Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output 1983 2019

2019

A Comparative Study of Misapplied Crypto in Android and iOS Applications

Feichtner, J., 2019, (Accepted/In press) 16th International Conference on Security and Cryptography (SECRYPT 2019). Portugal: SciTePress, 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programs
Application programming interfaces (API)
Cryptography
iOS (operating system)
Android (operating system)

A Correctable Public Blockchain

Marsalek, A. & Zefferer, T., 2019, (Accepted/In press) 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE Trustcom-19).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Decision making
Experiments

Algebraic Cryptanalysis of Frit

Dobraunig, C., Eichlseder, M., Mendel, F. & Schofnegger, M., 17 Jun 2019, (Accepted/In press) Selected Areas in Cryptography - SAC 2019. Springer, (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC

Albrecht, M. R., Cid, C., Grassi, L., Khovratovich, D., Lüftenegger, R., Rechberger, C. & Schofnegger, M., 15 Aug 2019, (Accepted/In press) ASIACRYPT 2019.

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Polynomials
Hash functions

Attacking AUTOSAR using Software and Hardware Attacks

Nasahl, P. & Timmers, N., 12 Jul 2019.

Research output: Contribution to conferencePaperResearchpeer-review

File

Cloud Data Sharing and Device-Loss Recovery with Hardware-Bound Keys

Hörandner, F. & Nieddu, F., 2019, (Accepted/In press) 15th International Conference on Information Systems Security, ICISS 2019.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Cryptography
Hardware
Recovery
Computer hardware

DNS-based Trust Scheme Publication and Discovery

Wagner, G., More, S. J., Wagner, S. & Hoffmann, M., 29 Mar 2019, Lecture Notes in Informatics: Open Identity Summit 2019. Gesellschaft für Informatik , Vol. 2019.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

E-Government in the Public Cloud: Requirements and Opportunities

Abraham, A., Hörandner, F., Zefferer, T. & Zwattendorfer, B., 6 Feb 2019, (Accepted/In press) In : Electronic Government.

Research output: Contribution to journalArticleResearchpeer-review

public sector
public
services

Electronic Signatures and Infrastructures (ESI); Procedures for Creation and Validation of AdES Digital Signatures; Part 2: Signature Validation Report

Lipp, P., 20 Feb 2019, Sophia Antipolis : European Telecommunications Standards Institute, ETSI.

Research output: Other contributionResearch

Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje

Dobraunig, C. E., Mangard, S., Mendel, F. & Primas, R., 2019, Selected Areas in Cryptography – SAC 2018. Cid, C. & Jacobson, M. J. (eds.). Springer, p. 257-277 21 p. (Lecture Notes in Computer Science; vol. 11349).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Authenticated Encryption
Fault Attacks
Cryptography
Fault
Initialization

Feistel Structures for MPC, and More

Albrecht, M. R., Grassi, L., Perrin, L., Ramacher, S., Rechberger, C., Rotaru, D., Roy, A. & Schofnegger, M., 21 Jun 2019, (Accepted/In press) ESORICS 2019. 54 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Throughput

Fides – Unleashing the Full Potential of Remote Attestation

Prünster, B., Palfinger, G. & Kollmann, C. P., Jul 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications. SciTePress - Science and Technology Publications, Vol. 2: SECRYPT. p. 314--321

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programs
Experiments
Open source software

Fine-Grained Access Control in Industrial Internet of Things: Evaluating Outsourced Attribute-Based Encryption

Ziegler, D., Sabongui, J. & Palfinger, G., Jun 2019, Proceedings of the 34th International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2019. Springer International, p. 91-104

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

File

Flexible und benutzerfreundliche Authentifizierungsverfahren zur Umsetzung transaktionaler E-Government-Services auf mobilen Geräten

Theuermann, K., Zefferer, T., Lenz, T. & Tauber, A., 11 Mar 2019, Handbuch E-Government: Technikinduzierte Verwaltungsentwicklung. Wiesbaden: Springer Fachmedien Wiesbaden, p. 1-30

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Forgery Attacks on FlexAE and FlexAEAD

Eichlseder, M., Kales, D. & Schofnegger, M., 5 Sep 2019, (Accepted/In press) IMACC 2019. 12 p.

