@article{WeberMuellerBahnsetal.2023, author = {Weber, Franziska and M{\"u}ller, Carsten and Bahns, Carolin and Kopkow, Christian and F{\"a}rber, Francesca and Gellert, Paul and Otte, Ina and Vollmar, Horst Christian and Brannath, Werner and Diederich, Freya and Kloep, Stephan and Rothgang, Heinz and Dieter, Valerie and Krauß, Inga and Kloek, Corelien and Veenhof, Cindy and Collisi, Sandra and Repschl{\"a}ger, Ute and B{\"o}binger, Hannes and Gr{\"u}neberg, Christian and Thiel, Christian and Peschke, Dirk}, title = {Smartphone-assisted training with education for patients with hip and/or knee osteoarthritis (SmArt-E): study protocol for a multicentre pragmatic randomized controlled trial}, series = {BMC Musculoskeletal Disorders}, journal = {BMC Musculoskeletal Disorders}, number = {24}, doi = {10.1186/s12891-023-06255-7}, pages = {1 -- 23}, year = {2023}, abstract = {Introduction Hip and knee osteoarthritis are associated with functional limitations, pain and restrictions in quality of life and the ability to work. Furthermore, with growing prevalence, osteoarthritis is increasingly causing (in)direct costs. Guidelines recommend exercise therapy and education as primary treatment strategies. Available options for treatment based on physical activity promotion and lifestyle change are often insufficiently provided and used. In addition, the quality of current exercise programmes often does not meet the changing care needs of older people with comorbidities and exercise adherence is a challenge beyond personal physiotherapy. The main objective of this study is to investigate the short- and long-term (cost-)effectiveness of the SmArt-E programme in people with hip and/or knee osteoarthritis in terms of pain and physical functioning compared to usual care. Methods This study is designed as a multicentre randomized controlled trial with a target sample size of 330 patients. The intervention is based on the e-Exercise intervention from the Netherlands, consists of a training and education programme and is conducted as a blended care intervention over 12 months. We use an app to support independent training and the development of self-management skills. The primary and secondary hypotheses are that participants in the SmArt-E intervention will have less pain (numerical rating scale) and better physical functioning (Hip Disability and Osteoarthritis Outcome Score, Knee Injury and Osteoarthritis Outcome Score) compared to participants in the usual care group after 12 and 3 months. Other secondary outcomes are based on domains of the Osteoarthritis Research Society International (OARSI). The study will be accompanied by a process evaluation. Discussion After a positive evaluation, SmArt-E can be offered in usual care, flexibly addressing different care situations. The desired sustainability and the support of the participants' behavioural change are initiated via the app through audio-visual contact with their physiotherapists. Furthermore, the app supports the repetition and consolidation of learned training and educational content. For people with osteoarthritis, the new form of care with proven effectiveness can lead to a reduction in underuse and misuse of care as well as contribute to a reduction in (in)direct costs. Trial registration German Clinical Trials Register, DRKS00028477. Registered on August 10, 2022.}, language = {en} } @incollection{BenensonDewaldEsseretal.2011, author = {Benenson, Zinaida and Dewald, Andreas and Eßer, Hans-J{\"u}rgen and Felix, C. and Freiling, Tilo and M{\"u}ller, Christian and Moch, Stefan and Vomel, Sebastian and Schinzel, Miachel and Spreitzenbach, Ben}, title = {Exploring the Landscape of Cybercrime}, series = {SysSec Workshop (SysSec), 2011 First}, booktitle = {SysSec Workshop (SysSec), 2011 First}, doi = {10.1109/SysSec.2011.23}, year = {2011}, language = {en} } @incollection{PoddebniakDresenMuelleretal.2018, author = {Poddebniak, Damian and Dresen, Christian and M{\"u}ller, Jens and Ising, Fabian and Schinzel, Sebastian and Friedberg, Simon and Somorovsky, Juraj and Schwenk, J{\"o}rg}, title = {Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels}, series = {USENIX Security 2018}, booktitle = {USENIX Security 2018}, edition = {27th}, address = {Baltimore, MD, USA}, isbn = {978-1-931971-46-1}, year = {2018}, language = {en} } @article{SquillanteJuestelRRAndersonetal.2018, author = {Squillante, M. and J{\"u}stel, T. and R.R. Anderson, and Brecher, C. and Chartier, D. and Christian, J. F. and Ciccehti, N. and Espinoza, S. and McAdams, D. R. and M{\"u}ller, M. and Tornifolgio, B. and Wang, Y. and Purschke, M.