Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output 1983 2019

2017

Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160

Liu, F., Mendel, F. & Wang, G., 2017, Advances in Cryptology - ASIACRYPT 2017. Takagi, T. & Peyrin, T. (eds.). Cham: Springer, p. 158-186 (Lecture Notes in Computer Science; vol. 10624).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Concealing Secrets in Embedded Processors Designs

Groß, H., Jelinek, M., Mangard, S., Unterluggauer, T. & Werner, M., 2017, 15th Smart Card Research and Advanced Application Conference - CARDIS 2016. p. 89-104

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
Embedded systems
Hardware
Reduced instruction set computing
Transparency
Processing

Cryptanalysis of Simpira v1

Eichlseder, M., Dobraunig, C. E. & Mendel, F., 2017, Selected Areas in Cryptography - SAC 2016. Avanzi, R. & Heys, H. (eds.). Springer, p. 284-298 (Lecture Notes in Computer Science; vol. 10532).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access

Cryptographic Service Providers in Current Device Landscapes: An Inconvenient Truth

Reimair, F., Feichtner, J., Ziegler, D., Kreuzhuber, S. & Zefferer, T., Jul 2017, Proceedings of the 14th International Joint Conference on e-Business and Telecommunications. Portugal: SciTePress, Vol. 4. p. 367-374 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Data privacy
Security of data
Risk assessment
Hardware

Dependable Internet of Things for Networked Cars

Großwindhager, B., Rupp, A., Tappler, M., Tranninger, M., Weiser, S., Aichernig, B., Boano, C. A., Horn, M., Kubin, G., Mangard, S., Steinberger, M. & Römer, K. U., Dec 2017, In : International Journal of Computing. 16, 4, p. 226-237

Research output: Contribution to journalArticleResearchpeer-review

Railroad cars
Testbeds
Trucks
Radio interference
Industrial plants

Enhancements for Group Signatures and Side-Channel Attacks on Mobile Devices

Spreitzer, R., 10 May 2017

Research output: ThesisDoctoral ThesisResearch

Gimli: a cross-platform permutation

Bernstein, D. J., Kölbl, S., Lucks, S., Massolino, P. M. C., Mendel, F., Nawaz, K., Schneider, T., Schwabe, P., Standaert, F-X., Todo, Y. & Viguier, B., 2017, Cryptographic Hardware and Embedded Systems. Springer, (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Harmonizing Delegation Data Formats

Wagner, G., Omolola, O. & More, S. J., 6 Oct 2017, Lecture Notes in Informatics: Open Identity Summit 2017. Bonn: Gesellschaft für Informatik , Vol. 2017.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access

Higher-Order Side-Channel Protected Implementations of KECCAK

Groß, H., Schaffenrath, D. & Mangard, S., 2017, DSD. IEEE Computer Society, p. 205-212 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation

Derler, D., Ramacher, S. & Slamanig, D., 2017, Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers. Springer Verlag, p. 124-142 (Lecture Notes in Computer Science; vol. 10322).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Hybrid Mobile Edge Computing: Unleashing the Full Potential of Edge Computing in Mobile Device Use Cases

Reiter, A., Prünster, B. & Zefferer, T., 2017, Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing. IEEE Press, p. 935-944

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Mobile devices
Energy conservation
Energy utilization
Bandwidth
Internet of things

IAIK ECCelerate SDK 4.01

Ramacher, S., 23 Mar 2017

Research output: Non-print formSoftwareResearch

IAIK ECCelerate SDK 4.02

Ramacher, S., 19 Jul 2017

Research output: Non-print formSoftwareResearch

Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC

Dobraunig, C. E. & List, E., 2017, Topics in Cryptology -- CT-RSA 2017. Handschuh, H. (ed.). Springer, p. 207-222 16 p. (Lecture Notes in Computer Science; vol. 10159).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

ISAP - Towards Side-Channel Secure Authenticated Encryption

Dobraunig, C. E., Eichlseder, M., Mangard, S., Mendel, F. & Unterluggauer, T., 2017, In : IACR Transactions on Symmetric Cryptology. 2017, 1, p. 80-105

Research output: Contribution to journalArticleResearchpeer-review

Open Access

KASLR is Dead: Long Live KASLR

Gruss, D., Lipp, M., Schwarz, M., Fellner, R., Maurice, C. & Mangard, S., 2017, Engineering Secure Software and Systems - 9th International Symposium, ESSoS 2017, Proceedings. Springer-Verlag Italia, Vol. 10379 LNCS. p. 161-176 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10379 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
kernel
Hardware
Plant shutdowns
Flow control
Side Channel Attacks

Leveraging the adoption of electronic identities and electronic-signature solutions in Europe

Marsalek, A., Zefferer, T., Reimair, F., Karabat, Ç. & Soykan, E. U., 3 Apr 2017, 32nd Annual ACM Symposium on Applied Computing, SAC 2017. Association of Computing Machinery, Vol. Part F128005. p. 69-71 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Concretes

Malware guard extension: Using SGX to conceal cache attacks

Schwarz, M., Weiser, S., Gruss, D., Maurice, C. & Mangard, S., 2017, Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, 2017. Springer-Verlag Italia, Vol. 10327 LNCS. p. 3-24 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10327 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Malware
Cache
Physical addresses
Attack
Hardware

Model-Based Testing IoT Communication via Active Automata Learning

Tappler, M., Aichernig, B. K. & Bloem, R., 2017, 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST). p. 276-287 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Communication
Testing
Specifications
Servers
Network protocols

Multi-core Data Analytics SoC with a flexible 1.76 Gbit/s AES-XTS Cryptographic Accelerator in 65 nm CMOS

Gürkaynak, F. K., Schilling, R., Mühlberghuber, M., Conti, F., Mangard, S. & Benini, L., 2017, CS2 '17, Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems . p. 19-24

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Note on the Robustness of CAESAR Candidates

Kales, D., Eichlseder, M. & Mendel, F., Nov 2017, 11 p. (IACR Cryptology ePrint Archive; no. 2017/1137).

Research output: Working paperResearch

Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives

Chase, M., Derler, D., Goldfeder, S., Orlandi, C., Ramacher, S., Rechberger, C., Slamanig, D. & Zaverucha, G., 2017, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, USA, October 30 - November 3, 2017.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Practical Keystroke Timing Attacks in Sandboxed JavaScript

Lipp, M., Gruss, D., Schwarz, M., Bidner, D., Maurice, C. & Mangard, S., 2017, Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings. Springer-Verlag Italia, Vol. 10493 LNCS. p. 191-209 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10493 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Timing Attack
JavaScript
Attack
Timing
Websites

Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures

Beck, M. T., Camenisch, J., Derler, D., Krenn, S., Pöhls, H. C., Samelin, K. & Slamanig, D., 2017, Information Security and Privacy - 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part I.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Privacy Technologies and Policy

Schweighofer, E. (ed.), Leitold, H. (ed.), Mitrakas, A. (ed.) & Rannenberg, K. (ed.), 2017, Graz: Springer Verlag.

Research output: Book/ReportBookResearchpeer-review

Open Access

Reconciling d+1 Masking in Hardware and Software

Groß, H. & Mangard, S., 2017, CHES. Springer, Vol. 10529. p. 115-136 22 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Related-Key Impossible-Differential Attack on Reduced-Round SKINNY

Ankele, R., Banik, S., Chakraborti, A., List, E., Mendel, F., Sim, S. M. & Wang, G., 2017, Applied Cryptography and Network Security. Cham, p. 208-228 (Lecture Notes in Computer Science; vol. 10355).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Secure Policy-based Device-to-Device Offloading for Mobile Applications

Reiter, A., 2017, Proceedings of the Symposium on Applied Computing. Association of Computing Machinery, p. 516-521

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Mobile devices
Security of data
Servers
Virtual machine

Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives

Unterluggauer, T., Werner, M. & Mangard, S., 2017, ACM Asia Conference on Computer and Communications Security - ASIACCS'17. Association of Computing Machinery, p. 690-702

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
Authentication
Cryptography
Data storage equipment
Random access storage
Side channel attack

SGXIO: Generic Trusted I/O Path for Intel SGX

Weiser, S. & Werner, M., 2017, Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy. p. 261-268

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
Cloud computing
Hardware
Malware

Side-Channel Analysis of Keymill

Dobraunig, C. E., Eichlseder, M., Korak, T. & Mendel, F., 2017, Constructive Side-Channel Analysis and Secure Design: COSADE 2017. p. 138-152 (Lecture Notes in Computer Science; vol. 10348).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Side-Channel Plaintext-Recovery Attacks on Leakage-Resilient Encryption

Unterluggauer, T., Werner, M. & Mangard, S., 15 May 2017, Design, Automation & Test in Europe Conference - DATE 2017. Institute of Electrical and Electronics Engineers

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Cryptography
Recovery
Microcontrollers
Field programmable gate arrays (FPGA)
Electric power utilization

Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption

Primas, R., Peßl, P. & Mangard, S., 2017, Cryptographic Hardware and Embedded Systems – CHES 2017. Cham: Springer, p. 513-533 (Lecture Notes in Computer Science; vol. 10529).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
Cryptography
Quantum cryptography
Recovery
Template matching
Microcontrollers

Software-based Microarchitectural Attacks

Gruss, D., 14 Jun 2017

Research output: ThesisDoctoral ThesisResearch

Open Access
File

STORK: a real, heterogeneous, large-scale eID management system

Ribeiro, C., Leitold, H., Esposito, S. & Mitzman, D., Jul 2017, In : International Journal of Information Security.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
Electronic scales
Semantics
Interoperability
Identification (control systems)
Internet

Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory

Gruss, D., Lettner, J., Schuster, F., Ohrimenko, O., Haller, I. & Costa, M., 16 Aug 2017, 2017 Proceedings of the 26th USENIX Security Symposium.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Structure and authorization management of RESTful APIs: Accompanying data set for the paper published at ACM SAC 2018

Suzic, B., 2017

Research output: Non-print formData set/DatabaseResearch

File
Application programming interfaces (API)
Web services

Structuring the Scope: Enabling Adaptive and Multilateral Authorization Management

Suzic, B., Reiter, A. & Marsalek, A., Oct 2017, 2017 IEEE Conference on Communications and Network Security (CNS). Las Vegas: IEEE Press, p. 522-530 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Specifications
Web services
Automation
Semantics

SUNFISH ID1v1 – Identity Management and Access Control

SUNFISH WG, Jan 2017

Research output: Other contributionResearch

Access control
Security of data
Application programming interfaces (API)
International cooperation
Reusability

SUNFISH ID1v2 – Identity Management and Access Control at Work

SUNFISH WG, Nov 2017

Research output: Other contributionResearch

Access control
Security of data

Synthesizing Non-Vacuous Systems

Bloem, R., Chockler, H., Ebrahimi, M. & Strichman, O., 2017, Verification, Model Checking, and Abstract Interpretation. Bouajjani, A. & Monniaux, D. (eds.). Cham: Springer International Publishing AG , p. 55-72 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Specifications
Model checking
Hardware

The Net Rat: Rethinking Connected Services for Increased Security

Prünster, B., Reimair, F. & Reiter, A., Jul 2017, Proceedings of the 14th International Joint Conference on e-Business and Telecommunications. SciTePress, Vol. 4: SECRYPT. p. 375-383 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Rats
Data privacy
Mobile devices
Personal computers

To BLISS-B or not to be - Attacking strongSwan's Implementation of Post-Quantum Signatures

Peßl, P., Groot Bruinderink, L. & Yarom, Y., 2017, CCS 2017. Association of Computing Machinery

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
Recovery
Cryptography
Quantum cryptography
Experiments
Side channel attack

Towards Cross-Border Authorization in European eID Federations

Lenz, T. & Zwattendorfer, B., 2017, 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). IEEE Computer Society, p. 426-434 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access

Towards Cross-Domain eID by Using Agile Mobile Authentication

Lenz, T. & Alber, L., 1 Aug 2017, 2017 IEEE Trustcom/BigDataSE/ICESS. p. 570-577 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Towards Privacy-Preserving and User-Centric Identity Management as a Service

Dash, P., Rabensteiner, C., Hörandner, F. & Roth, S., 2017, Open Identity Summit 2017. Gesellschaft für Informatik e.V.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Cost effectiveness
Application programs
Authentication
Cryptography
Network protocols

Towards the adoption of secure cloud identity services

Kostopoulos, A., Sfakianakis, E., Chochliouros, I., Pettersson, J. S., Krenn, S., Tesfay, W., Migliavacca, A. & Hörandner, F., 29 Aug 2017, ARES 2017 - Proceedings of the 12th International Conference on Availability, Reliability and Security. Association of Computing Machinery, Vol. Part F130521. a90

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Data privacy

Transparent Memory Encryption and Authentication

Werner, M., Unterluggauer, T. & Mangard, S., 5 Oct 2017, 27th International Conference on Field Programmable Logic and Applications - FPL 2017. Institute of Electrical and Electronics Engineers

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
Authentication
Cryptography
Field programmable gate arrays (FPGA)
Random access storage
Data storage equipment

WebRTC: Your Privacy is at Risk

Reiter, A. & Marsalek, A., 2017, Proceedings of the Symposium on Applied Computing. Association of Computing Machinery, p. 664-669

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Communication
Application programming interfaces (API)
Mobile devices
Specifications
Secure communication