Michael Backes
Michael Backes
Chairman and Founding Director of the CISPA Helmholtz Center for Information Security, Saarland
Verified email at cispa.saarland
Title
Cited by
Cited by
Year
A composable cryptographic library with nested operations
M Backes, B Pfitzmann, M Waidner
Proceedings of the 10th ACM conference on Computer and communications …, 2003
414*2003
Adversarial examples for malware detection
K Grosse, N Papernot, P Manoharan, M Backes, P McDaniel
European Symposium on Research in Computer Security, 62-79, 2017
400*2017
The reactive simulatability (RSIM) framework for asynchronous systems
M Backes, B Pfitzmann, M Waidner
Information and Computation 205 (12), 1685-1720, 2007
296*2007
On the (statistical) detection of adversarial examples
K Grosse, P Manoharan, N Papernot, M Backes, P McDaniel
arXiv preprint arXiv:1702.06280, 2017
2682017
Appguard–enforcing user requirements on android apps
M Backes, S Gerling, C Hammer, M Maffei, P von Styp-Rekowsky
International Conference on TOOLS and Algorithms for the Construction and …, 2013
261*2013
Automated verification of remote electronic voting protocols in the applied pi-calculus
M Backes, C Hritcu, M Maffei
2008 21st IEEE Computer Security Foundations Symposium, 195-209, 2008
2252008
Automatic discovery and quantification of information leaks
M Backes, B Köpf, A Rybalchenko
2009 30th IEEE Symposium on Security and Privacy, 141-153, 2009
2182009
Acoustic Side-Channel Attacks on Printers.
M Backes, M Dürmuth, S Gerling, M Pinkal, C Sporleder
USENIX Security symposium, 307-322, 2010
1802010
Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol
M Backes, M Maffei, D Unruh
2008 IEEE Symposium on Security and Privacy (sp 2008), 202-215, 2008
1802008
Verifiable delegation of computation on outsourced data
M Backes, D Fiore, RM Reischuk
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1782013
Symmetric encryption in a simulatable Dolev-Yao style cryptographic library
M Backes, B Pfitzmann
Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004., 204-218, 2004
1642004
You can run but you can't read: Preventing disclosure exploits in executable code
M Backes, T Holz, B Kollenda, P Koppe, S Nürnberger, J Pewny
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1612014
Oxymoron: Making fine-grained memory randomization practical by allowing code sharing
M Backes, S Nürnberger
23rd {USENIX} Security Symposium ({USENIX} Security 14), 433-447, 2014
1572014
Reliable third-party library detection in android and its security applications
M Backes, S Bugiel, E Derr
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1562016
Efficient comparison of enterprise privacy policies
M Backes, G Karjoth, W Bagga, M Schunter
Proceedings of the 2004 ACM symposium on Applied computing, 375-382, 2004
1432004
You get where you're looking for: The impact of information sources on code security
Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky
2016 IEEE Symposium on Security and Privacy (SP), 289-305, 2016
1372016
A toolkit for managing enterprise privacy policies
M Backes, B Pfitzmann, M Schunter
European Symposium on Research in Computer Security, 162-180, 2003
1372003
Compromising reflections-or-how to read LCD monitors around the corner
M Backes, M Dürmuth, D Unruh
2008 IEEE Symposium on Security and Privacy (sp 2008), 158-169, 2008
1222008
Public-key steganography with active attacks
M Backes, C Cachin
Theory of Cryptography Conference, 210-226, 2005
1222005
Obliviad: Provably secure and practical online behavioral advertising
M Backes, A Kate, M Maffei, K Pecina
2012 IEEE Symposium on Security and Privacy, 257-271, 2012
1162012
The system can't perform the operation now. Try again later.
Articles 1–20