direkt zum Inhalt springen

direkt zum Hauptnavigationsmenü

Sie sind hier

TU Berlin

Inhalt des Dokuments

2018

Secure Cloud Computing: Risk Analysis for Secure Cloud Reference Architecture in Legal Metrology
A. Oppermann, M. Esche, F. Thiel, J.P. Seifert [1]
To appear in International Conference on Security, Privacy, and Trust, Poznań, Poland, 2018
(Z)wipe your Fingerprints! How Biometric Authentication Simplifies Payment, Access and Identity Fraud
J. Fietkau [2], J. Krissler [3], J.P. Seifert [4]
To appear in USENIX WOOT, Baltimore, Maryland, USA, 2018
Key Extraction using Thermal Laser Stimulation: A Case Study on Xilinx Ultrascale FPGAs
H. Lohrke, S. Tajik [5], T. Krachenfels, C. Boit, J.P. Seifert [6]
To appear in TCHES, Amsterdam, Netherlands, 2018
Follow the White Rabbit: Simplifying Fuzz Testing Using FuzzExMachina
B. Shastry [7], D. Maier [8], V. Ultzsch
Black Hat USA, Las Vegas, Nevada, USA, 2018
Open Source Value Chains for Addressing Security Issues Efficiently
A. Weber, S. Reith, D. Kuhlmann, M. Kasper, J.P. Seifert [9], C. Krauß
To appear in IEEE Workshop on Cyber Resilience Technologies , Their Benefits and Measurements (CRE), Lisbon, Portugal, 2018
On the Impact of Rogue Base Stations in 4G/LTE Self Organizing Network
A. Shaik [10], R. Bargaonkar, S. Park [11], J.P. Seifert [12]
ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Stockholm, Sweden, 2018
Virtual Network Isolation: Are We There Yet?
K. Thimmaraju [13], G. Rétvári, S. Schmid
To appear in ACM SIGCOMM 2018 Workshop on Security in Softwarized Networks (SecSoN), Budapest, Hungary, 2018
Honey, I Shrunk Your App Security: The State of Android App Hardening
V. Haupert, D. Maier [14], N. Schneider, J. Kirsch, T. Müller
To appear in Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Paris-Saclay, France, 2018
On the Learnability of Physically Unclonable Functions
F. Ganji [15]
Springer, T-Labs Series in Telecommunication Services, ISBN 978-3-319-76717-8, 2018
On the Phyiscal Security of Physically Unclonable Functions
S. Tajik [16]
Springer, T-Labs Series in Telecommunication Services, ISBN 978-3-319-75820-6, 2018
I DPID It My Way!: A Covert Timing Channel in Software-Defined Networks
R. Krösche, K. Thimmaraju [17], L. Schiff, S. Schmid
IFIP Networking, Zürich, Switzerland, 2018
Peeking over the Cellular Walled Gardens - A Method for Closed Network Diagnosis
B. Hong, S. Park [18], H. Kim, D. Kim, H. Hong, H. Choi, J.-P. Seifert [19], S.-J. Lee, Y. Kim
IEEE Transactions on Mobile Computing, 2018

Taking Control of SDN-based Cloud Systems via the Data Plane (Best Paper Award!)
K. Thimmaraju [20], B. Shastry [21], T. Fiebig [22], F. Hetzelt [23], J.-P. Seifert [24], A. Feldmann, S. Schmid
ACM Symposium on SDN Research (SOSR 2018), Los Angeles, USA, 2018
Blockchain Applications for Legal Metrology
D. Peters, J. Wetzlich, F. Thiel, J.-P. Seifert [25]
International Instrumentation and Measurement Technology Conference (I²MTC 2018), Houston, USA, 2018
A Fourier Analysis Based Attack against Physically Unclonable Functions
F. Ganji [26], S. Tajik [27] and J.-P. Seifert [28]
Financial Cryptography and Data Security 2018 (FC'18), Curaçao, 2018

2017

Secure Cloud Computing: Communication Protocol for Multithreaded Fully Homomorphic Encryption for Remote Data Processing
A. Oppermann, F. Grasso Toro, A. Yurchenko J.-P. Seifert [29]
IEEE ISPA 2017, Guangzhou, China, 2017
Static Analysis as a Fuzzing Aid
B. Shastry [30], M. Leutner, T. Fiebig [31], K. Thimmaraju [32], F. Yamaguchi, K.
Rieck, S. Schmid, J.-P. Seifert [33], A. Feldmann
RAID'17, Atlanta, USA, 2017

