Institut für Angewandte Informationsverarbeitung und Kommunikationstechnologie (7050)

  • 8010

    Inffeldgasse 16a Graz

    Österreich

Forschungsoutput 1983 2019

2018

Hunting Password Leaks in Android Applications

Feichtner, J., 2018, ICT Systems Security and Privacy Protection. Jan Janczewski, L. & Kutyłowski, M. (Hrsg.). Cham: Springer International Publishing AG , Band 529. S. 278-292 14 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Inspection

IAIK ECCelerate SDK 5.0

Hanser, C., Prokop, L. & Ramacher, S., 12 Jul 2018

Publikation: Nonprint-FormenSoftwareForschung

JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks

Schwarz, M., Lipp, M. & Gruss, D., 18 Feb 2018, Network and Distributed System Security Symposium 2018. S. 15

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Websites
Web browsers
World Wide Web
Interfaces (computer)
Hardware

Kernel Isolation: From an Academic Idea to an Efficient Patch for Every Computer

Gruss, D., Hansen, D. & Gregg, B., Dez 2018, in : ;login: the USENIX Magazine. 43, 4, S. 10-14 5 S.

Publikation: Beitrag in einer FachzeitschriftArtikelForschung

KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks

Schwarz, M., Lipp, M., Gruss, D., Weiser, S., Maurice, C. L. N., Spreitzer, R. & Mangard, S., 18 Feb 2018, Network and Distributed System Security Symposium 2018. S. 15

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Smartphones
Websites
Side channel attack
Processing
Android (operating system)

Leakage Bounds for Gaussian Side Channels

Unterluggauer, T., Korak, T., Mangard, S., Schilling, R., Benini, L., Gürkaynak, F. K. & Muehlberghuber, M., 2018, 16th Smart Card Research and Advanced Application Conference - CARDIS 2017. Springer

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Channel capacity
Application specific integrated circuits
Signal to noise ratio
Information theory
Cryptography

MEAS: memory encryption and authentication secure against side-channel attacks

Unterluggauer, T., Werner, M. & Mangard, S., 25 Jan 2018, in : Journal of cryptographic engineering. S. 1-22

Publikation: Beitrag in einer FachzeitschriftArtikelForschungBegutachtung

Open Access
Authentication
Cryptography
Data storage equipment
Random access storage
Side channel attack

Meltdown

Lipp, M., Schwarz, M., Gruss, D., Prescher, T., Haas, W., Mangard, S., Kocher, P., Genkin, D., Yarom, Y. & Hamburg, M., 3 Jan 2018, in : arXiv.org e-Print archive.

Publikation: Beitrag in einer FachzeitschriftArtikelForschung

Data storage equipment
Data privacy
Personal computers
Computer systems
Hardware

Meltdown: Reading Kernel Memory from User Space

Lipp, M., Schwarz, M., Gruss, D., Prescher, T., Haas, W., Fogh, A., Horn, J., Mangard, S., Kocher, P., Genkin, D., Yarom, Y. & Hamburg, M., 15 Aug 2018, 27th USENIX Security Symposium. S. 973-990 19 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Nethammer: Inducing Rowhammer Faults through Network Requests

Lipp, M., Aga, M. T., Schwarz, M., Gruss, D., Maurice, C., Raab, L. & Lamster, L., 13 Mai 2018, in : arXiv.org e-Print archive. 15 S.

Publikation: Beitrag in einer FachzeitschriftArtikelForschung

Datei
Data storage equipment
Dynamic random access storage
Landslides
Mobile phones
Personal computers

NetSpectre: Read Arbitrary Memory over Network

Schwarz, M., Schwarzl, M., Lipp, M. & Gruss, D., 27 Jul 2018, in : arXiv.org e-Print archive.

