Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output 1983 2019

2018

Leakage Bounds for Gaussian Side Channels

Unterluggauer, T., Korak, T., Mangard, S., Schilling, R., Benini, L., Gürkaynak, F. K. & Muehlberghuber, M., 2018, 16th Smart Card Research and Advanced Application Conference - CARDIS 2017. Springer

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
Channel capacity
Application specific integrated circuits
Signal to noise ratio
Information theory
Cryptography

MEAS: memory encryption and authentication secure against side-channel attacks

Unterluggauer, T., Werner, M. & Mangard, S., 25 Jan 2018, In : Journal of cryptographic engineering. p. 1-22

Research output: Contribution to journalArticleResearchpeer-review

Open Access
Authentication
Cryptography
Data storage equipment
Random access storage
Side channel attack

Meltdown

Lipp, M., Schwarz, M., Gruss, D., Prescher, T., Haas, W., Mangard, S., Kocher, P., Genkin, D., Yarom, Y. & Hamburg, M., 3 Jan 2018, In : arXiv.org e-Print archive.

Research output: Contribution to journalArticleResearch

Data storage equipment
Data privacy
Personal computers
Computer systems
Hardware

Meltdown: Reading Kernel Memory from User Space

Lipp, M., Schwarz, M., Gruss, D., Prescher, T., Haas, W., Fogh, A., Horn, J., Mangard, S., Kocher, P., Genkin, D., Yarom, Y. & Hamburg, M., 15 Aug 2018, 27th USENIX Security Symposium. p. 973-990 19 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Nethammer: Inducing Rowhammer Faults through Network Requests

Lipp, M., Aga, M. T., Schwarz, M., Gruss, D., Maurice, C., Raab, L. & Lamster, L., 13 May 2018, In : arXiv.org e-Print archive. 15 p.

Research output: Contribution to journalArticleResearch

File
Data storage equipment
Dynamic random access storage
Landslides
Mobile phones
Personal computers

NetSpectre: Read Arbitrary Memory over Network

Schwarz, M., Schwarzl, M., Lipp, M. & Gruss, D., 27 Jul 2018, In : arXiv.org e-Print archive.

Research output: Contribution to journalArticleResearch

File

On The Structure and Authorization Management of RESTful Web Services

Suzic, B., Prünster, B. & Ziegler, D., 2018, Proceedings of the 33rd Annual ACM Symposium on Applied Computing. Association of Computing Machinery

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Web services
Application programming interfaces (API)
Data privacy
Security of data
Interoperability

Optimizing Wavelet Bases for Sparser Representations

Grandits, T. A. & Pock, T., 2018, Energy Minimization Methods in Computer Vision and Pattern Recognition: EMMCVPR 2017. Pelillo, M. & Hancock, E. (eds.). Cham: Springer, p. 249-262 (Lecture Notes in Computer Science; vol. 10746).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Pointing in the Right Direction - Securing Memory Accesses in a Faulty World

Schilling, R., Werner, M., Nasahl, P. & Mangard, S., 2018, Annual Computer Security Applications Conference. 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key Primitives

Derler, D., Ramacher, S. & Slamanig, D., 2018, Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Fort Lauderdale, Florida, April 9-11, 2018.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Practical Witness Encryption for Algebraic Languages Or How to Encrypt Under Groth-Sahai Proofs

Derler, D. & Slamanig, D., 2018, In : Designs, codes and cryptography. 23 p.

Research output: Contribution to journalArticleResearchpeer-review

ProcHarvester: Fully Automated Analysis of Procfs Side-Channel Leaks on Android

Spreitzer, R., Kirchengast, F., Gruss, D. & Mangard, S., 2018, ASIACCS '18 - Proceedings of the 2018 on Asia Conference on Computer and Communications Security . p. 749-763

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programs
Mobile devices
Learning systems
Websites
Statistics

Qualified eID Derivation into a Distributed Ledger Based IdM System

Abraham, A., Theuermann, K. & Kirchengast, E., 5 Sep 2018, Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018. Institute of Electrical and Electronics Engineers, p. 1406-1412 7 p. 8456064

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Identity management
Management system
Electronic government
Privacy

Rasta: A Cipher with Low ANDdepth and Few ANDs per Bit

Dobraunig, C. E., Eichlseder, M., Grassi, L., Lallemend, V., Leander, G., List, E., Mendel, F. & Rechberger, C., 2018, Advances in Cryptology – CRYPTO 2018. Springer, p. 662-692 (Lecture Notes in Computer Science; vol. 10991).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Real-Time Intensity-Image Reconstruction for Event Cameras Using Manifold Regularisation

Munda, G., Reinbacher, C. & Pock, T., 2018, In : International Journal of Computer Vision. 126, 12, p. 1381-1393 13 p.

