Lehrstuhl für Informatik 1 (IT-Sicherheitsinfrastrukturen)


The research lab Computer Science 1 performs research in many areas of applied IT security (fundamental and systems research).

The research lab was established in 2010 and consists of a small set of more focussed research groups lead by postdoctoral researchers or professors.

Martensstraße 3
91058 Erlangen

Related Project(s)

Go to first page Go to previous page 1 of 5 Go to next page Go to last page

FIDI: Verbundvorhaben „Intelligente Datenanalyse für die IT-Forensik“ Teilprojekt „Erstellung und Extraktion von digitalen Spuren auf Android und Windows Geräten“
Prof. Dr.-Ing. Felix Freiling
(01/02/2018 - 31/01/2021)

Softwarebasierte Härtungsmaßnahmen für mobile Applikationen: Softwarebasierte Härtungsmaßnahmen für mobile Applikationen
Prof. Dr.-Ing. Felix Freiling; Prof. Dr. Dirk Riehle
(01/11/2016 - 31/10/2019)

(Detektion maliziöser Systemzustände, Visualisierung, forensische Aufbereitung und Meldung von Sicherheitsvorfällen):
DINGFEST: FAITH Forensic Analysis In The Hypervisor
Prof. Dr.-Ing. Felix Freiling
(01/06/2016 - 31/05/2019)

DISPARITY: Digital, Semantic and Physical Analysis of Media Integrity
Prof. Dr.-Ing. Andreas Maier; Dr.-Ing. Christian Riess
(24/05/2016 - 23/05/2017)

Bildforensik: Analyse der digitalen Integrität von Bildern und Videos
Dr.-Ing. Christian Riess; Prof. Dr. Marc Stamminger

Publications (Download BibTeX)

Go to first page Go to previous page 1 of 11 Go to next page Go to last page

Morgner, P., Mai, C., Koschate-Fischer, N., Freiling, F., & Benenson, Z. (2020). Security Update Labels: Establishing Economic Incentives for Security Patching of IoT Consumer Products. (Unpublished, Accepted).
Bopp, J., Ludwig, V., Seifert, M., Pelzer, G., Maier, A., Anton, G., & Riess, C. (2019). Simulation study on X-ray phase contrast imaging with dual-phase gratings. International Journal of Computer Assisted Radiology and Surgery, 14(1), 3-10. https://dx.doi.org/10.1007/s11548-018-1872-x
Armknecht, F., Benenson, Z., Morgner, P., Müller, C., & Riess, C. (2019). Privacy implications of room climate data. Journal of Computer Security, 27(1), 113-136. https://dx.doi.org/10.3233/JCS-181133
Haupert, V., & Gabert, S. (2019). Where to Look for What You See Is What You Sign? User Confusion in Transaction Security. In 24th European Symposium on Research in Computer Security. Luxemburg, LU: Cham, Switzerland: Springer International Publishing.
Lorch, B., & Riess, C. (2019). Image Forensics from Chroma Subsampling of High-Quality JPEG Images. In Proceedings of the ACM Workshop on Information Hiding and Multimedia Security. Paris, FR.
Gassmann, F., Benenson, Z., & Landwirth, R. (2019). Communication as a threat Users' reactions to email and Facebook messages with suspicious links. Österreichische Zeitschrift für Soziologie, 44, 135-155. https://dx.doi.org/10.1007/s11614-019-00351-6
Felsner, L., Hu, S., Maier, A., Bopp, J., Ludwig, V., Anton, G., & Riess, C. (2019). A 3-D Projection Model for X-ray Dark-field Imaging. Scientific Reports, 9.
Watson, V., Bajramovic, E., Bejiga, M., & Waedt, K. (2019). Designing Trustworthy Monitoring Systems: Forensic Readiness for Safety and Security. In Proceedings - 12th International Conference on Reliability, Maintainability, and Safety, ICRMS 2018 (pp. 155-160). Shanghai, CN: Institute of Electrical and Electronics Engineers Inc..
Hadwiger, B., Baracchi, D., Piva, A., & Riess, C. (2019). Towards learned color representations for image splicing detection. In 2019 IEEE International Conference on Acoustics, Speech, and Signal Processing Proceedings. Brighton, GB.
Reinfelder, L., Landwirth, R., & Benenson, Z. (2019). Security Managers Are Not the Enemy Either. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. (pp. 1-7). ACM.
Mullan, P., Riess, C., & Freiling, F. (2019). Forensic source identification using JPEG image headers: The case of smartphones. Digital Investigation, 28, S68-S76. https://dx.doi.org/10.1016/j.diin.2019.01.016
Mullan, P., Rieß, C., & Freiling, F. (2019). Forensic Source Identification using JPEG Image Headers: The Case of Smartphones. In Digital Investigation. Oslo, NO.
Bove, D., & Kalysch, A. (2019). In pursuit of a secure UI: The cycle of breaking and fixing Android’s UI. it - Information Technology, Methods and Applications of Informatics and Information Technology. https://dx.doi.org/10.1515/itit-2018-0023
Felsner, L., Hu, S., Ludwig, V., Anton, G., Maier, A., & Rieß, C. (2019). On the Characteristics of Helical 3-D X-ray Dark-field Imaging. In Proceedings of the Bildverarbeitung für die Medizin (BVM 2019) (pp. 264-269). Lübeck.
Schiller, J., Freiling, F., Benenson, Z., & Massonne, W. (2019). Berufsbegleitendes Studieren an Universitäten - Ein Zukunftsfeld für die IT-Sicherheit. Informatik-Spektrum, 42(1), 38-47. https://dx.doi.org/10.1007/s00287-019-01145-6
Lorch, B., Agarwal, S., & Farid, H. (2019). Forensic Reconstruction of Severely Degraded License Plates. In Society for Imaging Science & Technology (Eds.), Electronic Imaging. Burlingame, CA, US.
Matern, F., Riess, C., & Stamminger, M. (2019). Exploiting Visual Artifacts to Expose Deepfakes and Face Manipulations. In IEEE Workshop on Applications in Computer Vision (pp. 83-92). Waikoloa Village, HI, US: IEEE.
Morgner, P. (2019). Security and Privacy in the Internet of Things: Technical and Economic Perspectives (Dissertation).
Abdullah, L., Freiling, F., Quintero, J., & Benenson, Z. (2019). Sealed computation: Abstract requirements for mechanisms to support trustworthy cloud computing. In Frédéric Cuppens, Nora Cuppens, Christos Kalloniatis, Sokratis K. Katsikas, Costas Lambrinoudakis, John Mylopoulos, Annie Antón, Stefanos Gritzalis (Eds.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 137-152). Barcelona, ES: Springer Verlag.

Last updated on 2019-24-04 at 10:22