direkt zum Inhalt springen

direkt zum Hauptnavigationsmenü

Sie sind hier

TU Berlin

Inhalt des Dokuments


mSwitch: Bringing Multi-Tenancy to Virtual Switches
K. Thimmaraju, S. Hermak, G. Rétvári, S. Schmid
To appear in USENIX Annual Technical Conference (ATC), Renton, Washington, USA, July 2019
Secure Real-time Communication and Computing Infrastructure for Industry 4.0 – Challenges and Opportunities
E. Zielinski, J. Schulz-Zander, H. Ruckstuhl, A. Artemenko, A. Ramirez, F. Zeiger, M. Mormul, F. Hetzelt, F. Beierle, H. Klaus, M. Zimmermann, C. Schellenberger
AIComNets, München, Germany, March 2019
Application of thin films in IC security
E. Amini, C. Boit, B. Szyszka, J.P. Seifert
Spring Meeting of the European Materials Research Society, Nice, France, May, 2019
Challenges and Solutions for Industry-Grade Secure Connectivity
H. Klaus, F. Hetzelt, P. Hofmann, A. Blecker, D. Schwaiger
AIComNets, München, Germany, March 2019
Device Capabilities exposed on 4G and 5G Networks
A. Shaik, R. Borgaonkar, S. Park, J.P Seifert
To appear in ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Miami, Florida, USA, 2019
PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary
D. Song, F. Hetzelt, D. Das, C. Spensky, Y Na, S. Volckaert, G. Vigna, C. Kruegel, J.P. Seifert, M. Franz
NDSS, San Diego, California, USA, February, 2019