Publikation: Beitrag in einer FachzeitschriftArtikelForschung

Datei

On The Structure and Authorization Management of RESTful Web Services

Suzic, B., Prünster, B. & Ziegler, D., 2018, Proceedings of the 33rd Annual ACM Symposium on Applied Computing. Association of Computing Machinery

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Web services
Application programming interfaces (API)
Data privacy
Security of data
Interoperability

Optimizing Wavelet Bases for Sparser Representations

Grandits, T. A. & Pock, T., 2018, Energy Minimization Methods in Computer Vision and Pattern Recognition: EMMCVPR 2017. Pelillo, M. & Hancock, E. (Hrsg.). Cham: Springer, S. 249-262 (Lecture Notes in Computer Science; Band 10746).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Pointing in the Right Direction - Securing Memory Accesses in a Faulty World

Schilling, R., Werner, M., Nasahl, P. & Mangard, S., 2018, Annual Computer Security Applications Conference. 10 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key Primitives

Derler, D., Ramacher, S. & Slamanig, D., 2018, Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Fort Lauderdale, Florida, April 9-11, 2018.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Practical Witness Encryption for Algebraic Languages Or How to Encrypt Under Groth-Sahai Proofs

Derler, D. & Slamanig, D., 2018, in : Designs, codes and cryptography. 23 S.

Publikation: Beitrag in einer FachzeitschriftArtikelForschungBegutachtung

ProcHarvester: Fully Automated Analysis of Procfs Side-Channel Leaks on Android

Spreitzer, R., Kirchengast, F., Gruss, D. & Mangard, S., 2018, ASIACCS '18 - Proceedings of the 2018 on Asia Conference on Computer and Communications Security . S. 749-763

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Application programs
Mobile devices
Learning systems
Websites
Statistics

Qualified eID Derivation into a Distributed Ledger Based IdM System

Abraham, A., Theuermann, K. & Kirchengast, E., 5 Sep 2018, Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018. Institute of Electrical and Electronics Engineers, S. 1406-1412 7 S. 8456064

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Identity management
Management system
Electronic government
Privacy

Rasta: A Cipher with Low ANDdepth and Few ANDs per Bit

Dobraunig, C. E., Eichlseder, M., Grassi, L., Lallemend, V., Leander, G., List, E., Mendel, F. & Rechberger, C., 2018, Advances in Cryptology – CRYPTO 2018. Springer, S. 662-692 (Lecture Notes in Computer Science; Band 10991).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Real-Time Intensity-Image Reconstruction for Event Cameras Using Manifold Regularisation

Munda, G., Reinbacher, C. & Pock, T., 2018, in : International Journal of Computer Vision. 126, 12, S. 1381-1393 13 S.

Publikation: Beitrag in einer FachzeitschriftArtikelForschungBegutachtung

Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications

Derler, D., Krenn, S., Lorünser, T., Ramacher, S., Slamanig, D. & Striecks, C., 2018, Public-Key Cryptography - PKC 2018, Rio De Janeiro, Brazil, March 25-28, 2018.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Robust Deformation Estimation in Wood-Composite Materials using Variational Optical Flow

Hofinger, M., Pock, T. & Moosbrugger, T., 5 Feb 2018, S. 97 - 104. 8 S.

Publikation: KonferenzbeitragPaperForschungBegutachtung

Open Access
Optical flows
Optical Flow
Humidity
Composite Materials
Atmospheric humidity

Safe Reinforcement Learning via Shielding

Alshiekh, M., Bloem, R., Ehlers, R., Könighofer, B., Niekum, S. & Topcu, U., 2018, Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, (AAAI-18), the 30th innovative Applications of Artificial Intelligence (IAAI-18), and the 8th AAAI Symposium on Educational Advances in Artificial Intelligence (EAAI-18), New Orleans, Louisiana, USA, February 2-7, 2018. S. 2669-2678 10 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

SCAnDroid: Automated Side-Channel Analysis of Android APIs

Spreitzer, R., Palfinger, G. & Mangard, S., 2018, WISEC '18, Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks. S. 224-235

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei

Securing Conditional Branches in the Presence of Fault Attacks

Schilling, R., Werner, M. & Mangard, S., Mär 2018, Design, Automation & Test in Europe Conference - DATE 2018: Institute of Electrical and Electronics Engineers.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access

Sharing Independence Relabeling: Efficient Formal Verification of Higher-Order Masking

Bloem, R., Groß, H., Iusupov, R., Krenn, M. & Mangard, S., 2018, in : Cryptology ePrint Archive. 2018, S. 1031 1 S.

