Research Associate / Post-Doctoral Researcher
Contact: zimmer(at)peasec.tu-darmstadt.de
Technical University of Darmstadt, Department of Computer Science,
Science and Technology for Peace and Security (PEASEC)
Pankratiusstrasse 2, 64289 Darmstadt, Room
EN
DE
Publications
Former Publications:
-
Gaballah, Sarah Abdelwahab; Abdullah, Lamya; Alishahi, Mina; Nguyen, Thanh Hoang Long; Zimmer, Ephraim; Mühlhäuser, Max; Marky, Karola (2024):
Anonify: Decentralized Dual-level Anonymity for Medical Data Donation.
In: Proceedings on Privacy Enhancing Technologies, 2024 (3), pp. 94-108, PET Symposium, The 24th Privacy Enhancing Technologies Symposium, Bristol, UK, 15.07.2024-20.07.2024, e-ISSN 2299-0984, DOI: 10.56553/popets-2024-0069, Article -
Khalil, Ahmad; Wainakh, Aidmar; Zimmer, Ephraim; Parra-Arnau, Javier; Fernández Anta, Antonio; Meuser, Tobias; Steinmetz, Ralf (2023):
Label-Aware Aggregation for Improved Federated Learning.
8th International Conference on Fog and Mobile Edge Computing, Tartu, Estonia, 18.09.2023-20.09.2023, Conference or Workshop Item -
Gaballah, Sarah Abdelwahab; Nguyen, Thanh Hoang Long; Abdullah, Lamya; Zimmer, Ephraim; Mühlhäuser, Max (2023):
Mitigating Intersection Attacks in Anonymous Microblogging.
In: ARES ’23: Proceedings of the 18th International Conference on Availability, Reliability and Security, ACM, 18th International Conference on Availability, Reliability and Security, Benevento, Italy, 29.08.2023-01.09.2023, ISBN 979-8-4007-0772-8, DOI: 10.1145/3600160.3600166, Official URL, Conference or Workshop Item -
Wainakh, Aidmar; Zimmer, Ephraim; Subedi, Sandeep; Keim, Jens; Grube, Tim; Karuppayah, Shankar; Sanchez Guinea, Alejandro; Mühlhäuser, Max (2023):
Federated Learning Attacks Revisited: A Critical Discussion of Gaps, Assumptions, and Evaluation Setups.
In: Sensors, 23 (1), MDPI, ISSN 1424-8220, DOI: 10.3390/s23010031, Official URL, Article -
Wainakh, Aidmar; Ventola, Fabrizio; Müßig, Till; Keim, Jens; Carcia Cordero, Carlos; Zimmer, Ephraim; Grube, Tim; Kersting, Kristian; Mühlhäuser, Max (2022):
User-Level Label Leakage from Gradients in Federated Learning.
In: Proceedings on Privacy Enhancing Technologies (PETS) 2022, 2022 (2), pp. 227-244, De Gruyter Open, e-ISSN 2299-0984, DOI: 10.2478/popets-2022-0043, Article -
Wainakh, Aidmar; Ventola, Fabrizio; Müßig, Till; Keim, Jens; Garcia Cordero, Carlos; Zimmer, Ephraim; Grube, Tim; Mühlhäuser, Max (2022):
User-Level Label Leakage from Gradients in Federated Learning.
In: Cryptography and Security, arXiv, DOI: 10.48550/arXiv.2105.09369, Report -
Gaballah, Sarah Abdelwahab; Abdullah, Lamya; Tran, Minh Tung; Zimmer, Ephraim; Mühlhäuser, Max (2022):
On the Effectiveness of Intersection Attacks in Anonymous Microblogging.
In: Lecture Notes in Computer Science, 13700, In: Secure IT Systems, pp. 3-19, Springer, 27th Nordic Conference on Secure IT Systems (NordSec 2022), Reykjavic, Iceland, 30.11.2022-02.12.2022, ISSN 0302-9743, ISBN 978-3-031-22294-8, DOI: 10.1007/978-3-031-22295-5_1, Conference or Workshop Item -
Insiders Dissected: New Foundations and a Systematisation of the Research on Insiders.
