Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output 1983 2019

2019

DNS-based Trust Scheme Publication and Discovery

Wagner, G., More, S. J., Wagner, S. & Hoffmann, M., 29 Mar 2019, Lecture Notes in Informatics: Open Identity Summit 2019. Gesellschaft für Informatik , Vol. 2019

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje

Dobraunig, C. E., Mangard, S., Mendel, F. & Primas, R., 2019, Selected Areas in Cryptography – SAC 2018. Springer, p. 257-277 21 p. (Lecture Notes in Computer Science; vol. 11349)

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Fine-Grained Access Control in Industrial Internet of Things: Evaluating Outsourced Attribute-Based Encryption

Ziegler, D., Sabongui, J. & Palfinger, G., 2019, (Accepted/In press) Proceedings of the 34th International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2019.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Flexible und benutzerfreundliche Authentifizierungsverfahren zur Umsetzung transaktionaler E-Government-Services auf mobilen Geräten

Theuermann, K., Zefferer, T., Lenz, T. & Tauber, A., 11 Mar 2019, Handbuch E-Government: Technikinduzierte Verwaltungsentwicklung. Wiesbaden: Springer Fachmedien Wiesbaden, p. 1-30

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

IAIK ECCelerate SDK 5.01

Ramacher, S., 30 Jan 2019

Research output: Non-print formSoftwareResearch

JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits

Schwarz, M., Lackner, F. & Gruss, D., 24 Feb 2019, NDSS.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Joint Reconstruction and Classification of Tumor Cells and Cell Interactions in Melanoma Tissue Sections with Synthesized Training Data

Effland, A., Kobler, E., Brandenburg, A., Klatzer, T., Neuhäuser, L., Hölzel, M., Landsberg, J., Pock, T. & Rumpf, M., 2019, (Accepted/In press) In : International Journal of Computer Assisted Radiology and Surgery.

Research output: Contribution to journalArticleResearchpeer-review

Policy-based Access Control for the IoT and Smart Cities

Omolola, O., More, S. J., Fasllija, E., Wagner, G. & Alber, L., 29 Mar 2019, Open Identity Summit.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Practical Enclave Malware with Intel SGX

Schwarz, M., Weiser, S. & Gruss, D., 8 Feb 2019, In : arXiv.org e-Print archive. arXiv:1902.03256

Research output: Contribution to journalArticleResearch

Electronic mail
Mountings
Personal computers
Program processors
Malware

Privacy-preserving attribute aggregation in eID federations

Priesnitz Filho, W., Ribeiro, C. & Zefferer, T., Mar 2019, In : Future Generation Computer Systems. Volume 92, p. 1-16

Research output: Contribution to journalArticleResearchpeer-review

Qualified Remote Signatures – Solutions, its Certification, and Use

Leitold, H. & Konrad, D., 2019, Proceedings of 29th SmartCard Workshop. Waldmann, U. (ed.). p. 219-231

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearch

File

Revisiting User Privacy for Certificate Transparency

Kales, D., Omolola, O. & Ramacher, S., 2019, (Accepted/In press) 4th IEEE European Symposium on Security and Privacy .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Spectre Attacks: Exploiting Speculative Execution

Kocher, P., Horn, J., Fogh, A., Genkin, D., Gruss, D., Haas, W., Hamburg, M., Lipp, M., Mangard, S., Prescher, T., Schwarz, M. & Yarom, Y., 20 May 2019, 40th IEEE Symposium on Security and Privacy.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V

Weiser, S., Werner, M., Brasser, F., Malenko, M., Mangard, S. & Sadeghi, A-R., Feb 2019, (Accepted/In press) Network and Distributed System Security Symposium (NDSS) 2019.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Unleashing the Full Potential of Blockchain Technology for Security-Sensitive Business Applications

Marsalek, A., Zefferer, T., Kollmann, C. P. & Teufl, P., 2019, (Accepted/In press) IEEE International Conference on Blockchain and Cryptocurrency. IEEE Xplore

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Usability of Policy Authoring tools: A layered approach

Weinhardt, S. & Omolola, O., 25 Feb 2019, International Conference on Information Systems Security and Privacy.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2018

A Counting Semantics for Monitoring LTL Specifications over Finite Traces

Bartocci, E., Bloem, R., Nickovic, D. & Röck, F., 2018, Computer Aided Verification : 30th International Conference, CAV 2018, Held as Part of the Federated Logic Conference, FloC 2018, Oxford, UK, July 14-17, 2018, Proceedings, Part I. Vol. 1, p. 547-564 18 p. (Lecture Notes in Computer Science; vol. 10980)

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access

A Federation of Federations: Secure Cloud Federations meet European Identity Federations

