Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output 1983 2019

2019

JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits

Schwarz, M., Lackner, F. & Gruss, D. 24 Feb 2019 NDSS.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Policy-based Access Control for the IoT and Smart Cities

Omolola, O., More, S. J., Fasllija, E., Wagner, G. & Alber, L. 29 Mar 2019 Open Identity Summit.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy-preserving attribute aggregation in eID federations

Priesnitz Filho, W., Ribeiro, C. & Zefferer, T. Mar 2019 In : Future Generation Computer Systems. Volume 92, p. 1-16

Research output: Contribution to journalArticle

Spectre Attacks: Exploiting Speculative Execution

Kocher, P., Horn, J., Fogh, A., Genkin, D., Gruss, D., Haas, W., Hamburg, M., Lipp, M., Mangard, S., Prescher, T., Schwarz, M. & Yarom, Y. 20 May 2019 40th IEEE Symposium on Security and Privacy.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V

Weiser, S., Werner, M., Brasser, F., Malenko, M., Mangard, S. & Sadeghi, A-R. Feb 2019 (Accepted/In press) Network and Distributed System Security Symposium (NDSS) 2019.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Usability of Policy Authoring tools: A layered approach

Weinhardt, S. & Omolola, O. 25 Feb 2019 (Accepted/In press) International Conference on Information Systems Security and Privacy.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

A Counting Semantics for Monitoring LTL Specifications over Finite Traces

Bartocci, E., Bloem, R., Nickovic, D. & Röck, F. 2018 Computer Aided Verification : 30th International Conference, CAV 2018, Held as Part of the Federated Logic Conference, FloC 2018, Oxford, UK, July 14-17, 2018, Proceedings, Part I. Vol. 1, p. 547-564 18 p. (Lecture Notes in Computer Science; vol. 10980)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access

A First-Order Primal-Dual Algorithm with Linesearch

Malitsky, Y. & Pock, T. 2018 In : SIAM Journal on Optimization.

Research output: Contribution to journalArticle

Agile Smart-device based Multi-factor Authentication for Modern Identity Management Systems

Lenz, T. & Krnjic, V. 2018 Proceedings of the 14th International Conference on Web Information Systems and Technologies. Vol. 1, p. 113-124

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access

A Hierarchical Evaluation Scheme for Pilot-based Research Projects

Zefferer, T. 2018 Proceedings of the 14th International Conference on Web Information Systems and Technologies. Escalona, M. J., Domínguez Mayo, F., Majchrzak, T. & Monfort, V. (eds.). SciTePress, p. 356-363

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A Holistic Approach Towards Peer-to-Peer Security and why Proof of Work Won’t Do

Prünster, B., Kollmann, C. P., Suzic, B. & Ziegler, D. Aug 2018 (Accepted/In press)

Research output: Contribution to conferencePaper

Peer to peer networks
Communication

Another Flip in the Wall of Rowhammer Defenses

Gruss, D., Lipp, M., Schwarz, M., Genkin, D., Juffinger, J., O'Connell, S., Schoechl, W. & Yarom, Y. 31 Jan 2018 39th IEEE Symposium on Security and Privacy 2018.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File

A Review of Depth and Normal Fusion Algorithms

Antensteiner, D., Stolc, S. & Pock, T. 2018 In : Sensors .

Research output: Contribution to journalArticle

A Security Analysis of FirstCoin

Marsalek, A., Kollmann, C. & Zefferer, T. 2018 ICT Systems Security and Privacy Protection. Janczewski, L. J. & Kutylowski, M. (eds.). Cham: Springer International Publishing AG , p. 127-140 14 p. (IFIP Advances in Information and Communication Technology; vol. 529)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic money

Assessment of the generalization of learned image reconstruction and the potential for transfer learning

Knoll, F., Hammernik, K., Kobler, E., Pock, T., Recht, M. P. & Sodickson, D. K. 2018 In : Magnetic resonance in medicine. 13 p.

Research output: Contribution to journalArticle

A Systematic Evaluation of Transient Execution Attacks and Defenses

Canella, C., Bulck, J. V., Schwarz, M., Lipp, M., Berg, B. V., Ortner, P., Piessens, F., Evtyushkin, D. & Gruss, D. 13 Nov 2018 In : arXiv.org e-Print archive.

