Michael Backes
#58,785
Most Influential Person Now
German computer scientist and mathematician
Michael Backes's AcademicInfluence.com Rankings
Michael Backescomputer-science Degrees
Computer Science
#2132
World Rank
#2215
Historical Rank
Operating Systems
#11
World Rank
#11
Historical Rank
Algorithms
#215
World Rank
#218
Historical Rank
Michael Backesmathematics Degrees
Mathematics
#5665
World Rank
#7965
Historical Rank
Measure Theory
#1312
World Rank
#1655
Historical Rank
Download Badge
Computer Science Mathematics
Michael Backes's Degrees
- PhD Computer Science Saarland University
Similar Degrees You Can Earn
Why Is Michael Backes Influential?
(Suggest an Edit or Addition)According to Wikipedia, Michael Backes is a German professor of computer science. He is the founding director and CEO of the CISPA Helmholtz Center for Information Security. He is known for his work on formal methods, cryptography and privacy-enhancing technologies.
Michael Backes's Published Works
Published Works
- On the (Statistical) Detection of Adversarial Examples (2017) (607)
- ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models (2018) (509)
- Adversarial Examples for Malware Detection (2017) (440)
- Adversarial Perturbations Against Deep Neural Networks for Malware Classification (2016) (358)
- Decentralized Privacy-Preserving Proximity Tracing (2020) (279)
- A composable cryptographic library with nested operations (2003) (262)
- Reliable Third-Party Library Detection in Android and its Security Applications (2016) (245)
- You Get Where You're Looking for: The Impact of Information Sources on Code Security (2016) (230)
- Automatic Discovery and Quantification of Information Leaks (2009) (215)
- MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples (2019) (202)
- Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security (2017) (197)
- Verifiable delegation of computation on outsourced data (2013) (192)
- Acoustic Side-Channel Attacks on Printers (2010) (187)
- Comparing the Usability of Cryptographic APIs (2017) (177)
- Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus (2008) (176)
- AppGuard - Enforcing User Requirements on Android Apps (2013) (164)
- Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing (2014) (155)
- Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol (2008) (154)
- You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code (2014) (154)
- Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings (2009) (152)
- A General Composition Theorem for Secure Reactive Systems (2004) (149)
- Dynamic Backdoor Attacks Against Machine Learning Models (2020) (138)
- Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning (2019) (137)
- Symmetric encryption in a simulatable Dolev-Yao style cryptographic library (2004) (134)
- Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android (2017) (123)
- Membership Privacy in MicroRNA-based Studies (2016) (122)
- The reactive simulatability (RSIM) framework for asynchronous systems (2007) (121)
- A Universally Composable Cryptographic Library (2003) (116)
- Boxify: Full-fledged App Sandboxing for Stock Android (2015) (113)
- Compromising Reflections-or-How to Read LCD Monitors around the Corner (2008) (113)
- ObliviAd: Provably Secure and Practical Online Behavioral Advertising (2012) (113)
- On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis (2016) (112)
- Efficient comparison of enterprise privacy policies (2004) (103)
- Fairwalk: Towards Fair Graph Embedding (2019) (102)
- A Toolkit for Managing Enterprise Privacy Policies (2003) (101)
- A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol (2003) (100)
- Tempest in a Teapot: Compromising Reflections Revisited (2009) (99)
- A Stitch in Time: Supporting Android Developers in WritingSecure Code (2017) (98)
- BadNL: Backdoor Attacks Against NLP Models (2020) (98)
- ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data (2015) (97)
- Public-Key Steganography with Active Attacks (2005) (96)
- walk2friends: Inferring Social Links from Mobility Profiles (2017) (93)
- Relating symbolic and cryptographic secrecy (2005) (92)
