Publications

Studies, Specifications, Articles

Fraunhofer AISEC scientists regularly write studies on current topics in the area of IT security. Here you can find the publications of past years.

Please find more interesting articles and papers on our German website.

 

Fraunhofer Publica

The »Fraunhofer Publica« database documents publications and patents grown out of research activities of all Fraunhofer institutes.

This database contains bibliographic data of articles, conference papers and proceedings, research reports, studies, theses, patents, etc. that are written by researchers of the Fraunhofer-Gesellschaft.

Publications

  • Christian Banse, Immanuel Kunz, Angelika Schneider, and Konrad Weiss. “Cloud Property Graph: Connecting Cloud Security Assessments with Static Code Analysis”. In: 2021 IEEE 14th International Conference on Cloud Computing (CLOUD). IEEE. 2021.
  • Christian Banse, Florian Wendland, and Konrad Weiss. “Automatisierte Compliance-Prüfung in Software-Artefakten”. In: Deutschland. Digital. Sicher. 30 Jahre BSI. SecuMedia Verlag, 2021. ISBN: 978-3-922746-83-6.
  • Franziska Boenisch. “Privatsphäre und Maschinelles Lernen”. In: 45th ser. (2021), pp. 448–452. DOI: https://doi.org/10.1007/s11623-021-1469-3.
  • Georg Bramm, Matthias Hiller, Christian Hofmann, Stefan Hristozov, Maximilian Oppelt, Norman Pfeiffer, Martin Striegel, Matthias Struck, and Dominik Weber. “CardioTEXTIL: Wearable for Monitoring and End-to-End Secure Distribution of ECGs”. In: IEEE 17th International Conference on Wearable and Implantable Body Sensor Networks (BSN). 2021.
  • Alexander Giehl, Michael P. Heinl, and Maximilian Busch. “Leveraging Edge Computing and Differential Privacy to Securely Enable Industrial Cloud Collaboration Along the Value Chain”. In: 2021 IEEE 17th International Conference on Automation Science and Engineering (CASE). Lyon, France:
    IEEE, 2021, pp. 2023–2028. ISBN: 978-1-6654-1873-7. DOI: 10.1109/CASE49439.2021.9551656.
    URL: https://ieeexplore.ieee.org/document/9551656.
  • Mike Hamburg, Julius Hermelink, Robert Primas, Simona Samardjiska, Thomas Schamberger, Silvan Streit, Emanuele Strieder, and Christine van Vredendaal. “Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber”. In: IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021.4 (2021), pp. 88–113. DOI: 10.46586/tches.v2021.i4.88-113.
    URL: https://doi.org/10.46586/tches.v2021.i4.88-113.
  • Florian Hauschild, Kathrin Garb, Lukas Auer, Bodo Selmke, and Johannes Obermaier. “ARCHIE: A QEMU-Based Framework for Architecture-Independent Evaluation of Faults”. In: 2021 Workshop on Fault Detection and Tolerance in Cryptography (FDTC). 2021.
  • Michael P. Heinl, Simon Gölz, and Christoph Bösch. “A Comparative Security Analysis of the German Federal Postal Voting Process”. In: DG.O2021: The 22nd Annual International Conference on Digital Government Research. DG.O’21. Omaha, NE, USA: Association for Computing Machinery, 2021, 198–207. ISBN: 9781450384926. DOI: 10.1145/3463677.3463679.
    URL: https://doi.org/10.1145/3463677.3463679.
  • Tobias Hemmert, Mandred Lochter, Daniel Loebenberger, Marian Margraf, Stephanie Reinhardt, and Georg Sigl. “Quantencomputerresistente Kryptografie: Aktuelle Aktivitäten und Fragestellungen”. In: Deutschland. Digital. Sicher. 30 Jahre BSI. SecuMedia Verlag, 2021, pp. 367–381. ISBN: 978-3-922746-83-6.
  • Felicitas Hetzelt, Martin Radev, Robert Buhren, Mathias Morbitzer, and Jean-Pierre Seifert. “VIA: Analyzing Device Interfaces of Protected Virtual Machines”. In: 37th Annual Computer Security Applications Conference (ACSAC 2021). 2021.
  • Stefan Hristozov, Manuel Huber, Lei Xu, Jaro Fietz, Marco Liess, and Georg Sigl. “The Cost of OS-CORE and EDHOC for Constrained Devices”. In: Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy. CODASPY ’21. Virtual Event, USA: Association for Computing Machinery, 2021, 245–250. ISBN: 9781450381437. DOI: 10.1145/3422337.3447834.
    URL: https://doi.org/10.1145/3422337.3447834.
  • Alexander Küchler, Alessandro Mantovani, Yufei Han, Leyla Bilge, and Davide Balzarotti. “Does Every Second Count? Time-based Evolution of Malware Behavior in Sandboxes”. In: Network and Distributed Systems Security (NDSS) Symposium. 2021.
  • Tobias Madl. “Security Concept with Distributed Trust-Levels for Autonomous Cooperative Vehicle Networks”. In: Proceedings of the 32nd Annual IEEE Intelligent Vehicles Symposium. IV ’21. NAGOYA, JAPAN: IEEE, 2021.
  • Hendrik Meyer zum Felde, Mathias Morbitzer, and Julian Schütte. “Securing Remote Policy Enforcement by a Multi-Enclave based Attestation Architecture”. In: 19th IEEE international conference on embedded and ubiquitous computing (EUC 2021). 2021.
  • Mathias Morbitzer, Sergej Proskurin, Martin Radev, Marko Dorfhuber, and Erick Quintanar Salas. “SEVerity: Code Injection Attacks against Encrypted Virtual Machines”. In: 15th IEEE Workshop on Offensive Technologies (WOOT). 2021.
  • N. Müller and K. Böttinger. “Adversarial Vulnerability of Active Transfer Learning”. In: Symposium on Intelligent Data Analysis 2021. 2021.
  • Nicolas Müller, Franziska Dieckmann, Pavel Czempin, Roman Canals, and Konstantin Böttinger. “Speech is Silver, Silence is Golden: What do ASVspoof-trained Models Really Learn?” In: ASVSpoof 2021 Workshop. 2021.
  • Martin Schanzenbach, Christian Grothoff, Hansjürg Wenger, and Maximilian Kaul. “Decentralized Identities for Self-sovereign End-users (DISSENS)”. In: Open Identity Summit 2021. Ed. by Heiko Roßnagel, Christian H. Schunck, and Sebastian Mödersheim. Bonn: Gesellschaft für Informatik e.V., 2021, pp. 47–58.
  • Marc Schink, Alexander Wagner, Florian Unterstein, and Johann Heyszl. “Security and Trust in Open Source Security Tokens”. In: IACR Transactions on Cryptographic Hardware and Embedded Systems 2021.3 (2021), 176–201. DOI: 10.46586/tches.v2021.i3.176-201.
    URL: https://tches.iacr.org/index.php/TCHES/article/view/8972.
  • Jan-Philipp Schulze, Philip Sperl, and Konstantin Böttinger. “DA3G: Detecting Adversarial Attacks by Analysing Gradients”. In: Computer Security – ESORICS 2021. Springer, 2021. DOI: 10.1007/978-3-030-88418-5_27.
    URL: https://doi.org/10.1007/978-3-030-88418-5_27.
  • Philip Sperl, Jan-Philipp Schulze, and Konstantin Böttinger. “Activation Anomaly Analysis”. In: Machine Learning and Knowledge Discovery in Databases. Ed. by Frank Hutter, Kristian Kersting, Jefrey Lijffijt, and Isabel Valera. Cham: Springer International Publishing, 2021, pp. 69–84. ISBN: 978-3-030-67661-2.
  • Martin Striegel, Jonas Erasmus, and Parag Jain. “Evaluating Augmented Reality for Wireless Network Security Education”. en. In: {IEEE} Frontiers in Education {FIE}. 2021.
  • Stefan Tatschner, Ferdinand Jarisch, Alexander Giehl, Sven Plaga, and Thomas Newe. “The Stream Exchange Protocol: A Secure and Lightweight Tool for Decentralized Connection Establishment”. In: vol. 21. 15. 2021. DOI: 10.3390/s21154969.
    URL: https://www.mdpi.com/1424-8220/21/15/4969.
  • Emanuel Q. Vintila, Philipp Zieris, and Julian Horsch. “MESH: A Memory-Efficient Safe Heap for C/C++”. In: Proceedings of the 16th International Conference on Availability, Reliability and Security. ARES ’21. Vienna, Austria: ACM, Aug. 2021. ISBN: 978-1-4503-9051-4. DOI: 10.1145/3465481.3465760.
    URL: https://doi.org/10.1145/3465481.3465760.

