direkt zum Inhalt springen

direkt zum Hauptnavigationsmenü

Sie sind hier

TU Berlin

Inhalt des Dokuments


Photon Emission as a Characterization Tool for Bipolar Parasitics in FinFET Technology
A. Beyreuther, N. Herfurth, E. Ami [1]ni [2], T. Nakamura, I. De Wolf, C. Boit
Microelectronics Reliability, Elsevier, 2018
Cloning Physically Unclonable Functions
C. Helfmeier, C. Boit, D. Nedospasov [3] and J.P. Seifert [4]
Top Picks in Hardware Security, International Conference On Computer Aided Design (ICCAD), San Diego, California, USA, 2018
Assessment of a Chip Backside Protection
E. Ami [5]ni [6], A. Beyreuther, N. Herfurth, A. Steigert, B. Szyszka, C. Boit
Journal of Hardware and System Security, 2018
IC security and quality improvement by protection of chip backside against hardware attacks
E. Ami [7]ni [8], A. Beyreuther, N. Herfurth, A. Steigert, R. Muydinov, B. Szyszka, C. Boit
Microelectronics Reliability,  2018
Comparative Assessment of Optical Techniques for Semi-Invasive SRAM Data Read-Out on an MSP430 Microcontroller
T. Kiyan, H. Lohrke [9], and C. Boit
Int. Symp. for Testing and Failure Analysis (ISTFA). Phoenix, Arizon, USA, 2018
On the Detectability of Control Flow Using Memory Access Patterns
R. Buhren [10], F. Hetzelt [11] and N. Pirnay
ACM CCS Workshop on System Software for Trusted Execution (SysTEX), Toronto, Cananda, 2018
Attacking RO-PUFs with Enhanced Challenge-Response Pairs
N. Wisiol [12], M. Margraf
IFIP International Conference on Security, Privacy, and Trust, Poznań, Poland, 2018
Secure Cloud Computing: Risk Analysis for Secure Cloud Reference Architecture in Legal Metrology
A. Oppermann, M. Esche, F. Thiel, J.P. Seifert [13]
IFIP International Conference on Security, Privacy, and Trust, Poznań, Poland, 2018
Swipe your Fingerprints! How Biometric Authentication Simplifies Payment, Access and Identity Fraud
J. Fietkau [14], J. Krissler [15], J.P. Seifert [16]
USENIX WOOT, Baltimore, Maryland, USA, 2018
Key Extraction using Thermal Laser Stimulation: A Case Study on Xilinx Ultrascale FPGAs
H. Lohrke, S. Tajik, T. Krachenfels, C. Boit, J.P. Seifert [17]
TCHES, Amsterdam, Netherlands, 2018
Follow the White Rabbit: Simplifying Fuzz Testing Using FuzzExMachina
B. Shastry [18], D. Maier [19], V. Ultzsch
Black Hat USA, Las Vegas, Nevada, USA, 2018
Open Source Value Chains for Addressing Security Issues Efficiently
A. Weber, S. Reith, D. Kuhlmann, M. Kasper, J.P. Seifert [20], C. Krauß
IEEE Workshop on Cyber Resilience Technologies , Their Benefits and Measurements (CRE), Lisbon, Portugal, 2018
On the Impact of Rogue Base Stations in 4G/LTE Self Organizing Network
A. Shaik [21], R. Bargaonkar, S. Park [22], J.P. Seifert [23]
ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Stockholm, Sweden, 2018
Virtual Network Isolation: Are We There Yet?
K. Thimmaraju [24], G. Rétvári, S. Schmid
ACM SIGCOMM 2018 Workshop on Security in Softwarized Networks (SecSoN), Budapest, Hungary, 2018
Honey, I Shrunk Your App Security: The State of Android App Hardening
V. Haupert, D. Maier [25], N. Schneider, J. Kirsch, T. Müller
Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Paris-Saclay, France, 2018
On the Learnability of Physically Unclonable Functions
F. Ganji
Springer, T-Labs Series in Telecommunication Services, ISBN 978-3-319-76717-8, 2018
On the Phyiscal Security of Physically Unclonable Functions
S. Tajik
Springer, T-Labs Series in Telecommunication Services, ISBN 978-3-319-75820-6, 2018
I DPID It My Way!: A Covert Timing Channel in Software-Defined Networks
R. Krösche, K. Thimmaraju [26], L. Schiff, S. Schmid
IFIP Networking, Zürich, Switzerland, 2018
Peeking over the Cellular Walled Gardens - A Method for Closed Network Diagnosis
B. Hong, S. Park [27], H. Kim, D. Kim, H. Hong, H. Choi, J.-P. Seifert [28], S.-J. Lee, Y. Kim
IEEE Transactions on Mobile Computing, 2018

Taking Control of SDN-based Cloud Systems via the Data Plane (Best Paper Award!)
K. Thimmaraju [29], B. Shastry [30], T. Fiebig [31], F. Hetzelt [32], J.-P. Seifert [33], A. Feldmann, S. Schmid
ACM Symposium on SDN Research (SOSR 2018), Los Angeles, USA, 2018
Blockchain Applications for Legal Metrology
D. Peters, J. Wetzlich, F. Thiel, J.-P. Seifert [34]
International Instrumentation and Measurement Technology Conference (I²MTC 2018), Houston, USA, 2018
A Fourier Analysis Based Attack against Physically Unclonable Functions
F. Ganji, S. Tajik and J.-P. Seifert [35]
Financial Cryptography and Data Security 2018 (FC'18), Curaçao, 2018


Secure Cloud Computing: Communication Protocol for Multithreaded Fully Homomorphic Encryption for Remote Data Processing
A. Oppermann, F. Grasso Toro, A. Yurchenko J.-P. Seifert [36]
IEEE ISPA 2017, Guangzhou, China, 2017
Static Analysis as a Fuzzing Aid
B. Shastry [37], M. Leutner, T. Fiebig [38], K. Thimmaraju [39], F. Yamaguchi, K.
Rieck, S. Schmid, J.-P. Seifert [40], A. Feldmann
RAID'17, Atlanta, USA, 2017

Paying the Price for Disruption: How a FinTech Allowed Account Takeover
V. Haupert, D. Maier, and T. Müller
ROOTS 2017, Vienna, Austria, 2017
The vAMP Attack: Taking Control of Cloud Systems via the Unified Packet Parser
K. Thimmaraju [41], B. Shastry [42], T. Fiebig [43], F. Hetzelt [44], J.-P. Seifert [45], A. Feldmann, S. Schmid
ACM CCSW 2017, Dallas, USA, 2017
Secure Cloud Computing: Multithreaded Fully Homomorphic Encryption for Legal Metrology
A. Oppermann, A. Yurchenko, M. Esche and J.-P. Seifert [46]
ISDDC 2017, Vancouver, Canada, 2017
On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs
S. Tajik , H. lohrke, J.-P. Seifert [47], C. Boit
ACM CCS 2017, Dallas, USA, 2017
White-Stingray: Evaluating IMSI Catchers Detection Applications
S. Park [48], A. Shaik [49], R. Borgaonkar [50], A. Martin, J.-P. Seifert [51]
WOOT '17, Vancouver, Canada, 2017
Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing
B. Shastry [52], F. Maggi, F. Yamaguchi, K. Rieck, J.-P. Seifert [53]
WOOT '17, Vancouver, Canada, 2017
Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery
T. Unruh, B. Shastry [54], M. Skoruppa, F. Maggi, K. Rieck, J.-P. Seifert [55], F. Yamaguchi
WOOT '17, Vancouver, Canada, 2017
Visible Light Techniques in the FinFET Era: Challenges, Threats and Opportunities
H. Lohrke, H. Zöllner, P. Scholz, S. Tajik, C. Boit, J.-P. Seifert [56]
IPFA, Chengdu, China, 2017
New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor
R. Borgaonkar [57],  S. Park [58],  L. Hirschi, A. Shaik [59], Andrew Martin, J.-P. Seifert [60]
Black Hat, Las Vegas, USA, 2017

New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor
R. Borgaonkar [61],  S. Park [62],  L. Hirschi, A. Shaik [63], Andrew Martin, J.-P. Seifert [64]
Black Hat, Las Vegas, USA, 2017

PUFMon: Security Monitoring of FPGAs using Physically Unclonable Functions
S. Tajik , J. Fietkau [65], H. lohrke, J.-P. Seifert [66], C. Boit
IEEE IOLTS, Thessaloniki, Greece, 2017

Photonic Side-Channel Analysis of Arbiter PUFs
S. Tajik, E. Dietz, S. Frohmann, H. Dittrich, D. Nedospasov [67], C. Helfmeier, J.-P. Seifert [68], C. Boit and H.-W. Hübers
Journal of Cryptology, 2017

Having No Mathematical Model May Not Secure PUFs
F. Ganji [69], S. Tajik [70], F. Fäßler and J.-P. Seifert [71]
Journal of Cryptographic Engineering, 2017
Photonic Side Channel Attacks Against RSA
E. Carmon, J.-P. Seifert [72], A. Wool
IEEE HOST, McLean, USA, May 1-4, 2017
Outsmarting Network Security with SDN Teleportation
K. Thimmaraju [73]
, L. Schiff, S. Schmid
IEEE Euro S&P, Paris, France,
April 26-28, 2017
Security Analysis of Encrypted Virtual Machines
F. [74]
Hetzelt [75], R. Buhren [76]
Xi'an, China, April 8-9, 2017
Something From Nothing (There): Collecting Global IPv6 Datasets From DNS
T. Fiebig [77], K. Borgolte, S. Hao, C. Kruegel, G. Vigna
PAM, Sydney, Australia, March 30-31, 2017
Fault Attacks on Encrypted General Purpose Compute Platforms
R. Buhren [78], S. Gueron, J. Nordholz [79], J.-P. Seifert [80], J. Vetter [81]
ACM CODASPY, Scottsdale, USA, March 22-24, 2017


