Institut für Angewandte Informationsverarbeitung und Kommunikationstechnologie (7050)

  • 8010

    Inffeldgasse 16a Graz

    Österreich

Forschungsoutput 1983 2019

2017

Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features

Schwarz, M., Gruss, D., Lipp, M., Maurice, C., Schuster, T., Fogh, A. & Mangard, S., 3 Nov 2017, in : arXiv.org e-Print archive.

Publikation: Beitrag in einer FachzeitschriftArtikelForschung

Program processors
Hazards and race conditions
Data storage equipment
Retrofitting
Flow control

Bounded Synthesis for Streett, Rabin, and CTL*

Khalimov, A. & Bloem, R., 2017, CAV.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Datei

Chameleon-Hashes with Ephemeral Trapdoors and Applications to Invisible Sanitizable Signatures

Camenisch, J., Derler, D., Krenn, S., Pöhls, H., Samelin, K. & Slamanig, D., 2017, Public-Key Cryptography - PKC 2017 . Springer Verlag, S. 152-182 (Lecture Notes in Computer Science; Band 10175).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Cloud technology options towards Free Flow of Data

DPSP WG, Jun 2017, 110 S.

Publikation: Buch/Bericht/KonferenzbandSonstiger BerichtForschung

Open Access
Datei
Data privacy
Security of data

Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160

Liu, F., Mendel, F. & Wang, G., 2017, Advances in Cryptology - ASIACRYPT 2017. Takagi, T. & Peyrin, T. (Hrsg.). Cham: Springer, S. 158-186 (Lecture Notes in Computer Science; Band 10624).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Concealing Secrets in Embedded Processors Designs

Groß, H., Jelinek, M., Mangard, S., Unterluggauer, T. & Werner, M., 2017, 15th Smart Card Research and Advanced Application Conference - CARDIS 2016. S. 89-104

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Embedded systems
Hardware
Reduced instruction set computing
Transparency
Processing

Cryptanalysis of Simpira v1

Eichlseder, M., Dobraunig, C. E. & Mendel, F., 2017, Selected Areas in Cryptography - SAC 2016. Avanzi, R. & Heys, H. (Hrsg.). Springer, S. 284-298 (Lecture Notes in Computer Science; Band 10532).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access

Cryptographic Service Providers in Current Device Landscapes: An Inconvenient Truth

Reimair, F., Feichtner, J., Ziegler, D., Kreuzhuber, S. & Zefferer, T., Jul 2017, Proceedings of the 14th International Joint Conference on e-Business and Telecommunications. Portugal: SciTePress, Band 4. S. 367-374 8 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Data privacy
Security of data
Risk assessment
Hardware

Dependable Internet of Things for Networked Cars

Großwindhager, B., Rupp, A., Tappler, M., Tranninger, M., Weiser, S., Aichernig, B., Boano, C. A., Horn, M., Kubin, G., Mangard, S., Steinberger, M. & Römer, K. U., Dez 2017, in : International Journal of Computing. 16, 4, S. 226-237

Publikation: Beitrag in einer FachzeitschriftArtikelForschungBegutachtung

Railroad cars
Testbeds
Trucks
Radio interference
Industrial plants

Enhancements for Group Signatures and Side-Channel Attacks on Mobile Devices

Spreitzer, R., 10 Mai 2017

Publikation: StudienabschlussarbeitDissertationForschung

Gimli: a cross-platform permutation

Bernstein, D. J., Kölbl, S., Lucks, S., Massolino, P. M. C., Mendel, F., Nawaz, K., Schneider, T., Schwabe, P., Standaert, F-X., Todo, Y. & Viguier, B., 2017, Cryptographic Hardware and Embedded Systems. Springer, (LNCS).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Harmonizing Delegation Data Formats

Wagner, G., Omolola, O. & More, S. J., 6 Okt 2017, Lecture Notes in Informatics: Open Identity Summit 2017. Bonn: Gesellschaft für Informatik , Band 2017.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access

Higher-Order Side-Channel Protected Implementations of KECCAK

Groß, H., Schaffenrath, D. & Mangard, S., 2017, DSD. IEEE Computer Society, S. 205-212 8 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei

Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation

Derler, D., Ramacher, S. & Slamanig, D., 2017, Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers. Springer Verlag, S. 124-142 (Lecture Notes in Computer Science; Band 10322).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Hybrid Mobile Edge Computing: Unleashing the Full Potential of Edge Computing in Mobile Device Use Cases

Reiter, A., Prünster, B. & Zefferer, T., 2017, Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing. IEEE Press, S. 935-944

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Mobile devices
Energy conservation
Energy utilization
Bandwidth
Internet of things

