Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output 1983 2019

Filter
Conference contribution
2019

A Comparative Study of Misapplied Crypto in Android and iOS Applications

Feichtner, J., 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT. Portugal: SciTePress, p. 96-108 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programs
Application programming interfaces (API)
Cryptography
iOS (operating system)
Android (operating system)

A Correctable Public Blockchain

Marsalek, A. & Zefferer, T., 2019, (Accepted/In press) 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE Trustcom-19).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Decision making
Experiments

Algebraic Cryptanalysis of Frit

Dobraunig, C., Eichlseder, M., Mendel, F. & Schofnegger, M., 17 Jun 2019, (Accepted/In press) Selected Areas in Cryptography - SAC 2019. Springer, (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Cloud Data Sharing and Device-Loss Recovery with Hardware-Bound Keys

Hörandner, F. & Nieddu, F., 2019, (Accepted/In press) 15th International Conference on Information Systems Security, ICISS 2019.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Cryptography
Hardware
Recovery
Computer hardware

DNS-based Trust Scheme Publication and Discovery

Wagner, G., More, S. J., Wagner, S. & Hoffmann, M., 29 Mar 2019, Lecture Notes in Informatics: Open Identity Summit 2019. Gesellschaft für Informatik , Vol. 2019.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje

Dobraunig, C. E., Mangard, S., Mendel, F. & Primas, R., 2019, Selected Areas in Cryptography – SAC 2018. Cid, C. & Jacobson, M. J. (eds.). Springer, p. 257-277 21 p. (Lecture Notes in Computer Science; vol. 11349).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Authenticated Encryption
Fault Attacks
Cryptography
Fault
Initialization

Feistel Structures for MPC, and More

Albrecht, M. R., Grassi, L., Perrin, L., Ramacher, S., Rechberger, C., Rotaru, D., Roy, A. & Schofnegger, M., 21 Jun 2019, (Accepted/In press) ESORICS 2019. 54 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Throughput

Fides – Unleashing the Full Potential of Remote Attestation

Prünster, B., Palfinger, G. & Kollmann, C. P., Jul 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications. SciTePress - Science and Technology Publications, Vol. 2: SECRYPT. p. 314--321

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programs
Experiments
Open source software

Fine-Grained Access Control in Industrial Internet of Things: Evaluating Outsourced Attribute-Based Encryption

Ziegler, D., Sabongui, J. & Palfinger, G., Jun 2019, Proceedings of the 34th International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2019. Springer International, p. 91-104

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

File

Forgery Attacks on FlexAE and FlexAEAD

Eichlseder, M., Kales, D. & Schofnegger, M., 5 Sep 2019, (Accepted/In press) IMA Cryptography and Coding - IMACC 2019. 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Standardization
Cryptography

Horcruxes for Everyone - A Framework for Key-Loss Recovery by Splitting Trust

Hörandner, F. & Rabensteiner, C., 2019, (Accepted/In press) 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE Trustcom-19).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Recovery
Servers
Application programs
Authentication
Costs

JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits

Schwarz, M., Lackner, F. & Gruss, D., 24 Feb 2019, NDSS.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

L*-Based Learning of Markov Decision Processes

Tappler, M., Aichernig, B., Bacci, G., Eichlseder, M. & Larsen, K. G., 2019, Formal Methods - The Next 30 Years . ter Beek, M. H., McIver, A. & Oliveria, J. N. (eds.). Cham: Springer, p. 651 - 669 19 p. (Lecture Notes in Computer Science; vol. 11800).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Learning algorithms
Sampling
Formal languages
Model structures
Testing

Learning a Behavior Model of Hybrid Systems Through Combining Model-Based Testing and Machine Learning

Aichernig, B. K., Bloem, R., Ebrahimi, M., Horn, M., Pernkopf, F., Roth, W., Rupp, A., Tappler, M. & Tranninger, M., 2019, Testing Software and Systems: 31st IFIP WG 6.1 International Conference, ICTSS 2019, Paris, France, October 15–17, 2019, Proceedings. Gaston, C., Kosmatov, N. & Le Gall, P. (eds.). Cham: Springer International Publishing AG , p. 3-21 19 p. (Lecture Notes in Computer Science; vol. 11812).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Hybrid systems
Learning systems
Testing
Recurrent neural networks

Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC

Dinur, I., Promitzer, A., Kales, D., Ramacher, S. & Rechberger, C., 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part I. Ishai, Y. & Rijmen, V. (eds.). Springer, p. 343-372 30 p. (Lecture Notes in Computer Science; vol. 11476).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Block Ciphers
Cryptography
Equivalence
Partial
Encryption

Master of Puppets: Trusting Silicon in the Fight for Practical Security in Fully Decentralised Peer-to-Peer Networks

Prünster, B., Fasllija, E. & Mocher, D. W., Jul 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications. SciTePress - Science and Technology Publications, Vol. 2: SECRYPT. p. 252--259

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Peer to peer networks
Silicon
Cloud computing
Hardware
Bandwidth

Mind the Gap: Finding what Updates have (really) changed in Android Applications

Feichtner, J., Neugebauer, L. & Ziegler, D., 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT. Portugal: SciTePress, p. 306-313 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programs
Android (operating system)

Mobile-Only Solution for Server-Based Qualified Electronic Signatures

Theuermann, K., Tauber, A. & Lenz, T., 24 May 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC). Shanghai, China, 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Mobile Private Contact Discovery at Scale

Kales, D., Rechberger, C., Schneider, T., Senker, M. & Weinert, C., 14 Aug 2019, 28th USENIX Security Symposium. USENIX Association, p. 1447-1464

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
Smartphones
Communication
Networks (circuits)
Mobile devices
Cryptography

More Practical Single-Trace Attacks on the Number Theoretic Transform

Peßl, P. & Primas, R., 2019, Progress in Cryptology – LATINCRYPT 2019: 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2–4, 2019, Proceedings. Springer, (Lecture Notes in Computer Science; vol. 11774).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
Cryptography
Mathematical transformations
Microcontrollers
Recovery
Side channel attack

NetSpectre: Read Arbitrary Memory over Network

Schwarz, M., Schwarzl, M., Lipp, M., Masters, J. & Gruß, D., Sep 2019, Computer Security - ESORICS 2019: 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings. Cham: Springer, Vol. 1. p. 279-299 (Lecture Notes in Computer Science; vol. 11735).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Data storage equipment

Obfuscation-Resilient Code Recognition in Android Apps

Feichtner, J. & Rabensteiner, C., 2019, 14th International Conference on Availability, Reliability and Security (ARES 2019). New York: Association of Computing Machinery, 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programs
Android (operating system)

Phish-Hook: Detecting Phishing Certificates Using Certificate Transparency Logs

Fasllija, E., Enişer, H. F. & Prünster, B., 23 Oct 2019, 15th EAI International Conference on Security and Privacy in Communication Networks. Springer

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Hooks
Transparency
Labels
Websites
Visibility

Policy-based access control for the IoT and Smart Cities

Omolola, O., More, S., Fasllija, E., Wagner, G. & Alber, L., 1 Jan 2019, Open Identity Summit 2019, Proceedings. Rossnagel, H., Wagner, S. & Huhnlein, D. (eds.). Gesellschaft fur Informatik (GI), p. 157-163 7 p. (Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI); vol. P-293).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Access control
Network protocols
Data privacy
Data storage equipment
Smart city

Protecting RISC-V Processors against Physical Attacks

Werner, M., Schilling, R., Unterluggauer, T. & Mangard, S., 2019, Design, Automation & Test in Europe Conference - DATE 2019. p. 1136-1141 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

File
Reduced instruction set computing
Microcontrollers
Data storage equipment
Flow control
Program processors

Prying CoW: Inferring Secrets Across Virtual Machine Boundaries

Palfinger, G., Prünster, B. & Ziegler, D., Jul 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications. Prague, Czech Republic: SciTePress - Science and Technology Publications, Vol. 2: SECRYPT. p. 187 - 197

