Article in Journal
Böhme, R., Laube, S., & Riek, M. (2018). A Fundamental Approach to Cyber Risk Analysis. Variance, 11(2). (In press)
More details BibTeX Full text
Böhme, R., Laube, S., & Riek, M. (2018). A Fundamental Approach to Cyber Risk Analysis. Variance, 11(2). (In press)
More details BibTeX Full text
Machuletz, D., Laube, S., & Böhme, R. (2018). Webcam Covering as Planned Behavior. In Proceedings of the Conference on Human Factors in Computing Systems (ACM CHI), Montreal, Canada. (In press)
More details BibTeX DOI
Böhme, R., & Pesch, P. (2017). Technische Grundlagen und datenschutzrechtliche Fragen der Blockchain-Technologie. DuD, 2017(7). (In press)
More details BibTeX Full text
Laube, S., & Böhme, R. (2017). Strategic Aspects of Cyber Risk Information Sharing. ACM Computing Surveys, 50(5).
More details BibTeX Full text DOI
Pesch, P., & Böhme, R. (2017). Datenschutz trotz öffentlicher Blockchain? — Chancen und Risiken bei der Verfolgung und Prävention Bitcoin-bezogener Straftaten. DuD, 2017(2), 93–98.
More details BibTeX
August, T., Dao, D., Laube, S., & Niculescu, M. (2017). Economics of Ransomware Attacks. In Proceedings of the Workshop on Information Systems and Economics (WISE), Seoul, Korea. (Accepted)
More details BibTeX
Yildiz, E., & Böhme, R. (2017). Effects of Information Security Risk Visualization on Managerial Decision Making. In Proceedings of the 2nd European Workshop on Usable Security (EuroUSEC), Paris, Frankreich.
More details BibTeX Full text DOI
Laube, S. (2017). Cyber Risk Information Sharing with Authorities.
More details BibTeX Full text
Pesch, (2017). Cryptocoin-Schulden — Haftung und Risikoverteilung bei der Verschaffung von Bitcoins und Alt-Coins. Information und Recht: Vol. 85. München: C.H.Beck. (In press)
More details BibTeX
Böhme, R., Grzywotz, J., Pesch, P., Rückert, C., & Safferling, C. (2017). Prävention von Straftaten mit Bitcoins und Alt-Coins — Handlungsempfehlung zur Regulierung virtueller Kryptowährungen im Rahmen des Projekts BITCRIME (Teilprojekt Deutschland) — Bitcoin and Alt-Coin Crime Prevention — A Recommendation for the Regulation of Virtual Cryptocurrencies in the context of the BITCRIME project (German Subproject).
More details BibTeX Full text
Laube, S., & Böhme, R. (2016). The Economics of Mandatory Security Breach Reporting to Authorities. Journal of Cybersecurity, 2(1), 29–41.
More details BibTeX Full text DOI
Riek, M., Bohme, R., & Moore, T. (2016). Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance. Dependable and Secure Computing, IEEE Transactions on, 13(2), 261–273.
More details BibTeX Full text DOI
Carnein, M., Schöttle, P., & Böhme, R. (2016). Telltale Watermarks for Counting JPEG Compressions. In Proceedings of the IS&T Electronic Imaging: Media Watermarking, Security, and Forensics (EI '16), San Francisco, CA, 1–10.
More details BibTeX DOI
Machuletz, D., Sendt, H., Laube, S., & Böhme, R. (2016). Users Protect Their Privacy If They Can: Determinants of Webcam Covering Behavior. In Proceedings of the 1st European Workshop on Usable Security (EuroUSEC), Internet Society, Darmstadt, Germany.
