BibTeX records: Sebastian Gerling

download as .bib file

@inproceedings{DBLP:conf/gi/BiemannBGLS23,
  author       = {Chris Biemann and
                  Tilo B{\"{o}}hmann and
                  Sebastian Gerling and
                  Jan Louis and
                  Martin Semmann},
  editor       = {Maike Klein and
                  Daniel Krupka and
                  Cornelia Winter and
                  Volker Wohlgemuth},
  title        = {Das Konzept des House of Computing and Data Science als Blaupause
                  zur Digitalisierung der Forschung},
  booktitle    = {53. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, {INFORMATIK}
                  2023, Designing Future - Zuk{\"{u}}nfte gestalten, Berlin, Germany
                  September 26-29, 2023},
  series       = {{LNI}},
  volume       = {{P-337}},
  pages        = {123--128},
  publisher    = {Gesellschaft f{\"{u}}r Informatik, Bonn},
  year         = {2023},
  url          = {https://doi.org/10.18420/inf2023\_11},
  doi          = {10.18420/INF2023\_11},
  timestamp    = {Fri, 08 Mar 2024 15:16:29 +0100},
  biburl       = {https://dblp.org/rec/conf/gi/BiemannBGLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GerlingGHP20,
  author       = {Rainer W. Gerling and
                  Sebastian Gerling and
                  Stefan Hessel and
                  Ronald Petrlic},
  title        = {Stand der Technik bei Videokonferenzen - und die Interpretation der
                  Aufsichtsbeh{\"{o}}rden},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {11},
  pages        = {740--747},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1359-0},
  doi          = {10.1007/S11623-020-1359-0},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GerlingGHP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GerlingR16,
  author       = {Sebastian Gerling and
                  Christian Rossow},
  title        = {Angreiferjagd im "Internet der Dinge"},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {40},
  number       = {8},
  pages        = {507--510},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11623-016-0647-1},
  doi          = {10.1007/S11623-016-0647-1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GerlingR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0001BDG016,
  author       = {Michael Backes and
                  Sven Bugiel and
                  Erik Derr and
                  Sebastian Gerling and
                  Christian Hammer},
  editor       = {Xiaofeng Chen and
                  XiaoFeng Wang and
                  Xinyi Huang},
  title        = {R-Droid: Leveraging Android App Analysis with Static Slice Optimization},
  booktitle    = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016},
  pages        = {129--140},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897845.2897927},
  doi          = {10.1145/2897845.2897927},
  timestamp    = {Mon, 25 Apr 2022 08:42:03 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/0001BDG016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Gerling14,
  author       = {Sebastian Gerling},
  title        = {Plugging in trust and privacy: three systems to improve widely used
                  ecosystems},
  school       = {Saarland University},
  year         = {2014},
  url          = {http://scidok.sulb.uni-saarland.de/volltexte/2014/5961/},
  urn          = {urn:nbn:de:bsz:291-scidok-59617},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Gerling14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BackesGGNSS14,
  author       = {Michael Backes and
                  Rainer W. Gerling and
                  Sebastian Gerling and
                  Stefan N{\"{u}}rnberger and
                  Dominique Schr{\"{o}}der and
                  Mark Simkin},
  editor       = {Ioana Boureanu and
                  Philippe Owesarski and
                  Serge Vaudenay},
  title        = {WebTrust - {A} Comprehensive Authenticity and Integrity Framework
                  for {HTTP}},
  booktitle    = {Applied Cryptography and Network Security - 12th International Conference,
                  {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8479},
  pages        = {401--418},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07536-5\_24},
  doi          = {10.1007/978-3-319-07536-5\_24},
  timestamp    = {Mon, 26 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BackesGGNSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BackesBG14,
  author       = {Michael Backes and
                  Sven Bugiel and
                  Sebastian Gerling},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Scippa: system-centric {IPC} provenance on Android},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {36--45},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664264},
  doi          = {10.1145/2664243.2664264},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/BackesBG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BackesBGS14,
  author       = {Michael Backes and
                  Sven Bugiel and
                  Sebastian Gerling and
                  Philipp von Styp{-}Rekowsky},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Android security framework: extensible multi-layered access control
                  on Android},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {46--55},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664265},
  doi          = {10.1145/2664243.2664265},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/BackesBGS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/BackesGLL14,
  author       = {Michael Backes and
                  Sebastian Gerling and
                  Stefan Lorenz and
                  Stephan Lukas},
  editor       = {Yookun Cho and
                  Sung Y. Shin and
                  Sang{-}Wook Kim and
                  Chih{-}Cheng Hung and
                  Jiman Hong},
  title        = {X-pire 2.0: a user-controlled expiration date and copy protection
                  mechanism},
  booktitle    = {Symposium on Applied Computing, {SAC} 2014, Gyeongju, Republic of
                  Korea - March 24 - 28, 2014},
  pages        = {1633--1640},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2554850.2554856},
