Researcher Portfolio

 
   

Backes, Michael

Group M. Backes, Max Planck Institute for Software Systems, Max Planck Society  

 

Researcher Profile

 
Position: Group M. Backes, Max Planck Institute for Software Systems, Max Planck Society
Researcher ID: https://pure.mpg.de/cone/persons/resource/persons180279

External references

 

Publications

 
  (1 - 25 of 56)
 : Salem, A. M. G., Bhattacharyya, A., Backes, M., Fritz, M., & Zhang, Y. (2020). Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning. In Proceedings of the 29th USENIX Security Symposium (pp. 1291-1308). USENIX. Retrieved from https://www.usenix.org/conference/usenixsecurity20/presentation/salem. [PubMan] : Künnemann, R., Garg, D., & Backes, M. (2019). Causality & Control Flow. Electronic Proceedings in Theoretical Computer Science, 308, 32-46. doi:10.4204/EPTCS.308.3. [PubMan] : Salem, A., Zhang, Y., Humbert, M., Fritz, M., & Backes, M. (2019). ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models. In Network and Distributed Systems Security Symposium 2019. Reston, VA: Internet Society. doi:10.14722/ndss.2019.23119. [PubMan] : Hanzlik, L., Zhang, Y., Grosse, K., Salem, A., Augustin, M., Backes, M., & Fritz, M. (2018). MLCapsule: Guarded Offline Deployment of Machine Learning as a Service. Retrieved from http://arxiv.org/abs/1808.00590. [PubMan] : Backes, M., Rieck, K., Skoruppa, M., Stock, B., & Yamaguchi, F. (2017). Efficient and Flexible Discovery of PHP Application Vulnerabilities. In 2nd IEEE European Symposium on Security and Privacy (pp. 334-349). Piscataway, NJ: IEEE. doi:10.1109/EuroSP.2017.14. [PubMan] : Backes, M., Gomez Rodriguez, M., Manoharan, P., & Surma, B. (2017). Reconciling Privacy and Utility in Continuous-Time Diffusion Networks. In IEEE 30th Computer Security Foundations Symposium (pp. 292-304). Piscataway, NJ: IEEE. doi:10.1109/CSF.2017.29. [PubMan] : Backes, M., Dreier, J., Kremer, S., & Künnemann, R. (2017). A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and Its Application to Fair Exchange. In 2nd IEEE European Symposium on Security and Privacy (pp. 76-91). Piscataway, NJ: IEEE. doi:10.1109/EuroSP.2017.12. [PubMan] : Backes, M., Bugiel, S., Schranz, O., von Styp-Rekowsky, P., & Weisgerber, S. (2017). ARTist: The Android Runtime Instrumentation and Security Toolkit. In 2nd IEEE European Symposium on Security and Privacy (pp. 481-495). Piscataway, NJ: IEEE. doi:10.1109/EuroSP.2017.43. [PubMan] : Schneider, J., Fleischhacker, N., Schröder, D., & Backes, M. (2016). Efficient Cryptographic Password Hardening Services from Partially Oblivious Commitments. In CCS'16 (pp. 1192-1203). New York, NY: ACM. doi:10.1145/2976749.2978375. [PubMan] : Yokoyama, A., Ishii, K., Tanabe, R., Papa, Y., Yoshioka, K., Matsumoto, T., Kasama, T., Inoue, D., Brengel, M., Backes, M., & Rossow, C. (2016). SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion. In F. Monrose, M. Dacier, G. Blanc, & J. Garcia-Alfaro (Eds.), Research in Attacks, Intrusions, and Defenses (pp. 165-187). Berlin: Springer. doi:10.1007/978-3-319-45719-2_8. [PubMan] : Backes, M., Bugiel, S., Derr, E., Gerling, S., & Hammer, C. (2016). R-Droid: Leveraging Android App Analysis with Static Slice Optimization. In ASIA CCS'16 (pp. 129-140). New York, NY: ACM. doi:10.1145/2897845.2897927. [PubMan] : Backes, M., Bugiel, S., Derr, E., McDaniel, P., Octeau, D., & Weisgerber, S. (2016). On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis. In