Research output: Contribution to journalArticle

File
Core meltdown
Firmware
Program processors
Acoustic waves
Industry

A unified masking approach

Gross, H. & Mangard, S. 1 Mar 2018 In : Journal of cryptographic engineering.

Research output: Contribution to journalArticle

Hardware
Costs

Automata Learning for Symbolic Execution

Aichernig, B., Bloem, R., Ebrahimi, M., Tappler, M. & Winter, J. 2018 FMCAD'18: Proceedings of the 18th Conference on Formal Methods in Computer-Aided Design, FMCAD 2018. Bjørner, N. & Gurfinkel, A. (eds.). IEEE CS, p. 130 - 138 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Testing

Automated Binary Analysis on iOS - A Case Study on Cryptographic Misuse in iOS Applications

Feichtner, J., Missmann, D. & Spreitzer, R. 2018 Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks. New York: Association of Computing Machinery, p. 236-247 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Application programming interfaces (API)
Cryptography
Computer operating systems
Inspection
Defects

Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features

Schwarz, M., Gruss, D., Lipp, M., Maurice, C., Schuster, T., Fogh, A. & Mangard, S. 4 Jun 2018 AsiaCCS' 18, Proceedings of the 2018 on Asia Conference on Computer and Communications Security . New York, NY: Association of Computing Machinery, p. 587-600

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Best of two worlds: Secure cloud federations meet eIDAS

Zefferer, T., Ziegler, D. & Reiter, A. 10 May 2018 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST). p. 396-401 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange

Derler, D., Jager, T., Slamanig, D. & Striecks, C. 2018 Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bounded Synthesis of Register Transducers

Khalimov, A., Maderbacher, B. & Bloem, R. 2018 Automated Technology for Verification and Analysis : 16th International Symposium, ATVA 2018. Lahiri, S. & Wang, C. (eds.). p. 494-510 17 p. ( Lecture Notes in Computer Science; vol. 11138)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access

Cryptanalysis of MORUS

Ashur, T., Eichlseder, M., Lauridsen, M., Leurent, G., Minaud, B., Rotella, Y. & Viguier, B. 2018 Advances in Cryptology – ASIACRYPT 2018. Springer, p. 35-64 (Lecture Notes in Computer Science; vol. 11273)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File

DATA - Differential Address Trace Analysis: Finding Address-based Side-Channels in Binaries

Weiser, S., Zankl, A., Spreitzer, R., Miller, K., Mangard, S. & Sigl, G. 2018 (Accepted/In press) 27th USENIX Security Symposium . USENIX Association

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Differential Cryptanalysis of Symmetric Primitives

Eichlseder, M. 2018 291 p.

Research output: ThesisDoctoral Thesis

Open Access
File

Differential Fault Attacks on Deterministic Lattice Signatures

Peßl, P. & Groot Bruinderink, L. 2018 In : IACR Transactions on Cryptographic Hardware and Embedded Systems. 2018, 3, p. 21-43

Research output: Contribution to journalArticle

Open Access

Domain-Oriented Masking: Generically Masked Hardware Implementations

Groß, H. 2018 (Accepted/In press) 173 p.

Research output: ThesisDoctoral Thesis

File
Hardware
Formal methods
Costs

Expansion-Based QBF Solving Without Recursion

Bloem, R., Braud-Santoni, N., Hadzic, V., Egly, U., Lonsing, F. & Seidl, M. 2018 fmcad.18: Proceedings of the 18th Conference on Formal Methods in Computer-Aided Design (FMCAD 2018). Bjørner , N. & Gurfinkel, A. (eds.). p. 40-49

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Expansion-Based QBF Solving Without Recursion

Bloem, R., Braud-Santoni, N., Hadzic, V., Egly, U., Lonsing, F. & Seidl, M. 2018 In : arXiv.org e-Print archive. CoRR

Research output: Contribution to journalArticle

Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje

Dobraunig, C. E., Mangard, S., Mendel, F. & Primas, R. 2018 (Accepted/In press) Selected Areas in Cryptography – SAC 2018. Springer, 21 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Formal Verification of Masked Hardware Implementations in the Presence of Glitches

Bloem, R., Groß, H., Iusupov, R., Könighofer, B., Mangard, S. & Winter, J. 2018 EUROCRYPT . Springer, Vol. 10821, p. 321-353 33 p. (Lecture Notes in Computer Science)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File

Generic Double-Authentication Preventing Signatures and a Post-quantum Instantiation

Derler, D., Ramacher, S. & Slamanig, D. 2018 Provable Security - 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings. Springer Verlag, p. 258-276 (Lecture Notes in Computer Science; vol. 11192)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Generic Low-Latency Masking in Hardware

Groß, H., Iusupov, R. & Bloem, R. 31 Aug 2018 In : IACR Transactions on Cryptographic Hardware and Embedded Systems. 2018, 2, p. 1-21

Research output: Contribution to journalArticle

Open Access

Graph Games and Reactive Synthesis

Bloem, R., Chatterjee, K. & Jobstmann, B. 2018 Handbook of Model Checking. Clark, E. M., Henzinger, T. A., Veith, H. & Bloem, R. (eds.). Cham: Springer, p. 921-962 42 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Handbook of Model Checking

Clarke, E. M. (ed.), Henzinger, T. A., Veith, H. & Bloem, R. (ed.) 2018 Cham: Springer. 1210 p.

Research output: Book/ReportBook

Highly-Efficient Fully-Anonymous Dynamic Group Signatures

Derler, D. & Slamanig, D. 2018 (Accepted/In press) Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security, AsiaCCS 2018, Songdo, Incheon, Korea, June 4-8, 2018.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

High Speed ASIC Implementations of Leakage-Resilient Cryptography

Schilling, R., Unterluggauer, T., Mangard, S., Gürkaynak, F. K., Mühlberghuber, M. & Benini, L. Mar 2018 Design, Automation & Test in Europe Conference - DATE 2018. Institute of Electrical and Electronics Engineers

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File

Hunting Password Leaks in Android Applications

Feichtner, J. 2018 ICT Systems Security and Privacy Protection. Jan Janczewski, L. & Kutyłowski, M. (eds.). Cham: Springer International Publishing AG , Vol. 529, p. 278-292 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Inspection

IAIK ECCelerate SDK 5.0

Hanser, C., Prokop, L. & Ramacher, S. 12 Jul 2018

Research output: Non-textual formSoftware

JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks

Schwarz, M., Lipp, M. & Gruss, D. 18 Feb 2018 Network and Distributed System Security Symposium 2018. p. 15

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Websites
Web browsers
World Wide Web
Interfaces (computer)
Hardware

Kernel Isolation: From an Academic Idea to an Efficient Patch for Every Computer

Gruss, D., Hansen, D. & Gregg, B. Dec 2018 In : USENIX ;login. Winter 18, Vol 43, No 4

Research output: Contribution to journalArticle

KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks

Schwarz, M., Lipp, M., Gruss, D., Weiser, S., Maurice, C. L. N., Spreitzer, R. & Mangard, S. 18 Feb 2018 Network and Distributed System Security Symposium 2018. p. 15

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Smartphones
Websites
Side channel attack
Processing
Android (operating system)

Leakage Bounds for Gaussian Side Channels

Unterluggauer, T., Korak, T., Mangard, S., Schilling, R., Benini, L., Gürkaynak, F. K. & Muehlberghuber, M. 2018 16th Smart Card Research and Advanced Application Conference - CARDIS 2017. Springer

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Channel capacity
Application specific integrated circuits
Signal to noise ratio
Information theory
Cryptography
Open Access
Authentication
Cryptography
Data storage equipment
Random access storage
Side channel attack

Meltdown

Lipp, M., Schwarz, M., Gruss, D., Prescher, T., Haas, W., Mangard, S., Kocher, P., Genkin, D., Yarom, Y. & Hamburg, M. 3 Jan 2018 In : arXiv.org e-Print archive.

Research output: Contribution to journalArticle

Data storage equipment
Data privacy
Personal computers
Computer systems
Hardware

Meltdown: Reading Kernel Memory from User Space

Lipp, M., Schwarz, M., Gruss, D., Prescher, T., Haas, W., Fogh, A., Horn, J., Mangard, S., Kocher, P., Genkin, D., Yarom, Y. & Hamburg, M. 15 Aug 2018 27th USENIX Security Symposium. p. 973-990 19 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Nethammer: Inducing Rowhammer Faults through Network Requests

Lipp, M., Aga, M. T., Schwarz, M., Gruss, D., Maurice, C., Raab, L. & Lamster, L. 13 May 2018 In : arXiv.org e-Print archive. 15 p.

Research output: Contribution to journalArticle

File
Data storage equipment
Dynamic random access storage
Landslides
Mobile phones
Personal computers