Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output 1983 2019

2019

Synthesis of Minimum-Cost Shields for Multi-agent Systems

Bharadwaj, S., Bloem, R., Dimitrova, R., Könighofer, B. & Topcu, U., 10 Jul 2019, 2019 American Control Conference (ACC). ACM/IEEE, p. 1048-1055 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Multi agent systems
Costs
Warehouses
Unmanned aerial vehicles (UAV)
Logistics

Synthesizing Reactive Systems Using Robustness and Recovery Specifications

Bloem, R., Chockler, H., Ebrahimi, M. & Strichman, O., 2019, (Accepted/In press) 2019 Formal Methods in Computer Aided Design, FMCAD 2019. Barrett, C. & Yang, J. (eds.). IEEE CS, 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Specifications
Recovery

Tackling Data Inefficiency: Compressing the Bitcoin Blockchain

Marsalek, A., Zefferer, T., Fasllija, E. & Ziegler, D., 2019, 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE Trustcom-19).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Internet of things

TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V

Weiser, S., Werner, M., Brasser, F., Malenko, M., Mangard, S. & Sadeghi, A-R., Feb 2019, (Accepted/In press) Network and Distributed System Security Symposium (NDSS) 2019.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

TPL: A Trust Policy Language

Mödersheim, S., Schlichtkrull, A., Wagner, G., More, S. & Alber, L., 19 Jul 2019, Trust Management XIII: 13th IFIP WG 11.11 International Conference, IFIPTM 2019. 1 ed. Copenhagen, Denmark: Springer, Vol. Trust Management XIII. p. 209-223

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
Semantics
Acoustic waves

Trustworthy Privacy-Preserving Service Compositions

Theuermann, K., 31 Oct 2019, 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). p. 10-17 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
Chemical analysis
Transparency
Cryptography
Computer systems
Network protocols

Unleashing the Full Potential of Blockchain Technology for Security-Sensitive Business Applications

Marsalek, A., Kollmann, C., Zefferer, T. & Teufl, P., 1 May 2019, ICBC 2019 - IEEE International Conference on Blockchain and Cryptocurrency. Institute of Electrical and Electronics Engineers, p. 394-402 9 p. 8751444

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Industry
Data privacy
Security of data
Middleware
Privacy

Usability of Policy Authoring tools: A layered approach

Weinhardt, S. & Omolola, O., 2019, ICISSP 2019 - Proceedings of the 5th International Conference on Information Systems Security and Privacy. Mori, P., Camp, O. & Furnell, S. (eds.). Vol. 1. p. 301-308 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

ZombieLoad: Cross-Privilege-Boundary Data Sampling

Schwarz, M., Lipp, M., Moghimi, D., Bulck, J. V., Stecklina, J., Prescher, T. & Gruss, D., 12 Nov 2019, (Accepted/In press) CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM/IEEE

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Program processors
Sampling
Faulting
Data storage equipment
Virtual machine
2018

A Counting Semantics for Monitoring LTL Specifications over Finite Traces

Bartocci, E., Bloem, R., Nickovic, D. & Röck, F., 2018, Computer Aided Verification : 30th International Conference, CAV 2018, Held as Part of the Federated Logic Conference, FloC 2018, Oxford, UK, July 14-17, 2018, Proceedings, Part I. Vol. 1. p. 547-564 18 p. (Lecture Notes in Computer Science; vol. 10980).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access

A Federation of Federations: Secure Cloud Federations meet European Identity Federations

Zefferer, T., Ziegler, D. & Reiter, A., Mar 2018, In : International Journal for Information Security Research. Volume 8, Issue 1

Research output: Contribution to journalArticleResearchpeer-review

Agile Smart-device based Multi-factor Authentication for Modern Identity Management Systems

Lenz, T. & Krnjic, V., 2018, Proceedings of the 14th International Conference on Web Information Systems and Technologies. Vol. 1. p. 113-124

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access

A Hierarchical Evaluation Scheme for Pilot-based Research Projects

Zefferer, T., 2018, Proceedings of the 14th International Conference on Web Information Systems and Technologies. Escalona, M. J., Domínguez Mayo, F., Majchrzak, T. & Monfort, V. (eds.). SciTePress, Vol. 1. p. 356-363

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

A Holistic Approach Towards Peer-to-Peer Security and Why Proof of Work Won’t Do

Prünster, B., Kollmann, C. P., Suzic, B. & Ziegler, D., 2018, Security and Privacy in Communication Networks. Beyah, R., Chang, B., Li, Y. & Zhu, S. (eds.). Cham: Springer International, p. 122-138 16 p. ( Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; vol. 255).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Peer to peer networks
Communication

Analysis of the influence of deviations between training and test data in learned image reconstruction

Knoll, F., Hammernik, K., Kobler, E., Pock, T., Sodickson, D. K. & Recht, M. P., 2018.