Proceedings of the 25th USENIX Security Symposium (pp. 1101-1118). Berkeley, CA: USENIX Association. [PubMan] : Backes, M., Hammer, C., Pfaff, D., & Skoruppa, M. (2016). Implementation-level Analysis of the JavaScript Helios Voting Client. In Proceedings of the 31st Annual ACM Symposium on Applied Computing (pp. 2071-2078). New York, NY: ACM. doi:10.1145/2851613.2851800. [PubMan] : Acar, Y., Backes, M., Bugiel, S., Fahl, S., McDaniel, P., & Smith, M. (2016). SoK: Lessons Learned From Android Security Research For Appified Software Platforms. In IEEE Symposium on Security and Privacy (pp. 433-451). Piscataway, NJ: IEEE. doi:10.1109/SP.2016.33. [PubMan] : Backes, M., Holz, T., Rossow, C., Rytilahti, T., Simeonovski, M., & Stock, B. (2016). On the Feasibility of TTL-Based Filtering for DRDoS Mitigation. In F. Monrose, M. Dacier, G. Blanc, & J. Garcia-Alfaro (Eds.), Research in Attacks, Intrusions, and Defenses (pp. 303-322). Berlin: Springer. doi:10.1007/978-3-319-45719-2_14. [PubMan] : Backes, M., Künnemann, R., & Mohammadi, E. (2016). Computational Soundness for Dalvik Bytecode. In CCS'16 (pp. 717-730). New York, NY: ACM. doi:10.1145/2976749.2978418. [PubMan] : Backes, M., Herzberg, A., Kate, A., & Pryvalov, I. (2016). Anonymous RAM. In I. Askoxylakis, S. Ioannidis, S. Katsikas, & C. Meadows (Eds.), Computer Security -- ESORICS 2016 (pp. 344-362). Berlin: Springer. doi:10.1007/978-3-319-45744-4_17. [PubMan] : Backes, M., Berrang, P., Humbert, M., & Manoharan, P. (2016). Membership Privacy in MicroRNA-based Studies. In CCS'16 (pp. 319-330). New York, NY: ACM. doi:10.1145/2976749.2978355. [PubMan] : Acar, Y., Backes, M., Fahl, S., Kim, D., Mazurek, M. L., & Stransky, C. (2016). You Get Where You're Looking for: The Impact of Information Sources on Code Security. In IEEE Symposium on Security and Privacy (pp. 289-305). Piscataway, NJ: IEEE. doi:10.1109/SP.2016.25. [PubMan] : Backes, M., Berrang, P., & Manoharan, P. (2016). From Zoos to Safaris -- From Closed-World Enforcement to Open-World Assessment of Privacy. In A. Aldini, J. Lopez, & F. Martinelli (Eds.), Foundations of Security Analysis and Design VIII (pp. 87-138). Berlin: Springer. doi:10.1007/978-3-319-43005-8_3. [PubMan] : Lu, K., Backes, M., Nürnberger, S., & Lee, W. (2016). How to Make ASLR Win the Clone Wars: Runtime Re-Randomization. In Proceedings of the 23rd Annual Symposium on Network and Distributed System Security. Reston, VA: Internet Society. [PubMan] : Backes, M., Bugiel, S., & Derr, E. (2016). Reliable Third-Party Library Detection in Android and its Security Applications. In CCS'16 (pp. 356-367). New York, NY: ACM. doi:10.1145/2976749.2978333. [PubMan] : Backes, M., Bugiel, S., Schranz, O., & von Styp-Rekowsky, a. P. (2016). Boxify: Bringing Full-Fledged App Sandboxing to Stock Android.;login, 41(2), 16-21. [PubMan] : Backes, M., Meiser, S., & Schröder, D. (2016). Delegatable Functional Signatures. In C.-M. Cheng, K.-M. Chung, G. Persiano, & B.-Y. Yang (Eds.), Public-Key Cryptography -- PKC 2016 (pp. 357-386). Berlin: Springer. doi:10.1007/978-3-662-49384-7_14. [PubMan] : Götzfried, J., Müller, T., Drescher, G., Nürnberger, S., & Backes, M. (2016). RamCrypt: Kernel-based Address Space Encryption for User-mode Processes. In ASIA CCS'16 (pp. 919-924). New York, NY: ACM. doi:10.1145/2897845.2897924. [PubMan]