Institute of Applied Information Processing and Communications (7050)

  • 8010

    Inffeldgasse 16a Graz

    Austria

Research Output 1983 2019

Filter
Article
2019

E-Government in the Public Cloud: Requirements and Opportunities

Abraham, A., Hörandner, F., Zefferer, T. & Zwattendorfer, B., 6 Feb 2019, (Accepted/In press) In : Electronic Government.

Research output: Contribution to journalArticleResearchpeer-review

public sector
public
services

Interactive Quality Analytics of User-generated Content: An Integrated Toolkit for the Case of Wikipedia

Sciascio, C. D., Strohmaier, D., Errecalde, M. & Veas, E., Apr 2019, In : ACM Transactions on Interactive Intelligent Systems . 9, 2-3, p. 1-42 42 p., 13.

Research output: Contribution to journalArticleResearchpeer-review

Defects
Digital libraries
Inspection
Internet
Experiments

Joint Reconstruction and Classification of Tumor Cells and Cell Interactions in Melanoma Tissue Sections with Synthesized Training Data

Effland, A., Kobler, E., Brandenburg, A., Klatzer, T., Neuhäuser, L., Hölzel, M., Landsberg, J., Pock, T. & Rumpf, M., 2019, In : International Journal of Computer Assisted Radiology and Surgery.

Research output: Contribution to journalArticleResearchpeer-review

Practical Enclave Malware with Intel SGX

Schwarz, M., Weiser, S. & Gruss, D., 8 Feb 2019, In : arXiv.org e-Print archive. arXiv:1902.03256 .

Research output: Contribution to journalArticleResearch

Electronic mail
Mountings
Personal computers
Program processors
Malware

Privacy-preserving attribute aggregation in eID federations

Priesnitz Filho, W., Ribeiro, C. & Zefferer, T., 1 Mar 2019, In : Future Generation Computer Systems. 92, Volume 92, p. 1-16 16 p.

Research output: Contribution to journalArticleResearchpeer-review

Agglomeration
Ontology
Authentication
Experiments
European Union
2018

A Federation of Federations: Secure Cloud Federations meet European Identity Federations

Zefferer, T., Ziegler, D. & Reiter, A., Mar 2018, In : International Journal for Information Security Research. Volume 8, Issue 1

Research output: Contribution to journalArticleResearchpeer-review

A Review of Depth and Normal Fusion Algorithms

Antensteiner, D., Stolc, S. & Pock, T., 2018, In : Sensors .

Research output: Contribution to journalArticleResearchpeer-review

Assessment of the generalization of learned image reconstruction and the potential for transfer learning

Knoll, F., Hammernik, K., Kobler, E., Pock, T., Recht, M. P. & Sodickson, D. K., 2018, In : Magnetic Resonance in Medicine. 81, 1, p. 116-128 13 p.

Research output: Contribution to journalArticleResearchpeer-review

A Systematic Evaluation of Transient Execution Attacks and Defenses

Canella, C., Bulck, J. V., Schwarz, M., Lipp, M., Berg, B. V., Ortner, P., Piessens, F., Evtyushkin, D. & Gruss, D., 13 Nov 2018, In : arXiv.org e-Print archive.

Research output: Contribution to journalArticleResearch

File
Core meltdown
Firmware
Program processors
Acoustic waves
Industry

A unified masking approach

Gross, H. & Mangard, S., 1 Mar 2018, In : Journal of cryptographic engineering.

