direkt zum Inhalt springen

direkt zum Hauptnavigationsmenü

Sie sind hier

TU Berlin

Inhalt des Dokuments


Secure Real-time Communication and Computing Infrastructure for Industry 4.0 – Challenges and Opportunities
E. Zielinski, J. Schulz-Zander, H. Ruckstuhl, A. Artemenko, A. Ramirez, F. Zeiger, M. Mormul, F. Hetzelt [1], F. Beierle, H. Klaus, M. Zimmermann, C. Schellenberger
To appear in AIComNets, München, Germany, March 2019
Application of thin films in IC security
E. Amini [2], C. Boit, B. Szyszka, J.P. Seifert [3]
Spring Meeting of the European Materials Research Society, Nice, France, May, 2019
Challenges and Solutions for Industry-Grade Secure Connectivity
H. Klaus, F. Hetzelt [4], P. Hofmann, A. Blecker, D. Schwaiger
To appear in AIComNets, München, Germany, March 2019
Device Capabilities exposed on 4G and 5G Networks
A. Shaik [5], R. Borgaonkar [6], S. Park [7], J.P Seifert [8]
To appear in ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Miami, Florida, USA, 2019
PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary
D. Song, F. Hetzelt [9], D. Das, C. Spensky, Y Na, S. Volckaert, G. Vigna, C. Kruegel, J.P. Seifert [10], M. Franz
NDSS, San Diego, California, USA, February, 2019


IT-Sicherheit gründlich lösbar?
A.Weber, S. Guilley, M. Kasper, C. Krauß, P. S. Krüger, D. Kuhlmann, S. Reith, J.P. Seifert [11]
Zukunftsmotor Metropolregion, Rhein-Neckar, Germany, 2018 
Photon Emission as a Characterization Tool for Bipolar Parasitics in FinFET Technology
A. Beyreuther, N. Herfurth, E. Ami [12]ni [13], T. Nakamura, I. De Wolf, C. Boit
Microelectronics Reliability, Elsevier, 2018
Cloning Physically Unclonable Functions
C. Helfmeier, C. Boit, D. Nedospasov [14] and J.P. Seifert [15]
Top Picks in Hardware Security, International Conference On Computer Aided Design (ICCAD), San Diego, California, USA, 2018
Assessment of a Chip Backside Protection
E. Ami [16]ni [17], A. Beyreuther, N. Herfurth, A. Steigert, B. Szyszka, C. Boit
Journal of Hardware and System Security, 2018
IC security and quality improvement by protection of chip backside against hardware attacks
E. Ami [18]ni [19], A. Beyreuther, N. Herfurth, A. Steigert, R. Muydinov, B. Szyszka, C. Boit
Microelectronics Reliability,  2018
Comparative Assessment of Optical Techniques for Semi-Invasive SRAM Data Read-Out on an MSP430 Microcontroller
T. Kiyan, H. Lohrke [20], and C. Boit
Int. Symp. for Testing and Failure Analysis (ISTFA). Phoenix, Arizon, USA, 2018
On the Detectability of Control Flow Using Memory Access Patterns
R. Buhren [21], F. Hetzelt [22] and N. Pirnay
ACM CCS Workshop on System Software for Trusted Execution (SysTEX), Toronto, Cananda, 2018
Attacking RO-PUFs with Enhanced Challenge-Response Pairs
N. Wisiol [23], M. Margraf
IFIP International Conference on Security, Privacy, and Trust, Poznań, Poland, 2018
Secure Cloud Computing: Risk Analysis for Secure Cloud Reference Architecture in Legal Metrology
A. Oppermann, M. Esche, F. Thiel, J.P. Seifert [24]
IFIP International Conference on Security, Privacy, and Trust, Poznań, Poland, 2018
Swipe your Fingerprints! How Biometric Authentication Simplifies Payment, Access and Identity Fraud
J. Fietkau [25], J. Krissler [26], J.P. Seifert [27]
USENIX WOOT, Baltimore, Maryland, USA, 2018
Key Extraction using Thermal Laser Stimulation: A Case Study on Xilinx Ultrascale FPGAs
H. Lohrke, S. Tajik, T. Krachenfels, C. Boit, J.P. Seifert [28]
TCHES, Amsterdam, Netherlands, 2018
Follow the White Rabbit: Simplifying Fuzz Testing Using FuzzExMachina
B. Shastry, D. Maier [29], V. Ultzsch
Black Hat USA, Las Vegas, Nevada, USA, 2018
Open Source Value Chains for Addressing Security Issues Efficiently
A. Weber, S. Reith, D. Kuhlmann, M. Kasper, J.P. Seifert [30], C. Krauß
IEEE Workshop on Cyber Resilience Technologies , Their Benefits and Measurements (CRE), Lisbon, Portugal, 2018
On the Impact of Rogue Base Stations in 4G/LTE Self Organizing Network
A. Shaik [31], R. Bargaonkar, S. Park [32], J.P. Seifert [33]
ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Stockholm, Sweden, 2018
Virtual Network Isolation: Are We There Yet?
K. Thimmaraju [34], G. Rétvári, S. Schmid
ACM SIGCOMM 2018 Workshop on Security in Softwarized Networks (SecSoN), Budapest, Hungary, 2018
Honey, I Shrunk Your App Security: The State of Android App Hardening
V. Haupert, D. Maier [35], N. Schneider, J. Kirsch, T. Müller
Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Paris-Saclay, France, 2018
On the Learnability of Physically Unclonable Functions
F. Ganji
Springer, T-Labs Series in Telecommunication Services, ISBN 978-3-319-76717-8, 2018
On the Phyiscal Security of Physically Unclonable Functions
S. Tajik
Springer, T-Labs Series in Telecommunication Services, ISBN 978-3-319-75820-6, 2018
I DPID It My Way!: A Covert Timing Channel in Software-Defined Networks
R. Krösche, K. Thimmaraju [36], L. Schiff, S. Schmid
IFIP Networking, Zürich, Switzerland, 2018
Peeking over the Cellular Walled Gardens - A Method for Closed Network Diagnosis
B. Hong, S. Park [37], H. Kim, D. Kim, H. Hong, H. Choi, J.-P. Seifert [38], S.-J. Lee, Y. Kim
IEEE Transactions on Mobile Computing, 2018

