Institut für Angewandte Informationsverarbeitung und Kommunikationstechnologie (7050)

  • 8010

    Inffeldgasse 16a Graz

    Österreich

Forschungsoutput 1983 2019

2019

A Comparative Study of Misapplied Crypto in Android and iOS Applications

Feichtner, J., 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT. Portugal: SciTePress, S. 96-108 12 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Application programs
Application programming interfaces (API)
Cryptography
iOS (operating system)
Android (operating system)

A Correctable Public Blockchain

Marsalek, A. & Zefferer, T., 2019, (Angenommen/In Druck) 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE Trustcom-19).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Decision making
Experiments

Algebraic Cryptanalysis of Frit

Dobraunig, C., Eichlseder, M., Mendel, F. & Schofnegger, M., 17 Jun 2019, (Angenommen/In Druck) Selected Areas in Cryptography - SAC 2019. Springer, (Lecture Notes in Computer Science).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC

Albrecht, M. R., Cid, C., Grassi, L., Khovratovich, D., Lüftenegger, R., Rechberger, C. & Schofnegger, M., 15 Aug 2019, (Angenommen/In Druck) ASIACRYPT 2019.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in Buch/BerichtForschungBegutachtung

Polynomials
Hash functions

Attacking AUTOSAR using Software and Hardware Attacks

Nasahl, P. & Timmers, N., 12 Jul 2019.

Publikation: KonferenzbeitragPaperForschungBegutachtung

Datei

Cloud Data Sharing and Device-Loss Recovery with Hardware-Bound Keys

Hörandner, F. & Nieddu, F., 2019, (Angenommen/In Druck) 15th International Conference on Information Systems Security, ICISS 2019.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Cryptography
Hardware
Recovery
Computer hardware

DNS-based Trust Scheme Publication and Discovery

Wagner, G., More, S. J., Wagner, S. & Hoffmann, M., 29 Mär 2019, Lecture Notes in Informatics: Open Identity Summit 2019. Gesellschaft für Informatik , Band 2019.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

E-Government in the Public Cloud: Requirements and Opportunities

Abraham, A., Hörandner, F., Zefferer, T. & Zwattendorfer, B., 6 Feb 2019, (Angenommen/In Druck) in : Electronic Government.

Publikation: Beitrag in einer FachzeitschriftArtikelForschungBegutachtung

public sector
public
services

Electronic Signatures and Infrastructures (ESI); Procedures for Creation and Validation of AdES Digital Signatures; Part 2: Signature Validation Report

Lipp, P., 20 Feb 2019, Sophia Antipolis : European Telecommunications Standards Institute, ETSI.

Publikation: Andere BeiträgeSonstiger BeitragForschung

Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje

Dobraunig, C. E., Mangard, S., Mendel, F. & Primas, R., 2019, Selected Areas in Cryptography – SAC 2018. Cid, C. & Jacobson, M. J. (Hrsg.). Springer, S. 257-277 21 S. (Lecture Notes in Computer Science; Band 11349).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Authenticated Encryption
Fault Attacks
Cryptography
Fault
Initialization

Feistel Structures for MPC, and More

Albrecht, M. R., Grassi, L., Perrin, L., Ramacher, S., Rechberger, C., Rotaru, D., Roy, A. & Schofnegger, M., 21 Jun 2019, (Angenommen/In Druck) ESORICS 2019. 54 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Throughput

Fides – Unleashing the Full Potential of Remote Attestation

Prünster, B., Palfinger, G. & Kollmann, C. P., Jul 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications. SciTePress - Science and Technology Publications, Band 2: SECRYPT. S. 314--321

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Application programs
Experiments
Open source software

Fine-Grained Access Control in Industrial Internet of Things: Evaluating Outsourced Attribute-Based Encryption

Ziegler, D., Sabongui, J. & Palfinger, G., Jun 2019, Proceedings of the 34th International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2019. Springer International, S. 91-104

