direkt zum Inhalt springen

direkt zum Hauptnavigationsmenü

Sie sind hier

TU Berlin

Inhalt des Dokuments


A Fourier Analysis Based Attack against Physically Unclonable Functions
F. Ganji [1], S. Tajik [2] and J.-P. Seifert [3]
Financial Cryptography and Data Security 2018 (FC'18), Curaçao, 2018


Secure Cloud Computing: Communication Protocol for Multithreaded Fully Homomorphic Encryption for Remote Data Processing
A. Oppermann, F. Grasso Toro, A. Yurchenko J.-P. Seifert [4]
IEEE ISPA 2017, Guangzhou, China, 2017
Static Analysis as a Fuzzing Aid
B. Shastry [5], M. Leutner, T. Fiebig [6], K. Thimmaraju [7], F. Yamaguchi, K.
Rieck, S. Schmid, J.-P. Seifert [8], A. Feldmann
RAID'17, Atlanta, USA, 2017

Paying the Price for Disruption: How a FinTech Allowed Account Takeover
V. Haupert, D. Maier, and T. Müller
ROOTS 2017, Vienna, Austria, 2017
The vAMP Attack: Taking Control of Cloud Systems via the Unified Packet Parser
K. Thimmaraju [9], B. Shastry [10], T. Fiebig [11], F. Hetzelt [12], J.-P. Seifert [13], A. Feldmann, S. Schmid
ACM CCSW 2017, Dallas, USA, 2017
Secure Cloud Computing: Multithreaded Fully Homomorphic Encryption for Legal Metrology
A. Oppermann, A. Yurchenko, M. Esche and J.-P. Seifert [14]
ISDDC 2017, Vancouver, Canada, 2017
On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs
S. Tajik  [15], H. lohrke, J.-P. Seifert [16], C. Boit
ACM CCS 2017, Dallas, USA, 2017
White-Stingray: Evaluating IMSI Catchers Detection Applications
S. Park [17], A. Shaik [18], R. Borgaonkar [19], A. Martin, J.-P. Seifert [20]
WOOT '17, Vancouver, Canada, 2017
Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing
B. Shastry [21], F. Maggi, F. Yamaguchi, K. Rieck, J.-P. Seifert [22]
WOOT '17, Vancouver, Canada, 2017
Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery
T. Unruh, B. Shastry [23], M. Skoruppa, F. Maggi, K. Rieck, J.-P. Seifert [24], F. Yamaguchi
WOOT '17, Vancouver, Canada, 2017
Visible Light Techniques in the FinFET Era: Challenges, Threats and Opportunities
H. Lohrke, H. Zöllner, P. Scholz, S. Tajik [25], C. Boit, J.-P. Seifert [26]
IPFA, Chengdu, China, 2017
New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor
R. Borgaonkar [27],  S. Park [28],  L. Hirschi, A. Shaik [29], Andrew Martin, J.-P. Seifert [30]
Black Hat, Las Vegas, USA, 2017

New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor
R. Borgaonkar [31],  S. Park [32],  L. Hirschi, A. Shaik [33], Andrew Martin, J.-P. Seifert [34]
Black Hat, Las Vegas, USA, 2017

PUFMon: Security Monitoring of FPGAs using Physically Unclonable Functions
S. Tajik  [35], J. Fietkau [36], H. lohrke, J.-P. Seifert [37], C. Boit
IEEE IOLTS, Thessaloniki, Greece, 2017

Photonic Side-Channel Analysis of Arbiter PUFs
S. Tajik [38], E. Dietz, S. Frohmann, H. Dittrich, D. Nedospasov [39], C. Helfmeier, J.-P. Seifert [40], C. Boit and H.-W. Hübers
Journal of Cryptology, 2017

Having No Mathematical Model May Not Secure PUFs
F. Ganji [41], S. Tajik [42], F. Fäßler and J.-P. Seifert [43]
Journal of Cryptographic Engineering, 2017
Photonic Side Channel Attacks Against RSA
E. Carmon, J.-P. Seifert [44], A. Wool
IEEE HOST, McLean, USA, May 1-4, 2017
Outsmarting Network Security with SDN Teleportation
K. Thimmaraju [45]
, L. Schiff, S. Schmid
IEEE Euro S&P, Paris, France,
April 26-28, 2017
Security Analysis of Encrypted Virtual Machines
F. [46]
Hetzelt [47], R. Buhren [48]
Xi'an, China, April 8-9, 2017
Something From Nothing (There): Collecting Global IPv6 Datasets From DNS
T. Fiebig [49], K. Borgolte, S. Hao, C. Kruegel, G. Vigna
PAM, Sydney, Australia, March 30-31, 2017
Fault Attacks on Encrypted General Purpose Compute Platforms
R. Buhren [50], S. Gueron, J. Nordholz [51], J.-P. Seifert [52], J. Vetter [53]
ACM CODASPY, Scottsdale, USA, March 22-24, 2017


  • O. Keren, I. Polian, M. M. Tehranipoor, "Hardware Security (Dagstuhl Seminar 16202)", Dagstuhl Reports, Vol. 6, Issue 5, 2016, (Editor: F. Ganji)
  • R. Buhren, J. Vetter, J. Nordholz, "The threat of virtualization: Hypervisor-based rootkits on the ARM architecture", accepted for ICICS, Singapore, November 29, 2016
  • H. Lohrke, S. Tajik, P. Scholz, J.-P. Seifert, C. Boit, "Automated Detection of Fault Sensitive Locations for Reconfiguration Attacks on Programmable Logic", accepted for ISTFA, Forth Worth, Texas, USA, November 8, 2016
  • A. Mikityuk, O. Friedrich, P. Pogrzeba, C. Meerveld, M. Nemani, H. Yun, R. Mizrahi, "Cloud Browser Business Opportunities (Version 1.0)", GSMA Position Paper, 3 November, 2016
  • S. Park‚ A. Shaik‚ R. Borgaonkar, J.-P. Seifert, "White Rabbit in Mobile: Effect of Unsecured Clock Source in Smartphones", accepted for CCS SPSM, Vienna, Austria, October 24-28, 2016
  • M. Piekarska, S. Park, A. Shaik, "Back to the Future: Evaluation Model for Wearables Based On the Past Experience", accepted for INNOV2016, Rome, Italy, August 21-25, 2016
  • M. Piekarska, "Hide, Don't Seek: on User-Centric Location Accuracy", accepted for INNOV2016, Rome, Italy, August 21-25, 2016
  • H. Lohrke, S. Tajik, C. Boit and J.-P. Seifert, "No Place to Hide: Contactless Probing of Secret Data on FPGAs", accepted for CHES, Santa Barbara, USA, 17-19 August, 2016
  • F. Ganji, S. Tajik, F. Fäßler and J.-P. Seifert, "Strong Machine Learning Attack against PUFs with No Mathematical Model", accepted for CHES, Santa Barbara, USA, 17-19 August, 2016
  • C. Boit, S. Tajik, P. Scholz, E. Amini, A. Beyreuther, H. Lohrke, J.P. Seifert, "From IC Debug to Hardware Security Risk: The Power of Backside Access and Optical Interaction", invited paper for IEEE IPFA, Marina Bay Sands, Singapore, 18-21 July, 2016
  • B.Shastry, F.Yamaguchi, K.Rieck, J.-P.Seifert, "Towards Vulnerability Discovery Using Staged Program Analysis", accepted for DIMVA, Donostia-San Sebastián, Spain, 7-8 July, 2016
  • A. Feldmann, P. Heyder, M. Kreutzer, S. Schmid, J.-P. Seifert, H. Shulman, J. Sieberg, K. Thimmaraju, M. Waidner, "NetCo: Reliable Routing With Unreliable Routers", accepted for DISN, Toulouse, France, 28 June, 2016
  • L. Schiff, K. Thimmaraju, S. Schmid, "Routing-Verification-as-a-Service (RVaaS): Trustworthy Routing Despite Insecure Providers", accepted for DISN, Toulouse, France, 28 June, 2016
  • A. Oppermann, J.-P. Seifert, F. Thiel, "Poster: Secure Cloud Reference Architectures for Measuring Instruments under Legal Control", accepted for CLOSER, Rome, Italy, 23-25 April, 2016
  • Á. Kiss, J. Krämer, P. Rauzy and J.-P. Seifert, "Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT", accepted for COSADE, Graz, Austria, 14-15 April, 2016
  • E. Carmon, J.-P. Seifert, A. Wool, "Simple Photonic Emission Attack with Reduced Data Complexity", accepted for COSADE, Graz, Austria, 14-15 April, 2016
  • F. Ganji, S. Tajik and J.-P. Seifert, "PAC Learning of Arbiter PUFs (Extended Version)", Journal of Cryptographic Engineering, 2016
  • M. Piekarska, "Can I Let You In? On Event-Centric Context-Aware Authorization", accepted for ICONS, Lisbon, Portugal, 21-25, February, 2016
  • A. Shaik, R. Borgaonkar, N. Asokan, V. Niemi, J.-P. Seifert, "Practical attacks against privacy and availability in 4G/LTE mobile communication systems", accepted for NDSS, San Diego, California, USA, 21-24 February, 2016

Older Publications

  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009

Nach oben

Postal Address

Technische Universität Berlin - An-Institut Telekom Innovation Laboratories
Fakultät IV
Sekr. TEL17
Ernst-Reuter-Platz 7
10587 Berlin


Claudia Petzsch
+49 - 30 - 8353 58 681
Raum TEL17
E-Mail-Anfrage [54]


  • Security in Telecommunications [55]
------ Links: ------

Zusatzinformationen / Extras


Schnellnavigation zur Seite über Nummerneingabe

Copyright TU Berlin 2008