Paying the Price for Disruption: How a FinTech Allowed Account Takeover
V. Haupert, D. Maier, and T. Müller
ROOTS 2017, Vienna, Austria, 2017
The vAMP Attack: Taking Control of Cloud Systems via the Unified Packet Parser
K. Thimmaraju [34], B. Shastry [35], T. Fiebig [36], F. Hetzelt [37], J.-P. Seifert [38], A. Feldmann, S. Schmid
ACM CCSW 2017, Dallas, USA, 2017
Secure Cloud Computing: Multithreaded Fully Homomorphic Encryption for Legal Metrology
A. Oppermann, A. Yurchenko, M. Esche and J.-P. Seifert [39]
ISDDC 2017, Vancouver, Canada, 2017
On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs
S. Tajik  [40], H. lohrke, J.-P. Seifert [41], C. Boit
ACM CCS 2017, Dallas, USA, 2017
White-Stingray: Evaluating IMSI Catchers Detection Applications
S. Park [42], A. Shaik [43], R. Borgaonkar [44], A. Martin, J.-P. Seifert [45]
WOOT '17, Vancouver, Canada, 2017
Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing
B. Shastry [46], F. Maggi, F. Yamaguchi, K. Rieck, J.-P. Seifert [47]
WOOT '17, Vancouver, Canada, 2017
Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery
T. Unruh, B. Shastry [48], M. Skoruppa, F. Maggi, K. Rieck, J.-P. Seifert [49], F. Yamaguchi
WOOT '17, Vancouver, Canada, 2017
Visible Light Techniques in the FinFET Era: Challenges, Threats and Opportunities
H. Lohrke, H. Zöllner, P. Scholz, S. Tajik [50], C. Boit, J.-P. Seifert [51]
IPFA, Chengdu, China, 2017
New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor
R. Borgaonkar [52],  S. Park [53],  L. Hirschi, A. Shaik [54], Andrew Martin, J.-P. Seifert [55]
Black Hat, Las Vegas, USA, 2017

New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor
R. Borgaonkar [56],  S. Park [57],  L. Hirschi, A. Shaik [58], Andrew Martin, J.-P. Seifert [59]
Black Hat, Las Vegas, USA, 2017

PUFMon: Security Monitoring of FPGAs using Physically Unclonable Functions
S. Tajik  [60], J. Fietkau [61], H. lohrke, J.-P. Seifert [62], C. Boit
IEEE IOLTS, Thessaloniki, Greece, 2017

Photonic Side-Channel Analysis of Arbiter PUFs
S. Tajik [63], E. Dietz, S. Frohmann, H. Dittrich, D. Nedospasov [64], C. Helfmeier, J.-P. Seifert [65], C. Boit and H.-W. Hübers
Journal of Cryptology, 2017

Having No Mathematical Model May Not Secure PUFs
F. Ganji [66], S. Tajik [67], F. Fäßler and J.-P. Seifert [68]
Journal of Cryptographic Engineering, 2017
Photonic Side Channel Attacks Against RSA
E. Carmon, J.-P. Seifert [69], A. Wool
IEEE HOST, McLean, USA, May 1-4, 2017
Outsmarting Network Security with SDN Teleportation
K. Thimmaraju [70]
, L. Schiff, S. Schmid
IEEE Euro S&P, Paris, France,
April 26-28, 2017
Security Analysis of Encrypted Virtual Machines
F. [71]
Hetzelt [72], R. Buhren [73]
ACM VEE,
Xi'an, China, April 8-9, 2017
Something From Nothing (There): Collecting Global IPv6 Datasets From DNS
T. Fiebig [74], K. Borgolte, S. Hao, C. Kruegel, G. Vigna
PAM, Sydney, Australia, March 30-31, 2017
Fault Attacks on Encrypted General Purpose Compute Platforms
R. Buhren [75], S. Gueron, J. Nordholz [76], J.-P. Seifert [77], J. Vetter [78]
ACM CODASPY, Scottsdale, USA, March 22-24, 2017

