Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.
2021Activation Anomaly Analysis
Sperl, Philip; Schulze, Jan-Philipp; Böttinger, Konstantin
Konferenzbeitrag
2021Adversarial Vulnerability of Active Transfer Learning
Müller, N.M.; Böttinger, K.
Konferenzbeitrag
2021Beyond Cache Attacks: Exploiting the Bus-based Communication Structure for Powerful On-Chip Microarchitectural Attacks
Sepulveda, J.; Gross, M.; Zankl, A.; Sigl, G.
Zeitschriftenaufsatz
2021Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber
Hamburg, Mike; Hermelink, Julius; Primas, Robert; Samardjiska, Simona; Schamberger, Thomas; Streit, Silvan; Strieder, Emanuele; Vredendaal, Christine van
Zeitschriftenaufsatz
2021A Comparative Security Analysis of the German Federal Postal Voting Process
Heinl, Michael P.; Gölz, Simon; Bösch, Christoph
Konferenzbeitrag
2021The Cost of OSCORE and EDHOC for Constrained Devices
Hristozov, S.; Huber, M.; Xu, L.; Fietz, J.; Liess, M.; Sigl, G.
Konferenzbeitrag
2021Decentralized Identities for Self-sovereign End-users (DISSENS)
Schanzenbach, Martin; Grothoff, Christian; Wenger, Hansjürg; Kaul, Maximilian
Konferenzbeitrag
2021Does Every Second Count? Time-based Evolution of Malware Behavior in Sandboxes
Küchler, Alexander; Mantovani, Alessandro; Han, Yufei; Bilge, Leyla; Balzarotti, Davide
Konferenzbeitrag
2021Finding the Needle in the Haystack: Metrics for Best Trace Selection in Unsupervised Side-Channel Attacks on Blinded RSA
Kulow, A.; Schamberger, T.; Tebelmann, L.; Sigl, G.
Zeitschriftenaufsatz
2021Leveraging Edge Computing and Differential Privacy to Securely Enable Industrial Cloud Collaboration Along the Value Chain
Giehl, Alexander; Heinl, Michael P.; Busch, Maximilian
Konferenzbeitrag
2021Privatsphäre und Maschinelles Lernen
Boenisch, Franziska
Zeitschriftenaufsatz
2021Tapeout of a RISC-V crypto chip with hardware trojans: A case-study on trojan design and pre-silicon detectability
Hepp, A.; Sigl, G.
Konferenzbeitrag
2020AntiPatterns Regarding the Application of Cryptographic Primitives by the Example of Ransomware
Heinl, Michael P.; Giehl, Alexander; Graif, Lukas
Konferenzbeitrag
2020Applicability of Security Standards for Operational Technology by SMEs and Large Enterprises
Wagner, Patrick; Hansch, Gerhard; Konrad, Christoph; John, Karl-Heinz; Bauer, Jochen; Franke, Jörg
Konferenzbeitrag
2020Architecture of an intelligent Intrusion Detection System for Smart Home
Graf, J.; Neubauer, K.; Fischer, S.; Hackenberg, R.
Konferenzbeitrag
2020Automating Security Risk and Requirements Management for Cyber-Physical Systems
Hansch, Gerhard
Dissertation
2020Breaking the lightweight secure PUF: Understanding the relation of input transformations and machine learning resistance
Wisiol, N.; Becker, G.T.; Margraf, M.; Soroceanu, T.A.A.; Tobisch, J.; Zengin, B.
Konferenzbeitrag
2020cipherPath: Efficient traversals over homomorphically encrypted paths
Bramm, G.; Schütte, J.
Konferenzbeitrag
2020Data Poisoning Attacks on Regression Learning and Corresponding Defenses
Müller, N.; Kowatsch, D.; Böttinger, K.
Konferenzbeitrag
2020Datenplattform nach dem Security-by-Design-Prinzip: Produktionsdaten sicher in der Cloud verarbeiten
Giehl, Alexander; Heinl, Michael P.
Zeitschriftenaufsatz
2020Deutsche Normungsroadmap Künstliche Intelligenz
Adler, R.; Kolomiichuk, Sergii; Hecker, Dirk; Lämmel, Philipp; Ma, Jackie; Marko, Angelina; Mock, Michael; Nagel, Tobias; Poretschkin, Maximilian; Rennoch, Axel; Röhler, Marcus; Ruf, Miriam; Schönhof, Raoul; Schneider, Martin A.; Tcholtchev, Nikolay; Ziehn, Jens; Böttinger, Konstantin; Jedlitschka, Andreas; Oala, Luis; Sperl, Philip; Wenzel, Markus; et. al.
: Wahlster, W.; Winterhalter, C.
Studie
2020DLA: Dense-Layer-Analysis for Adversarial Example Detection
Sperl, Philip; Kao, Ching-yu; Chen, Peng; Lei, Xiao; Böttinger, Konstantin
Konferenzbeitrag
2020Drei Fragen an... das Fraunhofer AISEC. "Security als sich kontinuierlich weiterentwickelnder Prozess"
Heinl, Michael P.; Giehl, Alexander
Internetbeitrag
2020An Edge Framework for the Application of Privacy Enhancing Technologies in IoT Communications
Kunz, I.; Stephanow, P.; Banse, C.
Konferenzbeitrag
2020Exploiting Interfaces of Secure Encrypted Virtual Machines
Radev, Martin; Morbitzer, Mathias
Konferenzbeitrag
2020FridgeLock: Preventing Data Theft on Suspended Linux with Usable Memory Encryption
Franzen, F.; Andreas, M.; Huber, M.
Konferenzbeitrag
2020Integrating security evaluations into virtual commissioning
Giehl, Alexander; Wiedermann, Norbert; Tayebi Gholamzadeh, Makan; Eckert, Claudia
Konferenzbeitrag
2020The Lazarus Effect: Healing Compromised Devices in the Internet of Small Things
Huber, M.; Hristozov, S.; Ott, S.; Sarafov, V.; Peinado, M.
Konferenzbeitrag
2020Optimizing Information Loss Towards Robust Neural Networks
Sperl, Philip; Böttinger, Konstantin
Konferenzbeitrag
2020Privacy smells: Detecting privacy problems in cloud architectures
Kunz, I.; Schneider, A.; Banse, C.
Konferenzbeitrag
2020Protecting RESTful IoT Devices from Battery Exhaustion DoS Attacks
Hristozov, S.; Huber, M.; Sigl, G.
Konferenzbeitrag
2020Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers
Unterstein, Florian; Schink, Marc; Schamberger, Thomas; Tebelmann, Lars; Ilg, Manuel; Heyszl, Johann
Zeitschriftenaufsatz
2020Review of error correction for PUFs and evaluation on state-of-the-art FPGAs
Hiller, Matthias; Kürzinger, Ludwig; Sigl, Georg
Zeitschriftenaufsatz
2020Secure and user-friendly over-the-air firmware distribution in a portable faraday cage
Striegel, M.; Heyszl, J.; Jakobsmeier, F.; Matveev, Y.; Sigl, G.
Konferenzbeitrag
2020Selecting privacy enhancing technologies for IoT-based services
Kunz, I.; Banse, C.; Stephanow, P.
Konferenzbeitrag
2020SEVurity: No security without integrity: Ng integrity-free memory encryption with minimal assumptions
Wilke, L.; Wichelmann, J.; Morbitzer, M.; Eisenbarth, T.
Konferenzbeitrag
2020Sicherheitsaspekte der Plattform ScaleIT im Kontext von DigitalTWIN
Wester, Hannah; Heinl, Michael P.; Schneider, Peter
Bericht
2020Spatial Context Tree Weighting for Physical Unclonable Functions
Pehl, M.; Tretschok, T.; Becker, D.; Immler, V.
Konferenzbeitrag
2020Temporary Laser Fault Injection into Flash Memory: Calibration, Enhanced Attacks, and Countermeasures
Garb, K.; Obermaier, J.
Konferenzbeitrag
2020Towards resilient factories of future defining required capabilities for a resilient factory of future
Glawe, M.; Feeken, L.; Wudka, B.; Kao, C.-Y.; Mirzaei, E.; Weinhold, T.; Szanto, A.
Konferenzbeitrag
2020Towards Resistant Audio Adversarial Examples
Dörr, T.; Markert, K.; Müller, N.M.; Böttinger, K.
Konferenzbeitrag
2020Towards Self-sovereign, decentralized personal data sharing and identity management
Schanzenbach, Martin
Dissertation
2020Towards tracking data flows in cloud architectures
Kunz, I.; Casola, V.; Schneider, A.; Banse, C.; Schütte, J.
Konferenzbeitrag
2020Towards Transparent Control-Flow Integrity in Safety-Critical Systems
Kuzhiyelil, D.; Zieris, P.; Kadar, M.; Tverdyshev, S.; Fohler, G.
Konferenzbeitrag