  • O. Keren, I. Polian, M. M. Tehranipoor, "Hardware Security (Dagstuhl Seminar 16202)", Dagstuhl Reports, Vol. 6, Issue 5, 2016, (Editor: F. Ganji)
  • R. Buhren, J. Vetter, J. Nordholz, "The threat of virtualization: Hypervisor-based rootkits on the ARM architecture", accepted for ICICS, Singapore, November 29, 2016
  • H. Lohrke, S. Tajik, P. Scholz, J.-P. Seifert, C. Boit, "Automated Detection of Fault Sensitive Locations for Reconfiguration Attacks on Programmable Logic", accepted for ISTFA, Forth Worth, Texas, USA, November 8, 2016
  • A. Mikityuk, O. Friedrich, P. Pogrzeba, C. Meerveld, M. Nemani, H. Yun, R. Mizrahi, "Cloud Browser Business Opportunities (Version 1.0)", GSMA Position Paper, 3 November, 2016
  • S. Park‚ A. Shaik‚ R. Borgaonkar, J.-P. Seifert, "White Rabbit in Mobile: Effect of Unsecured Clock Source in Smartphones", accepted for CCS SPSM, Vienna, Austria, October 24-28, 2016
  • M. Piekarska, S. Park, A. Shaik, "Back to the Future: Evaluation Model for Wearables Based On the Past Experience", accepted for INNOV2016, Rome, Italy, August 21-25, 2016
  • M. Piekarska, "Hide, Don't Seek: on User-Centric Location Accuracy", accepted for INNOV2016, Rome, Italy, August 21-25, 2016
  • H. Lohrke, S. Tajik, C. Boit and J.-P. Seifert, "No Place to Hide: Contactless Probing of Secret Data on FPGAs", accepted for CHES, Santa Barbara, USA, 17-19 August, 2016
  • F. Ganji, S. Tajik, F. Fäßler and J.-P. Seifert, "Strong Machine Learning Attack against PUFs with No Mathematical Model", accepted for CHES, Santa Barbara, USA, 17-19 August, 2016
  • C. Boit, S. Tajik, P. Scholz, E. Amini, A. Beyreuther, H. Lohrke, J.P. Seifert, "From IC Debug to Hardware Security Risk: The Power of Backside Access and Optical Interaction", invited paper for IEEE IPFA, Marina Bay Sands, Singapore, 18-21 July, 2016
  • B.Shastry, F.Yamaguchi, K.Rieck, J.-P.Seifert, "Towards Vulnerability Discovery Using Staged Program Analysis", accepted for DIMVA, Donostia-San Sebastián, Spain, 7-8 July, 2016
  • A. Feldmann, P. Heyder, M. Kreutzer, S. Schmid, J.-P. Seifert, H. Shulman, J. Sieberg, K. Thimmaraju, M. Waidner, "NetCo: Reliable Routing With Unreliable Routers", accepted for DISN, Toulouse, France, 28 June, 2016
  • L. Schiff, K. Thimmaraju, S. Schmid, "Routing-Verification-as-a-Service (RVaaS): Trustworthy Routing Despite Insecure Providers", accepted for DISN, Toulouse, France, 28 June, 2016
  • A. Oppermann, J.-P. Seifert, F. Thiel, "Poster: Secure Cloud Reference Architectures for Measuring Instruments under Legal Control", accepted for CLOSER, Rome, Italy, 23-25 April, 2016
  • Á. Kiss, J. Krämer, P. Rauzy and J.-P. Seifert, "Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT", accepted for COSADE, Graz, Austria, 14-15 April, 2016
  • E. Carmon, J.-P. Seifert, A. Wool, "Simple Photonic Emission Attack with Reduced Data Complexity", accepted for COSADE, Graz, Austria, 14-15 April, 2016
  • F. Ganji, S. Tajik and J.-P. Seifert, "PAC Learning of Arbiter PUFs (Extended Version)", Journal of Cryptographic Engineering, 2016
  • M. Piekarska, "Can I Let You In? On Event-Centric Context-Aware Authorization", accepted for ICONS, Lisbon, Portugal, 21-25, February, 2016
  • A. Shaik, R. Borgaonkar, N. Asokan, V. Niemi, J.-P. Seifert, "Practical attacks against privacy and availability in 4G/LTE mobile communication systems", accepted for NDSS, San Diego, California, USA, 21-24 February, 2016

Older Publications

  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009

Nach oben

Postal Address

Technische Universität Berlin - An-Institut Telekom Innovation Laboratories
Fakultät IV
Sekr. TEL16
Ernst-Reuter-Platz 7
10587 Berlin


Claudia Petzsch
+49 - 30 - 8353 58 681
Raum TEL16
E-Mail-Anfrage [82]


  • Security in Telecommunications [83]
------ Links: ------

Zusatzinformationen / Extras


Schnellnavigation zur Seite über Nummerneingabe

Copyright TU Berlin 2008