| | |
---|
2021 | Activation Anomaly Analysis Sperl, Philip; Schulze, Jan-Philipp; Böttinger, Konstantin | Konferenzbeitrag |
2020 | AntiPatterns Regarding the Application of Cryptographic Primitives by the Example of Ransomware Heinl, Michael P.; Giehl, Alexander; Graif, Lukas | Konferenzbeitrag |
2020 | Applicability of Security Standards for Operational Technology by SMEs and Large Enterprises Wagner, Patrick; Hansch, Gerhard; Konrad, Christoph; John, Karl-Heinz; Bauer, Jochen; Franke, Jörg | Konferenzbeitrag |
2020 | Architecture of an intelligent Intrusion Detection System for Smart Home Graf, J.; Neubauer, K.; Fischer, S.; Hackenberg, R. | Konferenzbeitrag |
2020 | Automating Security Risk and Requirements Management for Cyber-Physical Systems Hansch, Gerhard | Dissertation |
2020 | Breaking the lightweight secure PUF: Understanding the relation of input transformations and machine learning resistance Wisiol, N.; Becker, G.T.; Margraf, M.; Soroceanu, T.A.A.; Tobisch, J.; Zengin, B. | Konferenzbeitrag |
2020 | Datenplattform nach dem Security-by-Design-Prinzip: Produktionsdaten sicher in der Cloud verarbeiten Giehl, Alexander; Heinl, Michael P. | Zeitschriftenaufsatz |
2020 | Deutsche Normungsroadmap Künstliche Intelligenz Adler, R.; Kolomiichuk, Sergii; Hecker, Dirk; Lämmel, Philipp; Ma, Jackie; Marko, Angelina; Mock, Michael; Nagel, Tobias; Poretschkin, Maximilian; Rennoch, Axel; Röhler, Marcus; Ruf, Miriam; Schönhof, Raoul; Schneider, Martin A.; Tcholtchev, Nikolay; Ziehn, Jens; Böttinger, Konstantin; Jedlitschka, Andreas; Oala, Luis; Sperl, Philip; Wenzel, Markus; et. al. : Wahlster, W.; Winterhalter, C. | Studie |
2020 | DLA: Dense-Layer-Analysis for Adversarial Example Detection Sperl, Philip; Kao, Ching-yu; Chen, Peng; Lei, Xiao; Böttinger, Konstantin | Konferenzbeitrag |
2020 | Drei Fragen an... das Fraunhofer AISEC. "Security als sich kontinuierlich weiterentwickelnder Prozess" Heinl, Michael P.; Giehl, Alexander | Zeitschriftenaufsatz |
2020 | An Edge Framework for the Application of Privacy Enhancing Technologies in IoT Communications Kunz, I.; Stephanow, P.; Banse, C. | Konferenzbeitrag |
2020 | FridgeLock: Preventing Data Theft on Suspended Linux with Usable Memory Encryption Franzen, F.; Andreas, M.; Huber, M. | Konferenzbeitrag |
2020 | Integrating security evaluations into virtual commissioning Giehl, Alexander; Wiedermann, Norbert; Tayebi Gholamzadeh, Makan; Eckert, Claudia | Konferenzbeitrag |
2020 | Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers Unterstein, Florian; Schink, Marc; Schamberger, Thomas; Tebelmann, Lars; Ilg, Manuel; Heyszl, Johann | Zeitschriftenaufsatz |
2020 | Review of error correction for PUFs and evaluation on state-of-the-art FPGAs Hiller, Matthias; Kürzinger, Ludwig; Sigl, Georg | Zeitschriftenaufsatz |
2020 | Secure and user-friendly over-the-air firmware distribution in a portable faraday cage Striegel, M.; Heyszl, J.; Jakobsmeier, F.; Matveev, Y.; Sigl, G. | Konferenzbeitrag |
2020 | SEVurity: No security without integrity: Ng integrity-free memory encryption with minimal assumptions Wilke, L.; Wichelmann, J.; Morbitzer, M.; Eisenbarth, T. | Konferenzbeitrag |
2020 | Temporary Laser Fault Injection into Flash Memory: Calibration, Enhanced Attacks, and Countermeasures Garb, K.; Obermaier, J. | Konferenzbeitrag |
2019 | Analysis and Mitigation of Security Issues on Android Titze, D.O. | Dissertation |
2019 | Annotary: A Concolic Execution System for Developing Secure Smart Contracts Weiss, K.; Schütte, J. | Konferenzbeitrag |
2019 | Breaking TrustZone memory isolation through malicious hardware on a modern FPGA-SoC Gross, M.; Jacob, N.; Zankl, A.; Sigl, G. | Konferenzbeitrag |
2019 | A calibratable detector for invasive attacks Weiner, M.; Wieser, W.; Lupon, E.; Sigl, G.; Manich, S. | Zeitschriftenaufsatz |
2019 | Clear Sanctions, Vague Rewards: How China's Social Credit System Currently Defines "Good" and "Bad" Behavior Engelmann, S.; Chen, M.; Fischer, F.; Kao, C.Y.; Grossklags, J. | Konferenzbeitrag |
2019 | Context by Proxy: Identifying Contextual Anomalies Using an Output Proxy Schulze, Jan-Philipp; Mrowca, Artur; Ren, Elizabeth; Loeliger, Hans-Andrea; Böttinger, Konstantin | Konferenzbeitrag |
2019 | Curve Based Cryptography: High-Performance Implementations and Speed Enhancing Methods Koppermann, C.P. | Dissertation |
2019 | Deriving Impact-driven Security Requirements and Monitoring Measures for Industrial IoT Hansch, G.; Schneider, P.; Brost, G.S. | Konferenzbeitrag |
2019 | Differential Fault Attacks on KLEIN Gruber, M.; Selmke, B. | Konferenzbeitrag |
2019 | Do's and Don'ts of Distributed Intrusion Detection for Industrial Network Topologies Schneider, P. | Konferenzbeitrag |
2019 | Dominance as a New Trusted Computing Primitive for the Internet of Things Xu, M.; Huber, M.; Sun, Z.; England, P.; Peinado, M.; Lee, S.; Marochko, A.; Mattoon, D.; Spiger, R.; Thom, S. | Konferenzbeitrag |
2019 | Edge-computing enhanced privacy protection for industrial ecosystems in the context of SMEs Giehl, Alexander; Schneider, Peter; Busch, Maximilian; Schnoes, Florian; Kleinwort, Robin; Zaeh, Michael F. | Konferenzbeitrag |
2019 | Extracting Secrets from Encrypted Virtual Machines Morbitzer, M.; Huber, M.; Horsch, J. | Konferenzbeitrag |
2019 | EyeSec: A Retrofittable Augmented Reality Tool for Troubleshooting Wireless Sensor Networks in the Field Striegel, M.; Rolfes, C.; Heyszl, J.; Helfert, F.; Hornung, M.; Sigl, G. | Konferenzbeitrag |
2019 | A framework to assess impacts of cyber attacks in manufacturing Giehl, A.; Wiedermann, N.; Plaga, S. | Konferenzbeitrag |
2019 | Fraunhofer-Institut für Angewandte und Integrierte Sicherheit. Jahresbericht 2018/2019 | Jahresbericht |
2019 | Freeze and crypt: Linux kernel support for main memory encryption Huber, M.; Horsch, J.; Ali, J.; Wessel, S. | Zeitschriftenaufsatz |
2019 | Future Proofing IoT Embedded Platforms for Cryptographic Primitives Support Plaga, S.; Wiedermann, N.; Niedermaier, M.; Giehl, A.; Newe, T. | Konferenzbeitrag |
2019 | Fuzzing with Stochastic Feedback Processes Böttinger, K. | Dissertation |
2019 | Identifying Mislabeled Instances in Classification Datasets Müller, N.M.; Markert, K. | Konferenzbeitrag |
2019 | IoTAG: An Open Standard for IoT Device IdentificAtion and RecoGnition Fischer, Sebastian; Neubauer, Katrin; Hinterberger, Lukas; Weber, Bernhard; Hackenberg, Rudolf | Konferenzbeitrag |
2019 | MERCAT: A Metric for the Evaluation and Reconsideration of Certificate Authority Trustworthiness Heinl, Michael P.; Giehl, Alexander; Wiedermann, Norbert; Plaga, Sven; Kargl, Frank | Konferenzbeitrag |
2019 | A Metric to Assess the Trustworthiness of Certificate Authorities Heinl, Michael P. : Kargl, F.; Eckert, C. | Master Thesis |
2019 | New Insights to Key Derivation for Tamper-Evident Physical Unclonable Functions Immler, V.; Uppund, K. | Zeitschriftenaufsatz |
2019 | On GDPR Compliance of Companies’ Privacy Policies Müller, N.M.; Kowatsch, D.; Debus, P.; Mirdita, D.; Böttinger, K. | Konferenzbeitrag |
2019 | Realistic Data Generation for Anomaly Detection in Industrial Settings Using Simulations Schneider, P.; Giehl, A. | Konferenzbeitrag |
2019 | Reducing Implementation Efforts in Continuous Auditing Certification Via an Audit API Knoblauch, Dorian; Banse, Christian | Konferenzbeitrag |
2019 | Reference Architecture Model. Version 3.0 Otto, Boris; Steinbuss, Sebastian; Teuscher, Andreas; Lohmann, Steffen; Bader, Sebastian; Birnstil, P.; Böhmer, M.; Brost, G.; Cirullies, J.; Eitel, A.; Ernst, T.; Geisler, S.; Gelhaar, J.; Gude, R.; Haas, C.; Huber, M.; Jung, C.; Jürjens, J.; Lange, C.; Lis, D.; Mader, C.; Menz, N.; Nagel, R.; Patzer, F.; Pettenpohl, H.; Pullmann, J.; Quix, C.; Schulz, D.; Schütte, J. et al. | Bericht |
2019 | Risk Analysis of the Cloud Infrastructure of Smart Grid and Internet of Things Neubauer, Katrin; Fischer, Sebastian; Hackenberg, Rudolf | Konferenzbeitrag |
2019 | Scanclave: Verifying Application Runtime Integrity in Untrusted Environmen Morbitzer, M. | Konferenzbeitrag |
2019 | Secure Physical Enclosures from Coverswith Tamper-Resistance Immler, V.; Obermaier, J.; Ng, K.K.; Ke, F.X.; Lee, J.; Lim, Y.P.; Oh, W.K.; Wee, K.H.; Sigl, G. | Zeitschriftenaufsatz |
2019 | Securing future decentralised industrial IoT infrastructures: Challenges and free open source solutions Plaga, S.; Wiedermann, N.; Anton, S.D.; Tatschner, S.; Schotten, H.; Newe, T. | Zeitschriftenaufsatz |
2019 | A Security Architecture for RISC-V based IoT Devices Auer, Lukas; Skubich, Christian; Hiller, Matthias | Konferenzbeitrag |
2019 | Side-Channel Analysis of the TERO PUF Tebelmann, L.; Pehl, M.; Immler, V. | Konferenzbeitrag |
2019 | Side-Channel Aware Fuzzing Sperl, Philip; Böttinger, Konstantin | Konferenzbeitrag |
2019 | Smart Intersections Improve Traffic Flow and Safety Striegel, Martin; Otto, Thomas | Zeitschriftenaufsatz |
2019 | Taking a Look into Execute-Only Memory Schink, Marc; Obermaier, Johannes | Konferenzbeitrag |
2019 | A Theoretical Model to Link Uniqueness and Min-Entropy for PUF Evaluations Gu, C.; Liu, W.; Hanley, N.; Hesselbarth, R.; O'Neill, M. | Zeitschriftenaufsatz |
2019 | A Unified Architecture for Industrial IoT Security Requirements in Open Platform Communications Hansch, G.; Schneider, P.; Fischer, K.; Böttinger, K. | Konferenzbeitrag |
2019 | Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs Immler, V.; Hiller, M.; Liu, Q.; Lenz, A.; Wachter-Zeh, A. | Zeitschriftenaufsatz |
2019 | Work in Progress: Security Analysis for Safety-critical Systems: Smart Grid and IoT Neubauer, Katrin; Hackenberg, Rudolf; Fischer, Sebastian | Konferenzbeitrag |
2018 | Adding Channel Binding for an Out-of-Band OTP Authentication Protocol in an Industrial Use-Case Plaga, S.; Niethammer, M.; Wiedermann, N.; Borisov, A. | Konferenzbeitrag |
2018 | Algorithmic and Protocol Level Countermeasures to Protect Cryptographic Devices Santis, F. De | Dissertation |
2018 | B-TREPID: Batteryless tamper-resistant envelope with a PUF and integrity detection Immler, V.; Obermaier, J.; König, M.; Hiller, M.; Sig, G. | Konferenzbeitrag |
2018 | BDABE - Blockchain-based Distributed Attribute based Encryption Bramm, G.; Gall, M.; Schütte, J. | Konferenzbeitrag |
2018 | Blockchain and smart contracts Schütte, Julian; Fridgen, Gilbert; Prinz, Wolfgang; Rose, Thomas; Urbach, Nils; Hoeren, Thomas; Guggenberger, Nikolas; Welzel, Christian; Holly, Steffen; Schulte, Axel; Sprenger, Philipp; Schwede, Christian; Weimert, Birgit; Otto, Boris; Dalheimer, Mathias; Wenzel, Markus; Kreutzer, Michael; Fritz, Michael; Leiner, Ulrich; Nouak, Alexander : Prinz, Wolfgang (Ed.); Schulte, Axel T. (Ed.) | Bericht |
2018 | Blockchain for Education: Lifelong Learning Passport Gräther, Wolfgang; Kolvenbach, Sabine; Ruland, Rudolf; Julian, Schütte; Ferreira Torres, Cristof; Wendland, Florian | Konferenzbeitrag |
2018 | Capacitive multi-channel security sensor IC for tamper-resistant enclosures Ferres, Elischa; Immler, Vincent; Stanitzki, Alexander; Lerch, Renee; Kokozinski, Rainer | Konferenzbeitrag |
2018 | Continuous Test-Based Certification of Cloud Services Stephanow-Gierach, P. | Dissertation |
2018 | DATA - Differential address trace analysis: Finding address-based side-channels in binaries Weiser, S.; Zankl, A.; Spreitzer, R.; Miller, K.; Mangard, S.; Sigl, G. | Konferenzbeitrag |
2018 | Deep Reinforcement Fuzzing Böttinger, K.; Godefroid, P.; Singh, R. | Konferenzbeitrag |
2018 | Deep Reinforcement Fuzzing Böttinger, K.; Godefroid, P.; Singh, R. | Konferenzbeitrag |
2018 | Dividing the threshold: Multi-probe localized EM analysis on threshold implementations Specht, R.; Immler, V.; Unterstein, F.; Heyszl, J.; Sig, G. | Konferenzbeitrag |
2018 | Earthquake: A NoC-based optimized differential cache-collision attack for MPSoCs Reinbrecht, C.; Forlin, B.; Zankl, A.; Sepúlveda, J. | Konferenzbeitrag |
2018 | An Ecosystem and IoT Device Architecture for Building Trust in the Industrial Data Space Brost, G.S.; Huber, M.; Weiß, M.; Protsenko, M.; Schütte, J.; Wessel, S. | Konferenzbeitrag |
2018 | An embedded key management system for PUF-based security enclosures Obermaier, J.; Hauschild, F.; Hiller, M.; Sigl, G. | Konferenzbeitrag |
2018 | Enhancing NFV Orchestration with Security Policies Wendland, F.; Banse, C. | Konferenzbeitrag |
2018 | Fast FPGA Implementations of Diffie-Hellman on the Kummer Surface of a Genus-2 Curve Koppermann, P.; Santis, F. De; Heyszl, J.; Sigl, G. | Zeitschriftenaufsatz |
2018 | High-performance unsupervised anomaly detection for cyber-physical system networks Schneider, Peter; Böttinger, Konstantin | Konferenzbeitrag |
2018 | High-resolution EM attacks against leakage-resilient PRFs Explained Unterstein, F.; Heyszl, J.; Santis, F. de; Specht, R.; Sigl, G. | Konferenzbeitrag |
2018 | IDS Reference Architecture Model. Industrial Data Space. Version 2.0 Otto, Boris; Lohmann, Steffen; Steinbuss, Sebastian; Teuscher, Andreas; Auer, Soeren; Boehmer, Martin; Bohn, Juergen; Brost, Gerd; Cirullies, Jan; Ciureanu, Constantin; Corsi, Eva; Danielsen, Soeren; Eitel, Andreas; Ernst, Thilo; Geisler, Sandra; Gelhaar, Joshua; Gude, Roland; Haas, Christian; Heiles, Juergen; Hierro, Juanjo; Hoernle, Joachim; Huber, Manuel; Jung, Christian; Juerjens, Jan; Kasprzik, Anna; Ketterl, Markus; Koetzsch, Judith; Koehler, Jacob; Lange, Christoph; Langer, Dorothea; Langkau, Joerg; Lis, Dominik; Loeffler, Sven; Loewen, Ulrich; Mader, Christian; Menz, Nadja; Mueller, Andreas; Mueller, Bernhard; Nagel, Lars; Nagel, Ralf; Nieminen, Harri; Reitelbach, Thomas; Resetko, Aleksei; Pakkala, Daniel; Patzer, Florian; Pettenpohl, Heinrich; Pietzsch, Rene; Pullmann, Jaroslav; Punter, Matthijs; Quix, Christoph; Rohrmus, Dominik; Romer, Lena; Sandloehken, Joerg; Schoewe, Patrick; Schulz, Daniel; Schuette, Julian; Schweichhart, Karsten; Sol, Egbert-Jan; Sorowka, Peter; Spiegelberg, Gernot; | Bericht |
2018 | Implementing a performant security control for Industrial Ethernet Giehl, A.; Plaga, S. | Konferenzbeitrag |
2018 | Implicit remote attestation for microkernel-based embedded systems Wagner, S. | Dissertation |
2018 | Investigating fingerprinters and fingerprinting-alike behaviour of android applications Ferreira Torres, C.; Jonker, H. | Konferenzbeitrag |
2018 | Large scale RO PUF analysis over slice type, evaluation time and temperature on 28nm Xilinx FPGAs Hesselbarth, R.; Wilde, F.; Gu, C.; Hanley, N. | Konferenzbeitrag |
2018 | A leak-resilient dual stack scheme for backward-edge control-flow integrity Zieris, Philipp; Horsch, Julian | Konferenzbeitrag |
2018 | Locked out by Latch-up? An Empirical Study on Laser Fault Injection into Arm Cortex-M Processors Selmke, B.; Zinnecker, K.; Koppermann, P.; Miller, K.; Heyszl, J.; Sigl, G. | Konferenzbeitrag |
2018 | The low area probing detector as a countermeasure against invasive attacks Weiner, M.; Manich, S.; Rodriguez-Montanes, R.; Sigl, G. | Zeitschriftenaufsatz |
2018 | LUCON: Data Flow Control for Message-Based IoT Systems Schütte, J.; Brost, G.S. | Konferenzbeitrag |
2018 | A measurement system for capacitive PUF-based security enclosures Obermaier, J.; Immler, V.; Hiller, M.; Sigl, G. | Konferenzbeitrag |
2018 | New Techniques for Emulating Fault Attacks Nyberg, R.H.-E. | Dissertation |
2018 | Osiris: Hunting for integer bugs in ethereum smart contracts Torres, C.F.; Schütte, J.; State, R. | Konferenzbeitrag |
2018 | The Past, Present, and Future of Physical Security Enclosures: From Battery-Backed Monitoring to PUF-Based Inherent Security and Beyond Obermaier, J.; Immler, V. | Zeitschriftenaufsatz |
2018 | Practical Decentralized Attribute-Based Delegation Using Secure Name Systems Schanzenbach, M.; Banse, C.; Schütte, J. | Konferenzbeitrag |
2018 | Programming Experience Might Not Help in Comprehending Obfuscated Source Code Efficiently Hänsch, N.; Schankin, A.; Protsenko, M.; Freiling, F.; Benenson, Z. | Konferenzbeitrag |
2018 | A Rapid Innovation Framework for Connected Mobility Applications Pöhn, Daniela; Wessel, Sascha; Fischer, Felix; Braunsdorf, Oliver; Wenninger, Franz; Seydel, Dominique; Weiß, Gereon; Roscher, Karsten : Freese-Wagner, Manuela (Hrsg.) | Studie |
2018 | reclaimID: Secure, Self-Sovereign Identities Using Name Systems and Attribute-Based Encryption Schanzenbach, M.; Bramm, G.; Schütte, J. | Konferenzbeitrag |
2018 | Rowhammer - A Survey Assessing the Severity of this Attack Vector Wiedermann, N.; Plaga, S. | Konferenzbeitrag |
2018 | Safety & security testing of cooperative automotive systems Seydel, Dominique; Weiß, Gereon; Pöhn, Daniela; Wessel, Sascha; Wenninger, Franz | Konferenzbeitrag |
2018 | Secure Code Execution: A Generic PUF-Driven System Architecture Kleber, S.; Unterstein, F.; Hiller, M.; Slomka, F.; Matousek, M.; Kargl, F.; Bösch, C. | Konferenzbeitrag |
2018 | Secure your SSH Keys! Motivation and practical implementation of a HSM-based approach securing private SSH-Keys Plaga, S.; Wiedermann, N.; Hansch, G.; Newe, T. | Konferenzbeitrag |
2018 | Security Verification of Third Party Design Files in Manufacturing Giehl, Alexander; Wiedermann, Norbert | Konferenzbeitrag |
2018 | SEVered: Subverting AMD's virtual machine encryption Morbitzer, Mathias; Huber, Manuel; Horsch, Julian; Wessel, Sascha | Konferenzbeitrag |
2018 | Sichere Prozesse für moderne Geschäftsmodelle Giehl, Alexander; Schneider, Peter | Zeitschriftenaufsatz |
2018 | Tackling Androids Native Library Malware with Robust, Efficient and Accurate Similarity Measures Kalysch, A.; Milisterfer, O.; Protsenko, M.; Müller, T. | Konferenzbeitrag |
2018 | Testing Cryptographically Secure Pseudo Random Number Generators with Artificial Neural Networks Fischer, T. | Konferenzbeitrag |
2018 | Where Technology Meets Security: Key Storage and Data Separation for System-on-Chips Sigl, G.; Gross, M.; Pehl, M. | Konferenzbeitrag |
2018 | Your rails cannot hide from localized EM Immler, V.; Specht, R.; Unterstein, F. | Zeitschriftenaufsatz |
2017 | Anti-ProGuard: Towards automated deobfuscation of android apps Baumann, R.; Protsenko, M.; Müller, T. | Konferenzbeitrag |
2017 | Automated detection of instruction cache leaks in modular exponentiation software Zankl, A.; Heyszl, J.; Sigl, G. | Konferenzbeitrag |
2017 | Automatic generation of high-performance modular multipliers for arbitrary mersenne primes on FPGAs Koppermann, P.; Santis, F. de; Heyszl, J.; Sigl, G. | Konferenzbeitrag |
2017 | Blockchain und Smart Contracts Schütte, Julian; Fridgen, Gilbert; Prinz, Wolfgang; Rose, Thomas; Urbach, Nils; Hoeren, Thomas; Guggenberger, Nikolas; Welzel, Christian; Holly, Steffen; Schulte, Axel; Sprenger, Philipp; Schwede, Christian; Weimert, Birgit; Otto, Boris; Dalheimer, Mathias; Wenzel, Markus; Kreutzer, Michael; Fritz, Michael; Leiner, Ulrich; Nouak, Alexander : Prinz, Wolfgang (ed.); Schulte, Axel T. (ed.) | Bericht |
2017 | Cache attacks and countermeasures for NTRUEncrypt on MPSoCs: Post-quantum resistance for the IoT Sepulveda, J.; Zankl, A.; Mischke, O. | Konferenzbeitrag |
2017 | ChaCha20-Poly1305 authenticated encryption for high-speed embedded IoT applications Santis, F. de; Schauer, A.; Sigl, G. | Konferenzbeitrag |
2017 | Classifying malware attacks in IaaS cloud environments Rakotondravony, N.; Taubmann, B.; Mandarawi, W.; Weishäupl, E.; Xu, P.; Kolosnjaji, B.; Protsenko, M.; Meer, H. de; Reiser, H.P. | Zeitschriftenaufsatz |
2017 | A cloud-based compilation and hardening platform for android apps Busch, M.; Protsenko, M.; Müller, T. | Konferenzbeitrag |
2017 | A collaborative cyber incident management system for European interconnected critical infrastructures Settanni, G.; Skopik, F.; Shovgenya, Y.; Fiedler, R.; Carolan, M.; Conroy, D.; Boettinger, K.; Gall, M.; Brost, G.; Ponchel, C.; Haustein, M.; Kaufmann, H.; Theuerkauf, K.; Olli, P. | Zeitschriftenaufsatz |
2017 | Combating control flow linearization Kirsch, J.; Jonischkeit, C.; Kittel, T.; Zarras, A.; Eckert, C. | Konferenzbeitrag |
2017 | Compromising FPGA SoCs using malicious hardware blocks Jacob, N.; Rolfes, C.; Zankl, A.; Heyszl, J.; Sigl, G. | Konferenzbeitrag |
2017 | Continuous location validation of cloud service components Stephanow, P.; Moein, M.; Banse, C. | Konferenzbeitrag |
2017 | Cybersicherheit beyond 2020!: Herausforderungen für die IT-Sicherheitsforschung Eckert, C. | Zeitschriftenaufsatz |
2017 | Dissecting leakage resilient PRFs with multivariate localized EM attacks Unterstein, F.; Heyszl, J.; Santis, F. de; Specht, R. | Konferenzbeitrag |
2017 | Dynamic loader oriented programming on Linux Kirsch, J.; Bierbaumer, B.; Kittel, T.; Eckert, C. | Konferenzbeitrag |
2017 | Efficient security zones implementation through hierarchical group key management at NoC-based MPSoCs Sepulveda, J.; Flórez, D.; Immler, V.; Gogniat, G.; Sigl, G. | Zeitschriftenaufsatz |
2017 | Empowering convolutional networks for malware classification and analysis Kolosnjaji, B.; Eraisha, G.; Webster, G.; Zarras, A.; Eckert, C. | Konferenzbeitrag |
2017 | Evaluating the performance of continuous test-based cloud service certification Stephanow, P.; Banse, C. | Konferenzbeitrag |
2017 | Exploiting bus communication to improve cache attacks on systems-on-chips Sepulveda, J.; Gross, M.; Zankl, A.; Sigl, G. | Konferenzbeitrag |
2017 | Fast and reliable PUF response evaluation from unsettled bistable rings Hesselbarth, R.; Heyszl, J.; Sigl, G. | Zeitschriftenaufsatz |
2017 | Freeze & crypt: Linux kernel support for main memory encryption Huber, M.; Horsch, J.; Ali, J.; Wessel, S. | Konferenzbeitrag |
2017 | Fuzzy-glitch: A practical ring oscillator based clock glitch attack Obermaier, J.; Specht, R.; Sigl, G. | Konferenzbeitrag |
2017 | Guiding a colony of black-box fuzzers with chemotaxis Böttinger, K. | Konferenzbeitrag |
2017 | Herausforderungen an der Schnittstelle von Informatik und Gesellschaft: Institutionalisierte Erforschung der Digitalisierung zur Sicherung von Wohlstand und Fortschritt Anding, M.; Boes, A.; Eckert, C.; Harhoff, D.; Hess, T.; Münch, U.; Pretschner, A. | Zeitschriftenaufsatz |
2017 | Hiding secrecy leakage in leaky helper data Hiller, M.; Önalan, A.G. | Konferenzbeitrag |
2017 | How to break secure boot on FPGA SoCs through malicious hardware Jacob, N.; Heyszl, J.; Zankl, A.; Rolfes, C.; Sigl, G. | Konferenzbeitrag |
2017 | Low-latency X25519 hardware implementation Koppermann, P.; Santis, F. de; Heyszl, J.; Sigl, G. | Zeitschriftenaufsatz |
2017 | Ordol: Obfuscation-resilient detection of libraries in android applications Titze, D.; Lux, M.; Schuette, J. | Konferenzbeitrag |
2017 | Packet-wise compression and forwarding of industrial network captures Hansch, Gerhard; Schneider, Peter; Plaga, Sven | Konferenzbeitrag |
2017 | PerfWeb: How to violate web privacy with hardware performance events Gulmezoglu, B.; Zankl, A.; Eisenbarth, T.; Sunar, B. | Konferenzbeitrag |
2017 | A process model to support continuous certification of cloud services Kunz, I.; Stephanow, P. | Konferenzbeitrag |
2017 | Protecting Suspended Devices from Memory Attacks Huber, M.; Horsch, J.; Wessel, S. | Konferenzbeitrag |
2017 | Reference Architecture Model for the Industrial Data Space Otto, Boris; Lohmann, Steffen; Auer, Sören; Brost, Gerd; Cirullies, Jan; Eitel, Andreas; Ernst, Thilo; Haas, Christian; Huber, Manuel; Jung, Christian; Jürjens, Jan; Lange, Christoph; Mader, Christian; Menz, Nadja; Nagel, Ralf; Pettenpohl, Heinrich; Pullmann, Jaroslav; Quix, Christoph; Schon, Jochen; Schulz, Daniel; Schütte, Julian; Spiekermann, Markus; Wenzel, Sven | Bericht |
2017 | Risikobeurteilung in der IT-Sicherheit Kritischer Infrastrukturen - Eine Analyse der Risikobeurteilung im Förderschwerpunkt ITS|KRITIS Gurschler, Tamara; Großmann, Jürgen; Kotarski, David; Teichmann, Clemens; Thim, Christof; Eichler, Jörn; Göllner, Johannes; Gronau, Norbert; Lechner, Ulrike | Konferenzbeitrag |
2017 | Securing FPGA SoC configurations independent of their manufacturers Jacob, N.; Wittmann, J.; Heyszl, J.; Hesselbarth, R.; Wilde, F.; Pehl, M.; Sigl, G.; Fischer, K. | Konferenzbeitrag |
2017 | Side-Channel Attacks in the Internet of Things Zankl, A.; Seuschek, H.; Irazoqui, G.; Gulmezoglu, B. | Aufsatz in Buch |
2017 | Squeezing polynomial masking in tower fields. A higher-order masked AES S-box Santis, F. de; Bauer, T.; Sigl, G. | Konferenzbeitrag |
2017 | Stack overflow considered harmful? The impact of copy&paste on Android application security Fischer, F.; Böttinger, K.; Xiao, H.; Stransky, C.; Acar, Y.; Backes, M.; Fahl, S. | Konferenzbeitrag |
2017 | Supporting Risk Assessment with the Systematic Identification, Merging, and Validation of Security Goals Angermeier, D.; Nieding, A.; Eichler, J. | Konferenzbeitrag |
2017 | A survey on authorization in distributed systems: Information storage, data retrieval and trust evaluation Ahadipour, A.; Schanzenbach, M. | Konferenzbeitrag |
2017 | Take a moment and have some t: Hypothesis testing on raw PUF data Immler, V.; Hiller, M.; Obermaier, J.; Sigl, G. | Konferenzbeitrag |
2017 | A taxonomy-based approach for security in software-defined networking Banse, C.; Schuette, J. | Konferenzbeitrag |
2017 | Towards continuous security certification of Software-as-a-Service applications using web application testing techniques Stephanow, P.; Khajehmoogahi, K. | Konferenzbeitrag |
2017 | Towards post-quantum security for IoT endpoints with NTRU Guillen, O.M.; Pöppelmann, T.; Bermudo Mera, J.M.; Bongenaar, E.F.; Sigl, G.; Sepulveda, J. | Konferenzbeitrag |
2017 | Towards protected MPSoC communication for information protection against a Malicious NoC Sepulveda, J.; Zankl, A.; Florez, D.; Sigl, G. | Zeitschriftenaufsatz, Konferenzbeitrag |
2017 | Towards side-channel secure firmware updates Guillen, O.M.; Santis, F. de; Brederlow, R.; Sigl, G. | Konferenzbeitrag |
2017 | Towards trace-driven cache attacks on Systems-on-Chips - exploiting bus communication Sepulveda, J.; Gross, M.; Zankl, A.; Sigl, G. | Konferenzbeitrag |
2017 | TransCrypt: Transparent main memory encryption using a minimal ARM hypervisor Horsch, Julian; Huber, Manuel; Wessel, Sascha | Konferenzbeitrag |
2017 | Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs Immler, V.; Hiller, M.; Liu, Q.; Lenz, A.; Wachter-Zeh, A. | Konferenzbeitrag |
2017 | Your rails cannot hide from localized EM: How dual-rail logic fails on FPGAs Immler, V.; Specht, R.; Unterstein, F. | Konferenzbeitrag |
2016 | Analysing cyber-physical attacks to a Smart Grid: A voltage control use case Langer, L.; Smith, P.; Hutle, M.; Schaeffer-Filho, A. | Konferenzbeitrag |
2016 | Analyzing the security and privacy of cloud-based video surveillance systems Obermaier, J.; Hutle, M. | Konferenzbeitrag |
2016 | Apparatus and method for observing a ring of interconnected inverting circuit elements Hesselbarth, Robert | Patent |
2016 | An area-optimized serial implementation of ICEPOLE authenticated encryption schemes Tempelmeier, M.; Santis, F. de; Kaps, J.-P.; Sigl, G. | Konferenzbeitrag |
2016 | Attack on a DFA protected AES by simultaneous laser fault injections Selmke, B.; Heyszl, J.; Sigl, G. | Konferenzbeitrag |
2016 | A cautionary note: Side-channel leakage implications of deterministic signature schemes Seuschek, H.; Heyszl, J.; Santis, F. de | Konferenzbeitrag |
2016 | Chemotactic test case recombination for large-scale fuzzing Böttinger, K. | Zeitschriftenaufsatz |
2016 | CoKey: Fast token-based cooperative cryptography Horsch, Julian; Wessel, Sascha; Eckert, Claudia | Konferenzbeitrag |
2016 | Cryptographically enforced four-eyes principle Bilzhause, A.; Huber, M.; Pöhls, H.C.; Samelin, K. | Konferenzbeitrag |
2016 | A data usage control system using dynamic taint tracking Schütte, J.; Brost, G.S. | Konferenzbeitrag |
2016 | DeepFuzz: Triggering vulnerabilities deeply hidden in binaries Böttinger, K.; Eckert, C. | Konferenzbeitrag |
2016 | Detecting and correlating supranational threats for critical infrastructures Böttinger, K.; Hansch, G.; Filipovic, B. | Konferenzbeitrag |
2016 | Enhancing fault emulation of transient faults by separating combinational and sequential fault propagation Nyberg, R.; Heyszl, J.; Heinz, D.; Sigl, G. | Konferenzbeitrag |
2016 | Fast and reliable PUF response evaluation from unsettled bistable rings Hesselbarth, R.; Sigl, G. | Konferenzbeitrag |
2016 | A flexible framework for mobile device forensics based on cold boot attacks Huber, M.; Taubmann, B.; Wessel, S.; Reiser, H.P.; Sigl, G. | Zeitschriftenaufsatz |
2016 | Fuzzing binaries with Lévy flight swarms Böttinger, K. | Zeitschriftenaufsatz |
2016 | Generating threat profiles for cloud service certification systems Stephanow, P.; Banse, C.; Schütte, J. | Konferenzbeitrag |
2016 | Herausforderungen für Informationssicherheit in eingebetteten Systemen bei Angreifern mit Hardware-Zugriff Heyszl, J. | Zeitschriftenaufsatz |
2016 | Hierarchical group-key management for NoC-based MPSoCs protection Sepulveda, J.; Flórez, D.; Immler, V.; Gogniat, G.; Sigl, G. | Zeitschriftenaufsatz |
2016 | Hunting bugs with Lévy flight foraging Böttinger, K. | Konferenzbeitrag |
2016 | Interactive function identification decreasing the effort of reverse engineering Kilic, F.; Laner, H.; Eckert, C. | Konferenzbeitrag |
2016 | K-word proximity search on encrypted data Gall, M.; Brost, G. | Konferenzbeitrag |
2016 | Logboat - a simulation framework enabling CAN security assessments Plaga, S.; Tatschner, S.; Newe, T. | Konferenzbeitrag |
2016 | Managing and presenting user attributes over a decentralized secure name system Schanzenbach, M.; Banse, C. | Konferenzbeitrag |
2016 | Modellgestützte Risikoanalyse der Sicherheit Kritischer Infrastrukturen für kleine und mittlere Unternehmen: Eine Übersicht Teichmann, C.; Renatus, S.; Nieding, A. | Konferenzbeitrag |
2016 | Novel weaknesses in IEC 62351 protected Smart Grid control systems Strobel, M.; Wiedermann, N.; Eckert, C. | Konferenzbeitrag |
2016 | Online reliability testing for PUF key derivation Hiller, M.; Önalan, A.G.; Sigl, G.; Bossert, M. | Konferenzbeitrag |
2016 | Policy-based implicit attestation for microkernel-based virtualized systems Wagner, S.; Eckert, C. | Konferenzbeitrag |
2016 | Practical aspects of quantization and tamper-sensitivity for physically obfuscated keys Immler, V.; Hennig, M.; Kürzinger, L.; Sigl, G. | Konferenzbeitrag |
2016 | Precise laser fault injections into 90 nm and 45 nm SRAM-cells Selmke, B.; Brummer, S.; Heyszl, J.; Sigl, G. | Konferenzbeitrag |
2016 | A secure architecture for operating system-level virtualization on mobile devices Huber, M.; Horsch, J.; Velten, M.; Weiss, M.; Wessel, S. | Konferenzbeitrag |
2016 | A security aware routing approach for NoC-based MPSoCs Fernandes, R.; Marcon, C.; Cataldo, R.; Silveira, J.; Sigl, G.; Sepulveda, J. | Konferenzbeitrag |
2016 | seTPM: Towards flexible trusted computing on mobile devices based on GlobalPlatform secure elements Proskurin, S.; Weiß, M.; Sigl, G. | Konferenzbeitrag |
2016 | Test-based cloud service certification of opportunistic providers Stephanow, P.; Srivastava, G.; Schütte, J. | Konferenzbeitrag |
2016 | Towards efficient evaluation of a time-driven cache attack on modern processors Zankl, A.; Miller, K.; Heyszl, J.; Sigl, G. | Konferenzbeitrag |
2016 | Towards risk aware NoCs for data protection in MPSoCs Sepulveda, J.; Florez, D.; Fernandes, R.; Marcon, C.; Gogniat, G.; Sigl, G. | Konferenzbeitrag |
2016 | X25519 hardware implementation for low-latency applications Koppermann, P.; Santis, F. de; Heyszl, J.; Sigl, G. | Konferenzbeitrag |
2015 | Apparecium: Revealing data flows in Android applications Titze, D.; Schütte, J. | Konferenzbeitrag |
2015 | Applying real-time programming to legacy embedded control software Resmerita, S.; Naderlinger, A.; Huber, M.; Butts, K.; Pree, W. | Konferenzbeitrag |
2015 | Closing the gap between speed and configurability of multi-bit fault emulation environments for security and safety-critical designs Nyberg, R.; Heyszl, J.; Rabe, D.; Sigl, G. | Zeitschriftenaufsatz |
2015 | ConDroid: Targeted dynamic analysis of Android applications Schütte, J.; Fedler, R.; Titze, D. | Konferenzbeitrag |
2015 | Detecting fingerprinted data in TLS traffic Böttinger, K.; Schuster, D.; Eckert, C. | Konferenzbeitrag |
2015 | Geldspielgeräte in Zukunft mit geprüfter Sicherheit Heyszl, J.; Thiel, F. | Zeitschriftenaufsatz |
2015 | Identifying security requirements and privacy concerns in digital health applications Brost, G.S.; Hoffmann, M. | Aufsatz in Buch |
2015 | Improving mobile device security with operating system-level virtualization Wessel, Sascha; Huber, Manuel; Stumpf, Frederic; Eckert, Claudia | Zeitschriftenaufsatz |
2015 | Improving non-profiled attacks on exponentiations based on clustering and extracting leakage from multi-channel high-resolution EM measurements Specht, R.; Heyszl, J.; Kleinsteuber, M.; Sigl, G. | Konferenzbeitrag |
2015 | Improving prioritization of software weaknesses using security models with AVUS Renatus, S.; Bartelheimer, C.; Eichler, J. | Konferenzbeitrag |
2015 | Industrie 4.0 meets IT-Sicherheit: Eine Herausforderung! Eckert, C.; Fallenbeck, N. | Zeitschriftenaufsatz |
2015 | Language classes for cloud service certification systems Stephanow, P.; Gall, M. | Konferenzbeitrag |
2015 | Lightweight attestation and secure code update for multiple separated microkernel tasks Wagner, S.; Krauß, C.; Eckert, C. | Konferenzbeitrag |
2015 | A lightweight framework for cold boot based forensics on mobile devices Taubmann, B.; Huber, M.; Wessel, S.; Heim, L.; Reiser, H.P.; Sigl, G. | Konferenzbeitrag |
2015 | Low-area reed decoding in a generalized concatenated code construction for PUFs Hiller, M.; Kürzinger, L.; Sigl, G.; Müelich, S.; Puchinger, S.; Bossert, M. | Konferenzbeitrag |
2015 | Method selection and tailoring for agile threat assessment and mitigation Renatus, S.; Teichmann, C.; Eichler, J. | Konferenzbeitrag |
2015 | Mitigation of peer-to-peer overlay attacks in the automatic metering infrastructure of smart grids Rottondi, C.; Savi, M.; Verticale, G.; Krauß, C. | Zeitschriftenaufsatz |
2015 | A new definition and classification of physical unclonable functions Plaga, R.; Merli, D. | Konferenzbeitrag |
2015 | On cache timing attacks considering multi-core aspects in virtualized embedded systems Weiß, M.; Weggenmann, B.; August, M.; Sigl, G. | Konferenzbeitrag |
2015 | Preventing library spoofing on android Titze, D.; Schütte, J. | Konferenzbeitrag |
2015 | Resilience Against Physical Attacks Hutle, M.; Kammerstetter, M. | Aufsatz in Buch |
2015 | A secure northbound interface for SDN applications Banse, C.; Rangarajan, S. | Konferenzbeitrag |
2015 | Smart grid cybersecurity risk assessment Langer, L.; Smith, P.; Hutle, M. | Konferenzbeitrag |
2015 | Support Vector Machines under Adversarial Label Contamination Xiao, Huang; Biggio, Battista; Nelson, Blaine; Xiao, Han; Eckert, Claudia; Roli, Fabio | Zeitschriftenaufsatz |
2015 | Towards continuous certification of infrastructure-as-a-service using low-level metrics Stephanow, P.; Fallenbeck, N. | Konferenzbeitrag |
2015 | Transparent page-based kernel and user space execution tracing from a custom minimal ARM hypervisor Horsch, Julian; Wessel, Sascha | Konferenzbeitrag |
2015 | User identity verification based on touchscreen interaction analysis in web contexts Velten, Michael; Schneider, Peter; Wessel, Sascha; Eckert, Claudia | Konferenzbeitrag |
2014 | An architecture for trusted PaaS cloud computing for personal data González-Manzano, Lorena; Brost, Gerd; Aumueller, Matthias | Aufsatz in Buch |
2014 | Closing the gap between speed and configurability of multi-bit fault emulation environments for security and safety-critical designs Nyberg, R.; Nolles, J.; Heyszl, J.; Rabe, D.; Sigl, G. | Konferenzbeitrag |
2014 | Clustering algorithms for non-profiled single-execution attacks on exponentiations Heyszl, J.; Ibing, A.; Mangard, S.; Santis, F. de; Sigl, G. | Konferenzbeitrag |
2014 | Demonstrating the optimal placement of virtualized cellular network functions in case of large crowd events Gebert, S.; Hock, D.; Zinner, T.; Tran-Gia, P.; Hoffmann, M.; Jarschel, M.; Schmidt, E.-D.; Braun, R.-P.; Banse, C.; Köpsel, A. | Konferenzbeitrag |
2014 | Dynamic Hooks: Hiding Control Flow Changes within Non-Control Data Vogl, Sebastian; Gawlik, Robert; Garmany, Behrad; Kittel, Thomas; Pfoh, Jonas; Eckert, Claudia; Holz, Thorsten | Konferenzbeitrag |
2014 | Early propagation and imbalanced routing, how to diminish in FPGAs Moradi, A.; Immler, V. | Konferenzbeitrag |
2014 | Evaluation of bistable ring PUFs using single layer neural networks Schuster, D.; Hesselbarth, R. | Konferenzbeitrag |
2014 | Hardware Trojans. Current challenges and approaches Jacob, N.; Merli, D.; Heyszl, J.; Sigl, G. | Zeitschriftenaufsatz |
2014 | Increasing the efficiency of syndrome coding for PUFs with helper data compression Hiller, Matthias; Sigl, Georg | Konferenzbeitrag |
2014 | Integrity verification and secure loading of remote binaries for microkernel-based runtime environments Weiß, Michael; Wagner, Steffen; Hellmann, Roland; Wessel, Sascha | Konferenzbeitrag |
2014 | Investigating measurement methods for high-resolution electromagnetic field side-channel analysis Specht, R.; Heyszl, J.; Sigl, G. | Konferenzbeitrag |
2014 | Monitoring security compliance of critical processes Rieke, R.; Repp, J.; Zhdanova, M.; Eichler, J. | Konferenzbeitrag |
2014 | NFC? Aber sicher Schütte, Julian | Zeitschriftenaufsatz |
2014 | On MILS I/O Sharing Targeting Avionic Systems Müller, Kevin; Sigl, Georg; Triquet, Benoit; Paulitsch, Michael | Konferenzbeitrag |
2014 | Persistent Data-only Malware: Function Hooks without Code Vogl, Sebastian; Pfoh, Jonas; Kittel, Thomas; Eckert, Claudia | Konferenzbeitrag |
2014 | Physical unclonable function Merli, Dominik; Schuster, Dieter | Patent |
2014 | Side-channel analysis of a high-throughput AES peripheral with countermeasures Heinz, B.; Heyszl, J.; Stumpf, F. | Konferenzbeitrag |
2014 | SobTra - A software-based trust anchor for ARM cortex application processors Horsch, Julian; Wessel, Sascha; Stumpf, Frederic; Eckert, Claudia | Konferenzbeitrag |
2014 | Strategie- und Positionspapier Cyber-Sicherheit 2020: Herausforderungen für die IT-Sicherheitsforschung : Neugebauer, Reimund (Hrsg.); Jarke, M. (Hrsg.); Thoma, K. (Hrsg.); Beyerer, Jürgen (Red.); Eckert, Claudia (Red.); Martini, P. (Red.); Waidner, Michael (Red.) | Bericht |
2014 | Tolerating permanent and transient value faults Milosevic, Z.; Hutle, M.; Schiper, A. | Zeitschriftenaufsatz |
2014 | Towards fresh re-keying with leakage-resilient PRFs: chipher design principles and analysis Belaid, Sonia; Santis, Fabrizio de; Heyszl, Johann; Mangard, Stefan; Medwed, Marcel; Schmidt, Jörn-Marc; Standaert, Francois-Xavier; Tillich, Stefan | Zeitschriftenaufsatz |
2014 | Trust, privacy, and security in digital business. 11th international conference, TrustBus 2014. Preface Eckert, C.; Katsikas, S.K.; Pernul, G. | Konferenzbeitrag |
2014 | TrustID: Trustworthy identities for untrusted mobile devices Horsch, Julian; Böttinger, Konstantin; Weiß, Michael; Wessel, Sascha; Stumpf, Frederic | Konferenzbeitrag |
2014 | Verfahren zum Versehen eines mobilen Endgeräts mit einem Authentisierungszertifikat Stumpf, Frederic; Eckert, Claudia; Krauß, Christoph; Paeschke, Manfred; Dietrich, Frank | Patent |
2014 | Vorrichtung und Verfahren mit einem Träger mit Schaltungsstrukturen Hennig, Maxim; Schimmel, Oliver; Zieris, Philipp; Filipovic, Bartol | Patent |
2014 | Wireless-enabled smart societies in the 2020s Hoffmann, M.D.; Jefferies, N.; Woo, L.H. | Zeitschriftenaufsatz |