Research output: Contribution to journalArticleResearchpeer-review

Hardware
Costs

Clustering Related-Tweak Characteristics: Application to MANTIS-6

Eichlseder, M. & Kales, D., 2018, In : IACR Transactions on Symmetric Cryptology. 2018, 2, p. 111-132

Research output: Contribution to journalArticleResearchpeer-review

Open Access

Differential Fault Attacks on Deterministic Lattice Signatures

Peßl, P. & Groot Bruinderink, L., 2018, In : IACR Transactions on Cryptographic Hardware and Embedded Systems. 2018, 3, p. 21-43

Research output: Contribution to journalArticleResearchpeer-review

Open Access

Erfahrungen aus eIDAS Zertifizierung: Fernsignaturen vs. Smartcards: andere Technologie damit auch anderer Zugang der Sicherheitsbewertung

Leitold, H. & Konrad, D., Jul 2018, In : Datenschutz und Datensicherheit. 42, 7, p. 429-433

Research output: Contribution to journalArticleResearchpeer-review

Expansion-Based QBF Solving Without Recursion

Bloem, R., Braud-Santoni, N., Hadzic, V., Egly, U., Lonsing, F. & Seidl, M., 2018, In : arXiv.org e-Print archive. CoRR

Research output: Contribution to journalArticleResearch

Generic Low-Latency Masking in Hardware

Groß, H., Iusupov, R. & Bloem, R., 31 Aug 2018, In : IACR Transactions on Cryptographic Hardware and Embedded Systems. 2018, 2, p. 1-21

Research output: Contribution to journalArticleResearchpeer-review

Open Access

Kernel Isolation: From an Academic Idea to an Efficient Patch for Every Computer

Gruss, D., Hansen, D. & Gregg, B., Dec 2018, In : ;login: the USENIX Magazine. 43, 4, p. 10-14 5 p.

Research output: Contribution to journalArticleResearch

Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge

Derler, D. & Slamanig, D., 1 Jan 2018, (Accepted/In press) In : Designs, Codes, and Cryptography.

Research output: Contribution to journalArticleResearchpeer-review

Zero-knowledge
Flavors
Homomorphic
Cryptography
Signature

MEAS: memory encryption and authentication secure against side-channel attacks

Unterluggauer, T., Werner, M. & Mangard, S., 25 Jan 2018, In : Journal of cryptographic engineering. p. 1-22

Research output: Contribution to journalArticleResearchpeer-review

Open Access
Authentication
Cryptography
Data storage equipment
Random access storage
Side channel attack

Meltdown

Lipp, M., Schwarz, M., Gruss, D., Prescher, T., Haas, W., Mangard, S., Kocher, P., Genkin, D., Yarom, Y. & Hamburg, M., 3 Jan 2018, In : arXiv.org e-Print archive.

Research output: Contribution to journalArticleResearch

Data storage equipment
Data privacy
Personal computers
Computer systems
Hardware

Nethammer: Inducing Rowhammer Faults through Network Requests

Lipp, M., Aga, M. T., Schwarz, M., Gruss, D., Maurice, C., Raab, L. & Lamster, L., 13 May 2018, In : arXiv.org e-Print archive. 15 p.

Research output: Contribution to journalArticleResearch

File
Data storage equipment
Dynamic random access storage
Landslides
Mobile phones
Personal computers

NetSpectre: Read Arbitrary Memory over Network

Schwarz, M., Schwarzl, M., Lipp, M. & Gruss, D., 27 Jul 2018, In : arXiv.org e-Print archive.

Research output: Contribution to journalArticleResearch

File

Practical Witness Encryption for Algebraic Languages Or How to Encrypt Under Groth-Sahai Proofs

Derler, D. & Slamanig, D., 2018, In : Designs, codes and cryptography. 23 p.

Research output: Contribution to journalArticleResearchpeer-review

Real-Time Intensity-Image Reconstruction for Event Cameras Using Manifold Regularisation

Munda, G., Reinbacher, C. & Pock, T., 2018, In : International Journal of Computer Vision. 126, 12, p. 1381-1393 13 p.

Research output: Contribution to journalArticleResearchpeer-review

Sharing Independence Relabeling: Efficient Formal Verification of Higher-Order Masking

Bloem, R., Groß, H., Iusupov, R., Krenn, M. & Mangard, S., 2018, In : Cryptology ePrint Archive. 2018, p. 1031 1 p.

Research output: Contribution to journalArticleResearchpeer-review

Shielded Decision-Making in MDPs

Jansen, N., Könighofer, B., Junges, S. & Bloem, R., 2018, In : arXiv.org e-Print archive. CoRR, abs/1807.06096.

Research output: Contribution to journalArticleResearchpeer-review

SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography

Dobraunig, C. E., Eichlseder, M., Korak, T., Mangard, S., Mendel, F. & Primas, R., 2018, In : IACR Transactions on Cryptographic Hardware and Embedded Systems. 2018, 3, p. 547-572

Research output: Contribution to journalArticleResearchpeer-review

Open Access

Software-based microarchitectural attacks

Gruss, D., Sep 2018, In : IT - Information technology.

Research output: Contribution to journalArticleResearch

Software-basierte Mikroarchitekturangriffe

Gruss, D., 26 Sep 2018, (Accepted/In press) In : GI-Edition / Proceedings : lecture notes in informatics.

Research output: Contribution to journalArticleResearch

Symbolic checking of Fuzzy CTL on Fuzzy Program Graph

Ebrahimi, M., Sotudeh, G. & Movaghar, A., 3 Feb 2018, In : Acta informatica.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
Model checking
Temporal logic
Explosions
Flip flop circuits
Fuzzy systems

Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices

Spreitzer, R., Moonsamy, V., Korak, T. & Mangard, S., 2018, In : IEEE Communications Surveys & Tutorials. 20, 1, p. 465-488 24 p.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File
Mobile devices
Side channel attack
Smart cards
Smartphones

Variational 3D-PIV with sparse descriptors

Lasinger, K., Vogel, C., Schindler, K. & Pock, T., 10 May 2018, In : Measurement science & technology. 29, 6, 14 p., 064010.

Research output: Contribution to journalArticleResearchpeer-review

2017

Ascon hardware implementations and side-channel evaluation

Groß, H., Wenger, E., Dobraunig, C. & Ehrenhöfer, C., 2017, In : Microprocessors and microsystems - Embedded Hardware Design. 52, p. 470-479 10 p.

Research output: Contribution to journalArticleResearchpeer-review

Hardware
Ethernet
Radio frequency identification (RFID)
Sensor nodes
Embedded systems

Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features

Schwarz, M., Gruss, D., Lipp, M., Maurice, C., Schuster, T., Fogh, A. & Mangard, S., 3 Nov 2017, In : arXiv.org e-Print archive.

Research output: Contribution to journalArticleResearch

Program processors
Hazards and race conditions
Data storage equipment
Retrofitting
Flow control

Dependable Internet of Things for Networked Cars

Großwindhager, B., Rupp, A., Tappler, M., Tranninger, M., Weiser, S., Aichernig, B., Boano, C. A., Horn, M., Kubin, G., Mangard, S., Steinberger, M. & Römer, K. U., Dec 2017, In : International Journal of Computing. 16, 4, p. 226-237

Research output: Contribution to journalArticleResearchpeer-review

Railroad cars
Testbeds
Trucks
Radio interference
Industrial plants

ISAP - Towards Side-Channel Secure Authenticated Encryption

Dobraunig, C. E., Eichlseder, M., Mangard, S., Mendel, F. & Unterluggauer, T., 2017, In : IACR Transactions on Symmetric Cryptology. 2017, 1, p. 80-105

Research output: Contribution to journalArticleResearchpeer-review

Open Access

STORK: a real, heterogeneous, large-scale eID management system

Ribeiro, C., Leitold, H., Esposito, S. & Mitzman, D., Jul 2017, In : International Journal of Information Security.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
Electronic scales
Semantics
Interoperability
Identification (control systems)
Internet
2016

A New Architecture for Developing Cryptographic Cloud Services

Lorünser, T., Slamanig, D., Länger, T. & Pöhls, H. C., 1 Jun 2016, In : ERCIM news. 106

Research output: Contribution to journalArticleResearch

CREDENTIAL: Secure Cloud Identity Wallet

Notario, N., Krenn, S., Zwattendorfer, B. & Hörandner, F., 2016, In : ERCIM news. 106, p. 11-12

Research output: Contribution to journalArticleResearch

Electromagnetic waves
Redundancy
Internet of things
Hot Temperature

ENHANCING CROSS-BORDER EID FEDERATIONS BY USING A MODULAR AND FLEXIBLE ATTRIBUTE MAPPING SERVICE TO MEET NATIONAL LEGAL AND TECHNICAL REQUIREMENTS

Lenz, T., 18 Jan 2016, In : IADIS international journal on WWW/Internet. 13, 2, p. 52 68 p.

Research output: Contribution to journalArticleResearchpeer-review

Authentication
Interoperability

Föderierte Autorisierung in der Europäischen Verwaltung

Lenz, T., Zwattendorfer, B., Reichstädter, P. & Pichler, P., Jan 2016, In : eGovernment review. 17, p. 14-15

Research output: Contribution to journalArticleResearch

Future Directions in Mobile Government

Zefferer, T., 2016, In : IADIS international journal on WWW/Internet. 13, 2, p. 17-33

Research output: Contribution to journalArticleResearch

Haraka v2 - Efficient Short-Input Hashing for Post-Quantum Applications

Kölbl, S., Lauridsen, M., Mendel, F. & Rechberger, C., 2016, In : IACR Transactions on Symmetric Cryptology. 2016, 2

Research output: Contribution to journalArticleResearchpeer-review

HF/UHF Dual Band RFID Transponders for an Information-Driven Public Transportation System

Zöscher, L., Spreitzer, R., Groß, H., Grosinger, J., Mühlmann, U., Amschl, D., Watzinger, H. & Bösch, W., 11 May 2016, In : e&i - Elektrotechnik und Informationstechnik. 133, 3, p. 163-175

Research output: Contribution to journalArticleResearchpeer-review

Human Computation for Constraint-based Recommenders

Ulz, T., Schwarz, M., Felfernig, A., Haas, S., Shehadeh, A., Reiterer, S. & Stettinger, M., 31 Dec 2016, In : Journal of Intelligent Information Systems. 1, 1, p. 1-21 21 p., 1.

Research output: Contribution to journalArticleResearchpeer-review

Practical Key Recovery Attack on MANTIS-5

Dobraunig, C. E., Eichlseder, M., Kales, D. & Mendel, F., 2016, In : IACR Transactions on Symmetric Cryptology. 2016, 2

Research output: Contribution to journalArticleResearchpeer-review

PRISMACLOUD – Privacy and Security Maintaining Services in the Cloud

Slamanig, D., Karyda, A. & Lorünser, T., 2016, In : ERCIM news. 104, p. 46-46

Research output: Contribution to journalArticleResearch

Secure and Privacy-Preserving Identity Management in the Cloud

Zwattendorfer, B., Krenn, S. & Lorünser, T., 2016, In : ERCIM news. 104, p. 44-45

Research output: Contribution to journalArticleResearch

The Austrian eID ecosystem in the public cloud: How to obtain privacy while preserving practicality

Zwattendorfer, B. & Slamanig, D., 2016, In : Journal of information security and applications. 27-28

Research output: Contribution to journalArticleResearchpeer-review

The first reactive synthesis competition (SYNTCOMP 2014)

Jacobs, S., Bloem, R., Brenguier, R., Ehlers, R., Hell, T., Könighofer, R., Pérez, G. A., Raskin, J. F., Ryzhyk, L., Sankur, O., Seidl, M., Tentrup, L. & Walker, A., 9 Apr 2016, In : International journal on software tools for technology transfer. p. 1-24 24 p.

Research output: Contribution to journalArticleResearchpeer-review

Specifications
Controllers