Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output 1983 2019

2019

A Comparative Study of Misapplied Crypto in Android and iOS Applications

Feichtner, J., 2019, (Accepted/In press) 16th International Conference on Security and Cryptography (SECRYPT 2019). Portugal: SciTePress, 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programs
Application programming interfaces (API)
Cryptography
iOS (operating system)
Android (operating system)

A Correctable Public Blockchain

Marsalek, A. & Zefferer, T., 2019, (Accepted/In press) 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE Trustcom-19).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Decision making
Experiments

Algebraic Cryptanalysis of Frit

Dobraunig, C., Eichlseder, M., Mendel, F. & Schofnegger, M., 2019, (Accepted/In press) Selected Areas in Cryptography - SAC 2019. Springer, (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Attacking AUTOSAR using Software and Hardware Attacks

Nasahl, P. & Timmers, N., 12 Jul 2019.

Research output: Contribution to conferencePaperResearchpeer-review

File

DNS-based Trust Scheme Publication and Discovery

Wagner, G., More, S. J., Wagner, S. & Hoffmann, M., 29 Mar 2019, Lecture Notes in Informatics: Open Identity Summit 2019. Gesellschaft für Informatik , Vol. 2019.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

E-Government in the Public Cloud: Requirements and Opportunities

Abraham, A., Hörandner, F., Zefferer, T. & Zwattendorfer, B., 6 Feb 2019, (Accepted/In press) In : Electronic Government.

Research output: Contribution to journalArticleResearchpeer-review

public sector
public
services

Electronic Signatures and Infrastructures (ESI); Procedures for Creation and Validation of AdES Digital Signatures; Part 2: Signature Validation Report

Lipp, P., 20 Feb 2019, Sophia Antipolis : European Telecommunications Standards Institute, ETSI.

Research output: Other contributionResearch

Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje

Dobraunig, C. E., Mangard, S., Mendel, F. & Primas, R., 2019, Selected Areas in Cryptography – SAC 2018. Cid, C. & Jacobson, M. J. (eds.). Springer, p. 257-277 21 p. (Lecture Notes in Computer Science; vol. 11349).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Authenticated Encryption
Fault Attacks
Cryptography
Fault
Initialization

Fides – Unleashing the Full Potential of Remote Attestation

Prünster, B., Palfinger, G. & Kollmann, C. P., Jul 2019, (Accepted/In press) Proceedings of the 16th International Joint Conference on e-Business and Telecommunications. SciTePress - Science and Technology Publications, Vol. SECRYPT.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

File
Application programs
Experiments
Open source software

Fine-Grained Access Control in Industrial Internet of Things: Evaluating Outsourced Attribute-Based Encryption

Ziegler, D., Sabongui, J. & Palfinger, G., Jun 2019, Proceedings of the 34th International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2019. Springer International, p. 91-104

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

File

Flexible und benutzerfreundliche Authentifizierungsverfahren zur Umsetzung transaktionaler E-Government-Services auf mobilen Geräten

Theuermann, K., Zefferer, T., Lenz, T. & Tauber, A., 11 Mar 2019, Handbuch E-Government: Technikinduzierte Verwaltungsentwicklung. Wiesbaden: Springer Fachmedien Wiesbaden, p. 1-30

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

IAIK ECCelerate SDK 5.01

Ramacher, S., 30 Jan 2019

Research output: Non-print formSoftwareResearch

IAIK ECCelerate SDK 6.0

Guggi, S. L. & Ramacher, S., 4 Jul 2019

Research output: Non-print formSoftwareResearch

Interactive Quality Analytics of User-generated Content: An Integrated Toolkit for the Case of Wikipedia

Sciascio, C. D., Strohmaier, D., Errecalde, M. & Veas, E., Apr 2019, In : ACM Transactions on Interactive Intelligent Systems . 9, 2-3, p. 1-42 42 p., 13.

Research output: Contribution to journalArticleResearchpeer-review

Defects
Digital libraries
Inspection
Internet
Experiments

JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits

Schwarz, M., Lackner, F. & Gruss, D., 24 Feb 2019, NDSS.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Joint Reconstruction and Classification of Tumor Cells and Cell Interactions in Melanoma Tissue Sections with Synthesized Training Data

Effland, A., Kobler, E., Brandenburg, A., Klatzer, T., Neuhäuser, L., Hölzel, M., Landsberg, J., Pock, T. & Rumpf, M., 2019, (Accepted/In press) In : International Journal of Computer Assisted Radiology and Surgery.

Research output: Contribution to journalArticleResearchpeer-review

Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC

Dinur, I., Promitzer, A., Kales, D., Ramacher, S. & Rechberger, C., 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part I. Ishai, Y. & Rijmen, V. (eds.). Springer, p. 343-372 30 p. (Lecture Notes in Computer Science; vol. 11476).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Block Ciphers
Cryptography
Equivalence
Partial
Encryption

Master of Puppets: Trusting Silicon in the Fight for Practical Security in Fully Decentralised Peer-to-Peer Networks

Prünster, B., Fasllija, E. & Mocher, D. W., 2019, (Accepted/In press) Proceedings of the 16th International Joint Conference on e-Business and Telecommunications. SciTePress - Science and Technology Publications, Vol. SECRYPT.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

File
Peer to peer networks
Silicon
Cloud computing
Hardware
Bandwidth

Mind the Gap: Finding what Updates have (really) changed in Android Applications

Feichtner, J., Neugebauer, L. & Ziegler, D., 2019, (Accepted/In press) 16th International Conference on Security and Cryptography (SECRYPT 2019). Portugal: SciTePress, 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programs
Android (operating system)

Mobile-Only Solution for Server-Based Qualified Electronic Signatures

Theuermann, K., Tauber, A. & Lenz, T., 24 May 2019.

Research output: Contribution to conferencePaperResearchpeer-review

More Practical Single-Trace Attacks on the Number Theoretic Transform

Peßl, P. & Primas, R., 2019, (Accepted/In press) Latincrypt 2019.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
Cryptography
Mathematical transformations
Microcontrollers
Recovery
Side channel attack

Obfuscation-Resilient Code Recognition in Android Apps

Feichtner, J. & Rabensteiner, C., 2019, (Accepted/In press) 14th International Conference on Availability, Reliability and Security (ARES 2019). New York: Association of Computing Machinery, 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programs
Android (operating system)

Policy-based Access Control for the IoT and Smart Cities

Omolola, O., More, S. J., Fasllija, E., Wagner, G. & Alber, L., 29 Mar 2019, Open Identity Summit.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Practical Enclave Malware with Intel SGX

Schwarz, M., Weiser, S. & Gruss, D., 8 Feb 2019, In : arXiv.org e-Print archive. arXiv:1902.03256 .

Research output: Contribution to journalArticleResearch

Electronic mail
Mountings
Personal computers
Program processors
Malware

Privacy-preserving attribute aggregation in eID federations

Priesnitz Filho, W., Ribeiro, C. & Zefferer, T., 1 Mar 2019, In : Future Generation Computer Systems. 92, Volume 92, p. 1-16 16 p.

Research output: Contribution to journalArticleResearchpeer-review

Agglomeration
Ontology
Authentication
Experiments
European Union

Qualified Remote Signatures – Solutions, its Certification, and Use

Leitold, H. & Konrad, D., 2019, Proceedings of 29th SmartCard Workshop. Waldmann, U. (ed.). p. 219-231

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearch

File

Revisiting Privacy-aware Blockchain Public Key Infrastructure

Omolola, O. & Plessing, P., 2019, Cryptology ePrint Archive.

Research output: Book/ReportOther reportResearch

Revisiting User Privacy for Certificate Transparency

Kales, D., Omolola, O. & Ramacher, S., 2019, (Accepted/In press) 4th IEEE European Symposium on Security and Privacy.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

SGXJail: Defeating Enclave Malware via Confinement

Weiser, S., Mayr, L., Schwarz, M. & Gruß, D., Sep 2019, (Accepted/In press) Research in Attacks, Intrusions and Defenses 2019.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Small faults grow up - Verification of error masking robustness in arithmetically encoded programs

Karl, A. F., Schilling, R., Bloem, R. & Mangard, S., 2019, Verification, Model Checking, and Abstract Interpretation - 20th International Conference, VMCAI 2019, Proceedings. Piskac, R. & Enea, C. (eds.). Springer, p. 183-204 22 p. (Lecture Notes in Computer Science; vol. 11388).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Masking
Fault
Robustness
Flip
Soft Error

Spectre Attacks: Exploiting Speculative Execution

Kocher, P., Horn, J., Fogh, A., Genkin, D., Gruss, D., Haas, W., Hamburg, M., Lipp, M., Mangard, S., Prescher, T., Schwarz, M. & Yarom, Y., 20 May 2019, 40th IEEE Symposium on Security and Privacy.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Tackling Data Inefficiency: Compressing the Bitcoin Blockchain

Marsalek, A., Zefferer, T., Fasllija, E. & Ziegler, D., 2019, (Accepted/In press) 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE Trustcom-19).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Internet of things

TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V

Weiser, S., Werner, M., Brasser, F., Malenko, M., Mangard, S. & Sadeghi, A-R., Feb 2019, (Accepted/In press) Network and Distributed System Security Symposium (NDSS) 2019.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Unleashing the Full Potential of Blockchain Technology for Security-Sensitive Business Applications

Marsalek, A., Zefferer, T., Kollmann, C. P. & Teufl, P., 2019, (Accepted/In press) IEEE International Conference on Blockchain and Cryptocurrency. IEEE Xplore

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Usability of Policy Authoring tools: A layered approach

Weinhardt, S. & Omolola, O., 2019, ICISSP 2019 - Proceedings of the 5th International Conference on Information Systems Security and Privacy. Mori, P., Camp, O. & Furnell, S. (eds.). Vol. 1. p. 301-308 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2018

A Counting Semantics for Monitoring LTL Specifications over Finite Traces

Bartocci, E., Bloem, R., Nickovic, D. & Röck, F., 2018, Computer Aided Verification : 30th International Conference, CAV 2018, Held as Part of the Federated Logic Conference, FloC 2018, Oxford, UK, July 14-17, 2018, Proceedings, Part I. Vol. 1. p. 547-564 18 p. (Lecture Notes in Computer Science; vol. 10980).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access

A Federation of Federations: Secure Cloud Federations meet European Identity Federations

Zefferer, T., Ziegler, D. & Reiter, A., Mar 2018, In : International Journal for Information Security Research. Volume 8, Issue 1

Research output: Contribution to journalArticleResearchpeer-review

Agile Smart-device based Multi-factor Authentication for Modern Identity Management Systems

Lenz, T. & Krnjic, V., 2018, Proceedings of the 14th International Conference on Web Information Systems and Technologies. Vol. 1. p. 113-124

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access

A Hierarchical Evaluation Scheme for Pilot-based Research Projects

Zefferer, T., 2018, Proceedings of the 14th International Conference on Web Information Systems and Technologies. Escalona, M. J., Domínguez Mayo, F., Majchrzak, T. & Monfort, V. (eds.). SciTePress, Vol. 1. p. 356-363

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

A Holistic Approach Towards Peer-to-Peer Security and Why Proof of Work Won’t Do

Prünster, B., Kollmann, C. P., Suzic, B. & Ziegler, D., 2018, Security and Privacy in Communication Networks. Beyah, R., Chang, B., Li, Y. & Zhu, S. (eds.). Cham: Springer International, p. 122-138 16 p. ( Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; vol. 255).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Peer to peer networks
Communication

Analysis of the influence of deviations between training and test data in learned image reconstruction

Knoll, F., Hammernik, K., Kobler, E., Pock, T., Sodickson, D. K. & Recht, M. P., 2018.

Research output: Contribution to conferenceAbstractResearchpeer-review

Another Flip in the Wall of Rowhammer Defenses

Gruss, D., Lipp, M., Schwarz, M., Genkin, D., Juffinger, J., O'Connell, S., Schoechl, W. & Yarom, Y., 31 Jan 2018, 39th IEEE Symposium on Security and Privacy 2018.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

A Review of Depth and Normal Fusion Algorithms

Antensteiner, D., Stolc, S. & Pock, T., 2018, In : Sensors .

Research output: Contribution to journalArticleResearchpeer-review

A Security Analysis of FirstCoin

Marsalek, A., Kollmann, C. & Zefferer, T., 2018, ICT Systems Security and Privacy Protection. Janczewski, L. J. & Kutylowski, M. (eds.). Cham: Springer International Publishing AG , p. 127-140 14 p. (IFIP Advances in Information and Communication Technology; vol. 529).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Electronic money

Assessment of the generalization of learned image reconstruction and the potential for transfer learning

Knoll, F., Hammernik, K., Kobler, E., Pock, T., Recht, M. P. & Sodickson, D. K., 2018, In : Magnetic resonance in medicine. 13 p.

Research output: Contribution to journalArticleResearchpeer-review

Assessment of the generalization of learned image reconstruction and the potential for transfer learning

Knoll, F., Hammernik, K., Pock, T., Sodickson, D. K. & Recht, M. P., 2018, p. 3376.

Research output: Contribution to conferenceAbstractResearchpeer-review

A Systematic Evaluation of Transient Execution Attacks and Defenses

Canella, C., Bulck, J. V., Schwarz, M., Lipp, M., Berg, B. V., Ortner, P., Piessens, F., Evtyushkin, D. & Gruss, D., 13 Nov 2018, In : arXiv.org e-Print archive.

Research output: Contribution to journalArticleResearch

File
Core meltdown
Firmware
Program processors
Acoustic waves
Industry

A unified masking approach

Gross, H. & Mangard, S., 1 Mar 2018, In : Journal of cryptographic engineering.

Research output: Contribution to journalArticleResearchpeer-review

Hardware
Costs

Automata Learning for Symbolic Execution

Aichernig, B., Bloem, R., Ebrahimi, M., Tappler, M. & Winter, J., 2018, 2018 Formal Methods in Computer Aided Design, FMCAD 2018, Austin, TX, USA, October 30 - November 2, 2018. Bjørner, N. & Gurfinkel, A. (eds.). IEEE CS, p. 130 - 138 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Testing

Automated Binary Analysis on iOS - A Case Study on Cryptographic Misuse in iOS Applications

Feichtner, J., Missmann, D. & Spreitzer, R., 2018, Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks. New York: Association of Computing Machinery, p. 236-247 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programming interfaces (API)
Cryptography
Computer operating systems
Inspection
Defects