Acoustic {Side-Channel} attacks on printers M Backes, M Dürmuth, S Gerling, M Pinkal, C Sporleder 19th USENIX Security Symposium (USENIX Security 10), 2010 | 306 | 2010 |
Rethinking access control and authentication for the home internet of things ({{{{{IoT}}}}}) W He, M Golla, R Padhi, J Ofek, M Dürmuth, E Fernandes, B Ur 27th USENIX Security Symposium (USENIX Security 18), 255-272, 2018 | 297 | 2018 |
Quantifying the security of graphical passwords: The case of android unlock patterns S Uellenbeck, M Dürmuth, C Wolf, T Holz Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 294 | 2013 |
Adaptive password-strength meters from markov models. C Castelluccia, M Dürmuth, D Perito NDSS, 2012 | 265 | 2012 |
Compromising reflections-or-how to read LCD monitors around the corner M Backes, M Dürmuth, D Unruh 2008 IEEE Symposium on Security and Privacy (sp 2008), 158-169, 2008 | 179 | 2008 |
Who Are You? A Statistical Approach to Measuring User Authenticity. D Freeman, S Jain, M Dürmuth, B Biggio, G Giacinto NDSS 16, 21-24, 2016 | 160 | 2016 |
Tempest in a teapot: Compromising reflections revisited M Backes, T Chen, M Dürmuth, HPA Lensch, M Welk 2009 30th IEEE Symposium on Security and Privacy, 315-327, 2009 | 152 | 2009 |
A provably secure and efficient countermeasure against timing attacks B Köpf, M Dürmuth 2009 22nd IEEE Computer Security Foundations Symposium, 324-335, 2009 | 146 | 2009 |
OMEN: Faster password guessing using an ordered markov enumerator M Dürmuth, F Angelstorf, C Castelluccia, D Perito, A Chaabane Engineering Secure Software and Systems: 7th International Symposium, ESSoS …, 2015 | 144 | 2015 |
On the accuracy of password strength meters M Golla, M Dürmuth Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 123 | 2018 |
Apps against the spread: Privacy implications and user acceptance of COVID-19-related smartphone apps on three continents C Utz, S Becker, T Schnitzler, FM Farke, F Herbert, L Schaewitz, ... Proceedings of the 2021 chi conference on human factors in computing systems …, 2021 | 90 | 2021 |
" What was that site doing with my Facebook password?" Designing Password-Reuse Notifications M Golla, M Wei, J Hainline, L Filipe, M Dürmuth, E Redmiles, B Ur Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 86 | 2018 |
Is this really you? An empirical study on risk-based authentication applied in the wild S Wiefling, L Lo Iacono, M Dürmuth ICT Systems Security and Privacy Protection: 34th IFIP TC 11 International …, 2019 | 81 | 2019 |
This pin can be easily guessed: Analyzing the security of smartphone unlock pins P Markert, DV Bailey, M Golla, M Dürmuth, AJ Aviv 2020 IEEE Symposium on Security and Privacy (SP), 286-303, 2020 | 77 | 2020 |
An algebra for composing enterprise privacy policies M Backes, M Dürmuth, R Steinwandt Computer Security–ESORICS 2004: 9th European Symposium on Research in …, 2004 | 77 | 2004 |
When privacy meets security: Leveraging personal information for password cracking C Castelluccia, A Chaabane, M Dürmuth, D Perito arXiv preprint arXiv:1304.6584, 2013 | 70 | 2013 |
Deniable encryption with negligible detection probability: An interactive construction M Dürmuth, DM Freeman Advances in Cryptology–EUROCRYPT 2011: 30th Annual International Conference …, 2011 | 68 | 2011 |
Speaker recognition in encrypted voice streams M Backes, G Doychev, M Dürmuth, B Köpf Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010 | 68 | 2010 |
A cryptographically sound Dolev-Yao style security proof of an electronic payment system M Backes, M Durmuth 18th IEEE Computer Security Foundations Workshop (CSFW'05), 78-93, 2005 | 64 | 2005 |
{“You} still use the password after {all”}–Exploring {FIDO2} Security Keys in a Small Company FM Farke, L Lorenz, T Schnitzler, P Markert, M Dürmuth Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 19-35, 2020 | 61 | 2020 |