In: Digital Threats: Research and Practice, 3 (1), ACM, New York, NY, USA, ISSN 2692-1626, DOI: 10.1145/3473674, Article -
Zimmer, Ephraim (2021):
Datenschutzfreundliche Erkennung und Abwehr von Insiderbedrohungen.
pp. Online-Ressource, Hamburg, Staats- und Universitätsbibliothek Hamburg Carl von Ossietzky, Fachbereich Informatik, Hamburg, Official URL, Ph.D. Thesis -
PEEPLL: Privacy-Enhanced Event Pseudonymisation with Limited Linkability.
In: SAC’20 : Proceedings of the 35th Annual ACM Symposium on Applied Computing, pp. 1308-1311, ACM, 35th ACM/SIGAPP Symposium on Applied Computing, virtual Conference, 30.04.2020-03.04.2020, ISBN 978-1-4503-6866-7, DOI: 10.1145/3341105.3375781, Conference or Workshop Item -
Using Context and Provenance to Defend Against USB-borne Attacks.
In: ARES ’19 : Proceedings of the 14th International Conference on Availability, Reliability and Security, ACM, 14th International Conference on Availability, Reliability and Security, Canterbury, United Kingdom, 26.08.2019-29.08.2019, ISBN 978-1-4503-7164-3, DOI: 10.1145/3339252.3339268, Conference or Workshop Item -
Marx, Matthias; Zimmer, Ephraim; Mueller, Tobias; Blochberger, Maximilian; Federrath, Hannes
Langweg, Hanno; Meier, Michael; Witt, Bernhard C.; Reinhardt, Delphine (eds.) (2018):Hashing of personally identifiable information is not sufficient.
In: LNI-Proceedings, P-281, In: SICHERHEIT 2018 : Sicherheit, Schutz und Zuverlässigkeit : Beiträge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), pp. 55-68, Gesellschaft für Informatik e.V., 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V., Konstanz, Germany, 25.04.2018-27.04.2018, ISBN 978-3-88579-675-6, DOI: 10.18420/sicherheit2018_04, Conference or Workshop Item -
Herrmann, Dominik; Lindemann, Jens; Zimmer, Ephraim; Federrath, Hannes
Camenisch, Jan; Kesdogan, Dogan (eds.) (2016):Anonymity Online for Everyone: What Is Missing for Zero-Effort Privacy on the Internet?.
In: Open Problems in Network Security : IFIP WG 11.4 International Workshop, iNetSec 2015, pp. 82-94, Springer, International Workshop on Open Problems in Network Security (iNetSec 2015), Zurich, Switzerland, 29.10.2015-29.10.2015, ISBN 978-3-319-39027-7, DOI: 10.1007/978-3-319-39028-4_7, Conference or Workshop Item -
Zimmer, Ephraim; Lindemann, Jens; Herrmann, Dominik; Federrath, Hannes
Camenisch, Jan; Kesdogan, Dogan (eds.) (2016):Catching Inside Attackers: Balancing Forensic Detectability and Privacy of Employees.
In: Open Problems in Network Security : IFIP WG 11.4 International Workshop, iNetSec 2015, pp. 43-55, Springer, International Workshop on Open Problems in Network Security (iNetSec 2015), Zurich, Switzerland, 29.10.2015-29.10.2015, ISBN 978-3-319-39027-7, DOI: 10.1007/978-3-319-39028-4_4, Conference or Workshop Item -
Zimmer, Ephraim
Paulsen, Christian (eds.) (2015):Post-Quantum Kryptographie für IPsec.
In: Sicherheit in vernetzten Systemen : 22. DFN-Konferenz, Books on Demand, 22. DFN-Konferenz “Sicherheit in vernetzten Systemen”, Hamburg, Germany, 24.02.2015-25.02.2015, ISBN 978-3-7347-5309-1, Conference or Workshop Item