Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.
2021Activation Anomaly Analysis
Sperl, Philip; Schulze, Jan-Philipp; Böttinger, Konstantin
Konferenzbeitrag
2020AntiPatterns Regarding the Application of Cryptographic Primitives by the Example of Ransomware
Heinl, Michael P.; Giehl, Alexander; Graif, Lukas
Konferenzbeitrag
2020Applicability of Security Standards for Operational Technology by SMEs and Large Enterprises
Wagner, Patrick; Hansch, Gerhard; Konrad, Christoph; John, Karl-Heinz; Bauer, Jochen; Franke, Jörg
Konferenzbeitrag
2020Architecture of an intelligent Intrusion Detection System for Smart Home
Graf, J.; Neubauer, K.; Fischer, S.; Hackenberg, R.
Konferenzbeitrag
2020Automating Security Risk and Requirements Management for Cyber-Physical Systems
Hansch, Gerhard
Dissertation
2020Breaking the lightweight secure PUF: Understanding the relation of input transformations and machine learning resistance
Wisiol, N.; Becker, G.T.; Margraf, M.; Soroceanu, T.A.A.; Tobisch, J.; Zengin, B.
Konferenzbeitrag
2020Datenplattform nach dem Security-by-Design-Prinzip: Produktionsdaten sicher in der Cloud verarbeiten
Giehl, Alexander; Heinl, Michael P.
Zeitschriftenaufsatz
2020Deutsche Normungsroadmap Künstliche Intelligenz
Adler, R.; Kolomiichuk, Sergii; Hecker, Dirk; Lämmel, Philipp; Ma, Jackie; Marko, Angelina; Mock, Michael; Nagel, Tobias; Poretschkin, Maximilian; Rennoch, Axel; Röhler, Marcus; Ruf, Miriam; Schönhof, Raoul; Schneider, Martin A.; Tcholtchev, Nikolay; Ziehn, Jens; Böttinger, Konstantin; Jedlitschka, Andreas; Oala, Luis; Sperl, Philip; Wenzel, Markus; et. al.
: Wahlster, W.; Winterhalter, C.
Studie
2020DLA: Dense-Layer-Analysis for Adversarial Example Detection
Sperl, Philip; Kao, Ching-yu; Chen, Peng; Lei, Xiao; Böttinger, Konstantin
Konferenzbeitrag
2020Drei Fragen an... das Fraunhofer AISEC. "Security als sich kontinuierlich weiterentwickelnder Prozess"
Heinl, Michael P.; Giehl, Alexander
Zeitschriftenaufsatz
2020An Edge Framework for the Application of Privacy Enhancing Technologies in IoT Communications
Kunz, I.; Stephanow, P.; Banse, C.
Konferenzbeitrag
2020FridgeLock: Preventing Data Theft on Suspended Linux with Usable Memory Encryption
Franzen, F.; Andreas, M.; Huber, M.
Konferenzbeitrag
2020Integrating security evaluations into virtual commissioning
Giehl, Alexander; Wiedermann, Norbert; Tayebi Gholamzadeh, Makan; Eckert, Claudia
Konferenzbeitrag
2020Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers
Unterstein, Florian; Schink, Marc; Schamberger, Thomas; Tebelmann, Lars; Ilg, Manuel; Heyszl, Johann
Zeitschriftenaufsatz
2020Review of error correction for PUFs and evaluation on state-of-the-art FPGAs
Hiller, Matthias; Kürzinger, Ludwig; Sigl, Georg
Zeitschriftenaufsatz
2020Secure and user-friendly over-the-air firmware distribution in a portable faraday cage
Striegel, M.; Heyszl, J.; Jakobsmeier, F.; Matveev, Y.; Sigl, G.
Konferenzbeitrag
2020SEVurity: No security without integrity: Ng integrity-free memory encryption with minimal assumptions
Wilke, L.; Wichelmann, J.; Morbitzer, M.; Eisenbarth, T.
Konferenzbeitrag
2020Temporary Laser Fault Injection into Flash Memory: Calibration, Enhanced Attacks, and Countermeasures
Garb, K.; Obermaier, J.
Konferenzbeitrag
2019Analysis and Mitigation of Security Issues on Android
Titze, D.O.
Dissertation
2019Annotary: A Concolic Execution System for Developing Secure Smart Contracts
Weiss, K.; Schütte, J.
Konferenzbeitrag
2019Breaking TrustZone memory isolation through malicious hardware on a modern FPGA-SoC
Gross, M.; Jacob, N.; Zankl, A.; Sigl, G.
Konferenzbeitrag
2019A calibratable detector for invasive attacks
Weiner, M.; Wieser, W.; Lupon, E.; Sigl, G.; Manich, S.
Zeitschriftenaufsatz
2019Clear Sanctions, Vague Rewards: How China's Social Credit System Currently Defines "Good" and "Bad" Behavior
Engelmann, S.; Chen, M.; Fischer, F.; Kao, C.Y.; Grossklags, J.
Konferenzbeitrag
2019Context by Proxy: Identifying Contextual Anomalies Using an Output Proxy
Schulze, Jan-Philipp; Mrowca, Artur; Ren, Elizabeth; Loeliger, Hans-Andrea; Böttinger, Konstantin
Konferenzbeitrag
2019Curve Based Cryptography: High-Performance Implementations and Speed Enhancing Methods
Koppermann, C.P.
Dissertation
2019Deriving Impact-driven Security Requirements and Monitoring Measures for Industrial IoT
Hansch, G.; Schneider, P.; Brost, G.S.
Konferenzbeitrag
2019Differential Fault Attacks on KLEIN
Gruber, M.; Selmke, B.
Konferenzbeitrag
2019Do's and Don'ts of Distributed Intrusion Detection for Industrial Network Topologies
Schneider, P.
Konferenzbeitrag
2019Dominance as a New Trusted Computing Primitive for the Internet of Things
Xu, M.; Huber, M.; Sun, Z.; England, P.; Peinado, M.; Lee, S.; Marochko, A.; Mattoon, D.; Spiger, R.; Thom, S.
