Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.
2021Activation Anomaly Analysis
Sperl, Philip; Schulze, Jan-Philipp; Böttinger, Konstantin
Conference Paper
2021Adversarial Vulnerability of Active Transfer Learning
Müller, N.M.; Böttinger, K.
Conference Paper
2021Beyond Cache Attacks: Exploiting the Bus-based Communication Structure for Powerful On-Chip Microarchitectural Attacks
Sepulveda, J.; Gross, M.; Zankl, A.; Sigl, G.
Journal Article
2021Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber
Hamburg, Mike; Hermelink, Julius; Primas, Robert; Samardjiska, Simona; Schamberger, Thomas; Streit, Silvan; Strieder, Emanuele; Vredendaal, Christine van
Journal Article
2021A Comparative Security Analysis of the German Federal Postal Voting Process
Heinl, Michael P.; Gölz, Simon; Bösch, Christoph
Conference Paper
2021The Cost of OSCORE and EDHOC for Constrained Devices
Hristozov, S.; Huber, M.; Xu, L.; Fietz, J.; Liess, M.; Sigl, G.
Conference Paper
2021Decentralized Identities for Self-sovereign End-users (DISSENS)
Schanzenbach, Martin; Grothoff, Christian; Wenger, Hansjürg; Kaul, Maximilian
Conference Paper
2021Does Every Second Count? Time-based Evolution of Malware Behavior in Sandboxes
Küchler, Alexander; Mantovani, Alessandro; Han, Yufei; Bilge, Leyla; Balzarotti, Davide
Conference Paper
2021DOMREP–An Orthogonal Countermeasure for Arbitrary Order Side-Channel and Fault Attack Protection
Gruber, M.; Probst, M.; Karl, P.; Schamberger, T.; Tebelmann, L.; Tempelmeier, M.; Sigl, G.
Journal Article
2021Finding the Needle in the Haystack: Metrics for Best Trace Selection in Unsupervised Side-Channel Attacks on Blinded RSA
Kulow, A.; Schamberger, T.; Tebelmann, L.; Sigl, G.
Journal Article
2021Leveraging Edge Computing and Differential Privacy to Securely Enable Industrial Cloud Collaboration Along the Value Chain
Giehl, Alexander; Heinl, Michael P.; Busch, Maximilian
Conference Paper
2021Medina: Improving cloud services trustworthiness through continuous audit-based certification
Orue-Echevarria, L.; Garcia, J.L.; Banse, C.; Alonso, J.
Conference Paper
2021Privatsphäre und Maschinelles Lernen
Boenisch, Franziska
Journal Article
2021The Stream Exchange Protocol: A Secure and Lightweight Tool for Decentralized Connection Establishment
Tatschner, S.; Jarisch, F.; Giehl, A.; Plaga, S.; Newe, T.
Journal Article
2021Tapeout of a RISC-V crypto chip with hardware trojans: A case-study on trojan design and pre-silicon detectability
Hepp, A.; Sigl, G.
Conference Paper
2020AntiPatterns Regarding the Application of Cryptographic Primitives by the Example of Ransomware
Heinl, Michael P.; Giehl, Alexander; Graif, Lukas
Conference Paper
2020Applicability of Security Standards for Operational Technology by SMEs and Large Enterprises
Wagner, Patrick; Hansch, Gerhard; Konrad, Christoph; John, Karl-Heinz; Bauer, Jochen; Franke, Jörg
Conference Paper
2020Architecture of an intelligent Intrusion Detection System for Smart Home
Graf, J.; Neubauer, K.; Fischer, S.; Hackenberg, R.
Conference Paper
2020Automating Security Risk and Requirements Management for Cyber-Physical Systems
Hansch, Gerhard
Dissertation
2020Breaking the lightweight secure PUF: Understanding the relation of input transformations and machine learning resistance
Wisiol, N.; Becker, G.T.; Margraf, M.; Soroceanu, T.A.A.; Tobisch, J.; Zengin, B.
Conference Paper
2020cipherPath: Efficient traversals over homomorphically encrypted paths
Bramm, G.; Schütte, J.
Conference Paper
2020Data Poisoning Attacks on Regression Learning and Corresponding Defenses
Müller, N.; Kowatsch, D.; Böttinger, K.
Conference Paper
2020Datenplattform nach dem Security-by-Design-Prinzip: Produktionsdaten sicher in der Cloud verarbeiten
Giehl, Alexander; Heinl, Michael P.