- AnoA: A Framework for Analyzing Anonymous Communication Protocols (2013) (91)
- SoK: Lessons Learned from Android Security Research for Appified Software Platforms (2016) (88)
- Differentially Private Smart Metering with Battery Recharging (2013) (85)
- How to Make ASLR Win the Clone Wars: Runtime Re-Randomization (2016) (84)
- Symmetric Authentication within a Simulatable Cryptographic Library (2003) (80)
- A Composable Cryptographic Library with Nested Operations (Extended Abstract) (2003) (79)
- Cryptographically Sound and Machine-Assisted Verification of Security Protocols (2003) (79)
- Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification (2016) (76)
- Secure Asynchronous Reactive Systems (2004) (69)
- Stealing Links from Graph Neural Networks (2020) (69)
- When Machine Unlearning Jeopardizes Privacy (2020) (68)
- MLCapsule: Guarded Offline Deployment of Machine Learning as a Service (2018) (68)
- Limits of the Cryptographic Realization of Dolev-Yao-Style XOR (2005) (68)
- Secure Key-Updating for Lazy Revocation (2006) (68)
- Intransitive non-interference for cryptographic purposes (2003) (68)
- Cryptographically sound theorem proving (2006) (67)
- Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario (2006) (64)
- Computational Verifiable Secret Sharing Revisited (2011) (63)
- Android security framework: extensible multi-layered access control on Android (2014) (62)
- A Security API for Distributed Social Networks (2011) (61)
- SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion (2016) (61)
- How to Break and Repair a Universally Composable Signature Functionality (2004) (58)
- A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol (2004) (57)
- Computational Probabilistic Non-interference (2002) (57)
- Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels (2018) (56)
- Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation (2002) (56)
- ARTist: The Android Runtime Instrumentation and Security Toolkit (2016) (56)
- Security in Business Process Engineering (2003) (56)
- Type-checking zero-knowledge (2008) (55)
- Provably Secure and Practical Onion Routing (2012) (54)
- BadNL: Backdoor Attacks against NLP Models with Semantic-preserving Improvements (2020) (54)
- A Survey on Routing in Anonymous Communication Protocols (2016) (54)
- Reliable broadcast in a computational hybrid model with Byzantine faults, crashes, and recoveries (2003) (53)
- Anonymous yet accountable access control (2005) (53)
- CoSP: a general framework for computational soundness proofs (2009) (52)
- Didn't You Hear Me? - Towards More Successful Web Vulnerability Notifications (2018) (52)
- Computationally sound verification of source code (2010) (52)
- AppGuard - Fine-Grained Policy Enforcement for Untrusted Android Applications (2013) (52)
- Key-dependent Message Security under Active Attacks--BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles (2007) (50)
- Compositional analysis of contract signing protocols (2005) (50)
- PrivSyn: Differentially Private Data Synthesis (2020) (50)
- Computationally sound secrecy proofs by mechanized flow analysis (2006) (49)
- Efficient and Flexible Discovery of PHP Application Vulnerabilities (2017) (49)
- (Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection (2014) (49)
- ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models (2021) (49)
- An Algebra for Composing Enterprise Privacy Policies (2004) (48)
- Cryptographically sound security proofs for basic and public-key Kerberos (2006) (48)
- Preventing Side-Channel Leaks in Web Traffic: A Formal Approach (2013) (48)
- HideNoSeek: Camouflaging Malicious JavaScript in Benign ASTs (2019) (47)
- Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication (2020) (47)
- CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable (2009) (46)
- How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security (2017) (44)
- Polynomial fairness and liveness (2002) (44)
- A cryptographically sound Dolev-Yao style security proof of an electronic payment system (2005) (44)
- Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying (2017) (43)