2016

  • O. Keren, I. Polian, M. M. Tehranipoor, "Hardware Security (Dagstuhl Seminar 16202)", Dagstuhl Reports, Vol. 6, Issue 5, 2016, (Editor: F. Ganji)
  • R. Buhren, J. Vetter, J. Nordholz, "The threat of virtualization: Hypervisor-based rootkits on the ARM architecture", accepted for ICICS, Singapore, November 29, 2016
  • H. Lohrke, S. Tajik, P. Scholz, J.-P. Seifert, C. Boit, "Automated Detection of Fault Sensitive Locations for Reconfiguration Attacks on Programmable Logic", accepted for ISTFA, Forth Worth, Texas, USA, November 8, 2016
  • A. Mikityuk, O. Friedrich, P. Pogrzeba, C. Meerveld, M. Nemani, H. Yun, R. Mizrahi, "Cloud Browser Business Opportunities (Version 1.0)", GSMA Position Paper, 3 November, 2016
  • S. Park‚ A. Shaik‚ R. Borgaonkar, J.-P. Seifert, "White Rabbit in Mobile: Effect of Unsecured Clock Source in Smartphones", accepted for CCS SPSM, Vienna, Austria, October 24-28, 2016
  • M. Piekarska, S. Park, A. Shaik, "Back to the Future: Evaluation Model for Wearables Based On the Past Experience", accepted for INNOV2016, Rome, Italy, August 21-25, 2016
  • M. Piekarska, "Hide, Don't Seek: on User-Centric Location Accuracy", accepted for INNOV2016, Rome, Italy, August 21-25, 2016
  • H. Lohrke, S. Tajik, C. Boit and J.-P. Seifert, "No Place to Hide: Contactless Probing of Secret Data on FPGAs", accepted for CHES, Santa Barbara, USA, 17-19 August, 2016
  • F. Ganji, S. Tajik, F. Fäßler and J.-P. Seifert, "Strong Machine Learning Attack against PUFs with No Mathematical Model", accepted for CHES, Santa Barbara, USA, 17-19 August, 2016
  • C. Boit, S. Tajik, P. Scholz, E. Amini, A. Beyreuther, H. Lohrke, J.P. Seifert, "From IC Debug to Hardware Security Risk: The Power of Backside Access and Optical Interaction", invited paper for IEEE IPFA, Marina Bay Sands, Singapore, 18-21 July, 2016
  • B.Shastry, F.Yamaguchi, K.Rieck, J.-P.Seifert, "Towards Vulnerability Discovery Using Staged Program Analysis", accepted for DIMVA, Donostia-San Sebastián, Spain, 7-8 July, 2016
  • A. Feldmann, P. Heyder, M. Kreutzer, S. Schmid, J.-P. Seifert, H. Shulman, J. Sieberg, K. Thimmaraju, M. Waidner, "NetCo: Reliable Routing With Unreliable Routers", accepted for DISN, Toulouse, France, 28 June, 2016
  • L. Schiff, K. Thimmaraju, S. Schmid, "Routing-Verification-as-a-Service (RVaaS): Trustworthy Routing Despite Insecure Providers", accepted for DISN, Toulouse, France, 28 June, 2016
  • A. Oppermann, J.-P. Seifert, F. Thiel, "Poster: Secure Cloud Reference Architectures for Measuring Instruments under Legal Control", accepted for CLOSER, Rome, Italy, 23-25 April, 2016
  • Á. Kiss, J. Krämer, P. Rauzy and J.-P. Seifert, "Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT", accepted for COSADE, Graz, Austria, 14-15 April, 2016
  • E. Carmon, J.-P. Seifert, A. Wool, "Simple Photonic Emission Attack with Reduced Data Complexity", accepted for COSADE, Graz, Austria, 14-15 April, 2016
  • F. Ganji, S. Tajik and J.-P. Seifert, "PAC Learning of Arbiter PUFs (Extended Version)", Journal of Cryptographic Engineering, 2016
  • M. Piekarska, "Can I Let You In? On Event-Centric Context-Aware Authorization", accepted for ICONS, Lisbon, Portugal, 21-25, February, 2016
  • A. Shaik, R. Borgaonkar, N. Asokan, V. Niemi, J.-P. Seifert, "Practical attacks against privacy and availability in 4G/LTE mobile communication systems", accepted for NDSS, San Diego, California, USA, 21-24 February, 2016

Older Publications

  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009

Nach oben

Postal Address

Technische Universität Berlin - An-Institut Telekom Innovation Laboratories
Fakultät IV
Sekr. TEL17
Ernst-Reuter-Platz 7
10587 Berlin

Assistant

Claudia Petzsch
+49 - 30 - 8353 58 681
TEL
Raum TEL17
E-Mail-Anfrage [79]

Map

  • Security in Telecommunications [80]
------ Links: ------

Zusatzinformationen / Extras

Direktzugang

Schnellnavigation zur Seite über Nummerneingabe

Copyright TU Berlin 2008