Journal Article
2020Deutsche Normungsroadmap Künstliche Intelligenz
Adler, R.; Kolomiichuk, Sergii; Hecker, Dirk; Lämmel, Philipp; Ma, Jackie; Marko, Angelina; Mock, Michael; Nagel, Tobias; Poretschkin, Maximilian; Rennoch, Axel; Röhler, Marcus; Ruf, Miriam; Schönhof, Raoul; Schneider, Martin A.; Tcholtchev, Nikolay; Ziehn, Jens; Böttinger, Konstantin; Jedlitschka, Andreas; Oala, Luis; Sperl, Philip; Wenzel, Markus; et. al.
: Wahlster, W.; Winterhalter, C.
Study
2020DLA: Dense-Layer-Analysis for Adversarial Example Detection
Sperl, Philip; Kao, Ching-yu; Chen, Peng; Lei, Xiao; Böttinger, Konstantin
Conference Paper
2020Drei Fragen an... das Fraunhofer AISEC. "Security als sich kontinuierlich weiterentwickelnder Prozess"
Heinl, Michael P.; Giehl, Alexander
Internet Contribution
2020An Edge Framework for the Application of Privacy Enhancing Technologies in IoT Communications
Kunz, I.; Stephanow, P.; Banse, C.
Conference Paper
2020Exploiting Interfaces of Secure Encrypted Virtual Machines
Radev, Martin; Morbitzer, Mathias
Conference Paper
2020FridgeLock: Preventing Data Theft on Suspended Linux with Usable Memory Encryption
Franzen, F.; Andreas, M.; Huber, M.
Conference Paper
2020Integrating security evaluations into virtual commissioning
Giehl, Alexander; Wiedermann, Norbert; Tayebi Gholamzadeh, Makan; Eckert, Claudia
Conference Paper
2020The Lazarus Effect: Healing Compromised Devices in the Internet of Small Things
Huber, M.; Hristozov, S.; Ott, S.; Sarafov, V.; Peinado, M.
Conference Paper
2020Optimizing Information Loss Towards Robust Neural Networks
Sperl, Philip; Böttinger, Konstantin
Conference Paper
2020Privacy smells: Detecting privacy problems in cloud architectures
Kunz, I.; Schneider, A.; Banse, C.
Conference Paper
2020Protecting RESTful IoT Devices from Battery Exhaustion DoS Attacks
Hristozov, S.; Huber, M.; Sigl, G.
Conference Paper
2020Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers
Unterstein, Florian; Schink, Marc; Schamberger, Thomas; Tebelmann, Lars; Ilg, Manuel; Heyszl, Johann
Journal Article
2020Review of error correction for PUFs and evaluation on state-of-the-art FPGAs
Hiller, Matthias; Kürzinger, Ludwig; Sigl, Georg
Journal Article
2020Secure and user-friendly over-the-air firmware distribution in a portable faraday cage
Striegel, M.; Heyszl, J.; Jakobsmeier, F.; Matveev, Y.; Sigl, G.
Conference Paper
2020Selecting privacy enhancing technologies for IoT-based services
Kunz, I.; Banse, C.; Stephanow, P.
Conference Paper
2020SEVurity: No security without integrity: Ng integrity-free memory encryption with minimal assumptions
Wilke, L.; Wichelmann, J.; Morbitzer, M.; Eisenbarth, T.
Conference Paper
2020Sicherheitsaspekte der Plattform ScaleIT im Kontext von DigitalTWIN
Wester, Hannah; Heinl, Michael P.; Schneider, Peter
Report
2020Spatial Context Tree Weighting for Physical Unclonable Functions
Pehl, M.; Tretschok, T.; Becker, D.; Immler, V.
Conference Paper
2020Temporary Laser Fault Injection into Flash Memory: Calibration, Enhanced Attacks, and Countermeasures
Garb, K.; Obermaier, J.
Conference Paper
2020Towards resilient factories of future defining required capabilities for a resilient factory of future
Glawe, M.; Feeken, L.; Wudka, B.; Kao, C.-Y.; Mirzaei, E.; Weinhold, T.; Szanto, A.
Conference Paper
2020Towards Resistant Audio Adversarial Examples
Dörr, T.; Markert, K.; Müller, N.M.; Böttinger, K.
Conference Paper
2020Towards Self-sovereign, decentralized personal data sharing and identity management
Schanzenbach, Martin
Dissertation
2020Towards tracking data flows in cloud architectures
Kunz, I.; Casola, V.; Schneider, A.; Banse, C.; Schütte, J.
Conference Paper
2020Towards Transparent Control-Flow Integrity in Safety-Critical Systems
Kuzhiyelil, D.; Zieris, P.; Kadar, M.; Tverdyshev, S.; Fohler, G.
