Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output 1983 2019

2019

A Comparative Study of Misapplied Crypto in Android and iOS Applications

Feichtner, J., 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT. Portugal: SciTePress, p. 96-108 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programs
Application programming interfaces (API)
Cryptography
iOS (operating system)
Android (operating system)

A Correctable Public Blockchain

Marsalek, A. & Zefferer, T., 1 Aug 2019, 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019. Institute of Electrical and Electronics Engineers, p. 554-561 8 p. 8887342

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Decision making
Experiments
Decentralized decision making
Security analysis
Currency

Algebraic Cryptanalysis of Frit

Dobraunig, C., Eichlseder, M., Mendel, F. & Schofnegger, M., 17 Jun 2019, (Accepted/In press) Selected Areas in Cryptography - SAC 2019. Springer, (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC

Albrecht, M. R., Cid, C., Grassi, L., Khovratovich, D., Lüftenegger, R., Rechberger, C. & Schofnegger, M., 15 Aug 2019, (Accepted/In press) ASIACRYPT 2019.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Polynomials
Hash functions

A Systematic Evaluation of Transient Execution Attacks and Defenses

Canella, C., Bulck, J. V., Schwarz, M., Lipp, M., Berg, B. V., Ortner, P., Piessens, F., Evtyushkin, D. & Gruss, D., 14 Aug 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 249-266 17 p. (arXiv.org e-Print archive).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Program processors
Core meltdown
Firmware
Industry

Attacking AUTOSAR using Software and Hardware Attacks

Nasahl, P. & Timmers, N., 12 Jul 2019.

Research output: Contribution to conferencePaperResearchpeer-review

File

Cloud Data Sharing and Device-Loss Recovery with Hardware-Bound Keys

Hörandner, F. & Nieddu, F., 2019, (Accepted/In press) 15th International Conference on Information Systems Security, ICISS 2019.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Cryptography
Hardware
Recovery
Computer hardware

ConTExT: Leakage-Free Transient Execution

Schwarz, M., Schilling, R., Kargl, F., Lipp, M., Canella, C. & Gruss, D., 22 May 2019, In : arXiv.org e-Print archive. 14 p.

Research output: Contribution to journalArticleResearch

Computer operating systems
Computer hardware
Sampling
Data storage equipment

DNS-based Trust Scheme Publication and Discovery

Wagner, G., More, S. J., Wagner, S. & Hoffmann, M., 29 Mar 2019, Lecture Notes in Informatics: Open Identity Summit 2019. Gesellschaft für Informatik , Vol. 2019.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

E-Government in the Public Cloud: Requirements and Opportunities

Abraham, A., Hörandner, F., Zefferer, T. & Zwattendorfer, B., 6 Feb 2019, (Accepted/In press) In : Electronic Government.

Research output: Contribution to journalArticleResearchpeer-review

public sector
public
services

Electronic Signatures and Infrastructures (ESI); Procedures for Creation and Validation of AdES Digital Signatures; Part 2: Signature Validation Report

Lipp, P., 20 Feb 2019, Sophia Antipolis : European Telecommunications Standards Institute, ETSI.

Research output: Other contributionResearch

Fallout: Leaking Data on Meltdown-resistant CPUs

Canella, C. A., Genkin, D., Giner, L., Gruß, D., Lipp, M., Minkin, M., Moghimi, D., Piessens, F., Schwarz, M., Sunar, B., Bulck, J. V. & Yarom, Y., 12 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM/IEEE, p. 769-784 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Fallout
Metadata
Flow control
Program processors
Hardware

Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje

Dobraunig, C. E., Mangard, S., Mendel, F. & Primas, R., 2019, Selected Areas in Cryptography – SAC 2018. Cid, C. & Jacobson, M. J. (eds.). Springer, p. 257-277 21 p. (Lecture Notes in Computer Science; vol. 11349).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Authenticated Encryption
Fault Attacks
Cryptography
Fault
Initialization

Feistel Structures for MPC, and More

Albrecht, M. R., Grassi, L., Perrin, L., Ramacher, S., Rechberger, C., Rotaru, D., Roy, A. & Schofnegger, M., 21 Jun 2019, (Accepted/In press) ESORICS 2019. 54 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Throughput

Fides – Unleashing the Full Potential of Remote Attestation

Prünster, B., Palfinger, G. & Kollmann, C. P., Jul 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications. SciTePress - Science and Technology Publications, Vol. 2: SECRYPT. p. 314--321

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programs
Experiments
Open source software

Fine-Grained Access Control in Industrial Internet of Things: Evaluating Outsourced Attribute-Based Encryption

Ziegler, D., Sabongui, J. & Palfinger, G., Jun 2019, Proceedings of the 34th International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2019. Springer International, p. 91-104

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

File

Flexible und benutzerfreundliche Authentifizierungsverfahren zur Umsetzung transaktionaler E-Government-Services auf mobilen Geräten

