Personal tools

Publications

2017

S. Wüller, U. Meyer, S. Wetzel: Towards Privacy-Preserving Multi-Party Bartering, 5th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, Malta, April 2017. (to appear)

F. Förg, S. Wetzel, U. Meyer: Efficient Commodity Matching for Privacy-Preserving Two-Party Bartering, 7th ACM Conference on Data and Application Security and Privacy (CODASPY 2017), Scottsdale, Arizona, March 2017. (to appear)

S. Wüller, D. Mayer, F. Förg, S. Schüppen, B. Assadsolimani, U. Meyer, S. Wetzel: Designing Privacy-Preserving Interval Operations Based on Homomorphic Encryption and Secret Sharing, Journal of Computer Security, 2017.

2016

S. Wüller, U. Meyer, S. Wetzel: Towards Privacy-Preserving Multi-Party Bartering (Extended Version), RWTH Aachen University, Technical Report, AIB-2016-10, December 2016.

P. Herrmann, U. Meyer: B.A.T.M.A.N. Handover Extension for Routing Nodes, 41st IEEE Conference on Local Computer Networks (LCN), Dubai, Vereinigte Arabische Emirate, November 2016. (accepted)

S. Wüller, W. Pessin, U. Meyer, S. Wetzel: Privacy-Preserving Two-Party Bartering Secure Against Active Adversaries, 14th Annual Conference on Privacy, Security and Trust (PST 2016), Auckland, New Zealand, December 2016.

M. Kühnel, U. Meyer: Classification of Short Messages Initiated by Mobile Malware. The 1st International Workshop on Malware Analysis (WMA'16) held in conjunction with the 11th International Conference on Availability, Reliability and Security (ARES 2016), Salzburg (Austria), August 2016.

S. Wüller, M. Kühnel, U. Meyer: Information Hiding in the Public RSA Modulus, 4th ACM Workshop on Information Hiding and Multimedia Security (IH & MMSEC 2016), Vigo, Spain, June 2016.

M. Kühnel, U. Meyer: Applying Highly Space Efficient Blacklisting on Mobile Malware, Logic Journal of the IGPL, Oxford Journals, Online ISSN 1367-0751. (to appear)

D. Teubert, F. Grossmann, U. Meyer: Anomaly-based mobile malware detection - system calls as source for features, ICISSP 2016 - Proceedings of the 2nd International Conference on Information Systems Security and Privacy, Rome, Italy, February 2016.

2015

F. Kerber, D. Teubert, U. Meyer: Covert Remote Syscall Communication at Kernel Level, 10th International Conference on Malicious and Unwanted Software (MALCON 2015), Fajardo, Puerto Rico, October 2015.

M. Kühnel, J. Abendroth, U. Meyer: Social Network Analysis of Mobile Malware Initiating SMS Messages, 2nd Workshop on Security in Highly Connected IT Systems (SHCIS'15) held in conjunction with 20th European Symposium on Research in Computer Security (ESORICS 2015), Wien (Austria), September 2015.

M. Kühnel, M. Smieschek, U. Meyer: Fast Identification of Obfuscation and Mobile Advertising in Mobile Malware, The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15), Helsinki (Finland), August 2015.

S. Wüller, M. Kühnel, U. Meyer: Information Hiding in the Public RSA Modulus, RWTH Aachen University, Technical Report, AIB-2015-11, June 2015.

S. Wüller, U. Meyer, F. Förg, S. Wetzel: Privacy-Preserving Conditional Random Selection, 13th Conference on Privacy, Security and Trust (PST 2015), Izmir, Turkey, July 2015.

2014

F. Förg, D. Mayer, S. Wetzel, S.Wüller, U. Meyer: A Secure Two-Party Bartering Protocol Using Privacy-Preserving Interval Operations, 12th Conference on Privacy, Security and Trust (PST 2014), Toronto, Canada, July 2014.

M. Kühnel, U. Meyer: Highly Space Efficient Blacklisting, 7th International Conference on Computational Intelligence in Security for Information Systems (CISIS'14), Bilbao (Spain), June 2014.

A. Egners, P. Herrmann, U. Meyer: Multi-operator wireless mesh networks secured by an all-encompassing security architecture, International Journal of Information Security, Springer Berlin Heidelberg, Volume 13, May 2014, doi:10.1007/s10207-014-0244-y.

2013

M. Kühnel, U. Meyer: 4GMOP: Mopping the Malware Initiated Traffic in Mobile Networks, 16th Information Security Conference (ISC 2013), Dallas (USA), November 2013.

J. Krude, U. Meyer: A Versatile Code Execution Isolation Framework with Security First, ACM Cloud Computing Security Workshop (CCSW, in conjunction with ACM Conference on Computer and Communications Security (CCS)), November 2013.
 
A. Egners, P. Herrmann, T. Jarmuzek, U. Meyer: Experiences From Security Research Using a Wireless Mesh Network Testbed, 38th IEEE Conference on Local Computer Networks (LCN), Sydney (Australia), October 2013.
 
G. Wicherski, F. Weingarten, U. Meyer: IP Agnostic Real-Time Traffic Filtering and Host Identification Using TCP Timestamps, 38th IEEE Conference on Local Computer Networks (LCN), Sydney (Australia), October 2013.
 
G. Neugebauer, L. Brutschy, U. Meyer, S. Wetzel: Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model, Extended Version, Cryptology ePrintArchive: Report 2013/655, October 2013.

G. Neugebauer, L. Brutschy, U. Meyer, S. Wetzel: Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model, 8th International Workshop on Data Privacy Management, ESORICS 2013, LNCS, Egham, United Kingdom, September 2013.

G. Neugebauer, U. Meyer, S. Wetzel: SMC-MuSe: A Framework for Secure Multi-Party Computation on MultiSets, short paper, poster session, 43th GI-LNI Informatik 2013, Koblenz, Germany, September 2013.
 
C. Quix, J. Barnickel, S. Geisler, M. Hassani, S. Kim, X. Li, A. Lorenz, T. Quadflieg, T. Gries, M. Jarke, S. Leonhardt, U. Meyer, T. Seidl, HealthNet: A System for Mobile and Wearable Health Information Management, Proc. of the 3rd International Workshop on Information Management in Mobile Applications (IMMoA 2013) in conjunction with VLDB 2013, Riva del Garda, Trento, Italy, August 2013. Available Online.
 
J. Barnickel, Authentication and Identity Privacy in the Wireless Domain, PhD thesis, RWTH Aachen University, 2013. Available online.
 
A. Egners, P. Herrmann, U. Meyer: Secure and Efficient Handover Protocols for WMNs, IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM), Madrid, Spain, June 2013.

F. Weingarten, G. Neugebauer, U. Meyer, S. Wetzel: Privacy-Preserving Multi-Party Reconciliation using Fully Homomorphic Encryption, 7th International Conference on Network and System Security (NSS 2013), LNCS, Madrid, Spain, June 2013.

G. Neugebauer, L. Brutschy, U. Meyer, S. Wetzel: Design and Implementation of Privacy-Preserving Reconciliation Protocols, 6th ACM International Workshop on Privacy and Anonymity in the Information Society, EDBT/ICDT 2013, Genoa, Italy , March 2013.

A. Egners, U. Meyer: Secure Roaming and Infrastructure Sharing for Multi-Operator WMNs, 28th ACM Symposium on Applied Computing (Security Track SEC@SAC13), Coimbra, Portugal, March 2013.

2012

G. Neugebauer, U. Meyer: SMC-MuSe: A Framework for Secure Multi-Party Computation on MultiSets, RWTH Aachen University, Technical Report, AIB-2012-16, December 2012.

J. Barnickel, U. Meyer, A Privacy Preserving Range Extension for Commercial WLANs with User Incentives, The Second International Conference on Mobile Services, Resources, and Users (MOBILITY 2012), Venice, Italy, October 2012. Available online.

P. Schoo, M. Schäfer, A. Egners, H. Hofinger, S. Wessel, M. Kühnel, S. Todt and M. Montag: Collaboration Between Competing Mobile Network Operators to Improve CIIP, 7th Conference on Critical Information Infrastructures Security (CRITIS 2012), Lillehammer, Norway, September 2012.
 
J. Gilger, J. Barnickel, U. Meyer: GPU-acceleration of block ciphers in the OpenSSL cryptographic library, 15th Information Security Conference (ISC 2012), Passau, Germany, September 2012 (Draft Version).

M. Kühnel: RSA Vulnerabilities with Small Prime Difference. In: Armknecht, F., Lucks, S. (eds.) Research in Cryptology - 4th Western European Workshop - WEWoRC 2011. LNCS, vol. 7242, pp.122-136, Springer-Verlag, July 2012.
 
A. Egners, B. Marschollek, U. Meyer: Hackers in Your Pocket: A Survey of Smartphone Security Across Platforms, RWTH Aachen University, Technical Report, AIB-2012-07, May 2012.
 
A. Egners, B. Marschollek, U. Meyer: Messing with Android's Permission Model, IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12), June 2012 (Liverpool, United Kingdom).
 