- Quantifying Probabilistic Information Flow in Computational Reactive Systems (2005) (43)
- Identifying the Scan and Attack Infrastructures Behind Amplification DDoS Attacks (2016) (42)
- JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript (2018) (41)
- The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators (2018) (41)
- Fidelius: Protecting User Secrets from Compromised Browsers (2018) (41)
- AppGuard — Real-time policy en- forcement for third-party applications (2012) (40)
- Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes (2006) (40)
- Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks (2008) (39)
- Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers (2008) (39)
- Studying the Impact of Managers on Password Strength and Reuse (2017) (38)
- What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions of JIT-ROP Defenses (2016) (38)
- Node-Level Membership Inference Attacks Against Graph Neural Networks (2021) (38)
- Speaker Recognition in Encrypted Voice Streams (2010) (38)
- Tagvisor: A Privacy Advisor for Sharing Hashtags (2018) (38)
- Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs (2017) (38)
- A Formal Language for Cryptographic Pseudocode (2008) (37)
- MBeacon: Privacy-Preserving Beacons for DNA Methylation Data (2019) (37)
- Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security & Privacy (2019) (37)
- Detecting Hardware-Assisted Virtualization (2016) (37)
- OAEP Is Secure under Key-Dependent Messages (2008) (36)
- Lazy revocation in cryptographic file systems (2005) (35)
- Scippa: system-centric IPC provenance on Android (2014) (35)
- Delegatable Functional Signatures (2016) (35)
- On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol (2006) (35)
- R-Droid: Leveraging Android App Analysis with Static Slice Optimization (2016) (34)
- Conditional reactive simulatability (2006) (34)
- Ring Signatures: Logarithmic-Size, No Setup - from Standard Assumptions (2019) (34)
- Asynchronous Computational VSS with Reduced Communication Complexity (2013) (32)
- Who Controls the Internet?: Analyzing Global Threats using Property Graph Traversals (2017) (30)
- Anonymous Webs of Trust (2010) (29)
- JStap: a static pre-filter for malicious JavaScript detection (2019) (29)
- Inference Attacks Against Graph Neural Networks (2021) (28)
- Union and Intersection Types for Secure Protocol Implementations (2011) (28)
- Stackelberg Planning: Towards Effective Leader-Follower State Space Search (2018) (27)
- Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles (2016) (27)
- RamCrypt: Kernel-based Address Space Encryption for User-mode Processes (2016) (27)
- The right to be forgotten- between expectations and practice (2013) (26)
- A calculus of challenges and responses (2007) (26)
- How Internet Resources Might Be Helping You Develop Faster but Less Securely (2017) (25)
- X-pire! - A digital expiration date for images in social networks (2011) (25)
- Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations (2014) (25)
- Reactively secure signature schemes (2003) (25)
- Key-dependent message security under active attacks - BRSIM/UC-soundness of Dolev-Yao-style encryption with key cycles (2008) (24)
- Causality-based Abstraction of Multiplicity in Security Protocols (2007) (24)
- The Limitations of Model Uncertainty in Adversarial Settings (2018) (24)
- Computational probabilistic noninterference (2004) (24)
- Verified Security of Merkle-Damgård (2012) (24)
- Data Lineage in Malicious Environments (2016) (23)
- Asynchronous MPC with a strict honest majority using non-equivocation (2014) (23)
- Linking Amplification DDoS Attacks to Booter Services (2017) (23)
- Computationally Sound Abstraction and Verification of Secure Multi-Party Computations (2010) (23)
- Computational soundness without protocol restrictions (2012) (22)
- On Profile Linkability despite Anonymity in Social Media Systems (2016) (22)
- Low-Level Ideal Signatures and General Integrity Idealization (2004) (22)
- BAAAN: Backdoor Attacks Against Autoencoder and GAN-Based Machine Learning Models (2020) (21)