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
Computer operating systems
Hardware
Virtual machine

Qualified Remote Signatures – Solutions, its Certification, and Use

Leitold, H. & Konrad, D., 2019, Proceedings of 29th SmartCard Workshop. Waldmann, U. (ed.). p. 219-231

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearch

File

Revisiting User Privacy for Certificate Transparency

Kales, D., Omolola, O. & Ramacher, S., 2019, 4th IEEE European Symposium on Security and Privacy.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Run-Time Optimization for Learned Controllers Through Quantitative Games

Avni, G., Bloem, R., Chatterjee, K., Henzinger, T., Könighofer, B. & Pranger, S., 15 Jul 2019, Computer Aided Verification (CAV). Dillig, I. & Tasiran, S. (eds.). 31 ed. Springer, Vol. 11561. p. 630-649 ( Lecture Notes in Computer Science; vol. 11561).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
Controllers
Emergency vehicles
Stochastic models
Telecommunication traffic
Learning systems

Selective End-To-End Data-Sharing in the Cloud

Hörandner, F., Ramacher, S. & Roth, S., 2019, (Accepted/In press) 15th International Conference on Information Systems Security, ICISS 2019.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Cryptography

SGXJail: Defeating Enclave Malware via Confinement

Weiser, S., Mayr, L., Schwarz, M. & Gruß, D., Sep 2019, (Accepted/In press) Research in Attacks, Intrusions and Defenses 2019.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Small faults grow up - Verification of error masking robustness in arithmetically encoded programs

Karl, A. F., Schilling, R., Bloem, R. & Mangard, S., 2019, Verification, Model Checking, and Abstract Interpretation - 20th International Conference, VMCAI 2019, Proceedings. Piskac, R. & Enea, C. (eds.). Springer, p. 183-204 22 p. (Lecture Notes in Computer Science; vol. 11388).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Masking
Fault
Robustness
Flip
Soft Error

Spectre Attacks: Exploiting Speculative Execution

Kocher, P., Horn, J., Fogh, A., Genkin, D., Gruss, D., Haas, W., Hamburg, M., Lipp, M., Mangard, S., Prescher, T., Schwarz, M. & Yarom, Y., 20 May 2019, 40th IEEE Symposium on Security and Privacy.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Synthesis of Minimum-Cost Shields for Multi-agent Systems

Bharadwaj, S., Bloem, R., Dimitrova, R., Könighofer, B. & Topcu, U., 10 Jul 2019, 2019 American Control Conference (ACC). ACM/IEEE, p. 1048-1055 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Multi agent systems
Costs
Warehouses
Unmanned aerial vehicles (UAV)
Logistics

Synthesizing Reactive Systems Using Robustness and Recovery Specifications

Bloem, R., Chockler, H., Ebrahimi, M. & Strichman, O., 2019, (Accepted/In press) 2019 Formal Methods in Computer Aided Design, FMCAD 2019. Barrett, C. & Yang, J. (eds.). IEEE CS, 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Specifications
Recovery

Tackling Data Inefficiency: Compressing the Bitcoin Blockchain

Marsalek, A., Zefferer, T., Fasllija, E. & Ziegler, D., 2019, (Accepted/In press) 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE Trustcom-19).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Internet of things

TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V

Weiser, S., Werner, M., Brasser, F., Malenko, M., Mangard, S. & Sadeghi, A-R., Feb 2019, (Accepted/In press) Network and Distributed System Security Symposium (NDSS) 2019.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

TPL: A Trust Policy Language

Mödersheim, S., Schlichtkrull, A., Wagner, G., More, S. & Alber, L., 19 Jul 2019, Trust Management XIII: 13th IFIP WG 11.11 International Conference, IFIPTM 2019. 1 ed. Copenhagen, Denmark: Springer, Vol. Trust Management XIII. p. 209-223

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
Semantics
Acoustic waves

Trustworthy Privacy-Preserving Service Compositions

Theuermann, K., 31 Oct 2019, 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). p. 10-17 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
Chemical analysis
Transparency
Cryptography
Computer systems
Network protocols

Unleashing the Full Potential of Blockchain Technology for Security-Sensitive Business Applications

Marsalek, A., Kollmann, C., Zefferer, T. & Teufl, P., 1 May 2019, ICBC 2019 - IEEE International Conference on Blockchain and Cryptocurrency. Institute of Electrical and Electronics Engineers, p. 394-402 9 p. 8751444

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Industry
Data privacy
Security of data
Middleware
Privacy

Usability of Policy Authoring tools: A layered approach

Weinhardt, S. & Omolola, O., 2019, ICISSP 2019 - Proceedings of the 5th International Conference on Information Systems Security and Privacy. Mori, P., Camp, O. & Furnell, S. (eds.). Vol. 1. p. 301-308 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

ZombieLoad: Cross-Privilege-Boundary Data Sampling

Schwarz, M., Lipp, M., Moghimi, D., Bulck, J. V., Stecklina, J., Prescher, T. & Gruss, D., 12 Nov 2019, (Accepted/In press) CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM/IEEE

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Program processors
Sampling
Faulting
Data storage equipment
Virtual machine
2018

A Counting Semantics for Monitoring LTL Specifications over Finite Traces

Bartocci, E., Bloem, R., Nickovic, D. & Röck, F., 2018, Computer Aided Verification : 30th International Conference, CAV 2018, Held as Part of the Federated Logic Conference, FloC 2018, Oxford, UK, July 14-17, 2018, Proceedings, Part I. Vol. 1. p. 547-564 18 p. (Lecture Notes in Computer Science; vol. 10980).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access

Agile Smart-device based Multi-factor Authentication for Modern Identity Management Systems

Lenz, T. & Krnjic, V., 2018, Proceedings of the 14th International Conference on Web Information Systems and Technologies. Vol. 1. p. 113-124

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access

A Hierarchical Evaluation Scheme for Pilot-based Research Projects

Zefferer, T., 2018, Proceedings of the 14th International Conference on Web Information Systems and Technologies. Escalona, M. J., Domínguez Mayo, F., Majchrzak, T. & Monfort, V. (eds.). SciTePress, Vol. 1. p. 356-363

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

A Holistic Approach Towards Peer-to-Peer Security and Why Proof of Work Won’t Do

Prünster, B., Kollmann, C. P., Suzic, B. & Ziegler, D., 2018, Security and Privacy in Communication Networks. Beyah, R., Chang, B., Li, Y. & Zhu, S. (eds.). Cham: Springer International, p. 122-138 16 p. ( Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; vol. 255).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Peer to peer networks
Communication

Another Flip in the Wall of Rowhammer Defenses

Gruss, D., Lipp, M., Schwarz, M., Genkin, D., Juffinger, J., O'Connell, S., Schoechl, W. & Yarom, Y., 31 Jan 2018, 39th IEEE Symposium on Security and Privacy 2018.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

A Security Analysis of FirstCoin

Marsalek, A., Kollmann, C. & Zefferer, T., 2018, ICT Systems Security and Privacy Protection. Janczewski, L. J. & Kutylowski, M. (eds.). Cham: Springer International Publishing AG , p. 127-140 14 p. (IFIP Advances in Information and Communication Technology; vol. 529).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Electronic money

Automata Learning for Symbolic Execution

Aichernig, B., Bloem, R., Ebrahimi, M., Tappler, M. & Winter, J., 2018, 2018 Formal Methods in Computer Aided Design, FMCAD 2018, Austin, TX, USA, October 30 - November 2, 2018. Bjørner, N. & Gurfinkel, A. (eds.). IEEE CS, p. 130 - 138 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Testing

Automated Binary Analysis on iOS - A Case Study on Cryptographic Misuse in iOS Applications

Feichtner, J., Missmann, D. & Spreitzer, R., 2018, Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks. New York: Association of Computing Machinery, p. 236-247 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programming interfaces (API)
Cryptography
Computer operating systems
Inspection
Defects