Michael Backes
Michael Backes
Chairman and Founding Director of the CISPA Helmholtz Center for Information Security
Verified email at cispa.saarland
Title
Cited by
Cited by
Year
Adversarial examples for malware detection
K Grosse, N Papernot, P Manoharan, M Backes, P McDaniel
European symposium on research in computer security, 62-79, 2017
614*2017
On the (statistical) detection of adversarial examples
K Grosse, P Manoharan, N Papernot, M Backes, P McDaniel
arXiv preprint arXiv:1702.06280, 2017
4372017
A composable cryptographic library with nested operations
M Backes, B Pfitzmann, M Waidner
Proceedings of the 10th ACM conference on Computer and communications …, 2003
3362003
Appguard–enforcing user requirements on android apps
M Backes, S Gerling, C Hammer, M Maffei, P von Styp-Rekowsky
International Conference on TOOLS and Algorithms for the Construction and …, 2013
297*2013
The reactive simulatability (RSIM) framework for asynchronous systems
M Backes, B Pfitzmann, M Waidner
Information and Computation 205 (12), 1685-1720, 2007
289*2007
Automatic discovery and quantification of information leaks
M Backes, B Köpf, A Rybalchenko
2009 30th IEEE Symposium on Security and Privacy, 141-153, 2009
2412009
Reliable third-party library detection in android and its security applications
M Backes, S Bugiel, E Derr
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
2332016
Automated verification of remote electronic voting protocols in the applied pi-calculus
M Backes, C Hritcu, M Maffei
2008 21st IEEE Computer Security Foundations Symposium, 195-209, 2008
2332008
Acoustic Side-Channel Attacks on Printers.
M Backes, M Dürmuth, S Gerling, M Pinkal, C Sporleder
USENIX Security symposium 9, 307-322, 2010
2202010
Ml-leaks: Model and data independent membership inference attacks and defenses on machine learning models
A Salem, Y Zhang, M Humbert, P Berrang, M Fritz, M Backes
arXiv preprint arXiv:1806.01246, 2018
2102018
Verifiable delegation of computation on outsourced data
M Backes, D Fiore, RM Reischuk
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2022013
You get where you're looking for: The impact of information sources on code security
Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky
2016 IEEE Symposium on Security and Privacy (SP), 289-305, 2016
1972016
Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol
M Backes, M Maffei, D Unruh
2008 IEEE Symposium on Security and Privacy (sp 2008), 202-215, 2008
1902008
You can run but you can't read: Preventing disclosure exploits in executable code
M Backes, T Holz, B Kollenda, P Koppe, S Nürnberger, J Pewny
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1862014
Oxymoron: Making fine-grained memory randomization practical by allowing code sharing
M Backes, S Nürnberger
23rd {USENIX} Security Symposium ({USENIX} Security 14), 433-447, 2014
1852014
Stack overflow considered harmful? the impact of copy&paste on android application security
F Fischer, K Böttinger, H Xiao, C Stransky, Y Acar, M Backes, S Fahl
2017 IEEE Symposium on Security and Privacy (SP), 121-136, 2017
1702017
Symmetric encryption in a simulatable Dolev-Yao style cryptographic library
M Backes, B Pfitzmann
Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004., 204-218, 2004
1702004
Comparing the usability of cryptographic apis
Y Acar, M Backes, S Fahl, S Garfinkel, D Kim, ML Mazurek, C Stransky
2017 IEEE Symposium on Security and Privacy (SP), 154-171, 2017
1692017
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface
D Ünay, Z Çataltepe, S Aksoy
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2010
155*2010
Efficient comparison of enterprise privacy policies
M Backes, G Karjoth, W Bagga, M Schunter
Proceedings of the 2004 ACM symposium on Applied computing, 375-382, 2004
1542004
The system can't perform the operation now. Try again later.
Articles 1–20