Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output 1983 2019

2017

WikiLyzer: Interactive Information Quality Assessment in Wikipedia

di Sciascio, C., Strohmaier, D., Errecalde, M. & Veas, E., 2017, Proceedings of the 22nd International Conference on Intelligent User Interfaces. Association of Computing Machinery, p. 377-388 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2016

Analysis of the Kupyna-256 Hash Function

Dobraunig, C. E., Eichlseder, M. & Mendel, F., 2016, Fast Software Encryption. Peyrin, T. (ed.). Springer, (LNCS; vol. 9783).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures

Peßl, P., 11 Dec 2016, Progress in Cryptology – INDOCRYPT 2016: 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings. Springer, p. 153-170 18 p. (Lecture Notes in Computer Science; vol. 10095).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access

A New Architecture for Developing Cryptographic Cloud Services

Lorünser, T., Slamanig, D., Länger, T. & Pöhls, H. C., 1 Jun 2016, In : ERCIM news. 106

Research output: Contribution to journalArticleResearch

An Ontology-based Interoperability Solution for Electronic-Identity Systems

Priesnitz Filho, W., Ribeiro, C. & Zefferer, T., 2016, IEEE International Conference on Services Computing (SCC 2016). p. 17-24

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Applied Dynamic Policy Selection

Reimair, F., Prünster, B., Reiter, A. & Ertler, C., 19 Oct 2016, 2016 IEEE Conference on Communications and Network Security (CNS 2016). 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Security systems
Information systems
Costs
Industry

ARMageddon: How Your Smartphone CPU breaks software-level Security and Privacy

Lipp, M. & Maurice, C. L. N., 2016.

Research output: Contribution to conference(Old data) Lecture or PresentationResearchpeer-review

Smartphones
Program processors
Application programs
Personal computing
Mountings

ARMageddon: Last-Level Cache Attacks on Mobile Devices

Lipp, M., Gruss, D., Spreitzer, R., Maurice, C. & Mangard, S., 2016, 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, p. 549-564 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Mobile devices
Program processors
Smartphones
Touch screens

Balancing Utility and Security: Securing Cloud Federations of Public Entities

Suzic, B., Prünster, B., Ziegler, D., Marsalek, A. & Reiter, A., 2016, OTM Confederated International Conferences: On the Move to Meaningful Internet Systems. Springer International Publishing AG , p. 943 - 961 18 p. (Lecture Notes in Computer Science (LNCS); no. 10033).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Public administration
Data privacy
Security of data
Scalability
Processing

Cache Attacks and Rowhammer on ARM

Lipp, M., 2016, 105 p.

Research output: ThesisMaster's ThesisResearch

Mobile devices
Personal computing

Challenges for trustworthy (multi-)Cloud-based services in the Digital Single Market

DPSP Cluster WG, 28 Jan 2016, 31 p.

Research output: Other contributionResearch

Open Access
File

CREDENTIAL: A Framework for Privacy-Preserving Cloud-Based Data Sharing

Hörandner, F., Krenn, S., Migliavacca, A., Thiemer, F. & Zwattendorfer, B., 2016, 11th International Conference on Availability, Reliability and Security, ARES 2016, Salzburg, Austria, August 31 - September 2, 2016. p. 742-749 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

CREDENTIAL: Secure Cloud Identity Wallet

Notario, N., Krenn, S., Zwattendorfer, B. & Hörandner, F., 2016, In : ERCIM news. 106, p. 11-12

Research output: Contribution to journalArticleResearch

Cryptanalysis of Reduced NORX

Bagheri, N., Huang, T., Jia, K., Mendel, F. & Sasaki, Y., 2016, Fast Software Encryption. Peyrin, T. (ed.). Springer, (LNCS; vol. 9783).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

CrySIL: Bringing Crypto to the Modern User

Reimair, F., Teufl, P. & Zefferer, T., 22 Mar 2016, Web Information Systems and Technologies: 11th International Conference, WEBIST 2015, Lisbon, Portugal, May 20-22, 2015, Revised Selected Papers. Monfort, V., Krempels, K-H., Majchrzak, T. A. & Ẑ. T. (eds.). 1 ed. Springer, p. 70-90 20 p. (Lecture Notes in Business Information Processing; vol. 246).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Cryptography
Interoperability
Authentication
Computer hardware
Electromagnetic waves
Redundancy
Internet of things
Hot Temperature

Designing Reliable Cyber-Physical Systems: Overview associated to the Special Session at FDL’16

Aleksandrowicz, G., Arbel, E., Bloem, R., Braak, T. T., Devadze, S., Fey, G., Jenihhin, M., Jutman, A., Kerkoff, H. G., Könighofer, R., Malburg, J., Moran, S., Raik, J., Rauwerda, G., Riener, H., Röck, F., Shibin, K., Sunesen, K., Wan, J. & Zhao, Y., 2016.

Research output: Contribution to conferencePaperResearchpeer-review

Monitoring
Cyber Physical System

Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order

Groß, H., Mangard, S. & Korak, T., 2016, TIS@CCS. ACM SIGWEB , p. 3 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order

Groß, H., Mangard, S. & Korak, T., 24 Oct 2016, p. 3. 3 p.

Research output: Contribution to conferenceAbstractResearchpeer-review

Cryptography
Hardware
Computer hardware
Digital circuits
Embedded systems

DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks

Peßl, P., Gruss, D., Maurice, C. L. N., Schwarz, M. & Mangard, S., 2016, Proceedings of the 25th USENIX Security Symposium. p. 565-581 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Dynamic random access storage
Program processors
Data storage equipment
Cloud computing
Computer hardware

Drammer: Deterministic Rowhammer attacks on mobile platforms

Van Der Veen, V., Fratantonio, Y., Lindorfer, M., Gruss, D., Maurice, C. L. N., Vigna, G., Bos, H., Razavi, K. & Giuffrida, C., 24 Oct 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association of Computing Machinery, Vol. 24-28-October-2016. p. 1675-1689 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Data storage equipment
Dynamic random access storage
Smartphones
Concretes
Hardware

Emulating U2F authenticator devices

Reimair, F., Kollmann, C. & Marsalek, A., 19 Oct 2016, 2016 IEEE Conference on Communications and Network Security (CNS 2016). 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Authentication
Smartphones
Smart cards
Hardware

ENHANCING CROSS-BORDER EID FEDERATIONS BY USING A MODULAR AND FLEXIBLE ATTRIBUTE MAPPING SERVICE TO MEET NATIONAL LEGAL AND TECHNICAL REQUIREMENTS

Lenz, T., 18 Jan 2016, In : IADIS international journal on WWW/Internet. 13, 2, p. 52 68 p.

Research output: Contribution to journalArticleResearchpeer-review

Authentication
Interoperability

Enhancing Side-Channel Analysis of Binary-Field Multiplication with Bit Reliability

Peßl, P. & Mangard, S., 2016, Topics in Cryptology - CT-RSA 2016. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Enhancing the Modularity and Flexibility of Identity Management Architectures for National and Cross-border eID Applications

Lenz, T. & Zwattendorfer, B., Apr 2016, Lecture Notes in Business Information Processing. Springer, Vol. 246. p. 123-143

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

Authentication
Information management
Identification (control systems)

Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android

Spreitzer, R., Griesmayr, S., Korak, T. & Mangard, S., 18 Jul 2016, 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2016), Darmstadt, Germany. Association of Computing Machinery

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Websites
Statistics
Routers
Tunnels
Health

Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption

Unterluggauer, T. & Mangard, S., 2016, Constructive Side-Channel Analysis and Secure Design - COSADE 2016. Springer International Publishing AG , p. 3-18 (LNCS; vol. 9689).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Cryptography
Data storage equipment
Side channel attack

FaaS: Federation-as-a-Service: The SUNFISH Cloud Federation Solution

Schiavo, F. P., Sassone, V., Nicoletti, L., Reiter, A. & Suzic, B., 14 Dec 2016, FaaS: Federation-as-a-Service: The SUNFISH Cloud Federation Solution.

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

Open Access
File

Flexible and Secure Resource Sharing for Mobile Augmentation Systems

Reiter, A. & Zefferer, T., Apr 2016, 2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Tar
Ubiquitous computing
Mobile devices
Computer programming languages
Electric power utilization

Flush+Flush: A fast and stealthy cache attack

Gruss, D., Maurice, C., Wagner, K. & Mangard, S., 2016, Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, Proceedings. Springer-Verlag Italia, Vol. 9721. p. 279-299 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9721).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Cache
Program processors
Attack
Hardware
Data storage equipment

Föderierte Autorisierung in der Europäischen Verwaltung

Lenz, T., Zwattendorfer, B., Reichstädter, P. & Pichler, P., Jan 2016, In : eGovernment review. 17, p. 14-15

Research output: Contribution to journalArticleResearch

Future Directions in Mobile Government

Zefferer, T., 2016, In : IADIS international journal on WWW/Internet. 13, 2, p. 17-33

Research output: Contribution to journalArticleResearch

FutureTrust - Future Trust Services for Trustworthy Global Transactions

Hühnlein, D., Frosch, T., Schwenk, J., Piswanger, C-M., Sel, M., Hühnlein, T., Wich, T., Nemmert, D., Lottes, R., Baszanowski, S., Zeuner, V., Rauh, M., Somorovsky, J., Mladenov, V., Condovici, C., Leitold, H., Stalla-Bourdillon, S., Tsakalakis, N., Eichholz, J., Kamm, F-M. & 20 othersUrmann, J., Kühne, A., Wabisch, D., Dean, R., Shamah, J., Kapanadze, M., Ponte, N., Martins, J., Portela, R., Karabat, Ç., Stojičić, S., Nedeljkovic, S., Bouckaert, V., Defays, A., Anderson, B., Jonas, M., Hermanns, C., Schubert, T., Wegener, D. & Sazonov, A., 2016, Open Identity Summit 2016. Bonn: Gesellschaft für Informatik , p. 27 41 p. (Lecture Notes in Informatics; vol. P-264).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

GDPR & ePrivacy: APF 2017, Pre-Proceedings of the 5th ENISA Annual Privacy Forum

Austria, A-SIT. Z. F. S. I. (ed.), Schweighofer, E. (ed.), Mitrakas, A. (ed.) & Rannenberg, K. (ed.), 2016, Graz: Österreichische Computergesellschaft. 257 p.

Research output: Book/ReportBookResearchpeer-review

Grið – Secure Information Exchange Based on an Inverted Trust Model

Prünster, B., Mar 2016, 137 p.

Research output: ThesisMaster's ThesisResearch

Haraka v2 - Efficient Short-Input Hashing for Post-Quantum Applications

Kölbl, S., Lauridsen, M., Mendel, F. & Rechberger, C., 2016, In : IACR Transactions on Symmetric Cryptology. 2016, 2

Research output: Contribution to journalArticleResearchpeer-review

HF/UHF Dual Band RFID Transponders for an Information-Driven Public Transportation System

Zöscher, L., Spreitzer, R., Groß, H., Grosinger, J., Mühlmann, U., Amschl, D., Watzinger, H. & Bösch, W., 11 May 2016, In : e&i - Elektrotechnik und Informationstechnik. 133, 3, p. 163-175

Research output: Contribution to journalArticleResearchpeer-review

Human Computation for Constraint-based Recommenders

Ulz, T., Schwarz, M., Felfernig, A., Haas, S., Shehadeh, A., Reiterer, S. & Stettinger, M., 31 Dec 2016, In : Journal of Intelligent Information Systems. 1, 1, p. 1-21 21 p., 1.

Research output: Contribution to journalArticleResearchpeer-review

IAIK ECCelerate SDK 3.02

Hanser, C. & Ramacher, S., 8 Aug 2016

Research output: Non-print formSoftwareResearch

IAIK ECCelerate SDK 4.0

Hanser, C. & Ramacher, S., 13 Oct 2016

Research output: Non-print formSoftwareResearch

Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ

Bagheri, N., Mendel, F. & Sasaki, Y., 2016, ACISP 2016. Liu, J. K. & Steinfeld, R. (eds.). Springer, (LNCS; vol. 9723).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Learning Models of a Network Protocol using Neural Network Language Models

Aichernig, B., Bloem, R., Pernkopf, F., Röck, F., Schrank, T. & Tappler, M., 2016, IEEE Symposium on Security and Privacy, SP 2016, San Jose, CA, USA, May 22-26, 2016.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

LIGHTest -- A Lightweight Infrastructure for Global Heterogeneous Trust Management

Brügger, B. & Lipp, P., 13 Oct 2016, p. 15. 26 p.

Research output: Contribution to conferencePaperResearchpeer-review

File

Linking-Based Revocation for Group Signatures: A Pragmatic Approach for Efficient Revocation Checks

Slamanig, D., Spreitzer, R. & Unterluggauer, T., 1 Dec 2016, Mycrypt 2016. LNCS ed. Springer Verlag, Vol. 10311. p. 364-388

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Cloud computing
Transparency
Availability
Communication

MATTHEW D2.2 Report on Privacy Algorithms and their Implementation

Hanser, C. & Deutschmann, M., 2016, . 49 p.

Research output: Book/ReportOther reportResearch

MATTHEW D7.3 Final report on Dissemination and Exploitation

Hanser, C., Bock, H., Dietrich, C., Deutschmann, M., Havlik, J., Moschitz, S., Manzi, G. & Paillier, P., 2016, (Submitted) .

Research output: Book/ReportOther reportResearch

MATTHEW D7.7 Final Project Report

Hanser, C., Bock, H., Dietrich, C., Manzi, G., Paillier, P., Deutschmann, M. & Havlik, J., 2016, (Submitted) .

Research output: Book/ReportOther reportResearch

MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity

Albrecht, M. R., Grassi, L., Rechberger, C., Roy, A. & Tiessen, T., 2016, Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I. p. 191-219 29 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

MPC-Friendly Symmetric Key Primitives

Grassi, L., Rechberger, C., Rotaru, D., Scholl, P. & Smart, N. P., 2016, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016. p. 430-443 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Multidimensional Security Policies

Suzic, B., 2016, Zentrum für sichere Informationstechnologie - Austria. 26 p.

Research output: Book/ReportCommissioned reportResearch

File