Konferenzbeitrag
2019Edge-computing enhanced privacy protection for industrial ecosystems in the context of SMEs
Giehl, Alexander; Schneider, Peter; Busch, Maximilian; Schnoes, Florian; Kleinwort, Robin; Zaeh, Michael F.
Konferenzbeitrag
2019Extracting Secrets from Encrypted Virtual Machines
Morbitzer, M.; Huber, M.; Horsch, J.
Konferenzbeitrag
2019EyeSec: A Retrofittable Augmented Reality Tool for Troubleshooting Wireless Sensor Networks in the Field
Striegel, M.; Rolfes, C.; Heyszl, J.; Helfert, F.; Hornung, M.; Sigl, G.
Konferenzbeitrag
2019A framework to assess impacts of cyber attacks in manufacturing
Giehl, A.; Wiedermann, N.; Plaga, S.
Konferenzbeitrag
2019Fraunhofer-Institut für Angewandte und Integrierte Sicherheit. Jahresbericht 2018/2019
 
Jahresbericht
2019Freeze and crypt: Linux kernel support for main memory encryption
Huber, M.; Horsch, J.; Ali, J.; Wessel, S.
Zeitschriftenaufsatz
2019Future Proofing IoT Embedded Platforms for Cryptographic Primitives Support
Plaga, S.; Wiedermann, N.; Niedermaier, M.; Giehl, A.; Newe, T.
Konferenzbeitrag
2019Fuzzing with Stochastic Feedback Processes
Böttinger, K.
Dissertation
2019Identifying Mislabeled Instances in Classification Datasets
Müller, N.M.; Markert, K.
Konferenzbeitrag
2019IoTAG: An Open Standard for IoT Device IdentificAtion and RecoGnition
Fischer, Sebastian; Neubauer, Katrin; Hinterberger, Lukas; Weber, Bernhard; Hackenberg, Rudolf
Konferenzbeitrag
2019MERCAT: A Metric for the Evaluation and Reconsideration of Certificate Authority Trustworthiness
Heinl, Michael P.; Giehl, Alexander; Wiedermann, Norbert; Plaga, Sven; Kargl, Frank
Konferenzbeitrag
2019A Metric to Assess the Trustworthiness of Certificate Authorities
Heinl, Michael P.
: Kargl, F.; Eckert, C.
Master Thesis
2019New Insights to Key Derivation for Tamper-Evident Physical Unclonable Functions
Immler, V.; Uppund, K.
Zeitschriftenaufsatz
2019On GDPR Compliance of Companies’ Privacy Policies
Müller, N.M.; Kowatsch, D.; Debus, P.; Mirdita, D.; Böttinger, K.
Konferenzbeitrag
2019Realistic Data Generation for Anomaly Detection in Industrial Settings Using Simulations
Schneider, P.; Giehl, A.
Konferenzbeitrag
2019Reducing Implementation Efforts in Continuous Auditing Certification Via an Audit API
Knoblauch, Dorian; Banse, Christian
Konferenzbeitrag
2019Reference Architecture Model. Version 3.0
Otto, Boris; Steinbuss, Sebastian; Teuscher, Andreas; Lohmann, Steffen; Bader, Sebastian; Birnstil, P.; Böhmer, M.; Brost, G.; Cirullies, J.; Eitel, A.; Ernst, T.; Geisler, S.; Gelhaar, J.; Gude, R.; Haas, C.; Huber, M.; Jung, C.; Jürjens, J.; Lange, C.; Lis, D.; Mader, C.; Menz, N.; Nagel, R.; Patzer, F.; Pettenpohl, H.; Pullmann, J.; Quix, C.; Schulz, D.; Schütte, J. et al.
Bericht
2019Risk Analysis of the Cloud Infrastructure of Smart Grid and Internet of Things
Neubauer, Katrin; Fischer, Sebastian; Hackenberg, Rudolf
Konferenzbeitrag
2019Scanclave: Verifying Application Runtime Integrity in Untrusted Environmen
Morbitzer, M.
Konferenzbeitrag
2019Secure Physical Enclosures from Coverswith Tamper-Resistance
Immler, V.; Obermaier, J.; Ng, K.K.; Ke, F.X.; Lee, J.; Lim, Y.P.; Oh, W.K.; Wee, K.H.; Sigl, G.
Zeitschriftenaufsatz
2019Securing future decentralised industrial IoT infrastructures: Challenges and free open source solutions
Plaga, S.; Wiedermann, N.; Anton, S.D.; Tatschner, S.; Schotten, H.; Newe, T.
Zeitschriftenaufsatz
2019A Security Architecture for RISC-V based IoT Devices
Auer, Lukas; Skubich, Christian; Hiller, Matthias
Konferenzbeitrag
2019Side-Channel Analysis of the TERO PUF
Tebelmann, L.; Pehl, M.; Immler, V.
Konferenzbeitrag
2019Side-Channel Aware Fuzzing
Sperl, Philip; Böttinger, Konstantin
Konferenzbeitrag
2019Smart Intersections Improve Traffic Flow and Safety
Striegel, Martin; Otto, Thomas
Zeitschriftenaufsatz
2019Taking a Look into Execute-Only Memory
Schink, Marc; Obermaier, Johannes
Konferenzbeitrag
2019A Theoretical Model to Link Uniqueness and Min-Entropy for PUF Evaluations
Gu, C.; Liu, W.; Hanley, N.; Hesselbarth, R.; O'Neill, M.
Zeitschriftenaufsatz
2019A Unified Architecture for Industrial IoT Security Requirements in Open Platform Communications
Hansch, G.; Schneider, P.; Fischer, K.; Böttinger, K.
Konferenzbeitrag
2019Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs
Immler, V.; Hiller, M.; Liu, Q.; Lenz, A.; Wachter-Zeh, A.
Zeitschriftenaufsatz
2019Work in Progress: Security Analysis for Safety-critical Systems: Smart Grid and IoT
Neubauer, Katrin; Hackenberg, Rudolf; Fischer, Sebastian
Konferenzbeitrag
2018Adding Channel Binding for an Out-of-Band OTP Authentication Protocol in an Industrial Use-Case
Plaga, S.; Niethammer, M.; Wiedermann, N.; Borisov, A.