Conference Paper
2019Analysis and Mitigation of Security Issues on Android
Titze, D.O.
Dissertation
2019Annotary: A Concolic Execution System for Developing Secure Smart Contracts
Weiss, K.; Schütte, J.
Conference Paper
2019Breaking TrustZone memory isolation through malicious hardware on a modern FPGA-SoC
Gross, M.; Jacob, N.; Zankl, A.; Sigl, G.
Conference Paper
2019A calibratable detector for invasive attacks
Weiner, M.; Wieser, W.; Lupon, E.; Sigl, G.; Manich, S.
Journal Article
2019Clear Sanctions, Vague Rewards: How China's Social Credit System Currently Defines "Good" and "Bad" Behavior
Engelmann, S.; Chen, M.; Fischer, F.; Kao, C.Y.; Grossklags, J.
Conference Paper
2019Context by Proxy: Identifying Contextual Anomalies Using an Output Proxy
Schulze, Jan-Philipp; Mrowca, Artur; Ren, Elizabeth; Loeliger, Hans-Andrea; Böttinger, Konstantin
Conference Paper
2019Curve Based Cryptography: High-Performance Implementations and Speed Enhancing Methods
Koppermann, C.P.
Dissertation
2019Deriving Impact-driven Security Requirements and Monitoring Measures for Industrial IoT
Hansch, G.; Schneider, P.; Brost, G.S.
Conference Paper
2019Differential Fault Attacks on KLEIN
Gruber, M.; Selmke, B.
Conference Paper
2019Distributed anomaly detection of single mote attacks in RPL networks
Müller, N.M.; Debus, P.; Kowatsch, D.; Böttinger, K.
Conference Paper
2019Do's and Don'ts of Distributed Intrusion Detection for Industrial Network Topologies
Schneider, P.
Conference Paper
2019Dominance as a New Trusted Computing Primitive for the Internet of Things
Xu, M.; Huber, M.; Sun, Z.; England, P.; Peinado, M.; Lee, S.; Marochko, A.; Mattoon, D.; Spiger, R.; Thom, S.
Conference Paper
2019Edge-computing enhanced privacy protection for industrial ecosystems in the context of SMEs
Giehl, Alexander; Schneider, Peter; Busch, Maximilian; Schnoes, Florian; Kleinwort, Robin; Zaeh, Michael F.
Conference Paper
2019Extracting Secrets from Encrypted Virtual Machines
Morbitzer, M.; Huber, M.; Horsch, J.
Conference Paper
2019EyeSec: A Retrofittable Augmented Reality Tool for Troubleshooting Wireless Sensor Networks in the Field
Striegel, M.; Rolfes, C.; Heyszl, J.; Helfert, F.; Hornung, M.; Sigl, G.
Conference Paper
2019A framework to assess impacts of cyber attacks in manufacturing
Giehl, A.; Wiedermann, N.; Plaga, S.
Conference Paper
2019Fraunhofer-Institut für Angewandte und Integrierte Sicherheit. Jahresbericht 2018/2019
 
Annual Report
2019Freeze and crypt: Linux kernel support for main memory encryption
Huber, M.; Horsch, J.; Ali, J.; Wessel, S.
Journal Article
2019Future Proofing IoT Embedded Platforms for Cryptographic Primitives Support
Plaga, S.; Wiedermann, N.; Niedermaier, M.; Giehl, A.; Newe, T.
Conference Paper
2019Fuzzing with Stochastic Feedback Processes
Böttinger, K.
Dissertation
2019Identifying Mislabeled Instances in Classification Datasets
Müller, N.M.; Markert, K.
Conference Paper
2019IoTAG: An Open Standard for IoT Device IdentificAtion and RecoGnition
Fischer, Sebastian; Neubauer, Katrin; Hinterberger, Lukas; Weber, Bernhard; Hackenberg, Rudolf
Conference Paper
2019MERCAT: A Metric for the Evaluation and Reconsideration of Certificate Authority Trustworthiness
Heinl, Michael P.; Giehl, Alexander; Wiedermann, Norbert; Plaga, Sven; Kargl, Frank
Conference Paper
2019Method and device for providing at least one cryptographic key for at least one mobile device
Striegel, Martin; Selmke, Bodo; Miller, Katja
Patent
2019A Metric to Assess the Trustworthiness of Certificate Authorities
Heinl, Michael P.
: Kargl, F.; Eckert, C.
Master Thesis
2019New Insights to Key Derivation for Tamper-Evident Physical Unclonable Functions
Immler, V.; Uppund, K.
Journal Article
2019On GDPR Compliance of Companies’ Privacy Policies
Müller, N.M.; Kowatsch, D.; Debus, P.; Mirdita, D.; Böttinger, K.