Theuermann, K., Zefferer, T., Lenz, T. & Tauber, A., 11 Mar 2019, Handbuch E-Government: Technikinduzierte Verwaltungsentwicklung. Wiesbaden: Springer Fachmedien Wiesbaden, p. 1-30

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Forgery Attacks on FlexAE and FlexAEAD

Eichlseder, M., Kales, D. & Schofnegger, M., 5 Sep 2019, (Accepted/In press) IMA Cryptography and Coding - IMACC 2019. 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Standardization
Cryptography

Horcruxes for Everyone - A Framework for Key-Loss Recovery by Splitting Trust

Hörandner, F. & Rabensteiner, C., 2019, (Accepted/In press) 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE Trustcom-19).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Recovery
Servers
Application programs
Authentication
Costs

IAIK ECCelerate SDK 5.01

Ramacher, S., 30 Jan 2019

Research output: Non-print formSoftwareResearch

IAIK ECCelerate SDK 6.0

Guggi, S. L. & Ramacher, S., 4 Jul 2019

Research output: Non-print formSoftwareResearch

IAIK ECCelerate SDK 6.01

Guggi, S. L. & Ramacher, S., 3 Sep 2019

Research output: Non-print formSoftwareResearch

Interactive Quality Analytics of User-generated Content: An Integrated Toolkit for the Case of Wikipedia

Sciascio, C. D., Strohmaier, D., Errecalde, M. & Veas, E., Apr 2019, In : ACM Transactions on Interactive Intelligent Systems . 9, 2-3, p. 1-42 42 p., 13.

Research output: Contribution to journalArticleResearchpeer-review

Defects
Digital libraries
Inspection
Internet
Experiments

JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits

Schwarz, M., Lackner, F. & Gruss, D., 24 Feb 2019, NDSS.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Joint Reconstruction and Classification of Tumor Cells and Cell Interactions in Melanoma Tissue Sections with Synthesized Training Data

Effland, A., Kobler, E., Brandenburg, A., Klatzer, T., Neuhäuser, L., Hölzel, M., Landsberg, J., Pock, T. & Rumpf, M., 2019, In : International Journal of Computer Assisted Radiology and Surgery.

Research output: Contribution to journalArticleResearchpeer-review

Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge

Derler, D. & Slamanig, D., 2019, In : Designs, Codes, and Cryptography. 87, 6, p. 1373-1413

Research output: Contribution to journalArticleResearchpeer-review

Zero-knowledge
Flavors
Homomorphic
Cryptography
Signature

L*-Based Learning of Markov Decision Processes

Tappler, M., Aichernig, B., Bacci, G., Eichlseder, M. & Larsen, K. G., 2019, Formal Methods - The Next 30 Years . ter Beek, M. H., McIver, A. & Oliveria, J. N. (eds.). Cham: Springer, p. 651 - 669 19 p. (Lecture Notes in Computer Science; vol. 11800).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Learning algorithms
Sampling
Formal languages
Model structures
Testing

Learning a Behavior Model of Hybrid Systems Through Combining Model-Based Testing and Machine Learning

Aichernig, B. K., Bloem, R., Ebrahimi, M., Horn, M., Pernkopf, F., Roth, W., Rupp, A., Tappler, M. & Tranninger, M., 2019, Testing Software and Systems: 31st IFIP WG 6.1 International Conference, ICTSS 2019, Paris, France, October 15–17, 2019, Proceedings. Gaston, C., Kosmatov, N. & Le Gall, P. (eds.). Cham: Springer International Publishing AG , p. 3-21 19 p. (Lecture Notes in Computer Science; vol. 11812).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Hybrid systems
Learning systems
Testing
Recurrent neural networks

Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC

Dinur, I., Promitzer, A., Kales, D., Ramacher, S. & Rechberger, C., 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part I. Ishai, Y. & Rijmen, V. (eds.). Springer, p. 343-372 30 p. (Lecture Notes in Computer Science; vol. 11476).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Block Ciphers
Cryptography
Equivalence
Partial
Encryption

Master of Puppets: Trusting Silicon in the Fight for Practical Security in Fully Decentralised Peer-to-Peer Networks

Prünster, B., Fasllija, E. & Mocher, D. W., Jul 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications. SciTePress - Science and Technology Publications, Vol. 2: SECRYPT. p. 252--259

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Peer to peer networks
Silicon
Cloud computing
Hardware
Bandwidth

Mind the Gap: Finding what Updates have (really) changed in Android Applications

Feichtner, J., Neugebauer, L. & Ziegler, D., 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT. Portugal: SciTePress, p. 306-313 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programs
Android (operating system)
Recovery

Mobile-Only Solution for Server-Based Qualified Electronic Signatures

Theuermann, K., Tauber, A. & Lenz, T., 24 May 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC). Shanghai, China, 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Mobile Private Contact Discovery at Scale

Kales, D., Rechberger, C., Schneider, T., Senker, M. & Weinert, C., 14 Aug 2019, 28th USENIX Security Symposium. USENIX Association, p. 1447-1464