 

  • Georg Bramm. and Julian Schütte. “cipherPath: Efficient Traversals over Homomorphically Encrypted Paths”. In: Proceedings of the 17th International Joint Conference on e-Business and Telecommunications - Volume 3: SECRYPT. INSTICC. SciTePress, 2020, pp. 271–278. ISBN: 978-989-758-446-6. DOI: 10.5220/0009777802710278.
  • Johannes vom Dorp, Joachim von zur Gathen, Daniel Loebenberger, Jan Lür, and Simon Schneider. “Comparative analysis of random generators”. In: Algorithmic Combinatorics – Enumerative Combinatorics, Special Functions and Computer Algebra. Ed. by Veronika Pillwein and Carsten Schneider. Springer International Publishing, Dec. 2020, pp. 181–196.
    URL: http://dx.doi.org/10.1007/978-3-030-44559-1_10
  • Tom Dörr, Karla Markert, Nicolas M. Müller, and Konstantin Böttinger. “Towards Resistant Audio Adversarial Examples”. In: 1st Security and Privacy on Artificial Intelligent Workshop (SPAI’20). ACM AsiaCCS. Taipei, Taiwan, 2020. DOI: https://doi.org/10.1145/3385003.3410921
  • Sebastian Fischer, Katrin Neubauer, and Rudolf Hackenberg. “A Study About the Different Categories of IoT in Scientific Publications”. In: CLOUD COMPUTING 2020, The Eleventh International Conference on Cloud Computing, GRIDs, and Virtualization. 2020, pp. 24–30.
  • Fabian Franzen, Manuel Andreas, and Manuel Huber. “FridgeLock: Preventing Data Theft on Suspended Linux with Usable Memory Encryption”. In: Proceedings of the 10th ACM on Conference on Data and Application Security and Privacy. CODASPY ’20. New Orleans, LA, USA: ACM, 2020, p. 6.
  • Kathrin Garb and Johannes Obermaier. “Temporary Laser Fault Injection into Flash Memory: Calibration, Enhanced Attacks, and Countermeasures”. In: 26th IEEE International Symposium on On-Line Testing and Robust System Design (IOLTS). 2020.
  • Alexander Giehl, Norbert Wiedermann, Makan Tayebi Gholamzadeh, and Claudia Eckert. “Integrating security evaluations into virtual commissioning”. In: 2020 IEEE 16th International Conference on Automation Science and Engineering Proceedings. Hong Kong: IEEE, 2020. ISBN: 978-1-7281-6904-0. DOI: 10.1109/CASE48305.2020.9217004.
    URL: https://ieeexplore.ieee.org/document/9217004
  • Gerhard Hansch. “Automating Security Risk and Requirements Management for Cyber-Physical Systems”. Dissertation. Göttingen, Germany: Georg-August-Universität Göttingen, Dec. 2020. DOI:
    10.24406/AISEC-N-608669.
    URL: http://hdl.handle.net/21.11130/00-1735-0000-0005-1517-A
  • Michael P. Heinl, Alexander Giehl, and Lukas Graif. “AntiPatterns Regarding the Application of Cryptographic Primitives by the Example of Ransomware”. In: Proceedings of the 15th International
    Conference on Availability, Reliability and Security (ARES 2020). ARES ’20. Virtual Event, Ireland: Association for Computing Machinery, 2020. ISBN: 9781450388337. DOI: 10.1145/3407023.3409182.
    URL: https://doi.org/10.1145/3407023.3409182
  • Johann Heyszl, Katja Miller, Florian Unterstein, Marc Schink, Alexander Wagner, Horst A. Gieser, Sven Freud, Tobias Damm, Dominik Klein, and Dennis Kügler. “Investigating Profiled Side-Channel Attacks Against the DES Key Schedule”. In: IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020.3
    (2020), pp. 22–72. DOI: 10.13154/tches.v2020.i3.22-72.
    URL: https://doi.org/10.13154/tches.v2020.i3.22-72
  • Matthias Hiller, Ludwig Kürzinger, and Georg Sigl. “Review of error correction for PUFs and evaluation on state-of-the-art FPGAs”. In: Journal of Cryptographic Engineering (2020).
  • Lukas Hinterberger, Sebastian Fischer, Bernhard Weber, Katrin Neubauer, and Rudolf Hackenberg. “IoT Device IdentificAtion and RecoGnition (IoTAG)”. In: CLOUD COMPUTING 2020, The Eleventh International Conference on Cloud Computing, GRIDs, and Virtualization. 2020, pp. 17–23.
  • Stefan Hristozov, Manuel Huber, and Georg Sigl. “Protecting RESTful IoT Devices from Battery Exhaustion DoS Attacks”. en. In: IEEE International Symposium on Hardware Oriented Security and Trust (HOST). San Jose, CA, USA, 2020.
  • Manuel Huber, Stefan Hristozov, Simon Ott, Vasil Sarafov, and Marcus Peinado. “The Lazarus Effect: Healing Compromised Devices in the Internet of Small Things”. In: Proceedings of the 15th ACM
    Asia Conference on Computer and Communications Security. ASIA CCS ’20. Taipei, Taiwan: Association for Computing Machinery, 2020, 6–19. ISBN: 9781450367509. DOI: 10.1145/3320269.3384723.
    URL: https://doi.org/10.1145/3320269.3384723.
  • I. Kunz, A. Schneider, and C. Banse. “Privacy Smells: Detecting Privacy Problems in Cloud Architectures”. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and
    Communications (TrustCom). 2020, pp. 1324–1331. DOI: 10.1109/TrustCom50675.2020.00178.
  • Immanuel Kunz, Christian Banse, and Philipp Stephanow. “Selecting Privacy Enhancing Technologies for IoT-Based Services”. In: International Conference on Security and Privacy in Communication Systems. Springer. 2020, pp. 455–474.
  • Immanuel Kunz, Valentina Casola, Angelika Schneider, Christian Banse, and Julian Schütte. “Towards Tracking Data Flows in Cloud Architectures”. In: 2020 IEEE 13th International Conference on Cloud Computing (CLOUD). IEEE. 2020, pp. 445–452.
  • Immanuel Kunz, Philipp Stephanow, and Christian Banse. “An Edge Framework for the Application of Privacy Enhancing Technologies in IoT Communications”. In: ICC 2020-2020 IEEE International Conference on Communications (ICC). IEEE. 2020, pp. 1–6.
  • Don Kuzhiyelil, Philipp Zieris, Marine Kadar, Sergey Tverdyshev, and Gerhard Fohler. “Towards Transparent Control-Flow Integrity in Safety-Critical Systems”. In: Proceedings of the 23rd International Conference on Information Security. ISC ’20. Bali, Indonesia: Springer, 2020, pp. 290–311. ISBN: 9783030629748. DOI: 10.1007/978-3-030-62974-8_17.
    URL: https://doi.org/10.1007/978-3-030-62974-8_17.
  • Karla Markert, Donika Mirdita, and Konstantin Böttinger. “Adversarial Attacks on Speech Recognition Systems: Language Bias in Literature”. In: ACM Computer Science in Cars Symposium (CSCS). Online, 2020.
  • Karla Markert, Romain Parracone, Philip Sperl, and Konstantin Böttinger. “Visualizing Automatic Speech Recognition”. In: Annual Computer Security Applications Conference (ACSAC). Online, 2020.
  • N. Müller, D. Kowatsch, and K. Böttinger. “Data Poisoning Attacks on Regression Learning and Corresponding Defenses”. In: 25th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC). 2020.
  • N. Müller, S. Roschmann, and K. Böttinger. “Defending Against Adversarial Denial-of-Service Data Poisoning Attacks”. In: DYNAMICS Workshop, Annual Computer Security Applications Conference (ACSAC). 2020.
  • Katrin Neubauer, Sebastian Fischer, and Rudolf Hackenberg. “Security Risk Analysis of the Cloud Infrastructure of Smart Grid and IoT - 4-Level-Trust-Model as a Security Solution”. In: International Journal on Advances in Internet Technology 13.1 (2020), pp. 11–20.
  • Johannes Obermaier and Marc Schink. “Analysis of Firmware Protection in State-of-the-Art Microcontrollers”. In: Proceedings of the 2020 Embedded World Conference. EWC ’20. Nuremberg, Germany: WEKA Fachmedien, Feb. 2020
  • Martin Radev and Mathias Morbitzer. “Exploiting Interfaces of Secure Encrypted Virtual Machines”. In: Proceedings of the 4rd Reversing and Offensive-oriented Trends Symposium. ROOTS ’20. Vienna, Austria: ACM, 2020.
  • Martin Schanzenbach. “Towards Self-sovereign, decentralized personal data sharing and identity management”. Dissertation. München: Technische Universität München, 2020.
  • P. Sperl and K. Böttinger. “Optimizing Information Loss Towards Robust Neural Networks”. In: DYNAMICS Workshop, Annual Computer Security Applications Conference (ACSAC). 2020.
  • P. Sperl, C-Y. Kao, P. Chen, X. Lei, and K. Böttinger. “DLA: Dense-Layer-Analysis for Adversarial Example Detection”. In: 5th IEEE European Symposium on Security and Privacy (EuroS&P). 2020.
  • Emanuele Strieder, Christoph Frisch, and Michael Pehl. “Machine Learning of Physical Unclonable Functions using Helper Data, Revealing a Pitfall in the Fuzzy Commitment Scheme”. In: IACR Cryptol. ePrint Arch. 2020 (2020), p. 888.
    URL: https://eprint.iacr.org/2020/888.
  • Martin Striegel, Johann Heyszl, Florian Jakobsmeier, Yacov Matveev, and Georg Sigl. “Secure and user-friendly over-the-air firmware distribution in a portable faraday cage”. In: WiSec ’20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10,
    2020. Ed. by René Mayrhofer and Michael Roland. ACM, 2020, pp. 173–183. DOI: 10.1145/3395351.3399342.
    URL: https://doi.org/10.1145/3395351.3399342.
  • Florian Unterstein, Marc Schink, Thomas Schamberger, Lars Tebelmann, Manuel Ilg, and Johann Heyszl. “Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers”. In: IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020.4 (2020), pp. 365–388. DOI: 10.13154/tches.v2020.i4.365-388.
    URL: https://doi.org/10.13154/tches.v2020.i4.365-388
  • Florian Unterstein, Tolga Sel, Thomas Zeschg, Nisha Jacob, Michael Tempelmeier, Michael Pehl, and Fabrizio De Santis. “Secure Update of FPGA-based Secure Elements using Partial Reconfiguration”. In: TRUDEVICE 2020: 9th Workshop on Trustworthy Manufacturing and Utilization of Secure Devices (2020).
    URL: https://eprint.iacr.org/2020/833.
  • Florian Unterstein, Tolga Sel, Thomas Zeschg, Nisha Jacob, Michael Tempelmeier, Michael Pehl, and Fabrizio De Santis. “Secure Update of FPGA-based Secure Elements using Partial Reconfiguration”. In: IACR Cryptol. ePrint Arch. 2020 (2020), p. 833.
    URL: https://eprint.iacr.org/2020/833.
  • Patrick Wagner, Gerhard Hansch, Christoph Konrad, Karl-Heinz John, Jochen Bauer, and Jörg Franke. “Applicability of Security Standards for Operational Technology by SMEs and Large Enterprises”. In: IN PRESS, 25th IEEE Conference on Emerging Technologies and Factory Automation.
    ETFA ’20. Vienna, Austria: IEEE, Sept. 2020, pp. 1544–1551. DOI: 10.1109/ETFA46521.2020.9212126.
  • Luca Wilke, Jan Wichelmann, Mathias Morbitzer, and Eisenbarth Thomas. “SEVurity: No Security Without Integrity - Breaking Integrity-Free Memory Encryption with Minimal Assumptions”. In: 2020 IEEE Symposium on Security and Privacy, SP 2020, San Francisco, CA, USA, MAY 18-20, 2020. IEEE. 2020.

  • M. Huber, G. Brost, J. Schütte, M. Weiß, M. Protsenko and S. Wessel. “An Ecosystem and IoT Device Architecture for Building Trust in the Industrial Data Space”. In: CPSS’18: The 4th ACM Cyber-Physical System Security Workshop. CPSS’18. Incheon, Republic of Korea: ACM, 2018. ISBN: 9781450357555. DOI: https://doi.org/10.1145/3198458.3198459.
  • V. Immler, J. Obermaier, M. König, M. Hiller, and G. Sigl. “B-TREPID: Batteryless Tamper-Resistant Envelope with a PUF and Integrity Detection”. In: IEEE International Symposium on Hardware Oriented Security and Trust (HOST). 2018, pp. 49–56.
  • S. Kleber, F. Unterstein, M. Hiller, F. Slomka, M. Matousek, F. Kargl, and C. Bösch. “Secure Code Execution: A Generic PUF-driven System Architecture”. In: Information Security Conference (ISC). Ed. by Liqun Chen and Mark Manulis. LNCS. Springer, 2018.
  • M. Niedermaier, T. Hanka, S. Plaga, B. Alexander, and D. Merli. “Efficient Passive ICS Device Discovery and Identification by MAC Address Correlation”. In: 5th International Symposium for ICS & SCADA Cyber Security (ICS-CSR 2018). Accepted, to be published 2018.
  • J. Obermaier and V. Immler. “The Past, Present, and Future of Physical Security Enclosures: From Battery-Backed Monitoring to PUF-Based Inherent Security and Beyond”. In: IEEE International Workshop on Physical Attacks and Inspection on Electronics, 2018.
  • P. Zieris and J. Horsch. “A Leak-Resilient Dual Stack Scheme for Backward-Edge Control-Flow Integrity”. In: Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security. ASIA CCS ’18. Incheon, Republic of Korea: ACM, June 2018. ISBN: 9781450355766. DOI: 10.1145/3196494.3196531. URL: http://doi.acm.org/10.1145/3196494.3196531.
  • S. Plaga, N. Wiedermann, H. Gerhard, and N. Thomas. “Secure your SSH Keys! – Motivation and Practical Implementation of a HSM-based Approach Securing Private SSH-Keys”. In: Proceedings of the 17th European Conference on Cyber Warfare and Security. ECCWS ’18. University of Oslo, Norway: Academic Conferences and Publishing International (ACPI) Limited, 2018, pp. 370–379. ISBN: 9781911218852.
  • M. Schanzenbach, C. Banse, and J. Schütte. “Practical Decentralized Attribute-Based Delegation using Secure Name Systems”. In: Proceedings of the International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). Aug. 2018.
  • M. Schanzenbach, G. Bramm, and J. Schütte. “reclaimID: Secure, Self-Sovereign Identities using Name Systems and Attribute-Based Encryption”. In: Proceedings of the International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). Aug.2018.
  • F. Unterstein, J. Heyszl, F. De Santis, R. Specht, and G. Sigl. “High-Resolution EM Attacks Against Leakage-Resilient PRFs Explained - And An Improved Construction”. In: Cryptographers Track RSA Conference (CTRSA 2018). Springer, 2018.
  • S. Weiser, A. Zankl, R. Spreitzer, K. Miller, S. Mangard, and G. Sigl. “DATA – Differential Address Trace Analysis: Finding Address-based Side-Channels in Binaries”. In: 27th USENIX Security Symposium (USENIX Security 18). to appear. Baltimore, MD: USENIX Association, 2018. URL: https://www.usenix.org/conference/usenixsecurity18/presentation/weiser.
  • N. Wiedermann and S. Plaga. “Rowhammer – A Survey Assessing the Severity of this Attack Vector”. In: Proceedings of the 2018 Embedded World Conference. EWC ’18. Nuermberg, Germany: WEKA Fachmedien, Feb. 2018. ISBN: 9783645501736.
  • J. Obermaier, V. Immler, M. Hiller, and G. Sigl. “A Measurement System for Capacitive PUF-Based Security Enclosures”. In: ACM/IEEE Design Automation Conference (DAC), 2018.
  • K. Böttinger, R. Singh, and P. Godefroid. “Deep Reinforcement Fuzzing”. In: IEEE Symposium on Security and Privacy Workshops 2018.
  • R. Hesselbarth, F. Wilde, C. Gu, and H. Neil. “Large Scale RO PUF Analysis over Slice Type, Evaluation Time and Temperature on 28nm Xilinx FPGAs”. en. In: IEEE International Symposium on Hardware Oriented Security and Trust (HOST). Washington DC, USA, 2018.
  • M. Morbitzer, M. Huber, J. Horsch, and S. Wessel. “SEVered: Subverting AMD’s Virtual Machine Encryption”. In: Proceedings of the 11th European Workshop on Systems Security. EuroSec’18. Porto, Portugal: ACM, 2018. ISBN: 9781450356527. DOI: 10.1145/3193111.3193112.
  • D. Seydel, G. Weiß, D. Pöhn, S. Wessel, and F. Wenninger. “Safety & Security Testing of Cooperative Automotive Systems”. In: Embedded World Conference 2018. Ed. by WEKA Fachmedien.
  • J. Obermaier, F. Hauschild, M. Hiller, and G. Sigl. “An Embedded Key Management System for PUF-based Security Enclosures”. In: 2018 7th Mediterranean Conference on Embedded Computing (MECO). accepted, to be published, 2018.
  • P. Koppermann, F. De Santis, J. Heyszl and G. Sigl. “Fast FPGA implementations of Diffie-Hellman on the Kummer surface of a genus-2 curve”. In: Transactions on Cryptographic Hardware and Embedded Systems, TCHES 2018, to appear.
  • C. Wedig Reinbrecht, B. Endres Forlin, A. Zankl, J. Sepulveda. “Earthquake – A NoC-based optimized differential collision cache attack for MPSoCs”. In: Design Automation and Test in Europe, DATE 2018. to appear. Dresden, Germany, 2018.
  • F. Unterstein, J. Heyszl, F. De Santis, R. Specht and G. Sigl. “High-Resolution EM Attacks Against Leakage-Resilient PRFs Explained - And An Improved Construction”. In: Cryptographers Track RSA Conference (CTRSA 2018). Springer, to appear 2018.
  • A. Giehl and N. Wiedermann. “Security verification of third party design files in manufacturing”. In: Proceedings of the 10th International Conference on Computer and Automation Engineering. ICCAE ’18. Brisbane, Australia, to appear 2018.

  • N. Rakotondravony, B. Taubmann, W. Mandarawi, E. Weishäupl, P. Xu, B. Kolosnjaji, M. Protsenko, H. de Meer, and H. P. Reiser. “Classifying malware attacks in IaaS cloud environments”. In: Journal of Cloud Computing 6.1 (Dec. 2017), p. 26. DOI: 10. 1186/s13677-017-0098-8. URL: http:https://doi.org/10.1186/s13677-017-0098-8.
  • V. Immler, R. Specht, and F. Unterstein. “Your Rails Cannot Hide From Localized EM: How Dual-Rail Logic Fails on FPGAs”. In: Conference on Cryptographic Hardware and Embedded Systems, CHES 2017.
  • C. Banse, P. Stephanow and M. Moein. “Continuous Location Validation of Cloud Service Components”. In: Proceedings of the 9th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2017.
  • G. Hansch, P. Schneider and S. Plaga. “Packet-wise Compression and Forwarding of Industrial Network Captures”. In: Proceedings of the 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS’2017). Bucharest, Romania: IEEE, 2017, pp. 66–70. ISBN: 9781538606964.
  • J. Horsch, M. Huber and S. Wessel. “TransCrypt: Transparent Main Memory Encryption Using a Minimal ARM Hypervisor”. In: Proceedings of the 16th International Conference on Trust, Security and Privacy in Computing and Communications. TrustCom ’17. Sydney, Australia: IEEE, Aug. 2017, pp. 152–161. DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.232.
  • V. Immler, M. Hiller, Q. Liu, A. Lenz and A. Wachter-Zeh. “Variable-Length Bit Mapping and Error Correcting Codes for Higher-Order Alphabet PUFs”. In: International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE). Ed. by J. Danger, S. Subidh Ali, and T. Eisenbarth. LNCS. Springer Berlin / Heidelberg, 2017.
  • V. Immler, R. Specht and F. Unterstein. “Your Rails Cannot Hide From Localized EM: How Dual-Rail Logic Fails on FPGAs”. In: Conference on Cryptographic Hardware and Embedded Systems, CHES 2017.
  • S. Plaga, M. Niethammer, N. Wiedermann and A. Borisov. “Adding Channel Binding for an Out-of-Band OTP Authentication Protocol in an Industrial Use-Case”. Kooperation im Rahmen von IUNO AP4, Fraunhofer AISEC mit BOSCH Corporate Sector Research and Advance Engineering submitted to "The 1st International Conference on Data Intelligence and Security". Aug, 2017.
  • R. Baumann, M. Protsenko and T. Müller. “Anti-ProGuard: Towards Automated Deobfuscation of Android Apps”. In: 4th Workshop on Security in highly connected IT systems. Ed. by ACM ICPS and co-located with DISCOTEC. Neuchâtel, Switzerland, 2017.
  • M. Busch, M. Protsenko and T. Müller. “A Cloud-Based Compilation and Hardening Platform for Android Apps”. In: 12th International Conference on Availability, Reliability and Security. Ed. by SBA Research. Reggio Calabria, Italy, 2017.
  • C. Eckert. “Cybersicherheit Beyond 2020!” In: 50 Jahre Universitäts-Informatik in München. Ed. by A. Bode, M. Broy, H-J. Bungartz and F. Matthes. Berlin, Heidelberg: Springer Berlin Heidelberg, 2017, pp. 1–10.
  • M. Green, L. Rodrigues-Lima, A. Zankl, G. Irazoqui, J. Heyszl and T. Eisenbarth. “AutoLock: Why Cache Attacks on ARM Are Harder Than You Think”. In: 26th USENIX Security Symposium (USENIX Security 17). Vancouver, BC: USENIX Association, 2017.
  • B. Gulmezoglu, A. Zankl, T. Eisenbarth and B. Sunar. “PerfWeb: How to Violate Web Privacy with Hardware Performance Events”. In: Computer Security – ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 1115, 2017. to appear. Cham: Springer International Publishing, 2017.
  • M. Hiller and A. G. Önalan. “Hiding Secrecy Leakage in Leaky Helper Data”. In: Conference on Cryptographic Hardware and Embedded Systems. Ed. by W. Fischer and N. Homma. LNCS. Springer Berlin / Heidelberg, 2017.
  • V. Immler, R. Specht and F. Unterstein. “Your Rails Cannot Hide From Localized EM: How Dual-Rail Logic Fails on FPGAs”. In: Conference on Cryptographic Hardware and Embedded Systems, CHES 2017. 2017.
  • V. Immler, R. Specht and F. Unterstein. “Your Rails Cannot Hide from Localized EM: How Dual-Rail Logic Fails on FPGAs”. In: Conference on Cryptographic Hardware and Embedded Systems. Ed. by W. Fischer and N. Homma. LNCS. Springer Berlin / Heidelberg, 2017.
  • N. Jacob, J. Heyszl, A. Zankl, C. Rolfes and G. Sigl. “How to Break Secure Boot on FPGA SoCs through Malicious Hardware”. In: Conference on Cryptographic Hardware and Embedded Systems, CHES 2017. 2017.
  • N. Jacob, J. Wittmann, J. Heyszl, R. Hesselbarth, F. Wilde, M. Pehl, G. Sigl and K. Fisher. “Securing FPGA SoC Configurations Independent of Their Manufacturers”. In: 30th IEEE International SystemonChip Conference. 2017.
  • P. Koppermann, F. De Santis, J. Heyszl and G. Sigl. “Low-latency X25519 hardware implementation: breaking the 100 microseconds barrier”. In: Microprocessors and Microsystems (2017). ISSN: 01419331. DOI: http://dx.doi.org/10.1016/j.micpro. 2017.07.001. URL:http://www.sciencedirect.com/science/article/pii/S0141933117300273.
  • J. Obermaier and S. Tatschner. “Shedding too much Light on a Microcontroller’s Firmware Protection”. In: 11th USENIX Workshop on Offensive Technologies (WOOT 17). To appear, conditionally accepted. Vancouver, BC: USENIX Association, 2017. URL: https://www.usenix.org/conference/woot17/workshop-program/presentation/obermaier.
  • J. Sepúlveda, M. Gross, A. Zankl and G. Sigl. “Exploiting Bus Communication to Improve Cache Attacks on Systems-on-Chips”. In: 2017 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). to appear. 2017.
  • J. Sepúlveda, A. Zankl and O. Mischke. “Cache Attacks and Countermeasures for NTRUEncrypt on MPSoCs: Post-quantum Resistance for the IoT”. In: 2017 30th IEEE International System-on-Chip Conference (SOCC). to appear. 2017.
  • D. Titze, M. Lux and J. Schütte. “Ordol: Obfuscation-Resilient Detection of Libraries in Android Applications”. In: Proceedings of the International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). Aug. 2017.
  • A. Ahadipour and M. Schanzenbach. “A Brief History of Authorization in Distributed Systems: Information Storage, Data Retrieval and Trust Evaluation”. In: Proceedings of the International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). 2017.
  • C. Banse and J. Schuette. “A Taxonomy-based Approach for Security in Software-Defined Networking”. In: IEEE International Conference on Communications, ICC 2017, Paris, France, May 21-25, 2017.
  • K. Böttinger. “Guiding a Colony of Black-box Fuzzers with Chemotaxis”. In: 38th IEEE Symposium on Security and Privacy (S&P 2016) Workshops. 2017.
  • C. Eckert. “Cyber-Sicherheit in Industrie 4.0”. In: Handbuch Industrie 4.0: Geschäftsmodelle, Prozesse, Technik. Ed. by G. Reinhart. München: Carl Hanser Verlag, 2017, pp. 111–135.
  • C. Eckert. “Cybersicherheit beyond 2020! Herausforderungen für die IT-Sicherheitsforschung”. In: Informatik Spektrum 40.2 (2017), pp. 141–146. DOI: 10.1007/s00287-017-1025-6. URL: https://doi.org/10.1007/s00287-017-1025-6.
  • F. Fischer, K. Böttinger, H. Xiao, C. Stransky, Y. Acar, M. Backes and S. Fahl. “Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security”. In: 2017 IEEE Symposium on Security and Privacy (Oakland’17). IEEE. 2017.
  • M. Huber, J. Horsch, J. Ali and S. Wessel. “Freeze & Crypt: Linux Kernel Support for Main Memory Encryption”. In: 14th International Conference on Security and Cryptography (SECRYPT 2017). INSTICC. ScitePress, 2017.
  • M. Huber, J. Horsch and S. Wessel. “Protecting Suspended Devices from Memory Attacks”. In: Proceedings of the 10th European Workshop on Systems Security. EuroSec’17. Belgrade, Serbia: ACM, 2017, 10:1–10:6. ISBN: 9781450349352. DOI: 10.1145/3065913. 3065914. URL: http://doi.acm.org/10.1145/3065913.3065914.
  • V. Immler, M. Hiller, J. Obermaier and G. Sigl. “Take a Moment and have some t: Hypothesis testing on Raw PUF Data”. In: IEEE International Symposium on Hardware-Oriented Security and Trust (HOST). 2017, pp. 92–97.
  • J. Kirsch, C. Jonischkeit, T. Kittel, A. Zarras and C. Eckert. “Combating Control Flow Linearization”. In: 32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC). 2017. URL: https://www.sec.in.tum.de/assets/Uploads/CFL.pdf.
  • B. Kolosnjaji, G. Eraisha, G. Webster, A. Zarras and C. Eckert. “Empowering Convolutional Networks for Malware Classification and Analysis”. In: 30th International Joint Conference on Neural Networks (IJCNN). May 2017. URL: https://www.sec.in.tum.de/assets/Uploads/ConvolutionalNetworks.pdf.
  • P. Koppermann, F. De Santis, J. Heyszl and G. Sigl. “Automatic Generation of High-Performance Modular Multipliers for Arbitrary Mersenne Primes on FPGAs”. In: HOST 2017, Proceedings of the 2017 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST). 2017.
  • I. Kunz and P. Stephanow. “A process model to support continuous certification of cloud services”. In: 31th International Conference on Advanced Information Networking and Applications (AINA). IEEE, 2017.
  • N. Jacob, C. Rolfes, A. Zankl, J. Heyszl and G. Sigl. “Compromising FPGA SoCs using Malicious Hardware Blocks”. In: Design Automation and Test in Europe, DATE 2017. Lausanne, Switzerland, 2017.
  • J. Obermaier, R. Specht and G. Sigl. “Fuzzy-Glitch: A Practical Ring Oscillator Based Clock Glitch Attack”. In: 22nd International Conference on Applied Electronics. To appear. IEEE, Sept. 2017.
  • M. Pehl, M. Hiller and G. Sigl. “Secret key generation for physical unclonable functions”. In: Information Theoretic Security and Privacy of Information Systems. Ed. by R. F. Schaefer, H. Boche, A. Khisti, and H. V. Poor. Cambridge University Press, 2017, pp. 362–389.
  • J. Schütte, A. Küchler and D. Titze. “Practical Application-Level Dynamic Taint Analysis of Android Apps”. In: Proceedings of the International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). 2017.
  • J. Sepulveda, D. Florez, V. Immler, G. Gogniat and G. Sigl. “Efficient Security Zones Implementation through Hierarchical Group Key Management at NoC-Based MPSoCs”. In: Microprocessors and Microsystems 50 (2017), pp. 164–174.
  • J. Sepúlveda, A. Zankl, D. Flórez and G. Sigl. “Towards Protected {MPSoC} Communication for Information Protection against a Malicious NoC”. In: Procedia Computer Science 108 (2017). International Conference on Computational Science, {ICCS} 2017, 12-14 June 2017, Zurich, Switzerland, pp. 1103 –1112. ISSN: 18770509. DOI: https://doi.org/10.1016/j.procs.2017.05.139.
  • P. Stephanow and C. Banse. “Evaluating the performance of continuous test-based cloud service certification”. In: 17th International Symposium on Cluster, Cloud and Grid Computing (CCGrid). IEEE. 2017.
  • P. Stephanow and K. Khajehmoogahi. “Towards continuous security certification of Software-as-a-Service applications using web application testing”. In: 31th International Conference on Advanced Information Networking and Applications (AINA). IEEE. 2017.
  • F. Unterstein, J. Heyszl, F. De Santis and R. Specht. “Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks – A Practical Security Evaluation on FPGA”. In: Proceedings of 8th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2017). Springer. 2017.
  • G. Webster, B. Kolosnjaji, C. von Pentz, J. Kirsch, Z. Hanif, A. Zarras and C. Eckert. “Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage”. In: 14th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). 2017. URL: https://www.sec.in.tum.de/assets/Uploads/RichHeader.pdf.
  • A. Zankl, J. Heyszl and G. Sigl. “Automated Detection of Instruction Cache Leaks in Modular Exponentiation Software”. In: Smart Card Research and Advanced Applications: 15th International Conference, CARDIS 2016, Cannes, France, November 7–9, 2016, Revised Selected Papers. Ed. by K. Lemke-Rust and M. Tunstall. Cham: Springer International Publishing, 2017, pp. 228–244. ISBN: 9783319546698. DOI: 10.1007/978-3-319-54669-8_14. URL: http://dx.doi.org/10.1007/978-3-319-54669-8_14.

  • D. Angermeier and J. Eichler. “Risk-driven Security Engineering in the Automotive Domain”. 2016.
  • D. Angermeier, A. Nieding and J. Eichler. “Supporting Risk Assessment with the Systematic Identification, Merging and Validation of Security Goals”. In: Risk Assessment and RiskDriven Testing: 4. International Workshop, RISK 2016, Revised Selected Papers. 2016.
  • A. Bilzhause, M. Huber, H. C. Pöhls and K. Samelin. “Cryptographically Enforced Four-Eyes Principle”. In: Proc. of the Workshop on Security, Privacy, and Identity Management in the Cloud, 11th International Conference on Availability, Reliability and Security (ARES SECPID 2016). Conference Publishing Services (CPS). 2016. URL: https://web.sec.uni-passau.de/papers/2016_BilzhauseHuberPoehlsSamelin_4EyesPrinciple_ARES_SECPID.pdf.
  • K. Böttinger. “Fuzzing Binaries with Lévy Flight Swarms”. In: EURASIP Journal on Information Security. 2016.
  • K. Böttinger. “Hunting Bugs with Lévy Flight Foraging”. In: 37th IEEE Symposium on Security and Privacy (S&P 2016) Workshops. 2016.
  • K. Böttinger and C. Eckert. “DeepFuzz: Triggering Vulnerabilities Deeply Hidden in Binaries”. In: 13th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2016). 2016.
  • K. Böttinger, G. Hansch and B. Filipovic. “Detecting and Correlating Supranational Threats for Critical Infrastructures”. In: 15th European Conference on Cyber Warfare and Security ECCWS-2016. 2016.
  • K. Böttinger, M. Hutle, B. Filipovic and S. Rohr. Leitfaden Industrie 4.0 Security - Handlungsempfehlungen für den Mittelstand. VDMA Verlag. 2016.
  • M. Gall and G. Brost. “K-word Proximity Search on Encrypted Data”. In: Proceedings of the International Conference on Advanced Information Network and Applications (AINA). 2016.
  • R. Hesselbarth and G. Sigl. “Fast and Reliable PUF Response Evaluation from Unsettled Bistable Rings”. In: Euromicro Conference on Digital System Design (DSD 2016). 2016. URL: http://dsd-seaa2016.cs.ucy.ac.cy/index.php?p=DSD2016; 
  • M. Hiller, A. G. Önalan, G. Sigl and M. Bossert. “Online Reliability Testing for PUF Key Derivation”. In: International Workshop on Trustworthy Embedded Devices (TrustED). ACM. 2016. pp. 15–22.
  • M. Hiller, M. Pehl, G. Kramer and G. Sigl. “Algebraic Security Analysis of Key Generation with Physical Unclonable Functions”. In: Security Proofs for Embedded Systems Workshop (PROOFS). 2016.
  • J. Horsch, S. Wessel and C. Eckert. “CoKey: Fast Token-based Cooperative Cryptography”. In: Proceedings of the 32Nd Annual Conference on Computer Security Applications. ACSAC ’16. ACM. 2016, pp. 314–323. URL: http://doi.acm.org/10.1145/2991079. 2991117
  • M. Huber, B. Taubmann, S. Wessel, H. P. Reiser and G. Sigl. “A flexible framework for mobile device forensics based on cold boot attacks”. In: EURASIP Journal on Information Security. 2016. pp. 1–13. URL: http://dx.doi.org/10.1186/s13635-016-0041-4.
  • V. Immler, M. Hennig, L. Kürzinger and G. Sigl. “Practical Aspects of Quantization and Tamper-Sensitivity for Physically Obfuscated Keys”. In: Cryptography and Security in Computing Systems. 2016.
  • P. Koppermann, F. De Santis, J. Heyszl and G. Sigl. “X25519 Hardware Implementation for Low-Latency Applications”. In: Euromicro Conference on Digital System Design (DSD 2016). 2016. URL: http://dsd- seaa2016.cs.ucy.ac.cy/ index.php?p=DSD2016.
  • L. Langer, P. Smith, M. Hutle and A. E. Schaeffer Filho. “Analysing cyber-physical attacks to a Smart Grid: A voltage control use case”. In: Power Systems Computation Conference (PSCC 2016) 2016. pp. 1–7. URL: http://dx.doi.org/10.1109/PSCC.2016.7540819.
  • M. Margraf, S. Müller, S. Harth and J. Eichler. “Vernetzte IT-Sicherheit in Kritischen Infrastrukturen”. In: DIN Mitteilungen 6. 2016. pp. 24–28.
  • R. Nyberg, J. Heyszl, D. Heinz and G. Sigl. “Enhancing Fault Emulation of Transient Faults by Separating Combinational and Sequential Fault Propagation.” In: ACM Great Lakes Symposium on VLSI. Ed. by A. K. Coskun, M. Margala, L. Behjat and J. Han.  2016. pp. 209–214. URL: http://dblp.uni-trier.de/db/ conf/glvlsi/glvlsi2016.html#NybergHHS16.
  • J. Obermaier and M. Hutle. “Analyzing the Security and Privacy of Cloud-based Video Surveillance Systems”. In: Proceedings of the 2nd ACM Workshop on IoT Privacy, Trust, and Security. IoTPTS ’16.  ACM. 2016. URL: http://dx.doi.org/10.1145/2899007.2899008.
  • J. Schütte P. Stephanow and G. Srivastava. “Test-based cloud service certification of opportunistic providers”. In: The 8th IEEE International Conference on Cloud Computing (CLOUD). 2016.
  • M. Schanzenbach and C. Banse. “Managing and Presenting User Attributes over a Decentralized Secure Name System”. In: Data Privacy Management and Security Assurance - 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016. 2016. pp. 213–220. URL: http://dx.doi.org/10.1007/978- 3- 319- 47072- 6_14.
  • J. Schütte and G. Brost. “A Data Usage Control System using Dynamic Taint Tracking”. In: Proceedings of the International Conference on Advanced Information Network and Applications (AINA). 2016.
  • B. Selmke, J. Heyszl and G. Sigl. “Attack on a DFA protected AES by simultaneous laser fault injections”. In: Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2016). 2016. URL: http://conferenze.dei.polimi.it/FDTC16/.
  • G. Settanni, F. Skopik, Y. Shovgenya, R. Fiedler, M. Carolan, D. Conroy, K. Böttinger, M. Gall, G. Brost, C. Ponchel, M. Haustein, H. Kaufmann, K. Theuerkauf and P. Olli. “A Collaborative Cyber Incident Management System for European Interconnected Critical Infrastructures”. In: Journal of Information Security and Applications Special Issue on ICS & SCADA Cyber Security. 2016.
  • H. Seuschek, J. Heyszl and F. De Santis. “A Cautionary Note: Side-Channel Leakage Implications of Deterministic Signature Schemes”. In: Proceedings of the Third Workshop on Cryptography and Security in Computing Systems. ACM. 2016. pp. 7–12.
  • P. Stephanow, C. Banse and J. Schütte. “Generating Threat Profiles for Cloud Service Certification Systems”. In: 17th IEEE High Assurance Systems Engineering Symposium (HASE). 2016.
  • M. Strobel, N. Wiedermann and C. Eckert. “Novel Weaknesses in IEC 62351 Protected Smart Grid Control Systems”. In: IEEE International Conference on Smart Grid Communications. 2016.
  • S. Plaga, S. Tatschner and T. Newe. “Logboat – A Simulation Framework Enabling CAN Security Assessments”. In: 21st International Conference on Applied Electronics. IEEE. 2016.
  • C. Teichmann, S. Renatus and J. Eichler. “Agile Threat Assessment and Mitigation: An Approach for Method Selection and Tailoring”. In: International Journal of Secure Software Engineering (IJSSE). Ed. by K. M. Khan. Vol. 7. IGI-Global. 2016.
  • C. Teichmann, S. Renatus and A. Nieding. “Modellgestützte Risikoanalyse der Sicherheit Kritischer Infrastrukturen für kleine und mittlere Unternehmen: Eine Übersicht”. In: Multikonferenz Wirtschaftsinformatik (MKWI) 2016. Ed. by V. Nissen, D. Stelzer, S. Straßburger and D. Fischer. Universitätsverlag Ilmenau. 2016.
  • S. Wagner and C. Eckert. “Policy-Based Implicit Attestation for Microkernel-Based Virtualized Systems”. In: Information Security: 19th International Conference, ISC 2016. 2016. Ed. by M. Bishop,  A. Anderson and C. Nascimento. Cham: Springer International Publishing. 2016. pp. 305–322. URL: http://dx.doi.org/10.1007/978-3- 319-45871-7_19.
  • N. Wiedermann and M. Findrik. Poster: Smart Grid Cyber-Security Simulation Environment. Poster at 5th D-A-CH+ Energy Informatics Conference 2016. 2016. URL: http://www.energieinformatik2016.org/wp-content/uploads/2016/10/EnInf2016_ Poster_Findrik.pdf.
  • N. Wiedermann and M. Findrik. “Smart Grid Cyber-Security Simulation Environment”. In: 5th D-A-CH+ Energy Informatics Conference in conjunction with 7th Symposium on Communications for Energy Systems (ComForEn). Ed. by F. Kupzog. 2016. p. 96. URL: http://www.energieinformatik2016.org/wp-content/uploads/2016/09/Proceedings_ DACH-Energy-Informatics_ComForEn-2016-Web.pdf.
  • J. Wolf, F. Wieczorek, F. Schiller, G. Hansch, N. Wiedermann and M. Hutle. “Adaptive Modelling for Security Analysis of Networked Control Systems”. In: 4th International Symposium for ICS & SCADA Cyber Security Research 2016, ICS-CSR. 2016. URL: http://ewic.bcs.org/content/ConWebDoc/ 56479.
  • A. Zankl, J. Heyszl and G. Sigl. “Automated Detection of Instruction Cache Leaks in RSA Software Implementations”. In: Smart Card Research and Advanced Applications - 15th International Conference, CARDIS 2016. 2016.
  • A. Zankl, K. Miller, J. Heyszl and G. Sigl. “Towards Efficient Evaluation of a TimeDriven Cache Attack on Modern Processors”. In: Computer Security - ESORICS 2016 - 21th European Symposium on Research in Computer Security. 2016.

  • R. Nyberg, J. Heyszl, D. Rabe and G. Sigl. “Closing the gap between speed and configurability of multibit fault emulation environments for security and safety–critical designs”. In: Microprocessors and Microsystems. 2015.
  • D. Adam, S. Tverdyshev, C. Rolfes and T. Sandmann. “Two Architecture Approaches for MILS Sstems in Mobility Domains (Automobile, Railway and Avionik)”. In: International Workshop on MILS: Architecture and Assurance for Secure Systems. 2015.
  • K. Böttinger, D. Schuster and C. Eckert. “Detecting Fingerprinted Data in TLS Traffic”. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. ASIA CCS ’15. ACM. 2015. pp. 633–638. URL: http://doi.acm.org/10.1145/2714576.2714595
  • G. Brost and M. Hoffmann. “Identifying Security Requirements and Privacy Concerns in Digital Health Applications”. In: Requirements Engineering for Digital Health. Ed. by S. A. Fricker, C. Thümmler and A. Gavras. Springer International Publishing. 2015. pp. 133–154. URL: http://dx.doi.org/10.1007/978-3-319-09798-5_7
  • J. Heyszl and F. Thiel. “Geldspielgeräte in Zukunft mit geprüfter Sicherheit. “ In: Datenschutz und Datensicherheit-DuD 39 (4). 2015.
  • M. Hiller, L. Kürzinger, G. Sigl, S. Müelich, S. Puchinger and M. Bossert. “LowArea Reed Decoding in a Generalized Concatenated Code Construction for PUF”. In: Proceedings of the IEEE Computer Society Annual Symposium on VLSI (ISVLSI). 2015.
  • J. Horsch and S. Wessel. “Transparent Pagebased Kernel and User Space Execution Tracing from a Custom Minimal ARM Hypervisor”. In: The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). 2015.
  • R. Specht, J. Heyszl, M. Kleinsteuber and G. Sigl. “Improving Non-Profiled Attacks on Exponentiations Based on Clustering and Extracting Leakage from Multi-Channel High-Resolution EM Measurements. Constructive Side-Channel Analysis and Secure Design (COSADE).” In: 6th International Workshop Berlin. 2015.