Publications

Peer-reviewed publications

liOS: Lifting iOS Apps for Fun and Profit
Julian Schütte, Dennis Titze
Proceedings of the International Workshop on Secure Internet of Things (SIoT), Luxembourg, 2019
To be published

Annotary: A Concolic Execution System for Developing Secure Smart Contracts
Konrad Weiß, Julian Schütte
The European Symposium on Research in Computer Security (ESORICS), Luxembourg, 2019
[ Preprint ]

Osiris: Hunting for Integer Bugs in Ethereum Smart Contracts
Christof Ferreira Torres, Julian Schütte Radu State
Proceedings of the 34th Annual Computer Security Applications Conference (ACSAC), Puerto Rico, 2018
[ Paper ]

LUCON: Data Flow Control for Message-Based IoT Systems
Julian Schütte, Gerd Brost
Proceedings of the International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), New York, 2018
[ Paper (arXiv) ] [ Slides (PDF) ]

BDABE - Blockchain based Distributed Attribute-based Encryption
Georg Bramm, Mark Gall, Julian Schütte
Proceedings of 15th International Conference on Security and Cryptography (SECRYPT) 2018
[ Software: rABE crypto library ]

Blockchain for Education: Lifelong Learning Passport
Wolfgang Gräther, Sabine Kolvenbach, Rudolf Ruland, Julian Schütte, Christof Torres, Florian Wendland
Proceedings of 1st ERCIM Blockchain Workshop 2018 in Reports of the European Society for Socially Embedded Technologies: vol. 2, no. 10
[ Paper ]

Practical Application-Level Dynamic Taint Analysis of Android Apps
Julian Schütte, Alexander Küchler, Dennis Titze
Proceedings of the International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Sydney, 2017
[ PDF ]

Ordol: Obfuscation-Resilient Detection of Libraries in Android Applications
Dennis Titze, Michael Lux and Julian Schütte
Proceedings of the International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Sydney, 2017

A Taxonomy-based Approach for Security in Software-Defined Networking
Christian Banse, Julian Schütte
Proceedings of the IEEE International Conference on Communications (ICC), Paris, 2017

Test-based Cloud Service Certification of Opportunistic Providers
Philipp Stephanow, Gaurav Kumar Srivastava, Julian Schütte
Proceedings of the International Conference on Cloud Computing (CLOUD), San Francisco, 2016

A Data Usage Control System using Dynamic Taint Tracking
Julian Schütte, Gerd Stefan Brost
Proceedings of the International Conference on Advanced Information Network and Applications (AINA), Crans-Montana, 2016
[ PDF ]

Generating Threat Profiles for Cloud Service Certification Systems
Philipp Stephanow, Christian Banse, Julian Schütte
Proceedings of the IEEE 17th International Symposium on High Assurance Systems Engineering (HASE), Orlando, 2016

Preventing Library Spoofing on Android
Dennis Titze, Julian Schütte
Proceedings of the International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Helsinki, 2015

ConDroid: Targeted Dynamic Analysis of Android Applications
Julian Schütte, Rafael Fedler, Dennis Titze
Proceedings of the International Conference on Advanced Information Networking and Applications (AINA), Gwangju, 2015
[ PDF ]

Apparecium: Revealing Data Flows in Android Applications
Dennis Titze, Julian Schütte
Proceedings of the International Conference on Advanced Information Networking and Applications (AINA), Gwangju, 2015
[ PDF ]

AppCaulk: Data Leak Prevention by Injecting Targeted Taint Tracking Into
Android Apps

Julian Schütte, Dennis Titze, and J. M. de Fuentes
Proceedings of the International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Bejing, 2014
[ PDF ] [ Slides ]

An Antivirus API for Android Malware Recognition
Rafael Fedler, Marcel Kulicke, Julian Schütte
Proceedings of the 8th International Conference on Malicious and Unwanted Software (MALWARE), Puerto Rico, 2013
[ PDF ]

Native Code Execution Control for Attack Mitigation on Android
Rafael Fedler, Marcel Kulicke, and Julian Schütte
Proceedings of the 3rd Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Berlin, 2013

A Configurable and Extensible Security Service Architecture for Smartphones
Dennis Titze, Philipp Stephanow, Julian Schütte
Proceedings of the Seventh International Symposium on Frontiers in Networking with Applications (FINA 2013), Barcelona, 2013

Architecting an Security Strategy Measurement and Management System
Roland Rieke, Julian Schütte, Andrew Hutchison
Proceedings of the Model Driven Security Workshop (MDSec) at the ACM/IEEE 15th International Conference on Model Driven Engineering Languages & Systems (MODELS), Innsbruck, 2012

Model-based Security Event Management
Julian Schütte, Roland Rieke, Timo Winkelvos
Proceedings of the Sixth International Conference Mathematical Methods, Models, and Architectures for Computer Network Security (MMM-ACNS-2012), St. Petersburg, 2012

Security Policies in Dynamic Service Compositions
Julian Schütte, Mark Gall, Hervais Simo Fhom
Proceedings of the International Conference on Security and Cryptography (SECRYPT 2012), Rome, 2012

Goal-based Policies for Self-Protecting Systems
Julian Schütte
Proceedings of the 26th IEEE International Conference on Advanced Information Networking and Applications (AINA 2012), Fukuoka, 2012

Apollon: Towards a Semantically Extensible Policy Framework
Julian Schütte
Proceedings of the International Conference on Security and Cryptography (SECRYPT 2011), Sevilla, 2011

Auctions for Secure Multi-Party Policy Negotiation in Ambient Intelligence
Julian Schütte, Stephan Heuser
Proceedings of the Seventh International Symposium on Frontiers in Networking with Applications (FINA 2011), Singapore, 2011

QoS-aware Self-adaptation of Communication Protocols in a Pervasive Service Middleware
Weishan Zhang, Klaus Marius Hansen, João Fernandes, Julian Schütte, Francisco Milagro Lardis.
Proceedings of the IEEE/ACM International Conference on Green Computing and Communications (GreenCom 2010), Hangzhou, 2010

Authentic Refinement of Semantically Enhanced Policies in Pervasive Systems
Julian Schütte, Nicolai Kuntze, Andreas Fuchs, Atta Badii.
Proceedings of the 25th International Information Security Conference (IFIP SEC 2010), Brisbane 2010
[ PDF ]

A Description Logic based Approach on Handling Inter-Domain Policy Conflicts using Meta-Policies
Julian Schütte, Tobias Wahl.
IEEE Vehicular Technology Magazine, Volume 5, Number 3, pp. 68-74, September 2010
[ PDF ]

A Genetic Algorithms-based Approach for Optimized Self-protection in a Pervasive Service Middleware
Weishan Zhan, Julian Schütte, Mads Ingstrup, Klaus M. Hansen.
Proceedings of the Seventh International Conference on Service Oriented Computing (ICSoC) 2009

simTD Security Architecture: Deployment of a Security and Privacy Architecture in Field Operational Tests
Norbert Bißmeyer, Hagen Stuebing, Manuel Mattheß, Jan Peter Stotz, Julian Schütte, Matthias Gerlach, Florian Friederici.
Proceedings of the 7th ESCAR Embedded Security in Cars Conference, Düsseldorf, 2009

Towards Security in Decentralized Workflows
Zaharina Velikova, Julian Schütte, Nicolai Kuntze.
Proceedings of the International Conference on Ultra Modern Telecommunications (ICUMT) 2009

Security Mechanisms for an Ambient Environment Middleware
Tobias Wahl, Julian Schütte.
Workshop Proceedings of the 32nd Annual Conference on Artificial Intelligence (KI), International Workshop on Distributed Computing in Ambient Environments (DiComAe) 2009

Securing Decentralized Workflows in Ambient Environments
Nicolai Kuntze, Julian Schütte.
International Symposium on Trust, Security and Privacy for Pervasive Applications (TSP), 2008

Security Made Easy: Achieving User-Friendly Communication Protection in Ad-Hoc situations
Julian Schütte, Jens Heider.
International Conference on Emerging Security Information, Systems and Technologies (SECURWARE), 2007

On Path-Centric Navigation and Search Techniques for Personal Knowledge Stored in Topic Maps
Jens Heider, Julian Schütte.
Topic Maps Research and Applications (TMRA), 2007

Towards Semantic Resolution of Security in Ambient Environments
M. Hoffmann, M. Mattheß, J. Schütte, A. Badii, R. Nair, D. Thiemert, S. Engberg.
Ambient Intelligence Developments (Ami.D) 2007

Non-peer reviewed tech reports

App-Ray: User-driven and fully automated Android app security assessment
Dennis Titze, Philipp Stephanow, Julian Schütte
Fraunhofer AISEC TechReport May 2014
[ PDF ]

On the Effectiveness of Malware Protection on Android. An Evaluation of Android Antivirus Apps
Rafael Fedler, Marcel Kulicke, Julian Schütte
Fraunhofer AISEC TechReport, April 2013
[ PDF ]

Non-peer reviewed magazine articles

NFC? Aber sicher.
Julian Schütte. Datenschutz und Datensicherheit (DuD), Volume 38, Issue 1, pp. 20-24, January 2014
[ Link ]

Blick unter die Haube
Werkzeuge und Verfahren zur Sicherheitsanalyse von Android-Apps
Julian Schütte, Dennis Titze. iX 11/2013

Books & Chapters

A Case for IoT Security Assurance
Claudio A. Ardagna, Ernesto Damiani, Julian Schütte, and Philipp Stephanow
In: Di Martino, Kuan-Ching, Yang, Esposito (edts.). Internet of Everything.
Springer Singapore
ISBN: 978-981-10-5861-5
[ Link ]

Sichere Business-Apps unter Android
Julian Schütte, Jörn Eichler, Dennis Titze
In: Mobile Anwendungen in Unternehmen: Konzepte und betriebliche Einsatzszenarien
Springer Verlag, 2016 ISBN: 978-3-658-12010-8

Sichere Bluetooth-Kommunikation in Ad-hoc-Situationen
Julian Schütte. VDM Verlag, 2008,
ISBN: 978-3-639-04436-2