Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.
2021Activation Anomaly Analysis
Sperl, Philip; Schulze, Jan-Philipp; Böttinger, Konstantin
Conference Paper
2021Adversarial Vulnerability of Active Transfer Learning
Müller, N.M.; Böttinger, K.
Conference Paper
2021Beyond Cache Attacks: Exploiting the Bus-based Communication Structure for Powerful On-Chip Microarchitectural Attacks
Sepulveda, J.; Gross, M.; Zankl, A.; Sigl, G.
Journal Article
2021Breaking TrustZone memory isolation and secure boot through malicious hardware on a modern FPGA-SoC
Gross, M.; Jacob, N.; Zankl, A.; Sigl, G.
Journal Article
2021Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber
Hamburg, Mike; Hermelink, Julius; Primas, Robert; Samardjiska, Simona; Schamberger, Thomas; Streit, Silvan; Strieder, Emanuele; Vredendaal, Christine van
Journal Article
2021A Comparative Security Analysis of the German Federal Postal Voting Process
Heinl, Michael P.; Gölz, Simon; Bösch, Christoph
Conference Paper
2021The Cost of OSCORE and EDHOC for Constrained Devices
Hristozov, S.; Huber, M.; Xu, L.; Fietz, J.; Liess, M.; Sigl, G.
Conference Paper
2021Decentralized Identities for Self-sovereign End-users (DISSENS)
Schanzenbach, Martin; Grothoff, Christian; Wenger, Hansjürg; Kaul, Maximilian
Conference Paper
2021Does Every Second Count? Time-based Evolution of Malware Behavior in Sandboxes
Küchler, Alexander; Mantovani, Alessandro; Han, Yufei; Bilge, Leyla; Balzarotti, Davide
Conference Paper
2021DOMREP–An Orthogonal Countermeasure for Arbitrary Order Side-Channel and Fault Attack Protection
Gruber, M.; Probst, M.; Karl, P.; Schamberger, T.; Tebelmann, L.; Tempelmeier, M.; Sigl, G.
Journal Article
2021Finding the Needle in the Haystack: Metrics for Best Trace Selection in Unsupervised Side-Channel Attacks on Blinded RSA
Kulow, A.; Schamberger, T.; Tebelmann, L.; Sigl, G.
Journal Article
2021GAIA-X and IDS
Otto, Boris; Rubina, Alina; Eitel, Andreas; Teuscher, Andreas; Schleimer, Anna Maria; Lange, Christoph; Stingl, Dominik; Loukipoudis, Evgueni; Brost, Gerd; Boege, Gernot; Pettenpohl, Heinrich; Langkau, Joerg; Gelhaar, Joshua; Mitani, Koki; Hupperz, Marius; Huber, Monika; Jahnke, Nils; Brandstädter, Robin; Wessel, Sascha; Bader, Sebastian
Report
2021Leveraging Edge Computing and Differential Privacy to Securely Enable Industrial Cloud Collaboration Along the Value Chain
Giehl, Alexander; Heinl, Michael P.; Busch, Maximilian
Conference Paper
2021Medina: Improving cloud services trustworthiness through continuous audit-based certification
Orue-Echevarria, L.; Garcia, J.L.; Banse, C.; Alonso, J.
Conference Paper
2021MESH: A Memory-Efficient Safe Heap for C/C++
Vintila, E.Q.; Zieris, P.; Horsch, J.
Conference Paper
2021Privatsphäre und Maschinelles Lernen
Boenisch, Franziska
Journal Article
2021SCA secure and updatable crypto engines for FPGA SoC bitstream decryption: extended version
Unterstein, F.; Jacob, N.; Hanley, N.; Gu, C.; Heyszl, J.
Journal Article
2021Security Concept with Distributed Trust-Levels for Autonomous Cooperative Vehicle Networks
Madl, Tobias
Conference Paper
2021SEVerity: Code Injection Attacks against Encrypted Virtual Machines
Morbitzer, M.; Proskurin, S.; Radev, M.; Dorfhuber, M.; Quintanar Salas, E.
Conference Paper
2021The Stream Exchange Protocol: A Secure and Lightweight Tool for Decentralized Connection Establishment
Tatschner, S.; Jarisch, F.; Giehl, A.; Plaga, S.; Newe, T.
Journal Article
2021Tapeout of a RISC-V crypto chip with hardware trojans: A case-study on trojan design and pre-silicon detectability
Hepp, A.; Sigl, G.
Conference Paper
2021VIA: Analyzing Device Interfaces of Protected Virtual Machines
Hetzelt, Felicitas; Radev, Martin; Buhren, Robert; Morbitzer, Mathias; Seifert, Jean-Pierre
Paper
2020AntiPatterns Regarding the Application of Cryptographic Primitives by the Example of Ransomware
Heinl, Michael P.; Giehl, Alexander; Graif, Lukas
Conference Paper
2020Applicability of Security Standards for Operational Technology by SMEs and Large Enterprises
Wagner, Patrick; Hansch, Gerhard; Konrad, Christoph; John, Karl-Heinz; Bauer, Jochen; Franke, Jörg
Conference Paper
2020Architecture of an intelligent Intrusion Detection System for Smart Home
Graf, J.; Neubauer, K.; Fischer, S.; Hackenberg, R.
Conference Paper
2020Automating Security Risk and Requirements Management for Cyber-Physical Systems
Hansch, Gerhard
Dissertation
2020Breaking the lightweight secure PUF: Understanding the relation of input transformations and machine learning resistance
Wisiol, N.; Becker, G.T.; Margraf, M.; Soroceanu, T.A.A.; Tobisch, J.; Zengin, B.
Conference Paper
2020cipherPath: Efficient traversals over homomorphically encrypted paths
Bramm, G.; Schütte, J.
Conference Paper
2020Data Poisoning Attacks on Regression Learning and Corresponding Defenses
Müller, N.; Kowatsch, D.; Böttinger, K.
Conference Paper
2020Datenplattform nach dem Security-by-Design-Prinzip: Produktionsdaten sicher in der Cloud verarbeiten
Giehl, Alexander; Heinl, Michael P.
Journal Article
2020Deutsche Normungsroadmap Künstliche Intelligenz
Adler, R.; Kolomiichuk, Sergii; Hecker, Dirk; Lämmel, Philipp; Ma, Jackie; Marko, Angelina; Mock, Michael; Nagel, Tobias; Poretschkin, Maximilian; Rennoch, Axel; Röhler, Marcus; Ruf, Miriam; Schönhof, Raoul; Schneider, Martin A.; Tcholtchev, Nikolay; Ziehn, Jens; Böttinger, Konstantin; Jedlitschka, Andreas; Oala, Luis; Sperl, Philip; Wenzel, Markus; et. al.
: Wahlster, W.; Winterhalter, C.
Study
2020DLA: Dense-Layer-Analysis for Adversarial Example Detection
Sperl, Philip; Kao, Ching-yu; Chen, Peng; Lei, Xiao; Böttinger, Konstantin
Conference Paper
2020Drei Fragen an... das Fraunhofer AISEC. "Security als sich kontinuierlich weiterentwickelnder Prozess"
Heinl, Michael P.; Giehl, Alexander
Internet Contribution
2020An Edge Framework for the Application of Privacy Enhancing Technologies in IoT Communications
Kunz, I.; Stephanow, P.; Banse, C.
Conference Paper
2020Exploiting Interfaces of Secure Encrypted Virtual Machines
Radev, Martin; Morbitzer, Mathias
Conference Paper
2020FridgeLock: Preventing Data Theft on Suspended Linux with Usable Memory Encryption
Franzen, F.; Andreas, M.; Huber, M.
Conference Paper
2020Integrating security evaluations into virtual commissioning
Giehl, Alexander; Wiedermann, Norbert; Tayebi Gholamzadeh, Makan; Eckert, Claudia
Conference Paper
2020The Lazarus Effect: Healing Compromised Devices in the Internet of Small Things
Huber, M.; Hristozov, S.; Ott, S.; Sarafov, V.; Peinado, M.
Conference Paper
2020Optimizing Information Loss Towards Robust Neural Networks
Sperl, Philip; Böttinger, Konstantin
Conference Paper
2020Privacy smells: Detecting privacy problems in cloud architectures
Kunz, I.; Schneider, A.; Banse, C.
Conference Paper
2020Protecting RESTful IoT Devices from Battery Exhaustion DoS Attacks
Hristozov, S.; Huber, M.; Sigl, G.
Conference Paper
2020Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers
Unterstein, Florian; Schink, Marc; Schamberger, Thomas; Tebelmann, Lars; Ilg, Manuel; Heyszl, Johann
Journal Article
2020Review of error correction for PUFs and evaluation on state-of-the-art FPGAs
Hiller, Matthias; Kürzinger, Ludwig; Sigl, Georg
Journal Article
2020Secure and user-friendly over-the-air firmware distribution in a portable faraday cage
Striegel, M.; Heyszl, J.; Jakobsmeier, F.; Matveev, Y.; Sigl, G.
Conference Paper
2020Selecting privacy enhancing technologies for IoT-based services
Kunz, I.; Banse, C.; Stephanow, P.
Conference Paper
2020SEVurity: No security without integrity: Ng integrity-free memory encryption with minimal assumptions
Wilke, L.; Wichelmann, J.; Morbitzer, M.; Eisenbarth, T.
Conference Paper
2020Sicherheitsaspekte der Plattform ScaleIT im Kontext von DigitalTWIN
Wester, Hannah; Heinl, Michael P.; Schneider, Peter
Report
2020Spatial Context Tree Weighting for Physical Unclonable Functions
Pehl, M.; Tretschok, T.; Becker, D.; Immler, V.
Conference Paper
2020Temporary Laser Fault Injection into Flash Memory: Calibration, Enhanced Attacks, and Countermeasures
Garb, K.; Obermaier, J.
Conference Paper
2020Towards resilient factories of future defining required capabilities for a resilient factory of future
Glawe, M.; Feeken, L.; Wudka, B.; Kao, C.-Y.; Mirzaei, E.; Weinhold, T.; Szanto, A.
Conference Paper
2020Towards Resistant Audio Adversarial Examples
Dörr, T.; Markert, K.; Müller, N.M.; Böttinger, K.
Conference Paper
2020Towards Self-sovereign, decentralized personal data sharing and identity management
Schanzenbach, Martin
Dissertation
2020Towards tracking data flows in cloud architectures
Kunz, I.; Casola, V.; Schneider, A.; Banse, C.; Schütte, J.
Conference Paper
2020Towards Transparent Control-Flow Integrity in Safety-Critical Systems
Kuzhiyelil, D.; Zieris, P.; Kadar, M.; Tverdyshev, S.; Fohler, G.
Conference Paper