Alexandra Dmitrienko

Orcid: 0000-0001-5637-7016

Affiliations:
  • University of Würzburg, Institute of Computer Science, Germany


According to our database1, Alexandra Dmitrienko authored at least 76 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges.
IEEE Trans. Emerg. Top. Comput., 2024

SPOQchain: Platform for Secure, Scalable, and Privacy-Preserving Supply Chain Tracing and Counterfeit Protection.
CoRR, 2024

Time-Aware Face Anti-Spoofing with Rotation Invariant Local Binary Patterns and Deep Learning.
CoRR, 2024

DNNShield: Embedding Identifiers for Deep Neural Network Ownership Verification.
CoRR, 2024

ClearStamp: A Human-Visible and Robust Model-Ownership Proof based on Transposed Model Training.
Proceedings of the 33rd USENIX Security Symposium, 2024

Verify your Labels! Trustworthy Predictions and Datasets via Confidence Scores.
Proceedings of the 33rd USENIX Security Symposium, 2024

Large-Scale Study of Vulnerability Scanners for Ethereum Smart Contracts.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

MirageFlow: A New Bandwidth Inflation Attack on Tor.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

CrowdGuard: Federated Backdoor Detection in Federated Learning.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Automatic Adversarial Adaption for Stealthy Poisoning Attacks in Federated Learning.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated Learning.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Triple-S: Security Scoring System for loT Devices.
Proceedings of the IEEE International Conference on Omni-layer Intelligent Systems, 2024

Cloud-Based Machine Learning Models as Covert Communication Channels.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

Federated Learning Security: From Dusk to Dawn.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations.
ACM Trans. Priv. Secur., 2023

Vulnerability Scanners for Ethereum Smart Contracts: A Large-Scale Study.
CoRR, 2023

ClearMark: Intuitive and Robust Model Watermarking via Transposed Model Training.
CoRR, 2023

TorMult: Introducing a Novel Tor Bandwidth Inflation Attack.
CoRR, 2023

G-Scan: Graph Neural Networks for Line-Level Vulnerability Identification in Smart Contracts.
CoRR, 2023

Metadata-based Malware Detection on Android using Machine Learning.
CoRR, 2023

Avoid Adversarial Adaption in Federated Learning by Multi-Metric Investigations.
CoRR, 2023

Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Security of NVMe Offloaded Data in Large-Scale Machine Learning.
Proceedings of the Computer Security - ESORICS 2023, 2023

MESAS: Poisoning Defense for Federated Learning Resilient against Adaptive Attackers.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Close the Gate: Detecting Backdoored Models in Federated Learning based on Client-Side Deep Layer Output Analysis.
CoRR, 2022

A Survey on Secure Group Communication Schemes With Focus on IoT Communication.
IEEE Access, 2022

An Experience Report on the Suitability of a Distributed Group Encryption Scheme for an IoT Use Case.
Proceedings of the 95th IEEE Vehicular Technology Conference, 2022

SCRAPS: Scalable Collective Remote Attestation for Pub-Sub IoT Networks with Untrusted Proxy Verifier.
Proceedings of the 31st USENIX Security Symposium, 2022

FedCRI: Federated Mobile Cyber-Risk Intelligence.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Ransomware Detection in Databases through Dynamic Analysis of Query Sequences.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

Towards a Cryptography Benchmark: A View on Attribute Based Encryption Schemes.
Proceedings of the 5th Conference on Cloud and Internet of Things, 2022

2021
ESCORT: Ethereum Smart COntRacTs Vulnerability Detection using Deep Neural Network and Transfer Learning.
CoRR, 2021

Towards a Group Encryption Scheme Benchmark: A View on Centralized Schemes with Focus on IoT.
Proceedings of the ICPE '21: ACM/SPEC International Conference on Performance Engineering, 2021

RIP StrandHogg: a practical StrandHogg attack detection method on Android.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

Performance Evaluation for a Post-Quantum Public-Key Cryptosystem.
Proceedings of the IEEE International Performance, 2021

Benchmarking of Pre- and Post-Quantum Group Encryption Schemes with Focus on IoT.
Proceedings of the IEEE International Performance, 2021

2020
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers.
IACR Cryptol. ePrint Arch., 2020

Mind the GAP: Security & Privacy Risks of Contact Tracing Apps.
CoRR, 2020


Evaluating the Performance of a State-of-the-Art Group-oriented Encryption Scheme for Dynamic Groups in an IoT Scenario.
Proceedings of the 28th International Symposium on Modeling, 2020

LegIoT: Ledgered Trust Management Platform for IoT.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
Hands Off my Database: Ransomware Detection in Databases through Dynamic Analysis of Query Sequences.
CoRR, 2019

DR.SGX: automated and adjustable side-channel protection for SGX using data location randomization.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
SmarTor: Smarter Tor with Smart Contracts: Improving resilience of topology distribution in the Tor network.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Phonion: Practical Protection of Metadata in Telephony Networks.
Proc. Priv. Enhancing Technol., 2017

μchain: How to Forget without Hard Forks.
IACR Cryptol. ePrint Arch., 2017

DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization.
CoRR, 2017

Software Grand Exposure: SGX Cache Attacks Are Practical.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

Secure Free-Floating Car Sharing for Offline Cars.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

Secure Wallet-Assisted Offline Bitcoin Payments with Double-Spender Revocation.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2015
Security and privacy aspects of mobile platforms and applications.
PhD thesis, 2015

Market-Driven Code Provisioning to Mobile Secure Hardware.
Proceedings of the Financial Cryptography and Data Security, 2015

2014
On Offline Payments with Bitcoin (Poster Abstract).
Proceedings of the Financial Cryptography and Data Security, 2014

On the (In)Security of Mobile Two-Factor Authentication.
Proceedings of the Financial Cryptography and Data Security, 2014

2013
Mobile Platform Security
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02341-5, 2013

Do I know you? - Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications.
IACR Cryptol. ePrint Arch., 2013

Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Smart keys for cyber-cars: secure smartphone-based NFC-enabled car immobilizer.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARM.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

CrowdShare: Secure Mobile Resource Sharing.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
SmartTokens: Delegable Access Control with NFC-enabled Smartphones (Full Version).
IACR Cryptol. ePrint Arch., 2012

SmartTokens: Delegable Access Control with NFC-Enabled Smartphones.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012

MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Towards Taming Privilege-Escalation Attacks on Android.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

2011
Trusted virtual domains on OKL4: secure information sharing on smartphones.
Proceedings of the sixth ACM workshop on Scalable trusted computing, 2011

Poster: control-flow integrity for smartphones.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Practical and lightweight domain isolation on Android.
Proceedings of the SPSM'11, 2011

Poster: the quest for security against privilege escalation attacks on android.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

A Security Architecture for Accessing Health Records on Mobile Phones.
Proceedings of the HEALTHINF 2011, 2011

Securing the Access to Electronic Health Records on Mobile Phones.
Proceedings of the Biomedical Engineering Systems and Technologies, 2011

2010
Key Attestation from Trusted Execution Environments.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

Privilege Escalation Attacks on Android.
Proceedings of the Information Security - 13th International Conference, 2010

TruWalletM: Secure Web Authentication on Mobile Platforms.
Proceedings of the Trusted Systems - Second International Conference, 2010

Return-oriented programming without returns.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Trusted Virtual Domains - Design, Implementation and Lessons Learned.
Proceedings of the Trusted Systems, First International Conference, 2009


  Loading...