- The ART of App Compartmentalization: Compiler-based Library Privilege Separation on Stock Android (2017) (21)
- Proactive secure message transmission in asynchronous networks (2003) (21)
- Automated Synthesis of Privacy-Preserving Distributed Applications (2011) (20)
- Tailoring the Dolev-Yao abstraction to web services realities (2005) (20)
- Achieving Security Despite Compromise Using Zero-knowledge (2009) (20)
- Don't Trigger Me! A Triggerless Backdoor Attack Against Deep Neural Networks (2020) (20)
- Unification in privacy policy evaluation - translating EPAL into Prolog (2004) (20)
- Identifying Personal DNA Methylation Profiles by Genotype Inference (2017) (20)
- Cryptographically sound analysis of security protocols (2002) (20)
- Automated Synthesis of Secure Distributed Applications (2012) (19)
- Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications (2021) (19)
- LUNA: Quantifying and Leveraging Uncertainty in Android Malware Analysis through Bayesian Machine Learning (2017) (19)
- Share First, Ask Later (or Never?) Studying Violations of GDPR's Explicit Consent in Android Apps (2021) (19)
- Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys (2018) (19)
- Ace: an efficient key-exchange protocol for onion routing (2012) (19)
- A Local Cross-Site Scripting Attack against Android Phones (2011) (18)
- A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and Its Application to Fair Exchange (2017) (18)
- Automated Verification of Accountability in Security Protocols (2018) (18)
- Unifying simulatability definitions in cryptographic systems under different timing assumptions (2003) (18)
- Simulated Penetration Testing and Mitigation Analysis (2017) (17)
- A Universally Composable Cryptographic Library with Nested Operations (2003) (17)
- Graph Unlearning (2021) (17)
- Privacy Analysis of Deep Learning in the Wild: Membership Inference Attacks against Transfer Learning (2020) (17)
- Android Security Framework: Enabling Generic and Extensible Access Control on Android (2014) (17)
- Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes (2006) (17)
- Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers (2017) (16)
- On the Necessity of Rewinding in Secure Multiparty Computation (2007) (16)
- Membership Privacy for Fully Dynamic Group Signatures (2019) (16)
- On fairness in simulatability-based cryptographic systems (2005) (16)
- Efficient Cryptographic Password Hardening Services from Partially Oblivious Commitments (2016) (16)
- Up-To-Crash: Evaluating Third-Party Library Updatability on Android (2019) (16)
- Simulating the Large-Scale Erosion of Genomic Privacy Over Time (2018) (15)
- On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography (2007) (15)
- Using mobile device communication to strengthen e-Voting protocols (2013) (15)
- On the Development and Formalization of an Extensible Code Generator for Real Life Security Protocols (2012) (15)
- SAFE extensibility of data-driven web applications (2012) (14)
- TUC: Time-Sensitive and Modular Analysis of Anonymous Communication (2014) (14)
- X-pire 2.0: a user-controlled expiration date and copy protection mechanism (2014) (14)
- A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web (2020) (14)
- Towards automated network mitigation analysis (2019) (13)
- From absence of certain vulnerabilities towards security proofs: pushing the limits of formal verification (2003) (13)
- Anonymous RAM (2016) (13)
- Lime: Data Lineage in the Malicious Environment (2014) (13)
- Diffusion-Based Image Compression in Steganography (2012) (13)
- Idea: Callee-Site Rewriting of Sealed System Libraries (2013) (12)
- Computational soundness of symbolic zero-knowledge proofs (2010) (12)
- Dissecting Privacy Risks in Biomedical Data (2018) (12)
- On the Feasibility of TTL-Based Filtering for DRDoS Mitigation (2016) (12)
- Non-uniform distributions in quantitative information-flow (2011) (12)
- Computational Soundness of Symbolic Zero-knowledge Proofs: Weaker Assumptions and Mechanized Verification (2013) (12)
- Towards Plausible Graph Anonymization (2017) (11)
- Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure (2018) (11)