Zefferer, T., Ziegler, D. & Reiter, A., Mar 2018, In : International Journal for Information Security Research. Volume 8, Issue 1

Research output: Contribution to journalArticleResearchpeer-review

Agile Smart-device based Multi-factor Authentication for Modern Identity Management Systems

Lenz, T. & Krnjic, V., 2018, Proceedings of the 14th International Conference on Web Information Systems and Technologies. Vol. 1, p. 113-124

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access

A Hierarchical Evaluation Scheme for Pilot-based Research Projects

Zefferer, T., 2018, Proceedings of the 14th International Conference on Web Information Systems and Technologies. Escalona, M. J., Domínguez Mayo, F., Majchrzak, T. & Monfort, V. (eds.). SciTePress, Vol. 1, p. 356-363

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

A Holistic Approach Towards Peer-to-Peer Security and Why Proof of Work Won’t Do

Prünster, B., Kollmann, C. P., Suzic, B. & Ziegler, D., 2018, Security and Privacy in Communication Networks. Beyah, R., Chang, B., Li, Y. & Zhu, S. (eds.). Cham: Springer International, p. 122-138 16 p. ( Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; vol. 255)

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Peer to peer networks
Communication

Analysis of the influence of deviations between training and test data in learned image reconstruction

Knoll, F., Hammernik, K., Kobler, E., Pock, T., Sodickson, D. K. & Recht, M. P., 2018

Research output: Contribution to conferenceAbstractResearchpeer-review

Another Flip in the Wall of Rowhammer Defenses

Gruss, D., Lipp, M., Schwarz, M., Genkin, D., Juffinger, J., O'Connell, S., Schoechl, W. & Yarom, Y., 31 Jan 2018, 39th IEEE Symposium on Security and Privacy 2018.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

A Review of Depth and Normal Fusion Algorithms

Antensteiner, D., Stolc, S. & Pock, T., 2018, In : Sensors .

Research output: Contribution to journalArticleResearchpeer-review

A Security Analysis of FirstCoin

Marsalek, A., Kollmann, C. & Zefferer, T., 2018, ICT Systems Security and Privacy Protection. Janczewski, L. J. & Kutylowski, M. (eds.). Cham: Springer International Publishing AG , p. 127-140 14 p. (IFIP Advances in Information and Communication Technology; vol. 529)

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Electronic money

Assessment of the generalization of learned image reconstruction and the potential for transfer learning

Knoll, F., Hammernik, K., Pock, T., Sodickson, D. K. & Recht, M. P., 2018, p. 3376

Research output: Contribution to conferenceAbstractResearchpeer-review

Assessment of the generalization of learned image reconstruction and the potential for transfer learning

Knoll, F., Hammernik, K., Kobler, E., Pock, T., Recht, M. P. & Sodickson, D. K., 2018, In : Magnetic resonance in medicine. 13 p.

Research output: Contribution to journalArticleResearchpeer-review

A Systematic Evaluation of Transient Execution Attacks and Defenses

Canella, C., Bulck, J. V., Schwarz, M., Lipp, M., Berg, B. V., Ortner, P., Piessens, F., Evtyushkin, D. & Gruss, D., 13 Nov 2018, In : arXiv.org e-Print archive.

Research output: Contribution to journalArticleResearch

File
Core meltdown
Firmware
Program processors
Acoustic waves
Industry

A unified masking approach

Gross, H. & Mangard, S., 1 Mar 2018, In : Journal of cryptographic engineering.

Research output: Contribution to journalArticleResearchpeer-review

Hardware
Costs

Automata Learning for Symbolic Execution

Aichernig, B., Bloem, R., Ebrahimi, M., Tappler, M. & Winter, J., 2018, FMCAD'18: Proceedings of the 18th Conference on Formal Methods in Computer-Aided Design, FMCAD 2018. Bjørner, N. & Gurfinkel, A. (eds.). IEEE CS, p. 130 - 138 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Testing

Automated Binary Analysis on iOS - A Case Study on Cryptographic Misuse in iOS Applications

Feichtner, J., Missmann, D. & Spreitzer, R., 2018, Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks. New York: Association of Computing Machinery, p. 236-247 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programming interfaces (API)
Cryptography
Computer operating systems
Inspection
Defects

Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features

Schwarz, M., Gruss, D., Lipp, M., Maurice, C., Schuster, T., Fogh, A. & Mangard, S., 4 Jun 2018, AsiaCCS' 18, Proceedings of the 2018 on Asia Conference on Computer and Communications Security . New York, NY: Association of Computing Machinery, p. 587-600

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Best of two worlds: Secure cloud federations meet eIDAS

Zefferer, T., Ziegler, D. & Reiter, A., 10 May 2018, 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST). p. 396-401 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange

Derler, D., Jager, T., Slamanig, D. & Striecks, C., 2018, Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Bounded Synthesis of Register Transducers

Khalimov, A., Maderbacher, B. & Bloem, R., 2018, Automated Technology for Verification and Analysis : 16th International Symposium, ATVA 2018. Lahiri, S. & Wang, C. (eds.). p. 494-510 17 p. ( Lecture Notes in Computer Science; vol. 11138)

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Clustering Related-Tweak Characteristics: Application to MANTIS-6

Eichlseder, M. & Kales, D., 2018, In : IACR Transactions on Symmetric Cryptology. 2018, 2, p. 111-132

Research output: Contribution to journalArticleResearchpeer-review

Open Access

Cryptanalysis of MORUS

Ashur, T., Eichlseder, M., Lauridsen, M., Leurent, G., Minaud, B., Rotella, Y. & Viguier, B., 2018, Advances in Cryptology – ASIACRYPT 2018. Springer, p. 35-64 (Lecture Notes in Computer Science; vol. 11273)

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

DATA - Differential Address Trace Analysis: Finding Address-based Side-Channels in Binaries

Weiser, S., Zankl, A., Spreitzer, R., Miller, K., Mangard, S. & Sigl, G., 2018, Proceedings of the 27th USENIX Security Symposium . USENIX Association, p. 603-620

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Differential Cryptanalysis of Symmetric Primitives

Eichlseder, M., 2018, 291 p.

Research output: ThesisDoctoral ThesisResearch

Open Access
File

Differential Fault Attacks on Deterministic Lattice Signatures

Peßl, P. & Groot Bruinderink, L., 2018, In : IACR Transactions on Cryptographic Hardware and Embedded Systems. 2018, 3, p. 21-43

Research output: Contribution to journalArticleResearchpeer-review

Open Access

Domain-Oriented Masking: Generically Masked Hardware Implementations

Groß, H., 2018, 173 p.

Research output: ThesisDoctoral ThesisResearch

File
Hardware
Formal methods
Costs

Erfahrungen aus eIDAS Zertifizierung: Fernsignaturen vs. Smartcards: andere Technologie damit auch anderer Zugang der Sicherheitsbewertung

Leitold, H. & Konrad, D., Jul 2018, In : Datenschutz und Datensicherheit. 42, 7, p. 429-433

Research output: Contribution to journalArticleResearchpeer-review

Expansion-Based QBF Solving Without Recursion

Bloem, R., Braud-Santoni, N., Hadzic, V., Egly, U., Lonsing, F. & Seidl, M., 2018, In : arXiv.org e-Print archive. CoRR

Research output: Contribution to journalArticleResearch

Expansion-Based QBF Solving Without Recursion

Bloem, R., Braud-Santoni, N., Hadzic, V., Egly, U., Lonsing, F. & Seidl, M., 2018, fmcad.18: Proceedings of the 18th Conference on Formal Methods in Computer-Aided Design (FMCAD 2018). Bjørner, N. & Gurfinkel, A. (eds.). p. 40-49

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Formal Verification of Masked Hardware Implementations in the Presence of Glitches

Bloem, R., Groß, H., Iusupov, R., Könighofer, B., Mangard, S. & Winter, J., 2018, EUROCRYPT . Springer, Vol. 10821, p. 321-353 33 p. (Lecture Notes in Computer Science)

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Generic Double-Authentication Preventing Signatures and a Post-quantum Instantiation

Derler, D., Ramacher, S. & Slamanig, D., 2018, Provable Security - 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings. Springer Verlag, p. 258-276 (Lecture Notes in Computer Science; vol. 11192)

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Generic Low-Latency Masking in Hardware

Groß, H., Iusupov, R. & Bloem, R., 31 Aug 2018, In : IACR Transactions on Cryptographic Hardware and Embedded Systems. 2018, 2, p. 1-21

Research output: Contribution to journalArticleResearchpeer-review

Open Access

Graph Games and Reactive Synthesis

Bloem, R., Chatterjee, K. & Jobstmann, B., 2018, Handbook of Model Checking. Clark, E. M., Henzinger, T. A., Veith, H. & Bloem, R. (eds.). Cham: Springer, p. 921-962 42 p.

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Handbook of Model Checking

Clarke, E. M. (ed.), Henzinger, T. A., Veith, H. & Bloem, R. (ed.), 2018, Cham: Springer. 1210 p.

Research output: Book/ReportBookResearchpeer-review

Highly-Efficient Fully-Anonymous Dynamic Group Signatures

Derler, D. & Slamanig, D., 2018, (Accepted/In press) Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security, AsiaCCS 2018, Songdo, Incheon, Korea, June 4-8, 2018.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review