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Standardization
Cryptography

Horcruxes for Everyone - A Framework for Key-Loss Recovery by Splitting Trust

Hörandner, F. & Rabensteiner, C., 2019, (Accepted/In press) 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE Trustcom-19).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Recovery
Servers
Application programs
Authentication
Costs

IAIK ECCelerate SDK 5.01

Ramacher, S., 30 Jan 2019

Research output: Non-print formSoftwareResearch

IAIK ECCelerate SDK 6.0

Guggi, S. L. & Ramacher, S., 4 Jul 2019

Research output: Non-print formSoftwareResearch

IAIK ECCelerate SDK 6.01

Guggi, S. L. & Ramacher, S., 3 Sep 2019

Research output: Non-print formSoftwareResearch

Interactive Quality Analytics of User-generated Content: An Integrated Toolkit for the Case of Wikipedia

Sciascio, C. D., Strohmaier, D., Errecalde, M. & Veas, E., Apr 2019, In : ACM Transactions on Interactive Intelligent Systems . 9, 2-3, p. 1-42 42 p., 13.

Research output: Contribution to journalArticleResearchpeer-review

Defects
Digital libraries
Inspection
Internet
Experiments

JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits

Schwarz, M., Lackner, F. & Gruss, D., 24 Feb 2019, NDSS.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Joint Reconstruction and Classification of Tumor Cells and Cell Interactions in Melanoma Tissue Sections with Synthesized Training Data

Effland, A., Kobler, E., Brandenburg, A., Klatzer, T., Neuhäuser, L., Hölzel, M., Landsberg, J., Pock, T. & Rumpf, M., 2019, In : International Journal of Computer Assisted Radiology and Surgery.

Research output: Contribution to journalArticleResearchpeer-review

Learning a Behavior Model of Hybrid Systems Through Combining Model-Based Testing and Machine Learning

Aichernig, B. K., Bloem, R., Ebrahimi, M., Horn, M., Pernkopf, F., Roth, W., Rupp, A., Tappler, M. & Tranninger, M., 2019, Testing Software and Systems. Gaston, C., Kosmatov, N. & Le Gall, P. (eds.). Cham: Springer International Publishing AG , p. 3-21 19 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Hybrid systems
Learning systems
Testing
Recurrent neural networks

Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC

Dinur, I., Promitzer, A., Kales, D., Ramacher, S. & Rechberger, C., 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part I. Ishai, Y. & Rijmen, V. (eds.). Springer, p. 343-372 30 p. (Lecture Notes in Computer Science; vol. 11476).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Block Ciphers
Cryptography
Equivalence
Partial
Encryption

Master of Puppets: Trusting Silicon in the Fight for Practical Security in Fully Decentralised Peer-to-Peer Networks

Prünster, B., Fasllija, E. & Mocher, D. W., Jul 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications. SciTePress - Science and Technology Publications, Vol. 2: SECRYPT. p. 252--259

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Peer to peer networks
Silicon
Cloud computing
Hardware
Bandwidth

Mind the Gap: Finding what Updates have (really) changed in Android Applications

Feichtner, J., Neugebauer, L. & Ziegler, D., 2019, (Accepted/In press) 16th International Conference on Security and Cryptography (SECRYPT 2019). Portugal: SciTePress, 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programs
Android (operating system)
Recovery

Mobile-Only Solution for Server-Based Qualified Electronic Signatures

Theuermann, K., Tauber, A. & Lenz, T., 24 May 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC). Shanghai, China, 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Mobile Private Contact Discovery at Scale

Kales, D., Rechberger, C., Schneider, T., Senker, M. & Weinert, C., 14 Aug 2019, 28th USENIX Security Symposium. USENIX Association, p. 1447-1464

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
Smartphones
Communication
Networks (circuits)
Mobile devices
Cryptography

More Practical Single-Trace Attacks on the Number Theoretic Transform

Peßl, P. & Primas, R., 2019, Progress in Cryptology – LATINCRYPT 2019: 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2–4, 2019, Proceedings. Springer, (Lecture Notes in Computer Science; vol. 11774).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
Cryptography
Mathematical transformations
Microcontrollers
Recovery
Side channel attack

Obfuscation-Resilient Code Recognition in Android Apps

Feichtner, J. & Rabensteiner, C., 2019, (Accepted/In press) 14th International Conference on Availability, Reliability and Security (ARES 2019). New York: Association of Computing Machinery, 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programs
Android (operating system)
Substitution reactions
Data transfer
Throughput
Concretes
Bandwidth

Policy-based Access Control for the IoT and Smart Cities

Omolola, O., More, S. J., Fasllija, E., Wagner, G. & Alber, L., 29 Mar 2019, Open Identity Summit.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Practical Enclave Malware with Intel SGX

Schwarz, M., Weiser, S. & Gruss, D., 8 Feb 2019, In : arXiv.org e-Print archive. arXiv:1902.03256 .