Publikation: Beitrag in einer FachzeitschriftArtikelForschungBegutachtung

Shielded Decision-Making in MDPs

Jansen, N., Könighofer, B., Junges, S. & Bloem, R., 2018, in : arXiv.org e-Print archive. CoRR, abs/1807.06096.

Publikation: Beitrag in einer FachzeitschriftArtikelForschungBegutachtung

Short Double- and N-Times-Authentication-Preventing Signatures from ECDSA and More

Derler, D., Ramacher, S. & Slamanig, D., 2018, 2018 IEEE European Symposium on Security and Privacy, EuroS&P 2018, London, United Kingdom, April 26-28, 2018.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography

Dobraunig, C. E., Eichlseder, M., Korak, T., Mangard, S., Mendel, F. & Primas, R., 2018, in : IACR Transactions on Cryptographic Hardware and Embedded Systems. 2018, 3, S. 547-572

Publikation: Beitrag in einer FachzeitschriftArtikelForschungBegutachtung

Open Access

Single Trace Attack Against RSA Key Generation in Intel SGX SSL

Weiser, S., Spreitzer, R. & Bodner, L., 2018, ASIACCS '18 - Proceedings of the 2018 on Asia Conference on Computer and Communications Security . Association of Computing Machinery, S. 575-586

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Hardware
Side channel attack

Software-based microarchitectural attacks

Gruss, D., Sep 2018, in : IT - Information technology.

Publikation: Beitrag in einer FachzeitschriftArtikelForschung

Sponge-Based Control-Flow Protection for IoT Devices

Werner, M., Unterluggauer, T., Schaffenrath, D. & Mangard, S., 2018, 2018 IEEE European Symposium on Security and Privacy. Institute of Electrical and Electronics Engineers

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Flow control
Intellectual property
Program processors
Internet of things
Data storage equipment

Spoof-of-Work - Evaluating Device Authorisation in Mobile Mining Processes

Ziegler, D., Prünster, B., Marsalek, A. & Kollmann, C., 28 Jul 2018, Proceedings of the 15th International Joint Conference on e-Business and Telecommunications. Portugal: SciTePress - Science and Technology Publications, Band 1: SECRYPT. S. 380-387 8 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Smartphones
Program processors
Electronic money
Android (operating system)

Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures

Dobraunig, C. E., Eichlseder, M., Groß, H., Mangard, S., Mendel, F. & Primas, R., 2018, Advances in Cryptology – ASIACRYPT 2018. Springer, S. 315-342 (Lecture Notes in Computer Science; Band 11273).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Symbolic checking of Fuzzy CTL on Fuzzy Program Graph

Ebrahimi, M., Sotudeh, G. & Movaghar, A., 3 Feb 2018, in : Acta informatica.

Publikation: Beitrag in einer FachzeitschriftArtikelForschungBegutachtung

Open Access
Model checking
Temporal logic
Explosions
Flip flop circuits
Fuzzy systems

Synthesis of distributed algorithms with parameterized threshold guards

Lazić, M., Konnov, I., Widder, J. & Bloem, R., 1 Mär 2018, 21st International Conference on Principles of Distributed Systems, OPODIS 2017. Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, Band 95. 32

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Parallel algorithms
Specifications
Model checking

Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices

Spreitzer, R., Moonsamy, V., Korak, T. & Mangard, S., 2018, in : IEEE Communications Surveys & Tutorials. 20, 1, S. 465-488 24 S.

