Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.
2019Analysis and Mitigation of Security Issues on Android
Titze, D.O.
Dissertation
2019A calibratable detector for invasive attacks
Weiner, M.; Wieser, W.; Lupon, E.; Sigl, G.; Manich, S.
Journal Article
2019Context by Proxy: Identifying Contextual Anomalies Using an Output Proxy
Schulze, Jan-Philipp; Mrowca, Artur; Ren, Elizabeth; Loeliger, Hans-Andrea; Böttinger, Konstantin
Conference Paper
2019Curve Based Cryptography: High-Performance Implementations and Speed Enhancing Methods
Koppermann, C.P.
Dissertation
2019Deriving Impact-driven Security Requirements and Monitoring Measures for Industrial IoT
Hansch, G.; Schneider, P.; Brost, G.S.
Conference Paper
2019Differential Fault Attacks on KLEIN
Gruber, M.; Selmke, B.
Conference Paper
2019Dominance as a New Trusted Computing Primitive for the Internet of Things
Xu, M.; Huber, M.; Sun, Z.; England, P.; Peinado, M.; Lee, S.; Marochko, A.; Mattoon, D.; Spiger, R.; Thom, S.
Conference Paper
2019Extracting Secrets from Encrypted Virtual Machines
Morbitzer, M.; Huber, M.; Horsch, J.
Conference Paper
2019EyeSec: A Retrofittable Augmented Reality Tool for Troubleshooting Wireless Sensor Networks in the Field
Striegel, M.; Rolfes, C.; Heyszl, J.; Helfert, F.; Hornung, M.; Sigl, G.
Conference Paper
2019A framework to assess impacts of cyber attacks in manufacturing
Giehl, A.; Wiedermann, N.; Plaga, S.
Conference Paper
2019Fraunhofer-Institut für Angewandte und Integrierte Sicherheit. Jahresbericht 2018/2019
 
Annual Report
2019Freeze and crypt: Linux kernel support for main memory encryption
Huber, M.; Horsch, J.; Ali, J.; Wessel, S.
Journal Article
2019Future Proofing IoT Embedded Platforms for Cryptographic Primitives Support
Plaga, S.; Wiedermann, N.; Niedermaier, M.; Giehl, A.; Newe, T.
Conference Paper
2019Fuzzing with Stochastic Feedback Processes
Böttinger, K.
Dissertation
2019Identifying Mislabeled Instances in Classification Datasets
Müller, N.M.; Markert, K.
Conference Paper
2019IoTAG: An Open Standard for IoT Device IdentificAtion and RecoGnition
Fischer, Sebastian; Neubauer, Katrin; Hinterberger, Lukas; Weber, Bernhard; Hackenberg, Rudolf
Conference Paper
2019New Insights to Key Derivation for Tamper-Evident Physical Unclonable Functions
Immler, V.; Uppund, K.
Journal Article
2019Realistic Data Generation for Anomaly Detection in Industrial Settings Using Simulations
Schneider, P.; Giehl, A.
Conference Paper
2019Reducing Implementation Efforts in Continuous Auditing Certification Via an Audit API
Knoblauch, D.; Banse, C.
Conference Paper
2019Reference Architecture Model. Version 3.0
Otto, Boris; Steinbuss, Sebastian; Teuscher, Andreas; Lohmann, Steffen; Bader, Sebastian; Birnstil, P.; Böhmer, M.; Brost, G.; Cirullies, J.; Eitel, A.; Ernst, T.; Geisler, S.; Gelhaar, J.; Gude, R.; Haas, C.; Huber, M.; Jung, C.; Jürjens, J.; Lange, C.; Lis, D.; Mader, C.; Menz, N.; Nagel, R.; Patzer, F.; Pettenpohl, H.; Pullmann, J.; Quix, C.; Schulz, D.; Schütte, J. et al.
Report
2019Risk Analysis of the Cloud Infrastructure of Smart Grid and Internet of Things
Neubauer, Katrin; Fischer, Sebastian; Hackenberg, Rudolf
Conference Paper
2019Scanclave: Verifying Application Runtime Integrity in Untrusted Environmen
Morbitzer, M.
Conference Paper
2019Secure Physical Enclosures from Coverswith Tamper-Resistance
Immler, V.; Obermaier, J.; Ng, K.K.; Ke, F.X.; Lee, J.; Lim, Y.P.; Oh, W.K.; Wee, K.H.; Sigl, G.
Journal Article
2019Securing future decentralised industrial IoT infrastructures: Challenges and free open source solutions
Plaga, S.; Wiedermann, N.; Anton, S.D.; Tatschner, S.; Schotten, H.; Newe, T.
Journal Article
2019A Security Architecture for RISC-V based IoT Devices
Auer, Lukas; Skubich, Christian; Hiller, Matthias
Conference Paper
2019Side-Channel Aware Fuzzing
Sperl, Philip; Böttinger, Konstantin
Conference Paper
2019A Theoretical Model to Link Uniqueness and Min-Entropy for PUF Evaluations
Gu, C.; Liu, W.; Hanley, N.; Hesselbarth, R.; O'Neill, M.
Journal Article
2019A Unified Architecture for Industrial IoT Security Requirements in Open Platform Communications
Hansch, G.; Schneider, P.; Fischer, K.; Böttinger, K.
Conference Paper
2019Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs
Immler, V.; Hiller, M.; Liu, Q.; Lenz, A.; Wachter-Zeh, A.
Journal Article
2019Work in Progress: Security Analysis for Safety-critical Systems: Smart Grid and IoT
Neubauer, Katrin; Hackenberg, Rudolf; Fischer, Sebastian
Conference Paper
2018Adding Channel Binding for an Out-of-Band OTP Authentication Protocol in an Industrial Use-Case
Plaga, S.; Niethammer, M.; Wiedermann, N.; Borisov, A.
Conference Paper
2018Algorithmic and Protocol Level Countermeasures to Protect Cryptographic Devices
Santis, F. De
Dissertation
2018B-TREPID: Batteryless tamper-resistant envelope with a PUF and integrity detection
Immler, V.; Obermaier, J.; König, M.; Hiller, M.; Sig, G.
Conference Paper
2018BDABE - Blockchain-based Distributed Attribute based Encryption
Bramm, G.; Gall, M.; Schütte, J.
Conference Paper
2018Blockchain and smart contracts
Schütte, Julian; Fridgen, Gilbert; Prinz, Wolfgang; Rose, Thomas; Urbach, Nils; Hoeren, Thomas; Guggenberger, Nikolas; Welzel, Christian; Holly, Steffen; Schulte, Axel; Sprenger, Philipp; Schwede, Christian; Weimert, Birgit; Otto, Boris; Dalheimer, Mathias; Wenzel, Markus; Kreutzer, Michael; Fritz, Michael; Leiner, Ulrich; Nouak, Alexander
: Prinz, Wolfgang (Ed.); Schulte, Axel T. (Ed.)
Report
2018Blockchain for Education: Lifelong Learning Passport
Gräther, Wolfgang; Kolvenbach, Sabine; Ruland, Rudolf; Julian, Schütte; Ferreira Torres, Cristof; Wendland, Florian
Conference Paper
2018Capacitive multi-channel security sensor IC for tamper-resistant enclosures
Ferres, Elischa; Immler, Vincent; Stanitzki, Alexander; Lerch, Renee; Kokozinski, Rainer
Conference Paper
2018Continuous Test-Based Certification of Cloud Services
Stephanow-Gierach, P.
Dissertation
2018Deep Reinforcement Fuzzing
Böttinger, K.; Godefroid, P.; Singh, R.
Conference Paper
2018Deep Reinforcement Fuzzing
Böttinger, K.; Godefroid, P.; Singh, R.
Conference Paper
2018Dividing the threshold: Multi-probe localized EM analysis on threshold implementations
Specht, R.; Immler, V.; Unterstein, F.; Heyszl, J.; Sig, G.
Conference Paper
2018Earthquake: A NoC-based optimized differential cache-collision attack for MPSoCs
Reinbrecht, C.; Forlin, B.; Zankl, A.; Sepúlveda, J.
Conference Paper
2018An Ecosystem and IoT Device Architecture for Building Trust in the Industrial Data Space
Brost, G.S.; Huber, M.; Weiß, M.; Protsenko, M.; Schütte, J.; Wessel, S.
Conference Paper
2018An embedded key management system for PUF-based security enclosures
Obermaier, J.; Hauschild, F.; Hiller, M.; Sigl, G.
Conference Paper
2018Enhancing NFV Orchestration with Security Policies
Wendland, F.; Banse, C.
Conference Paper
2018Fast FPGA Implementations of Diffie-Hellman on the Kummer Surface of a Genus-2 Curve
Koppermann, P.; Santis, F. De; Heyszl, J.; Sigl, G.
Journal Article
2018High-performance unsupervised anomaly detection for cyber-physical system networks
Schneider, Peter; Böttinger, Konstantin
Conference Paper
2018High-resolution EM attacks against leakage-resilient PRFs Explained
Unterstein, F.; Heyszl, J.; Santis, F. de; Specht, R.; Sigl, G.
Conference Paper
2018IDS Reference Architecture Model. Industrial Data Space. Version 2.0
Otto, Boris; Lohmann, Steffen; Steinbuss, Sebastian; Teuscher, Andreas; Auer, Soeren; Boehmer, Martin; Bohn, Juergen; Brost, Gerd; Cirullies, Jan; Ciureanu, Constantin; Corsi, Eva; Danielsen, Soeren; Eitel, Andreas; Ernst, Thilo; Geisler, Sandra; Gelhaar, Joshua; Gude, Roland; Haas, Christian; Heiles, Juergen; Hierro, Juanjo; Hoernle, Joachim; Huber, Manuel; Jung, Christian; Juerjens, Jan; Kasprzik, Anna; Ketterl, Markus; Koetzsch, Judith; Koehler, Jacob; Lange, Christoph; Langer, Dorothea; Langkau, Joerg; Lis, Dominik; Loeffler, Sven; Loewen, Ulrich; Mader, Christian; Menz, Nadja; Mueller, Andreas; Mueller, Bernhard; Nagel, Lars; Nagel, Ralf; Nieminen, Harri; Reitelbach, Thomas; Resetko, Aleksei; Pakkala, Daniel; Patzer, Florian; Pettenpohl, Heinrich; Pietzsch, Rene; Pullmann, Jaroslav; Punter, Matthijs; Quix, Christoph; Rohrmus, Dominik; Romer, Lena; Sandloehken, Joerg; Schoewe, Patrick; Schulz, Daniel; Schuette, Julian; Schweichhart, Karsten; Sol, Egbert-Jan; Sorowka, Peter; Spiegelberg, Gernot;
Report
2018Implementing a performant security control for Industrial Ethernet
Giehl, A.; Plaga, S.
Conference Paper
2018Implicit remote attestation for microkernel-based embedded systems
Wagner, S.
Dissertation
2018Investigating fingerprinters and fingerprinting-alike behaviour of android applications
Ferreira Torres, C.; Jonker, H.
Conference Paper
2018Large scale RO PUF analysis over slice type, evaluation time and temperature on 28nm Xilinx FPGAs
Hesselbarth, R.; Wilde, F.; Gu, C.; Hanley, N.
Conference Paper
2018A leak-resilient dual stack scheme for backward-edge control-flow integrity
Zieris, Philipp; Horsch, Julian
Conference Paper
2018Locked out by Latch-up? An Empirical Study on Laser Fault Injection into Arm Cortex-M Processors
Selmke, B.; Zinnecker, K.; Koppermann, P.; Miller, K.; Heyszl, J.; Sigl, G.
Conference Paper
2018The low area probing detector as a countermeasure against invasive attacks
Weiner, M.; Manich, S.; Rodriguez-Montanes, R.; Sigl, G.
Journal Article
2018LUCON: Data Flow Control for Message-Based IoT Systems
Schütte, J.; Brost, G.S.
Conference Paper
2018A measurement system for capacitive PUF-based security enclosures
Obermaier, J.; Immler, V.; Hiller, M.; Sigl, G.
Conference Paper
2018New Techniques for Emulating Fault Attacks
Nyberg, R.H.-E.
Dissertation
2018The Past, Present, and Future of Physical Security Enclosures: From Battery-Backed Monitoring to PUF-Based Inherent Security and Beyond
Obermaier, J.; Immler, V.
Journal Article
2018Practical Decentralized Attribute-Based Delegation Using Secure Name Systems
Schanzenbach, M.; Banse, C.; Schütte, J.
Conference Paper
2018Programming Experience Might Not Help in Comprehending Obfuscated Source Code Efficiently
Hänsch, N.; Schankin, A.; Protsenko, M.; Freiling, F.; Benenson, Z.
Conference Paper
2018A Rapid Innovation Framework for Connected Mobility Applications
Pöhn, Daniela; Wessel, Sascha; Fischer, Felix; Braunsdorf, Oliver; Wenninger, Franz; Seydel, Dominique; Weiß, Gereon; Roscher, Karsten
: Freese-Wagner, Manuela (Hrsg.)
Study
2018reclaimID: Secure, Self-Sovereign Identities Using Name Systems and Attribute-Based Encryption
Schanzenbach, M.; Bramm, G.; Schütte, J.
Conference Paper
2018Rowhammer - A Survey Assessing the Severity of this Attack Vector
Wiedermann, N.; Plaga, S.
Conference Paper
2018Safety & security testing of cooperative automotive systems
Seydel, Dominique; Weiß, Gereon; Pöhn, Daniela; Wessel, Sascha; Wenninger, Franz
Conference Paper
2018Secure Code Execution: A Generic PUF-Driven System Architecture
Kleber, S.; Unterstein, F.; Hiller, M.; Slomka, F.; Matousek, M.; Kargl, F.; Bösch, C.
Conference Paper
2018Secure your SSH Keys! Motivation and practical implementation of a HSM-based approach securing private SSH-Keys
Plaga, S.; Wiedermann, N.; Hansch, G.; Newe, T.
Conference Paper
2018Security Verification of Third Party Design Files in Manufacturing
Giehl, Alexander; Wiedermann, Norbert
Conference Paper
2018SEVered: Subverting AMD's virtual machine encryption
Morbitzer, Mathias; Huber, Manuel; Horsch, Julian; Wessel, Sascha
Conference Paper
2018Sichere Prozesse für moderne Geschäftsmodelle
Giehl, Alexander; Schneider, Peter
Journal Article
2018Tackling Androids Native Library Malware with Robust, Efficient and Accurate Similarity Measures
Kalysch, A.; Milisterfer, O.; Protsenko, M.; Müller, T.
Conference Paper
2018Testing Cryptographically Secure Pseudo Random Number Generators with Artificial Neural Networks
Fischer, T.
Conference Paper
2018Your rails cannot hide from localized EM
Immler, V.; Specht, R.; Unterstein, F.
Journal Article