}, title = {Fabrication and Characterization of UV Emitting Nanoparticles as Novel Radiation Sensitizers Targeting Hypoxic Tumor Cells}, series = {Opt. Materials}, volume = {80}, journal = {Opt. Materials}, doi = {10.1016/j.optmat.2018.04.033}, pages = {197 -- 202}, year = {2018}, language = {en} } @inproceedings{MuellerIsingMldadenovetal.2019, author = {M{\"u}ller, Jens and Ising, Fabian and Mldadenov, Vladislav and Mainka, Christian and Schinzel, Sebastian and Schwenk, J{\"o}rg}, title = {Practical Decryption exFiltration: Breaking PDF Encryption}, series = {The 26th ACM Conference on Computer and Communications, Security (CCS 2019), London, United Kingdom}, booktitle = {The 26th ACM Conference on Computer and Communications, Security (CCS 2019), London, United Kingdom}, doi = {10.1145/3319535.3354214}, year = {2019}, abstract = {The Portable Document Format, better known as PDF, is one of themost widely used document formats worldwide, and in order to en-sure information confidentiality, this file format supports documentencryption. In this paper, we analyze PDF encryption and showtwo novel techniques for breaking the confidentiality of encrypteddocuments. First, we abuse the PDF feature ofpartially encrypteddocuments to wrap the encrypted part of the document withinattacker-controlled content and therefore, exfiltrate the plaintextonce the document is opened by a legitimate user. Second, we abusea flaw in the PDF encryption specification to arbitrarily manipulateencrypted content. The only requirement is that a single block ofknown plaintext is needed, and we show that this is fulfilled bydesign. Our attacks allow the recovery of the entire plaintext of en-crypted documents by using exfiltration channels which are basedon standard compliant PDF properties.We evaluated our attacks on 27 widely used PDF viewers andfound all of them to be vulnerable. We responsibly disclosed thevulnerabilities and supported the vendors in fixing the issue}, language = {en} } @inproceedings{MuellerIsingMla­de­novetal.2020, author = {M{\"u}ller, Jens and Ising, Fabian and Mla­de­nov, Vla­dis­lav and Mainka, Chris­ti­an and Schinzel, Sebastian and Schwenk, J{\"o}rg}, title = {Of­fice Do­cu­ment Se­cu­ri­ty and Pri­va­cy}, series = {14th USE­NIX Work­shop on Of­fen­si­ve Tech­no­lo­gies (WOOT 2020)}, booktitle = {14th USE­NIX Work­shop on Of­fen­si­ve Tech­no­lo­gies (WOOT 2020)}, publisher = {USENIX}, year = {2020}, abstract = {OOXML and ODF are the de facto standard data formats for word processing, spreadsheets, and presentations. Both are XML-based, feature-rich container formats dating back to the early 2000s. In this work, we present a systematic analysis of the capabilities of malicious office documents. Instead of focusing on implementation bugs, we abuse legitimate features of the OOXML and ODF specifications. We categorize our attacks into five classes: (1) Denial-of-Service attacks affecting the host on which the document is processed. (2) Invasion of privacy attacks that track the usage of the document. (3) Information disclosure attacks exfiltrating personal data out of the victim's computer. (4) Data manipulation on the victim's system. (5) Code execution on the victim's machine. We evaluated the reference implementations - Microsoft Office and LibreOffice - and found both of them to be vulnerable to each tested class of attacks. Finally, we propose mitigation strategies to counter these attacks.}, language = {en} } @article{BrinkmannDresenMergetetal.2021, author = {Brinkmann, Marcus and Dresen, Christian and Merget, Robert and Poddebniak, Damian and M{\"u}ller, Jens and Somorovsky, Juraj and Schwenk, J{\"o}rg and Schinzel, Sebastian}, title = {ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication}, series = {30th USENIX Security Symposium}, journal = {30th USENIX Security Symposium}, year = {2021}, language = {en} }