Publikation: Beitrag in einer FachzeitschriftArtikelForschungBegutachtung

Open Access
Datei
Mobile devices
Side channel attack
Smart cards
Smartphones

TIGHTest - Towards automating global Academic Mobility

More, S. J., 14 Jun 2018, 68 S.

Publikation: StudienabschlussarbeitMasterarbeitForschung

Open Access

Towards Domain-Specific and Privacy-Preserving Qualified eID in a User-Centric Identity Model

Lenz, T. & Krnjic, V., 6 Sep 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE Computer Society, S. 1157-1163

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Identification (control systems)

Use-after-FreeMail: Generalizing the use-after-free problem and applying it to email services

Gruss, D., Schwarz, M., Wübbeling, M., Guggi, S., Malderle, T., More, S. & Lipp, M., 29 Mai 2018, ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security. Association of Computing Machinery, S. 297-311 15 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Electronic mail
Data storage equipment
Gain control
Chemical analysis

Variational 3D-PIV with sparse descriptors

Lasinger, K., Vogel, C., Schindler, K. & Pock, T., 10 Mai 2018, in : Measurement science & technology. 29, 6, 14 S., 064010.

Publikation: Beitrag in einer FachzeitschriftArtikelForschungBegutachtung

Variational Adversarial Networks for Accelerated MR Image Reconstruction

Hammernik, K., Kobler, E., Pock, T., Recht, M. P., Sodickson, D. K. & Knoll, F., 2018, S. 1091.

Publikation: KonferenzbeitragAbstractForschungBegutachtung

Variational Fusion of Light Field and Photometric Stereo for Precise 3D Sensing within a Multi-Line Scan Framework

Antensteiner, D., Stolc, S. & Pock, T., 2018, Proceedings of the International Conference on Pattern Recognition (ICPR).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Variational Networks for Joint Image Reconstruction and Classification of Tumor Immune Cell Interactions in Melanoma Tissue Sections

Effland, A., Hölzel, M., Klatzer, T., Kobler, E., Landsberg, J., Neuhäuser, L., Pock, T. & Rumpf, M., 2018, Bildverarbeitung für die Medizin 2018.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Zero-Sum Partitions of PHOTON Permutations

Wang, Q., Grassi, L. & Rechberger, C., 2018, Topics in Cryptology - CT-RSA 2018 - The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings. S. 279-299 21 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

2017

An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order

Groß, H., Mangard, S. & Korak, T., 2017, CT-RSA. Springer, Band 10159. S. 95-112 18 S. (Lecture Notes in Computer Science).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei

A new structural-differential property of 5-round AES

Grassi, L., Rechberger, C. & Rønjom, S., 2017, Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag Wien, Band 10211 LNCS. S. 289-317 29 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 10211 LNCS).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Structural properties
Data storage equipment
Costs
Random Permutation
Block Cipher

An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics

Conti, F., Schilling, R., Schiavone, P. D., Pullini, A., Rossi, D., Gürkaynak, F. K., Mühlberghuber, M., Gautschi, M., Loi, I., Haugou, G., Mangard, S. & Benini, L., 17 Mai 2017, IEEE Transactions on Circuits and Systems.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Ascon hardware implementations and side-channel evaluation

Groß, H., Wenger, E., Dobraunig, C. & Ehrenhöfer, C., 2017, in : Microprocessors and microsystems - Embedded Hardware Design. 52, S. 470-479 10 S.

Publikation: Beitrag in einer FachzeitschriftArtikelForschungBegutachtung

Hardware
Ethernet
Radio frequency identification (RFID)
Sensor nodes
Embedded systems

A Sustainable Architecture for Secure and Usable Mobile Signature Solutions

Zefferer, T., 2017, WEBIST 2015 - Selected and Revised Papers. 1 Aufl. Springer, S. 343 364 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in Buch/BerichtForschungBegutachtung