IAIK ECCelerate SDK 4.01

Ramacher, S., 23 Mär 2017

Publikation: Nonprint-FormenSoftwareForschung

IAIK ECCelerate SDK 4.02

Ramacher, S., 19 Jul 2017

Publikation: Nonprint-FormenSoftwareForschung

Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC

Dobraunig, C. E. & List, E., 2017, Topics in Cryptology -- CT-RSA 2017. Handschuh, H. (Hrsg.). Springer, S. 207-222 16 S. (Lecture Notes in Computer Science; Band 10159).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in Buch/BerichtForschungBegutachtung

ISAP - Towards Side-Channel Secure Authenticated Encryption

Dobraunig, C. E., Eichlseder, M., Mangard, S., Mendel, F. & Unterluggauer, T., 2017, in : IACR Transactions on Symmetric Cryptology. 2017, 1, S. 80-105

Publikation: Beitrag in einer FachzeitschriftArtikelForschungBegutachtung

Open Access

KASLR is Dead: Long Live KASLR

Gruss, D., Lipp, M., Schwarz, M., Fellner, R., Maurice, C. & Mangard, S., 2017, Engineering Secure Software and Systems - 9th International Symposium, ESSoS 2017, Proceedings. Springer-Verlag Italia, Band 10379 LNCS. S. 161-176 16 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 10379 LNCS).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
kernel
Hardware
Plant shutdowns
Flow control
Side Channel Attacks

Leveraging the adoption of electronic identities and electronic-signature solutions in Europe

Marsalek, A., Zefferer, T., Reimair, F., Karabat, Ç. & Soykan, E. U., 3 Apr 2017, 32nd Annual ACM Symposium on Applied Computing, SAC 2017. Association of Computing Machinery, Band Part F128005. S. 69-71 3 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Concretes

Malware guard extension: Using SGX to conceal cache attacks

Schwarz, M., Weiser, S., Gruss, D., Maurice, C. & Mangard, S., 2017, Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, 2017. Springer-Verlag Italia, Band 10327 LNCS. S. 3-24 22 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 10327 LNCS).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Malware
Cache
Physical addresses
Attack
Hardware

Model-Based Testing IoT Communication via Active Automata Learning

Tappler, M., Aichernig, B. K. & Bloem, R., 2017, 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST). S. 276-287 12 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Communication
Testing
Specifications
Servers
Network protocols

Multi-core Data Analytics SoC with a flexible 1.76 Gbit/s AES-XTS Cryptographic Accelerator in 65 nm CMOS

Gürkaynak, F. K., Schilling, R., Mühlberghuber, M., Conti, F., Mangard, S. & Benini, L., 2017, CS2 '17, Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems . S. 19-24

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei

Note on the Robustness of CAESAR Candidates

Kales, D., Eichlseder, M. & Mendel, F., Nov 2017, 11 S. (IACR Cryptology ePrint Archive; Nr. 2017/1137).

Publikation: ArbeitspapierWorking paperForschung

Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives

Chase, M., Derler, D., Goldfeder, S., Orlandi, C., Ramacher, S., Rechberger, C., Slamanig, D. & Zaverucha, G., 2017, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, USA, October 30 - November 3, 2017.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Practical Keystroke Timing Attacks in Sandboxed JavaScript

Lipp, M., Gruss, D., Schwarz, M., Bidner, D., Maurice, C. & Mangard, S., 2017, Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings. Springer-Verlag Italia, Band 10493 LNCS. S. 191-209 19 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 10493 LNCS).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Timing Attack
JavaScript
Attack
Timing
Websites

Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures

Beck, M. T., Camenisch, J., Derler, D., Krenn, S., Pöhls, H. C., Samelin, K. & Slamanig, D., 2017, Information Security and Privacy - 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part I.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Privacy Technologies and Policy

Schweighofer, E. (Hrsg.), Leitold, H. (Hrsg.), Mitrakas, A. (Hrsg.) & Rannenberg, K. (Hrsg.), 2017, Graz: Springer Verlag.

Publikation: Buch/Bericht/KonferenzbandBuch (Autorenwerk)ForschungBegutachtung

Open Access

Reconciling d+1 Masking in Hardware and Software

Groß, H. & Mangard, S., 2017, CHES. Springer, Band 10529. S. 115-136 22 S. (Lecture Notes in Computer Science).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei

Related-Key Impossible-Differential Attack on Reduced-Round SKINNY

Ankele, R., Banik, S., Chakraborti, A., List, E., Mendel, F., Sim, S. M. & Wang, G., 2017, Applied Cryptography and Network Security. Cham, S. 208-228 (Lecture Notes in Computer Science; Band 10355).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Secure Policy-based Device-to-Device Offloading for Mobile Applications

Reiter, A., 2017, Proceedings of the Symposium on Applied Computing. Association of Computing Machinery, S. 516-521

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Mobile devices
Security of data
Servers
Virtual machine

Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives

Unterluggauer, T., Werner, M. & Mangard, S., 2017, ACM Asia Conference on Computer and Communications Security - ASIACCS'17. Association of Computing Machinery, S. 690-702

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Authentication
Cryptography
Data storage equipment
Random access storage
Side channel attack

SGXIO: Generic Trusted I/O Path for Intel SGX

Weiser, S. & Werner, M., 2017, Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy. S. 261-268

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Cloud computing
Hardware
Malware

Side-Channel Analysis of Keymill

Dobraunig, C. E., Eichlseder, M., Korak, T. & Mendel, F., 2017, Constructive Side-Channel Analysis and Secure Design: COSADE 2017. S. 138-152 (Lecture Notes in Computer Science; Band 10348).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Side-Channel Plaintext-Recovery Attacks on Leakage-Resilient Encryption

Unterluggauer, T., Werner, M. & Mangard, S., 15 Mai 2017, Design, Automation & Test in Europe Conference - DATE 2017. Institute of Electrical and Electronics Engineers

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Cryptography
Recovery
Microcontrollers
Field programmable gate arrays (FPGA)
Electric power utilization

Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption

Primas, R., Peßl, P. & Mangard, S., 2017, Cryptographic Hardware and Embedded Systems – CHES 2017. Cham: Springer, S. 513-533 (Lecture Notes in Computer Science; Band 10529).

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Cryptography
Quantum cryptography
Recovery
Template matching
Microcontrollers

Software-based Microarchitectural Attacks

Gruss, D., 14 Jun 2017

Publikation: StudienabschlussarbeitDissertationForschung

Open Access
Datei

STORK: a real, heterogeneous, large-scale eID management system

Ribeiro, C., Leitold, H., Esposito, S. & Mitzman, D., Jul 2017, in : International Journal of Information Security.

Publikation: Beitrag in einer FachzeitschriftArtikelForschungBegutachtung

Open Access
Electronic scales
Semantics
Interoperability
Identification (control systems)
Internet

Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory

Gruss, D., Lettner, J., Schuster, F., Ohrimenko, O., Haller, I. & Costa, M., 16 Aug 2017, 2017 Proceedings of the 26th USENIX Security Symposium.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei

Structure and authorization management of RESTful APIs: Accompanying data set for the paper published at ACM SAC 2018

Suzic, B., 2017

Publikation: Nonprint-FormenDatensätze / DatenbankForschung

Datei
Application programming interfaces (API)
Web services

Structuring the Scope: Enabling Adaptive and Multilateral Authorization Management

Suzic, B., Reiter, A. & Marsalek, A., Okt 2017, 2017 IEEE Conference on Communications and Network Security (CNS). Las Vegas: IEEE Press, S. 522-530 9 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Specifications
Web services
Automation
Semantics

SUNFISH ID1v1 – Identity Management and Access Control

SUNFISH WG, Jan 2017

Publikation: Andere BeiträgeSonstiger BeitragForschung

Access control
Security of data
Application programming interfaces (API)
International cooperation
Reusability

SUNFISH ID1v2 – Identity Management and Access Control at Work

SUNFISH WG, Nov 2017

Publikation: Andere BeiträgeSonstiger BeitragForschung

Access control
Security of data

Synthesizing Non-Vacuous Systems

Bloem, R., Chockler, H., Ebrahimi, M. & Strichman, O., 2017, Verification, Model Checking, and Abstract Interpretation. Bouajjani, A. & Monniaux, D. (Hrsg.). Cham: Springer International Publishing AG , S. 55-72 18 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Specifications
Model checking
Hardware

System, Method And Computer-Accessible Medium For Learning An Optimized Variational Network For Medical Image Reconstruction

Knoll, F., Hammernik, K., Pock, T. & Sodickson, D. K., 2017

Publikation: SchutzrechtPatentForschung

The Net Rat: Rethinking Connected Services for Increased Security

Prünster, B., Reimair, F. & Reiter, A., Jul 2017, Proceedings of the 14th International Joint Conference on e-Business and Telecommunications. SciTePress, Band 4: SECRYPT. S. 375-383 9 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Datei
Rats
Data privacy
Mobile devices
Personal computers

To BLISS-B or not to be - Attacking strongSwan's Implementation of Post-Quantum Signatures

Peßl, P., Groot Bruinderink, L. & Yarom, Y., 2017, CCS 2017. Association of Computing Machinery

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access
Recovery
Cryptography
Quantum cryptography
Experiments
Side channel attack

Towards Cross-Border Authorization in European eID Federations

Lenz, T. & Zwattendorfer, B., 2017, 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). IEEE Computer Society, S. 426-434 9 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Open Access

Towards Cross-Domain eID by Using Agile Mobile Authentication

Lenz, T. & Alber, L., 1 Aug 2017, 2017 IEEE Trustcom/BigDataSE/ICESS. S. 570-577 8 S.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung