Personal tools

Georg Neugebauer

Research Interest:

  • Applied cryptography
  • Privacy and Privacy-enhancing technologies
  • Secure multi-party computation (SMC)
  • Malware analysis
  • Computational intelligence (CI)

Projects:

Publications:

  • G. Neugebauer, L. Brutschy, U. Meyer, S. Wetzel: Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model, Extended Version, Cryptology ePrintArchive: Report 2013/655, October 2013.
  • G. Neugebauer, L. Brutschy, U. Meyer, S. Wetzel: Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model, 8th ACM International Workshop on Data Privacy Management, ESORICS 2013, Egham, United Kingdom, September 2013
  • G. Neugebauer, U. Meyer, S. Wetzel: SMC-MuSe: A Framework for Secure Multi-Party Computation on MultiSets, short paper, poster session, 43th GI-LNI Informatik 2013, Koblenz, Germany, September 2013
  • F. Weingarten, G. Neugebauer, U. Meyer: Privacy-Preserving Multi-Party Reconciliation using Fully Homomorphic Encryption, 7th International Conference on Network and System Security (NSS 2013), LNCS, Madrid, Spain, June 2013
  • G. Neugebauer, L. Brutschy, U. Meyer, S. Wetzel: Design and Implementation of Privacy-Preserving Reconciliation Protocols, 6th ACM International Workshop on Privacy and Anonymity in the Information Society, EDBT/ICDT 2013, Genoa, Italy, March 2013
  • G. Neugebauer, U. Meyer: SMC-MuSe: A Framework for Secure Multi-Party Computation on MultiSets, RWTH Aachen University, Technical Report, AIB-2012-16, December 2012
  • D. Mayer, G. Neugebauer, U. Meyer, S. Wetzel: Enabling Fair and Privacy-Preserving Applications Using Reconciliation Protocols on Ordered Sets, 34rd IEEE Sarnoff Symposium, Princeton, May 2011
  • G. Neugebauer, U. Meyer, S. Wetzel: Fair and Privacy-Preserving Multi-Party Protocols for Reconciling Ordered Input Sets, Extended Version, Cryptology ePrintArchive: Report 2011/200, April 2011
  • G. Neugebauer: Towards a Fair and Privacy-Preserving Secure Multi-party Computation Network, 14. Kryptotag, March 2011
  • G. Neugebauer, U. Meyer, S. Wetzel: Fair and Privacy-Preserving Multi-Party Protocols for Reconciling Ordered Input Sets, 13th Information Security Conference (ISC), LNCS, vol. 6531, pp. 136-151, Springer-Verlag, October 2010
  • G. Neugebauer, Informationsreduktionsverfahren zur Konstruktion eingeschränkt verkettbarer Pseudonyme, TU Dortmund, Lehrstuhl VI, Informationssysteme und Sicherheit (ISSI), September 2009
  • N. Beume, T. Hein, B. Naujoks, G. Neugebauer, N. Piatkowski, M. Preuss, R. Stüer, A. Thom, To Model or Not to Model: Controlling Pac-Man Ghosts Without Incorporating Global Knowledge. Proc. 2008 Congress on Evolutionary Computation (CEC'08) within Fifth IEEE World Congress on Computational Intelligence (WCCI'08), 2008. IEEE Press.

 Talks:

  • Privatsphäre im Internet, Ringvorlesung Faszination Technik, RWTH Aachen, Aachen, January 2014
  • Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model, 8th ACM PAIS 2013, ESORICS 2013, Egham, UK, September 2013
  • Privacy-Preserving Multi-Party Reconciliation using Fully Homomorphic Encryption, 7th NSS 2013, LNCS, Madrid, Spain, June 2013
  • Design and Implementation of Privacy-Preserving Reconciliation Protocols, 6th PAIS 2013, EDBT/ICDT 2013, Genoa, Italy, March 2013
  • Privatsphäre im Internet, Ringvorlesung Faszination Technik, RWTH Aachen, Aachen, January 2012
  • Secure Web Applications, WZL, RWTH Aachen, Aachen, August 2011
  • Towards a Fair and Privacy-Preserving Secure Multi-party Computation Network, 14. Kryptotag, Bochum, March 2011
  • Fair and Privacy-Preserving Multi-Party Protocols for Reconciling Ordered Input Sets, 13th ISC, Boca Raton, Florida, Oktober 2010
  • Fair and Privacy-Preserving Multi-Party Protocols for Reconciling Ordered Input Sets (Extended Version), Kolleg Sicherheit, TU Dortmund, Dortmund, Oktober 2010
  • Privacy-preserving applications, MyPhD 2010, Aachen, September 2010

Poster:

Teaching:

  • Security Lab (Lab SS14)
  • Selected Topics in IT-Security (Seminar SS13)
  • Security Lab (Lab SS12), winner of "Lehrpreis Informatik 2012"
  • Selected Topics in IT-Security and Cryptography (Seminar SS12)
  • Security Lab (Lab SS11)
  • Selected Topics in (Mobile) Security (Seminar WS10/11)
  • Security Lab (Lab SS10)
  • IT-Security 1 (Lecture WS09/10)
  • Selected Topics in (Mobile) Security (Seminar WS09/10)

DA/BA/MA Theses:

  •  In progress: -
  •  Finished:
    • Secure Multi-party Computation on Smartphones: A Field Study (DA), Join us!
    • Distributed collaborative recommender systems in a privacy-preserving manner (DA)
    • Implementation and Security Analysis of two privacy preserving firewall enforcement protocols (SA)
    • Towards Secure Private Ordered Set Reconciliation against Active Attackers (MA)
    • Evaluating the Use of Fully Homomorphic Encryption in Secure Multi-Party Computation (DA)
    • A new Framework for Secure Distributed Function Calls (DA)
    • Privacy-preserving Policies Reconciliation in Social Networks (DA)
    • Efficient Detection of x86 Shellcode in Arbitrary Data (BA)
    • A Code Analysis Toolkit for Ruby Security Audits (BA)