- The CASPA Tool: Causality-Based Abstraction for Security Protocol Analysis (2008) (11)
- Auditing Membership Leakages of Multi-Exit Networks (2022) (11)
- Adding query privacy to robust DHTs (2011) (11)
- Symmetric authentication in a simulatable Dolev–Yao-style cryptographic library (2005) (11)
- DoubleX: Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale (2021) (10)
- Dachshund : Digging for and Securing Against ( Non-) Blinded Constants in JIT Code (2016) (10)
- Privacy-Preserving Similar Patient Queries for Combined Biomedical Data (2018) (10)
- Membership Inference Attacks Against Text-to-image Generation Models (2022) (10)
- Your Choice MATor(s) (2016) (10)
- Real-or-random Key Secrecy of the Otway-Rees Protocol via a Symbolic Security Proof (2006) (10)
- PRIMA: Privacy-Preserving Identity and Access Management at Internet-Scale (2016) (9)
- Type-checking Implementations of Protocols Based on Zero-knowledge Proofs – Work in Progress – (2009) (9)
- Anonymity and Censorship Resistance in Unstructured Overlay Networks (2009) (9)
- Computational Soundness Results for ProVerif - Bridging the Gap from Trace Properties to Uniformity (2014) (9)
- Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004 (2004) (9)
- Fully Secure Inner-Product Proxy Re-Encryption with Constant Size Ciphertext (2015) (9)
- Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information (2015) (9)
- G2C: Cryptographic Protocols from Goal-Driven Specifications (2011) (8)
- How Wrong Am I? - Studying Adversarial Examples and their Impact on Uncertainty in Gaussian Process Machine Learning Models (2017) (8)
- Signatures with Flexible Public Key: A Unified Approach to Privacy-Preserving Signatures (Full Version) (2018) (8)
- Dachshund: Digging for and Securing (Non-)Blinded Constants in JIT Code (2017) (8)
- Privacy-Preserving Accountable Computation (2013) (8)
- Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup (2019) (8)
- BackRef: Accountability in Anonymous Communication Networks (2014) (8)
- WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP (2014) (8)
- 12 Angry Developers - A Qualitative Study on Developers' Struggles with CSP (2021) (8)
- Limits of Constructive Security Proofs (2008) (8)
- Information Flow in the Peer-Reviewing Process (2007) (7)
- PriCL: Creating a Precedent, a Framework for Reasoning about Privacy Case Law (2015) (7)
- Your choice MATor(s) : large-scale quantitative anonymity assessment of Tor path selection algorithms against structural attacks (2015) (7)
- Adversarial Initialization - when your network performs the way I want (2019) (7)
- Operational Signature Schemes (2014) (7)
- A Cryptographically Sound Security Proof of the (2004) (7)
- Assessing the Impact of Script Gadgets on CSP at Scale (2020) (7)
- Anonymous and censorship resistant content sharing in unstructured overlays (2008) (6)
- Soundness Limits of Dolev-Yao Models (2006) (6)
- Membership Inference Against DNA Methylation Databases (2020) (6)
- Proceedings of the 11th international conference on Information Security (2005) (6)
- Polynomial liveness (2004) (6)
- Formal Methods and Cryptography (2006) (6)
- Explanation Beats Context: The Effect of Timing & Rationales on Users' Runtime Permission Decisions (2021) (6)
- Up2Dep: Android Tool Support to Fix Insecure Code Dependencies (2020) (6)
- Membership Inference Attacks by Exploiting Loss Trajectory (2022) (6)
- Automatically Verifying Typing Constraints for a Data Processing Language (2011) (6)
- Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image Encoders (2022) (5)
- RatFish: A File Sharing Protocol Provably Secure against Rational Users (2010) (5)
- Information Flow in the Peer-Reviewing Process (extended abstract) (2007) (5)
- POSTER: Towards Compiler-Assisted Taint Tracking on the Android Runtime (ART) (2015) (5)
- How to Wrap it up - A Formally Verified Proposal for the use of Authenticated Wrapping in PKCS#11 (2019) (5)
- On the Security Relevance of Initial Weights in Deep Neural Networks (2020) (5)
- Securing social networks (2011) (5)
