Dr. Zinaida Benenson



Organisation


Lehrstuhl für Informatik 1 (IT-Sicherheitsinfrastrukturen)



Project lead


Komplexität der benutzerfreundlichen IT-Sicherheit
Dr. Zinaida Benenson
(01/01/2016 - 31/12/2016)

Developing and Applying a Sound Security Framework for Sensor Networks
Dr. Zinaida Benenson
(01/09/2014)

Entwicklung und Anwendung eines fundierten Rahmenwerkes für Sicherheit in Sensornetzen (WSNSec)
Dr. Zinaida Benenson
(01/09/2014 - 31/08/2017)


Project member


Discourses and Practices of a "Digital Sovereignty"
Prof. Dr. Georg Glasze
(01/03/2019 - 28/02/2021)

FORSEC: Bayrischer Forschungsverbund Sicherheit hochgradig vernetzter IT-Systeme (FORSEC)
Prof. Dr.-Ing. Felix Freiling
(01/09/2013 - 31/08/2017)

Open Competence Center for Cyber Security (Open C3S)
Prof. Dr.-Ing. Felix Freiling
(01/10/2011)

Zuverlässige Informationsbereitstellung in energiebewussten ubiquitären Systemen (ZeuS)
Prof. Dr.-Ing. Felix Freiling
(01/01/2006 - 31/12/2009)


Publications (Download BibTeX)

Go to first page Go to previous page 1 of 6 Go to next page Go to last page

Morgner, P., Mai, C., Koschate-Fischer, N., Freiling, F., & Benenson, Z. (2020). Security Update Labels: Establishing Economic Incentives for Security Patching of IoT Consumer Products. (Unpublished, Accepted).
Schiller, J., Freiling, F., Benenson, Z., & Massonne, W. (2019). Berufsbegleitendes Studieren an Universitäten - Ein Zukunftsfeld für die IT-Sicherheit. Informatik-Spektrum, 42(1), 38-47. https://dx.doi.org/10.1007/s00287-019-01145-6
Gassmann, F., Benenson, Z., & Landwirth, R. (2019). Communication as a threat Users' reactions to email and Facebook messages with suspicious links. Österreichische Zeitschrift für Soziologie, 44, 135-155. https://dx.doi.org/10.1007/s11614-019-00351-6
Armknecht, F., Benenson, Z., Morgner, P., Müller, C., & Riess, C. (2019). Privacy implications of room climate data. Journal of Computer Security, 27(1), 113-136. https://dx.doi.org/10.3233/JCS-181133
Abdullah, L., Freiling, F., Quintero, J., & Benenson, Z. (2019). Sealed computation: Abstract requirements for mechanisms to support trustworthy cloud computing. In Frédéric Cuppens, Nora Cuppens, Christos Kalloniatis, Sokratis K. Katsikas, Costas Lambrinoudakis, John Mylopoulos, Annie Antón, Stefanos Gritzalis (Eds.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 137-152). Barcelona, ES: Springer Verlag.
Reinfelder, L., Landwirth, R., & Benenson, Z. (2019). Security Managers Are Not the Enemy Either. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. (pp. 1-7). ACM.
Reinfelder, L., Schankin, A., Russ, S., & Benenson, Z. (2018). An Inquiry into Perception and Usage of Smartphone Permission Models. In TrustBus Conference Proceedings. (pp. 1-14). Regensburg: DEXA.
Morgner, P., & Benenson, Z. (2018). Exploring Security Economics in IoT Standardization Efforts. In Proceedings 2018 NDSS Workshop on Decentralized IoT Security and Standards (DISS). San Diego, CA, USA.
Morgner, P., Pfennig, S., Salzner, D., & Benenson, Z. (2018). Malicious IoT Implants: Tampering with Serial Communication over the Internet. In Proceedings of the 21st International Symposium on Research in Attacks, Intrusions, and Defenses (RAID 2018) (pp. 535-555). Heraklion, Crete, Greece.
Morgner, P., Freiling, F., & Benenson, Z. (2018). Opinion: Security Lifetime Labels -- Overcoming Information Asymmetry in Security of IoT Consumer Products. In Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'18) (pp. 208-211). Stockholm, Sweden: Association for Computing Machinery, Inc.

Last updated on 2017-08-10 at 06:06