default search action
Markus Dürmuth
Person information
- affiliation: Leibniz University Hannover, Germany
- affiliation (former): Ruhr University Bochum, Germany
- affiliation (former): Saarland University, Saarbrücken, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c57]Philipp Markert, Leona Lassak, Maximilian Golla, Markus Dürmuth:
Understanding Users' Interaction with Login Notifications. CHI 2024: 853:1-853:17 - [c56]Leona Lassak, Philipp Markert, Maximilian Golla, Elizabeth Stobert, Markus Dürmuth:
A Comparative Long-Term Study of Fallback Authentication Schemes. CHI 2024: 970:1-970:19 - [c55]Maike M. Raphael, Aikaterini Kanta, Rico Seebonn, Markus Dürmuth, Camille Cobb:
Batman Hacked My Password: A Subtitle-Based Analysis of Password Depiction in Movies. SOUPS @ USENIX Security Symposium 2024: 199-218 - [c54]Joel Frank, Franziska Herbert, Jonas Ricker, Lea Schönherr, Thorsten Eisenhofer, Asja Fischer, Markus Dürmuth, Thorsten Holz:
A Representative Study on Human Detection of Artificially Generated Media Across Countries. SP 2024: 55-73 - [c53]Franziska Herbert, Steffen Becker, Annalina Buckmann, Marvin Kowalewski, Jonas Hielscher, Yasemin Acar, Markus Dürmuth, Yixin Zou, M. Angela Sasse:
Digital Security - A Question of Perspective A Large-Scale Telephone Survey with Four At-Risk User Groups. SP 2024: 697-716 - 2023
- [j8]Marvin Kowalewski, Christine Utz, Martin Degeling, Theodor Schnitzler, Franziska Herbert, Leonie Schaewitz, Florian M. Farke, Steffen Becker, Markus Dürmuth:
52 Weeks Later: Attitudes Towards COVID-19 Apps for Different Purposes Over Time. Proc. ACM Hum. Comput. Interact. 7(CSCW2): 1-45 (2023) - [c52]Franziska Herbert, Steffen Becker, Leonie Schaewitz, Jonas Hielscher, Marvin Kowalewski, M. Angela Sasse, Yasemin Acar, Markus Dürmuth:
A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 Countries. CHI 2023: 582:1-582:23 - [i23]Marvin Kowalewski, Christine Utz, Martin Degeling, Theodor Schnitzler, Franziska Herbert, Leonie Schaewitz, Florian M. Farke, Steffen Becker, Markus Dürmuth:
52 Weeks Later: Attitudes Towards COVID-19 Apps for Different Purposes Over Time. CoRR abs/2307.06214 (2023) - [i22]Joel Frank, Franziska Herbert, Jonas Ricker, Lea Schönherr, Thorsten Eisenhofer, Asja Fischer, Markus Dürmuth, Thorsten Holz:
A Representative Study on Human Detection of Artificially Generated Media Across Countries. CoRR abs/2312.05976 (2023) - 2022
- [j7]Marvin Kowalewski, Franziska Herbert, Theodor Schnitzler, Markus Dürmuth:
Proof-of-Vax: Studying User Preferences and Perception of Covid Vaccination Certificates. Proc. Priv. Enhancing Technol. 2022(1): 317-338 (2022) - [c51]Markus Keil, Philipp Markert, Markus Dürmuth:
"It's Just a Lot of Prerequisites": A User Perception and Usability Analysis of the German ID Card as a FIDO2 Authenticator. EuroUSEC 2022: 172-188 - [c50]Franziska Herbert, Marvin Kowalewski, Theodor Schnitzler, Leona Lassak, Markus Dürmuth:
"Fast, Easy, Convenient." Studying Adoption and Perception of Digital Covid Certificates. SOUPS @ USENIX Security Symposium 2022: 463-482 - [c49]Philipp Markert, Theodor Schnitzler, Maximilian Golla, Markus Dürmuth:
"As soon as it's a risk, I want to require MFA": How Administrators Configure Risk-based Authentication. SOUPS @ USENIX Security Symposium 2022: 483-501 - [c48]Florian M. Farke, Leona Lassak, Jannis Pinter, Markus Dürmuth:
Exploring User Authentication with Windows Hello in a Small Business Environment. SOUPS @ USENIX Security Symposium 2022: 523-540 - [i21]Philipp Markert, Leona Lassak, Maximilian Golla, Markus Dürmuth:
"I Knew It Was Me": Understanding Users' Interaction with Login Notifications. CoRR abs/2212.07316 (2022) - [i20]Franziska Herbert, Steffen Becker, Leonie Schaewitz, Jonas Hielscher, Marvin Kowalewski, M. Angela Sasse, Yasemin Acar, Markus Dürmuth:
A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 Countries. CoRR abs/2212.10382 (2022) - [i19]Franziska Herbert, Steffen Becker, Annalina Buckmann, Marvin Kowalewski, Jonas Hielscher, Leonie Schaewitz, Jennifer Friedauer, Yasemin Acar, Markus Dürmuth, M. Angela Sasse:
Talking to the Overlooked: A Nationwide Telephone Survey with Four Groups Under-represented in Privacy and Security Studies. CoRR abs/2212.12964 (2022) - 2021
- [j6]Stephan Wiefling, Markus Dürmuth, Luigi Lo Iacono:
Verify It's You: How Users Perceive Risk-Based Authentication. IEEE Secur. Priv. 19(6): 47-57 (2021) - [j5]Theodor Schnitzler, Muhammad Shujaat Mirza, Markus Dürmuth, Christina Pöpper:
SoK: Managing Longitudinal Privacy of Publicly Shared Personal Online Data. Proc. Priv. Enhancing Technol. 2021(1): 229-249 (2021) - [j4]Philipp Markert, Daniel V. Bailey, Maximilian Golla, Markus Dürmuth, Adam J. Aviv:
On the Security of Smartphone Unlock PINs. ACM Trans. Priv. Secur. 24(4): 30:1-30:36 (2021) - [c47]Markus Dürmuth, Maximilian Golla, Philipp Markert, Alexander May, Lars Schlieper:
Towards Quantum Large-Scale Password Guessing on Real-World Distributions. CANS 2021: 412-431 - [c46]Christine Utz, Steffen Becker, Theodor Schnitzler, Florian M. Farke, Franziska Herbert, Leonie Schaewitz, Martin Degeling, Markus Dürmuth:
Apps Against the Spread: Privacy Implications and User Acceptance of COVID-19-Related Smartphone Apps on Three Continents. CHI 2021: 70:1-70:22 - [c45]Theodor Schnitzler, Christina Pöpper, Markus Dürmuth, Katharina Kohls:
We Built This Circuit: Exploring Threat Vectors in Circuit Establishment in Tor. EuroS&P 2021: 319-336 - [c44]Franziska Herbert, Florian M. Farke, Marvin Kowalewski, Markus Dürmuth:
Vision: Developing a Broad Usable Security & Privacy Questionnaire. EuroUSEC 2021: 76-82 - [c43]Stephan Wiefling, Markus Dürmuth, Luigi Lo Iacono:
What's in Score for Website Users: A Data-Driven Long-Term Study on Risk-Based Authentication Characteristics. Financial Cryptography (2) 2021: 361-381 - [c42]Florian M. Farke, David G. Balash, Maximilian Golla, Markus Dürmuth, Adam J. Aviv:
Are Privacy Dashboards Good for End Users? Evaluating User Perceptions and Reactions to Google's My Activity. USENIX Security Symposium 2021: 483-500 - [i18]Stephan Wiefling, Markus Dürmuth, Luigi Lo Iacono:
What's in Score for Website Users: A Data-driven Long-term Study on Risk-based Authentication Characteristics. CoRR abs/2101.10681 (2021) - [i17]Florian M. Farke, David G. Balash, Maximilian Golla, Markus Dürmuth, Adam J. Aviv:
Are Privacy Dashboards Good for End Users? Evaluating User Perceptions and Reactions to Google's My Activity (Extended Version). CoRR abs/2105.14066 (2021) - [i16]Marvin Kowalewski, Franziska Herbert, Theodor Schnitzler, Markus Dürmuth:
Proof-of-Vax: Studying User Preferences and Perception of Covid Vaccination Certificates. CoRR abs/2106.11676 (2021) - [i15]Markus Dürmuth, Maximilian Golla, Philipp Markert, Alexander May, Lars Schlieper:
Towards Quantum Large-Scale Password Guessing on Real-World Distributions. IACR Cryptol. ePrint Arch. 2021: 1299 (2021) - 2020
- [j3]Theodor Schnitzler, Christine Utz, Florian Farke, Christina Pöpper, Markus Dürmuth:
Exploring user perceptions of deletion in mobile instant messaging applications. J. Cybersecur. 6(1): tyz016 (2020) - [c41]Stephan Wiefling, Markus Dürmuth, Luigi Lo Iacono:
More Than Just Good Passwords? A Study on Usability and Security Perceptions of Risk-based Authentication. ACSAC 2020: 203-218 - [c40]Stephan Wiefling, Tanvi Patil, Markus Dürmuth, Luigi Lo Iacono:
Evaluation of Risk-Based Re-Authentication Methods. SEC 2020: 280-294 - [c39]Florian Farke, Lennart Lorenz, Theodor Schnitzler, Philipp Markert, Markus Dürmuth:
"You still use the password after all" - Exploring FIDO2 Security Keys in a Small Company. SOUPS @ USENIX Security Symposium 2020: 19-35 - [c38]Philipp Markert, Daniel V. Bailey, Maximilian Golla, Markus Dürmuth, Adam J. Aviv:
This PIN Can Be Easily Guessed: Analyzing the Security of Smartphone Unlock PINs. SP 2020: 286-303 - [i14]Philipp Markert, Daniel V. Bailey, Maximilian Golla, Markus Dürmuth, Adam J. Aviv:
This PIN Can Be Easily Guessed. CoRR abs/2003.04868 (2020) - [i13]Stephan Wiefling, Luigi Lo Iacono, Markus Dürmuth:
Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild. CoRR abs/2003.07622 (2020) - [i12]Stephan Wiefling, Tanvi Patil, Markus Dürmuth, Luigi Lo Iacono:
Evaluation of Risk-based Re-Authentication Methods. CoRR abs/2008.07795 (2020) - [i11]Stephan Wiefling, Markus Dürmuth, Luigi Lo Iacono:
More Than Just Good Passwords? A Study on Usability and Security Perceptions of Risk-based Authentication. CoRR abs/2010.00339 (2020) - [i10]Christine Utz, Steffen Becker, Theodor Schnitzler, Florian M. Farke, Franziska Herbert, Leonie Schaewitz, Martin Degeling, Markus Dürmuth:
Apps Against the Spread: Privacy Implications and User Acceptance of COVID-19-Related Smartphone Apps on Three Continents. CoRR abs/2010.14245 (2020)
2010 – 2019
- 2019
- [j2]Florian Farke, Jan Rensinghoff, Markus Dürmuth, Tobias Gostomzyk:
Recht auf Vergessen. Datenschutz und Datensicherheit 43(11): 681-685 (2019) - [c37]Stephan Wiefling, Luigi Lo Iacono, Markus Dürmuth:
Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild. SEC 2019: 134-148 - [c36]Theodor Schnitzler, Markus Dürmuth, Christina Pöpper:
Towards Contractual Agreements for Revocation of Online Data. SEC 2019: 374-387 - [c35]Jascha Kolberg, Pia Bauspieß, Marta Gomez-Barrero, Christian Rathgeb, Markus Dürmuth, Christoph Busch:
Template Protection based on Homomorphic Encryption: Computationally Efficient Application to Iris-Biometric Verification and Identification. WIFS 2019: 1-6 - 2018
- [c34]Maximilian Golla, Miranda Wei, Juliette Hainline, Lydia Filipe, Markus Dürmuth, Elissa M. Redmiles, Blase Ur:
"What was that site doing with my Facebook password?": Designing Password-Reuse Notifications. CCS 2018: 1549-1566 - [c33]Maximilian Golla, Markus Dürmuth:
On the Accuracy of Password Strength Meters. CCS 2018: 1567-1582 - [c32]Weijia He, Maximilian Golla, Roshni Padhi, Jordan Ofek, Markus Dürmuth, Earlence Fernandes, Blase Ur:
Rethinking Access Control and Authentication for the Home Internet of Things (IoT). USENIX Security Symposium 2018: 255-272 - [i9]Adam J. Aviv, Markus Dürmuth:
A Survey of Collection Methods and Cross-Data Set Comparison of Android Unlock Patterns. CoRR abs/1811.10548 (2018) - 2017
- [c31]Claude Castelluccia, Markus Dürmuth, Maximilian Golla, Fatma Deniz:
Towards Implicit Visual Memory-Based Authentication. NDSS 2017 - [c30]Maximilian Golla, Daniel V. Bailey, Markus Dürmuth:
"I want my money back!" Limiting Online Password-Guessing Financially. SOUPS 2017 - 2016
- [c29]Markus Dürmuth, David F. Oswald, Niklas Pastewka:
Side-Channel Attacks on Fingerprint Matching Algorithms. TrustED@CCS 2016: 3-13 - [c28]Maximilian Golla, Benedict Beuscher, Markus Dürmuth:
On the Security of Cracking-Resistant Password Vaults. CCS 2016: 1230-1241 - [c27]Apostolis Zarras, Katharina Kohls, Markus Dürmuth, Christina Pöpper:
Neuralyzer: Flexible Expiration Times for the Revocation of Online Data. CODASPY 2016: 14-25 - [c26]David Freeman, Sakshi Jain, Markus Dürmuth, Battista Biggio, Giorgio Giacinto:
Who Are You? A Statistical Approach to Measuring User Authenticity. NDSS 2016 - [c25]Adam J. Aviv, Markus Dürmuth, Payas Gupta:
Position Paper: Measuring the Impact of Alphabet and Culture on Graphical Passwords. WAY@SOUPS 2016 - 2015
- [c24]Markus Dürmuth, Fabian Angelstorf, Claude Castelluccia, Daniele Perito, Chaabane Abdelberi:
OMEN: Faster Password Guessing Using an Ordered Markov Enumerator. ESSoS 2015: 119-132 - [c23]Maximilian Golla, Markus Dürmuth:
Analyzing 4 Million Real-World Personal Knowledge Questions (Short Paper). PASSWORDS 2015: 39-44 - 2014
- [c22]Ashar Javed, David Bletgen, Florian Kohlar, Markus Dürmuth, Jörg Schwenk:
Secure Fallback Authentication and the Trusted Friend Attack. ICDCS Workshops 2014: 22-28 - [c21]Markus Dürmuth, Thorsten Kranz:
On Password Guessing with GPUs and FPGAs. PASSWORDS 2014: 19-38 - [c20]Daniel V. Bailey, Markus Dürmuth, Christof Paar:
Statistics on Password Re-use and Adaptive Strength for Financial Accounts. SCN 2014: 218-235 - [i8]Claude Castelluccia, Markus Dürmuth, Fatma Imamoglu:
Learning from Neuroscience to Improve Internet Security. ERCIM News 2014(99) (2014) - 2013
- [c19]Sebastian Uellenbeck, Markus Dürmuth, Christopher Wolf, Thorsten Holz:
Quantifying the security of graphical passwords: the case of android unlock patterns. CCS 2013: 161-172 - [c18]Benedikt Driessen, Markus Dürmuth:
Achieving Anonymity against Major Face Recognition Algorithms. Communications and Multimedia Security 2013: 18-33 - [c17]Markus Dürmuth:
Useful password hashing: how to waste computing cycles with style. NSPW 2013: 31-40 - [i7]Claude Castelluccia, Chaabane Abdelberi, Markus Dürmuth, Daniele Perito:
When Privacy meets Security: Leveraging personal information for password cracking. CoRR abs/1304.6584 (2013) - [i6]Benedikt Driessen, Markus Dürmuth:
Achieving Anonymity Against Major Face Recognition Algorithms. IACR Cryptol. ePrint Arch. 2013: 9 (2013) - 2012
- [c16]Markus Dürmuth, Tim Güneysu, Markus Kasper, Christof Paar, Tolga Yalçin, Ralf Zimmermann:
Evaluation of Standardized Password-Based Key Derivation against Parallel Processing Platforms. ESORICS 2012: 716-733 - [c15]Claude Castelluccia, Markus Dürmuth, Daniele Perito:
Adaptive Password-Strength Meters from Markov Models. NDSS 2012 - [c14]Sirke Reimann, Markus Dürmuth:
Timed revocation of user data: long expiration times from existing infrastructure. WPES 2012: 65-74 - 2011
- [c13]Markus Dürmuth, David Mandell Freeman:
Deniable Encryption with Negligible Detection Probability: An Interactive Construction. EUROCRYPT 2011: 610-626 - [i5]Julian Backes, Michael Backes, Markus Dürmuth, Sebastian Gerling, Stefan Lorenz:
X-pire! - A digital expiration date for images in social networks. CoRR abs/1112.2649 (2011) - [i4]Markus Dürmuth, David Mandell Freeman:
Deniable Encryption with Negligible Detection Probability: An Interactive Construction. IACR Cryptol. ePrint Arch. 2011: 66 (2011) - 2010
- [c12]Michael Backes, Goran Doychev, Markus Dürmuth, Boris Köpf:
Speaker Recognition in Encrypted Voice Streams. ESORICS 2010: 508-523 - [c11]Michael Backes, Markus Dürmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder:
Acoustic Side-Channel Attacks on Printers. USENIX Security Symposium 2010: 307-322
2000 – 2009
- 2009
- [b1]Markus Dürmuth:
Novel classes of side channels and covert channels. Saarland University, 2009 - [c10]Boris Köpf, Markus Dürmuth:
A Provably Secure and Efficient Countermeasure against Timing Attacks. CSF 2009: 324-335 - [c9]Michael Backes, Tongbo Chen, Markus Dürmuth, Hendrik P. A. Lensch, Martin Welk:
Tempest in a Teapot: Compromising Reflections Revisited. SP 2009: 315-327 - [i3]Boris Köpf, Markus Dürmuth:
A Provably Secure And Efficient Countermeasure Against Timing Attacks. IACR Cryptol. ePrint Arch. 2009: 89 (2009) - 2008
- [j1]Michael Backes, Markus Dürmuth, Dennis Hofheinz, Ralf Küsters:
Conditional reactive simulatability. Int. J. Inf. Sec. 7(2): 155-169 (2008) - [c8]Michael Backes, Markus Dürmuth, Dominique Unruh:
OAEP Is Secure under Key-Dependent Messages. ASIACRYPT 2008: 506-523 - [c7]Michael Backes, Markus Dürmuth, Dominique Unruh:
Compromising Reflections-or-How to Read LCD Monitors around the Corner. SP 2008: 158-169 - 2007
- [c6]Michael Backes, Markus Dürmuth, Ralf Küsters:
On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography. FSTTCS 2007: 108-120 - [c5]Michael Backes, Markus Dürmuth, Dominique Unruh:
Information Flow in the Peer-Reviewing Process. S&P 2007: 187-191 - [i2]Michael Backes, Markus Dürmuth, Ralf Küsters:
On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography. IACR Cryptol. ePrint Arch. 2007: 233 (2007) - 2006
- [c4]Michael Backes, Markus Dürmuth, Dennis Hofheinz, Ralf Küsters:
Conditional Reactive Simulatability. ESORICS 2006: 424-443 - [i1]Michael Backes, Markus Dürmuth, Dennis Hofheinz, Ralf Küsters:
Conditional Reactive Simulatability. IACR Cryptol. ePrint Arch. 2006: 132 (2006) - 2005
- [c3]Michael Backes, Markus Dürmuth:
A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System. CSFW 2005: 78-93 - 2004
- [c2]Michael Backes, Markus Dürmuth, Rainer Steinwandt:
An Algebra for Composing Enterprise Privacy Policies. ESORICS 2004: 33-52 - [c1]Michael Backes, Markus Dürmuth, Günter Karjoth:
Unification in Privacy Policy Evaluation - Translating EPAL into Prolog. POLICY 2004: 185-188
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:06 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint