Jahr | Autor/Titel/Quelle | Dokumentart |
---|---|---|
2020 | Heinl, Michael P.; Giehl, Alexander; Graif, Lukas:
AntiPatterns Regarding the Application of Cryptographic Primitives by the Example of Ransomware (International Conference on Availability, Reliability and Security (ARES) <15, 2020, Online>) In: Volkamer, M.: ARES 2020, 15th International Conference on Availability, Reliability and Security: August 25 - August 28, 2020, All-digital Conference. New York: ACM, 2020, Art. 64, 10 pp. | Konferenzbeitrag |
2020 | Wagner, Patrick; Hansch, Gerhard; Konrad, Christoph; John, Karl-Heinz; Bauer, Jochen; Franke, Jörg:
Applicability of Security Standards for Operational Technology by SMEs and Large Enterprises (International Conference on Emerging Technologies and Factory Automation (ETFA) <25, 2020, Online>) In: Institute of Electrical and Electronics Engineers -IEEE-: 25th IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2020. Proceedings: Vienna, Austria - Hybrid, 08 - 11 September 2020. Piscataway, NJ: IEEE, 2020, pp. 1544-1551 | Konferenzbeitrag |
2020 | Graf, J.; Neubauer, K.; Fischer, S.; Hackenberg, R.:
Architecture of an intelligent Intrusion Detection System for Smart Home (International Conference on Pervasive Computing and Communications (PerCom) <18, 2020, Online>) In: Institute of Electrical and Electronics Engineers -IEEE-: IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2020: Austin, Texas, USA 23 – 27 March 2020. Piscataway, NJ: IEEE, 2020, pp. 101-106 | Konferenzbeitrag |
2020 | Hansch, Gerhard:
Automating Security Risk and Requirements Management for Cyber-Physical Systems Göttingen, Univ., Diss., 2020 | Dissertation |
2020 | Wisiol, N.; Becker, G.T.; Margraf, M.; Soroceanu, T.A.A.; Tobisch, J.; Zengin, B.:
Breaking the lightweight secure PUF: Understanding the relation of input transformations and machine learning resistance (International Conference on Smart Card Research and Advanced Applications (CARDIS) <18, 2019, Prague>) In: Belaid, Sonia: Smart Card Research and Advanced Applications. 18th International Conference, CARDIS 2019: Prague, Czech Republic, November 11-13, 2019, Revised Selected Papers. Cham: Springer Nature, 2020. (Lecture Notes in Computer Science 11833), pp. 40-54 | Konferenzbeitrag |
2020 | Giehl, Alexander; Heinl, Michael P.:
Datenplattform nach dem Security-by-Design-Prinzip: Produktionsdaten sicher in der Cloud verarbeiten In: IT & production, Vol.21 (2020), No.9, pp.50-51 | Zeitschriftenaufsatz |
2020 | Adler, R.; Kolomiichuk, Sergii; Hecker, Dirk; Lämmel, Philipp; Ma, Jackie; Marko, Angelina; Mock, Michael; Nagel, Tobias; Poretschkin, Maximilian; Rennoch, Axel; Röhler, Marcus; Ruf, Miriam; Schönhof, Raoul; Schneider, Martin A.; Tcholtchev, Nikolay; Ziehn, Jens; Böttinger, Konstantin; Jedlitschka, Andreas; Oala, Luis; Sperl, Philip; Wenzel, Markus; et. al.; Wahlster, W.; Winterhalter, C. :
Deutsche Normungsroadmap Künstliche Intelligenz Berlin: DIN, 2020 | Studie |
2020 | Sperl, Philip; Kao, Ching-yu; Chen, Peng; Lei, Xiao; Böttinger, Konstantin:
DLA: Dense-Layer-Analysis for Adversarial Example Detection (European Symposium on Security and Privacy (EuroS&P) <5, 2020, Online>) In: Institute of Electrical and Electronics Engineers -IEEE-: 5th IEEE European Symposium on Security and Privacy, EuroS&P 2020. Proceedings: 7-11 September 2020, Virtual Event. Los Alamitos, Calif.: IEEE Computer Society Conference Publishing Services (CPS), 2020, pp. 198-215 | Konferenzbeitrag |
2020 | Heinl, Michael P.; Giehl, Alexander:
Drei Fragen an... das Fraunhofer AISEC. "Security als sich kontinuierlich weiterentwickelnder Prozess": Beitrag auf der Internetseite Computer & Automation (https://www.computer-automation.de), 28. September 2020 2020 | Zeitschriftenaufsatz |
2020 | Kunz, I.; Stephanow, P.; Banse, C.:
An Edge Framework for the Application of Privacy Enhancing Technologies in IoT Communications (International Conference on Communications (ICC) <2020, Online>) In: Institute of Electrical and Electronics Engineers -IEEE-: IEEE International Conference on Communications, ICC 2020. Proceedings: Dublin, Ireland, 7 - 11 June 2020. Piscataway, NJ: IEEE, 2020, 6 pp. | Konferenzbeitrag |
2020 | Franzen, F.; Andreas, M.; Huber, M.:
FridgeLock: Preventing Data Theft on Suspended Linux with Usable Memory Encryption (Conference on Data and Application Security and Privacy (CODASPY) <10, 2020, New Orleans/La.>) In: Roussev, V.: CODASPY 2020, Tenth ACM Conference on Data and Application Security and Privacy. Proceedings: March 16-18, 2020, New Orleans, LA, USA. New York: ACM, 2020, pp. 215-219 | Konferenzbeitrag |
2020 | Giehl, Alexander; Wiedermann, Norbert; Tayebi Gholamzadeh, Makan; Eckert, Claudia:
Integrating security evaluations into virtual commissioning (International Conference on Automation Science and Engineering (CASE) <16, 2020, Online>) In: Institute of Electrical and Electronics Engineers -IEEE-: IEEE 16th International Conference on Automation Science and Engineering, CASE 2020: Virtual conference, 20-21 August 2020. Piscataway, NJ: IEEE, 2020, pp. 1193-1200 | Konferenzbeitrag |
2020 | Unterstein, Florian; Schink, Marc; Schamberger, Thomas; Tebelmann, Lars; Ilg, Manuel; Heyszl, Johann:
Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers In: IACR transactions on cryptographic hardware and embedded systems, Vol.2020 (2020), No.4, pp.365-388 | Zeitschriftenaufsatz |
2020 | Hiller, Matthias; Kürzinger, Ludwig; Sigl, Georg:
Review of error correction for PUFs and evaluation on state-of-the-art FPGAs In: Journal of cryptographic engineering, Vol.10 (2020), No.3, pp.229-247 | Zeitschriftenaufsatz |
2020 | Striegel, M.; Heyszl, J.; Jakobsmeier, F.; Matveev, Y.; Sigl, G.:
Secure and user-friendly over-the-air firmware distribution in a portable faraday cage (Conference on Security and Privacy in Wireless and Mobile Networks (WiSec) <13, 2020, Online>) In: Mayrhofer, R.: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2020. New York: ACM, 2020, pp. 173-183 | Konferenzbeitrag |
2020 | Wilke, L.; Wichelmann, J.; Morbitzer, M.; Eisenbarth, T.:
SEVurity: No security without integrity: Ng integrity-free memory encryption with minimal assumptions (Symposium on Security and Privacy (SP) <41, 2020, Online>) In: Ciocarlie, G.: 41st IEEE Symposium on Security and Privacy, SP 2020: San Francisco, California, USA, 18-21 May 2020 : proceedings . Piscataway, NJ: IEEE, 2020, pp. 1483-1496 | Konferenzbeitrag |
2020 | Garb, K.; Obermaier, J.:
Temporary Laser Fault Injection into Flash Memory: Calibration, Enhanced Attacks, and Countermeasures (International Symposium on On-Line Testing and Robust System Design (IOLTS) <26, 2020, Online>) In: Institute of Electrical and Electronics Engineers -IEEE-: 26th IEEE International Symposium on On-Line Testing and Robust System Design, IOLTS 2020: July 13-16, 2020, virtual edition. Piscataway, NJ: IEEE, 2020, pp. 109-115 | Konferenzbeitrag |
2019 | Titze, D.O.:
Analysis and Mitigation of Security Issues on Android München, TU, Diss., 2019 | Dissertation |
2019 | Weiner, M.; Wieser, W.; Lupon, E.; Sigl, G.; Manich, S.:
A calibratable detector for invasive attacks In: IEEE transactions on very large scale integration (VLSI) systems, Vol.27 (2019), No.5, pp.1067-1079 | Zeitschriftenaufsatz |
2019 | Engelmann, S.; Chen, M.; Fischer, F.; Kao, C.Y.; Grossklags, J.:
Clear Sanctions, Vague Rewards: How China's Social Credit System Currently Defines "Good" and "Bad" Behavior (Conference on Fairness, Accountability, and Transparency (FAT*) <2019, Atlanta/Ga.>) In: Association for Computing Machinery -ACM-: FAT* 2019, Conference on Fairness, Accountability, and Transparency. Proceedings: January 29-31, 2019, Atlanta, GA, USA. New York: ACM, 2019, pp. 69-78 | Konferenzbeitrag |
2019 | Schulze, Jan-Philipp; Mrowca, Artur; Ren, Elizabeth; Loeliger, Hans-Andrea; Böttinger, Konstantin:
Context by Proxy: Identifying Contextual Anomalies Using an Output Proxy (International Conference on Knowledge Discovery and Data Mining (KDD) <25, 2019, Anchorage/Alaska>) In: Association for Computing Machinery -ACM-: KDD 2019, 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. Proceedings: Anchorage, AK, USA, August 04 - 08, 2019. New York: ACM, 2019, pp. 2059-2068 | Konferenzbeitrag |
2019 | Koppermann, C.P.:
Curve Based Cryptography: High-Performance Implementations and Speed Enhancing Methods München, TU, Diss., 2019 | Dissertation |
2019 | Hansch, G.; Schneider, P.; Brost, G.S.:
Deriving Impact-driven Security Requirements and Monitoring Measures for Industrial IoT (Workshop on Cyber-Physical System Security (CPSS) <5, 2019, Auckland>) In: Association for Computing Machinery -ACM-: 5th on Cyber-Physical System Security Workshop, CPSS 2019. Proceedings: Auckland, New Zealand, 8th June 2019. New York: ACM, 2019, pp. 37-45 | Konferenzbeitrag |
2019 | Gruber, M.; Selmke, B.:
Differential Fault Attacks on KLEIN (International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE) <10, 2019, Darmstadt>) In: Polian, I.: Constructive side-channel analysis and secure design: 10th International Workshop, COSADE 2019. Proceedings: Darmstadt, 3-5 April 2019. Cham: Springer, 2019. (Lecture Notes in Computer Science 11421), pp. 80-95 | Konferenzbeitrag |
2019 | Xu, M.; Huber, M.; Sun, Z.; England, P.; Peinado, M.; Lee, S.; Marochko, A.; Mattoon, D.; Spiger, R.; Thom, S.:
Dominance as a New Trusted Computing Primitive for the Internet of Things (Symposium on Security and Privacy (SP) <40, 2019, San Francisco/Calif.>) In: Institute of Electrical and Electronics Engineers -IEEE-: IEEE Symposium on Security and Privacy, 2019 SP. Proceedings: San Francisco, California, 19-23 May 2019. Piscataway, NJ: IEEE, 2019, pp. 1415-1430 | Konferenzbeitrag |
2019 | Giehl, Alexander; Schneider, Peter; Busch, Maximilian; Schnoes, Florian; Kleinwort, Robin; Zaeh, Michael F.:
Edge-computing enhanced privacy protection for industrial ecosystems in the context of SMEs (Conference on Cybersecurity and Privacy (CMI) <12, 2019, Copenhagen>) In: Institute of Electrical and Electronics Engineers -IEEE-: 12th CMI Conference on Cybersecurity and Privacy, CMI 2019: Copenhagen, Denmark, 28-29 November 2019. Piscataway, NJ: IEEE, 2019, pp. 14-19 | Konferenzbeitrag |
2019 | Morbitzer, M.; Huber, M.; Horsch, J.:
Extracting Secrets from Encrypted Virtual Machines (Conference on Data and Application Security and Privacy (CODASPY) <9, 2019, Richardson/Texas>) In: Ahn, G.J.: 9th ACM Conference on Data and Application Security and Privacy, CODASPY 2019. Proceedings: Richardson, Texas, 25-27 March 2019. New York: ACM, 2019, pp. 221-230 | Konferenzbeitrag |
2019 | Striegel, M.; Rolfes, C.; Heyszl, J.; Helfert, F.; Hornung, M.; Sigl, G.:
EyeSec: A Retrofittable Augmented Reality Tool for Troubleshooting Wireless Sensor Networks in the Field (International Conference on Embedded Wireless Systems and Networks (EWSN) <2019, Beijing>) In: Liu, Y.: International Conference on Embedded Wireless Systems and Networks, EWSN 2019. Proceedings: Beijing, China, 25-27 February 2019. New York: ACM, 2019, pp. 184-193 | Konferenzbeitrag |
2019 | Giehl, A.; Wiedermann, N.; Plaga, S.:
A framework to assess impacts of cyber attacks in manufacturing (International Conference on Computer and Automation Engineering (ICCAE) <11, 2019, Perth>) In: Association for Computing Machinery -ACM-: 11th International Conference on Computer and Automation Engineering, ICCAE 2019. Proceedings. New York: ACM, 2019. (ACM Digital Library), pp. 127-132 | Konferenzbeitrag |
2019 | Fraunhofer-Einrichtung für Angewandte und Integrierte Sicherheit -AISEC-, Garching:
Fraunhofer-Institut für Angewandte und Integrierte Sicherheit. Jahresbericht 2018/2019 Garching: Fraunhofer AISEC, 2019 | Jahresbericht |
2019 | Huber, M.; Horsch, J.; Ali, J.; Wessel, S.:
Freeze and crypt: Linux kernel support for main memory encryption In: Computers & security, Vol.86 (2019), pp.420-436 | Zeitschriftenaufsatz |
2019 | Plaga, S.; Wiedermann, N.; Niedermaier, M.; Giehl, A.; Newe, T.:
Future Proofing IoT Embedded Platforms for Cryptographic Primitives Support (International Conference on Sensing Technology (ICST) <12, 2018, Limerick>) In: Newe, Thomas (Ed.): Twelfth International Conference on Sensing Technology, ICST 2018: Limerick, Ireland, 04 Dec - 06 Dec 2018. Piscataway, NJ: IEEE, 2019, pp. 52-57 | Konferenzbeitrag |
2019 | Böttinger, K.:
Fuzzing with Stochastic Feedback Processes München, TU, Diss., 2019 | Dissertation |
2019 | Müller, N.M.; Markert, K.:
Identifying Mislabeled Instances in Classification Datasets (International Joint Conference on Neural Networks (IJCNN) <2019, Budapest>) In: Institute of Electrical and Electronics Engineers -IEEE-: International Joint Conference on Neural Networks, IJCNN 2019: Budapest, Hungary, 14-19 July 2019. Piscataway, NJ: IEEE, 2019, Art.N-19751, 8 pp. | Konferenzbeitrag |
2019 | Fischer, Sebastian; Neubauer, Katrin; Hinterberger, Lukas; Weber, Bernhard; Hackenberg, Rudolf:
IoTAG: An Open Standard for IoT Device IdentificAtion and RecoGnition (International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) <13, 2019, Nice>) In: Rass, S.: SECURWARE 2019, Thirteenth International Conference on Emerging Security Information, Systems and Technologies: October 27-31, 2019, Nice, France. Wilmington/Del.: IARIA, 2019, pp. 107-113 | Konferenzbeitrag |
2019 | Heinl, Michael P.; Giehl, Alexander; Wiedermann, Norbert; Plaga, Sven; Kargl, Frank:
MERCAT: A Metric for the Evaluation and Reconsideration of Certificate Authority Trustworthiness (Conference on Cloud Computing Security Workshop (CCSW) <2019, London>) In: Association for Computing Machinery -ACM-: CCSW 2019, ACM SIGSAC Conference on Cloud Computing Security Workshop. Proceedings: November 11, 2019, London. New York: ACM, 2019, pp. 1-15 | Konferenzbeitrag |
2019 | Heinl, Michael P.; Kargl, F.; Eckert, C. :
A Metric to Assess the Trustworthiness of Certificate Authorities Ulm, Univ., Master Thesis, 2019 | Master Thesis |
2019 | Immler, V.; Uppund, K.:
New Insights to Key Derivation for Tamper-Evident Physical Unclonable Functions In: IACR transactions on cryptographic hardware and embedded systems, (2019), No.3, pp.30-65 | Zeitschriftenaufsatz |
2019 | Schneider, P.; Giehl, A.:
Realistic Data Generation for Anomaly Detection in Industrial Settings Using Simulations (European Symposium on Research in Computer Security (ESORICS) <23, 2018, Barcelona>) In: Katsikas, S.K.: Computer Security: ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6-7, 2018, Revised Selected Papers. Cham: Springer Nature, 2019. (Lecture Notes in Computer Science 11387), pp. 119-134 | Konferenzbeitrag |
2019 | Knoblauch, Dorian; Banse, Christian:
Reducing Implementation Efforts in Continuous Auditing Certification Via an Audit API (International Conference on Enabling Technologies - Infrastructure for Collaborative Enterprises (WETICE) <28, 2019, Napoli>) In: Institute of Electrical and Electronics Engineers -IEEE-: IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE 2019. Proceedings: Napoli, Italy, 12-14 June 2019. Piscataway, NJ: IEEE, 2019, pp. 88-92 | Konferenzbeitrag |
2019 | Otto, Boris; Steinbuss, Sebastian; Teuscher, Andreas; Lohmann, Steffen; Bader, Sebastian; Birnstil, P.; Böhmer, M.; Brost, G.; Cirullies, J.; Eitel, A.; Ernst, T.; Geisler, S.; Gelhaar, J.; Gude, R.; Haas, C.; Huber, M.; Jung, C.; Jürjens, J.; Lange, C.; Lis, D.; Mader, C.; Menz, N.; Nagel, R.; Patzer, F.; Pettenpohl, H.; Pullmann, J.; Quix, C.; Schulz, D.; Schütte, J.; et al.:
Reference Architecture Model. Version 3.0: April 2019 Berlin: International Data Spaces Association, 2019 | Bericht |
2019 | Neubauer, Katrin; Fischer, Sebastian; Hackenberg, Rudolf:
Risk Analysis of the Cloud Infrastructure of Smart Grid and Internet of Things (International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING) <10, 2019, Venice>) In: Duncan, B.: CLOUD COMPUTING 2019, Tenth International Conference on Cloud Computing, GRIDs, and Virtualization: May 5-9, 2019, Venice, Italy. Wilmington/Del.: IARIA, 2019, pp. 82-87 | Konferenzbeitrag |
2019 | Morbitzer, M.:
Scanclave: Verifying Application Runtime Integrity in Untrusted Environmen (International Conference on Enabling Technologies - Infrastructure for Collaborative Enterprises (WETICE) <28, 2019, Napoli>) In: Institute of Electrical and Electronics Engineers -IEEE-: IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE 2019. Proceedings: Napoli, Italy, 12-14 June 2019. Piscataway, NJ: IEEE, 2019, pp. 198-203 | Konferenzbeitrag |
2019 | Immler, V.; Obermaier, J.; Ng, K.K.; Ke, F.X.; Lee, J.; Lim, Y.P.; Oh, W.K.; Wee, K.H.; Sigl, G.:
Secure Physical Enclosures from Coverswith Tamper-Resistance In: IACR transactions on cryptographic hardware and embedded systems, (2019), No.1, pp.51-96 | Zeitschriftenaufsatz |
2019 | Plaga, S.; Wiedermann, N.; Anton, S.D.; Tatschner, S.; Schotten, H.; Newe, T.:
Securing future decentralised industrial IoT infrastructures: Challenges and free open source solutions In: Future generation computer systems : FGCS, Vol.93 (2019), pp.596-608 | Zeitschriftenaufsatz |
2019 | Auer, Lukas; Skubich, Christian; Hiller, Matthias:
A Security Architecture for RISC-V based IoT Devices (Design, Automation & Test in Europe Conference & Exhibition (DATE) <23, 2019, Florence>) In: European Design Automation Association -EDAA-: Design, Automation & Test in Europe, DATE 2019. Proceedings: 25 - 29 March 2019, Florence, Italy. Piscataway, NJ: IEEE, 2019, pp. 1148-1153 | Konferenzbeitrag |
2019 | Sperl, Philip; Böttinger, Konstantin:
Side-Channel Aware Fuzzing (European Symposium on Research in Computer Security (ESORICS) <24, 2019, Luxembourg>) In: Sako, Kazue: Computer Security - ESORICS 2019: 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part I. Cham: Springer Nature, 2019. (Lecture Notes in Computer Science 11735), pp. 259-278 | Konferenzbeitrag |
2019 | Striegel, Martin; Otto, Thomas:
Smart Intersections Improve Traffic Flow and Safety In: ERCIM News, (2019), No.119, pp.19-21 | Zeitschriftenaufsatz |
2019 | Schink, Marc; Obermaier, Johannes:
Taking a Look into Execute-Only Memory (Workshop on Offensive Technologies (WOOT) <13, 2019, Santa Clara/Calif.>) In: USENIX Association: WOOT 2019, 13th USENIX Workshop on Offensive Technologies. Online resource: August 12-13, 2019, Santa Clara, CA, USA; Co-located with USENIX Security '19. Berkeley, CA, USA: USENIX, 2019, 13 pp. | Konferenzbeitrag |
2019 | Gu, C.; Liu, W.; Hanley, N.; Hesselbarth, R.; O'Neill, M.:
A Theoretical Model to Link Uniqueness and Min-Entropy for PUF Evaluations In: IEEE transactions on computers, Vol.68 (2019), No.2, pp.287-293 | Zeitschriftenaufsatz |
2019 | Hansch, G.; Schneider, P.; Fischer, K.; Böttinger, K.:
A Unified Architecture for Industrial IoT Security Requirements in Open Platform Communications (International Conference on Emerging Technologies and Factory Automation (ETFA) <24, 2019, Zaragoza>) In: Institute of Electrical and Electronics Engineers -IEEE-: 24th IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2019. Proceedings: Zaragoza, Spain, 10 - 13 September 2019. Piscataway, NJ: IEEE, 2019, pp. 325-332 | Konferenzbeitrag |
2019 | Immler, V.; Hiller, M.; Liu, Q.; Lenz, A.; Wachter-Zeh, A.:
Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs: Extended Version In: Journal of hardware and systems security, Vol.3 (2019), No.1, pp.78-93 | Zeitschriftenaufsatz |
2019 | Neubauer, Katrin; Hackenberg, Rudolf; Fischer, Sebastian:
Work in Progress: Security Analysis for Safety-critical Systems: Smart Grid and IoT (International Conference on Architecture of Computing Systems (ARCS) <32, 2019, Copenhagen>) In: Trinitis, C.: ARCS 2019, 32nd GI/ITG International Conference on Architecture of Computing Systems. Workshop proceedings: May 20-21, 2019, Technical University of Denmark, Copenhagen, Denmark. Berlin: VDE-Verlag, 2019, pp. 101-106 | Konferenzbeitrag |
2018 | Plaga, S.; Niethammer, M.; Wiedermann, N.; Borisov, A.:
Adding Channel Binding for an Out-of-Band OTP Authentication Protocol in an Industrial Use-Case (International Conference on Data Intelligence and Security (ICDIS) <1, 2018, South Padre Island/Tex.>) In: Institute of Electrical and Electronics Engineers -IEEE-: 1st International Conference on Data Intelligence and Security, ICDIS 2018: 8-10 April 2018, South Padre Island, USA. Piscataway, NJ: IEEE, 2018. (Proceedings - 2018 1st International Conference on Data Intelligence and Security, ICDIS 2018), pp. 250-257 | Konferenzbeitrag |
2018 | Santis, F. De:
Algorithmic and Protocol Level Countermeasures to Protect Cryptographic Devices München, TU, Diss., 2018 | Dissertation |
2018 | Immler, V.; Obermaier, J.; König, M.; Hiller, M.; Sig, G.:
B-TREPID: Batteryless tamper-resistant envelope with a PUF and integrity detection (International Symposium on Hardware-Oriented Security and Trust (HOST) <11, 2018, Washington/DC>) In: IEEE Computer Society: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2018. Proceedings: April 30-4 May 2018, The Ritz-Carlton Washington DC, USA . Piscataway, NJ: IEEE, 2018, pp. 49-56 | Konferenzbeitrag |
2018 | Bramm, G.; Gall, M.; Schütte, J.:
BDABE - Blockchain-based Distributed Attribute based Encryption (International Joint Conference on e-Business and Telecommunications (ICETE) <15, 2018, Porto>) In: Institute for Systems and Technologies of Information, Control and Communication -INSTICC-, Setubal: 15th International Joint Conference on e-Business and Telecommunications, ICETE 2018. Proceedings. Setúbal: SciTePress, 2018, pp. 99-110 | Konferenzbeitrag |
2018 | Schütte, Julian; Fridgen, Gilbert; Prinz, Wolfgang; Rose, Thomas; Urbach, Nils; Hoeren, Thomas; Guggenberger, Nikolas; Welzel, Christian; Holly, Steffen; Schulte, Axel; Sprenger, Philipp; Schwede, Christian; Weimert, Birgit; Otto, Boris; Dalheimer, Mathias; Wenzel, Markus; Kreutzer, Michael; Fritz, Michael; Leiner, Ulrich; Nouak, Alexander; Prinz, Wolfgang (Ed.); Schulte, Axel T. (Ed.) :
Blockchain and smart contracts: Technologies, research issues and applications München: Fraunhofer-Gesellschaft, 2018 | Bericht |
2018 | Gräther, Wolfgang; Kolvenbach, Sabine; Ruland, Rudolf; Julian, Schütte; Ferreira Torres, Cristof; Wendland, Florian:
Blockchain for Education: Lifelong Learning Passport (Blockchain Workshop <1, 2018, Amsterdam>) In: Prinz, Wolfgang: 1st ERCIM Blockchain Workshop 2018. Proceedings: Blockchain Engineering: Challenges and Opportunities for Computer Science Research; 8 - 9 May 2018, Amsterdam, Netherlands. Bonn: EUSSET, 2018. (Reports of the European Society for Socially Embedded Technologies 2), 8 pp. | Konferenzbeitrag |
2018 | Ferres, Elischa; Immler, Vincent; Stanitzki, Alexander; Lerch, Renee; Kokozinski, Rainer:
Capacitive multi-channel security sensor IC for tamper-resistant enclosures (Sensors Conference <17, 2018, New Delhi>) In: Institute of Electrical and Electronics Engineers -IEEE-: IEEE SENSORS 2018. Conference Proceedings: October 28-31, 2018, New Delhi, India. Piscataway, NJ: IEEE, 2018, 4 pp. | Konferenzbeitrag |
2018 | Stephanow-Gierach, P.:
Continuous Test-Based Certification of Cloud Services München, TU, Diss., 2018 | Dissertation |
2018 | Weiser, S.; Zankl, A.; Spreitzer, R.; Miller, K.; Mangard, S.; Sigl, G.:
DATA - Differential address trace analysis: Finding address-based side-channels in binaries (Security Symposium <27, 2018, Baltimore/Md.>) In: USENIX Association: 27th USENIX Security Symposium 2018. Proceedings: August 15-17, 2018, Baltimore, MD, USA. Berkeley, CA, USA: USENIX, 2018, pp. 603-620 | Konferenzbeitrag |
2018 | Böttinger, K.; Godefroid, P.; Singh, R.:
Deep Reinforcement Fuzzing (Symposium on Security and Privacy (SP) <39, 2018, San Francisco/Calif.>) In: Institute of Electrical and Electronics Engineers -IEEE-: IEEE Symposium on Security and Privacy Workshops, SPW 2018. Proceedings: 24 May 2018, San Francisco, California, USA . Piscataway, NJ: IEEE, 2018, pp. 116-122 | Konferenzbeitrag |
2018 | Böttinger, K.; Godefroid, P.; Singh, R.:
Deep Reinforcement Fuzzing (Symposium on Security and Privacy (SP) <39, 2018, San Francisco/Calif.>) In: Institute of Electrical and Electronics Engineers -IEEE-: IEEE Symposium on Security and Privacy Workshops, SPW 2018. Proceedings: 24 May 2018, San Francisco, California, USA . Piscataway, NJ: IEEE, 2018, pp. 116-122 | Konferenzbeitrag |
2018 | Specht, R.; Immler, V.; Unterstein, F.; Heyszl, J.; Sig, G.:
Dividing the threshold: Multi-probe localized EM analysis on threshold implementations (International Symposium on Hardware-Oriented Security and Trust (HOST) <11, 2018, Washington/DC>) In: IEEE Computer Society: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2018. Proceedings: April 30-4 May 2018, The Ritz-Carlton Washington DC, USA . Piscataway, NJ: IEEE, 2018, pp. 33-40 | Konferenzbeitrag |
2018 | Reinbrecht, C.; Forlin, B.; Zankl, A.; Sepúlveda, J.:
Earthquake: A NoC-based optimized differential cache-collision attack for MPSoCs (Design, Automation & Test in Europe Conference & Exhibition (DATE) <21, 2018, Dresden>) In: Madsen, J.: Design, Automation & Test in Europe, DATE 2018. Proceedings: 19-23 March 2018, Dresden, Germany. Piscataway, NJ: IEEE, 2018, pp. 648-653 | Konferenzbeitrag |
2018 | Brost, G.S.; Huber, M.; Weiß, M.; Protsenko, M.; Schütte, J.; Wessel, S.:
An Ecosystem and IoT Device Architecture for Building Trust in the Industrial Data Space (Workshop on Cyber-Physical System Security (CPSS) <4, 2018, Incheon>) In: Gollmann, D.: 4th ACM Workshop on Cyber-Physical System Security, CPSS 2018: Incheon, Republic of Korea, 4th June 2018. New York: ACM, 2018. (ACM Digital Library), pp. 39-50 | Konferenzbeitrag |
2018 | Obermaier, J.; Hauschild, F.; Hiller, M.; Sigl, G.:
An embedded key management system for PUF-based security enclosures (Mediterranean Conference on Embedded Computing (MECO) <7, 2018, Budva>) In: Stojanović, R.: 7th Mediterranean Conference on Embedded Computing, MECO 2018: Including ECYPS 2018. Proceedings, Research Monograph: Budva, Montenegro, June 10th-14th, 2018. Piscataway, NJ: IEEE, 2018, pp. 161-166 | Konferenzbeitrag |
2018 | Wendland, F.; Banse, C.:
Enhancing NFV Orchestration with Security Policies (International Conference on Availability, Reliability and Security (ARES) <13, 2018, Hamburg>) In: Association for Computing Machinery -ACM-: ARES 2018, 13th International Conference on Availability, Reliability and Security. Proceedings: Hamburg, Germany, August 27 - 30, 2018. New York: ACM, 2018, Art.45 | Konferenzbeitrag |
2018 | Koppermann, P.; Santis, F. De; Heyszl, J.; Sigl, G.:
Fast FPGA Implementations of Diffie-Hellman on the Kummer Surface of a Genus-2 Curve In: IACR transactions on cryptographic hardware and embedded systems, (2018), pp.1-17 | Zeitschriftenaufsatz |
2018 | Schneider, Peter; Böttinger, Konstantin:
High-performance unsupervised anomaly detection for cyber-physical system networks (Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC) <2018, Toronto>) In: Lie, D.: CPS-SPC 2018, Workshop on Cyber-Physical Systems Security and PrivaCy. Proceedings: Toronto, Canada, October 15 - 19, 2018. New York: ACM, 2018, pp. 1-12 | Konferenzbeitrag |
2018 | Unterstein, F.; Heyszl, J.; Santis, F. de; Specht, R.; Sigl, G.:
High-resolution EM attacks against leakage-resilient PRFs Explained: And an improved construction (Cryptographers' Track at the RSA Conference (CT-RSA) <2018, San Francisco/Calif.>) In: Smart, N.P.: Topics in cryptology - CT-RSA 2018. Proceedings: The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018. Cham: Springer International Publishing, 2018. (Lecture Notes in Computer Science 10808), pp. 413-434 | Konferenzbeitrag |
2018 | Otto, Boris; Lohmann, Steffen; Steinbuss, Sebastian; Teuscher, Andreas; Auer, Soeren; Boehmer, Martin; Bohn, Juergen; Brost, Gerd; Cirullies, Jan; Ciureanu, Constantin; Corsi, Eva; Danielsen, Soeren; Eitel, Andreas; Ernst, Thilo; Geisler, Sandra; Gelhaar, Joshua; Gude, Roland; Haas, Christian; Heiles, Juergen; Hierro, Juanjo; Hoernle, Joachim; Huber, Manuel; Jung, Christian; Juerjens, Jan; Kasprzik, Anna; Ketterl, Markus; Koetzsch, Judith; Koehler, Jacob; Lange, Christoph; Langer, Dorothea; Langkau, Joerg; Lis, Dominik; Loeffler, Sven; Loewen, Ulrich; Mader, Christian; Menz, Nadja; Mueller, Andreas; Mueller, Bernhard; Nagel, Lars; Nagel, Ralf; Nieminen, Harri; Reitelbach, Thomas; Resetko, Aleksei; Pakkala, Daniel; Patzer, Florian; Pettenpohl, Heinrich; Pietzsch, Rene; Pullmann, Jaroslav; Punter, Matthijs; Quix, Christoph; Rohrmus, Dominik; Romer, Lena; Sandloehken, Joerg; Schoewe, Patrick; Schulz, Daniel; Schuette, Julian; Schweichhart, Karsten; Sol, Egbert-Jan; Sorowka, Peter; Spiegelberg, Gernot; :
IDS Reference Architecture Model. Industrial Data Space. Version 2.0 Berlin: International Data Spaces Association, 2018 | Bericht |
2018 | Giehl, A.; Plaga, S.:
Implementing a performant security control for Industrial Ethernet (International Conference on Signal Processing and Information Security <2018, Dubai>) In: International Conference on Signal Processing and Information Security, ICSPIS 2018. Proceedings: Dubai, 7-8 November 2018. Piscataway, NJ: IEEE, 2018, Art.18471881, 4 pp. | Konferenzbeitrag |
2018 | Wagner, S.:
Implicit remote attestation for microkernel-based embedded systems München, TU, Diss., 2018 | Dissertation |
2018 | Ferreira Torres, C.; Jonker, H.:
Investigating fingerprinters and fingerprinting-alike behaviour of android applications (European Symposium on Research in Computer Security (ESORICS) <23, 2018, Barcelona>) In: Lopez, J.: Computer security. 23rd European Symposium on Research in Computer Security, ESORICS 2018. Proceedings. Pt.2: Barcelona, Spain, September 3-7, 2018. Cham: Springer International Publishing, 2018. (Lecture Notes in Computer Science 11099), pp. 60-80 | Konferenzbeitrag |
2018 | Hesselbarth, R.; Wilde, F.; Gu, C.; Hanley, N.:
Large scale RO PUF analysis over slice type, evaluation time and temperature on 28nm Xilinx FPGAs (International Symposium on Hardware-Oriented Security and Trust (HOST) <11, 2018, Washington/DC>) In: IEEE Computer Society: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2018. Proceedings: April 30-4 May 2018, The Ritz-Carlton Washington DC, USA . Piscataway, NJ: IEEE, 2018, pp. 126-133 | Konferenzbeitrag |
2018 | Zieris, Philipp; Horsch, Julian:
A leak-resilient dual stack scheme for backward-edge control-flow integrity (Asia Conference on Computer and Communications Security (ASIACCS) <2018, Incheon/Korea>) In: Association for Computing Machinery -ACM-: ASIACCS 2018, Asia Conference on Computer and Communications Security. Proceedings: Incheon, Republic of Korea, June 04, 2018. New York: ACM, 2018, pp. 369-380 | Konferenzbeitrag |
2018 | Selmke, B.; Zinnecker, K.; Koppermann, P.; Miller, K.; Heyszl, J.; Sigl, G.:
Locked out by Latch-up? An Empirical Study on Laser Fault Injection into Arm Cortex-M Processors (Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) <15, 2018, Amsterdam>) In: Bertoni, G.M.: Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2018: Amsterdam, Netherlands, 13 September 2018. Piscataway, NJ: IEEE, 2018, pp. 7-14 | Konferenzbeitrag |
2018 | Weiner, M.; Manich, S.; Rodriguez-Montanes, R.; Sigl, G.:
The low area probing detector as a countermeasure against invasive attacks In: IEEE transactions on very large scale integration (VLSI) systems, Vol.26 (2018), No.2, pp.392-403 | Zeitschriftenaufsatz |
2018 | Schütte, J.; Brost, G.S.:
LUCON: Data Flow Control for Message-Based IoT Systems (International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) <17, 2018, New York/NY>) In: Institute of Electrical and Electronics Engineers -IEEE-: 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2018. 12th IEEE International Conference on Big Data Science and Engineering, BigDataSE 2018. Proceedings: 31 July - 3 August 2018, New York, New York. Piscataway, NJ: IEEE, 2018, pp. 289-299 | Konferenzbeitrag |
2018 | Obermaier, J.; Immler, V.; Hiller, M.; Sigl, G.:
A measurement system for capacitive PUF-based security enclosures (Design Automation Conference (DAC) <55, 2018, San Francisco/Calif.>) In: Institute of Electrical and Electronics Engineers -IEEE-: 55th Annual Design Automation Conference, DAC 2018. Proceedings: San Francisco, CA, USA, June 24-29, 2018 . New York: ACM, 2018, Art.64 | Konferenzbeitrag |
2018 | Nyberg, R.H.-E.:
New Techniques for Emulating Fault Attacks München, TU, Diss., 2018 | Dissertation |
2018 | Torres, C.F.; Schütte, J.; State, R.:
Osiris: Hunting for integer bugs in ethereum smart contracts (Annual Computer Security Applications Conference (ACSAC) <34, 2018, San Juan/Puerto Rico>) In: Association for Computing Machinery -ACM-: 34th Annual Computer Security Applications Conference, ACSAC 2018. Proceedings: San Juan, Puerto Rico, USA, 3-7 December 2018. New York: ACM, 2018, pp. 664-676 | Konferenzbeitrag |
2018 | Obermaier, J.; Immler, V.:
The Past, Present, and Future of Physical Security Enclosures: From Battery-Backed Monitoring to PUF-Based Inherent Security and Beyond In: Journal of hardware and systems security, Vol.2 (2018), No.4, pp.289-296 | Zeitschriftenaufsatz |
2018 | Schanzenbach, M.; Banse, C.; Schütte, J.:
Practical Decentralized Attribute-Based Delegation Using Secure Name Systems (International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) <17, 2018, New York/NY>) In: Institute of Electrical and Electronics Engineers -IEEE-: 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2018. 12th IEEE International Conference on Big Data Science and Engineering, BigDataSE 2018. Proceedings: 31 July - 3 August 2018, New York, New York. Piscataway, NJ: IEEE, 2018, pp. 244-251 | Konferenzbeitrag |
2018 | Hänsch, N.; Schankin, A.; Protsenko, M.; Freiling, F.; Benenson, Z.:
Programming Experience Might Not Help in Comprehending Obfuscated Source Code Efficiently (Symposium on Usable Privacy and Security (SOUPS) <14, 2018, Baltimore/Md.>) In: USENIX Association: Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018. Proceedings: August 12-14, 2018, Baltimore, MD, USA. Berkeley, CA, USA: USENIX, 2018, pp. 341-356 | Konferenzbeitrag |
2018 | Pöhn, Daniela; Wessel, Sascha; Fischer, Felix; Braunsdorf, Oliver; Wenninger, Franz; Seydel, Dominique; Weiß, Gereon; Roscher, Karsten; Freese-Wagner, Manuela (Hrsg.) ; Fraunhofer-Einrichtung für Angewandte und Integrierte Sicherheit -AISEC-, Garching; Fraunhofer-Einrichtung für Mikrosysteme und Festkörper-Technologien -EMFT-, München; Fraunhofer-Institut für Eingebettete Systeme und Kommunikationstechnik -ESK-, München:
A Rapid Innovation Framework for Connected Mobility Applications: High Performance Center Connected Secure Systems. Fraunhofer AISEC, EMFT & ESK München: Fraunhofer ESK, 2018 | Studie |
2018 | Schanzenbach, M.; Bramm, G.; Schütte, J.:
reclaimID: Secure, Self-Sovereign Identities Using Name Systems and Attribute-Based Encryption (International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) <17, 2018, New York/NY>) In: Institute of Electrical and Electronics Engineers -IEEE-: 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2018. 12th IEEE International Conference on Big Data Science and Engineering, BigDataSE 2018. Proceedings: 31 July - 3 August 2018, New York, New York. Piscataway, NJ: IEEE, 2018, pp. 946-957 | Konferenzbeitrag |
2018 | Wiedermann, N.; Plaga, S.:
Rowhammer - A Survey Assessing the Severity of this Attack Vector (Embedded World Exhibition and Conference <2018, Nuremberg>) In: Embedded world 2018 Exhibition and Conference. Proceedings: ...it's a smarter world; 27 February - 1 March 2018, Nuremberg, Germany. Haar: WEKA Fachmedien, 2018 | Konferenzbeitrag |
2018 | Seydel, Dominique; Weiß, Gereon; Pöhn, Daniela; Wessel, Sascha; Wenninger, Franz:
Safety & security testing of cooperative automotive systems (Embedded World Exhibition and Conference <2018, Nuremberg>) In: Embedded world 2018 Exhibition and Conference. Proceedings: ...it's a smarter world; 27 February - 1 March 2018, Nuremberg, Germany. Haar: WEKA Fachmedien, 2018, 5 pp. | Konferenzbeitrag |
2018 | Kleber, S.; Unterstein, F.; Hiller, M.; Slomka, F.; Matousek, M.; Kargl, F.; Bösch, C.:
Secure Code Execution: A Generic PUF-Driven System Architecture (Information Security Conference (ISC) <21, 2018, Guildford>) In: Chen, L.: Information security. 21st International Conference, ISC 2018: Guildford, UK, September 9-12, 2018 : proceedings . Cham: Springer International Publishing, 2018. (Lecture Notes in Computer Science 11060), pp. 25-46 | Konferenzbeitrag |
2018 | Plaga, S.; Wiedermann, N.; Hansch, G.; Newe, T.:
Secure your SSH Keys! Motivation and practical implementation of a HSM-based approach securing private SSH-Keys (European Conference on Cyber Warfare and Security (ECCWS) <17, 2018, Oslo>) In: Josang, A.: 17th European Conference on Cyber Warfare and Security, ECCWS 2018: Oslo, Norway 28 – 29 June 2018. Red Hook, NY: Curran, 2018, pp. 370-379 | Konferenzbeitrag |
2018 | Giehl, Alexander; Wiedermann, Norbert:
Security Verification of Third Party Design Files in Manufacturing (International Conference on Computer and Automation Engineering (ICCAE) <10, 2018, Brisbane>) In: Association for Computing Machinery -ACM-: ICCAE 2018, Proceedings of the 10th International Conference on Computer and Automation Engineering: Brisbane, Australia, February 24 - 26, 2018 . New York: ACM, 2018, pp. 166-173 | Konferenzbeitrag |
2018 | Morbitzer, Mathias; Huber, Manuel; Horsch, Julian; Wessel, Sascha:
SEVered: Subverting AMD's virtual machine encryption (European Workshop on Systems Security (EuroSec) <11, 2018, Porto>) In: Association for Computing Machinery -ACM-: EuroSec 2018, 11th European Workshop on Systems Security. Proceedings: Porto, Portugal, April 23 - 26, 2018. New York: ACM, 2018, Art. 1, 6 pp. | Konferenzbeitrag |
2018 | Giehl, Alexander; Schneider, Peter:
Sichere Prozesse für moderne Geschäftsmodelle In: Industrie 4.0 Management, (2018), No.1, pp.55-58 | Zeitschriftenaufsatz |
2018 | Kalysch, A.; Milisterfer, O.; Protsenko, M.; Müller, T.:
Tackling Androids Native Library Malware with Robust, Efficient and Accurate Similarity Measures (International Conference on Availability, Reliability and Security (ARES) <13, 2018, Hamburg>) In: Association for Computing Machinery -ACM-: ARES 2018, 13th International Conference on Availability, Reliability and Security. Proceedings: Hamburg, Germany, August 27 - 30, 2018. New York: ACM, 2018, Art.58 | Konferenzbeitrag |
2018 | Fischer, T.:
Testing Cryptographically Secure Pseudo Random Number Generators with Artificial Neural Networks (International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) <17, 2018, New York/NY>) In: Institute of Electrical and Electronics Engineers -IEEE-: 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2018. 12th IEEE International Conference on Big Data Science and Engineering, BigDataSE 2018. Proceedings: 31 July - 3 August 2018, New York, New York. Piscataway, NJ: IEEE, 2018, pp. 1214-1223 | Konferenzbeitrag |
2018 | Sigl, G.; Gross, M.; Pehl, M.:
Where Technology Meets Security: Key Storage and Data Separation for System-on-Chips (European Solid State Circuits Conference (ESSCIRC) <44, 2018, Dresden>) In: Institute of Electrical and Electronics Engineers -IEEE-: IEEE 44th European Solid State Circuits Conference, ESSCIRC 2018: 3-6 September 2018, Dresden, Germany. Piscataway, NJ: IEEE, 2018, pp. 342-345 | Konferenzbeitrag |
2018 | Immler, V.; Specht, R.; Unterstein, F.:
Your rails cannot hide from localized EM: How dual-rail logic fails on FPGAs - extended version In: Journal of cryptographic engineering, Vol.8 (2018), No.2, pp.125-139 | Zeitschriftenaufsatz |
2017 | Baumann, R.; Protsenko, M.; Müller, T.:
Anti-ProGuard: Towards automated deobfuscation of android apps (Workshop on Security in Highly Connected IT Systems (SHCIS) <4, 2017, Neuchâtel>) In: Association for Computing Machinery -ACM-: 4th Workshop on Security in Highly Connected IT Systems, SHCIS 2017. Proceedings: Neuchâtel, Switzerland, June 19 - 22, 2017. New York: ACM, 2017, pp. 7-12 | Konferenzbeitrag |
2017 | Zankl, A.; Heyszl, J.; Sigl, G.:
Automated detection of instruction cache leaks in modular exponentiation software (International Conference on Smart Card Research and Advanced Applications (CARDIS) <15, 2016, Cannes>) In: Lemke-Rust, Kerstin: Smart card research and advanced applications. 15th International Conference, CARDIS 2016: Cannes, France, November 7-9, 2016; Revised selected papers. Cham: Springer International Publishing, 2017. (Lecture Notes in Computer Science 10146), pp. 228-244 | Konferenzbeitrag |
2017 | Koppermann, P.; Santis, F. de; Heyszl, J.; Sigl, G.:
Automatic generation of high-performance modular multipliers for arbitrary mersenne primes on FPGAs (International Symposium on Hardware-Oriented Security and Trust (HOST) <10, 2017, McLean/Va.>) In: Institute of Electrical and Electronics Engineers -IEEE-: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2017. Proceedings: 1-5 May 2017, The Ritz-Carlton, McLean, VA, USA. Piscataway, NJ: IEEE, 2017, pp. 35-40 | Konferenzbeitrag |
2017 | Schütte, Julian; Fridgen, Gilbert; Prinz, Wolfgang; Rose, Thomas; Urbach, Nils; Hoeren, Thomas; Guggenberger, Nikolas; Welzel, Christian; Holly, Steffen; Schulte, Axel; Sprenger, Philipp; Schwede, Christian; Weimert, Birgit; Otto, Boris; Dalheimer, Mathias; Wenzel, Markus; Kreutzer, Michael; Fritz, Michael; Leiner, Ulrich; Nouak, Alexander; Prinz, Wolfgang (ed.); Schulte, Axel T. (ed.) :
Blockchain und Smart Contracts: Technologien, Forschungsfragen und Anwendungen München: Fraunhofer-Gesellschaft, 2017 | Bericht |
2017 | Sepulveda, J.; Zankl, A.; Mischke, O.:
Cache attacks and countermeasures for NTRUEncrypt on MPSoCs: Post-quantum resistance for the IoT (International System on Chip Conference (SOCC) <30, 2017, Munich>) In: Alioto, M.: 30th IEEE International System on Chip Conference, SOCC 2017. Proceedings: September 05-08, 2017, Munich, Germany. Piscataway, NJ: IEEE, 2017, pp. 120-125 | Konferenzbeitrag |
2017 | Santis, F. de; Schauer, A.; Sigl, G.:
ChaCha20-Poly1305 authenticated encryption for high-speed embedded IoT applications (Design, Automation & Test in Europe Conference & Exhibition (DATE) <20, 2017, Lausanne>) In: European Design Automation Association -EDAA-: Design, Automation & Test in Europe, DATE 2017. Proceedings: 27-31 March 2017, Swisstech, Lausanne, Switzerland. Piscataway, NJ: IEEE, 2017, pp. 692-697 | Konferenzbeitrag |
2017 | Rakotondravony, N.; Taubmann, B.; Mandarawi, W.; Weishäupl, E.; Xu, P.; Kolosnjaji, B.; Protsenko, M.; Meer, H. de; Reiser, H.P.:
Classifying malware attacks in IaaS cloud environments In: Journal of Cloud Computing, Vol.6 (2017), Art. 26, 12 pp. | Zeitschriftenaufsatz |
2017 | Busch, M.; Protsenko, M.; Müller, T.:
A cloud-based compilation and hardening platform for android apps (International Conference on Availability, Reliability and Security (ARES) <12, 2017, Reggio Calabria>) In: Association for Computing Machinery -ACM-: 12th International Conference on Availability, Reliability and Security, ARES 2017. Proceedings: August 29 - September 1, 2017, Università degli Studi Mediterranea di Reggio Calabria, Italy. New York: ACM, 2017, Art. 37 | Konferenzbeitrag |
2017 | Settanni, G.; Skopik, F.; Shovgenya, Y.; Fiedler, R.; Carolan, M.; Conroy, D.; Boettinger, K.; Gall, M.; Brost, G.; Ponchel, C.; Haustein, M.; Kaufmann, H.; Theuerkauf, K.; Olli, P.:
A collaborative cyber incident management system for European interconnected critical infrastructures In: Journal of information security and applications, Vol.34 (2017), Pt.2, pp.166-182 | Zeitschriftenaufsatz |
2017 | Kirsch, J.; Jonischkeit, C.; Kittel, T.; Zarras, A.; Eckert, C.:
Combating control flow linearization (International Conference on ICT Systems Security and Privacy Protection (SEC) <32, 2017, Rome>) In: De Capitani di Vimercati, Sabrina: ICT systems security and privacy protection. 32nd IFIP TC 11 International Conference, SEC 2017: Rome, Italy, May 29-31, 2017; Proceedings. Cham: Springer International Publishing, 2017. (IFIP advances in information and communication technology 502), pp. 385-398 | Konferenzbeitrag |
2017 | Jacob, N.; Rolfes, C.; Zankl, A.; Heyszl, J.; Sigl, G.:
Compromising FPGA SoCs using malicious hardware blocks (Design, Automation & Test in Europe Conference & Exhibition (DATE) <20, 2017, Lausanne>) In: European Design Automation Association -EDAA-: Design, Automation & Test in Europe, DATE 2017. Proceedings: 27-31 March 2017, Swisstech, Lausanne, Switzerland. Piscataway, NJ: IEEE, 2017, pp. 1122-1127 | Konferenzbeitrag |
2017 | Stephanow, P.; Moein, M.; Banse, C.:
Continuous location validation of cloud service components (International Conference on Cloud Computing Technology and Science (CloudCom) <9, 2017, Hong Kong>) In: Institute of Electrical and Electronics Engineers -IEEE-: CloudCom 2017, IEEE 9th International Conference on Cloud Computing Technology and Science. Proceedings: 11-14 December 2017, Hong Kong, Hong Kong. Piscataway, NJ: IEEE, 2017, pp. 255-262 | Konferenzbeitrag |
2017 | Eckert, C.:
Cybersicherheit beyond 2020!: Herausforderungen für die IT-Sicherheitsforschung In: Informatik-Spektrum, Vol.40 (2017), No.2, pp.141-146 | Zeitschriftenaufsatz |
2017 | Unterstein, F.; Heyszl, J.; Santis, F. de; Specht, R.:
Dissecting leakage resilient PRFs with multivariate localized EM attacks: A practical security evaluation on FPGA (International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE) <8, 2017, Paris>) In: Guilley, S.: Constructive side-channel analysis and secure design. 8th International Workshop, COSADE 2017: Paris, France, April 13-14, 2017; Revised selected papers. Cham: Springer International Publishing, 2017. (Lecture Notes in Computer Science 10348), pp. 34-49 | Konferenzbeitrag |
2017 | Kirsch, J.; Bierbaumer, B.; Kittel, T.; Eckert, C.:
Dynamic loader oriented programming on Linux (Reversing and Offensive-Oriented Trends Symposium (ROOTS) <1, 2017, Vienna>) In: Association for Computing Machinery -ACM-: 1st Reversing and Offensive-oriented Trends Symposium, ROOTS 2017. Proceedings: Vienna, Austria, November 16 - 17, 2017. New York: ACM, 2017, Art. 5 | Konferenzbeitrag |
2017 | Sepulveda, J.; Flórez, D.; Immler, V.; Gogniat, G.; Sigl, G.:
Efficient security zones implementation through hierarchical group key management at NoC-based MPSoCs In: Microprocessors and microsystems, Vol.50 (2017), pp.164-174 | Zeitschriftenaufsatz |
2017 | Kolosnjaji, B.; Eraisha, G.; Webster, G.; Zarras, A.; Eckert, C.:
Empowering convolutional networks for malware classification and analysis (International Joint Conference on Neural Networks (IJCNN) <2017, Anchorage>) In: Institute of Electrical and Electronics Engineers -IEEE-: International Joint Conference on Neural Networks, IJCNN 2017: Anchorage, Alaska, USA 14-19 May 2017. Red Hook, NY: Curran, 2017, pp. 3838-3845 | Konferenzbeitrag |
2017 | Stephanow, P.; Banse, C.:
Evaluating the performance of continuous test-based cloud service certification (International Symposium on Cluster, Cloud and Grid Computing (CCGRID) <17, 2017, Madrid>) In: Institute of Electrical and Electronics Engineers -IEEE-: 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGRID 2017. Proceedings: 14-17 May 2017, Madrid, Spain. Los Alamitos, Calif.: IEEE Computer Society Conference Publishing Services (CPS), 2017, pp. 1117-1126 | Konferenzbeitrag |
2017 | Sepulveda, J.; Gross, M.; Zankl, A.; Sigl, G.:
Exploiting bus communication to improve cache attacks on systems-on-chips (IEEE Computer Society Annual Symposium on VLSI (ISVLSI) <16, 2017, Bochum>) In: Hübner, M.: IEEE Computer Society Annual Symposium on VLSI , ISVLSI 2017. Proceedings: 3-5 July 2017, Bochum, North Rhine-Westfalia, Germany. Los Alamitos, Calif.: IEEE Computer Society Conference Publishing Services (CPS), 2017, pp. 284-289 | Konferenzbeitrag |
2017 | Hesselbarth, R.; Heyszl, J.; Sigl, G.:
Fast and reliable PUF response evaluation from unsettled bistable rings In: Microprocessors and microsystems, Vol.52 (2017), pp.325-332 | Zeitschriftenaufsatz |
2017 | Huber, M.; Horsch, J.; Ali, J.; Wessel, S.:
Freeze & crypt: Linux kernel support for main memory encryption (International Joint Conference on e-Business and Telecommunications (ICETE) <14, 2017, Madrid>) In: Samarati, P.: ICETE 2017, 14th International Joint Conference on e-Business and Telecommunications. Proceedings. Vol.4: SECRYPT: Madrid, Spain, July 24-26, 2017. SciTePress, 2017, pp. 17-30 | Konferenzbeitrag |
2017 | Obermaier, J.; Specht, R.; Sigl, G.:
Fuzzy-glitch: A practical ring oscillator based clock glitch attack (International Conference on Applied Electronics (AE) <22, 2017, Pilsen>) In: Pinker, J.: 22nd International Conference on Applied Electronics, AE 2017: Pilsen, 5-6 September 2017. Piscataway, NJ: IEEE, 2017, pp. 137-142 | Konferenzbeitrag |
2017 | Böttinger, K.:
Guiding a colony of black-box fuzzers with chemotaxis (Security and Privacy Workshops (SPW) <2017, San Jose/Calif.>) In: Gondree, M.: SPW 2017, IEEE Symposium on Security and Privacy Workshops. Proceedings: 25 May 2017, San Jose, California, USA. Piscataway, NJ: IEEE, 2017, pp. 11-16 | Konferenzbeitrag |
2017 | Anding, M.; Boes, A.; Eckert, C.; Harhoff, D.; Hess, T.; Münch, U.; Pretschner, A.:
Herausforderungen an der Schnittstelle von Informatik und Gesellschaft: Institutionalisierte Erforschung der Digitalisierung zur Sicherung von Wohlstand und Fortschritt In: Informatik-Spektrum, Vol.40 (2017), No.2, pp.172-175 | Zeitschriftenaufsatz |
2017 | Hiller, M.; Önalan, A.G.:
Hiding secrecy leakage in leaky helper data (International Conference on Cryptographic Hardware and Embedded Systems (CHES) <19, 2017, Taipei>) In: Fischer, Wieland: Cryptographic hardware and embedded systems - CHES 2017: 19th International Conference, Taipei, Taiwan, September 25-28, 2017; Proceedings. Cham: Springer International Publishing, 2017. (Lecture Notes in Computer Science 10529), pp. 601-619 | Konferenzbeitrag |
2017 | Jacob, N.; Heyszl, J.; Zankl, A.; Rolfes, C.; Sigl, G.:
How to break secure boot on FPGA SoCs through malicious hardware (International Conference on Cryptographic Hardware and Embedded Systems (CHES) <19, 2017, Taipei>) In: Fischer, Wieland: Cryptographic hardware and embedded systems - CHES 2017: 19th International Conference, Taipei, Taiwan, September 25-28, 2017; Proceedings. Cham: Springer International Publishing, 2017. (Lecture Notes in Computer Science 10529), pp. 425-442 | Konferenzbeitrag |
2017 | Koppermann, P.; Santis, F. de; Heyszl, J.; Sigl, G.:
Low-latency X25519 hardware implementation: Breaking the 100 microseconds barrier In: Microprocessors and microsystems, Vol.52 (2017), No.C, pp.491-497 | Zeitschriftenaufsatz |
2017 | Titze, D.; Lux, M.; Schuette, J.:
Ordol: Obfuscation-resilient detection of libraries in android applications (International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) <16, 2017, Sydney>) In: Institute of Electrical and Electronics Engineers -IEEE-: 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017: 1-4 August 2017, Sydney, Australia : proceedings. Piscataway, NJ: IEEE, 2017, pp. 618-625 | Konferenzbeitrag |
2017 | Hansch, Gerhard; Schneider, Peter; Plaga, Sven:
Packet-wise compression and forwarding of industrial network captures (International Conference on Intelligent Data Acquisition and Advanced Computing Systems - Technology and Applications (IDAACS) <9, 2017, Bucharest>) In: Institute of Electrical and Electronics Engineers -IEEE-: IEEE 9th International Conference on Intelligent Data Aquisition and Advanced Computing Systems: Technology and Applications, IDAACS 2017. Proceedings. Vol.1: The crossing point of intelligent data aquisition & advanced computing systems and east & west scientists, September 21-23, 2017, Bucharest, Romania. Piscataway, NJ: IEEE, 2017, pp. 66-70 | Konferenzbeitrag |
2017 | Gulmezoglu, B.; Zankl, A.; Eisenbarth, T.; Sunar, B.:
PerfWeb: How to violate web privacy with hardware performance events (European Symposium on Research in Computer Security (ESORICS) <22, 2017, Oslo>) In: Foley, S.N.: Computer security - ESORICS 2017. 22nd European Symposium on Research in Computer Security. Pt.2: Oslo, Norway, September 11-15, 2017; Proceedings. Cham: Springer International Publishing, 2017. (Lecture Notes in Computer Science 10493), pp. 80-97 | Konferenzbeitrag |
2017 | Kunz, I.; Stephanow, P.:
A process model to support continuous certification of cloud services (International Conference on Advanced Information Networking and Applications (AINA) <31, 2017, Taipei>) In: Barolli, L.: AINA 2017, 31st IEEE International Conference on Advanced Information Networking and Applications. Proceedings: 27-29 March 2017, Tamkang University, Taipei, Taiwan. Piscataway, NJ: IEEE, 2017, pp. 986-993 | Konferenzbeitrag |
2017 | Huber, M.; Horsch, J.; Wessel, S.:
Protecting Suspended Devices from Memory Attacks (European Workshop on Systems Security (EuroSec) <10, 2017, Belgrade>) In: 10th European Workshop on Systems Security, EuroSec 2017. Proceedings: Belgrade, Serbia, April 23 - 26, 2017 . New York: ACM, 2017, Art.10 | Konferenzbeitrag |
2017 | Otto, Boris; Lohmann, Steffen; Auer, Sören; Brost, Gerd; Cirullies, Jan; Eitel, Andreas; Ernst, Thilo; Haas, Christian; Huber, Manuel; Jung, Christian; Jürjens, Jan; Lange, Christoph; Mader, Christian; Menz, Nadja; Nagel, Ralf; Pettenpohl, Heinrich; Pullmann, Jaroslav; Quix, Christoph; Schon, Jochen; Schulz, Daniel; Schütte, Julian; Spiekermann, Markus; Wenzel, Sven:
Reference Architecture Model for the Industrial Data Space München: Fraunhofer-Gesellschaft, 2017 | Bericht |
2017 | Gurschler, Tamara; Großmann, Jürgen; Kotarski, David; Teichmann, Clemens; Thim, Christof; Eichler, Jörn; Göllner, Johannes; Gronau, Norbert; Lechner, Ulrike:
Risikobeurteilung in der IT-Sicherheit Kritischer Infrastrukturen - Eine Analyse der Risikobeurteilung im Förderschwerpunkt ITS|KRITIS (Deutscher IT-Sicherheitskongress <15, 2017, Bonn>) In: Bundesamt für Sicherheit in der Informationstechnik -BSI-, Bonn: Digitale Gesellschaft zwischen Risikobereitschaft und Sicherheitsbedürfnis: Tagungsband des 15. Deutschen IT-Sicherheitskongress 2017, Bonn; 16.-18.05.2017. Gau-Algesheim: SecuMedia Verlag, 2017, pp. 395-410 | Konferenzbeitrag |
2017 | Jacob, N.; Wittmann, J.; Heyszl, J.; Hesselbarth, R.; Wilde, F.; Pehl, M.; Sigl, G.; Fischer, K.:
Securing FPGA SoC configurations independent of their manufacturers (International System on Chip Conference (SOCC) <30, 2017, Munich>) In: Alioto, M.: 30th IEEE International System on Chip Conference, SOCC 2017. Proceedings: September 05-08, 2017, Munich, Germany. Piscataway, NJ: IEEE, 2017, pp. 114-119 | Konferenzbeitrag |
2017 | Zankl, A.; Seuschek, H.; Irazoqui, G.; Gulmezoglu, B.:
Side-Channel Attacks in the Internet of Things: Threats and Challenges In: Druml, Norbert (Ed.): Solutions for Cyber-Physical Systems Ubiquity. Hershey/Pa.: Engineering Science Reference, 2017, pp. 325-357 | Aufsatz in Buch |
2017 | Santis, F. de; Bauer, T.; Sigl, G.:
Squeezing polynomial masking in tower fields. A higher-order masked AES S-box (International Conference on Smart Card Research and Advanced Applications (CARDIS) <15, 2016, Cannes>) In: Lemke-Rust, Kerstin: Smart card research and advanced applications. 15th International Conference, CARDIS 2016: Cannes, France, November 7-9, 2016; Revised selected papers. Cham: Springer International Publishing, 2017. (Lecture Notes in Computer Science 10146), pp. 192-208 | Konferenzbeitrag |
2017 | Fischer, F.; Böttinger, K.; Xiao, H.; Stransky, C.; Acar, Y.; Backes, M.; Fahl, S.:
Stack overflow considered harmful? The impact of copy&paste on Android application security (Symposium on Security and Privacy (SP) <38, 2017, San Jose/Calif.>) In: Institute of Electrical and Electronics Engineers -IEEE-: IEEE Symposium on Security and Privacy, SP 2017. Vol.1: 22-24 May 2017, San Jose, California, USA; Proceedings. Piscataway, NJ: IEEE, 2017, pp. 121-136 | Konferenzbeitrag |
2017 | Angermeier, D.; Nieding, A.; Eichler, J.:
Supporting Risk Assessment with the Systematic Identification, Merging, and Validation of Security Goals (International Workshop on Risk Assessment and Risk-Driven Testing (RISK) <4, 2016, Graz>) In: Großmann, Jürgen (Ed.) et al.: Risk Assessment and Risk-Driven Quality Assurance. 4th International Workshop, RISK 2016: Held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016, Revised Selected Papers. Cham: Springer International Publishing, 2017. (Lecture Notes in Computer Science 10224), pp. 82-95 | Konferenzbeitrag |
2017 | Ahadipour, A.; Schanzenbach, M.:
A survey on authorization in distributed systems: Information storage, data retrieval and trust evaluation (International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) <16, 2017, Sydney>) In: Institute of Electrical and Electronics Engineers -IEEE-: 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017: 1-4 August 2017, Sydney, Australia : proceedings. Piscataway, NJ: IEEE, 2017, pp. 1016-1023 | Konferenzbeitrag |
2017 | Immler, V.; Hiller, M.; Obermaier, J.; Sigl, G.:
Take a moment and have some t: Hypothesis testing on raw PUF data (International Symposium on Hardware-Oriented Security and Trust (HOST) <10, 2017, McLean/Va.>) In: Institute of Electrical and Electronics Engineers -IEEE-: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2017. Proceedings: 1-5 May 2017, The Ritz-Carlton, McLean, VA, USA. Piscataway, NJ: IEEE, 2017, pp. 128-129 | Konferenzbeitrag |
2017 | Banse, C.; Schuette, J.:
A taxonomy-based approach for security in software-defined networking (International Conference on Communications (ICC) <2017, Paris>) In: Beylat, J.-L.: IEEE International Conference on Communications, ICC 2017: 21-25 May 2017 in Paris, France. Piscataway, NJ: IEEE, 2017, 6 pp. | Konferenzbeitrag |
2017 | Stephanow, P.; Khajehmoogahi, K.:
Towards continuous security certification of Software-as-a-Service applications using web application testing techniques (International Conference on Advanced Information Networking and Applications (AINA) <31, 2017, Taipei>) In: Barolli, L.: AINA 2017, 31st IEEE International Conference on Advanced Information Networking and Applications. Proceedings: 27-29 March 2017, Tamkang University, Taipei, Taiwan. Piscataway, NJ: IEEE, 2017, pp. 931-938 | Konferenzbeitrag |
2017 | Guillen, O.M.; Pöppelmann, T.; Bermudo Mera, J.M.; Bongenaar, E.F.; Sigl, G.; Sepulveda, J.:
Towards post-quantum security for IoT endpoints with NTRU (Design, Automation & Test in Europe Conference & Exhibition (DATE) <20, 2017, Lausanne>) In: European Design Automation Association -EDAA-: Design, Automation & Test in Europe, DATE 2017. Proceedings: 27-31 March 2017, Swisstech, Lausanne, Switzerland. Piscataway, NJ: IEEE, 2017, pp. 698-703 | Konferenzbeitrag |
2017 | Sepulveda, J.; Zankl, A.; Florez, D.; Sigl, G.:
Towards protected MPSoC communication for information protection against a Malicious NoC (International Conference on Computational Science (ICCS) <2017, Zurich>) In: Procedia computer science, Vol.108 (2017), pp.1103-1112 | Zeitschriftenaufsatz |
2017 | Guillen, O.M.; Santis, F. de; Brederlow, R.; Sigl, G.:
Towards side-channel secure firmware updates: A minimalist anomaly detection approach (International Symposium on Foundations and Practice of Security (FPS) <9, 2016, Québec>) In: Cuppens, F.: Foundations and practice of security. 9th international symposium, FPS 2016: Québec City, QC, Canada, October 24-25, 2016, revised selected papers. Cham: Springer International Publishing, 2017. (Lecture Notes in Computer Science 10128), pp. 345-360 | Konferenzbeitrag |
2017 | Sepulveda, J.; Gross, M.; Zankl, A.; Sigl, G.:
Towards trace-driven cache attacks on Systems-on-Chips - exploiting bus communication (International Symposium on Reconfigurable Communication-Centric Systems-on-Chip (ReCoSoC) <12, 2017, Madrid>) In: Institute of Electrical and Electronics Engineers -IEEE-: 12th International Symposium on Reconfigurable Communication-centric Systems-on-Chip, ReCoSoC 2017. Proceedings: July 12-14, 2017, Madrid, Spain. Piscataway, NJ: IEEE, 2017, pp. 124-130 | Konferenzbeitrag |
2017 | Horsch, Julian; Huber, Manuel; Wessel, Sascha:
TransCrypt: Transparent main memory encryption using a minimal ARM hypervisor (International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) <16, 2017, Sydney>) In: Institute of Electrical and Electronics Engineers -IEEE-: 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017: 1-4 August 2017, Sydney, Australia : proceedings. Piscataway, NJ: IEEE, 2017, pp. 152-161 | Konferenzbeitrag |
2017 | Immler, V.; Hiller, M.; Liu, Q.; Lenz, A.; Wachter-Zeh, A.:
Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs (International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE) <7, 2017, India>) In: Ali, S.S.: Security, Privacy, and Applied Cryptography Engineering: 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017. Proceedings. Cham: Springer International Publishing, 2017. (Lecture Notes in Computer Science 10662), pp. 190-209 | Konferenzbeitrag |
2017 | Immler, V.; Specht, R.; Unterstein, F.:
Your rails cannot hide from localized EM: How dual-rail logic fails on FPGAs (International Conference on Cryptographic Hardware and Embedded Systems (CHES) <19, 2017, Taipei>) In: Fischer, Wieland: Cryptographic hardware and embedded systems - CHES 2017: 19th International Conference, Taipei, Taiwan, September 25-28, 2017; Proceedings. Cham: Springer International Publishing, 2017. (Lecture Notes in Computer Science 10529), pp. 403-424 | Konferenzbeitrag |
2016 | Langer, L.; Smith, P.; Hutle, M.; Schaeffer-Filho, A.:
Analysing cyber-physical attacks to a Smart Grid: A voltage control use case (Power Systems Computation Conference (PSCC) <19, 2016, Genova>) In: Institute of Electrical and Electronics Engineers -IEEE-: 19th Power Systems Computation Conference, PSCC 2016 Genova. Proceedings: June 20-24, 2016, Centro congressi Porto Antico, Magazzini del Cotone Conference Centre, Genova, Italy. Piscataway, NJ: IEEE, 2016, 7 pp. | Konferenzbeitrag |
2016 | Obermaier, J.; Hutle, M.:
Analyzing the security and privacy of cloud-based video surveillance systems (International Workshop on IoT Privacy, Trust, and Security (IoTPTS) <2, 2016, Xi'an>) In: Association for Computing Machinery -ACM-: IoTPTS 2016, 2nd ACM International Workshop on IoT Privacy, Trust, and Security. Proceedings: Xi'an, China, May 30, 2016. New York: ACM, 2016, pp. 22-28 | Konferenzbeitrag |
2016 | Hesselbarth, Robert:
Apparatus and method for observing a ring of interconnected inverting circuit elements 2016 | Patent |
2016 | Tempelmeier, M.; Santis, F. de; Kaps, J.-P.; Sigl, G.:
An area-optimized serial implementation of ICEPOLE authenticated encryption schemes (International Symposium on Hardware-Oriented Security and Trust (HOST) <2016, McLean/Va.>) In: Institute of Electrical and Electronics Engineers -IEEE-: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2016. Proceedings: 3-5 May 2016, The Ritz-Carlton, McLean, VA, USA. Piscataway, NJ: IEEE, 2016, pp. 49-54 | Konferenzbeitrag |
2016 | Selmke, B.; Heyszl, J.; Sigl, G.:
Attack on a DFA protected AES by simultaneous laser fault injections (Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) <13, 2016, Santa Barbara/Calif.>) In: Maurine, P.: Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2016. Proceedings: 16 August 2016, Santa Barbara, California, USA. Los Alamitos, Calif.: IEEE Computer Society Conference Publishing Services (CPS), 2016, pp. 36-46 | Konferenzbeitrag |
2016 | Seuschek, H.; Heyszl, J.; Santis, F. de:
A cautionary note: Side-channel leakage implications of deterministic signature schemes (Workshop on Cryptography and Security in Computing Systems (CS2) <3, 2016, Prague>) In: Association for Computing Machinery -ACM-: CS2 2016, Third Workshop on Cryptography and Security in Computing Systems : Prague, Czech Republic, January 20, 2016. New York: ACM, 2016, pp. 7-12 | Konferenzbeitrag |
2016 | Böttinger, K.:
Chemotactic test case recombination for large-scale fuzzing In: Journal of Cyber Security and Mobility, Vol.5 (2016), No.4, pp.269-286 | Zeitschriftenaufsatz |
2016 | Horsch, Julian; Wessel, Sascha; Eckert, Claudia:
CoKey: Fast token-based cooperative cryptography (Annual Conference on Computer Security Applications (ACSAC) <32, 2016, Los Angeles/Calif.>) In: Association for Computing Machinery -ACM-: 32nd Annual Conference on Computer Security Applications, ACSAC 2016. Proceedings: Los Angeles, California, December 05 - 08, 2016. New York: ACM, 2016, pp. 314-323 | Konferenzbeitrag |
2016 | Bilzhause, A.; Huber, M.; Pöhls, H.C.; Samelin, K.:
Cryptographically enforced four-eyes principle (International Conference on Availability, Reliability and Security (ARES) <11, 2016, Salzburg>) In: Institute of Electrical and Electronics Engineers -IEEE-: 11th International Conference on Availability, Reliability and Security, ARES 2016: Salzburg, Austria, 31 August - 2 September 2016; Proceedings. Los Alamitos, Calif.: IEEE Computer Society Conference Publishing Services (CPS), 2016, pp. 760-767 | Konferenzbeitrag |
2016 | Schütte, J.; Brost, G.S.:
A data usage control system using dynamic taint tracking (International Conference on Advanced Information Networking and Applications (AINA) <30, 2016, Crans Montana>) In: Barolli, L.: IEEE 30th International Conference on Advanced Information Networking and Applications, AINA 2016. Proceedings: 23-25 March 2016, Crans-Montana, Switzerland. Los Alamitos, Calif.: IEEE Computer Society Conference Publishing Services (CPS), 2016, pp. 909-916 | Konferenzbeitrag |
2016 | Böttinger, K.; Eckert, C.:
DeepFuzz: Triggering vulnerabilities deeply hidden in binaries (Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) <13, 2016, San Sebastián>) In: Caballero, J.: Detection of intrusions and malware, and vulnerability assessment. 13th International Conference, DIMVA 2016: San Sebastián, Spain, July 7-8, 2016; Proceedings. Cham: Springer International Publishing, 2016. (Lecture Notes in Computer Science 9721), pp. 25-34 | Konferenzbeitrag |
2016 | Böttinger, K.; Hansch, G.; Filipovic, B.:
Detecting and correlating supranational threats for critical infrastructures (European Conference on Cyber Warfare and Security (ECCWS) <15, 2016, Munich>) In: Koch, R.: 15th European Conference on Cyber Warfare and Security, ECCWS 2016. Proceedings: Hosted by Universitat der Bundeswehr Munich, Germany 7-8 July 2016. Reading, UK: Academic Conferences and Publishing International Limited, 2016, pp. 34-41 | Konferenzbeitrag |
2016 | Nyberg, R.; Heyszl, J.; Heinz, D.; Sigl, G.:
Enhancing fault emulation of transient faults by separating combinational and sequential fault propagation (Great Lakes Symposium on VLSI (GLSVLSI) <26, 2016, Boston/Mass.>) In: Association for Computing Machinery -ACM-: 26th ACM Great Lakes Symposium on VLSI, GLSVLSI 2016. Proceedings: May 18-20, 2016, Boston, Massachusetts, USA. New York: ACM, 2016, pp. 209-214 | Konferenzbeitrag |
2016 | Hesselbarth, R.; Sigl, G.:
Fast and reliable PUF response evaluation from unsettled bistable rings (Conference in Digital System Design (DSD) <19, 2016, Limassol>) In: Kitsos, P.: DSD 2016, 19th Euromicro Conference in Digital System Design. Proceedings: 31 August-2 September 2016, Limassol, Cyprus. Piscataway, NJ: IEEE, 2016, pp. 82-90 | Konferenzbeitrag |
2016 | Huber, M.; Taubmann, B.; Wessel, S.; Reiser, H.P.; Sigl, G.:
A flexible framework for mobile device forensics based on cold boot attacks In: EURASIP journal on information security, Vol.2016 (2016), Art. 17, 13 pp. | Zeitschriftenaufsatz |
2016 | Böttinger, K.:
Fuzzing binaries with Lévy flight swarms In: EURASIP journal on information security, (2016), No.1, Art. 28, 10 pp. | Zeitschriftenaufsatz |
2016 | Stephanow, P.; Banse, C.; Schütte, J.:
Generating threat profiles for cloud service certification systems (International Symposium on High Assurance Systems Engineering (HASE) <17, 2016, Orlando/Fla.>) In: Babiceanu, R.: IEEE 17th International Symposium on High Assurance Systems Engineering, HASE 2016. Proceedings: 7-9 January 2016, Orlando, Florida, USA. Los Alamitos, Calif.: IEEE Computer Society Conference Publishing Services (CPS), 2016, pp. 260-267 | Konferenzbeitrag |
2016 | Heyszl, J.:
Herausforderungen für Informationssicherheit in eingebetteten Systemen bei Angreifern mit Hardware-Zugriff In: PTB-Mitteilungen, Vol.126 (2016), No.4, pp.25-32 | Zeitschriftenaufsatz |
2016 | Sepulveda, J.; Flórez, D.; Immler, V.; Gogniat, G.; Sigl, G.:
Hierarchical group-key management for NoC-based MPSoCs protection In: Journal of Integrated Circuits and Systems, Vol.11 (2016), No.1, pp.38-48 | Zeitschriftenaufsatz |
2016 | Böttinger, K.:
Hunting bugs with Lévy flight foraging (Symposium on Security and Privacy (SP) <37, 2016, San Jose/Calif.>) In: Locasto, M.: IEEE Symposium on Security and Privacy Workshops, SPW 2016: 23-25 May 2016, San Jose, California, USA; Proceedings. Piscataway, NJ: IEEE, 2016, pp. 111-117 | Konferenzbeitrag |
2016 | Kilic, F.; Laner, H.; Eckert, C.:
Interactive function identification decreasing the effort of reverse engineering (International Conference on Information Security and Cryptology (Inscrypt) <11, 2015, Beijing>) In: Lin, D.: Information security and cryptology. 11th international conference, Inscrypt 2015: Beijing, China, November 1-3, 2015; Revised selected papers. Cham: Springer International Publishing, 2016. (Lecture Notes in Computer Science 9589), pp. 468-487 | Konferenzbeitrag |
2016 | Gall, M.; Brost, G.:
K-word proximity search on encrypted data (International Conference on Advanced Information Networking and Applications (AINA) <30, 2016, Crans Montana>) In: Barolli, L.: IEEE 30th International Conference on Advanced Information Networking and Applications, AINA 2016. Proceedings: 23-25 March 2016, Crans-Montana, Switzerland. Los Alamitos, Calif.: IEEE Computer Society Conference Publishing Services (CPS), 2016, pp. 365-372 | Konferenzbeitrag |
2016 | Plaga, S.; Tatschner, S.; Newe, T.:
Logboat - a simulation framework enabling CAN security assessments (International Conference on Applied Electronics (AE) <21, 2016, Pilsen>) In: Pinker, J.: 21st International Conference on Applied Electronics, AE 2016: Pilsen, 6-7 September 2016. Piscataway, NJ: IEEE, 2016, pp. 215-218 | Konferenzbeitrag |
2016 | Schanzenbach, M.; Banse, C.:
Managing and presenting user attributes over a decentralized secure name system (International Workshop on Data Privacy Management (DPM) <11, 2016, Heraklion>) In: Livraga, G.: Data privacy management and security assurance. 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016: Heraklion, Crete, Greece, September 26-27, 2016; Proceedings; held in conjunction with ESORICS 2016. Cham: Springer International Publishing, 2016. (Lecture Notes in Computer Science 9963), pp. 213-220 | Konferenzbeitrag |
2016 | Teichmann, C.; Renatus, S.; Nieding, A.:
Modellgestützte Risikoanalyse der Sicherheit Kritischer Infrastrukturen für kleine und mittlere Unternehmen: Eine Übersicht (Multikonferenz Wirtschaftsinformatik (MKWI) <2016, Ilmenau>) In: Nissen, Volker: Multikonferenz Wirtschaftsinformatik, MKWI 2016. Bd.2: Technische Universität Ilmenau, 09. - 11. März 2016. Ilmenau: Univ.-Verl. Ilmenau, 2016, pp. 1093-1104 | Konferenzbeitrag |
2016 | Strobel, M.; Wiedermann, N.; Eckert, C.:
Novel weaknesses in IEC 62351 protected Smart Grid control systems (International Conference on Smart Grid Communications (SmartGridComm) <7, 2016, Sydney>) In: Maltabarow, G.: IEEE International Conference on Smart Grid Communications, SmartGridComm 2016: Took place 6-9 November 2016 in Sydney, Australia. Piscataway, NJ: IEEE, 2016, pp. 266-270 | Konferenzbeitrag |
2016 | Hiller, M.; Önalan, A.G.; Sigl, G.; Bossert, M.:
Online reliability testing for PUF key derivation (International Workshop on Trustworthy Embedded Devices (TrustED) <6, 2016, Vienna>) In: Payer, M.: TrustED 2016, 6th International Workshop on Trustworthy Embedded Devices. Proceedings: Vienna, Austria, October 28, 2016. New York: ACM, 2016, pp. 15-22 | Konferenzbeitrag |
2016 | Wagner, S.; Eckert, C.:
Policy-based implicit attestation for microkernel-based virtualized systems (International Conference on Information Security (ISC) <19, 2016, Honolulu/Hawaii>) In: Bishop, M.: Information security. 19th international conference, ISC 2016: Honolulu, HI, USA, September 3-6, 2016; Proceedings. Cham: Springer International Publishing, 2016. (Lecture Notes in Computer Science 9866), pp. 305-322 | Konferenzbeitrag |
2016 | Immler, V.; Hennig, M.; Kürzinger, L.; Sigl, G.:
Practical aspects of quantization and tamper-sensitivity for physically obfuscated keys (Workshop on Cryptography and Security in Computing Systems (CS2) <3, 2016, Prague>) In: Association for Computing Machinery -ACM-: CS2 2016, Third Workshop on Cryptography and Security in Computing Systems: Prague, Czech Republic, January 20, 2016. New York: ACM, 2016, pp. 13-18 | Konferenzbeitrag |
2016 | Selmke, B.; Brummer, S.; Heyszl, J.; Sigl, G.:
Precise laser fault injections into 90 nm and 45 nm SRAM-cells (International Conference on Smart Card Research and Advanced Application (CARDIS) <14, 2015, Bochum>) In: Homma, N.: Smart card research and advanced applications. 14th international conference, CARDIS 2015: Bochum, Germany, November 4-6, 2015; Revised selected papers. Cham: Springer International Publishing, 2016. (Lecture Notes in Computer Science 9514), pp. 193-205 | Konferenzbeitrag |
2016 | Huber, M.; Horsch, J.; Velten, M.; Weiss, M.; Wessel, S.:
A secure architecture for operating system-level virtualization on mobile devices (International Conference on Information Security and Cryptology (Inscrypt) <11, 2015, Beijing>) In: Lin, D.: Information security and cryptology. 11th international conference, Inscrypt 2015: Beijing, China, November 1-3, 2015; Revised selected papers. Cham: Springer International Publishing, 2016. (Lecture Notes in Computer Science 9589), pp. 430-450 | Konferenzbeitrag |
2016 | Fernandes, R.; Marcon, C.; Cataldo, R.; Silveira, J.; Sigl, G.; Sepulveda, J.:
A security aware routing approach for NoC-based MPSoCs (Symposium on Integrated Circuits and Systems Design (SBCCI) <29, 2016, Belo Horizonte>) In: Institute of Electrical and Electronics Engineers -IEEE-: SBCCI 2016, 29th Symposium on Integrated Circuits and Systems Design: CHIP on the Mountains; Belo Horizonte, Minas Gerais, Brazil, August 29 to September 3, 2016; Proceedings. Piscataway, NJ: IEEE, 2016, pp. 103-108 | Konferenzbeitrag |
2016 | Proskurin, S.; Weiß, M.; Sigl, G.:
seTPM: Towards flexible trusted computing on mobile devices based on GlobalPlatform secure elements (International Conference on Smart Card Research and Advanced Application (CARDIS) <14, 2015, Bochum>) In: Homma, N.: Smart card research and advanced applications. 14th international conference, CARDIS 2015: Bochum, Germany, November 4-6, 2015; Revised selected papers. Cham: Springer International Publishing, 2016. (Lecture Notes in Computer Science 9514), pp. 57-74 | Konferenzbeitrag |
2016 | Stephanow, P.; Srivastava, G.; Schütte, J.:
Test-based cloud service certification of opportunistic providers (International Conference on Cloud Computing (CLOUD) <9, 2016, San Francisco/Calif.>) In: Foster, I.: CLOUD 2016, IEEE 9th International Conference on Cloud Computing. Proceedings: 27 June-2 July 2016, San Francisco, California, USA. Piscataway, NJ: IEEE, 2016, pp. 843-848 | Konferenzbeitrag |
2016 | Zankl, A.; Miller, K.; Heyszl, J.; Sigl, G.:
Towards efficient evaluation of a time-driven cache attack on modern processors (European Symposium on Research in Computer Security (ESORICS) <21, 2016, Heraklion>) In: Askoxylakis, Ioannis: Computer security - ESORICS 2016. 21st European Symposium on Research in Computer Security. Pt.2: Heraklion, Greece, September 26-30, 2016; Proceedings. Cham: Springer International Publishing, 2016. (Lecture Notes in Computer Science 9879), pp. 3-19 | Konferenzbeitrag |
2016 | Sepulveda, J.; Florez, D.; Fernandes, R.; Marcon, C.; Gogniat, G.; Sigl, G.:
Towards risk aware NoCs for data protection in MPSoCs (International Symposium on Reconfigurable Communication-Centric Systems-on-Chip (ReCoSoc) <11, 2016, Tallinn>) In: Institute of Electrical and Electronics Engineers -IEEE-: 11th International Symposium on Reconfigurable Communication-Centric Systems-on-Chip, ReCoSoc 2016: June 27-29, 2016, Tallinn, Estonia. Piscataway, NJ: IEEE, 2016, pp. 47-54 | Konferenzbeitrag |
2016 | Koppermann, P.; Santis, F. de; Heyszl, J.; Sigl, G.:
X25519 hardware implementation for low-latency applications (Conference in Digital System Design (DSD) <19, 2016, Limassol>) In: Kitsos, P.: DSD 2016, 19th Euromicro Conference in Digital System Design. Proceedings: 31 August-2 September 2016, Limassol, Cyprus. Piscataway, NJ: IEEE, 2016, pp. 99-106 | Konferenzbeitrag |