Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output

2020

Algebraic Cryptanalysis of Frit

Dobraunig, C., Eichlseder, M., Mendel, F. & Schofnegger, M., Jan 2020, Selected Areas in Cryptography - SAC 2019. Springer, p. 149-170 (Lecture Notes in Computer Science; no. 11959).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

An Empirical Study of the Use of Integrity Verification Mechanisms for Web Subresources

Chapuis, B., Omolola, O., Cherubini, M., Humbert, M. & Huguenin, K., 2020, WWW '20: Proceedings of The Web Conference 2020. Association of Computing Machinery, p. 34-45

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access

Code between the Lines: Semantic Analysis of Android Applications

Feichtner, J. & Gruber, S., 2020, (Accepted/In press). 14 p.

Research output: Contribution to conferencePaperResearchpeer-review

ConTExT: A Generic Approach for Mitigating Spectre

Schwarz, M., Lipp, M., Canella, C. A., Schilling, R., Kargl, F. & Gruß, D., Feb 2020, Network and Distributed System Security Symposium 2020. 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

File

Efficient Access-Control in the IIoT through Attribute-Based Encryption with Outsourced Decryption

Ziegler, D., Marsalek, A., Prünster, B. & Sabongui, J., 2020, (Accepted/In press) Proceedings of the 17th International Joint Conference on e-Business and Telecommunications: SECRYPT. SciTePress - Science and Technology Publications

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Efficient FPGA Implementations of LowMC and Picnic

Kales, D., Ramacher, S., Rechberger, C., Walch, R. & Werner, M., 2020, Topics in Cryptology – CT-RSA 2020: The Cryptographers’ Track at the RSA Conference 2020, San Francisco, CA, USA, February 24–28, 2020, Proceedings. Jarecki, S. (ed.). 12006 ed. San Francisco, CA, USA: Springer, Vol. Lecture Notes in Computer Science. p. 417-441 25 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access

E-Government in the Public Cloud: Requirements and Opportunities

Abraham, A., Hörandner, F., Zefferer, T. & Zwattendorfer, B., 2020, In : Electronic Government. 16, 1

Research output: Contribution to journalArticleResearchpeer-review

ISAP v2.0

Dobraunig, C., Eichlseder, M., Mangard, S., Mendel, F., Mennink, B., Primas, R. & Unterluggauer, T., 2020, (Accepted/In press) In : IACR Transactions on Symmetric Cryptology. 2020, Special Issue

Research output: Contribution to journalArticleResearchpeer-review

LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection

Van Bulck, J., Moghimi, D., Schwarz, M., Lipp, M., Minkin, M., Genkin, D., Yarom, Y., Sunar, B., Gruß, D. & Piessens, F., 18 May 2020, 2020 IEEE Symposium on Security and Privacy. Institute of Electrical and Electronics Engineers, Vol. 1. p. 1452-1470

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access

Malware Guard Extension: abusing Intel SGX to conceal cache attacks

Schwarz, M., Weiser, S., Gruß, D., Maurice, C. L. N. & Mangard, S., 2020, In : Cybersecurity. 3, 20 p., 2.

Research output: Contribution to journalArticleResearchpeer-review

Open Access

Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems

Beyne, T., Canteaut, A., Dinur, I., Eichlseder, M., Leander, G., Leurent, G., Naya-Plasencia, M., Sasaki, Y., Todo, Y. & Wiemer, F., May 2020, (Accepted/In press) Advances in Cryptology – CRYPTO 2020. Springer, (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Privacy-Preserving eID Derivation for Self-Sovereign Identity Systems

Abraham, A., Hörandner, F., Omolola, O. & Ramacher, S., 18 Feb 2020, Proceedings - 21st International Conference on Information and Communications Security. Springer, Vol. 11999.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Protecting against Statistical Ineffective Fault Attacks

Daemen, J., Dobraunig, C., Eichlseder, M., Groß, H., Mendel, F. & Primas, R., 2020, (Accepted/In press) In : IACR Transactions on Cryptographic Hardware and Embedded Systems. 2020, 3

Research output: Contribution to journalArticleResearchpeer-review

Revisiting Privacy-aware Blockchain Public Key Infrastructure

Plessing, P. & Omolola, O., 2020, Proceedings of the 6th International Conference on Information Systems Security and Privacy . SciTePress - Science and Technology Publications, Vol. 1. p. 415-423

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearch

Open Access

Selective End-To-End Data-Sharing in the Cloud

Hörandner, F., Ramacher, S. & Roth, S., 2020, (Accepted/In press) In : Journal of Banking and Financial Technology.

Research output: Contribution to journalArticleResearchpeer-review

This Selfie Does Not Exist - On the Security of Electroneum Cloud Mining

Marsalek, A., Fasllija, E. & Ziegler, D., 2020, (Accepted/In press) This Selfie Does Not Exist - On the Security of Electroneum Cloud Mining. SciTePress - Science and Technology Publications

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Understanding Privacy Awareness in Android App Descriptions Using Deep Learning

Feichtner, J. & Gruber, S., 2020. 12 p.

Research output: Contribution to conferencePaperResearchpeer-review

Open Access
File
2019

A Comparative Study of Misapplied Crypto in Android and iOS Applications

Feichtner, J., 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT. Portugal: SciTePress, p. 96-108 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

A Correctable Public Blockchain

Marsalek, A. & Zefferer, T., 1 Aug 2019, 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019. Institute of Electrical and Electronics Engineers, p. 554-561 8 p. 8887342

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC

Albrecht, M. R., Cid, C., Grassi, L., Khovratovich, D., Lüftenegger, R., Rechberger, C. & Schofnegger, M., 2019, Advances in Cryptology - ASIACRYPT 2019. Cham: Springer, p. 371-397 (Lecture Notes in Computer Science; vol. 11923).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Analyzing the Linear Keystream Biases in AEGIS

Eichlseder, M., Nageler, M. & Primas, R., 2019, In : IACR Transactions on Symmetric Cryptology. 2019, 4, p. 348-368

Research output: Contribution to journalArticleResearchpeer-review

Open Access

A Systematic Evaluation of Transient Execution Attacks and Defenses

Canella, C., Bulck, J. V., Schwarz, M., Lipp, M., Berg, B. V., Ortner, P., Piessens, F., Evtyushkin, D. & Gruss, D., 14 Aug 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 249-266 17 p. (arXiv.org e-Print archive).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Attacking AUTOSAR using Software and Hardware Attacks

Nasahl, P. & Timmers, N., 12 Jul 2019.

Research output: Contribution to conferencePaperResearchpeer-review

File

Big Numbers – Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations

Weiser, S., Schrammel, D., Bodner, L. & Spreitzer, R., 2019, (Accepted/In press) Proceedings of the 29th USENIX Security Symposium. USENIX Association

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Cloud Data Sharing and Device-Loss Recovery with Hardware-Bound Keys

Hörandner, F. & Nieddu, F., 2019, 15th International Conference on Information Systems Security, ICISS 2019. Springer, Vol. 11952. p. 196-217 (Information Systems Security; vol. 11952).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

ConTExT: Leakage-Free Transient Execution

Schwarz, M., Schilling, R., Kargl, F., Lipp, M., Canella, C. & Gruss, D., 22 May 2019, In : arXiv.org e-Print archive. 14 p.

Research output: Contribution to journalArticleResearch

Dependable Internet of Things

Römer, K. U., Witrisal, K., Baunach, M. C., Bloem, R. & Horn, M., 26 Feb 2019, Proceedings of the International Conference on Sensor Networks (SENSORNETS) 2019.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

DNS-based trust scheme publication and discovery: Lightest's trust scheme publication authority

Wagner, G., Wagner, S., More, S. & Hoffmann, M., 1 Jan 2019, Open Identity Summit 2019, Proceedings. Rossnagel, H., Wagner, S. & Huhnlein, D. (eds.). Gesellschaft für Informatik , p. 49-58 10 p. (Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI); vol. P-293).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

DNS-based Trust Scheme Publication and Discovery

Wagner, G., More, S. J., Wagner, S. & Hoffmann, M., 29 Mar 2019, Lecture Notes in Informatics: Open Identity Summit 2019. Gesellschaft für Informatik , Vol. 2019.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Efficient Collision Attack Frameworks for RIPEMD-160

Liu, F., Dobraunig, C., Mendel, F., Isobe, T., Wang, G. & Cao, Z., 1 Jan 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Boldyreva, A. & Micciancio, D. (eds.). Springer-Verlag Italia, p. 117-149 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11693 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Efficient Information-Flow Verification Under Speculative Execution

Bloem, R., Jacobs, S. & Vizel, Y., 2019, Efficient Information-Flow Verification Under Speculative Execution.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Electronic Signatures and Infrastructures (ESI); Procedures for Creation and Validation of AdES Digital Signatures; Part 2: Signature Validation Report

Lipp, P., 20 Feb 2019, Sophia Antipolis : European Telecommunications Standards Institute, ETSI.

Research output: Other contributionResearch

Fallout: Leaking Data on Meltdown-resistant CPUs

Canella, C. A., Genkin, D., Giner, L., Gruß, D., Lipp, M., Minkin, M., Moghimi, D., Piessens, F., Schwarz, M., Sunar, B., Bulck, J. V. & Yarom, Y., 12 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM/IEEE, p. 769-784 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje

Dobraunig, C. E., Mangard, S., Mendel, F. & Primas, R., 2019, Selected Areas in Cryptography – SAC 2018. Cid, C. & Jacobson, M. J. (eds.). Springer, p. 257-277 21 p. (Lecture Notes in Computer Science; vol. 11349).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Feistel Structures for MPC, and More

Albrecht, M. R., Grassi, L., Perrin, L., Ramacher, S., Rechberger, C., Rotaru, D., Roy, A. & Schofnegger, M., 2019, Computer Security – ESORICS 2019. Cham: Springer, p. 151-171 (Lecture Notes in Computer Science; vol. 11736).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Fides – Unleashing the Full Potential of Remote Attestation

Prünster, B., Palfinger, G. & Kollmann, C. P., Jul 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications. SciTePress - Science and Technology Publications, Vol. 2: SECRYPT. p. 314--321

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Fine-Grained Access Control in Industrial Internet of Things: Evaluating Outsourced Attribute-Based Encryption

Ziegler, D., Sabongui, J. & Palfinger, G., Jun 2019, Proceedings of the 34th International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2019. Springer International, p. 91-104

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

File

Flexible und benutzerfreundliche Authentifizierungsverfahren zur Umsetzung transaktionaler E-Government-Services auf mobilen Geräten

Theuermann, K., Zefferer, T., Lenz, T. & Tauber, A., 11 Mar 2019, Handbuch E-Government: Technikinduzierte Verwaltungsentwicklung. Wiesbaden: Springer Fachmedien Wiesbaden, p. 1-30

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Forgery Attacks on FlexAE and FlexAEAD

Eichlseder, M., Kales, D. & Schofnegger, M., Nov 2019, Cryptography and Coding - IMACC 2019. Springer, Cham, p. 200-214 15 p. (Lecture Notes in Computer Science; vol. 11929).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Horcruxes for Everyone - A Framework for Key-Loss Recovery by Splitting Trust

Hörandner, F. & Rabensteiner, C., 2019, 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE Trustcom-19). Institute of Electrical and Electronics Engineers, p. 50-57

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

IAIK ECCelerate SDK 5.01

Ramacher, S., 30 Jan 2019

Research output: Non-print formSoftwareResearch

IAIK ECCelerate SDK 6.0

Guggi, S. L. & Ramacher, S., 4 Jul 2019

Research output: Non-print formSoftwareResearch

IAIK ECCelerate SDK 6.01

Guggi, S. L. & Ramacher, S., 3 Sep 2019

Research output: Non-print formSoftwareResearch

Interactive Quality Analytics of User-generated Content: An Integrated Toolkit for the Case of Wikipedia

Sciascio, C. D., Strohmaier, D., Errecalde, M. & Veas, E., Apr 2019, In : ACM Transactions on Interactive Intelligent Systems . 9, 2-3, p. 1-42 42 p., 13.

Research output: Contribution to journalArticleResearchpeer-review

JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits

Schwarz, M., Lackner, F. & Gruss, D., 24 Feb 2019, NDSS.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Joint Reconstruction and Classification of Tumor Cells and Cell Interactions in Melanoma Tissue Sections with Synthesized Training Data

Effland, A., Kobler, E., Brandenburg, A., Klatzer, T., Neuhäuser, L., Hölzel, M., Landsberg, J., Pock, T. & Rumpf, M., 2019, In : International Journal of Computer Assisted Radiology and Surgery.

Research output: Contribution to journalArticleResearchpeer-review

Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge

Derler, D. & Slamanig, D., 2019, In : Designs, Codes, and Cryptography. 87, 6, p. 1373-1413

Research output: Contribution to journalArticleResearchpeer-review

L*-Based Learning of Markov Decision Processes

Tappler, M., Aichernig, B., Bacci, G., Eichlseder, M. & Larsen, K. G., 2019, Formal Methods - The Next 30 Years . ter Beek, M. H., McIver, A. & Oliveria, J. N. (eds.). Cham: Springer, p. 651 - 669 19 p. (Lecture Notes in Computer Science; vol. 11800).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Learning a Behavior Model of Hybrid Systems Through Combining Model-Based Testing and Machine Learning

Aichernig, B. K., Bloem, R., Ebrahimi, M., Horn, M., Pernkopf, F., Roth, W., Rupp, A., Tappler, M. & Tranninger, M., 2019, Testing Software and Systems: 31st IFIP WG 6.1 International Conference, ICTSS 2019, Paris, France, October 15–17, 2019, Proceedings. Gaston, C., Kosmatov, N. & Le Gall, P. (eds.). Cham: Springer International Publishing AG , p. 3-21 19 p. (Lecture Notes in Computer Science; vol. 11812).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review