Konferenzbeitrag
2018Algorithmic and Protocol Level Countermeasures to Protect Cryptographic Devices
Santis, F. De
Dissertation
2018B-TREPID: Batteryless tamper-resistant envelope with a PUF and integrity detection
Immler, V.; Obermaier, J.; König, M.; Hiller, M.; Sig, G.
Konferenzbeitrag
2018BDABE - Blockchain-based Distributed Attribute based Encryption
Bramm, G.; Gall, M.; Schütte, J.
Konferenzbeitrag
2018Blockchain and smart contracts
Schütte, Julian; Fridgen, Gilbert; Prinz, Wolfgang; Rose, Thomas; Urbach, Nils; Hoeren, Thomas; Guggenberger, Nikolas; Welzel, Christian; Holly, Steffen; Schulte, Axel; Sprenger, Philipp; Schwede, Christian; Weimert, Birgit; Otto, Boris; Dalheimer, Mathias; Wenzel, Markus; Kreutzer, Michael; Fritz, Michael; Leiner, Ulrich; Nouak, Alexander
: Prinz, Wolfgang (Ed.); Schulte, Axel T. (Ed.)
Bericht
2018Blockchain for Education: Lifelong Learning Passport
Gräther, Wolfgang; Kolvenbach, Sabine; Ruland, Rudolf; Julian, Schütte; Ferreira Torres, Cristof; Wendland, Florian
Konferenzbeitrag
2018Capacitive multi-channel security sensor IC for tamper-resistant enclosures
Ferres, Elischa; Immler, Vincent; Stanitzki, Alexander; Lerch, Renee; Kokozinski, Rainer
Konferenzbeitrag
2018Continuous Test-Based Certification of Cloud Services
Stephanow-Gierach, P.
Dissertation
2018DATA - Differential address trace analysis: Finding address-based side-channels in binaries
Weiser, S.; Zankl, A.; Spreitzer, R.; Miller, K.; Mangard, S.; Sigl, G.
Konferenzbeitrag
2018Deep Reinforcement Fuzzing
Böttinger, K.; Godefroid, P.; Singh, R.
Konferenzbeitrag
2018Deep Reinforcement Fuzzing
Böttinger, K.; Godefroid, P.; Singh, R.
Konferenzbeitrag
2018Dividing the threshold: Multi-probe localized EM analysis on threshold implementations
Specht, R.; Immler, V.; Unterstein, F.; Heyszl, J.; Sig, G.
Konferenzbeitrag
2018Earthquake: A NoC-based optimized differential cache-collision attack for MPSoCs
Reinbrecht, C.; Forlin, B.; Zankl, A.; Sepúlveda, J.
Konferenzbeitrag
2018An Ecosystem and IoT Device Architecture for Building Trust in the Industrial Data Space
Brost, G.S.; Huber, M.; Weiß, M.; Protsenko, M.; Schütte, J.; Wessel, S.
Konferenzbeitrag
2018An embedded key management system for PUF-based security enclosures
Obermaier, J.; Hauschild, F.; Hiller, M.; Sigl, G.
Konferenzbeitrag
2018Enhancing NFV Orchestration with Security Policies
Wendland, F.; Banse, C.
Konferenzbeitrag
2018Fast FPGA Implementations of Diffie-Hellman on the Kummer Surface of a Genus-2 Curve
Koppermann, P.; Santis, F. De; Heyszl, J.; Sigl, G.
Zeitschriftenaufsatz
2018High-performance unsupervised anomaly detection for cyber-physical system networks
Schneider, Peter; Böttinger, Konstantin
Konferenzbeitrag
2018High-resolution EM attacks against leakage-resilient PRFs Explained
Unterstein, F.; Heyszl, J.; Santis, F. de; Specht, R.; Sigl, G.
Konferenzbeitrag
2018IDS Reference Architecture Model. Industrial Data Space. Version 2.0
Otto, Boris; Lohmann, Steffen; Steinbuss, Sebastian; Teuscher, Andreas; Auer, Soeren; Boehmer, Martin; Bohn, Juergen; Brost, Gerd; Cirullies, Jan; Ciureanu, Constantin; Corsi, Eva; Danielsen, Soeren; Eitel, Andreas; Ernst, Thilo; Geisler, Sandra; Gelhaar, Joshua; Gude, Roland; Haas, Christian; Heiles, Juergen; Hierro, Juanjo; Hoernle, Joachim; Huber, Manuel; Jung, Christian; Juerjens, Jan; Kasprzik, Anna; Ketterl, Markus; Koetzsch, Judith; Koehler, Jacob; Lange, Christoph; Langer, Dorothea; Langkau, Joerg; Lis, Dominik; Loeffler, Sven; Loewen, Ulrich; Mader, Christian; Menz, Nadja; Mueller, Andreas; Mueller, Bernhard; Nagel, Lars; Nagel, Ralf; Nieminen, Harri; Reitelbach, Thomas; Resetko, Aleksei; Pakkala, Daniel; Patzer, Florian; Pettenpohl, Heinrich; Pietzsch, Rene; Pullmann, Jaroslav; Punter, Matthijs; Quix, Christoph; Rohrmus, Dominik; Romer, Lena; Sandloehken, Joerg; Schoewe, Patrick; Schulz, Daniel; Schuette, Julian; Schweichhart, Karsten; Sol, Egbert-Jan; Sorowka, Peter; Spiegelberg, Gernot;
Bericht
2018Implementing a performant security control for Industrial Ethernet
Giehl, A.; Plaga, S.
Konferenzbeitrag
2018Implicit remote attestation for microkernel-based embedded systems
Wagner, S.
Dissertation
2018Investigating fingerprinters and fingerprinting-alike behaviour of android applications
Ferreira Torres, C.; Jonker, H.
Konferenzbeitrag
2018Large scale RO PUF analysis over slice type, evaluation time and temperature on 28nm Xilinx FPGAs
Hesselbarth, R.; Wilde, F.; Gu, C.; Hanley, N.
