Author image not provided
 Rainer Böhme

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article6.49
Citation Count266
Publication count41
Publication years2004-2017
Available for download14
Average downloads per article524.93
Downloads (cumulative)7,349
Downloads (12 Months)823
Downloads (6 Weeks)132
SEARCH
ROLE
Arrow RightAuthor only
· Editor only
· Other only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


41 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 41
Result page: 1 2 3

Sort by:

1 published by ACM
November 2017 ACM Computing Surveys (CSUR): Volume 50 Issue 5, November 2017
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 57,   Downloads (12 Months): 131,   Downloads (Overall): 131

Full text available: PDFPDF
Cyber risk management largely reduces to a race for information between defenders of ICT systems and attackers. Defenders can gain advantage in this race by sharing cyber risk information with each other. Yet, they often exchange less information than is socially desirable, because sharing decisions are guided by selfish rather ...
Keywords: cyber risk management, Security information sharing

2 published by ACM
October 2017 CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 15,   Downloads (12 Months): 77,   Downloads (Overall): 77

Full text available: PDFPDF
Hosting providers play a key role in fighting web compromise, but their ability to prevent abuse is constrained by the security practices of their own customers. Shared hosting, offers a unique perspective since customers operate under restricted privileges and providers retain more control over configurations. We present the first empirical ...
Keywords: factor analysis, hosting providers, shared hosting, web security, empirical evaluation, patching, large-scale measurement

3 published by ACM
June 2017 IH&MMSec '17: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 6,   Downloads (12 Months): 32,   Downloads (Overall): 32

Full text available: PDFPDF
Although several methods have been proposed for the detection of resampling operations in multimedia signals and the estimation of the resampling factor, the fundamental limits for this forensic task leave open research questions. In this work, we explore the effects that a downsampling operation introduces in the statistics of a ...
Keywords: hypothesis distinguishability, signal resampling, kullback-leibler divergence, resampling forensics

4 published by ACM
October 2016 WISCS '16: Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 9,   Downloads (12 Months): 56,   Downloads (Overall): 142

Full text available: PDFPDF
In a world where cybersecurity can be reduced to a race for information, defenders with different information sets can benefit from sharing what they observe and know. However, defenders supposedly share less than what is socially desirable, thereby leaving parts of society insufficiently protected. The reason for this behavior is ...
Keywords: information sharing, security, economics

5 published by ACM
June 2016 IH&MMSec '16: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 8,   Downloads (12 Months): 70,   Downloads (Overall): 124

Full text available: PDFPDF
We address the known problem of detecting a previous compression in JPEG images, focusing on the challenging case of high and very high quality factors (>= 90) as well as repeated compression with identical or nearly identical quality factors. We first revisit the approaches based on Benford--Fourier analysis in the ...
Keywords: double compression, jpeg forensics, high quality images

6
April 2016 IEEE Transactions on Information Forensics and Security: Volume 11 Issue 4, April 2016
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0

According to conventional wisdom, content-adaptive embedding offers more steganographic security than random uniform embedding. We scrutinize this view and note that it is barely substantiated in the literature as only recently adaptive steganographic systems are tested against an attacker who anticipates the adaptivity and incorporates this knowledge into the detection ...

7
March 2016 IEEE Transactions on Dependable and Secure Computing: Volume 13 Issue 2, March 2016
Publisher: IEEE Computer Society Press
Bibliometrics:
Citation Count: 1

Cybercrime is a pervasive threat for today's Internet-dependent society. While the real extent and economic impact is hard to quantify, scientists and officials agree that cybercrime is a huge and still growing problem. A substantial fraction of cybercrime's overall costs to society can be traced to indirect opportunity costs, resulting ...

8 published by ACM
October 2015 WISCS '15: Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative Security
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 4,   Downloads (12 Months): 33,   Downloads (Overall): 135

Full text available: PDFPDF
New regulations mandating firms to share information on security breaches and security practices with authorities are high on the policy agenda around the globe. These initiatives are based on the hope that authorities can effectively advise and warn other firms, thereby strengthening overall defense and response to cyberthreats in an ...
Keywords: detective controls, mandatory security information sharing, preventive controls, externalities, policy, security investment, economics of information security, game theory

9 published by ACM
October 2014 ACM Transactions on Internet Technology (TOIT) - Special Issue on Pricing and Incentives in Networks and Systems and Regular Papers: Volume 14 Issue 2-3, October 2014
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 3,   Downloads (12 Months): 91,   Downloads (Overall): 368

Full text available: PDFPDF
We develop a formal nondeterministic game model for secure team composition to counter cyber-espionage and to protect organizational secrets against an attacker who tries to sidestep technical security mechanisms by offering a bribe to a project team member. The game captures the adversarial interaction between the attacker and the project ...
Keywords: Insider threat, cyber-espionage, game theory, access control, human factor, management of information security

10 published by ACM
June 2014 IH&MMSec '14: Proceedings of the 2nd ACM workshop on Information hiding and multimedia security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 23,   Downloads (Overall): 164