Research output: Contribution to conferenceAbstractResearchpeer-review

Another Flip in the Wall of Rowhammer Defenses

Gruss, D., Lipp, M., Schwarz, M., Genkin, D., Juffinger, J., O'Connell, S., Schoechl, W. & Yarom, Y., 31 Jan 2018, 39th IEEE Symposium on Security and Privacy 2018.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

A Review of Depth and Normal Fusion Algorithms

Antensteiner, D., Stolc, S. & Pock, T., 2018, In : Sensors .

Research output: Contribution to journalArticleResearchpeer-review

A Security Analysis of FirstCoin

Marsalek, A., Kollmann, C. & Zefferer, T., 2018, ICT Systems Security and Privacy Protection. Janczewski, L. J. & Kutylowski, M. (eds.). Cham: Springer International Publishing AG , p. 127-140 14 p. (IFIP Advances in Information and Communication Technology; vol. 529).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Electronic money

Assessment of the generalization of learned image reconstruction and the potential for transfer learning

Knoll, F., Hammernik, K., Pock, T., Sodickson, D. K. & Recht, M. P., 2018, p. 3376.

Research output: Contribution to conferenceAbstractResearchpeer-review

Assessment of the generalization of learned image reconstruction and the potential for transfer learning

Knoll, F., Hammernik, K., Kobler, E., Pock, T., Recht, M. P. & Sodickson, D. K., 2018, In : Magnetic Resonance in Medicine. 81, 1, p. 116-128 13 p.

Research output: Contribution to journalArticleResearchpeer-review

A Systematic Evaluation of Transient Execution Attacks and Defenses

Canella, C., Bulck, J. V., Schwarz, M., Lipp, M., Berg, B. V., Ortner, P., Piessens, F., Evtyushkin, D. & Gruss, D., 13 Nov 2018, In : arXiv.org e-Print archive.

Research output: Contribution to journalArticleResearch

File
Core meltdown
Firmware
Program processors
Acoustic waves
Industry

A unified masking approach

Gross, H. & Mangard, S., 1 Mar 2018, In : Journal of cryptographic engineering.

Research output: Contribution to journalArticleResearchpeer-review

Hardware
Costs

Automata Learning for Symbolic Execution

Aichernig, B., Bloem, R., Ebrahimi, M., Tappler, M. & Winter, J., 2018, 2018 Formal Methods in Computer Aided Design, FMCAD 2018, Austin, TX, USA, October 30 - November 2, 2018. Bjørner, N. & Gurfinkel, A. (eds.). IEEE CS, p. 130 - 138 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Testing

Automated Binary Analysis on iOS - A Case Study on Cryptographic Misuse in iOS Applications

Feichtner, J., Missmann, D. & Spreitzer, R., 2018, Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks. New York: Association of Computing Machinery, p. 236-247 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programming interfaces (API)
Cryptography
Computer operating systems
Inspection
Defects

Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features

Schwarz, M., Gruss, D., Lipp, M., Maurice, C., Schuster, T., Fogh, A. & Mangard, S., 4 Jun 2018, AsiaCCS' 18, Proceedings of the 2018 on Asia Conference on Computer and Communications Security . New York, NY: Association of Computing Machinery, p. 587-600

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Best of two worlds: Secure cloud federations meet eIDAS

Zefferer, T., Ziegler, D. & Reiter, A., 10 May 2018, 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST). p. 396-401 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange

Derler, D., Jager, T., Slamanig, D. & Striecks, C., 2018, Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Bounded Synthesis of Register Transducers

Khalimov, A., Maderbacher, B. & Bloem, R., 2018, Automated Technology for Verification and Analysis : 16th International Symposium, ATVA 2018. Lahiri, S. & Wang, C. (eds.). p. 494-510 17 p. ( Lecture Notes in Computer Science; vol. 11138).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Clustering Related-Tweak Characteristics: Application to MANTIS-6

Eichlseder, M. & Kales, D., 2018, In : IACR Transactions on Symmetric Cryptology. 2018, 2, p. 111-132

Research output: Contribution to journalArticleResearchpeer-review

Open Access

Cryptanalysis of MORUS

Ashur, T., Eichlseder, M., Lauridsen, M., Leurent, G., Minaud, B., Rotella, Y. & Viguier, B., 2018, Advances in Cryptology – ASIACRYPT 2018. Springer, p. 35-64 (Lecture Notes in Computer Science; vol. 11273).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

DATA - Differential Address Trace Analysis: Finding Address-based Side-Channels in Binaries

Weiser, S., Zankl, A., Spreitzer, R., Miller, K., Mangard, S. & Sigl, G., 2018, Proceedings of the 27th USENIX Security Symposium . USENIX Association, p. 603-620

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Differential Cryptanalysis of Symmetric Primitives

Eichlseder, M., 2018, 291 p.

Research output: ThesisDoctoral ThesisResearch

Open Access
File

Differential Fault Attacks on Deterministic Lattice Signatures

Peßl, P. & Groot Bruinderink, L., 2018, In : IACR Transactions on Cryptographic Hardware and Embedded Systems. 2018, 3, p. 21-43

Research output: Contribution to journalArticleResearchpeer-review

Open Access

Domain-Oriented Masking: Generically Masked Hardware Implementations

Groß, H., 2018, 173 p.

Research output: ThesisDoctoral ThesisResearch

File
Hardware
Formal methods
Costs

Erfahrungen aus eIDAS Zertifizierung: Fernsignaturen vs. Smartcards: andere Technologie damit auch anderer Zugang der Sicherheitsbewertung

Leitold, H. & Konrad, D., Jul 2018, In : Datenschutz und Datensicherheit. 42, 7, p. 429-433

Research output: Contribution to journalArticleResearchpeer-review

Expansion-Based QBF Solving Without Recursion

Bloem, R., Braud-Santoni, N., Hadzic, V., Egly, U., Lonsing, F. & Seidl, M., 2018, In : arXiv.org e-Print archive. CoRR

Research output: Contribution to journalArticleResearch

Expansion-Based QBF Solving Without Recursion

Bloem, R., Braud-Santoni, N., Hadzic, V., Egly, U., Lonsing, F. & Seidl, M., 2018, fmcad.18: Proceedings of the 18th Conference on Formal Methods in Computer-Aided Design (FMCAD 2018). Bjørner, N. & Gurfinkel, A. (eds.). p. 40-49

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Formal Verification of Masked Hardware Implementations in the Presence of Glitches

Bloem, R., Groß, H., Iusupov, R., Könighofer, B., Mangard, S. & Winter, J., 2018, EUROCRYPT . Springer, Vol. 10821. p. 321-353 33 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Generic Double-Authentication Preventing Signatures and a Post-quantum Instantiation

Derler, D., Ramacher, S. & Slamanig, D., 2018, Provable Security - 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings. Springer Verlag, p. 258-276 (Lecture Notes in Computer Science; vol. 11192).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Generic Low-Latency Masking in Hardware

Groß, H., Iusupov, R. & Bloem, R., 31 Aug 2018, In : IACR Transactions on Cryptographic Hardware and Embedded Systems. 2018, 2, p. 1-21

Research output: Contribution to journalArticleResearchpeer-review

Open Access

Graph Games and Reactive Synthesis

Bloem, R., Chatterjee, K. & Jobstmann, B., 2018, Handbook of Model Checking. Clark, E. M., Henzinger, T. A., Veith, H. & Bloem, R. (eds.). Cham: Springer, p. 921-962 42 p.

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Handbook of Model Checking

Clarke, E. M. (ed.), Henzinger, T. A., Veith, H. & Bloem, R. (ed.), 2018, Cham: Springer. 1210 p.

Research output: Book/ReportBookResearchpeer-review

Highly-Efficient Fully-Anonymous Dynamic Group Signatures

Derler, D. & Slamanig, D., 2018, (Accepted/In press) Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security, AsiaCCS 2018, Songdo, Incheon, Korea, June 4-8, 2018.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

High Speed ASIC Implementations of Leakage-Resilient Cryptography

Schilling, R., Unterluggauer, T., Mangard, S., Gürkaynak, F. K., Mühlberghuber, M. & Benini, L., Mar 2018, Design, Automation & Test in Europe Conference - DATE 2018. Institute of Electrical and Electronics Engineers

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Hunting Password Leaks in Android Applications

Feichtner, J., 2018, ICT Systems Security and Privacy Protection. Jan Janczewski, L. & Kutyłowski, M. (eds.). Cham: Springer International Publishing AG , Vol. 529. p. 278-292 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Inspection

IAIK ECCelerate SDK 5.0

Hanser, C., Prokop, L. & Ramacher, S., 12 Jul 2018

Research output: Non-print formSoftwareResearch

JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks

Schwarz, M., Lipp, M. & Gruss, D., 18 Feb 2018, Network and Distributed System Security Symposium 2018. p. 15

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Websites
Web browsers
World Wide Web
Interfaces (computer)
Hardware

Kernel Isolation: From an Academic Idea to an Efficient Patch for Every Computer

Gruss, D., Hansen, D. & Gregg, B., Dec 2018, In : ;login: the USENIX Magazine. 43, 4, p. 10-14 5 p.

Research output: Contribution to journalArticleResearch

KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks

Schwarz, M., Lipp, M., Gruss, D., Weiser, S., Maurice, C. L. N., Spreitzer, R. & Mangard, S., 18 Feb 2018, Network and Distributed System Security Symposium 2018. p. 15

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Smartphones
Websites
Side channel attack
Processing
Android (operating system)

Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge

Derler, D. & Slamanig, D., 1 Jan 2018, (Accepted/In press) In : Designs, Codes, and Cryptography.

Research output: Contribution to journalArticleResearchpeer-review

Zero-knowledge
Flavors
Homomorphic
Cryptography
Signature