  doi          = {10.1145/2554850.2554856},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/BackesGLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BackesBGS14,
  author       = {Michael Backes and
                  Sven Bugiel and
                  Sebastian Gerling and
                  Philipp von Styp{-}Rekowsky},
  title        = {Android Security Framework: Enabling Generic and Extensible Access
                  Control on Android},
  journal      = {CoRR},
  volume       = {abs/1404.1395},
  year         = {2014},
  url          = {http://arxiv.org/abs/1404.1395},
  eprinttype    = {arXiv},
  eprint       = {1404.1395},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BackesBGS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GerlingG13,
  author       = {Sebastian Gerling and
                  Rainer W. Gerling},
  title        = {Wie realistisch ist ein "Recht auf Vergessenwerden"?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {7},
  pages        = {445--446},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0175-1},
  doi          = {10.1007/S11623-013-0175-1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GerlingG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BackesGHMS13,
  author       = {Michael Backes and
                  Sebastian Gerling and
                  Christian Hammer and
                  Matteo Maffei and
                  Philipp von Styp{-}Rekowsky},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Georgios V. Lioudakis and
                  Nora Cuppens{-}Boulahia and
                  Simon N. Foley and
                  William M. Fitzgerald},
  title        = {AppGuard - Fine-Grained Policy Enforcement for Untrusted Android Applications},
  booktitle    = {Data Privacy Management and Autonomous Spontaneous Security - 8th
                  International Workshop, {DPM} 2013, and 6th International Workshop,
                  {SETOP} 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8247},
  pages        = {213--231},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-54568-9\_14},
  doi          = {10.1007/978-3-642-54568-9\_14},
  timestamp    = {Sun, 25 Oct 2020 22:34:56 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/BackesGHMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/Styp-RekowskyGBH13,
  author       = {Philipp von Styp{-}Rekowsky and
                  Sebastian Gerling and
                  Michael Backes and
                  Christian Hammer},
  editor       = {Jan J{\"{u}}rjens and
                  Benjamin Livshits and
                  Riccardo Scandariato},
  title        = {Idea: Callee-Site Rewriting of Sealed System Libraries},
  booktitle    = {Engineering Secure Software and Systems - 5th International Symposium,
                  ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7781},
  pages        = {33--41},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36563-8\_3},
  doi          = {10.1007/978-3-642-36563-8\_3},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/essos/Styp-RekowskyGBH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacas/BackesGHMS13,
  author       = {Michael Backes and
                  Sebastian Gerling and
                  Christian Hammer and
                  Matteo Maffei and
                  Philipp von Styp{-}Rekowsky},
  editor       = {Nir Piterman and
                  Scott A. Smolka},
  title        = {AppGuard - Enforcing User Requirements on Android Apps},
  booktitle    = {Tools and Algorithms for the Construction and Analysis of Systems
                  - 19th International Conference, {TACAS} 2013, Held as Part of the
                  European Joint Conferences on Theory and Practice of Software, {ETAPS}
                  2013, Rome, Italy, March 16-24, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7795},
  pages        = {543--548},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36742-7\_39},
  doi          = {10.1007/978-3-642-36742-7\_39},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/tacas/BackesGHMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DudevGP13,
  author       = {Minko Dudev and
                  Sebastian Gerling and
                  Philip Peter},
  title        = {{SAHER:} Secure and Efficient Routing in Sensor Networks},
  journal      = {CoRR},
  volume       = {abs/1307.0049},
  year         = {2013},
  url          = {http://arxiv.org/abs/1307.0049},
  eprinttype    = {arXiv},
  eprint       = {1307.0049},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/DudevGP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1106-4184,
  author       = {Michael Backes and
                  Sebastian Gerling and
                  Philipp von Styp{-}Rekowsky},
  title        = {A Novel Attack against Android Phones},
  journal      = {CoRR},
  volume       = {abs/1106.4184},
  year         = {2011},
  url          = {http://arxiv.org/abs/1106.4184},
  eprinttype    = {arXiv},
  eprint       = {1106.4184},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1106-4184.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1112-2649,
  author       = {Julian Backes and
                  Michael Backes and
                  Markus D{\"{u}}rmuth and
                  Sebastian Gerling and
                  Stefan Lorenz},
  title        = {X-pire! - {A} digital expiration date for images in social networks},
  journal      = {CoRR},
  volume       = {abs/1112.2649},
  year         = {2011},
  url          = {http://arxiv.org/abs/1112.2649},
  eprinttype    = {arXiv},
  eprint       = {1112.2649},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1112-2649.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BackesDGPS10,
  author       = {Michael Backes and
                  Markus D{\"{u}}rmuth and
                  Sebastian Gerling and
                  Manfred Pinkal and
                  Caroline Sporleder},
  title        = {Acoustic Side-Channel Attacks on Printers},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {307--322},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Backes.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BackesDGPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}