IT-Sicherheit gründlich lösbar?
A.Weber, S. Guilley, M. Kasper, C. Krauß, P. S. Krüger, D. Kuhlmann, S. Reith, J.P. Seifert
Zukunftsmotor Metropolregion, Rhein-Neckar, Germany, 2018 
Photon Emission as a Characterization Tool for Bipolar Parasitics in FinFET Technology
A. Beyreuther, N. Herfurth, E. Amini, T. Nakamura, I. De Wolf, C. Boit
Microelectronics Reliability, Elsevier, 2018
Cloning Physically Unclonable Functions
C. Helfmeier, C. Boit, D. Nedospasov and J.P. Seifert
Top Picks in Hardware Security, International Conference On Computer Aided Design (ICCAD), San Diego, California, USA, 2018
Assessment of a Chip Backside Protection
E. Amini, A. Beyreuther, N. Herfurth, A. Steigert, B. Szyszka, C. Boit
Journal of Hardware and System Security, 2018
IC security and quality improvement by protection of chip backside against hardware attacks
E. Amini, A. Beyreuther, N. Herfurth, A. Steigert, R. Muydinov, B. Szyszka, C. Boit
Microelectronics Reliability,  2018
Comparative Assessment of Optical Techniques for Semi-Invasive SRAM Data Read-Out on an MSP430 Microcontroller
T. Kiyan, H. Lohrke, and C. Boit
Int. Symp. for Testing and Failure Analysis (ISTFA). Phoenix, Arizon, USA, 2018
On the Detectability of Control Flow Using Memory Access Patterns
R. Buhren, F. Hetzelt and N. Pirnay
ACM CCS Workshop on System Software for Trusted Execution (SysTEX), Toronto, Cananda, 2018
Attacking RO-PUFs with Enhanced Challenge-Response Pairs
N. Wisiol, M. Margraf
IFIP International Conference on Security, Privacy, and Trust, Poznań, Poland, 2018
Secure Cloud Computing: Risk Analysis for Secure Cloud Reference Architecture in Legal Metrology
A. Oppermann, M. Esche, F. Thiel, J.P. Seifert
IFIP International Conference on Security, Privacy, and Trust, Poznań, Poland, 2018
Swipe your Fingerprints! How Biometric Authentication Simplifies Payment, Access and Identity Fraud
J. Fietkau, J. Krissler, J.P. Seifert
USENIX WOOT, Baltimore, Maryland, USA, 2018
Key Extraction using Thermal Laser Stimulation: A Case Study on Xilinx Ultrascale FPGAs
H. Lohrke, S. Tajik, T. Krachenfels, C. Boit, J.P. Seifert
TCHES, Amsterdam, Netherlands, 2018
Follow the White Rabbit: Simplifying Fuzz Testing Using FuzzExMachina
B. Shastry, D. Maier, V. Ultzsch
Black Hat USA, Las Vegas, Nevada, USA, 2018
Open Source Value Chains for Addressing Security Issues Efficiently
A. Weber, S. Reith, D. Kuhlmann, M. Kasper, J.P. Seifert, C. Krauß
IEEE Workshop on Cyber Resilience Technologies , Their Benefits and Measurements (CRE), Lisbon, Portugal, 2018
On the Impact of Rogue Base Stations in 4G/LTE Self Organizing Network
A. Shaik, R. Bargaonkar, S. Park, J.P. Seifert
ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Stockholm, Sweden, 2018
Virtual Network Isolation: Are We There Yet?
K. Thimmaraju, G. Rétvári, S. Schmid
ACM SIGCOMM 2018 Workshop on Security in Softwarized Networks (SecSoN), Budapest, Hungary, 2018
Honey, I Shrunk Your App Security: The State of Android App Hardening
V. Haupert, D. Maier, N. Schneider, J. Kirsch, T. Müller
Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Paris-Saclay, France, 2018
On the Learnability of Physically Unclonable Functions
F. Ganji
Springer, T-Labs Series in Telecommunication Services, ISBN 978-3-319-76717-8, 2018
On the Phyiscal Security of Physically Unclonable Functions
S. Tajik
Springer, T-Labs Series in Telecommunication Services, ISBN 978-3-319-75820-6, 2018
I DPID It My Way!: A Covert Timing Channel in Software-Defined Networks
R. Krösche, K. Thimmaraju, L. Schiff, S. Schmid
IFIP Networking, Zürich, Switzerland, 2018
Peeking over the Cellular Walled Gardens - A Method for Closed Network Diagnosis
B. Hong, S. Park, H. Kim, D. Kim, H. Hong, H. Choi, J.-P. Seifert, S.-J. Lee, Y. Kim
IEEE Transactions on Mobile Computing, 2018

Taking Control of SDN-based Cloud Systems via the Data Plane (Best Paper Award!)
K. Thimmaraju, B. Shastry, T. Fiebig, F. Hetzelt, J.-P. Seifert, A. Feldmann, S. Schmid
ACM Symposium on SDN Research (SOSR 2018), Los Angeles, USA, 2018
Blockchain Applications for Legal Metrology
D. Peters, J. Wetzlich, F. Thiel, J.-P. Seifert
International Instrumentation and Measurement Technology Conference (I²MTC 2018), Houston, USA, 2018
A Fourier Analysis Based Attack against Physically Unclonable Functions
F. Ganji, S. Tajik and J.-P. Seifert
Financial Cryptography and Data Security 2018 (FC'18), Curaçao, 2018


Secure Cloud Computing: Communication Protocol for Multithreaded Fully Homomorphic Encryption for Remote Data Processing
A. Oppermann, F. Grasso Toro, A. Yurchenko J.-P. Seifert
IEEE ISPA 2017, Guangzhou, China, 2017
Static Analysis as a Fuzzing Aid
B. Shastry, M. Leutner, T. Fiebig, K. Thimmaraju, F. Yamaguchi, K.
Rieck, S. Schmid, J.-P. Seifert, A. Feldmann
RAID'17, Atlanta, USA, 2017

Paying the Price for Disruption: How a FinTech Allowed Account Takeover
V. Haupert, D. Maier, and T. Müller
ROOTS 2017, Vienna, Austria, 2017
The vAMP Attack: Taking Control of Cloud Systems via the Unified Packet Parser
K. Thimmaraju, B. Shastry, T. Fiebig, F. Hetzelt, J.-P. Seifert, A. Feldmann, S. Schmid
ACM CCSW 2017, Dallas, USA, 2017
Secure Cloud Computing: Multithreaded Fully Homomorphic Encryption for Legal Metrology
A. Oppermann, A. Yurchenko, M. Esche and J.-P. Seifert
ISDDC 2017, Vancouver, Canada, 2017
On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs
S. Tajik , H. lohrke, J.-P. Seifert, C. Boit
ACM CCS 2017, Dallas, USA, 2017
White-Stingray: Evaluating IMSI Catchers Detection Applications
S. Park, A. Shaik, R. Borgaonkar, A. Martin, J.-P. Seifert
WOOT '17, Vancouver, Canada, 2017
Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing
B. Shastry, F. Maggi, F. Yamaguchi, K. Rieck, J.-P. Seifert
WOOT '17, Vancouver, Canada, 2017
Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery
T. Unruh, B. Shastry, M. Skoruppa, F. Maggi, K. Rieck, J.-P. Seifert, F. Yamaguchi
WOOT '17, Vancouver, Canada, 2017
Visible Light Techniques in the FinFET Era: Challenges, Threats and Opportunities
H. Lohrke, H. Zöllner, P. Scholz, S. Tajik, C. Boit, J.-P. Seifert
IPFA, Chengdu, China, 2017
New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor
R. BorgaonkarS. Park,  L. Hirschi, A. Shaik, Andrew Martin, J.-P. Seifert
Black Hat, Las Vegas, USA, 2017

New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor
R. BorgaonkarS. Park,  L. Hirschi, A. Shaik, Andrew Martin, J.-P. Seifert
Black Hat, Las Vegas, USA, 2017

PUFMon: Security Monitoring of FPGAs using Physically Unclonable Functions
S. Tajik , J. Fietkau, H. lohrke, J.-P. Seifert, C. Boit
IEEE IOLTS, Thessaloniki, Greece, 2017

Photonic Side-Channel Analysis of Arbiter PUFs
S. Tajik, E. Dietz, S. Frohmann, H. Dittrich, D. Nedospasov, C. Helfmeier, J.-P. Seifert, C. Boit and H.-W. Hübers
Journal of Cryptology, 2017

Having No Mathematical Model May Not Secure PUFs
F. Ganji, S. Tajik, F. Fäßler and J.-P. Seifert
Journal of Cryptographic Engineering, 2017
Photonic Side Channel Attacks Against RSA
E. Carmon, J.-P. Seifert, A. Wool
IEEE HOST, McLean, USA, May 1-4, 2017
Outsmarting Network Security with SDN Teleportation
K. Thimmaraju
, L. Schiff, S. Schmid
IEEE Euro S&P, Paris, France,
April 26-28, 2017
Security Analysis of Encrypted Virtual Machines
Hetzelt, R. Buhren
Xi'an, China, April 8-9, 2017
Something From Nothing (There): Collecting Global IPv6 Datasets From DNS
T. Fiebig, K. Borgolte, S. Hao, C. Kruegel, G. Vigna
PAM, Sydney, Australia, March 30-31, 2017
Fault Attacks on Encrypted General Purpose Compute Platforms
R. Buhren, S. Gueron, J. Nordholz, J.-P. Seifert, J. Vetter
ACM CODASPY, Scottsdale, USA, March 22-24, 2017

Zusatzinformationen / Extras


Schnellnavigation zur Seite über Nummerneingabe

Postal Address

Technische Universität Berlin - An-Institut Telekom Innovation Laboratories
Fakultät IV
Sekr. TEL16
Ernst-Reuter-Platz 7
10587 Berlin


Claudia Petzsch
+49 - 30 - 8353 58 681
Raum TEL16