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Datei

Flexible und benutzerfreundliche Authentifizierungsverfahren zur Umsetzung transaktionaler E-Government-Services auf mobilen Geräten

Theuermann, K., Zefferer, T., Lenz, T. & Tauber, A., 11 Mär 2019, Handbuch E-Government: Technikinduzierte Verwaltungsentwicklung. Wiesbaden: Springer Fachmedien Wiesbaden, S. 1-30

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in Buch/BerichtForschungBegutachtung

Forgery Attacks on FlexAE and FlexAEAD

Eichlseder, M., Kales, D. & Schofnegger, M., 5 Sep 2019, (Angenommen/In Druck) IMA Cryptography and Coding - IMACC 2019. 12 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Standardization
Cryptography

Horcruxes for Everyone - A Framework for Key-Loss Recovery by Splitting Trust

Hörandner, F. & Rabensteiner, C., 2019, (Angenommen/In Druck) 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE Trustcom-19).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Recovery
Servers
Application programs
Authentication
Costs

IAIK ECCelerate SDK 5.01

Ramacher, S., 30 Jan 2019

Publikation: Nonprint-FormenSoftwareForschung

IAIK ECCelerate SDK 6.0

Guggi, S. L. & Ramacher, S., 4 Jul 2019

Publikation: Nonprint-FormenSoftwareForschung

IAIK ECCelerate SDK 6.01

Guggi, S. L. & Ramacher, S., 3 Sep 2019

Publikation: Nonprint-FormenSoftwareForschung

Interactive Quality Analytics of User-generated Content: An Integrated Toolkit for the Case of Wikipedia

Sciascio, C. D., Strohmaier, D., Errecalde, M. & Veas, E., Apr 2019, in : ACM Transactions on Interactive Intelligent Systems . 9, 2-3, S. 1-42 42 S., 13.

Publikation: Beitrag in einer FachzeitschriftArtikelForschungBegutachtung

Defects
Digital libraries
Inspection
Internet
Experiments

JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits

Schwarz, M., Lackner, F. & Gruss, D., 24 Feb 2019, NDSS.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Joint Reconstruction and Classification of Tumor Cells and Cell Interactions in Melanoma Tissue Sections with Synthesized Training Data

Effland, A., Kobler, E., Brandenburg, A., Klatzer, T., Neuhäuser, L., Hölzel, M., Landsberg, J., Pock, T. & Rumpf, M., 2019, in : International Journal of Computer Assisted Radiology and Surgery.

Publikation: Beitrag in einer FachzeitschriftArtikelForschungBegutachtung

L*-Based Learning of Markov Decision Processes

Tappler, M., Aichernig, B., Bacci, G., Eichlseder, M. & Larsen, K. G., 2019, Formal Methods - The Next 30 Years . ter Beek, M. H., McIver, A. & Oliveria, J. N. (Hrsg.). Cham: Springer, S. 651 - 669 19 S. (Lecture Notes in Computer Science; Band 11800).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Learning algorithms
Sampling
Formal languages
Model structures
Testing

Learning a Behavior Model of Hybrid Systems Through Combining Model-Based Testing and Machine Learning

Aichernig, B. K., Bloem, R., Ebrahimi, M., Horn, M., Pernkopf, F., Roth, W., Rupp, A., Tappler, M. & Tranninger, M., 2019, Testing Software and Systems: 31st IFIP WG 6.1 International Conference, ICTSS 2019, Paris, France, October 15–17, 2019, Proceedings. Gaston, C., Kosmatov, N. & Le Gall, P. (Hrsg.). Cham: Springer International Publishing AG , S. 3-21 19 S. (Lecture Notes in Computer Science; Band 11812).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Hybrid systems
Learning systems
Testing
Recurrent neural networks

Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC

Dinur, I., Promitzer, A., Kales, D., Ramacher, S. & Rechberger, C., 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part I. Ishai, Y. & Rijmen, V. (Hrsg.). Springer, S. 343-372 30 S. (Lecture Notes in Computer Science; Band 11476).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Block Ciphers
Cryptography
Equivalence
Partial
Encryption

Master of Puppets: Trusting Silicon in the Fight for Practical Security in Fully Decentralised Peer-to-Peer Networks

Prünster, B., Fasllija, E. & Mocher, D. W., Jul 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications. SciTePress - Science and Technology Publications, Band 2: SECRYPT. S. 252--259

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Peer to peer networks
Silicon
Cloud computing
Hardware
Bandwidth

Mind the Gap: Finding what Updates have (really) changed in Android Applications

Feichtner, J., Neugebauer, L. & Ziegler, D., 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT. Portugal: SciTePress, S. 306-313 8 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Application programs
Android (operating system)

Mixture Integral Attacks on Reduced-Round AES with a Known/Secret S-Box

Grassi, L. & Schofnegger, M., 2 Jul 2019.

Publikation: ArbeitspapierWorking paperForschung

Recovery

Mobile-Only Solution for Server-Based Qualified Electronic Signatures

Theuermann, K., Tauber, A. & Lenz, T., 24 Mai 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC). Shanghai, China, 7 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Mobile Private Contact Discovery at Scale

Kales, D., Rechberger, C., Schneider, T., Senker, M. & Weinert, C., 14 Aug 2019, 28th USENIX Security Symposium. USENIX Association, S. 1447-1464

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Smartphones
Communication
Networks (circuits)
Mobile devices
Cryptography

More Practical Single-Trace Attacks on the Number Theoretic Transform

Peßl, P. & Primas, R., 2019, Progress in Cryptology – LATINCRYPT 2019: 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2–4, 2019, Proceedings. Springer, (Lecture Notes in Computer Science; Band 11774).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Cryptography
Mathematical transformations
Microcontrollers
Recovery
Side channel attack

NetSpectre: Read Arbitrary Memory over Network

Schwarz, M., Schwarzl, M., Lipp, M., Masters, J. & Gruß, D., Sep 2019, Computer Security - ESORICS 2019: 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings. Cham: Springer, Band 1. S. 279-299 (Lecture Notes in Computer Science; Band 11735).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Data storage equipment

Obfuscation-Resilient Code Recognition in Android Apps

Feichtner, J. & Rabensteiner, C., 2019, 14th International Conference on Availability, Reliability and Security (ARES 2019). New York: Association of Computing Machinery, 10 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Application programs
Android (operating system)
Substitution reactions
Data transfer
Throughput
Concretes
Bandwidth

Phish-Hook: Detecting Phishing Certificates Using Certificate Transparency Logs

Fasllija, E., Enişer, H. F. & Prünster, B., 23 Okt 2019, 15th EAI International Conference on Security and Privacy in Communication Networks. Springer

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Hooks
Transparency
Labels
Websites
Visibility

Policy-based access control for the IoT and Smart Cities

Omolola, O., More, S., Fasllija, E., Wagner, G. & Alber, L., 1 Jan 2019, Open Identity Summit 2019, Proceedings. Rossnagel, H., Wagner, S. & Huhnlein, D. (Hrsg.). Gesellschaft fur Informatik (GI), S. 157-163 7 S. (Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI); Band P-293).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Access control
Network protocols
Data privacy
Data storage equipment
Smart city

Practical Enclave Malware with Intel SGX

Schwarz, M., Weiser, S. & Gruss, D., 8 Feb 2019, in : arXiv.org e-Print archive. arXiv:1902.03256 .

Publikation: Beitrag in einer FachzeitschriftArtikelForschung

Electronic mail
Mountings
Personal computers
Program processors
Malware

Privacy-preserving attribute aggregation in eID federations

Priesnitz Filho, W., Ribeiro, C. & Zefferer, T., 1 Mär 2019, in : Future Generation Computer Systems. 92, Volume 92, S. 1-16 16 S.

Publikation: Beitrag in einer FachzeitschriftArtikelForschungBegutachtung

Agglomeration
Ontology
Authentication
Experiments
European Union

Protecting against Statistical Ineffective Fault Attacks

Daemen, J., Dobraunig, C., Eichlseder, M., Groß, H., Mendel, F. & Primas, R., 2019, (IACR Cryptology ePrint Archive; Nr. 2019/536).

Publikation: ArbeitspapierWorking paperForschung

Protecting RISC-V Processors against Physical Attacks

Werner, M., Schilling, R., Unterluggauer, T. & Mangard, S., 2019, Design, Automation & Test in Europe Conference - DATE 2019. S. 1136-1141 6 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Datei
Reduced instruction set computing
Microcontrollers
Data storage equipment
Flow control
Program processors

Prying CoW: Inferring Secrets Across Virtual Machine Boundaries

Palfinger, G., Prünster, B. & Ziegler, D., Jul 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications. Prague, Czech Republic: SciTePress - Science and Technology Publications, Band 2: SECRYPT. S. 187 - 197

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Computer operating systems
Hardware
Virtual machine

Qualified Remote Signatures – Solutions, its Certification, and Use

Leitold, H. & Konrad, D., 2019, Proceedings of 29th SmartCard Workshop. Waldmann, U. (Hrsg.). S. 219-231

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschung

Datei

Revisiting Privacy-aware Blockchain Public Key Infrastructure

Omolola, O. & Plessing, P., 2019, Cryptology ePrint Archive.

Publikation: Buch/Bericht/KonferenzbandSonstiger BerichtForschung

Revisiting User Privacy for Certificate Transparency

Kales, D., Omolola, O. & Ramacher, S., 2019, 4th IEEE European Symposium on Security and Privacy.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Run-Time Optimization for Learned Controllers Through Quantitative Games

Avni, G., Bloem, R., Chatterjee, K., Henzinger, T., Könighofer, B. & Pranger, S., 15 Jul 2019, Computer Aided Verification (CAV). Dillig, I. & Tasiran, S. (Hrsg.). 31 Aufl. Springer, Band 11561. S. 630-649 ( Lecture Notes in Computer Science; Band 11561).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Controllers
Emergency vehicles
Stochastic models
Telecommunication traffic
Learning systems

Selective End-To-End Data-Sharing in the Cloud

Hörandner, F., Ramacher, S. & Roth, S., 2019, (Angenommen/In Druck) 15th International Conference on Information Systems Security, ICISS 2019.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Cryptography

SGXJail: Defeating Enclave Malware via Confinement

Weiser, S., Mayr, L., Schwarz, M. & Gruß, D., Sep 2019, (Angenommen/In Druck) Research in Attacks, Intrusions and Defenses 2019.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Small faults grow up - Verification of error masking robustness in arithmetically encoded programs

Karl, A. F., Schilling, R., Bloem, R. & Mangard, S., 2019, Verification, Model Checking, and Abstract Interpretation - 20th International Conference, VMCAI 2019, Proceedings. Piskac, R. & Enea, C. (Hrsg.). Springer, S. 183-204 22 S. (Lecture Notes in Computer Science; Band 11388).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Masking
Fault
Robustness
Flip
Soft Error

Spectre Attacks: Exploiting Speculative Execution

Kocher, P., Horn, J., Fogh, A., Genkin, D., Gruss, D., Haas, W., Hamburg, M., Lipp, M., Mangard, S., Prescher, T., Schwarz, M. & Yarom, Y., 20 Mai 2019, 40th IEEE Symposium on Security and Privacy.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Starkad and Poseidon: New Hash Functions for Zero Knowledge Proof Systems

Grassi, L., Kales, D., Khovratovich, D., Roy, A., Rechberger, C. & Schofnegger, M., 6 Mai 2019.

Publikation: ArbeitspapierWorking paperForschung

Hash functions
Concretes