JahrAutor/Titel/QuelleDokumentart
2017Baumann, R.; Protsenko, M.; Müller, T.:
Anti-ProGuard: Towards automated deobfuscation of android apps
(Workshop on Security in Highly Connected IT Systems (SHCIS) <4, 2017, Neuchâtel>)
In: Association for Computing Machinery -ACM-: 4th Workshop on Security in Highly Connected IT Systems, SHCIS 2017. Proceedings: Neuchâtel, Switzerland, June 19 - 22, 2017. New York: ACM, 2017, pp. 7-12
Konferenzbeitrag
2017Zankl, A.; Heyszl, J.; Sigl, G.:
Automated detection of instruction cache leaks in modular exponentiation software
(International Conference on Smart Card Research and Advanced Applications (CARDIS) <15, 2016, Cannes>)
In: Lemke-Rust, Kerstin: Smart card research and advanced applications. 15th International Conference, CARDIS 2016: Cannes, France, November 7-9, 2016; Revised selected papers. Cham: Springer International Publishing, 2017. (Lecture Notes in Computer Science 10146), pp. 228-244
Konferenzbeitrag
2017Koppermann, P.; Santis, F. de; Heyszl, J.; Sigl, G.:
Automatic generation of high-performance modular multipliers for arbitrary mersenne primes on FPGAs
(International Symposium on Hardware-Oriented Security and Trust (HOST) <10, 2017, McLean/Va.>)
In: Institute of Electrical and Electronics Engineers -IEEE-: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2017. Proceedings: 1-5 May 2017, The Ritz-Carlton, McLean, VA, USA. Piscataway, NJ: IEEE, 2017, pp. 35-40
Konferenzbeitrag
2017Schütte, Julian; Fridgen, Gilbert; Prinz, Wolfgang; Rose, Thomas; Urbach, Nils; Hoeren, Thomas; Guggenberger, Nikolas; Welzel, Christian; Holly, Steffen; Schulte, Axel; Sprenger, Philipp; Schwede, Christian; Weimert, Birgit; Otto, Boris; Dalheimer, Mathias; Wenzel, Markus; Kreutzer, Michael; Fritz, Michael; Leiner, Ulrich; Nouak, Alexander; Prinz, Wolfgang (ed.); Schulte, Axel T. (ed.) :
Blockchain und Smart Contracts: Technologien, Forschungsfragen und Anwendungen
München: Fraunhofer-Gesellschaft, 2017
Bericht
Volltext
2017Sepulveda, J.; Zankl, A.; Mischke, O.:
Cache attacks and countermeasures for NTRUEncrypt on MPSoCs: Post-quantum resistance for the IoT
(International System on Chip Conference (SOCC) <30, 2017, Munich>)
In: Alioto, M.: 30th IEEE International System on Chip Conference, SOCC 2017. Proceedings: September 05-08, 2017, Munich, Germany. Piscataway, NJ: IEEE, 2017, pp. 120-125
Konferenzbeitrag
2017Santis, F. de; Schauer, A.; Sigl, G.:
ChaCha20-Poly1305 authenticated encryption for high-speed embedded IoT applications
(Design, Automation & Test in Europe Conference & Exhibition (DATE) <20, 2017, Lausanne>)
In: European Design Automation Association -EDAA-: Design, Automation & Test in Europe, DATE 2017. Proceedings: 27-31 March 2017, Swisstech, Lausanne, Switzerland. Piscataway, NJ: IEEE, 2017, pp. 692-697
Konferenzbeitrag
2017Rakotondravony, N.; Taubmann, B.; Mandarawi, W.; Weishäupl, E.; Xu, P.; Kolosnjaji, B.; Protsenko, M.; Meer, H. de; Reiser, H.P.:
Classifying malware attacks in IaaS cloud environments
In: Journal of Cloud Computing, Vol.6 (2017), Art. 26, 12 pp.