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
Smartphones
Communication
Networks (circuits)
Mobile devices
Cryptography

More Practical Single-Trace Attacks on the Number Theoretic Transform

Peßl, P. & Primas, R., 2019, Progress in Cryptology – LATINCRYPT 2019: 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2–4, 2019, Proceedings. Springer, (Lecture Notes in Computer Science; vol. 11774).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
Cryptography
Mathematical transformations
Microcontrollers
Recovery
Side channel attack

NetSpectre: Read Arbitrary Memory over Network

Schwarz, M., Schwarzl, M., Lipp, M., Masters, J. & Gruß, D., Sep 2019, Computer Security - ESORICS 2019: 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings. Cham: Springer, Vol. 1. p. 279-299 (Lecture Notes in Computer Science; vol. 11735).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Data storage equipment

Obfuscation-Resilient Code Recognition in Android Apps

Feichtner, J. & Rabensteiner, C., 2019, 14th International Conference on Availability, Reliability and Security (ARES 2019). New York: Association of Computing Machinery, 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programs
Android (operating system)
Substitution reactions
Data transfer
Throughput
Concretes
Bandwidth

Page Cache Attacks

Gruss, D., Kraft, E., Tiwari, T., Schwarz, M., Trachtenberg, A., Hennessey, J., Ionescu, A. & Fogh, A., 12 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM/IEEE, p. 167-180

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Hardware
Computer operating systems
Computer systems
Servers
Monitoring

Phish-Hook: Detecting Phishing Certificates Using Certificate Transparency Logs

Fasllija, E., Enişer, H. F. & Prünster, B., 23 Oct 2019, 15th EAI International Conference on Security and Privacy in Communication Networks. Springer

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Hooks
Transparency
Labels
Websites
Visibility

Policy-based access control for the IoT and Smart Cities

Omolola, O., More, S., Fasllija, E., Wagner, G. & Alber, L., 1 Jan 2019, Open Identity Summit 2019, Proceedings. Rossnagel, H., Wagner, S. & Huhnlein, D. (eds.). Gesellschaft fur Informatik (GI), p. 157-163 7 p. (Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI); vol. P-293).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Access control
Network protocols
Data privacy
Data storage equipment
Smart city

Practical Enclave Malware with Intel SGX

Schwarz, M., Weiser, S. & Gruss, D., 8 Feb 2019, In : arXiv.org e-Print archive. arXiv:1902.03256 .

Research output: Contribution to journalArticleResearch

Electronic mail
Mountings
Personal computers
Program processors
Malware

Privacy-preserving attribute aggregation in eID federations

Priesnitz Filho, W., Ribeiro, C. & Zefferer, T., 1 Mar 2019, In : Future Generation Computer Systems. 92, Volume 92, p. 1-16 16 p.

Research output: Contribution to journalArticleResearchpeer-review

Agglomeration
Ontology
Authentication
Experiments
European Union

Protecting against Statistical Ineffective Fault Attacks

Daemen, J., Dobraunig, C., Eichlseder, M., Groß, H., Mendel, F. & Primas, R., 2019, (IACR Cryptology ePrint Archive; no. 2019/536).

Research output: Working paperResearch

Protecting RISC-V Processors against Physical Attacks

Werner, M., Schilling, R., Unterluggauer, T. & Mangard, S., 2019, Design, Automation & Test in Europe Conference - DATE 2019. p. 1136-1141 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

File
Reduced instruction set computing
Microcontrollers
Data storage equipment
Flow control
Program processors

Prying CoW: Inferring Secrets Across Virtual Machine Boundaries

Palfinger, G., Prünster, B. & Ziegler, D., Jul 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications. Prague, Czech Republic: SciTePress - Science and Technology Publications, Vol. 2: SECRYPT. p. 187 - 197

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
Computer operating systems
Hardware
Virtual machine

Qualified Remote Signatures – Solutions, its Certification, and Use

Leitold, H. & Konrad, D., 2019, Proceedings of 29th SmartCard Workshop. Waldmann, U. (ed.). p. 219-231

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearch

File

Revisiting Privacy-aware Blockchain Public Key Infrastructure

Omolola, O. & Plessing, P., 2019, Cryptology ePrint Archive.

Research output: Book/ReportOther reportResearch

Revisiting User Privacy for Certificate Transparency

Kales, D., Omolola, O. & Ramacher, S., 2019, 4th IEEE European Symposium on Security and Privacy.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Run-Time Optimization for Learned Controllers Through Quantitative Games

Avni, G., Bloem, R., Chatterjee, K., Henzinger, T., Könighofer, B. & Pranger, S., 15 Jul 2019, Computer Aided Verification (CAV). Dillig, I. & Tasiran, S. (eds.). 31 ed. Springer, Vol. 11561. p. 630-649 ( Lecture Notes in Computer Science; vol. 11561).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
Controllers
Emergency vehicles
Stochastic models
Telecommunication traffic
Learning systems