- Seamless In-App Ad Blocking on Stock Android (2017) (5)
- PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov Model (2022) (5)
- Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources (2015) (5)
- How well do you blend into the crowd? - d-convergence: A novel paradigm for quantifying privacy in the age of Big-Data (2015) (5)
- Adversarial Attacks on Classifiers for Eye-based User Modelling (2020) (5)
- Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings (2006) (5)
- Symbolic Malleable Zero-Knowledge Proofs (2015) (4)
- Adversarial vulnerability bounds for Gaussian process classification (2019) (4)
- A Novel Attack against Android Phones (2011) (4)
- A Computationally Sound , Symbolic Abstraction for Malleable Zero-knowledge Proofs (2014) (4)
- Development of Secure Software with Security By Design (2014) (4)
- Implementation-level analysis of the JavaScript helios voting client (2016) (4)
- Accountability in Security Protocols (2018) (4)
- Causality & Control Flow (2019) (4)
- CTRL+Z: Recovering Anonymized Social Graphs (2017) (4)
- Why So Toxic?: Measuring and Triggering Toxic Behavior in Open-Domain Chatbots (2022) (4)
- Measuring User Perception for Detecting Unexpected Access to Sensitive Resource in Mobile Apps (2020) (4)
- Get a Model! Model Hijacking Attack Against Machine Learning Models (2021) (4)
- Taking Android app vetting to the next level with path-sensitive value analysis (2014) (3)
- Towards Good Practices in Evaluating Transfer Adversarial Attacks (2022) (3)
- Quantifying information flow in cryptographic systems (2014) (3)
- Computer Security - 2009, 14th European Symposium on Research in Computer Security (2009) (3)
- Freely Given Consent?: Studying Consent Notice of Third-Party Tracking and Its Violations of GDPR in Android Apps (2022) (3)
- Is FIDO 2 the Kingslayer of User Authentication ? A Comparative Usability Study of FIDO 2 Passwordless Authentication (3)
- Limits of the BRSIM/UC soundness of Dolev–Yao-style XOR (2008) (3)
- Industrial practitioners' mental models of adversarial machine learning (2022) (3)
- Backdoor smoothing: Demystifying backdoor attacks on deep neural networks (2020) (3)
- Everything About You: A Multimodal Approach towards Friendship Inference in Online Social Networks (2020) (3)
- Backdoor Attacks in the Supply Chain of Masked Image Modeling (2022) (3)
- UnGANable: Defending Against GAN-based Face Manipulation (2022) (3)
- Relating cryptography and formal methods: a panel (2003) (3)
- Reconciling Privacy and Utility in Continuous-Time Diffusion Networks (2017) (3)
- A11y and Privacy don't have to be mutually exclusive: Constraining Accessibility Service Misuse on Android (2021) (3)
- POSTER: Mapping the Landscape of Large-Scale Vulnerability Notifications (2016) (3)
- Cybersecurity Research: Challenges and Course of Action (2019) (3)
- Backdoor Attacks Against Dataset Distillation (2023) (3)
- A new measure for overfitting and its implications for backdooring of deep learning (2020) (2)
- Differential Indistinguishability for Cryptographic Primitives with Imperfect Randomness (2013) (2)
- Statically Detecting JavaScript Obfuscation and Minification Techniques in the Wild (2021) (2)
- Killing Four Birds with one Gaussian Process: Analyzing Test-Time Attack Vectors on Classification (2018) (2)
- Do winning tickets exist before DNN training? (2021) (2)
- Mental Models of Adversarial Machine Learning (2021) (2)
- Justifying a Dolev-Yao Model Under Active Attacks (2004) (2)
- Accountability in the Decentralised-Adversary Setting (2021) (2)
- Computational Soundness for Interactive Primitives (2015) (2)
- Highly Controlled, Fine-grained Delegation of Signing Capabilities (2013) (2)
- Introducing Accountability to Anonymity Networks (2013) (2)
- Enterprise Privacy Policies and Languages (2007) (2)
- How many winning tickets are there in one DNN? (2020) (2)
- On the security relevance of weights in deep learning. (2020) (2)
- Killing Four Birds with one Gaussian Process: The Relation between different Test-Time Attacks (2018) (2)
- Poster : Assessing the Effectiveness of Countermeasures Against Authorship Recognition (2015) (2)