More details BibTeX Full text DOI
McCorry, P., Möser, M., Shahandasti, S. F., & Hao, F. (2016). Towards Bitcoin Payment Networks. In Proceedings of the 21st Australasian Conference on Information Security and Privacy (ACISP 2016), Melbourne, Australia. (Accepted)
More details BibTeX Full text
Möser, M., & Böhme, R. (2016). Join Me on a Market for Anonymity. In Proceedings of the Workshop on the Economics of Information Security (WEIS), University of California at Berkeley. (Accepted)
More details BibTeX
Möser, M., Eyal, I., & Sirer, E. G. (2016). Bitcoin Covenants. In Proceedings of the 3rd Workshop on Bitcoin and Blockchain Research, affiliated with the 20th International Conference on Financial Cryptography and Data Security, Barbados.
More details BibTeX
Riek, M., Böhme, R., Ciere, M., Ganan, C., & and, v. E. M. (2016). Estimating the Costs of Consumer-facing Cybercrime: A Tailored Instrument and Representative Data for Six EU Countries. In Proceedings of the Workshop on the Economics of Information Security (WEIS), University of California at Berkeley. (Accepted)
More details BibTeX Full text
Böhme, R., Christin, N., Edelman, B., & Moore, T. (2015). Bitcoin: Economics, Technology, and Governance. Journal of Economic Perspectives, 29(2), 213–38.
More details BibTeX Full text DOI
Carnein, M., Schöttle, P., & Böhme, R. (2015). Forensics of High-Quality JPEG Images with Color Subsampling. In Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS '15), Rome, Italy, 1–6.
More details BibTeX DOI
Hils, M. (2015). A Security Analysis of Cloud Storage Services. In Proceedings of the 22. DFN-Konferenz „Sicherheit in vernetzten Systemen“, Hamburg, Deutschland, I-1-I-23.
More details BibTeX
Laube, S., & Böhme, R. (2015). Meldepflichten für IT-Sicherheitsvorfälle: Ein Prinzipal-Agent-Ansatz. In Proceedings of the 12. Internationale Tagung Wirtschaftsinformatik, Osnabrück, Deutschland, 1146–1162.
More details BibTeX Full text
Laube, S., & Böhme, R. (2015). The Economics of Mandatory Security Breach Reporting to Authorities. In Proceedings of the 14th Workshop on the Economics of Information Security (WEIS), Delft, Netherlands. (Accepted)
More details BibTeX Full text
Laube, S., & Böhme, R. (2015). Mandatory Security Information Sharing with Authorities: Implications on Investments in Internal Controls. In Proceedings of the ACM Conference on Computer and Communication Security (ACM CCS), 2nd Workshop on Information Sharing and Collaborative Security, Denver, Colorado.
More details BibTeX Full text DOI
Möser, M., & Böhme, R. (2015). Trends, Tips, Tolls: A Longitudinal Study of Bitcoin Transaction Fees. In Proceedings of the 2nd Workshop on Bitcoin Research, affiliated with the 19th International Conference on Financial Cryptography and Data Security, Puerto Rico.
More details BibTeX Full text
Boehm, P. (2014). Bitcoins: Rechtliche Herausforderungen einer virtuellen Währung. MMR, 2014, 75–79.
More details BibTeX
Gloe, T., Fischer, A., & Kirchner, M. (2014). Forensic Analysis of Video File Formats. Digital Investigation, 11(Supplement 1), S68-S76.
More details BibTeX Full text DOI
Laszka, A., Johnson, B., Schöttle, P., Grossklags, J., & Böhme, R. (2014). Secure Team Composition to Thwart Insider Threats and Cyber-Espionage. ACM Transactions on Internet Technology, 14(2-3), 19:1-22.
More details BibTeX DOI
Pesch, (2014). IT-Vertragsrecht, in: Hoeren/Buchmüller (Hrsg.), Entwicklung der Internet- und Multimediarechts im Jahr 2013. MMR-Beilage, 5/2014, 3–5.
More details BibTeX
Boehm, F., & Böhme, R. (2014). Improving Informed Consent for Consumers in E-Commerce — An Interdisciplinary Perspective. In Proceedings of the Privacy Law Scholars Conference (PLCS), Washington, DC.
More details BibTeX Full text
Boehm, P. (2014). Bitcoin: A First Legal Analysis — with references to German and US-American Law. In Proceedings of the 1st Workshop on Bitcoin Research in Assocation with Financial Crypto 2014, Barbados.
More details BibTeX Full text
Carnein, M., Schöttle, P., & Böhme, R. (2014). Predictable Rain? Steganalysis of Public-key Steganography Using Wet Paper Codes. In Unterweger, A., Uhl, A., Katzenbeisser, S., Kwitt, R., & Piva, A. (Eds.), Proceedings of the 2nd ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec '14) (pp. 97–108). New York, NY, USA: ACM.
More details BibTeX DOI
Fechner, N., & Kirchner, M. (2014). The Humming Hum: Background Noise as a Carrier of ENF Artifacts in Mobile Device Audio Recordings. In Proceedings of the 8th International Conference on IT Security Incident Management & IT Forensics (IMF), Münster, 3–13.
More details BibTeX Full text DOI
Kirchner, M., & Böhme, R. (2014). Steganalysis in Technicolor: Boosting WS Detection of Stego Images from CFA-Interpolated Covers. In Proceedings of the 2014 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Florence, Italy, 4010–4014.
More details BibTeX Full text DOI
Korff, S., & Böhme, R. (2014). Too Much Choice: End-User Privacy Decisions in the Context of Choice Proliferation. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS), Menlo Park, CA, USA.
More details BibTeX Full text
Luhn, S., Bruns, I., & Böhme, R. (2014). Consumer Participation in Online Contracts — Exploring Cross-Out Clauses. In Proceedings of the GI Sicherheit 2014, Wien, Österreich, 255–270.
More details BibTeX
Möser, M., Böhme, R., & Breuker, D. (2014). Towards Risk Scoring of Bitcoin Transactions. In Proceedings of the 1st Workshop on Bitcoin Research in Assocation with Financial Crypto 14, Barbados, 1–16.
More details BibTeX
Quiring, E., & Schöttle, P. (2014). On the Combination of Randomized Thresholds and Non-Parametric Boundaries to Protect Digital Watermarks against Sensitivity Attacks. In Proceedings of the Information Hiding and Multimedia Security Workshop, Salzburg, Austria, 41–48.
More details BibTeX
Riek, M., Böhme, R., & Moore, T. (2014). Understanding the Influence of Cybercrime Risk on the E-Service Adoption of European Internet Users. In Proceedings of the 13th Workshop on the Economics of Information Security (WEIS), The Pennsylvania State University, State College, Pennsylvania. (Accepted)
More details BibTeX Full text
Böhme, R., & Laube, S. (2014). Das IT-Sicherheitsgesetz. In Baetge, J., & Kirsch, H.-J. (Eds.), Mittelstand im Blick: Compliance und Risikomanagement (pp. 17–36). Düsseldorf: IDW Verlag.
More details BibTeX
Böhme, R., & Luhn, S. (2014). Die Privatssphäre des Verbrauchers — Ein Luxusgut?. In Bala, C., & Müller, K. (Eds.), Der gläserne Verbraucher — Wird Datenschutz zum Verbraucherschutz? (pp. 41–56). Beiträge zur Verbraucherforschung: Vol. 1. Düsseldorf: Verbraucherzentrale NRW.
More details BibTeX
Ryu, S.-J., Kirchner, M., Lee, M.-J., & Lee, H.-K. (2013). Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments. IEEE Transactions on Information Forensics and Security, 8(8), 1355–1370.
More details BibTeX Full text DOI
Böhme, R. (2013). Internet Protocol Adoption: Learning from Bitcoin. In Proceedings of the IAB Workshop on Internet Technology Adoption and Transition (ITAT), Cambridge, UK.
More details BibTeX
Bruns, I., & Luhn, S. (2013). Verbraucherschutz durch Mitentscheidung bei Online-Verträgen. In Proceedings of the Law as a Service (LaaS) — Recht im Internet- und Cloud-Zeitalter, Tagungsband Herbstakademie 2013, Berlin, 859–874.
More details BibTeX
Ker, A. D., Bas, P., Böhme, R., Cogranne, R., Craver, S., Filler, T., Fridrich, J., & Pevny, T. (2013). Moving steganography and steganalysis from the laboratory into the real world. In Proceedings of the 1st ACM Workshop on Information Hiding and Multimedia Security, Montpellier, France, 45–58.
More details BibTeX DOI
Kirchner, M., Winkler, P., & Farid, H. (2013). Impeding Forgers at Photo Inception. In Proceedings of the Media Watermarking, Security, and Forensics 2013, San Francisco, CA.
More details BibTeX Full text DOI
Korff, S. (2013). PETs in Your Home — How Smart is That?. In Proceedings of the Workshop on Home Usable Privacy and Security (HUPS), Newcastle, UK.
More details BibTeX
Lai, S., & Böhme, R. (2013). Block convergence in repeated transform coding: JPEG-100 forensics, carbon dating, and tamper detection. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2013, Vancouver, BC, Canada, 3028–3032.
More details BibTeX DOI
Laszka, A., Johnson, B., Schöttle, P., Grossklags, J., & Böhme, R. (2013). Managing the weakest link: A game-theoretic approach for the mitigation of insider threats. In Proceedings of the 18th European Symposium on Research in Computer Security, ESORICS 2013, Egham, Großbritannien, 273–290.
More details BibTeX Full text DOI
Möser, M., Böhme, R., & Breuker, D. (2013). An Inquiry into Money Laundering Tools in the Bitcoin Ecosystem. In Proceedings of the APWG eCrime Researchers Summit (ECRIME 2013), San Francisco, USA.
More details BibTeX
Schöttle, P., Laszka, A., Johnson, B., Grossklags, J., & Boehme, R. (2013). A Game-Theoretic Analysis of Content-Adaptive Steganography with Independent Embedding. In Proceedings of the 21th European Signal Processing Conference (EUSIPCO), 2013, Marrakech, Morocco. (In press)
More details BibTeX
Böhme, R. (Ed.) (2013). The Economics of Information Security and Privacy. Berlin Heidelberg: Springer.
More details BibTeX
Kirchner, M., & Ghosal, D. (Eds.) (2013). Information Hiding, 14th International Conference, IH 2012, Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers. Lecture Notes in Computer Science: Vol. 7692. Berlin, Heidelberg: Springer-Verlag.
More details BibTeX
Böhme, R., & Grossklags, J. (2013). Trading Agent Kills Market Information: Evidence from Online Social Lending. In Chen, Y., & Immorlica, N. (Eds.), Web and Internet Economics, 9th International Conference, WINE 2013, Cambridge, MA, USA (pp. 68–81). Lecture Notes in Computer Science: Vol. 8289. Berlin Heidelberg: Springer.
More details BibTeX
Böhme, R., & Kirchner, M. (2013). Counter-Forensics: Attacking Image Forensics. In Sencar, H. T., & Memon, N. D. (Eds.), Digital Image Forensics: There is More to a Picture Than Meets the Eye (pp. 327–366). New York: Springer.
More details BibTeX Full text DOI
Johnson, B., Schöttle, P., Laszka, A., Grossklags, J., & Böhme, R. (2013). Bitspotting: Detecting Optimal Adaptive Steganography. In Shi, Y. Q., Kim, H.-J., & Pérez-González, F. (Eds.), Digital Forensics and Watermaking (pp. 1–15). Lecture Notes in Computer Science. Berlin Heidelberg: Springer. (In press)
More details BibTeX
Schöttle, P., & Böhme, R. (2013). Die totale Transparenz. In Dabrowski, M., Wolf, J., & Abmeier, K. (Eds.), Ethische Herausforderungen im Web 2.0 (pp. 1–23). Schöningh. (In press)
More details BibTeX
Anderson, R., Barton, C., Böhme, R., Clayton, R., Eeten, M. v., Levi, M., Moore, T., & Savage, S. (2012). Measuring the Cost of Cybercrime. In Proceedings of the Workshop of Economics and Information Security (WEIS), Berlin.
More details BibTeX
Becker, J., Breuker, D., Heide, T., Holler, J., Rauer, H. P., & Böhme, R. (2012). Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency. In Proceedings of the Workshop on the Economics of Information Security (WEIS) 2012, Berlin, Deutschland, 1–17.
More details BibTeX Full text
Böhme, R., & Moore, T. (2012). How Do Consumers React to Cybercrime?. In Proceedings of the APWG eCrime Researchers Summit (ECRIME 2012), Las Croabas.
More details BibTeX
Schöttle, P., Korff, S., & Böhme, R. (2012). Weighted Stego-Image Steganalysis for Naive Content-Adaptive Embedding. In Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS), Teneriffa, 193–198.
More details BibTeX
Böhme, R. (2012). Security Audits Revisited. In Keromytis, A. (Ed.), Proceedings of Financial Cryptography and Data Security (pp. 129–147). Lecture Notes in Computer Science: Vol. 7397. Berlin Heidelberg: Springer.
More details BibTeX
Johnson, B., Schöttle, P., & Böhme, R. (2012). Where to Hide the Bits?. In Grossklags, J., & Walrand, J. (Eds.), Decision and Game Theory for Security (pp. 1–17). Lecture Notes in Computer Science: Vol. 7638. Berlin Heidelberg: Springer.
More details BibTeX
Schöttle, P., & Böhme, R. (2012). A Game-Theoretic Approach to Content-Adaptive Steganography. In Kirchner, M., & Ghosal, D. (Eds.), Information Hiding (14th International Conference) (pp. 125–141). Lecture Notes in Computer Science: Vol. 7692. Berlin Heidelberg: Springer-Verlag.
More details BibTeX
Böhme, R., & Félegyházi, M. (2011). Security Investment with Penetration Testing. IEEE COMSOC E-Letter, 6(5), 6–8.
More details BibTeX
Böhme, R. (2011). Wann sind IT-Security-Audits nützlich?. In Proceedings of the Wirtschaftsinformatik, Zürich, 385–394.
More details BibTeX
Böhme, R., & Grossklags, J. (2011). The Security Cost of Cheap User Interaction. In Proceedings of the New Security Paradigms Workshop, Marin County, CA, 67–82.
More details BibTeX
Böhme, R., & Grossklags, J. (2011). Vanishing Signals: Trading Agent Kills Market Information. In Proceedings of the NetEcon, San Jose, CA.
More details BibTeX
Böhme, R., & Pötzsch, S. (2011). Collective Exposure: Peer Effects in Voluntary Disclosure of Personal Data. In Danezis, G. (Ed.), Proceedings of Financial Cryptography and Data Security (pp. 1–15). Lecture Notes in Computer Science: Vol. 7035. Berlin Heidelberg: Springer.
More details BibTeX
Johnson, B., Böhme, R., & Grossklags, J. (2011). Security Games with Market Insurance. In Baras, J. S., Katz, J., & Altmann, E. (Eds.), Decision and Game Theory for Security (pp. 117–130). Lecture Notes in Computer Science: Vol. 7037. Berlin Heidelberg: Springer.
More details BibTeX
Lai, S., & Böhme, R. (2011). Countering Counter-Forensics: The Case of JPEG Compression. In Filler, T., Pevny, T., Craver, S., & Ker, A. (Eds.), Information Hiding (13th International Conference) (pp. 285–298). Lecture Notes in Computer Science: Vol. 6958. Berlin: Springer.
More details BibTeX
Böhme, R. (2010). Advanced Statistical Steganalysis. Berlin, Heidelberg: Springer-Verlag.
More details BibTeX
Schöttle, P., Dreibholz, T., & Rathgeb, E. (2008). On the application of anomaly detection in reliable server pooling systems for improved robustness against denial of service attacks. In Proceedings of the 33rd IEEE Conference on Local Computer Networks, LCN 2008, Montreal, AB, can, 207–214.
More details BibTeX Full text DOI