direkt zum Inhalt springen

direkt zum Hauptnavigationsmenü

Sie sind hier

TU Berlin

Inhalt des Dokuments

2018

Key Extraction using Thermal Laser Stimulation: A Case Study on Xilinx Ultrascale FPGAs
H. Lohrke, S. Tajik, T. Krachenfels, C. Boit, J.P. Seifert
To appear in TCHES, Amsterdam, Netherlands, 2018
Follow the White Rabbit: Simplifying Fuzz Testing Using FuzzExMachina
B. Shastry, D. Maier, V. Ultzsch
Black Hat USA, Las Vegas, Nevada, USA, 2018
Open Source Value Chains for Addressing Security Issues Efficiently
A. Weber, S. Reith, D. Kuhlmann, M. Kasper, J.P. Seifert, C. Krauß
To appear in IEEE Workshop on Cyber Resilience Technologies , Their Benefits and Measurements (CRE), Lisbon, Portugal, 2018
On the Impact of Rogue Base Stations in 4G/LTE Self Organizing Network
A. Shaik, R. Bargaonkar, S. Park, J.P. Seifert
To appear in ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Stockholm, Sweden, 2018
Virtual Network Isolation: Are We There Yet?
K. Thimmaraju, G. Rétvári, S. Schmid
To appear in ACM SIGCOMM 2018 Workshop on Security in Softwarized Networks (SecSoN), Budapest, Hungary, 2018
Honey, I Shrunk Your App Security: The State of Android App Hardening
V. Haupert, D. Maier, N. Schneider, J. Kirsch, T. Müller
To appear in Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Paris-Saclay, France, 2018
On the Learnability of Physically Unclonable Functions
F. Ganji
Springer, T-Labs Series in Telecommunication Services, ISBN 978-3-319-76717-8, 2018
On the Phyiscal Security of Physically Unclonable Functions
S. Tajik
Springer, T-Labs Series in Telecommunication Services, ISBN 978-3-319-75820-6, 2018
I DPID It My Way!: A Covert Timing Channel in Software-Defined Networks
R. Krösche, K. Thimmaraju, L. Schiff, S. Schmid
IFIP Networking, Zürich, Switzerland, 2018
Peeking over the Cellular Walled Gardens - A Method for Closed Network Diagnosis
B. Hong, S. Park, H. Kim, D. Kim, H. Hong, H. Choi, J.-P. Seifert, S.-J. Lee, Y. Kim
IEEE Transactions on Mobile Computing, 2018

Taking Control of SDN-based Cloud Systems via the Data Plane (Best Paper Award!)
K. Thimmaraju, B. ShastryT. Fiebig, F. Hetzelt, J.-P. Seifert, A. Feldmann, S. Schmid
ACM Symposium on SDN Research (SOSR 2018), Los Angeles, USA, 2018
Blockchain Applications for Legal Metrology
D. Peters, J. Wetzlich, F. Thiel, J.-P. Seifert
International Instrumentation and Measurement Technology Conference (I²MTC 2018), Houston, USA, 2018
A Fourier Analysis Based Attack against Physically Unclonable Functions
F. Ganji, S. Tajik and J.-P. Seifert
Financial Cryptography and Data Security 2018 (FC'18), Curaçao, 2018

2017

Secure Cloud Computing: Communication Protocol for Multithreaded Fully Homomorphic Encryption for Remote Data Processing
A. Oppermann, F. Grasso Toro, A. Yurchenko J.-P. Seifert
IEEE ISPA 2017, Guangzhou, China, 2017
Static Analysis as a Fuzzing Aid
B. Shastry, M. Leutner, T. Fiebig, K. Thimmaraju, F. Yamaguchi, K.
Rieck, S. Schmid, J.-P. Seifert, A. Feldmann
RAID'17, Atlanta, USA, 2017

