Michael Backes
Michael Backes
Chairman and Founding Director of the CISPA Helmholtz Center for Information Security, Saarland
Verified email at cispa.saarland
Title
Cited by
Cited by
Year
Adversarial examples for malware detection
K Grosse, N Papernot, P Manoharan, M Backes, P McDaniel
European Symposium on Research in Computer Security, 62-79, 2017
427*2017
A composable cryptographic library with nested operations
M Backes, B Pfitzmann, M Waidner
Proceedings of the 10th ACM conference on Computer and communications …, 2003
411*2003
On the (statistical) detection of adversarial examples
K Grosse, P Manoharan, N Papernot, M Backes, P McDaniel
arXiv preprint arXiv:1702.06280, 2017
2972017
The reactive simulatability (RSIM) framework for asynchronous systems
M Backes, B Pfitzmann, M Waidner
Information and Computation 205 (12), 1685-1720, 2007
297*2007
Appguard–enforcing user requirements on android apps
M Backes, S Gerling, C Hammer, M Maffei, P von Styp-Rekowsky
International Conference on TOOLS and Algorithms for the Construction and …, 2013
268*2013
Automated verification of remote electronic voting protocols in the applied pi-calculus
M Backes, C Hritcu, M Maffei
2008 21st IEEE Computer Security Foundations Symposium, 195-209, 2008
2272008
Automatic discovery and quantification of information leaks
M Backes, B Köpf, A Rybalchenko
2009 30th IEEE Symposium on Security and Privacy, 141-153, 2009
2182009
Acoustic Side-Channel Attacks on Printers.
M Backes, M Dürmuth, S Gerling, M Pinkal, C Sporleder
USENIX Security symposium, 307-322, 2010
1892010
Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol
M Backes, M Maffei, D Unruh
2008 IEEE Symposium on Security and Privacy (sp 2008), 202-215, 2008
1802008
Verifiable delegation of computation on outsourced data
M Backes, D Fiore, RM Reischuk
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1762013
Reliable third-party library detection in android and its security applications
M Backes, S Bugiel, E Derr
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1692016
You can run but you can't read: Preventing disclosure exploits in executable code
M Backes, T Holz, B Kollenda, P Koppe, S Nürnberger, J Pewny
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1692014
Oxymoron: Making fine-grained memory randomization practical by allowing code sharing
M Backes, S Nürnberger
23rd {USENIX} Security Symposium ({USENIX} Security 14), 433-447, 2014
1662014
Symmetric encryption in a simulatable Dolev-Yao style cryptographic library
M Backes, B Pfitzmann
Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004., 204-218, 2004
1592004
You get where you're looking for: The impact of information sources on code security
Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky
2016 IEEE Symposium on Security and Privacy (SP), 289-305, 2016
1492016
Efficient comparison of enterprise privacy policies
M Backes, G Karjoth, W Bagga, M Schunter
Proceedings of the 2004 ACM symposium on Applied computing, 375-382, 2004
1432004
A toolkit for managing enterprise privacy policies
M Backes, B Pfitzmann, M Schunter
European Symposium on Research in Computer Security, 162-180, 2003
1362003
Compromising reflections-or-how to read LCD monitors around the corner
M Backes, M Dürmuth, D Unruh
2008 IEEE Symposium on Security and Privacy (sp 2008), 158-169, 2008
1282008
Comparing the usability of cryptographic apis
Y Acar, M Backes, S Fahl, S Garfinkel, D Kim, ML Mazurek, C Stransky
2017 IEEE Symposium on Security and Privacy (SP), 154-171, 2017
1272017
Public-key steganography with active attacks
M Backes, C Cachin
Theory of Cryptography Conference, 210-226, 2005
1212005
The system can't perform the operation now. Try again later.
Articles 1–20