Conference Paper
2019Peak clock: Fault injection into PLL-based systems via clock manipulation
Selmke, B.; Hauschild, F.; Obermaier, J.
Conference Paper
2019Post-Quantum Software Updates
Gazdag, S.-L.; Friedl, M.; Loebenberger, D.
Conference Paper
2019PUF-film and method for producing the same
Obermaier, Johannes; Immler, Vincent; Hesselbarth, Robert
Patent
2019PUF-film and method for producing the same
Immler, Vincent; Obermaier, Johannes
Patent
2019Realistic Data Generation for Anomaly Detection in Industrial Settings Using Simulations
Schneider, P.; Giehl, A.
Conference Paper
2019Reducing Implementation Efforts in Continuous Auditing Certification Via an Audit API
Knoblauch, Dorian; Banse, Christian
Conference Paper
2019Reference Architecture Model. Version 3.0
Otto, Boris; Steinbuss, Sebastian; Teuscher, Andreas; Lohmann, Steffen; Bader, Sebastian; Birnstil, P.; Böhmer, M.; Brost, G.; Cirullies, J.; Eitel, A.; Ernst, T.; Geisler, S.; Gelhaar, J.; Gude, R.; Haas, C.; Huber, M.; Jung, C.; Jürjens, J.; Lange, C.; Lis, D.; Mader, C.; Menz, N.; Nagel, R.; Patzer, F.; Pettenpohl, H.; Pullmann, J.; Quix, C.; Schulz, D.; Schütte, J. et al.
Report
2019Risk Analysis of the Cloud Infrastructure of Smart Grid and Internet of Things
Neubauer, Katrin; Fischer, Sebastian; Hackenberg, Rudolf
Conference Paper
2019SCA secure and updatable crypto engines for FPGA SoC bitstream decryption
Unterstein, F.; Jacob, N.; Hanley, N.; Gu, C.; Heyszl, J.
Conference Paper
2019Scanclave: Verifying Application Runtime Integrity in Untrusted Environmen
Morbitzer, M.
Conference Paper
2019Secure Physical Enclosures from Coverswith Tamper-Resistance
Immler, V.; Obermaier, J.; Ng, K.K.; Ke, F.X.; Lee, J.; Lim, Y.P.; Oh, W.K.; Wee, K.H.; Sigl, G.
Journal Article
2019Securing future decentralised industrial IoT infrastructures: Challenges and free open source solutions
Plaga, S.; Wiedermann, N.; Anton, S.D.; Tatschner, S.; Schotten, H.; Newe, T.
Journal Article
2019A Security Architecture for RISC-V based IoT Devices
Auer, Lukas; Skubich, Christian; Hiller, Matthias
Conference Paper
2019Side-Channel Analysis of the TERO PUF
Tebelmann, L.; Pehl, M.; Immler, V.
Conference Paper
2019Side-Channel Aware Fuzzing
Sperl, Philip; Böttinger, Konstantin
Conference Paper
2019Smart Intersections Improve Traffic Flow and Safety
Striegel, Martin; Otto, Thomas
Journal Article
2019Taking a Look into Execute-Only Memory
Schink, Marc; Obermaier, Johannes
Conference Paper
2019A Theoretical Model to Link Uniqueness and Min-Entropy for PUF Evaluations
Gu, C.; Liu, W.; Hanley, N.; Hesselbarth, R.; O'Neill, M.
Journal Article
2019A Unified Architecture for Industrial IoT Security Requirements in Open Platform Communications
Hansch, G.; Schneider, P.; Fischer, K.; Böttinger, K.
Conference Paper
2019Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs
Immler, V.; Hiller, M.; Liu, Q.; Lenz, A.; Wachter-Zeh, A.
Journal Article
2019Verfahren zur Verifikationsprüfung eines Sicherheitsdokuments mit einem gedruckten Sicherheitsmerkmal, Sicherheitsmerkmal und Anordnung zur Verifikation
Fischer, Jörg; Hiller, Matthias; Horsch, Julian; Wessel, Sascha; Kulikowsky, Lazar; Fritze, Frank; Paeschke, Manfred
Patent
2019Work in Progress: Security Analysis for Safety-critical Systems: Smart Grid and IoT
Neubauer, Katrin; Hackenberg, Rudolf; Fischer, Sebastian
Conference Paper
2019ZKLaims: Privacy-preserving Attribute-based Credentials using Non-interactive Zero-knowledge Techniques
Schanzenbach, M.; Kilian, T.; Schütte, J.; Banse, C.
Conference Paper