Taking Control of SDN-based Cloud Systems via the Data Plane (Best Paper Award!)
K. Thimmaraju [39], B. Shastry, T. Fiebig [40], F. Hetzelt [41], J.-P. Seifert [42], A. Feldmann, S. Schmid
ACM Symposium on SDN Research (SOSR 2018), Los Angeles, USA, 2018
Blockchain Applications for Legal Metrology
D. Peters, J. Wetzlich, F. Thiel, J.-P. Seifert [43]
International Instrumentation and Measurement Technology Conference (I²MTC 2018), Houston, USA, 2018
A Fourier Analysis Based Attack against Physically Unclonable Functions
F. Ganji, S. Tajik and J.-P. Seifert [44]
Financial Cryptography and Data Security 2018 (FC'18), Curaçao, 2018


Secure Cloud Computing: Communication Protocol for Multithreaded Fully Homomorphic Encryption for Remote Data Processing
A. Oppermann, F. Grasso Toro, A. Yurchenko J.-P. Seifert [45]
IEEE ISPA 2017, Guangzhou, China, 2017
Static Analysis as a Fuzzing Aid
B. Shastry, M. Leutner, T. Fiebig [46], K. Thimmaraju [47], F. Yamaguchi, K.
Rieck, S. Schmid, J.-P. Seifert [48], A. Feldmann
RAID'17, Atlanta, USA, 2017

