backes, Birgit Pfitzmann, Michael Waidner
:
Polynomial liveness. J. Comput. Secur. 12(3-4): 589-617 (2004) - [j1]Michael Backes, Birgit Pfitzmann:
A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol. IEEE J. Sel. Areas Commun. 22(10): 2075-2086 (2004) - [c25]Michael Backes, Birgit Pfitzmann:
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library. CSFW 2004: 204-218 - [c24]Michael Backes, Markus Dürmuth, Rainer Steinwandt:
An Algebra for Composing Enterprise Privacy Policies. ESORICS 2004: 33-52 - [c23]Michael Backes:
A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol. ESORICS 2004: 89-108 - [c22]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Justifying a Dolev-Yao Model Under Active Attacks. FOSAD 2004: 1-41 - [c21]Michael Backes, Birgit Pfitzmann, Michael Waidner
:
Low-Level Ideal Signatures and General Integrity Idealization. ISC 2004: 39-51 - [c20]Michael Backes, Dennis Hofheinz:
How to Break and Repair a Universally Composable Signature Functionality. ISC 2004: 61-72 - [c19]Michael Backes, Markus Dürmuth, Günter Karjoth:
Unification in Privacy Policy Evaluation - Translating EPAL into Prolog. POLICY 2004: 185-188 - [c18]Michael Backes, Günter Karjoth, Walid Bagga, Matthias Schunter:
Efficient comparison of enterprise privacy policies. SAC 2004: 375-382 - [c17]Michael Backes, Birgit Pfitzmann, Michael Waidner
:
A General Composition Theorem for Secure Reactive Systems. TCC 2004: 336-354 - [e2]Vijayalakshmi Atluri, Michael Backes, David A. Basin, Michael Waidner:
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004. ACM 2004, ISBN 1-58113-971-3 [contents] - [i9]Michael Backes, Birgit Pfitzmann:
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library. IACR Cryptol. ePrint Arch. 2004: 59 (2004) - [i8]Michael Backes, Birgit Pfitzmann, Michael Waidner:
The Reactive Simulatability (RSIM) Framework for Asynchronous Systems. IACR Cryptol. ePrint Arch. 2004: 82 (2004) - [i7]Michael Backes, Birgit Pfitzmann:
Relating Symbolic and Cryptographic Secrecy. IACR Cryptol. ePrint Arch. 2004: 300 (2004) - 2003
- [c16]Michael Backes, Birgit Pfitzmann, Michael Waidner
:
Security in Business Process Engineering. Business Process Management 2003: 168-183 - [c15]Michael Backes, Catherine Meadows, John C. Mitchell:
Relating cryptography and formal methods: a panel. FMSE 2003: 61-66 - [c14]Michael Backes, Birgit Pfitzmann, Michael Waidner
:
A composable cryptographic library with nested operations. CCS 2003: 220-230 - [c13]Michael Backes:
Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions. CONCUR 2003: 346-360 - [c12]Michael Backes, Christian Cachin:
Reliable Broadcast in a Computational Hybrid Model with Byzantine Faults, Crashes, and Recoveries. DSN 2003: 37-46 - [c11]Michael Backes, Birgit Pfitzmann, Matthias Schunter:
A Toolkit for Managing Enterprise Privacy Policies. ESORICS 2003: 162-180 - [c10]Michael Backes, Birgit Pfitzmann, Michael Waidner
:
Symmetric Authentication within a Simulatable Cryptographic Library. ESORICS 2003: 271-290 - [c9]Michael Backes, Birgit Pfitzmann:
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol. FSTTCS 2003: 1-12 - [c8]Michael Backes, Birgit Pfitzmann, Michael Waidner
:
Reactively Secure Signature Schemes. ISC 2003: 84-95 - [c7]Michael Backes, Matthias Schunter:
From absence of certain vulnerabilities towards security proofs: pushing the limits of formal verification. NSPW 2003: 67-74 - [c6]Michael Backes, Christian Cachin, Reto Strobl:
Proactive secure message transmission in asynchronous networks. PODC 2003: 223-232 - [c5]Michael Backes, Birgit Pfitzmann:
Intransitive Non-Interference for Cryptographic Purpose. S&P 2003: 140- - [c4]Michael Backes, Christian Jacobi:
Cryptographically Sound and Machine-Assisted Verification of Security Protocols. STACS 2003: 675-686 - [e1]Michael Backes, David A. Basin:
Proceedings of the 2003 ACM workshop on Formal methods in security engineering, FMSE 2003, Washington, DC, USA, October 30, 2003. ACM 2003, ISBN 1-58113-781-8 [contents] - [i6]Michael Backes, Birgit Pfitzmann, Michael Waidner:
A Universally Composable Cryptographic Library. IACR Cryptol. ePrint Arch. 2003: 15 (2003) - [i5]Michael Backes:
Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions. IACR Cryptol. ePrint Arch. 2003: 114 (2003) - [i4]Michael Backes, Birgit Pfitzmann:
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol. IACR Cryptol. ePrint Arch. 2003: 121 (2003) - [i3]Michael Backes, Birgit Pfitzmann, Michael Waidner:
Symmetric Authentication Within a Simulatable Cryptographic Library. IACR Cryptol. ePrint Arch. 2003: 145 (2003) - [i2]Michael Backes, Christian Cachin:
Public-Key Steganography with Active Attacks. IACR Cryptol. ePrint Arch. 2003: 231 (2003) - [i1]Michael Backes, Dennis Hofheinz:
How to Break and Repair a Universally Composable Signature Functionality. IACR Cryptol. ePrint Arch. 2003: 240 (2003) - 2002
- [c3]Michael Backes, Birgit Pfitzmann, Michael Steiner, Michael Waidner
:
Polynomial Fairness and Liveness. CSFW 2002: 160-174 - [c2]Michael Backes, Birgit Pfitzmann:
Computational Probabilistic Non-interference. ESORICS 2002: 1-23 - [c1]Michael Backes, Christian Jacobi, Birgit Pfitzmann:
Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation. FME 2002: 310-329
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-15 22:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint