Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output 1983 2020

Filter
Conference contribution
2020

Algebraic Cryptanalysis of Frit

Dobraunig, C., Eichlseder, M., Mendel, F. & Schofnegger, M., Jan 2020, Selected Areas in Cryptography - SAC 2019. Springer, p. 149-170 (Lecture Notes in Computer Science; no. 11959).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2019

A Comparative Study of Misapplied Crypto in Android and iOS Applications

Feichtner, J., 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT. Portugal: SciTePress, p. 96-108 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programs
Application programming interfaces (API)
Cryptography
iOS (operating system)
Android (operating system)

A Correctable Public Blockchain

Marsalek, A. & Zefferer, T., 1 Aug 2019, 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019. Institute of Electrical and Electronics Engineers, p. 554-561 8 p. 8887342

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Decision making
Experiments
Decentralized decision making
Security analysis
Currency

Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC

Albrecht, M. R., Cid, C., Grassi, L., Khovratovich, D., Lüftenegger, R., Rechberger, C. & Schofnegger, M., 2019, Advances in Cryptology - ASIACRYPT 2019. Cham: Springer, p. 371-397 (Lecture Notes in Computer Science; vol. 11923).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Polynomials
Hash functions

An Empirical Study of the Use of Integrity Verification Mechanisms for Web Subresources

Chapuis, B., Omolola, O., Humbert, M., Cherubini, M. & Huguenin, K., 11 Jan 2019, (Accepted/In press) The Web Conference.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access

A Systematic Evaluation of Transient Execution Attacks and Defenses

Canella, C., Bulck, J. V., Schwarz, M., Lipp, M., Berg, B. V., Ortner, P., Piessens, F., Evtyushkin, D. & Gruss, D., 14 Aug 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 249-266 17 p. (arXiv.org e-Print archive).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Program processors
Core meltdown
Firmware
Industry

Cloud Data Sharing and Device-Loss Recovery with Hardware-Bound Keys

Hörandner, F. & Nieddu, F., 2019, 15th International Conference on Information Systems Security, ICISS 2019. Springer, Vol. 11952. p. 196-217 (Information Systems Security; vol. 11952).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Cryptography
Hardware
Recovery
Computer hardware

Dependable Internet of Things

Römer, K. U., Witrisal, K., Baunach, M. C., Bloem, R. & Horn, M., 26 Feb 2019, Proceedings of the International Conference on Sensor Networks (SENSORNETS) 2019.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

DNS-based trust scheme publication and discovery: Lightest's trust scheme publication authority

Wagner, G., Wagner, S., More, S. & Hoffmann, M., 1 Jan 2019, Open Identity Summit 2019, Proceedings. Rossnagel, H., Wagner, S. & Huhnlein, D. (eds.). Gesellschaft fur Informatik (GI), p. 49-58 10 p. (Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI); vol. P-293).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

DNS-based Trust Scheme Publication and Discovery

Wagner, G., More, S. J., Wagner, S. & Hoffmann, M., 29 Mar 2019, Lecture Notes in Informatics: Open Identity Summit 2019. Gesellschaft für Informatik , Vol. 2019.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Efficient Collision Attack Frameworks for RIPEMD-160

Liu, F., Dobraunig, C., Mendel, F., Isobe, T., Wang, G. & Cao, Z., 1 Jan 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Boldyreva, A. & Micciancio, D. (eds.). Springer-Verlag Italia, p. 117-149 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11693 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Collision Attack
Data storage equipment
Time Complexity
Framework
Guess

Efficient FPGA Implementations of LowMC and Picnic

Kales, D., Ramacher, S., Rechberger, C., Walch, R. & Werner, M., 2019, (Accepted/In press) Topics in Cryptology – CT-RSA 2020: The Cryptographers’ Track at the RSA Conference 2020, San Francisco, CA, USA, February 24–28, 2020, Proceedings. Jarecki, S. (ed.). San Francisco, CA, USA: Springer

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
Field programmable gate arrays (FPGA)
Hardware
Standardization
Quantum cryptography

Efficient Information-Flow Verification Under Speculative Execution

Bloem, R., Jacobs, S. & Vizel, Y., 2019, Efficient Information-Flow Verification Under Speculative Execution.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Fallout: Leaking Data on Meltdown-resistant CPUs

Canella, C. A., Genkin, D., Giner, L., Gruß, D., Lipp, M., Minkin, M., Moghimi, D., Piessens, F., Schwarz, M., Sunar, B., Bulck, J. V. & Yarom, Y., 12 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM/IEEE, p. 769-784 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Fallout
Metadata
Flow control
Program processors
Hardware

Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje

Dobraunig, C. E., Mangard, S., Mendel, F. & Primas, R., 2019, Selected Areas in Cryptography – SAC 2018. Cid, C. & Jacobson, M. J. (eds.). Springer, p. 257-277 21 p. (Lecture Notes in Computer Science; vol. 11349).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Authenticated Encryption
Fault Attacks
Cryptography
Fault
Initialization

Feistel Structures for MPC, and More

Albrecht, M. R., Grassi, L., Perrin, L., Ramacher, S., Rechberger, C., Rotaru, D., Roy, A. & Schofnegger, M., 2019, Computer Security – ESORICS 2019. Cham: Springer, p. 151-171 (Lecture Notes in Computer Science; vol. 11736).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Throughput

Fides – Unleashing the Full Potential of Remote Attestation

Prünster, B., Palfinger, G. & Kollmann, C. P., Jul 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications. SciTePress - Science and Technology Publications, Vol. 2: SECRYPT. p. 314--321

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programs
Experiments
Open source software

Fine-Grained Access Control in Industrial Internet of Things: Evaluating Outsourced Attribute-Based Encryption

Ziegler, D., Sabongui, J. & Palfinger, G., Jun 2019, Proceedings of the 34th International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2019. Springer International, p. 91-104

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

File

Forgery Attacks on FlexAE and FlexAEAD

Eichlseder, M., Kales, D. & Schofnegger, M., Nov 2019, Cryptography and Coding - IMACC 2019. Springer, Cham, p. 200-214 15 p. (Lecture Notes in Computer Science; vol. 11929).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Standardization
Cryptography

Horcruxes for Everyone - A Framework for Key-Loss Recovery by Splitting Trust

Hörandner, F. & Rabensteiner, C., 2019, 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE Trustcom-19). Institute of Electrical and Electronics Engineers, p. 50-57

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Recovery
Servers
Application programs
Authentication
Costs

JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits

Schwarz, M., Lackner, F. & Gruss, D., 24 Feb 2019, NDSS.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

L*-Based Learning of Markov Decision Processes

Tappler, M., Aichernig, B., Bacci, G., Eichlseder, M. & Larsen, K. G., 2019, Formal Methods - The Next 30 Years . ter Beek, M. H., McIver, A. & Oliveria, J. N. (eds.). Cham: Springer, p. 651 - 669 19 p. (Lecture Notes in Computer Science; vol. 11800).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Learning algorithms
Sampling
Formal languages
Model structures
Testing

Learning a Behavior Model of Hybrid Systems Through Combining Model-Based Testing and Machine Learning

Aichernig, B. K., Bloem, R., Ebrahimi, M., Horn, M., Pernkopf, F., Roth, W., Rupp, A., Tappler, M. & Tranninger, M., 2019, Testing Software and Systems: 31st IFIP WG 6.1 International Conference, ICTSS 2019, Paris, France, October 15–17, 2019, Proceedings. Gaston, C., Kosmatov, N. & Le Gall, P. (eds.). Cham: Springer International Publishing AG , p. 3-21 19 p. (Lecture Notes in Computer Science; vol. 11812).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Hybrid systems
Learning systems
Testing
Recurrent neural networks

Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC

Dinur, I., Promitzer, A., Kales, D., Ramacher, S. & Rechberger, C., 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part I. Ishai, Y. & Rijmen, V. (eds.). Springer, p. 343-372 30 p. (Lecture Notes in Computer Science; vol. 11476).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Block Ciphers
Cryptography
Equivalence
Partial
Encryption

Master of Puppets: Trusting Silicon in the Fight for Practical Security in Fully Decentralised Peer-to-Peer Networks

Prünster, B., Fasllija, E. & Mocher, D. W., Jul 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications. SciTePress - Science and Technology Publications, Vol. 2: SECRYPT. p. 252--259

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Peer to peer networks
Silicon
Cloud computing
Hardware
Bandwidth

Mind the Gap: Finding what Updates have (really) changed in Android Applications

Feichtner, J., Neugebauer, L. & Ziegler, D., 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT. Portugal: SciTePress, p. 306-313 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programs
Android (operating system)

Mobile-Only Solution for Server-Based Qualified Electronic Signatures

Theuermann, K., Tauber, A. & Lenz, T., 24 May 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC). Shanghai, China, 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Mobile Private Contact Discovery at Scale

Kales, D., Rechberger, C., Schneider, T., Senker, M. & Weinert, C., 14 Aug 2019, 28th USENIX Security Symposium. USENIX Association, p. 1447-1464

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
Smartphones
Communication
Networks (circuits)
Mobile devices
Cryptography

More Practical Single-Trace Attacks on the Number Theoretic Transform

Peßl, P. & Primas, R., 2019, Progress in Cryptology – LATINCRYPT 2019: 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2–4, 2019, Proceedings. Springer, (Lecture Notes in Computer Science; vol. 11774).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
Cryptography
Mathematical transformations
Microcontrollers
Recovery
Side channel attack

NetSpectre: Read Arbitrary Memory over Network

Schwarz, M., Schwarzl, M., Lipp, M., Masters, J. & Gruß, D., Sep 2019, Computer Security - ESORICS 2019: 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings. Cham: Springer, Vol. 1. p. 279-299 (Lecture Notes in Computer Science; vol. 11735).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Data storage equipment

Obfuscation-Resilient Code Recognition in Android Apps

Feichtner, J. & Rabensteiner, C., 2019, 14th International Conference on Availability, Reliability and Security (ARES 2019). New York: Association of Computing Machinery, 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Application programs
Android (operating system)

Page Cache Attacks

Gruss, D., Kraft, E., Tiwari, T., Schwarz, M., Trachtenberg, A., Hennessey, J., Ionescu, A. & Fogh, A., 12 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM/IEEE, p. 167-180

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Hardware
Computer operating systems
Computer systems
Servers
Monitoring

Phish-Hook: Detecting Phishing Certificates Using Certificate Transparency Logs

Fasllija, E., Enişer, H. F. & Prünster, B., 23 Oct 2019, 15th EAI International Conference on Security and Privacy in Communication Networks. Springer

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Hooks
Transparency
Labels
Websites
Visibility

Policy-based access control for the IoT and Smart Cities

Omolola, O., More, S., Fasllija, E., Wagner, G. & Alber, L., 1 Jan 2019, Open Identity Summit 2019, Proceedings. Rossnagel, H., Wagner, S. & Huhnlein, D. (eds.). Gesellschaft fur Informatik (GI), p. 157-163 7 p. (Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI); vol. P-293).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Access control
Network protocols
Data privacy
Data storage equipment
Smart city

Practical Enclave Malware with Intel SGX

Schwarz, M., Weiser, S. & Gruß, D., Jun 2019, Detection of Intrusions and Malware, and Vulnerability Assessment: 16th International Conference, DIMVA 2019, 2019. Cham: Springer International, p. 177-196 (Lecture Notes in Computer Science; vol. 11543).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

File
Personal computers
Program processors
Malware
Data storage equipment
Denial-of-service attack

Privacy-Preserving eID Derivation for Self-Sovereign Identity Systems

Abraham, A., Hörandner, F., Omolola, O. & Ramacher, S., 16 Dec 2019, (Submitted) Proceedings - 21st International Conference on Information and Communications Security. Springer

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Protecting RISC-V Processors against Physical Attacks

Werner, M., Schilling, R., Unterluggauer, T. & Mangard, S., 2019, Design, Automation & Test in Europe Conference - DATE 2019. p. 1136-1141 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

File
Reduced instruction set computing
Microcontrollers
Data storage equipment
Flow control
Program processors

Prying CoW: Inferring Secrets Across Virtual Machine Boundaries

Palfinger, G., Prünster, B. & Ziegler, D., Jul 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications. Prague, Czech Republic: SciTePress - Science and Technology Publications, Vol. 2: SECRYPT. p. 187 - 197

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
Computer operating systems
Hardware
Virtual machine

Qualified Remote Signatures – Solutions, its Certification, and Use

Leitold, H. & Konrad, D., 2019, Proceedings of 29th SmartCard Workshop. Waldmann, U. (ed.). p. 219-231

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearch

File

Revisiting User Privacy for Certificate Transparency

Kales, D., Omolola, O. & Ramacher, S., 2019, 4th IEEE European Symposium on Security and Privacy.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Run-Time Optimization for Learned Controllers Through Quantitative Games

Avni, G., Bloem, R., Chatterjee, K., Henzinger, T., Könighofer, B. & Pranger, S., 15 Jul 2019, Computer Aided Verification (CAV). Dillig, I. & Tasiran, S. (eds.). 31 ed. Springer, Vol. 11561. p. 630-649 ( Lecture Notes in Computer Science; vol. 11561).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
Controllers
Emergency vehicles
Stochastic models
Telecommunication traffic
Learning systems

ScatterCache: Thwarting Cache Attacks via Cache Set Randomization

Werner, M., Unterluggauer, T., Giner, L., Schwarz, M., Gruß, D. & Mangard, S., Aug 2019, 28th USENIX Security Symposium (USENIX Security 19). Santa Clara, CA: USENIX Association, p. 675-692

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
Hardware
Data storage equipment
Side channel attack

Selective End-To-End Data-Sharing in the Cloud

Hörandner, F., Ramacher, S. & Roth, S., 2019, 15th International Conference on Information Systems Security, ICISS 2019. Springer, Vol. 11952. p. 175-195 (Information Systems Security; vol. 11952).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Cryptography

SGXJail: Defeating Enclave Malware via Confinement

Weiser, S., Mayr, L., Schwarz, M. & Gruß, D., Sep 2019, RAiD 2019 Proceedins: Proceedings of the22nd International Symposium on Research in Attacks, Intrusions and Defenses. USENIX Association, p. 353-366

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Small faults grow up - Verification of error masking robustness in arithmetically encoded programs

Karl, A. F., Schilling, R., Bloem, R. & Mangard, S., 2019, Verification, Model Checking, and Abstract Interpretation - 20th International Conference, VMCAI 2019, Proceedings. Piskac, R. & Enea, C. (eds.). Springer, p. 183-204 22 p. (Lecture Notes in Computer Science; vol. 11388).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
Masking
Fault
Robustness
Flip
Soft Error

Spectre Attacks: Exploiting Speculative Execution

Kocher, P., Horn, J., Fogh, A., Genkin, D., Gruss, D., Haas, W., Hamburg, M., Lipp, M., Mangard, S., Prescher, T., Schwarz, M. & Yarom, Y., 20 May 2019, 40th IEEE Symposium on Security and Privacy.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Synthesis of Minimum-Cost Shields for Multi-agent Systems

Bharadwaj, S., Bloem, R., Dimitrova, R., Könighofer, B. & Topcu, U., 10 Jul 2019, 2019 American Control Conference (ACC). ACM/IEEE, p. 1048-1055 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Multi agent systems
Costs
Warehouses
Unmanned aerial vehicles (UAV)
Logistics

Synthesizing Reactive Systems Using Robustness and Recovery Specifications

Bloem, R., Chockler, H., Ebrahimi, M. & Strichman, O., 2019, 2019 Formal Methods in Computer Aided Design, FMCAD 2019. Barrett, C. & Yang, J. (eds.). IEEE CS, p. 147-151 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Specifications
Recovery

Tackling data inefficiency: Compressing the bitcoin blockchain

Marsalek, A., Zefferer, T., Fasllija, E. & Ziegler, D., 1 Aug 2019, 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering: TrustCom/BigDataSE 2019. Institute of Electrical and Electronics Engineers, p. 626-633 8 p. 8887331. (Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Node
Inefficiency
Internet of things
Resources
Evaluation

TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V

Weiser, S., Werner, M., Brasser, F., Malenko, M., Mangard, S. & Sadeghi, A-R., 2019, Proceedings 2019 - Network and Distributed System Security Symposium (NDSS) . Reston, Va.: Internet Society

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File