Research output: Contribution to journalArticleResearchpeer-review

Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications

Derler, D., Krenn, S., Lorünser, T., Ramacher, S., Slamanig, D. & Striecks, C., 2018, Public-Key Cryptography - PKC 2018, Rio De Janeiro, Brazil, March 25-28, 2018.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Robust Deformation Estimation in Wood-Composite Materials using Variational Optical Flow

Hofinger, M., Pock, T. & Moosbrugger, T., 5 Feb 2018, p. 97 - 104. 8 p.

Research output: Contribution to conferencePaperResearchpeer-review

Open Access
Optical flows
Optical Flow
Humidity
Composite Materials
Atmospheric humidity

Safe Reinforcement Learning via Shielding

Alshiekh, M., Bloem, R., Ehlers, R., Könighofer, B., Niekum, S. & Topcu, U., 2018, Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, (AAAI-18), the 30th innovative Applications of Artificial Intelligence (IAAI-18), and the 8th AAAI Symposium on Educational Advances in Artificial Intelligence (EAAI-18), New Orleans, Louisiana, USA, February 2-7, 2018. p. 2669-2678 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

SCAnDroid: Automated Side-Channel Analysis of Android APIs

Spreitzer, R., Palfinger, G. & Mangard, S., 2018, WISEC '18, Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks. p. 224-235

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Securing Conditional Branches in the Presence of Fault Attacks

Schilling, R., Werner, M. & Mangard, S., Mar 2018, Design, Automation & Test in Europe Conference - DATE 2018: Institute of Electrical and Electronics Engineers.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access

Sharing Independence Relabeling: Efficient Formal Verification of Higher-Order Masking

Bloem, R., Groß, H., Iusupov, R., Krenn, M. & Mangard, S., 2018, In : Cryptology ePrint Archive. 2018, p. 1031 1 p.

Research output: Contribution to journalArticleResearchpeer-review

Shielded Decision-Making in MDPs

Jansen, N., Könighofer, B., Junges, S. & Bloem, R., 2018, In : arXiv.org e-Print archive. CoRR, abs/1807.06096.

Research output: Contribution to journalArticleResearchpeer-review

Short Double- and N-Times-Authentication-Preventing Signatures from ECDSA and More

Derler, D., Ramacher, S. & Slamanig, D., 2018, 2018 IEEE European Symposium on Security and Privacy, EuroS&P 2018, London, United Kingdom, April 26-28, 2018.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography

Dobraunig, C. E., Eichlseder, M., Korak, T., Mangard, S., Mendel, F. & Primas, R., 2018, In : IACR Transactions on Cryptographic Hardware and Embedded Systems. 2018, 3, p. 547-572

Research output: Contribution to journalArticleResearchpeer-review

Open Access

Single Trace Attack Against RSA Key Generation in Intel SGX SSL

Weiser, S., Spreitzer, R. & Bodner, L., 2018, ASIACCS '18 - Proceedings of the 2018 on Asia Conference on Computer and Communications Security . Association of Computing Machinery, p. 575-586

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Hardware
Side channel attack

Software-based microarchitectural attacks

Gruss, D., Sep 2018, In : IT - Information technology.

Research output: Contribution to journalArticleResearch

Software-basierte Mikroarchitekturangriffe

Gruss, D., 26 Sep 2018, (Accepted/In press) In : GI-Edition / Proceedings : lecture notes in informatics.

Research output: Contribution to journalArticleResearch

Sponge-Based Control-Flow Protection for IoT Devices

Werner, M., Unterluggauer, T., Schaffenrath, D. & Mangard, S., 2018, 2018 IEEE European Symposium on Security and Privacy. Institute of Electrical and Electronics Engineers

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
Flow control
Intellectual property
Program processors
Internet of things
Data storage equipment

Spoof-of-Work - Evaluating Device Authorisation in Mobile Mining Processes

Ziegler, D., Prünster, B., Marsalek, A. & Kollmann, C., 28 Jul 2018, Proceedings of the 15th International Joint Conference on e-Business and Telecommunications. Portugal: SciTePress - Science and Technology Publications, Vol. 1: SECRYPT. p. 380-387 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Smartphones
Program processors
Electronic money
Android (operating system)

Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures

Dobraunig, C. E., Eichlseder, M., Groß, H., Mangard, S., Mendel, F. & Primas, R., 2018, Advances in Cryptology – ASIACRYPT 2018. Springer, p. 315-342 (Lecture Notes in Computer Science; vol. 11273).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Symbolic checking of Fuzzy CTL on Fuzzy Program Graph

Ebrahimi, M., Sotudeh, G. & Movaghar, A., 3 Feb 2018, In : Acta informatica.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
Model checking
Temporal logic
Explosions
Flip flop circuits
Fuzzy systems

Synthesis of distributed algorithms with parameterized threshold guards

Lazić, M., Konnov, I., Widder, J. & Bloem, R., 1 Mar 2018, 21st International Conference on Principles of Distributed Systems, OPODIS 2017. Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, Vol. 95. 32

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Parallel algorithms
Specifications
Model checking

Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices

Spreitzer, R., Moonsamy, V., Korak, T. & Mangard, S., 2018, In : IEEE Communications Surveys & Tutorials. 20, 1, p. 465-488 24 p.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File
Mobile devices
Side channel attack
Smart cards
Smartphones

TIGHTest - Towards automating global Academic Mobility

More, S. J., 14 Jun 2018, 68 p.

Research output: ThesisMaster's ThesisResearch

Open Access

Towards Domain-Specific and Privacy-Preserving Qualified eID in a User-Centric Identity Model

Lenz, T. & Krnjic, V., 6 Sep 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE Computer Society, p. 1157-1163

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Identification (control systems)

Use-after-FreeMail: Generalizing the use-after-free problem and applying it to email services

Gruss, D., Schwarz, M., Wübbeling, M., Guggi, S., Malderle, T., More, S. & Lipp, M., 29 May 2018, ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security. Association of Computing Machinery, p. 297-311 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Electronic mail
Data storage equipment
Gain control
Chemical analysis

Variational 3D-PIV with sparse descriptors

Lasinger, K., Vogel, C., Schindler, K. & Pock, T., 10 May 2018, In : Measurement science & technology. 29, 6, 14 p., 064010.

Research output: Contribution to journalArticleResearchpeer-review

Variational Adversarial Networks for Accelerated MR Image Reconstruction

Hammernik, K., Kobler, E., Pock, T., Recht, M. P., Sodickson, D. K. & Knoll, F., 2018, p. 1091.

Research output: Contribution to conferenceAbstractResearchpeer-review

Variational Fusion of Light Field and Photometric Stereo for Precise 3D Sensing within a Multi-Line Scan Framework

Antensteiner, D., Stolc, S. & Pock, T., 2018, Proceedings of the International Conference on Pattern Recognition (ICPR).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Variational Networks for Joint Image Reconstruction and Classification of Tumor Immune Cell Interactions in Melanoma Tissue Sections

Effland, A., Hölzel, M., Klatzer, T., Kobler, E., Landsberg, J., Neuhäuser, L., Pock, T. & Rumpf, M., 2018, Bildverarbeitung für die Medizin 2018.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Zero-Sum Partitions of PHOTON Permutations

Wang, Q., Grassi, L. & Rechberger, C., 2018, Topics in Cryptology - CT-RSA 2018 - The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings. p. 279-299 21 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2017

An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order

Groß, H., Mangard, S. & Korak, T., 2017, CT-RSA. Springer, Vol. 10159. p. 95-112 18 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

A new structural-differential property of 5-round AES

Grassi, L., Rechberger, C. & Rønjom, S., 2017, Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag Wien, Vol. 10211 LNCS. p. 289-317 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10211 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Structural properties
Data storage equipment
Costs
Random Permutation
Block Cipher

An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics

Conti, F., Schilling, R., Schiavone, P. D., Pullini, A., Rossi, D., Gürkaynak, F. K., Mühlberghuber, M., Gautschi, M., Loi, I., Haugou, G., Mangard, S. & Benini, L., 17 May 2017, IEEE Transactions on Circuits and Systems.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Ascon hardware implementations and side-channel evaluation

Groß, H., Wenger, E., Dobraunig, C. & Ehrenhöfer, C., 2017, In : Microprocessors and microsystems - Embedded Hardware Design. 52, p. 470-479 10 p.

Research output: Contribution to journalArticleResearchpeer-review

Hardware
Ethernet
Radio frequency identification (RFID)
Sensor nodes
Embedded systems

A Sustainable Architecture for Secure and Usable Mobile Signature Solutions

Zefferer, T., 2017, WEBIST 2015 - Selected and Revised Papers. 1 ed. Springer, p. 343 364 p.

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features

Schwarz, M., Gruss, D., Lipp, M., Maurice, C., Schuster, T., Fogh, A. & Mangard, S., 3 Nov 2017, In : arXiv.org e-Print archive.

Research output: Contribution to journalArticleResearch

Program processors
Hazards and race conditions
Data storage equipment
Retrofitting
Flow control

Bounded Synthesis for Streett, Rabin, and CTL*

Khalimov, A. & Bloem, R., 2017, CAV.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

File

Chameleon-Hashes with Ephemeral Trapdoors and Applications to Invisible Sanitizable Signatures

Camenisch, J., Derler, D., Krenn, S., Pöhls, H., Samelin, K. & Slamanig, D., 2017, Public-Key Cryptography - PKC 2017 . Springer Verlag, p. 152-182 (Lecture Notes in Computer Science; vol. 10175).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Cloud technology options towards Free Flow of Data

DPSP WG, Jun 2017, 110 p.

Research output: Book/ReportOther reportResearch

Open Access
File
Data privacy
Security of data