J. Barnickel, J. Wang, U. Meyer: Implementing an Attack on Bluetooth 2.1+ Secure Simple Pairing in Passkey Entry Mode, IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12), June 2012 (Liverpool, United Kingdom).
 
A. Egners, H. Fabelje, U. Meyer: FSASD: A Framework for Establishing Security Associations for Sequentially Deployed WMNIEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM), June 2012 (San Francisco, USA).

A. Egners, D. Gatzen, A. Panchenko, U. Meyer: Introducing SOR: SSH-based Onion Routing, 26th International Conference on Advanced Information Networking and Applications (AINA), March 2012 (Fukuoka, Japan).

2011

M. Kühnel: Vulnerable Relations of Prime Factors in the RSA Cryptosystem, 15. Kryptotag, December 2011.

A. Panchenko, O. Spaniol, A. Egners, T. Engel: Lightweight Hidden Services, 10th IEEE Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Changsha, November 2011.

J. Barnickel, U. Meyer: Security and Privacy for WLAN Roaming with per-connection Tariff Negotiation, IEEE Conference on Local Computer Networks, Bonn, October 2011. Revised version available online.

A. Neumann, J. Barnickel, U. Meyer: Security and Privacy Implications of URL Shortening Services, Web 2.0 Security and Privacy Workshop, Oakland, May 2011. Extended Version available online.

D. Mayer, G. Neugebauer, U. Meyer, S. Wetzel: Enabling Fair and Privacy-Preserving Applications Using Reconciliation Protocols on Ordered Sets, 34rd IEEE Sarnoff Symposium, Princeton, May 2011.

G. Neugebauer, U. Meyer, S. Wetzel: Fair and Privacy-Preserving Multi-Party Protocols for Reconciling Ordered Input Sets, Extended Version, Cryptology ePrintArchive: Report 2011/200, April 2011.

G. Neugebauer: Towards a Fair and Privacy-Preserving Secure Multi-party Computation Network, 14. Kryptotag, March 2011.

D. Mayer, D. Teubert, U. Meyer, S. Wetzel: Implementation and Performance Evaluation of Privacy-Preserving Fair Reconciliation Protocols on Ordered Sets, In: First ACM Conference on Data and Application Security and Privacy (CODASPY), San Antonio, TX, USA, Feb 21-23 2011.

2010

G. Neugebauer, U. Meyer, S. Wetzel: Fair and Privacy-Preserving Multi-Party Protocols for Reconciling Ordered Input Sets, 13th Information Security Conference (ISC), LNCS, vol. 6531, pp. 136-151, Springer-Verlag, October 2010.

A.Egners, U. Meyer: Wireless Mesh Network Security: State of Affairs, 35th IEEE Conference on Local Computer Networks (LCN), Devner (USA), October 2010.

G. Huitema, R. Kuehne, U. Meyer, et al.: Compensation: Architecture for supporting dynamicity and negotiation in accounting, charging, and billing, Journal of Computer Communications, Elsevier, June 2010.

J. Barnickel, H. Karahan, U. Meyer: Security and Privacy for Mobile Electronic Health Monitoring and Recording Systems, IEEE International WoWMoM Workshop on Interdisciplinary Research on E-Health Services and Systems, June 2010. Draft available online.

A.Egners: Evaluating IEEE 802.11s Against Security Requirements of Wireless Mesh Networks, Essener Workshop zur Netzsicherheit 2010 (EWNS10), April 2010.

D. A. Mayer, D. Teubert, S. Wetzel, U. Meyer, G. Neugebauer: appoint - A Distributed Privacy-Preserving iPhone Application, WiSec 2010, Poster Session, March 2010.

U. Meyer, S. Wetzel, S. Ioannidis: New Advances on Privacy-Preserving Policy Reconciliation, Cryptology ePrintArchive: Report 2010/064, March 2010.

M. Braun, U. Meyer, S. Wetzel: Efficient Mutual Authentication for Multi-Domain RFID Systems Using Distributed Signatures, Workshop on Information Security Theory and Practice, April 2010. WISTP'10 Most Innovative Technology-Related Paper Award.

2009

J. Barnickel, U. Meyer, SecSyWiSe: A Secure Time Synchronization Scheme in Wireless Sensor Networks,  IEEE ICUMT: International Conference on Ultra Modern Telecommunications and Workshops, October 2009. Draft available online.

G. Neugebauer,  Informationsreduktionsverfahren zur Konstruktion eingeschränkt verkettbarer Pseudonyme, Diplomarbeit, TU Dortmund, Lehrstuhl VI, Informationssysteme und Sicherheit (ISSI), September 2009.