Full text available: PDFPDF
Symmetric steganographic communication requires a secret stego-key pre-shared between the communicating parties. Public-key steganography (PKS) overcomes this inconvenience. In this case, the steganographic security is based solely on the underlying asymmetric encryption function. This implies that the embedding positions are either public or hidden by clever coding, for instance using ...
Keywords: public-key steganography, wet paper codes, weighted stego-image steganalysis

11
December 2013 WINE 2013: Proceedings of the 9th International Conference on Web and Internet Economics - Volume 8289
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

The proliferation of Internet technology has created numerous new markets as social coordination mechanisms, including those where human decision makers and computer algorithms interact. Because humans and computers differ in their capabilities to emit and process complex market signals, there is a need to understand the determinants of the provision ...

12 published by ACM
June 2013 IH&MMSec '13: Proceedings of the first ACM workshop on Information hiding and multimedia security
Publisher: ACM
Bibliometrics:
Citation Count: 25
Downloads (6 Weeks): 8,   Downloads (12 Months): 88,   Downloads (Overall): 779

Full text available: PDFPDF
There has been an explosion of academic literature on steganography and steganalysis in the past two decades. With a few exceptions, such papers address abstractions of the hiding and detection problems, which arguably have become disconnected from the real world. Most published results, including by the authors of this paper, ...
Keywords: game theory, steganalysis, minimal distortion, optimal detection, security models, steganography

13
May 2012 IH'12: Proceedings of the 14th international conference on Information Hiding
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 3

Content-adaptive embedding is widely believed to improve steganographic security over uniform random embedding. However, such security claims are often based on empirical results using steganalysis methods not designed to detect adaptive embedding. We propose a framework for content-adaptive embedding in the case of imperfect steganography. It formally defines heterogeneity within ...
Keywords: content-adaptive steganography, security, game theory

14
November 2011 GameSec'11: Proceedings of the Second international conference on Decision and Game Theory for Security
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 5

Security games are characterized by multiple players who strategically adjust their defenses against an abstract attacker, represented by realizations of nature. The defense strategies include both actions where security generates positive externalities and actions that do not. When the players are assumed to be risk averse, market insurance enters as ...
Keywords: protection, externalities, security, market insurance, self-insurance, game theory

15 published by ACM
September 2011 NSPW '11: Proceedings of the 2011 New Security Paradigms Workshop
Publisher: ACM
Bibliometrics:
Citation Count: 9
Downloads (6 Weeks): 6,   Downloads (12 Months): 27,   Downloads (Overall): 521

Full text available: PDFPDF
Human attention is a scarce resource, and lack thereof can cause severe security breaches. As most security techniques rely on considerate human intervention in one way or another, this resource should be consumed economically. In this context, we postulate the view that every false alarm or unnecessary user interaction imposes ...
Keywords: attention economics, security warnings, HCI, policy, security economics, bounded rationality, notice and consent, interdisciplinary security and privacy, usable security

16
May 2011 IH'11: Proceedings of the 13th international conference on Information hiding
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 8

This paper summarizes several iterations in the cat-andmouse game between digital image forensics and counter-forensics related to an image's JPEG compression history. Building on the counterforensics algorithm by Stamm et al. [1], we point out a vulnerability in this scheme when a maximum likelihood estimator has no solution. We construct ...
Keywords: JPEG compression, counter-forensics, image forensics

17
February 2011 FC'11: Proceedings of the 15th international conference on Financial Cryptography and Data Security
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 2

This paper reports empirical evidence for peer effects in privacy behavior using field data from online social lending. Our content analysis and regression models show that individuals copy observable behavior of others in decisions on a) how much to write about oneself, b) whether to share custom pictures, c) what ...

18
November 2010 GameSec'10: Proceedings of the First international conference on Decision and game theory for security
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 4

Penetration testing, the deliberate search for potential vulnerabilities in a system by using attack techniques, is a relevant tool of information security practitioners. This paper adds penetration testing to the realm of information security investment. Penetration testing is modeled as an information gathering option to reduce uncertainty in a discrete ...

19
November 2010 IWSEC'10: Proceedings of the 5th international conference on Advances in information and computer security
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 9

Planning information security investment is somewhere between art and science. This paper reviews and compares existing scientific approaches and discusses the relation between security investment models and security metrics. To structure the exposition, the high-level security production function is decomposed into two steps: cost of security is mapped to a ...

20
June 2010 TRUST'10: Proceedings of the 3rd international conference on Trust and trustworthy computing
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 4

We analyze empirical data of Germany's largest online social lending platform Smava.de to exemplarily study the contribution of unstructured, ambiguous, or unverified information to trust building in online communities. After controlling for the influence of hard information, we find that textual statements that appeal to social behavior actually affect trust ...
Keywords: trust building, empirical study, personal data, content analysis, privacy, online social lending, reciprocity, social behavior, soft information



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us