Michael Backes
Michael Backes
Chairman and Founding Director of the CISPA Helmholtz Center for Information Security
Verified email at cispa.saarland
Title
Cited by
Cited by
Year
Adversarial examples for malware detection
K Grosse, N Papernot, P Manoharan, M Backes, P McDaniel
European symposium on research in computer security, 62-79, 2017
533*2017
On the (statistical) detection of adversarial examples
K Grosse, P Manoharan, N Papernot, M Backes, P McDaniel
arXiv preprint arXiv:1702.06280, 2017
3642017
A composable cryptographic library with nested operations
M Backes, B Pfitzmann, M Waidner
Proceedings of the 10th ACM conference on Computer and communications …, 2003
3312003
Appguard–enforcing user requirements on android apps
M Backes, S Gerling, C Hammer, M Maffei, P von Styp-Rekowsky
International Conference on TOOLS and Algorithms for the Construction and …, 2013
294*2013
The reactive simulatability (RSIM) framework for asynchronous systems
M Backes, B Pfitzmann, M Waidner
Information and Computation 205 (12), 1685-1720, 2007
283*2007
Automatic discovery and quantification of information leaks
M Backes, B Köpf, A Rybalchenko
2009 30th IEEE Symposium on Security and Privacy, 141-153, 2009
2342009
Automated verification of remote electronic voting protocols in the applied pi-calculus
M Backes, C Hritcu, M Maffei
2008 21st IEEE Computer Security Foundations Symposium, 195-209, 2008
2332008
Reliable third-party library detection in android and its security applications
M Backes, S Bugiel, E Derr
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
2132016
Acoustic Side-Channel Attacks on Printers.
M Backes, M Dürmuth, S Gerling, M Pinkal, C Sporleder
USENIX Security symposium 10, 307-322, 2010
2102010
Verifiable delegation of computation on outsourced data
M Backes, D Fiore, RM Reischuk
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1932013
Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol
M Backes, M Maffei, D Unruh
2008 IEEE Symposium on Security and Privacy (sp 2008), 202-215, 2008
1922008
You can run but you can't read: Preventing disclosure exploits in executable code
M Backes, T Holz, B Kollenda, P Koppe, S Nürnberger, J Pewny
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1812014
Oxymoron: Making fine-grained memory randomization practical by allowing code sharing
M Backes, S Nürnberger
23rd {USENIX} Security Symposium ({USENIX} Security 14), 433-447, 2014
1802014
You get where you're looking for: The impact of information sources on code security
Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky
2016 IEEE Symposium on Security and Privacy (SP), 289-305, 2016
1762016
Symmetric encryption in a simulatable Dolev-Yao style cryptographic library
M Backes, B Pfitzmann
Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004., 204-218, 2004
1702004
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface
M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006
169*2006
Ml-leaks: Model and data independent membership inference attacks and defenses on machine learning models
A Salem, Y Zhang, M Humbert, P Berrang, M Fritz, M Backes
arXiv preprint arXiv:1806.01246, 2018
1652018
Efficient comparison of enterprise privacy policies
M Backes, G Karjoth, W Bagga, M Schunter
Proceedings of the 2004 ACM symposium on Applied computing, 375-382, 2004
1522004
Comparing the usability of cryptographic apis
Y Acar, M Backes, S Fahl, S Garfinkel, D Kim, ML Mazurek, C Stransky
2017 IEEE Symposium on Security and Privacy (SP), 154-171, 2017
1442017
A Universally Composable Cryptographic Library.
M Backes, B Pfitzmann, M Waidner
IACR Cryptol. ePrint Arch. 2003, 15, 2003
1442003
The system can't perform the operation now. Try again later.
Articles 1–20