A. Egners,  Implementierung und Evaluierung von versteckten Diensten basierend auf offenen Standards, Diplomarbeit, RWTH Aachen, Lehrstuhl für Informatik 4 - Kommunikation und Verteilte Systeme, Juli 2009.

A. Egners, Versteckte Dienste in öffentlichen Umgebungen, Informatiktage März 2009, S. 187-190.

2008

J. Barnickel, Domain Name Chaining Attacks, Master Thesis, Ruhr-Universtität Bochum, Chair for Network and Data Security, October 2008.

N. Beume, T. Hein, B. Naujoks, G. Neugebauer, N. Piatkowski, M. Preuss, R. Stüer, A. Thom, To Model or Not to Model: Controlling Pac-Man Ghosts Without Incorporating Global Knowledge. Proc. 2008 Congress on Evolutionary Computation (CEC'08) within Fifth IEEE World Congress on Computational Intelligence (WCCI'08), 2008. IEEE Press.

R. Falk, H.-J. Hof, U. Meyer, C. Niedermeier, R. Sollacher, N. Vicari, From Academia to the Field: Wireless Sensor Networks for Industrial Use , Fachgespraech Sensornetze, Berlin, 2008.

2007

J. Voris, S. Ioannidis, S. Wetzel, and U. Meyer, Performance Evaluation of a Privacy-Preserving Policy Reconciliation Protocol, in Proceedings of IEEE Workshop on Policies for Distributed Systems and Networks (Policy'07), 2007.

U. Meyer, S. Wetzel, and U. Meyer, Distributed Privacy-Preserving Policy Reconciliation, in Proceedings of ICC'07, 2007.

U. Meyer, H. Tschofenig, and G. Karagiannis, On the security of the Mobile IP protocol family, Proceedings of 1st IEEE Workshop on Enabling the Future Service-Oriented Internet , Workshop of GLOBECOM 2007, November 2007.

G.B. Huitema, R. Kühne, U. Meyer, J. Siljee, A. Zugenmaier, Compensation - Dynamic Charging and Billing Relationships in Next-Generation Business Environments in Proceedings of The 16th Wireless Research Forum July 2007.

T. R. Rui Campos, A. Mehes, U. Meyer, J. Sachs, G. Selander, Ambient Network Attachment in Proceedings of The 16th Wireless Research Forum July 2007.

2006

J. Cordasco, S. Wetzel, and U. Meyer, Implementation and Performance Evaluation of EAP-TLS-KS, in Proceedings of Security and Privacy in Communication Networks , August 2006.

U. Meyer, H. Tschofenig, C. Kappler, J. Arkko, On the Impact of Ambient Network Technologies on AAA Infrastructures, in Proceedings of The 16th Wireless Research Forum April 2006.

U. Meyer and S. Wetzel, Introducing History Enriched Security Context Transfer to Enhance the Security of Subsequent Handover, in Proceedings of The IEEE Workshop on Perversive Computing and Communication Security, March 2006.

2005

U. Meyer, Secure Roaming and Handover Procedures in Wireless Access Networks, Doktorarbeit, Darmstadt University of Technology, December 2005.

U. Meyer, J. Cordasco and S. Wetzel, An Approach to Enhance Inter-Provider Roaming Through Secret Sharing and its Application to WLANs, in Proceedings of The ACM Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, September 2005.

2004

U. Meyer and S. Wetzel, A man-in-the-middle attack on UMTS, in Proceeding of The ACM Workshop on Wireless Security (WiSe 2004) , October 2004.

U. Meyer and S. Wetzel, On the impact of GSM encryption and man-in-the-middle attacks on the security of inter-operating GSM/UMTS networks, in Proceedings of The 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC2004), September 2004.

A. Hagedorn and U. Meyer, Sicherheit im WLAN , in Praxishandbuch Netzwerksicherheit, Interest-Verlag, 2004.

K. Kastell, A. Fernandez-Pello, D. Perez, R. Jakoby, and U. Meyer Performance Advantage and Use of a Location Based Handover Algorithm , in Proceedings of IEEE Vehicular Technology Conference 2004-Fall "Wireless Technologies for Global Security", September 2004.

2003

K. Kastell, U. Meyer and R. Jakoby, Secure Handover Procedures, in Proceedings of The 8th International Conference on Cellular and Intelligent Communications (CIC2003), October 2003.

2001

U. Meyer, Normenkörper, Diplomarbeit, Universität Heidelberg, Fakultät für Mathematik, 2001.