- Poster : Forcing the Cloud to Forget by Attesting Data Deletion (2015) (2)
- Verifiable Security of Merkle-Damgård (2012) (1)
- Proceedings of the 14th European conference on Research in computer security (2009) (1)
- Asynchronous MPC with t (2013) (1)
- Non-determinism in multi-party computation (2006) (1)
- Towards Automated Network Mitigation Analysis (extended version) (2019) (1)
- Causality-based Abstraction of Multiplicity in Security Protocol Analysis (2007) (1)
- CASPA: Causality-based Abstraction for Security Protocol Analysis (2008) (1)
- M ay 2 01 9 Automated Verification of Accountability in Security Protocols (2019) (1)
- A framework for constructing Single Secret Leader Election from MPC (2022) (1)
- POSTER: In the Net of the Spider: Measuring the Anonymity-Impact of Network-level Adversaries Against Tor (2015) (1)
- Formal Verification of Consensus Algorithms in a Proof Assistant (2010) (1)
- Trollthrottle - Raising the Cost of Astroturfing (2020) (1)
- Towards Automated Network Mitigation Analysis (extended) (2017) (1)
- New Number-Theoretic Assumptions in Cryptography (in german) (2002) (1)
- Factorization of Univariate Polynomials (2002) (1)
- On the Privacy Risks of Cell-Based NAS Architectures (2022) (1)
- Data Poisoning Attacks Against Multimodal Encoders (2022) (1)
- Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages (2021) (1)
- Controlling my genome with my smartphone: first clinical experiences of the PROMISE system (2021) (1)
- Poster : RD ROID : In-depth Application Vetting for Android with Path-sensitive Value Analysis (2015) (1)
- Brief announcement: distributed cryptography using trinc (2012) (1)
- On the Security of Protocols with Logarithmic Communication Complexity (2007) (1)
- Conditional Reactive Simulatability, in Computer Security (2006) (1)
- Computational Soundness for Dalvik Bytecode (2016) (1)
- Design and Verification of Anonymous Trust Protocols (2009) (1)
- From Zoos to Safaris - From Closed-World Enforcement to Open-World Assessment of Privacy (2015) (1)
- Anonymity and Trust in Distributed Systems (2010) (1)
- Brief announcement: anonymity and trust in distributed systems (2010) (1)
- Providing Information by Resource- Constrained Data Analysis (2011) (1)
- MGTBench: Benchmarking Machine-Generated Text Detection (2023) (1)
- Technical Report : Unifying Formally Verified and Cryptographically Sound Proofs of Security Protocols ∗ (2015) (0)
- Report : Real-or-random Key Secrecy of the Otway-Rees Protocol via a Symbolic Security Proof ( Extended Version ) ∗ (2015) (0)
- Technical Report : A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol ( Long Version ) ∗ (2015) (0)
- Proconda - Protected Control Data (2019) (0)
- Herausforderungen des Internet of Things (2016) (0)
- 1978 ' B ' most prevalent Grades inflate (2010) (0)
- Pareto-optimal Defenses for the Web Infrastructure: Theory and Practice (2022) (0)
- Towards a Principled Approach for Dynamic Analysis of Android's Middleware (2021) (0)
- Proceedings of 3rd International Workshop on Security and Concurrency (SecCo), affiliated with CONCUR'05, San Francisco, CA (2005) (0)
- Technical Report : Cryptographic Key Secrecy of the Strengthened Yahalom Protocol via a Symbolic Security Proof ( Long Version ) ∗ (2015) (0)
- Securing User-data in Android A conceptual approach for consumer and enterprise usage (2012) (0)
- Technical Report – Computational Probabilistic Non-Interference ( Long Version ) ⋆ (2015) (0)
- Towards Ecological Validity for Password Alternative User Studies (2016) (0)
- Technical Report : A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System ( Long Version ) ∗ (2015) (0)
- Boxify: Bringing Full-Fledged App Sandboxing to Stock Android (2016) (0)
- On Epigenomic Privacy : Tracking Personal MicroRNA Expression Profiles over Time ( Extended Abstract ) (2016) (0)
- POSTER: The ART of App Compartmentalization (2016) (0)
- Differential Indistinguishability: Cryptography with Imperfect Randomness (2015) (0)
- Proceedings of 9th International Conference on Information Security (ISC), Samos Island, Greece (2006) (0)
- ERC Synergy Grant – White Paper imPACT – Privacy , Accountability , Compliance , and Trust in Tomorrow ’ s Internet (2015) (0)
- Technical Report: From Absence of Certain Vulnerabilities towards Security Proofs (2015) (0)
- Reactively Secure Signature Schemes ( Long Version ) ⋆ (2015) (0)
- Non-Determinism in Multi-Party Computation ( Abstract ) (2006) (0)
- ML-D octor : Holistic Risk Assessment of Inference Attacks Against Machine Learning Models (2021) (0)
- On the Evolution of (Hateful) Memes by Means of Multimodal Contrastive Learning (2022) (0)
- Poster : Full-fledged App Sandboxing for Stock Android (2015) (0)
- A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites (Extended Version) (2022) (0)
- On the Cryptographic (Un-)Soundness of Dolev-Yao Style Hash Functions (2005) (0)
- Technical Report : Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions ( Extended Journal Version ) ∗ (2015) (0)
- POSTER: When Laziness Snaps Back The Impact of Code Generators on App (In)Security (2016) (0)
- FACE-AUDITOR: Data Auditing in Facial Recognition Systems (2023) (0)
- Efficient lont-term Secure Universally Composable Commitments (2008) (0)
- Marcin Slowik Your Choice MATor ( s ) (2016) (0)
- Preface (2007) (0)
- Technical Report : Symmetric Authentication in a Simulatable Dolev-Yao-style Cryptographic Library ( Extended Version ) ∗ (2015) (0)
- Poster : On Demystifying the Android Application Framework : ReVisiting Android Permission Specification Analysis (2016) (0)
- Technical Report : Justifying a Dolev-Yao Model under Active Attacks ( Long Version ) ⋆ (2015) (0)
- Technical Report: Conditional Reactive Simulatability (Long Version) (2015) (0)
- In ChatGPT We Trust? Measuring and Characterizing the Reliability of ChatGPT (2023) (0)
- Poster: Membership Inference Against DNA Methylation Databases: Attacks and Defenses (2019) (0)
- ELF Optimizing Backend Compile Install Input Output dex code IR native code Transform Code Generation Optimization (2017) (0)
- Technical Report : Security in Business Process Engineering ⋆ (2015) (0)
- Rigor in Experimentation (2017) (0)
- AnoA : A Differential Anonymity Framework (2015) (0)
- Technical Report : Conditional Reactive Simulatability ⋆ (2015) (0)
- How well do you blend into the crowd? - d-convergence: Assessing identifiability and linkability in large-scale, open web settings (2015) (0)
- Planning in the Browser (2020) (0)
- : Intransitive Non-Interference for Cryp tographic Purposes ( Long Version ) (2015) (0)
- Technical Report : Quantifying Probabilistic Information Flow in Computational Reactive Systems ( Long Version ) (2015) (0)
- Accountability in Security Protocols ( preprint ) (2018) (0)
- FMSE'04 : proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering : Washington, DC, USA , October 29, 2004, co-located with CCS 2004 (2003) (0)
- Killing Three Birds with one Gaussian Process: Analyzing Attack Vectors on Classification (2018) (0)
- Android Security Lab Ws13/14 Project Proposals (2014) (0)
- Full Support for Reference Monitoring in Android ’ s Application Framework (2015) (0)
- Technical Report : A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol via a Symbolic Security Proof ( Long Version ) ∗ (2015) (0)
- Message from the Guest Editors (2014) (0)
- Proceedings of 1st ACM Workshop on Formal Methods in Security Engineering (FMSE) , affiliated with ACM CCS'03, Washington D.C. (2003) (0)
- Analyzing the Secure WS-ReliableMessaging Scenario in a Symbolically Sound Manner (Long Version) (2016) (0)
- Cybersecurity Research : Challenges and Course of Action secUnity-Roadmap on Cybersecurity Research (2019) (0)
- Speaker Recognition in Encrypted Voice-over-IP Traffic (2010) (0)
- Adversarial Examples and Metrics (2020) (0)
- Prompt Stealing Attacks Against Text-to-Image Generation Models (2023) (0)
- Session details: Applied cryptography I (2006) (0)
This paper list is powered by the following services:
Other Resources About Michael Backes
What Schools Are Affiliated With Michael Backes?
Michael Backes is affiliated with the following schools: