Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output 1983 2018

2018

A Holistic Approach Towards Peer-to-Peer Security and why Proof of Work Won’t Do

Prünster, B., Kollmann, C. P., Suzic, B. & Ziegler, D. Aug 2018 (Accepted/In press)

Research output: Research - peer-reviewPaper

Peer to peer networks
Communication

Another Flip in the Wall of Rowhammer Defenses

Gruss, D., Lipp, M., Schwarz, M., Genkin, D., Juffinger, J., O'Connell, S., Schoechl, W. & Yarom, Y. 31 Jan 2018 39th IEEE Symposium on Security and Privacy 2018.

Research output: Research - peer-reviewConference contribution

Open Access
File

A Security Analysis of FirstCoin

Marsalek, A., Kollmann, C. & Zefferer, T. 2018 ICT Systems Security and Privacy Protection. Janczewski, L. J. & Kutylowski, M. (eds.). Cham: Springer International Publishing AG , p. 127-140 14 p. (IFIP Advances in Information and Communication Technology; vol. 529)

Research output: Research - peer-reviewConference contribution

Electronic money

Assessment of the generalization of learned image reconstruction and the potential for transfer learning

Knoll, F., Hammernik, K., Kobler, E., Pock, T., Recht, M. P. & Sodickson, D. K. 2018 In : Magnetic resonance in medicine. 13 p.

Research output: Research - peer-reviewArticle

A unified masking approach

Gross, H. & Mangard, S. 1 Mar 2018 In : Journal of cryptographic engineering.

Research output: Research - peer-reviewArticle

Hardware
Costs

Automated Binary Analysis on iOS - A Case Study on Cryptographic Misuse in iOS Applications

Feichtner, J., Missmann, D. & Spreitzer, R. 2018 Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks. New York: ACM, New York, p. 236-247 12 p.

Research output: Research - peer-reviewConference contribution

Open Access
File
Application programming interfaces (API)
Cryptography
Computer operating systems
Inspection
Defects

Best of two worlds: Secure cloud federations meet eIDAS

Zefferer, T., Ziegler, D. & Reiter, A. 10 May 2018 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST). p. 396-401 6 p.

Research output: Research - peer-reviewConference contribution

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange

Derler, D., Jager, T., Slamanig, D. & Striecks, C. 2018 Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018.

Research output: Research - peer-reviewConference contribution

Open Access

Cryptanalysis of MORUS

Ashur, T., Eichlseder, M., Lauridsen, M., Leurent, G., Minaud, B., Rotella, Y. & Viguier, B. 2018 (Accepted/In press) Advances in Cryptology – ASIACRYPT 2018. Springer

Research output: Research - peer-reviewConference contribution

Open Access
File

DATA - Differential Address Trace Analysis: Finding Address-based Side-Channels in Binaries

Weiser, S., Zankl, A., Spreitzer, R., Miller, K., Mangard, S. & Sigl, G. 2018 (Accepted/In press) 27th USENIX Security Symposium . USENIX Association

Research output: Research - peer-reviewConference contribution

Differential Cryptanalysis of Symmetric Primitives

Eichlseder, M. 2018 291 p.

Research output: ResearchDoctoral Thesis

Open Access
File

Differential Fault Attacks on Deterministic Lattice Signatures

Peßl, P. & Groot Bruinderink, L. 2018 In : IACR Transactions on Cryptographic Hardware and Embedded Systems. 2018, 3, p. 21-43

Research output: Research - peer-reviewArticle

Open Access

Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje

Dobraunig, C. E., Mangard, S., Mendel, F. & Primas, R. 2018 (Accepted/In press) Selected Areas in Cryptography – SAC 2018. Springer, 21 p.

Research output: Research - peer-reviewConference contribution

Formal Verification of Masked Hardware Implementations in the Presence of Glitches

Bloem, R., Groß, H., Iusupov, R., Könighofer, B., Mangard, S. & Winter, J. 2018 EUROCRYPT . Springer, Vol. 10821, p. 321-353 33 p. (Lecture Notes in Computer Science)

Research output: Research - peer-reviewConference contribution

Open Access
File

Generic Low-Latency Masking in Hardware

Groß, H., Iusupov, R. & Bloem, R. 31 Aug 2018 In : IACR Transactions on Cryptographic Hardware and Embedded Systems. 2018, 2, p. 1-21

Research output: Research - peer-reviewArticle

Open Access

Highly-Efficient Fully-Anonymous Dynamic Group Signatures

Derler, D. & Slamanig, D. 2018 (Accepted/In press) Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security, AsiaCCS 2018, Songdo, Incheon, Korea, June 4-8, 2018.

Research output: Research - peer-reviewConference contribution

High Speed ASIC Implementations of Leakage-Resilient Cryptography

Schilling, R., Unterluggauer, T., Mangard, S., Gürkaynak, F. K., Mühlberghuber, M. & Benini, L. Mar 2018 Design, Automation & Test in Europe Conference - DATE 2018. Institute of Electrical and Electronics Engineers

Research output: Research - peer-reviewConference contribution

Open Access
File

Hunting Password Leaks in Android Applications

Feichtner, J. 2018 ICT Systems Security and Privacy Protection. Jan Janczewski, L. & Kutyłowski, M. (eds.). Cham: Springer International Publishing AG , Vol. 529, p. 278-292 14 p.

Research output: Research - peer-reviewConference contribution

Open Access
File
Inspection

IAIK ECCelerate SDK 5.0

Hanser, C., Prokop, L. & Ramacher, S. 12 Jul 2018

Research output: ResearchSoftware

JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks

Schwarz, M., Lipp, M. & Gruss, D. 18 Feb 2018 Network and Distributed System Security Symposium 2018. p. 15

Research output: Research - peer-reviewConference contribution

Open Access
File
Websites
Web browsers
World Wide Web
Interfaces (computer)
Hardware

KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks

Schwarz, M., Lipp, M., Gruss, D., Weiser, S., Maurice, C. L. N., Spreitzer, R. & Mangard, S. 18 Feb 2018 Network and Distributed System Security Symposium 2018. p. 15

Research output: Research - peer-reviewConference contribution

Open Access
File
Smartphones
Websites
Side channel attack
Processing
Android (operating system)

Leakage Bounds for Gaussian Side Channels

Unterluggauer, T., Korak, T., Mangard, S., Schilling, R., Benini, L., Gürkaynak, F. K. & Muehlberghuber, M. 2018 16th Smart Card Research and Advanced Application Conference - CARDIS 2017. Springer

Research output: Research - peer-reviewConference contribution

Open Access
Channel capacity
Application specific integrated circuits
Signal to noise ratio
Information theory
Cryptography
Open Access
Authentication
Cryptography
Data storage equipment
Random access storage
Side channel attack

Meltdown

Lipp, M., Schwarz, M., Gruss, D., Prescher, T., Haas, W., Mangard, S., Kocher, P., Genkin, D., Yarom, Y. & Hamburg, M. 3 Jan 2018 In : arXiv.org e-Print archive.

Research output: ResearchArticle

Data storage equipment
Data privacy
Personal computers
Computer systems
Hardware

On The Structure and Authorization Management of RESTful Web Services

Suzic, B., Prünster, B. & Ziegler, D. 2018 Proceedings of the 33st Annual ACM Symposium on Applied Computing. ACM Press

Research output: Research - peer-reviewConference contribution

Open Access
File
Web services
Application programming interfaces (API)
Data privacy
Security of data
Interoperability

Optimizing Wavelet Bases for Sparser Representations

Grandits, T. A. & Pock, T. 2018 Energy Minimization Methods in Computer Vision and Pattern Recognition: EMMCVPR 2017. Pelillo, M. & Hancock, E. (eds.). Cham: Springer, p. 249-262 (Lecture Notes in Computer Science; vol. 10746)

Research output: Research - peer-reviewConference contribution

Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key Primitives

Derler, D., Ramacher, S. & Slamanig, D. 2018 Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Fort Lauderdale, Florida, April 9-11, 2018.

Research output: Research - peer-reviewConference contribution

Practical Witness Encryption for Algebraic Languages Or How to Encrypt Under Groth-Sahai Proofs

Derler, D. & Slamanig, D. 2018 In : Designs, codes and cryptography. 23 p.

Research output: Research - peer-reviewArticle

ProcHarvester: Fully Automated Analysis of Procfs Side-Channel Leaks on Android

Spreitzer, R., Kirchengast, F., Gruss, D. & Mangard, S. 2018 (Accepted/In press) 13th ACM ASIA Conference on Information, Computer and Communications Security.

Research output: Research - peer-reviewConference contribution

Open Access
File
Application programs
Mobile devices
Learning systems
Websites
Statistics

Rasta: A Cipher with Low ANDdepth and Few ANDs per Bit

Dobraunig, C. E., Eichlseder, M., Grassi, L., Lallemend, V., Leander, G., List, E., Mendel, F. & Rechberger, C. 2018 Advances in Cryptology – CRYPTO 2018. Springer, p. 662-692 (Lecture Notes in Computer Science; vol. 10991)

Research output: Research - peer-reviewConference contribution

Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications

Derler, D., Krenn, S., Lorünser, T., Ramacher, S., Slamanig, D. & Striecks, C. 2018 Public-Key Cryptography - PKC 2018, Rio De Janeiro, Brazil, March 25-28, 2018.

Research output: Research - peer-reviewConference contribution

Robust Deformation Estimation in Wood-Composite Materials using Variational Optical Flow

Hofinger, M., Pock, T. & Moosbrugger, T. 5 Feb 2018 p. 97 - 104 8 p.