Paying the Price for Disruption: How a FinTech Allowed Account Takeover
V. Haupert, D. Maier, and T. Müller
ROOTS 2017, Vienna, Austria, 2017
The vAMP Attack: Taking Control of Cloud Systems via the Unified Packet Parser
K. Thimmaraju, B. Shastry, T. Fiebig, F. Hetzelt, J.-P. Seifert, A. Feldmann, S. Schmid
ACM CCSW 2017, Dallas, USA, 2017
Secure Cloud Computing: Multithreaded Fully Homomorphic Encryption for Legal Metrology
A. Oppermann, A. Yurchenko, M. Esche and J.-P. Seifert
ISDDC 2017, Vancouver, Canada, 2017
On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs
S. Tajik , H. lohrke, J.-P. Seifert, C. Boit
ACM CCS 2017, Dallas, USA, 2017
White-Stingray: Evaluating IMSI Catchers Detection Applications
S. Park, A. Shaik, R. Borgaonkar, A. Martin, J.-P. Seifert
WOOT '17, Vancouver, Canada, 2017
Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing
B. ShastryF. Maggi, F. Yamaguchi, K. Rieck, J.-P. Seifert
WOOT '17, Vancouver, Canada, 2017
Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery
T. Unruh, B. Shastry, M. Skoruppa, F. Maggi, K. Rieck, J.-P. Seifert, F. Yamaguchi
WOOT '17, Vancouver, Canada, 2017
Visible Light Techniques in the FinFET Era: Challenges, Threats and Opportunities
H. Lohrke, H. Zöllner, P. Scholz, S. Tajik, C. Boit, J.-P. Seifert
IPFA, Chengdu, China, 2017
New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor
R. BorgaonkarS. Park,  L. Hirschi, A. Shaik, Andrew Martin, J.-P. Seifert
Black Hat, Las Vegas, USA, 2017

New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor
R. BorgaonkarS. Park,  L. Hirschi, A. Shaik, Andrew Martin, J.-P. Seifert
Black Hat, Las Vegas, USA, 2017

PUFMon: Security Monitoring of FPGAs using Physically Unclonable Functions
S. Tajik , J. Fietkau, H. lohrke, J.-P. Seifert, C. Boit
IEEE IOLTS, Thessaloniki, Greece, 2017

Photonic Side-Channel Analysis of Arbiter PUFs
S. Tajik, E. Dietz, S. Frohmann, H. Dittrich, D. Nedospasov, C. Helfmeier, J.-P. Seifert, C. Boit and H.-W. Hübers
Journal of Cryptology, 2017

Having No Mathematical Model May Not Secure PUFs
F. Ganji, S. Tajik, F. Fäßler and J.-P. Seifert
Journal of Cryptographic Engineering, 2017
Photonic Side Channel Attacks Against RSA
E. Carmon, J.-P. Seifert, A. Wool
IEEE HOST, McLean, USA, May 1-4, 2017
Outsmarting Network Security with SDN Teleportation
K. Thimmaraju
, L. Schiff, S. Schmid
IEEE Euro S&P, Paris, France,
April 26-28, 2017
Security Analysis of Encrypted Virtual Machines
F.
Hetzelt, R. Buhren
ACM VEE,
Xi'an, China, April 8-9, 2017
Something From Nothing (There): Collecting Global IPv6 Datasets From DNS
T. Fiebig, K. Borgolte, S. Hao, C. Kruegel, G. Vigna
PAM, Sydney, Australia, March 30-31, 2017
Fault Attacks on Encrypted General Purpose Compute Platforms
R. Buhren, S. Gueron, J. Nordholz, J.-P. Seifert, J. Vetter
ACM CODASPY, Scottsdale, USA, March 22-24, 2017

2016

  • O. Keren, I. Polian, M. M. Tehranipoor, "Hardware Security (Dagstuhl Seminar 16202)", Dagstuhl Reports, Vol. 6, Issue 5, 2016, (Editor: F. Ganji)
  • R. Buhren, J. Vetter, J. Nordholz, "The threat of virtualization: Hypervisor-based rootkits on the ARM architecture", accepted for ICICS, Singapore, November 29, 2016
  • H. Lohrke, S. Tajik, P. Scholz, J.-P. Seifert, C. Boit, "Automated Detection of Fault Sensitive Locations for Reconfiguration Attacks on Programmable Logic", accepted for ISTFA, Forth Worth, Texas, USA, November 8, 2016
  • A. Mikityuk, O. Friedrich, P. Pogrzeba, C. Meerveld, M. Nemani, H. Yun, R. Mizrahi, "Cloud Browser Business Opportunities (Version 1.0)", GSMA Position Paper, 3 November, 2016
  • S. Park‚ A. Shaik‚ R. Borgaonkar, J.-P. Seifert, "White Rabbit in Mobile: Effect of Unsecured Clock Source in Smartphones", accepted for CCS SPSM, Vienna, Austria, October 24-28, 2016
  • M. Piekarska, S. Park, A. Shaik, "Back to the Future: Evaluation Model for Wearables Based On the Past Experience", accepted for INNOV2016, Rome, Italy, August 21-25, 2016
  • M. Piekarska, "Hide, Don't Seek: on User-Centric Location Accuracy", accepted for INNOV2016, Rome, Italy, August 21-25, 2016
  • H. Lohrke, S. Tajik, C. Boit and J.-P. Seifert, "No Place to Hide: Contactless Probing of Secret Data on FPGAs", accepted for CHES, Santa Barbara, USA, 17-19 August, 2016
  • F. Ganji, S. Tajik, F. Fäßler and J.-P. Seifert, "Strong Machine Learning Attack against PUFs with No Mathematical Model", accepted for CHES, Santa Barbara, USA, 17-19 August, 2016
  • C. Boit, S. Tajik, P. Scholz, E. Amini, A. Beyreuther, H. Lohrke, J.P. Seifert, "From IC Debug to Hardware Security Risk: The Power of Backside Access and Optical Interaction", invited paper for IEEE IPFA, Marina Bay Sands, Singapore, 18-21 July, 2016
  • B.Shastry, F.Yamaguchi, K.Rieck, J.-P.Seifert, "Towards Vulnerability Discovery Using Staged Program Analysis", accepted for DIMVA, Donostia-San Sebastián, Spain, 7-8 July, 2016
  • A. Feldmann, P. Heyder, M. Kreutzer, S. Schmid, J.-P. Seifert, H. Shulman, J. Sieberg, K. Thimmaraju, M. Waidner, "NetCo: Reliable Routing With Unreliable Routers", accepted for DISN, Toulouse, France, 28 June, 2016
  • L. Schiff, K. Thimmaraju, S. Schmid, "Routing-Verification-as-a-Service (RVaaS): Trustworthy Routing Despite Insecure Providers", accepted for DISN, Toulouse, France, 28 June, 2016
  • A. Oppermann, J.-P. Seifert, F. Thiel, "Poster: Secure Cloud Reference Architectures for Measuring Instruments under Legal Control", accepted for CLOSER, Rome, Italy, 23-25 April, 2016
  • Á. Kiss, J. Krämer, P. Rauzy and J.-P. Seifert, "Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT", accepted for COSADE, Graz, Austria, 14-15 April, 2016
  • E. Carmon, J.-P. Seifert, A. Wool, "Simple Photonic Emission Attack with Reduced Data Complexity", accepted for COSADE, Graz, Austria, 14-15 April, 2016
  • F. Ganji, S. Tajik and J.-P. Seifert, "PAC Learning of Arbiter PUFs (Extended Version)", Journal of Cryptographic Engineering, 2016
  • M. Piekarska, "Can I Let You In? On Event-Centric Context-Aware Authorization", accepted for ICONS, Lisbon, Portugal, 21-25, February, 2016
  • A. Shaik, R. Borgaonkar, N. Asokan, V. Niemi, J.-P. Seifert, "Practical attacks against privacy and availability in 4G/LTE mobile communication systems", accepted for NDSS, San Diego, California, USA, 21-24 February, 2016

Zusatzinformationen / Extras

Direktzugang

Schnellnavigation zur Seite über Nummerneingabe

Postal Address

Technische Universität Berlin - An-Institut Telekom Innovation Laboratories
Fakultät IV
Sekr. TEL17
Ernst-Reuter-Platz 7
10587 Berlin

Assistant

Claudia Petzsch
+49 - 30 - 8353 58 681
TEL
Raum TEL17