Zeitschriftenaufsatz
2017Busch, M.; Protsenko, M.; Müller, T.:
A cloud-based compilation and hardening platform for android apps
(International Conference on Availability, Reliability and Security (ARES) <12, 2017, Reggio Calabria>)
In: Association for Computing Machinery -ACM-: 12th International Conference on Availability, Reliability and Security, ARES 2017. Proceedings: August 29 - September 1, 2017, Università degli Studi Mediterranea di Reggio Calabria, Italy. New York: ACM, 2017, Art. 37
Konferenzbeitrag
2017Settanni, G.; Skopik, F.; Shovgenya, Y.; Fiedler, R.; Carolan, M.; Conroy, D.; Boettinger, K.; Gall, M.; Brost, G.; Ponchel, C.; Haustein, M.; Kaufmann, H.; Theuerkauf, K.; Olli, P.:
A collaborative cyber incident management system for European interconnected critical infrastructures
In: Journal of information security and applications, Vol.34 (2017), Pt.2, pp.166-182
Zeitschriftenaufsatz
2017Kirsch, J.; Jonischkeit, C.; Kittel, T.; Zarras, A.; Eckert, C.:
Combating control flow linearization
(International Conference on ICT Systems Security and Privacy Protection (SEC) <32, 2017, Rome>)
In: De Capitani di Vimercati, Sabrina: ICT systems security and privacy protection. 32nd IFIP TC 11 International Conference, SEC 2017: Rome, Italy, May 29-31, 2017; Proceedings. Cham: Springer International Publishing, 2017. (IFIP advances in information and communication technology 502), pp. 385-398
Konferenzbeitrag
2017Jacob, N.; Rolfes, C.; Zankl, A.; Heyszl, J.; Sigl, G.:
Compromising FPGA SoCs using malicious hardware blocks
(Design, Automation & Test in Europe Conference & Exhibition (DATE) <20, 2017, Lausanne>)
In: European Design Automation Association -EDAA-: Design, Automation & Test in Europe, DATE 2017. Proceedings: 27-31 March 2017, Swisstech, Lausanne, Switzerland. Piscataway, NJ: IEEE, 2017, pp. 1122-1127
Konferenzbeitrag
2017Stephanow, P.; Moein, M.; Banse, C.:
Continuous location validation of cloud service components
(International Conference on Cloud Computing Technology and Science (CloudCom) <9, 2017, Hong Kong>)
In: Institute of Electrical and Electronics Engineers -IEEE-: CloudCom 2017, IEEE 9th International Conference on Cloud Computing Technology and Science. Proceedings: 11-14 December 2017, Hong Kong, Hong Kong. Piscataway, NJ: IEEE, 2017, pp. 255-262
Konferenzbeitrag
2017Eckert, C.:
Cybersicherheit beyond 2020!: Herausforderungen für die IT-Sicherheitsforschung
In: Informatik-Spektrum, Vol.40 (2017), No.2, pp.141-146
Zeitschriftenaufsatz
2017Unterstein, F.; Heyszl, J.; Santis, F. de; Specht, R.:
Dissecting leakage resilient PRFs with multivariate localized EM attacks: A practical security evaluation on FPGA
(International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE) <8, 2017, Paris>)
In: Guilley, S.: Constructive side-channel analysis and secure design. 8th International Workshop, COSADE 2017: Paris, France, April 13-14, 2017; Revised selected papers. Cham: Springer International Publishing, 2017. (Lecture Notes in Computer Science 10348), pp. 34-49
Konferenzbeitrag
2017Kirsch, J.; Bierbaumer, B.; Kittel, T.; Eckert, C.:
Dynamic loader oriented programming on Linux
(Reversing and Offensive-Oriented Trends Symposium (ROOTS) <1, 2017, Vienna>)
In: Association for Computing Machinery -ACM-: 1st Reversing and Offensive-oriented Trends Symposium, ROOTS 2017. Proceedings: Vienna, Austria, November 16 - 17, 2017. New York: ACM, 2017, Art. 5
Konferenzbeitrag
2017Sepulveda, J.; Flórez, D.; Immler, V.; Gogniat, G.; Sigl, G.:
Efficient security zones implementation through hierarchical group key management at NoC-based MPSoCs
In: Microprocessors and microsystems, Vol.50 (2017), pp.164-174
Zeitschriftenaufsatz
2017Kolosnjaji, B.; Eraisha, G.; Webster, G.; Zarras, A.; Eckert, C.:
Empowering convolutional networks for malware classification and analysis
(International Joint Conference on Neural Networks (IJCNN) <2017, Anchorage>)
In: Institute of Electrical and Electronics Engineers -IEEE-: International Joint Conference on Neural Networks, IJCNN 2017: Anchorage, Alaska, USA 14-19 May 2017. Red Hook, NY: Curran, 2017, pp. 3838-3845
Konferenzbeitrag
2017Stephanow, P.; Banse, C.:
Evaluating the performance of continuous test-based cloud service certification
(International Symposium on Cluster, Cloud and Grid Computing (CCGRID) <17, 2017, Madrid>)
In: Institute of Electrical and Electronics Engineers -IEEE-: 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGRID 2017. Proceedings: 14-17 May 2017, Madrid, Spain. Los Alamitos, Calif.: IEEE Computer Society Conference Publishing Services (CPS), 2017, pp. 1117-1126
Konferenzbeitrag
2017Sepulveda, J.; Gross, M.; Zankl, A.; Sigl, G.:
Exploiting bus communication to improve cache attacks on systems-on-chips
(IEEE Computer Society Annual Symposium on VLSI (ISVLSI) <16, 2017, Bochum>)
In: Hübner, M.: IEEE Computer Society Annual Symposium on VLSI , ISVLSI 2017. Proceedings: 3-5 July 2017, Bochum, North Rhine-Westfalia, Germany. Los Alamitos, Calif.: IEEE Computer Society Conference Publishing Services (CPS), 2017, pp. 284-289
Konferenzbeitrag
2017Hesselbarth, R.; Heyszl, J.; Sigl, G.:
Fast and reliable PUF response evaluation from unsettled bistable rings
In: Microprocessors and microsystems, Vol.52 (2017), pp.325-332
Zeitschriftenaufsatz
2017Huber, M.; Horsch, J.; Ali, J.; Wessel, S.:
Freeze & crypt: Linux kernel support for main memory encryption
(International Joint Conference on e-Business and Telecommunications (ICETE) <14, 2017, Madrid>)
In: Samarati, P.: ICETE 2017, 14th International Joint Conference on e-Business and Telecommunications. Proceedings. Vol.4: SECRYPT: Madrid, Spain, July 24-26, 2017. SciTePress, 2017, pp. 17-30
Konferenzbeitrag
2017Obermaier, J.; Specht, R.; Sigl, G.:
Fuzzy-glitch: A practical ring oscillator based clock glitch attack
(International Conference on Applied Electronics (AE) <22, 2017, Pilsen>)
In: Pinker, J.: 22nd International Conference on Applied Electronics, AE 2017: Pilsen, 5-6 September 2017. Piscataway, NJ: IEEE, 2017, pp. 137-142
Konferenzbeitrag
2017Böttinger, K.:
Guiding a colony of black-box fuzzers with chemotaxis
(Security and Privacy Workshops (SPW) <2017, San Jose/Calif.>)
In: Gondree, M.: SPW 2017, IEEE Symposium on Security and Privacy Workshops. Proceedings: 25 May 2017, San Jose, California, USA. Piscataway, NJ: IEEE, 2017, pp. 11-16
Konferenzbeitrag
2017Anding, M.; Boes, A.; Eckert, C.; Harhoff, D.; Hess, T.; Münch, U.; Pretschner, A.:
Herausforderungen an der Schnittstelle von Informatik und Gesellschaft: Institutionalisierte Erforschung der Digitalisierung zur Sicherung von Wohlstand und Fortschritt
In: Informatik-Spektrum, Vol.40 (2017), No.2, pp.172-175
Zeitschriftenaufsatz
2017Hiller, M.; Önalan, A.G.:
Hiding secrecy leakage in leaky helper data
(International Conference on Cryptographic Hardware and Embedded Systems (CHES) <19, 2017, Taipei>)
In: Fischer, Wieland: Cryptographic hardware and embedded systems - CHES 2017: 19th International Conference, Taipei, Taiwan, September 25-28, 2017; Proceedings. Cham: Springer International Publishing, 2017. (Lecture Notes in Computer Science 10529), pp. 601-619
Konferenzbeitrag
2017Jacob, N.; Heyszl, J.; Zankl, A.; Rolfes, C.; Sigl, G.:
How to break secure boot on FPGA SoCs through malicious hardware
(International Conference on Cryptographic Hardware and Embedded Systems (CHES) <19, 2017, Taipei>)
In: Fischer, Wieland: Cryptographic hardware and embedded systems - CHES 2017: 19th International Conference, Taipei, Taiwan, September 25-28, 2017; Proceedings. Cham: Springer International Publishing, 2017. (Lecture Notes in Computer Science 10529), pp. 425-442
Konferenzbeitrag
2017Koppermann, P.; Santis, F. de; Heyszl, J.; Sigl, G.:
Low-latency X25519 hardware implementation: Breaking the 100 microseconds barrier
In: Microprocessors and microsystems, Vol.52 (2017), No.C, pp.491-497
Zeitschriftenaufsatz
2017Titze, D.; Lux, M.; Schuette, J.:
Ordol: Obfuscation-resilient detection of libraries in android applications
(International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) <16, 2017, Sydney>)
In: Institute of Electrical and Electronics Engineers -IEEE-: 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017: 1-4 August 2017, Sydney, Australia : proceedings. Piscataway, NJ: IEEE, 2017, pp. 618-625
Konferenzbeitrag
2017Hansch, G.; Schneider, P.; Plaga, S.:
Packet-wise compression and forwarding of industrial network captures
(International Conference on Intelligent Data Acquisition and Advanced Computing Systems - Technology and Applications (IDAACS) <9, 2017, Bucharest>)
In: Institute of Electrical and Electronics Engineers -IEEE-: IEEE 9th International Conference on Intelligent Data Aquisition and Advanced Computing Systems: Technology and Applications, IDAACS 2017. Proceedings. Vol.1: The crossing point of intelligent data aquisition & advanced computing systems and east & west scientists, September 21-23, 2017, Bucharest, Romania. Piscataway, NJ: IEEE, 2017, pp. 66-70
Konferenzbeitrag
2017Gulmezoglu, B.; Zankl, A.; Eisenbarth, T.; Sunar, B.:
PerfWeb: How to violate web privacy with hardware performance events
(European Symposium on Research in Computer Security (ESORICS) <22, 2017, Oslo>)
In: Foley, S.N.: Computer security - ESORICS 2017. 22nd European Symposium on Research in Computer Security. Pt.2: Oslo, Norway, September 11-15, 2017; Proceedings. Cham: Springer International Publishing, 2017. (Lecture Notes in Computer Science 10493), pp. 80-97
Konferenzbeitrag
2017Kunz, I.; Stephanow, P.:
A process model to support continuous certification of cloud services
(International Conference on Advanced Information Networking and Applications (AINA) <31, 2017, Taipei>)
In: Barolli, L.: AINA 2017, 31st IEEE International Conference on Advanced Information Networking and Applications. Proceedings: 27-29 March 2017, Tamkang University, Taipei, Taiwan. Piscataway, NJ: IEEE, 2017, pp. 986-993
Konferenzbeitrag
2017Otto, Boris; Lohmann, Steffen; Auer, Sören; Brost, Gerd; Cirullies, Jan; Eitel, Andreas; Ernst, Thilo; Haas, Christian; Huber, Manuel; Jung, Christian; Jürjens, Jan; Lange, Christoph; Mader, Christian; Menz, Nadja; Nagel, Ralf; Pettenpohl, Heinrich; Pullmann, Jaroslav; Quix, Christoph; Schon, Jochen; Schulz, Daniel; Schütte, Julian; Spiekermann, Markus; Wenzel, Sven:
Reference Architecture Model for the Industrial Data Space
München: Fraunhofer-Gesellschaft, 2017
Bericht
Volltext
2017Gurschler, Tamara; Großmann, Jürgen; Kotarski, David; Teichmann, Clemens; Thim, Christof; Eichler, Jörn; Göllner, Johannes; Gronau, Norbert; Lechner, Ulrike:
Risikobeurteilung in der IT-Sicherheit Kritischer Infrastrukturen - Eine Analyse der Risikobeurteilung im Förderschwerpunkt ITS|KRITIS
(Deutscher IT-Sicherheitskongress <15, 2017, Bonn>)
In: Bundesamt für Sicherheit in der Informationstechnik -BSI-, Bonn: Digitale Gesellschaft zwischen Risikobereitschaft und Sicherheitsbedürfnis: Tagungsband des 15. Deutschen IT-Sicherheitskongress 2017, Bonn; 16.-18.05.2017. Gau-Algesheim: SecuMedia Verlag, 2017, pp. 395-410
Konferenzbeitrag
2017Jacob, N.; Wittmann, J.; Heyszl, J.; Hesselbarth, R.; Wilde, F.; Pehl, M.; Sigl, G.; Fischer, K.:
Securing FPGA SoC configurations independent of their manufacturers
(International System on Chip Conference (SOCC) <30, 2017, Munich>)
In: Alioto, M.: 30th IEEE International System on Chip Conference, SOCC 2017. Proceedings: September 05-08, 2017, Munich, Germany. Piscataway, NJ: IEEE, 2017, pp. 114-119
Konferenzbeitrag
2017Zankl, A.; Seuschek, H.; Irazoqui, G.; Gulmezoglu, B.:
Side-Channel Attacks in the Internet of Things: Threats and Challenges
In: Druml, Norbert (Ed.): Solutions for Cyber-Physical Systems Ubiquity. Hershey/Pa.: Engineering Science Reference, 2017, pp. 325-357
Aufsatz in Buch
2017Santis, F. de; Bauer, T.; Sigl, G.:
Squeezing polynomial masking in tower fields. A higher-order masked AES S-box
(International Conference on Smart Card Research and Advanced Applications (CARDIS) <15, 2016, Cannes>)
In: Lemke-Rust, Kerstin: Smart card research and advanced applications. 15th International Conference, CARDIS 2016: Cannes, France, November 7-9, 2016; Revised selected papers. Cham: Springer International Publishing, 2017. (Lecture Notes in Computer Science 10146), pp. 192-208
Konferenzbeitrag
2017Fischer, F.; Böttinger, K.; Xiao, H.; Stransky, C.; Acar, Y.; Backes, M.; Fahl, S.:
Stack overflow considered harmful? The impact of copy&paste on Android application security
(Symposium on Security and Privacy (SP) <38, 2017, San Jose/Calif.>)
In: Institute of Electrical and Electronics Engineers -IEEE-: IEEE Symposium on Security and Privacy, SP 2017. Vol.1: 22-24 May 2017, San Jose, California, USA; Proceedings. Piscataway, NJ: IEEE, 2017, pp. 121-136
Konferenzbeitrag
2017Angermeier, D.; Nieding, A.; Eichler, J.:
Supporting Risk Assessment with the Systematic Identification, Merging, and Validation of Security Goals
(International Workshop on Risk Assessment and Risk-Driven Testing (RISK) <4, 2016, Graz>)
In: Großmann, Jürgen (Ed.) et al.: Risk Assessment and Risk-Driven Quality Assurance. 4th International Workshop, RISK 2016: Held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016, Revised Selected Papers. Cham: Springer International Publishing, 2017. (Lecture Notes in Computer Science 10224), pp. 82-95
Konferenzbeitrag
2017Ahadipour, A.; Schanzenbach, M.:
A survey on authorization in distributed systems: Information storage, data retrieval and trust evaluation
(International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) <16, 2017, Sydney>)
In: Institute of Electrical and Electronics Engineers -IEEE-: 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017: 1-4 August 2017, Sydney, Australia : proceedings. Piscataway, NJ: IEEE, 2017, pp. 1016-1023
Konferenzbeitrag
2017Immler, V.; Hiller, M.; Obermaier, J.; Sigl, G.:
Take a moment and have some t: Hypothesis testing on raw PUF data
(International Symposium on Hardware-Oriented Security and Trust (HOST) <10, 2017, McLean/Va.>)
In: Institute of Electrical and Electronics Engineers -IEEE-: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2017. Proceedings: 1-5 May 2017, The Ritz-Carlton, McLean, VA, USA. Piscataway, NJ: IEEE, 2017, pp. 128-129
Konferenzbeitrag
2017Banse, C.; Schuette, J.:
A taxonomy-based approach for security in software-defined networking
(International Conference on Communications (ICC) <2017, Paris>)
In: Beylat, J.-L.: IEEE International Conference on Communications, ICC 2017: 21-25 May 2017 in Paris, France. Piscataway, NJ: IEEE, 2017, 6 pp.
Konferenzbeitrag
2017Stephanow, P.; Khajehmoogahi, K.:
Towards continuous security certification of Software-as-a-Service applications using web application testing techniques
(International Conference on Advanced Information Networking and Applications (AINA) <31, 2017, Taipei>)
In: Barolli, L.: AINA 2017, 31st IEEE International Conference on Advanced Information Networking and Applications. Proceedings: 27-29 March 2017, Tamkang University, Taipei, Taiwan. Piscataway, NJ: IEEE, 2017, pp. 931-938
Konferenzbeitrag
2017Guillen, O.M.; Pöppelmann, T.; Bermudo Mera, J.M.; Bongenaar, E.F.; Sigl, G.; Sepulveda, J.:
Towards post-quantum security for IoT endpoints with NTRU
(Design, Automation & Test in Europe Conference & Exhibition (DATE) <20, 2017, Lausanne>)
In: European Design Automation Association -EDAA-: Design, Automation & Test in Europe, DATE 2017. Proceedings: 27-31 March 2017, Swisstech, Lausanne, Switzerland. Piscataway, NJ: IEEE, 2017, pp. 698-703
Konferenzbeitrag
2017Sepulveda, J.; Zankl, A.; Florez, D.; Sigl, G.:
Towards protected MPSoC communication for information protection against a Malicious NoC
(International Conference on Computational Science (ICCS) <2017, Zurich>)
In: Procedia computer science, Vol.108 (2017), pp.1103-1112
Zeitschriftenaufsatz
Volltext
2017Guillen, O.M.; Santis, F. de; Brederlow, R.; Sigl, G.:
Towards side-channel secure firmware updates: A minimalist anomaly detection approach
(International Symposium on Foundations and Practice of Security (FPS) <9, 2016, Québec>)
In: Cuppens, F.: Foundations and practice of security. 9th international symposium, FPS 2016: Québec City, QC, Canada, October 24-25, 2016, revised selected papers. Cham: Springer International Publishing, 2017. (Lecture Notes in Computer Science 10128), pp. 345-360
Konferenzbeitrag
2017Sepulveda, J.; Gross, M.; Zankl, A.; Sigl, G.:
Towards trace-driven cache attacks on Systems-on-Chips - exploiting bus communication
(International Symposium on Reconfigurable Communication-Centric Systems-on-Chip (ReCoSoC) <12, 2017, Madrid>)
In: Institute of Electrical and Electronics Engineers -IEEE-: 12th International Symposium on Reconfigurable Communication-centric Systems-on-Chip, ReCoSoC 2017. Proceedings: July 12-14, 2017, Madrid, Spain. Piscataway, NJ: IEEE, 2017, pp. 124-130
Konferenzbeitrag
2017Horsch, J.; Huber, M.; Wessel, S.:
TransCrypt: Transparent main memory encryption using a minimal ARM hypervisor
(International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) <16, 2017, Sydney>)
In: Institute of Electrical and Electronics Engineers -IEEE-: 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017: 1-4 August 2017, Sydney, Australia : proceedings. Piscataway, NJ: IEEE, 2017, pp. 152-161
Konferenzbeitrag
2017Immler, V.; Hiller, M.; Liu, Q.; Lenz, A.; Wachter-Zeh, A.:
Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs
(International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE) <7, 2017, India>)
In: Ali, S.S.: Security, Privacy, and Applied Cryptography Engineering: 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017. Proceedings. Cham: Springer International Publishing, 2017. (Lecture Notes in Computer Science 10662), pp. 190-209
Konferenzbeitrag
2017Immler, V.; Specht, R.; Unterstein, F.:
Your rails cannot hide from localized EM: How dual-rail logic fails on FPGAs
(International Conference on Cryptographic Hardware and Embedded Systems (CHES) <19, 2017, Taipei>)
In: Fischer, Wieland: Cryptographic hardware and embedded systems - CHES 2017: 19th International Conference, Taipei, Taiwan, September 25-28, 2017; Proceedings. Cham: Springer International Publishing, 2017. (Lecture Notes in Computer Science 10529), pp. 403-424
Konferenzbeitrag
2016Langer, L.; Smith, P.; Hutle, M.; Schaeffer-Filho, A.:
Analysing cyber-physical attacks to a Smart Grid: A voltage control use case
(Power Systems Computation Conference (PSCC) <19, 2016, Genova>)
In: Institute of Electrical and Electronics Engineers -IEEE-: 19th Power Systems Computation Conference, PSCC 2016 Genova. Proceedings: June 20-24, 2016, Centro congressi Porto Antico, Magazzini del Cotone Conference Centre, Genova, Italy. Piscataway, NJ: IEEE, 2016, 7 pp.
Konferenzbeitrag
2016Obermaier, J.; Hutle, M.:
Analyzing the security and privacy of cloud-based video surveillance systems
(International Workshop on IoT Privacy, Trust, and Security (IoTPTS) <2, 2016, Xi'an>)
In: Association for Computing Machinery -ACM-: IoTPTS 2016, 2nd ACM International Workshop on IoT Privacy, Trust, and Security. Proceedings: Xi'an, China, May 30, 2016. New York: ACM, 2016, pp. 22-28
Konferenzbeitrag
2016Hesselbarth, Robert:
Apparatus and method for observing a ring of interconnected inverting circuit elements
2016
Patent
Volltext
2016Tempelmeier, M.; Santis, F. de; Kaps, J.-P.; Sigl, G.:
An area-optimized serial implementation of ICEPOLE authenticated encryption schemes
(International Symposium on Hardware-Oriented Security and Trust (HOST) <2016, McLean/Va.>)
In: Institute of Electrical and Electronics Engineers -IEEE-: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2016. Proceedings: 3-5 May 2016, The Ritz-Carlton, McLean, VA, USA. Piscataway, NJ: IEEE, 2016, pp. 49-54
Konferenzbeitrag
2016Selmke, B.; Heyszl, J.; Sigl, G.:
Attack on a DFA protected AES by simultaneous laser fault injections
(Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) <13, 2016, Santa Barbara/Calif.>)
In: Maurine, P.: Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2016. Proceedings: 16 August 2016, Santa Barbara, California, USA. Los Alamitos, Calif.: IEEE Computer Society Conference Publishing Services (CPS), 2016, pp. 36-46
Konferenzbeitrag
2016Seuschek, H.; Heyszl, J.; Santis, F. de:
A cautionary note: Side-channel leakage implications of deterministic signature schemes
(Workshop on Cryptography and Security in Computing Systems (CS2) <3, 2016, Prague>)
In: Association for Computing Machinery -ACM-: CS2 2016, Third Workshop on Cryptography and Security in Computing Systems : Prague, Czech Republic, January 20, 2016. New York: ACM, 2016, pp. 7-12
Konferenzbeitrag
2016Böttinger, K.:
Chemotactic test case recombination for large-scale fuzzing
In: Journal of Cyber Security and Mobility, Vol.5 (2016), No.4, pp.269-286
Zeitschriftenaufsatz
2016Horsch, J.; Wessel, S.; Eckert, C.:
CoKey: Fast token-based cooperative cryptography
(Annual Conference on Computer Security Applications (ACSAC) <32, 2016, Los Angeles/Calif.>)
In: Association for Computing Machinery -ACM-: 32nd Annual Conference on Computer Security Applications, ACSAC 2016. Proceedings: Los Angeles, California, December 05 - 08, 2016. New York: ACM, 2016, pp. 314-323
Konferenzbeitrag
2016Bilzhause, A.; Huber, M.; Pöhls, H.C.; Samelin, K.:
Cryptographically enforced four-eyes principle
(International Conference on Availability, Reliability and Security (ARES) <11, 2016, Salzburg>)
In: Institute of Electrical and Electronics Engineers -IEEE-: 11th International Conference on Availability, Reliability and Security, ARES 2016: Salzburg, Austria, 31 August - 2 September 2016; Proceedings. Los Alamitos, Calif.: IEEE Computer Society Conference Publishing Services (CPS), 2016, pp. 760-767
Konferenzbeitrag
2016Schütte, J.; Brost, G.S.:
A data usage control system using dynamic taint tracking
(International Conference on Advanced Information Networking and Applications (AINA) <30, 2016, Crans-Montana>)
In: Barolli, L.: IEEE 30th International Conference on Advanced Information Networking and Applications, AINA 2016. Proceedings: 23-25 March 2016, Crans-Montana, Switzerland. Los Alamitos, Calif.: IEEE Computer Society Conference Publishing Services (CPS), 2016, pp. 909-916
Konferenzbeitrag
2016Böttinger, K.; Eckert, C.:
DeepFuzz: Triggering vulnerabilities deeply hidden in binaries
(Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) <13, 2016, San Sebastián>)
In: Caballero, J.: Detection of intrusions and malware, and vulnerability assessment. 13th International Conference, DIMVA 2016: San Sebastián, Spain, July 7-8, 2016; Proceedings. Cham: Springer International Publishing, 2016. (Lecture Notes in Computer Science 9721), pp. 25-34
Konferenzbeitrag
2016Böttinger, K.; Hansch, G.; Filipovic, B.:
Detecting and correlating supranational threats for critical infrastructures
(European Conference on Cyber Warfare and Security (ECCWS) <15, 2016, Munich>)
In: Koch, R.: 15th European Conference on Cyber Warfare and Security, ECCWS 2016. Proceedings: Hosted by Universitat der Bundeswehr Munich, Germany 7-8 July 2016. Reading, UK: Academic Conferences and Publishing International Limited, 2016, pp. 34-41
Konferenzbeitrag
2016Nyberg, R.; Heyszl, J.; Heinz, D.; Sigl, G.:
Enhancing fault emulation of transient faults by separating combinational and sequential fault propagation
(Great Lakes Symposium on VLSI (GLSVLSI) <26, 2016, Boston/Mass.>)
In: Association for Computing Machinery -ACM-: 26th ACM Great Lakes Symposium on VLSI, GLSVLSI 2016. Proceedings: May 18-20, 2016, Boston, Massachusetts, USA. New York: ACM, 2016, pp. 209-214
Konferenzbeitrag
2016Hesselbarth, R.; Sigl, G.:
Fast and reliable PUF response evaluation from unsettled bistable rings
(Conference in Digital System Design (DSD) <19, 2016, Limassol>)
In: Kitsos, P.: DSD 2016, 19th Euromicro Conference in Digital System Design. Proceedings: 31 August-2 September 2016, Limassol, Cyprus. Piscataway, NJ: IEEE, 2016, pp. 82-90
Konferenzbeitrag
2016Huber, M.; Taubmann, B.; Wessel, S.; Reiser, H.P.; Sigl, G.:
A flexible framework for mobile device forensics based on cold boot attacks
In: EURASIP journal on information security, Vol.2016 (2016), Art. 17, 13 pp.
Zeitschriftenaufsatz
Volltext
2016Böttinger, K.:
Fuzzing binaries with Lévy flight swarms
In: EURASIP journal on information security, (2016), No.1, Art. 28, 10 pp.
Zeitschriftenaufsatz
2016Stephanow, P.; Banse, C.; Schütte, J.:
Generating threat profiles for cloud service certification systems
(International Symposium on High Assurance Systems Engineering (HASE) <17, 2016, Orlando/Fla.>)
In: Babiceanu, R.: IEEE 17th International Symposium on High Assurance Systems Engineering, HASE 2016. Proceedings: 7-9 January 2016, Orlando, Florida, USA. Los Alamitos, Calif.: IEEE Computer Society Conference Publishing Services (CPS), 2016, pp. 260-267
Konferenzbeitrag
2016Heyszl, J.:
Herausforderungen für Informationssicherheit in eingebetteten Systemen bei Angreifern mit Hardware-Zugriff
In: PTB-Mitteilungen, Vol.126 (2016), No.4, pp.25-32
Zeitschriftenaufsatz
2016Sepulveda, J.; Flórez, D.; Immler, V.; Gogniat, G.; Sigl, G.:
Hierarchical group-key management for NoC-based MPSoCs protection
In: Journal of Integrated Circuits and Systems, Vol.11 (2016), No.1, pp.38-48
Zeitschriftenaufsatz
2016Böttinger, K.:
Hunting bugs with Lévy flight foraging
(Symposium on Security and Privacy (SP) <37, 2016, San Jose/Calif.>)
In: Locasto, M.: IEEE Symposium on Security and Privacy Workshops, SPW 2016: 23-25 May 2016, San Jose, California, USA; Proceedings. Piscataway, NJ: IEEE, 2016, pp. 111-117
Konferenzbeitrag
2016Kilic, F.; Laner, H.; Eckert, C.:
Interactive function identification decreasing the effort of reverse engineering
(International Conference on Information Security and Cryptology (Inscrypt) <11, 2015, Beijing>)
In: Lin, D.: Information security and cryptology. 11th international conference, Inscrypt 2015: Beijing, China, November 1-3, 2015; Revised selected papers. Cham: Springer International Publishing, 2016. (Lecture Notes in Computer Science 9589), pp. 468-487
Konferenzbeitrag
2016Gall, M.; Brost, G.:
K-word proximity search on encrypted data
(International Conference on Advanced Information Networking and Applications (AINA) <30, 2016, Crans-Montana>)
In: Barolli, L.: IEEE 30th International Conference on Advanced Information Networking and Applications, AINA 2016. Proceedings: 23-25 March 2016, Crans-Montana, Switzerland. Los Alamitos, Calif.: IEEE Computer Society Conference Publishing Services (CPS), 2016, pp. 365-372
Konferenzbeitrag
2016Plaga, S.; Tatschner, S.; Newe, T.:
Logboat - a simulation framework enabling CAN security assessments
(International Conference on Applied Electronics (AE) <21, 2016, Pilsen>)
In: Pinker, J.: 21st International Conference on Applied Electronics, AE 2016: Pilsen, 6-7 September 2016. Piscataway, NJ: IEEE, 2016, pp. 215-218
Konferenzbeitrag
2016Schanzenbach, M.; Banse, C.:
Managing and presenting user attributes over a decentralized secure name system
(International Workshop on Data Privacy Management (DPM) <11, 2016, Heraklion>)
In: Livraga, G.: Data privacy management and security assurance. 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016: Heraklion, Crete, Greece, September 26-27, 2016; Proceedings; held in conjunction with ESORICS 2016. Cham: Springer International Publishing, 2016. (Lecture Notes in Computer Science 9963), pp. 213-220
Konferenzbeitrag
2016Teichmann, C.; Renatus, S.; Nieding, A.:
Modellgestützte Risikoanalyse der Sicherheit Kritischer Infrastrukturen für kleine und mittlere Unternehmen: Eine Übersicht
(Multikonferenz Wirtschaftsinformatik (MKWI) <2016, Ilmenau>)
In: Nissen, Volker: Multikonferenz Wirtschaftsinformatik, MKWI 2016. Bd.2: Technische Universität Ilmenau, 09. - 11. März 2016. Ilmenau: Univ.-Verl. Ilmenau, 2016, pp. 1093-1104
Konferenzbeitrag
2016Strobel, M.; Wiedermann, N.; Eckert, C.:
Novel weaknesses in IEC 62351 protected Smart Grid control systems
(International Conference on Smart Grid Communications (SmartGridComm) <7, 2016, Sydney>)
In: Maltabarow, G.: IEEE International Conference on Smart Grid Communications, SmartGridComm 2016: Took place 6-9 November 2016 in Sydney, Australia. Piscataway, NJ: IEEE, 2016, pp. 266-270
Konferenzbeitrag
2016Hiller, M.; Önalan, A.G.; Sigl, G.; Bossert, M.:
Online reliability testing for PUF key derivation
(International Workshop on Trustworthy Embedded Devices (TrustED) <6, 2016, Vienna>)
In: Payer, M.: TrustED 2016, 6th International Workshop on Trustworthy Embedded Devices. Proceedings: Vienna, Austria, October 28, 2016. New York: ACM, 2016, pp. 15-22
Konferenzbeitrag
2016Wagner, S.; Eckert, C.:
Policy-based implicit attestation for microkernel-based virtualized systems
(International Conference on Information Security (ISC) <19, 2016, Honolulu/Hawaii>)
In: Bishop, M.: Information security. 19th international conference, ISC 2016: Honolulu, HI, USA, September 3-6, 2016; Proceedings. Cham: Springer International Publishing, 2016. (Lecture Notes in Computer Science 9866), pp. 305-322
Konferenzbeitrag
2016Immler, V.; Hennig, M.; Kürzinger, L.; Sigl, G.:
Practical aspects of quantization and tamper-sensitivity for physically obfuscated keys
(Workshop on Cryptography and Security in Computing Systems (CS2) <3, 2016, Prague>)
In: Association for Computing Machinery -ACM-: CS2 2016, Third Workshop on Cryptography and Security in Computing Systems: Prague, Czech Republic, January 20, 2016. New York: ACM, 2016, pp. 13-18
Konferenzbeitrag
2016Selmke, B.; Brummer, S.; Heyszl, J.; Sigl, G.:
Precise laser fault injections into 90 nm and 45 nm SRAM-cells
(International Conference on Smart Card Research and Advanced Application (CARDIS) <14, 2015, Bochum>)
In: Homma, N.: Smart card research and advanced applications. 14th international conference, CARDIS 2015: Bochum, Germany, November 4-6, 2015; Revised selected papers. Cham: Springer International Publishing, 2016. (Lecture Notes in Computer Science 9514), pp. 193-205
Konferenzbeitrag
2016Huber, M.; Horsch, J.; Velten, M.; Weiss, M.; Wessel, S.:
A secure architecture for operating system-level virtualization on mobile devices
(International Conference on Information Security and Cryptology (Inscrypt) <11, 2015, Beijing>)
In: Lin, D.: Information security and cryptology. 11th international conference, Inscrypt 2015: Beijing, China, November 1-3, 2015; Revised selected papers. Cham: Springer International Publishing, 2016. (Lecture Notes in Computer Science 9589), pp. 430-450
Konferenzbeitrag
2016Fernandes, R.; Marcon, C.; Cataldo, R.; Silveira, J.; Sigl, G.; Sepulveda, J.:
A security aware routing approach for NoC-based MPSoCs
(Symposium on Integrated Circuits and Systems Design (SBCCI) <29, 2016, Belo Horizonte>)
In: Institute of Electrical and Electronics Engineers -IEEE-: SBCCI 2016, 29th Symposium on Integrated Circuits and Systems Design: CHIP on the Mountains; Belo Horizonte, Minas Gerais, Brazil, August 29 to September 3, 2016; Proceedings. Piscataway, NJ: IEEE, 2016, pp. 103-108
Konferenzbeitrag
2016Proskurin, S.; Weiß, M.; Sigl, G.:
seTPM: Towards flexible trusted computing on mobile devices based on GlobalPlatform secure elements
(International Conference on Smart Card Research and Advanced Application (CARDIS) <14, 2015, Bochum>)
In: Homma, N.: Smart card research and advanced applications. 14th international conference, CARDIS 2015: Bochum, Germany, November 4-6, 2015; Revised selected papers. Cham: Springer International Publishing, 2016. (Lecture Notes in Computer Science 9514), pp. 57-74
Konferenzbeitrag
2016Stephanow, P.; Srivastava, G.; Schütte, J.:
Test-based cloud service certification of opportunistic providers
(International Conference on Cloud Computing (CLOUD) <9, 2016, San Francisco/Calif.>)
In: Foster, I.: CLOUD 2016, IEEE 9th International Conference on Cloud Computing. Proceedings: 27 June-2 July 2016, San Francisco, California, USA. Piscataway, NJ: IEEE, 2016, pp. 843-848
Konferenzbeitrag
2016Zankl, A.; Miller, K.; Heyszl, J.; Sigl, G.:
Towards efficient evaluation of a time-driven cache attack on modern processors
(European Symposium on Research in Computer Security (ESORICS) <21, 2016, Heraklion>)
In: Askoxylakis, Ioannis: Computer security - ESORICS 2016. 21st European Symposium on Research in Computer Security. Pt.2: Heraklion, Greece, September 26-30, 2016; Proceedings. Cham: Springer International Publishing, 2016. (Lecture Notes in Computer Science 9879), pp. 3-19
Konferenzbeitrag
2016Sepulveda, J.; Florez, D.; Fernandes, R.; Marcon, C.; Gogniat, G.; Sigl, G.:
Towards risk aware NoCs for data protection in MPSoCs
(International Symposium on Reconfigurable Communication-Centric Systems-on-Chip (ReCoSoc) <11, 2016, Tallinn>)
In: Institute of Electrical and Electronics Engineers -IEEE-: 11th International Symposium on Reconfigurable Communication-Centric Systems-on-Chip, ReCoSoc 2016: June 27-29, 2016, Tallinn, Estonia. Piscataway, NJ: IEEE, 2016, pp. 47-54
Konferenzbeitrag
2016Koppermann, P.; Santis, F. de; Heyszl, J.; Sigl, G.:
X25519 hardware implementation for low-latency applications
(Conference in Digital System Design (DSD) <19, 2016, Limassol>)
In: Kitsos, P.: DSD 2016, 19th Euromicro Conference in Digital System Design. Proceedings: 31 August-2 September 2016, Limassol, Cyprus. Piscataway, NJ: IEEE, 2016, pp. 99-106
Konferenzbeitrag
Diese Publikationsliste wurde aus der Publikationsdatenbank Fraunhofer-Publica erstellt.