Paying the Price for Disruption: How a FinTech Allowed Account Takeover
V. Haupert, D. Maier, and T. Müller
ROOTS 2017, Vienna, Austria, 2017
The vAMP Attack: Taking Control of Cloud Systems via the Unified Packet Parser
K. Thimmaraju [49], B. Shastry, T. Fiebig [50], F. Hetzelt [51], J.-P. Seifert [52], A. Feldmann, S. Schmid
ACM CCSW 2017, Dallas, USA, 2017
Secure Cloud Computing: Multithreaded Fully Homomorphic Encryption for Legal Metrology
A. Oppermann, A. Yurchenko, M. Esche and J.-P. Seifert [53]
ISDDC 2017, Vancouver, Canada, 2017
On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs
S. Tajik , H. lohrke, J.-P. Seifert [54], C. Boit
ACM CCS 2017, Dallas, USA, 2017
White-Stingray: Evaluating IMSI Catchers Detection Applications
S. Park [55], A. Shaik [56], R. Borgaonkar [57], A. Martin, J.-P. Seifert [58]
WOOT '17, Vancouver, Canada, 2017
Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing
B. Shastry, F. Maggi, F. Yamaguchi, K. Rieck, J.-P. Seifert [59]
WOOT '17, Vancouver, Canada, 2017
Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery
T. Unruh, B. Shastry, M. Skoruppa, F. Maggi, K. Rieck, J.-P. Seifert [60], F. Yamaguchi
WOOT '17, Vancouver, Canada, 2017
Visible Light Techniques in the FinFET Era: Challenges, Threats and Opportunities
H. Lohrke, H. Zöllner, P. Scholz, S. Tajik, C. Boit, J.-P. Seifert [61]
IPFA, Chengdu, China, 2017
New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor
R. Borgaonkar [62],  S. Park [63],  L. Hirschi, A. Shaik [64], Andrew Martin, J.-P. Seifert [65]
Black Hat, Las Vegas, USA, 2017

New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor
R. Borgaonkar [66],  S. Park [67],  L. Hirschi, A. Shaik [68], Andrew Martin, J.-P. Seifert [69]
Black Hat, Las Vegas, USA, 2017

PUFMon: Security Monitoring of FPGAs using Physically Unclonable Functions
S. Tajik , J. Fietkau [70], H. lohrke, J.-P. Seifert [71], C. Boit
IEEE IOLTS, Thessaloniki, Greece, 2017

Photonic Side-Channel Analysis of Arbiter PUFs
S. Tajik, E. Dietz, S. Frohmann, H. Dittrich, D. Nedospasov [72], C. Helfmeier, J.-P. Seifert [73], C. Boit and H.-W. Hübers
Journal of Cryptology, 2017

Having No Mathematical Model May Not Secure PUFs
F. Ganji [74], S. Tajik [75], F. Fäßler and J.-P. Seifert [76]
Journal of Cryptographic Engineering, 2017
Photonic Side Channel Attacks Against RSA
E. Carmon, J.-P. Seifert [77], A. Wool
IEEE HOST, McLean, USA, May 1-4, 2017
Outsmarting Network Security with SDN Teleportation
K. Thimmaraju [78]
, L. Schiff, S. Schmid
IEEE Euro S&P, Paris, France,
April 26-28, 2017
Security Analysis of Encrypted Virtual Machines
F. [79]
Hetzelt [80], R. Buhren [81]
Xi'an, China, April 8-9, 2017
Something From Nothing (There): Collecting Global IPv6 Datasets From DNS
T. Fiebig [82], K. Borgolte, S. Hao, C. Kruegel, G. Vigna
PAM, Sydney, Australia, March 30-31, 2017
Fault Attacks on Encrypted General Purpose Compute Platforms
R. Buhren [83], S. Gueron, J. Nordholz [84], J.-P. Seifert [85], J. Vetter [86]
ACM CODASPY, Scottsdale, USA, March 22-24, 2017

Older Publications

  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009

Nach oben

Postal Address

Technische Universität Berlin - An-Institut Telekom Innovation Laboratories
Fakultät IV
Sekr. TEL16
Ernst-Reuter-Platz 7
10587 Berlin


Claudia Petzsch
+49 - 30 - 8353 58 681
Raum TEL16
E-Mail-Anfrage [87]


  • Security in Telecommunications [88]
------ Links: ------

Zusatzinformationen / Extras


Schnellnavigation zur Seite über Nummerneingabe

Copyright TU Berlin 2008