Research output: Contribution to journalArticleResearch

Electronic mail
Mountings
Personal computers
Program processors
Malware

Privacy-preserving attribute aggregation in eID federations

Priesnitz Filho, W., Ribeiro, C. & Zefferer, T., 1 Mar 2019, In : Future Generation Computer Systems. 92, Volume 92, p. 1-16 16 p.

Research output: Contribution to journalArticleResearchpeer-review

Agglomeration
Ontology
Authentication
Experiments
European Union

Protecting against Statistical Ineffective Fault Attacks

Daemen, J., Dobraunig, C., Eichlseder, M., Groß, H., Mendel, F. & Primas, R., 2019, (IACR Cryptology ePrint Archive; no. 2019/536).

Research output: Working paperResearch

Prying CoW: Inferring Secrets Across Virtual Machine Boundaries

Palfinger, G., Prünster, B. & Ziegler, D., 2019, (Accepted/In press) Proceedings of the 16th International Joint Conference on e-Business and Telecommunications. Prague, Czech Republic: SciTePress - Science and Technology Publications, Vol. SECRYPT.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Qualified Remote Signatures – Solutions, its Certification, and Use

Leitold, H. & Konrad, D., 2019, Proceedings of 29th SmartCard Workshop. Waldmann, U. (ed.). p. 219-231

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearch

File

Revisiting Privacy-aware Blockchain Public Key Infrastructure

Omolola, O. & Plessing, P., 2019, Cryptology ePrint Archive.

Research output: Book/ReportOther reportResearch

Revisiting User Privacy for Certificate Transparency

Kales, D., Omolola, O. & Ramacher, S., 2019, (Accepted/In press) 4th IEEE European Symposium on Security and Privacy.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Selective End-To-End Data-Sharing in the Cloud

Hörandner, F., Ramacher, S. & Roth, S., 2019, (Accepted/In press) 15th International Conference on Information Systems Security, ICISS 2019.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Cryptography

SGXJail: Defeating Enclave Malware via Confinement

Weiser, S., Mayr, L., Schwarz, M. & Gruß, D., Sep 2019, (Accepted/In press) Research in Attacks, Intrusions and Defenses 2019.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Small faults grow up - Verification of error masking robustness in arithmetically encoded programs

Karl, A. F., Schilling, R., Bloem, R. & Mangard, S., 2019, Verification, Model Checking, and Abstract Interpretation - 20th International Conference, VMCAI 2019, Proceedings. Piskac, R. & Enea, C. (eds.). Springer, p. 183-204 22 p. (Lecture Notes in Computer Science; vol. 11388).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Masking
Fault
Robustness
Flip
Soft Error

Spectre Attacks: Exploiting Speculative Execution

Kocher, P., Horn, J., Fogh, A., Genkin, D., Gruss, D., Haas, W., Hamburg, M., Lipp, M., Mangard, S., Prescher, T., Schwarz, M. & Yarom, Y., 20 May 2019, 40th IEEE Symposium on Security and Privacy.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Starkad and Poseidon: New Hash Functions for Zero Knowledge Proof Systems

Grassi, L., Kales, D., Khovratovich, D., Roy, A., Rechberger, C. & Schofnegger, M., 6 May 2019.

Research output: Working paperResearch

Hash functions
Concretes

Tackling Data Inefficiency: Compressing the Bitcoin Blockchain

Marsalek, A., Zefferer, T., Fasllija, E. & Ziegler, D., 2019, (Accepted/In press) 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE Trustcom-19).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Internet of things

TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V

Weiser, S., Werner, M., Brasser, F., Malenko, M., Mangard, S. & Sadeghi, A-R., Feb 2019, (Accepted/In press) Network and Distributed System Security Symposium (NDSS) 2019.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Unleashing the Full Potential of Blockchain Technology for Security-Sensitive Business Applications

Marsalek, A., Kollmann, C., Zefferer, T. & Teufl, P., 1 May 2019, ICBC 2019 - IEEE International Conference on Blockchain and Cryptocurrency. Institute of Electrical and Electronics Engineers, p. 394-402 9 p. 8751444

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Industry
Data privacy
Security of data
Middleware
Privacy

Usability of Policy Authoring tools: A layered approach

Weinhardt, S. & Omolola, O., 2019, ICISSP 2019 - Proceedings of the 5th International Conference on Information Systems Security and Privacy. Mori, P., Camp, O. & Furnell, S. (eds.). Vol. 1. p. 301-308 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

ZombieLoad: Cross-Privilege-Boundary Data Sampling

Schwarz, M., Lipp, M., Moghimi, D., Bulck, J. V., Stecklina, J., Prescher, T. & Gruss, D., 12 Nov 2019, (Accepted/In press) CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM/IEEE

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Program processors
Sampling
Faulting
Data storage equipment
Virtual machine