Research output: Research - peer-reviewPaper

Open Access
Optical flows
Optical Flow
Humidity
Composite Materials
Atmospheric humidity

SCAnDroid: Automated Side-Channel Analysis of Android APIs

Spreitzer, R., Palfinger, G. & Mangard, S. 2018 (Accepted/In press) 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks.

Research output: Research - peer-reviewConference contribution

Open Access
File

Securing Conditional Branches in the Presence of Fault Attacks

Schilling, R., Werner, M. & Mangard, S. Mar 2018 Design, Automation & Test in Europe Conference - DATE 2018: Institute of Electrical and Electronics Engineers.

Research output: Research - peer-reviewConference contribution

Open Access

Short Double- and N-Times-Authentication-Preventing Signatures from ECDSA and More

Derler, D., Ramacher, S. & Slamanig, D. 2018 2018 IEEE European Symposium on Security and Privacy, EuroS&P 2018, London, United Kingdom, April 26-28, 2018.

Research output: Research - peer-reviewConference contribution

Open Access

Single Trace Attack Against RSA Key Generation in Intel SGX SSL

Weiser, S., Spreitzer, R. & Bodner, L. 2018 (Accepted/In press) 13th ACM ASIA Conference on Information, Computer and Communications Security.

Research output: Research - peer-reviewConference contribution

Open Access
File
Hardware
Side channel attack

Sponge-Based Control-Flow Protection for IoT Devices

Werner, M., Unterluggauer, T., Schaffenrath, D. & Mangard, S. 2018 2018 IEEE European Symposium on Security and Privacy. Institute of Electrical and Electronics Engineers

Research output: Research - peer-reviewConference contribution

Open Access
Flow control
Intellectual property
Program processors
Internet of things
Data storage equipment

Spoof-of-Work - Evaluating Device Authorisation in Mobile Mining Processes

Ziegler, D., Prünster, B., Marsalek, A. & Kollmann, C. 28 Jul 2018 Proceedings of the 15th International Joint Conference on e-Business and Telecommunications. Portugal: SciTePress - Science and Technology Publications, Vol. 1: SECRYPT, p. 380-387 8 p.

Research output: Research - peer-reviewConference contribution

Smartphones
Program processors
Electronic money
Android (operating system)

Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures

Dobraunig, C. E., Eichlseder, M., Groß, H., Mangard, S., Mendel, F. & Primas, R. 2018 (Accepted/In press) Advances in Cryptology – ASIACRYPT 2018. Springer, (Lecture Notes in Computer Science)

Research output: Research - peer-reviewConference contribution

Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices

Spreitzer, R., Moonsamy, V., Korak, T. & Mangard, S. 2018 In : IEEE Communications Surveys & Tutorials. 20, 1, p. 465-488 24 p.

Research output: Research - peer-reviewArticle

Open Access
File
Mobile devices
Side channel attack
Smart cards
Smartphones

TIGHTest - Towards automating global Academic Mobility

More, S. J. 14 Jun 2018 68 p.

Research output: ResearchMaster's Thesis

Open Access

Variational 3D-PIV with sparse descriptors

Lasinger, K., Vogel, C., Schindler, K. & Pock, T. 10 May 2018 In : Measurement science & technology. 29, 6, 14 p., 064010

Research output: Research - peer-reviewArticle

2017

An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order

Groß, H., Mangard, S. & Korak, T. 2017 CT-RSA. Springer, Vol. 10159, p. 95-112 18 p. (Lecture Notes in Computer Science)

Research output: Research - peer-reviewConference contribution

Open Access
File

A new structural-differential property of 5-round AES

Grassi, L., Rechberger, C. & Rønjom, S. 2017 Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag Wien, Vol. 10211 LNCS, p. 289-317 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10211 LNCS)

Research output: Research - peer-reviewConference contribution

Structural properties
Data storage equipment
Costs
Random Permutation
Block Cipher

An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics

Conti, F., Schilling, R., Schiavone, P. D., Pullini, A., Rossi, D., Gürkaynak, F. K., Mühlberghuber, M., Gautschi, M., Loi, I., Haugou, G., Mangard, S. & Benini, L. 17 May 2017 IEEE Transactions on Circuits and Systems.

Research output: Research - peer-reviewConference contribution

Ascon hardware implementations and side-channel evaluation

Groß, H., Wenger, E., Dobraunig, C. & Ehrenhöfer, C. 2017 In : Microprocessors and microsystems - Embedded Hardware Design. 52, p. 470-479 10 p.

Research output: Research - peer-reviewArticle

Hardware
Ethernet
Radio frequency identification (RFID)
Sensor nodes
Embedded systems

A Sustainable Architecture for Secure and Usable Mobile Signature Solutions

Zefferer, T. 2017 WEBIST 2015 - Selected and Revised Papers. 1 ed. Springer, p. 343 364 p.

Research output: Research - peer-reviewChapter