Konferenzbeitrag
2018A leak-resilient dual stack scheme for backward-edge control-flow integrity
Zieris, Philipp; Horsch, Julian
Konferenzbeitrag
2018Locked out by Latch-up? An Empirical Study on Laser Fault Injection into Arm Cortex-M Processors
Selmke, B.; Zinnecker, K.; Koppermann, P.; Miller, K.; Heyszl, J.; Sigl, G.
Konferenzbeitrag
2018The low area probing detector as a countermeasure against invasive attacks
Weiner, M.; Manich, S.; Rodriguez-Montanes, R.; Sigl, G.
Zeitschriftenaufsatz
2018LUCON: Data Flow Control for Message-Based IoT Systems
Schütte, J.; Brost, G.S.
Konferenzbeitrag
2018A measurement system for capacitive PUF-based security enclosures
Obermaier, J.; Immler, V.; Hiller, M.; Sigl, G.
Konferenzbeitrag
2018New Techniques for Emulating Fault Attacks
Nyberg, R.H.-E.
Dissertation
2018Osiris: Hunting for integer bugs in ethereum smart contracts
Torres, C.F.; Schütte, J.; State, R.
Konferenzbeitrag
2018The Past, Present, and Future of Physical Security Enclosures: From Battery-Backed Monitoring to PUF-Based Inherent Security and Beyond
Obermaier, J.; Immler, V.
Zeitschriftenaufsatz
2018Practical Decentralized Attribute-Based Delegation Using Secure Name Systems
Schanzenbach, M.; Banse, C.; Schütte, J.
Konferenzbeitrag
2018Programming Experience Might Not Help in Comprehending Obfuscated Source Code Efficiently
Hänsch, N.; Schankin, A.; Protsenko, M.; Freiling, F.; Benenson, Z.
Konferenzbeitrag
2018A Rapid Innovation Framework for Connected Mobility Applications
Pöhn, Daniela; Wessel, Sascha; Fischer, Felix; Braunsdorf, Oliver; Wenninger, Franz; Seydel, Dominique; Weiß, Gereon; Roscher, Karsten
: Freese-Wagner, Manuela (Hrsg.)
Studie
2018reclaimID: Secure, Self-Sovereign Identities Using Name Systems and Attribute-Based Encryption
Schanzenbach, M.; Bramm, G.; Schütte, J.
Konferenzbeitrag
2018Rowhammer - A Survey Assessing the Severity of this Attack Vector
Wiedermann, N.; Plaga, S.
Konferenzbeitrag
2018Safety & security testing of cooperative automotive systems
Seydel, Dominique; Weiß, Gereon; Pöhn, Daniela; Wessel, Sascha; Wenninger, Franz
Konferenzbeitrag
2018Secure Code Execution: A Generic PUF-Driven System Architecture
Kleber, S.; Unterstein, F.; Hiller, M.; Slomka, F.; Matousek, M.; Kargl, F.; Bösch, C.
Konferenzbeitrag
2018Secure your SSH Keys! Motivation and practical implementation of a HSM-based approach securing private SSH-Keys
Plaga, S.; Wiedermann, N.; Hansch, G.; Newe, T.
Konferenzbeitrag
2018Security Verification of Third Party Design Files in Manufacturing
Giehl, Alexander; Wiedermann, Norbert
Konferenzbeitrag
2018SEVered: Subverting AMD's virtual machine encryption
Morbitzer, Mathias; Huber, Manuel; Horsch, Julian; Wessel, Sascha
Konferenzbeitrag
2018Sichere Prozesse für moderne Geschäftsmodelle
Giehl, Alexander; Schneider, Peter
Zeitschriftenaufsatz
2018Tackling Androids Native Library Malware with Robust, Efficient and Accurate Similarity Measures
Kalysch, A.; Milisterfer, O.; Protsenko, M.; Müller, T.
Konferenzbeitrag
2018Testing Cryptographically Secure Pseudo Random Number Generators with Artificial Neural Networks
Fischer, T.
Konferenzbeitrag
2018Where Technology Meets Security: Key Storage and Data Separation for System-on-Chips
Sigl, G.; Gross, M.; Pehl, M.
Konferenzbeitrag
2018Your rails cannot hide from localized EM
Immler, V.; Specht, R.; Unterstein, F.
Zeitschriftenaufsatz
2017Anti-ProGuard: Towards automated deobfuscation of android apps
Baumann, R.; Protsenko, M.; Müller, T.
Konferenzbeitrag
2017Automated detection of instruction cache leaks in modular exponentiation software
Zankl, A.; Heyszl, J.; Sigl, G.
Konferenzbeitrag
2017Automatic generation of high-performance modular multipliers for arbitrary mersenne primes on FPGAs
Koppermann, P.; Santis, F. de; Heyszl, J.; Sigl, G.
Konferenzbeitrag
2017Blockchain und Smart Contracts
Schütte, Julian; Fridgen, Gilbert; Prinz, Wolfgang; Rose, Thomas; Urbach, Nils; Hoeren, Thomas; Guggenberger, Nikolas; Welzel, Christian; Holly, Steffen; Schulte, Axel; Sprenger, Philipp; Schwede, Christian; Weimert, Birgit; Otto, Boris; Dalheimer, Mathias; Wenzel, Markus; Kreutzer, Michael; Fritz, Michael; Leiner, Ulrich; Nouak, Alexander
: Prinz, Wolfgang (ed.); Schulte, Axel T. (ed.)
Bericht
2017Cache attacks and countermeasures for NTRUEncrypt on MPSoCs: Post-quantum resistance for the IoT
Sepulveda, J.; Zankl, A.; Mischke, O.
Konferenzbeitrag
2017ChaCha20-Poly1305 authenticated encryption for high-speed embedded IoT applications
Santis, F. de; Schauer, A.; Sigl, G.
Konferenzbeitrag
2017Classifying malware attacks in IaaS cloud environments
Rakotondravony, N.; Taubmann, B.; Mandarawi, W.; Weishäupl, E.; Xu, P.; Kolosnjaji, B.; Protsenko, M.; Meer, H. de; Reiser, H.P.
Zeitschriftenaufsatz
2017A cloud-based compilation and hardening platform for android apps
Busch, M.; Protsenko, M.; Müller, T.
Konferenzbeitrag
2017A collaborative cyber incident management system for European interconnected critical infrastructures
Settanni, G.; Skopik, F.; Shovgenya, Y.; Fiedler, R.; Carolan, M.; Conroy, D.; Boettinger, K.; Gall, M.; Brost, G.; Ponchel, C.; Haustein, M.; Kaufmann, H.; Theuerkauf, K.; Olli, P.
Zeitschriftenaufsatz
2017Combating control flow linearization
Kirsch, J.; Jonischkeit, C.; Kittel, T.; Zarras, A.; Eckert, C.
Konferenzbeitrag
2017Compromising FPGA SoCs using malicious hardware blocks
Jacob, N.; Rolfes, C.; Zankl, A.; Heyszl, J.; Sigl, G.
Konferenzbeitrag
2017Continuous location validation of cloud service components
Stephanow, P.; Moein, M.; Banse, C.
Konferenzbeitrag
2017Cybersicherheit beyond 2020!: Herausforderungen für die IT-Sicherheitsforschung
Eckert, C.
Zeitschriftenaufsatz
2017Dissecting leakage resilient PRFs with multivariate localized EM attacks
Unterstein, F.; Heyszl, J.; Santis, F. de; Specht, R.
Konferenzbeitrag
2017Dynamic loader oriented programming on Linux
Kirsch, J.; Bierbaumer, B.; Kittel, T.; Eckert, C.
Konferenzbeitrag
2017Efficient security zones implementation through hierarchical group key management at NoC-based MPSoCs
Sepulveda, J.; Flórez, D.; Immler, V.; Gogniat, G.; Sigl, G.
Zeitschriftenaufsatz
2017Empowering convolutional networks for malware classification and analysis
Kolosnjaji, B.; Eraisha, G.; Webster, G.; Zarras, A.; Eckert, C.
Konferenzbeitrag
2017Evaluating the performance of continuous test-based cloud service certification
Stephanow, P.; Banse, C.
Konferenzbeitrag
2017Exploiting bus communication to improve cache attacks on systems-on-chips
Sepulveda, J.; Gross, M.; Zankl, A.; Sigl, G.
Konferenzbeitrag
2017Fast and reliable PUF response evaluation from unsettled bistable rings
Hesselbarth, R.; Heyszl, J.; Sigl, G.
Zeitschriftenaufsatz
2017Freeze & crypt: Linux kernel support for main memory encryption
Huber, M.; Horsch, J.; Ali, J.; Wessel, S.
Konferenzbeitrag
2017Fuzzy-glitch: A practical ring oscillator based clock glitch attack
Obermaier, J.; Specht, R.; Sigl, G.
Konferenzbeitrag
2017Guiding a colony of black-box fuzzers with chemotaxis
Böttinger, K.
Konferenzbeitrag
2017Herausforderungen an der Schnittstelle von Informatik und Gesellschaft: Institutionalisierte Erforschung der Digitalisierung zur Sicherung von Wohlstand und Fortschritt
Anding, M.; Boes, A.; Eckert, C.; Harhoff, D.; Hess, T.; Münch, U.; Pretschner, A.
Zeitschriftenaufsatz
2017Hiding secrecy leakage in leaky helper data
Hiller, M.; Önalan, A.G.
Konferenzbeitrag
2017How to break secure boot on FPGA SoCs through malicious hardware
Jacob, N.; Heyszl, J.; Zankl, A.; Rolfes, C.; Sigl, G.
Konferenzbeitrag
2017Low-latency X25519 hardware implementation
Koppermann, P.; Santis, F. de; Heyszl, J.; Sigl, G.
Zeitschriftenaufsatz
2017Ordol: Obfuscation-resilient detection of libraries in android applications
Titze, D.; Lux, M.; Schuette, J.
Konferenzbeitrag
2017Packet-wise compression and forwarding of industrial network captures
Hansch, Gerhard; Schneider, Peter; Plaga, Sven
Konferenzbeitrag
2017PerfWeb: How to violate web privacy with hardware performance events
Gulmezoglu, B.; Zankl, A.; Eisenbarth, T.; Sunar, B.
Konferenzbeitrag
2017A process model to support continuous certification of cloud services
Kunz, I.; Stephanow, P.
Konferenzbeitrag
2017Protecting Suspended Devices from Memory Attacks
Huber, M.; Horsch, J.; Wessel, S.
Konferenzbeitrag
2017Reference Architecture Model for the Industrial Data Space
Otto, Boris; Lohmann, Steffen; Auer, Sören; Brost, Gerd; Cirullies, Jan; Eitel, Andreas; Ernst, Thilo; Haas, Christian; Huber, Manuel; Jung, Christian; Jürjens, Jan; Lange, Christoph; Mader, Christian; Menz, Nadja; Nagel, Ralf; Pettenpohl, Heinrich; Pullmann, Jaroslav; Quix, Christoph; Schon, Jochen; Schulz, Daniel; Schütte, Julian; Spiekermann, Markus; Wenzel, Sven
Bericht
2017Risikobeurteilung in der IT-Sicherheit Kritischer Infrastrukturen - Eine Analyse der Risikobeurteilung im Förderschwerpunkt ITS|KRITIS
Gurschler, Tamara; Großmann, Jürgen; Kotarski, David; Teichmann, Clemens; Thim, Christof; Eichler, Jörn; Göllner, Johannes; Gronau, Norbert; Lechner, Ulrike
Konferenzbeitrag
2017Securing FPGA SoC configurations independent of their manufacturers
Jacob, N.; Wittmann, J.; Heyszl, J.; Hesselbarth, R.; Wilde, F.; Pehl, M.; Sigl, G.; Fischer, K.
Konferenzbeitrag
2017Side-Channel Attacks in the Internet of Things
Zankl, A.; Seuschek, H.; Irazoqui, G.; Gulmezoglu, B.
Aufsatz in Buch
2017Squeezing polynomial masking in tower fields. A higher-order masked AES S-box
Santis, F. de; Bauer, T.; Sigl, G.
Konferenzbeitrag
2017Stack overflow considered harmful? The impact of copy&paste on Android application security
Fischer, F.; Böttinger, K.; Xiao, H.; Stransky, C.; Acar, Y.; Backes, M.; Fahl, S.
Konferenzbeitrag
2017Supporting Risk Assessment with the Systematic Identification, Merging, and Validation of Security Goals
Angermeier, D.; Nieding, A.; Eichler, J.
Konferenzbeitrag
2017A survey on authorization in distributed systems: Information storage, data retrieval and trust evaluation
Ahadipour, A.; Schanzenbach, M.
Konferenzbeitrag
2017Take a moment and have some t: Hypothesis testing on raw PUF data
Immler, V.; Hiller, M.; Obermaier, J.; Sigl, G.
Konferenzbeitrag
2017A taxonomy-based approach for security in software-defined networking
Banse, C.; Schuette, J.
Konferenzbeitrag
2017Towards continuous security certification of Software-as-a-Service applications using web application testing techniques
Stephanow, P.; Khajehmoogahi, K.
Konferenzbeitrag
2017Towards post-quantum security for IoT endpoints with NTRU
Guillen, O.M.; Pöppelmann, T.; Bermudo Mera, J.M.; Bongenaar, E.F.; Sigl, G.; Sepulveda, J.
Konferenzbeitrag
2017Towards protected MPSoC communication for information protection against a Malicious NoC
Sepulveda, J.; Zankl, A.; Florez, D.; Sigl, G.
Zeitschriftenaufsatz, Konferenzbeitrag
2017Towards side-channel secure firmware updates
Guillen, O.M.; Santis, F. de; Brederlow, R.; Sigl, G.
Konferenzbeitrag
2017Towards trace-driven cache attacks on Systems-on-Chips - exploiting bus communication
Sepulveda, J.; Gross, M.; Zankl, A.; Sigl, G.
Konferenzbeitrag
2017TransCrypt: Transparent main memory encryption using a minimal ARM hypervisor
Horsch, Julian; Huber, Manuel; Wessel, Sascha
Konferenzbeitrag
2017Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs
Immler, V.; Hiller, M.; Liu, Q.; Lenz, A.; Wachter-Zeh, A.
Konferenzbeitrag
2017Your rails cannot hide from localized EM: How dual-rail logic fails on FPGAs
Immler, V.; Specht, R.; Unterstein, F.
Konferenzbeitrag
2016Analysing cyber-physical attacks to a Smart Grid: A voltage control use case
Langer, L.; Smith, P.; Hutle, M.; Schaeffer-Filho, A.
Konferenzbeitrag
2016Analyzing the security and privacy of cloud-based video surveillance systems
Obermaier, J.; Hutle, M.
Konferenzbeitrag
2016Apparatus and method for observing a ring of interconnected inverting circuit elements
Hesselbarth, Robert
Patent
2016An area-optimized serial implementation of ICEPOLE authenticated encryption schemes
Tempelmeier, M.; Santis, F. de; Kaps, J.-P.; Sigl, G.
Konferenzbeitrag
2016Attack on a DFA protected AES by simultaneous laser fault injections
Selmke, B.; Heyszl, J.; Sigl, G.
Konferenzbeitrag
2016A cautionary note: Side-channel leakage implications of deterministic signature schemes
Seuschek, H.; Heyszl, J.; Santis, F. de
Konferenzbeitrag
2016Chemotactic test case recombination for large-scale fuzzing
Böttinger, K.
Zeitschriftenaufsatz
2016CoKey: Fast token-based cooperative cryptography
Horsch, Julian; Wessel, Sascha; Eckert, Claudia
Konferenzbeitrag
2016Cryptographically enforced four-eyes principle
Bilzhause, A.; Huber, M.; Pöhls, H.C.; Samelin, K.
Konferenzbeitrag
2016A data usage control system using dynamic taint tracking
Schütte, J.; Brost, G.S.
Konferenzbeitrag
2016DeepFuzz: Triggering vulnerabilities deeply hidden in binaries
Böttinger, K.; Eckert, C.
Konferenzbeitrag
2016Detecting and correlating supranational threats for critical infrastructures
Böttinger, K.; Hansch, G.; Filipovic, B.
Konferenzbeitrag
2016Enhancing fault emulation of transient faults by separating combinational and sequential fault propagation
Nyberg, R.; Heyszl, J.; Heinz, D.; Sigl, G.
Konferenzbeitrag
2016Fast and reliable PUF response evaluation from unsettled bistable rings
Hesselbarth, R.; Sigl, G.
Konferenzbeitrag
2016A flexible framework for mobile device forensics based on cold boot attacks
Huber, M.; Taubmann, B.; Wessel, S.; Reiser, H.P.; Sigl, G.
Zeitschriftenaufsatz
2016Fuzzing binaries with Lévy flight swarms
Böttinger, K.
Zeitschriftenaufsatz
2016Generating threat profiles for cloud service certification systems
Stephanow, P.; Banse, C.; Schütte, J.
Konferenzbeitrag
2016Herausforderungen für Informationssicherheit in eingebetteten Systemen bei Angreifern mit Hardware-Zugriff
Heyszl, J.
Zeitschriftenaufsatz
2016Hierarchical group-key management for NoC-based MPSoCs protection
Sepulveda, J.; Flórez, D.; Immler, V.; Gogniat, G.; Sigl, G.
Zeitschriftenaufsatz
2016Hunting bugs with Lévy flight foraging
Böttinger, K.
Konferenzbeitrag
2016Interactive function identification decreasing the effort of reverse engineering
Kilic, F.; Laner, H.; Eckert, C.
Konferenzbeitrag
2016K-word proximity search on encrypted data
Gall, M.; Brost, G.
Konferenzbeitrag
2016Logboat - a simulation framework enabling CAN security assessments
Plaga, S.; Tatschner, S.; Newe, T.
Konferenzbeitrag
2016Managing and presenting user attributes over a decentralized secure name system
Schanzenbach, M.; Banse, C.
Konferenzbeitrag
2016Modellgestützte Risikoanalyse der Sicherheit Kritischer Infrastrukturen für kleine und mittlere Unternehmen: Eine Übersicht
Teichmann, C.; Renatus, S.; Nieding, A.
Konferenzbeitrag
2016Novel weaknesses in IEC 62351 protected Smart Grid control systems
Strobel, M.; Wiedermann, N.; Eckert, C.
Konferenzbeitrag
2016Online reliability testing for PUF key derivation
Hiller, M.; Önalan, A.G.; Sigl, G.; Bossert, M.
Konferenzbeitrag
2016Policy-based implicit attestation for microkernel-based virtualized systems
Wagner, S.; Eckert, C.
Konferenzbeitrag
2016Practical aspects of quantization and tamper-sensitivity for physically obfuscated keys
Immler, V.; Hennig, M.; Kürzinger, L.; Sigl, G.
Konferenzbeitrag
2016Precise laser fault injections into 90 nm and 45 nm SRAM-cells
Selmke, B.; Brummer, S.; Heyszl, J.; Sigl, G.
Konferenzbeitrag
2016A secure architecture for operating system-level virtualization on mobile devices
Huber, M.; Horsch, J.; Velten, M.; Weiss, M.; Wessel, S.
Konferenzbeitrag
2016A security aware routing approach for NoC-based MPSoCs
Fernandes, R.; Marcon, C.; Cataldo, R.; Silveira, J.; Sigl, G.; Sepulveda, J.
Konferenzbeitrag
2016seTPM: Towards flexible trusted computing on mobile devices based on GlobalPlatform secure elements
Proskurin, S.; Weiß, M.; Sigl, G.
Konferenzbeitrag
2016Test-based cloud service certification of opportunistic providers
Stephanow, P.; Srivastava, G.; Schütte, J.
Konferenzbeitrag
2016Towards efficient evaluation of a time-driven cache attack on modern processors
Zankl, A.; Miller, K.; Heyszl, J.; Sigl, G.
Konferenzbeitrag
2016Towards risk aware NoCs for data protection in MPSoCs
Sepulveda, J.; Florez, D.; Fernandes, R.; Marcon, C.; Gogniat, G.; Sigl, G.
Konferenzbeitrag
2016X25519 hardware implementation for low-latency applications
Koppermann, P.; Santis, F. de; Heyszl, J.; Sigl, G.
Konferenzbeitrag
2015Apparecium: Revealing data flows in Android applications
Titze, D.; Schütte, J.
Konferenzbeitrag
2015Applying real-time programming to legacy embedded control software
Resmerita, S.; Naderlinger, A.; Huber, M.; Butts, K.; Pree, W.
Konferenzbeitrag
2015Closing the gap between speed and configurability of multi-bit fault emulation environments for security and safety-critical designs
Nyberg, R.; Heyszl, J.; Rabe, D.; Sigl, G.
Zeitschriftenaufsatz
2015ConDroid: Targeted dynamic analysis of Android applications
Schütte, J.; Fedler, R.; Titze, D.
Konferenzbeitrag
2015Detecting fingerprinted data in TLS traffic
Böttinger, K.; Schuster, D.; Eckert, C.
Konferenzbeitrag
2015Geldspielgeräte in Zukunft mit geprüfter Sicherheit
Heyszl, J.; Thiel, F.
Zeitschriftenaufsatz
2015Identifying security requirements and privacy concerns in digital health applications
Brost, G.S.; Hoffmann, M.
Aufsatz in Buch
2015Improving mobile device security with operating system-level virtualization
Wessel, Sascha; Huber, Manuel; Stumpf, Frederic; Eckert, Claudia
Zeitschriftenaufsatz
2015Improving non-profiled attacks on exponentiations based on clustering and extracting leakage from multi-channel high-resolution EM measurements
Specht, R.; Heyszl, J.; Kleinsteuber, M.; Sigl, G.
Konferenzbeitrag
2015Improving prioritization of software weaknesses using security models with AVUS
Renatus, S.; Bartelheimer, C.; Eichler, J.
Konferenzbeitrag
2015Industrie 4.0 meets IT-Sicherheit: Eine Herausforderung!
Eckert, C.; Fallenbeck, N.
Zeitschriftenaufsatz
2015Language classes for cloud service certification systems
Stephanow, P.; Gall, M.
Konferenzbeitrag
2015Lightweight attestation and secure code update for multiple separated microkernel tasks
Wagner, S.; Krauß, C.; Eckert, C.
Konferenzbeitrag
2015A lightweight framework for cold boot based forensics on mobile devices
Taubmann, B.; Huber, M.; Wessel, S.; Heim, L.; Reiser, H.P.; Sigl, G.
Konferenzbeitrag
2015Low-area reed decoding in a generalized concatenated code construction for PUFs
Hiller, M.; Kürzinger, L.; Sigl, G.; Müelich, S.; Puchinger, S.; Bossert, M.
Konferenzbeitrag
2015Method selection and tailoring for agile threat assessment and mitigation
Renatus, S.; Teichmann, C.; Eichler, J.
Konferenzbeitrag
2015Mitigation of peer-to-peer overlay attacks in the automatic metering infrastructure of smart grids
Rottondi, C.; Savi, M.; Verticale, G.; Krauß, C.
Zeitschriftenaufsatz
2015A new definition and classification of physical unclonable functions
Plaga, R.; Merli, D.
Konferenzbeitrag
2015On cache timing attacks considering multi-core aspects in virtualized embedded systems
Weiß, M.; Weggenmann, B.; August, M.; Sigl, G.
Konferenzbeitrag
2015Preventing library spoofing on android
Titze, D.; Schütte, J.
Konferenzbeitrag
2015Resilience Against Physical Attacks
Hutle, M.; Kammerstetter, M.
Aufsatz in Buch
2015A secure northbound interface for SDN applications
Banse, C.; Rangarajan, S.
Konferenzbeitrag
2015Smart grid cybersecurity risk assessment
Langer, L.; Smith, P.; Hutle, M.
Konferenzbeitrag
2015Support Vector Machines under Adversarial Label Contamination
Xiao, Huang; Biggio, Battista; Nelson, Blaine; Xiao, Han; Eckert, Claudia; Roli, Fabio
Zeitschriftenaufsatz
2015Towards continuous certification of infrastructure-as-a-service using low-level metrics
Stephanow, P.; Fallenbeck, N.
Konferenzbeitrag
2015Transparent page-based kernel and user space execution tracing from a custom minimal ARM hypervisor
Horsch, Julian; Wessel, Sascha
Konferenzbeitrag
2015User identity verification based on touchscreen interaction analysis in web contexts
Velten, Michael; Schneider, Peter; Wessel, Sascha; Eckert, Claudia
Konferenzbeitrag
2014An architecture for trusted PaaS cloud computing for personal data
González-Manzano, Lorena; Brost, Gerd; Aumueller, Matthias
Aufsatz in Buch
2014Closing the gap between speed and configurability of multi-bit fault emulation environments for security and safety-critical designs
Nyberg, R.; Nolles, J.; Heyszl, J.; Rabe, D.; Sigl, G.
Konferenzbeitrag
2014Clustering algorithms for non-profiled single-execution attacks on exponentiations
Heyszl, J.; Ibing, A.; Mangard, S.; Santis, F. de; Sigl, G.
Konferenzbeitrag
2014Demonstrating the optimal placement of virtualized cellular network functions in case of large crowd events
Gebert, S.; Hock, D.; Zinner, T.; Tran-Gia, P.; Hoffmann, M.; Jarschel, M.; Schmidt, E.-D.; Braun, R.-P.; Banse, C.; Köpsel, A.
Konferenzbeitrag
2014Dynamic Hooks: Hiding Control Flow Changes within Non-Control Data
Vogl, Sebastian; Gawlik, Robert; Garmany, Behrad; Kittel, Thomas; Pfoh, Jonas; Eckert, Claudia; Holz, Thorsten
Konferenzbeitrag
2014Early propagation and imbalanced routing, how to diminish in FPGAs
Moradi, A.; Immler, V.
Konferenzbeitrag
2014Evaluation of bistable ring PUFs using single layer neural networks
Schuster, D.; Hesselbarth, R.
Konferenzbeitrag
2014Hardware Trojans. Current challenges and approaches
Jacob, N.; Merli, D.; Heyszl, J.; Sigl, G.
Zeitschriftenaufsatz
2014Increasing the efficiency of syndrome coding for PUFs with helper data compression
Hiller, Matthias; Sigl, Georg
Konferenzbeitrag
2014Integrity verification and secure loading of remote binaries for microkernel-based runtime environments
Weiß, Michael; Wagner, Steffen; Hellmann, Roland; Wessel, Sascha
Konferenzbeitrag
2014Investigating measurement methods for high-resolution electromagnetic field side-channel analysis
Specht, R.; Heyszl, J.; Sigl, G.
Konferenzbeitrag
2014Monitoring security compliance of critical processes
Rieke, R.; Repp, J.; Zhdanova, M.; Eichler, J.
Konferenzbeitrag
2014NFC? Aber sicher
Schütte, Julian
Zeitschriftenaufsatz
2014On MILS I/O Sharing Targeting Avionic Systems
Müller, Kevin; Sigl, Georg; Triquet, Benoit; Paulitsch, Michael
Konferenzbeitrag
2014Persistent Data-only Malware: Function Hooks without Code
Vogl, Sebastian; Pfoh, Jonas; Kittel, Thomas; Eckert, Claudia
Konferenzbeitrag
2014Physical unclonable function
Merli, Dominik; Schuster, Dieter
Patent
2014Side-channel analysis of a high-throughput AES peripheral with countermeasures
Heinz, B.; Heyszl, J.; Stumpf, F.
Konferenzbeitrag
2014SobTra - A software-based trust anchor for ARM cortex application processors
Horsch, Julian; Wessel, Sascha; Stumpf, Frederic; Eckert, Claudia
Konferenzbeitrag
2014Strategie- und Positionspapier Cyber-Sicherheit 2020: Herausforderungen für die IT-Sicherheitsforschung
: Neugebauer, Reimund (Hrsg.); Jarke, M. (Hrsg.); Thoma, K. (Hrsg.); Beyerer, Jürgen (Red.); Eckert, Claudia (Red.); Martini, P. (Red.); Waidner, Michael (Red.)
Bericht
2014Tolerating permanent and transient value faults
Milosevic, Z.; Hutle, M.; Schiper, A.
Zeitschriftenaufsatz
2014Towards fresh re-keying with leakage-resilient PRFs: chipher design principles and analysis
Belaid, Sonia; Santis, Fabrizio de; Heyszl, Johann; Mangard, Stefan; Medwed, Marcel; Schmidt, Jörn-Marc; Standaert, Francois-Xavier; Tillich, Stefan
Zeitschriftenaufsatz
2014Trust, privacy, and security in digital business. 11th international conference, TrustBus 2014. Preface
Eckert, C.; Katsikas, S.K.; Pernul, G.
Konferenzbeitrag
2014TrustID: Trustworthy identities for untrusted mobile devices
Horsch, Julian; Böttinger, Konstantin; Weiß, Michael; Wessel, Sascha; Stumpf, Frederic
Konferenzbeitrag
2014Verfahren zum Versehen eines mobilen Endgeräts mit einem Authentisierungszertifikat
Stumpf, Frederic; Eckert, Claudia; Krauß, Christoph; Paeschke, Manfred; Dietrich, Frank
Patent
2014Vorrichtung und Verfahren mit einem Träger mit Schaltungsstrukturen
Hennig, Maxim; Schimmel, Oliver; Zieris, Philipp; Filipovic, Bartol
Patent
2014Wireless-enabled smart societies in the 2020s
Hoffmann, M.D.; Jefferies, N.; Woo, L.H.
Zeitschriftenaufsatz

 

<