Security in Telecommunications

Publikationen

2023

X. M. Saß, T. Krachenfels, F. D. Pustelnik, J. Seifert and F. Altmann, "Modulation to the Rescue: Identifying Sub-Circuitry in the Transistor Morass for Targeted Analysis" in Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security, Nov.2023. pp. 113–122.
E. Amini, T. Kiyan, L. Renkes, T. Krachenfels, J. Seifert, C. Boit, S. Tajik, J. Jatzkowski and F. Altmann, "Electrons vs. Photons: Assessment of Circuit's Activity Requirements for E-beam and Optical Probing Attacks" in ISTFA 2023: Conference Proceedings from the 49th International Symposium for Testing and Failure Analysis, Phoenix Arizona, USA, Nov.2023.
N. Pirnay, V. Ulitzsch, F. Wilde, J. Eisert and J. Seifert, "A super-polynomial quantum advantage for combinatorial optimization problems" in GI Quantum Computing Workshop 2023, Sep.2023.
V. Ulitzsch, S. Marzougui, M. Tibouchi, A. Bagia and J. Seifert, "Loop Aborts Strike Back: Defeating Fault Countermeasures in Lattice Signatures with ILP" in Conference on Cryptographic Hardware and Embedded Systems (CHES 2023), Sep.2023.
V. Ulitzsch and J. Seifert, "Breaking the quadratic barrier: Quantum cryptanalysis of Milenage, telecommunications' cryptographic backbone" in 14th International Conference on Post-Quantum Cryptography (PQCrypto 2023), University of Maryland, College Park, MD, USA, Aug.2023.
A. Weber, M. Stöttinger, M. Malenko, A. Puccetti, H. Sankowski, S. Guilley, T. Grawunder, J. Seifert, G. Heiser, R. Rathfelder, C. Lüth, S. Reith and N. Herfurth, "Verified Value Chains, Innovation and Competition" in 2023 IEEE International Conference on Cyber Security and Resilience, Jul.2023.
H. Jacob, C. Werling, R. Buhren and J. Seifert, "faulTPM: Exposing AMD fTPMs' Deepest Secrets" , 7th IEEE European Symposium on Security and Privacy (EuroS\&P 2023), Jul. 2023.
O. Sayari, S. Marzougui, T. Aulbach, J. Krämer and J. Seifert, HaMAYO: A Reconfigurable Hardware Implementation of the Post-Quantum Signature Scheme MAYO, Jul. 2023.
S. Parvin, M. Goli, T. Krachenfels, S. Tajik, J. Seifert, F. S. Torres and R. Drechsler, "LAT-UP: Exposing Layout-Level Analog Hardware Trojans Using Contactless Optical Probing" in IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2023), Jun.2023.
T. Krachenfels, J. Seifert and S. Tajik, "Trojan awakener: detecting dormant malicious hardware using laser logic state imaging (extended version)" , Journal of Cryptographic Engineering, Mai 2023.
V. Ulitzsch, D. Scholz and D. Maier, "ASanity: On Bug Shadowing by Early ASan Exits" in 17th IEEE Workshop on Offensive Technologies (WOOT '23), Mai2023.
M. Hinsche, M. Ioannou, A. Nietner, J. Haferkamp, Y. Quek, D. Hangleiter, J. Seifert, J. Eisert and R. Sweke, "A single T-gate makes distribution learning hard" , Physical Review Letters, Mai 2023.
S. Marzougui, I. Kabin, J. Krämer, T. Aulbach and J. Seifert, "On the Feasibility of Single-Trace Attacks on the Gaussian Sampler using a CDT" in Constructive Side-Channel Analysis and Secure Design (COSADE 2023), Apr.2023.
T. Krachenfels, G. Galderisi, T. Mikolajick, J. Trommer and J. Seifert, "Practical Considerations for Optical Side-Channel Analysis: A Case Study on Reconfigurable FETs" in Workshop on Nano Security: From Nano-Electronics to Secure Systems (NanoSec'23), Apr.2023.
N. Pirnay, R. Sweke, J. Eisert and J. Seifert, "Superpolynomial quantum-classical separation for density modeling" , Physical Review A, vol. 107, no. 4, pp. 042416, Apr. 2023. American Physical Society.
J. Conrad, J. Eisert and J. Seifert, "Good Gottesman-Kitaev-Prekill Codes from the NTRU Cryptosystem" , Bulletin of the American Physical Society, Mä. 2023. APS.
R. Sweke, J. Eisert, Y. Quek, M. Hinsche, A. Nietner, M. Ioannou, J. Seifert, J. Haferkamp and D. Hangleiter, "Potential and limitations of probabilistic modelling with quantum circuits" , Bulletin of the American Physical Society, Mä. 2023. APS.

2022

N. Kühnapfel, R. Buhren, H. N. Jacob, T. Krachenfels, C. Werling and J. Seifert, "EM-Fault It Yourself: Building a Replicable EMFI Setup for Desktop and Server Hardware" in 2022 IEEE Physical Assurance and Inspection of Electronics (PAINE), Okt.2022. pp. 1–7.
N. Pirnay, R. Sweke, J. Eisert and J. Seifert, A super-polynomial quantum-classical separation for density modelling, Okt. 2022.
S. Marzougui, N. Wisiol, P. Gersch, J. Krämer and J. Seifert, "Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS" in Proceedings of the 17th International Conference on Availability, Reliability and Security, New York, NY, USA: Association for Computing Machinery, Aug.2022. pp. 1–11.
M. Hinsche, M. Ioannou, A. Nietner, J. Haferkamp, Y. Quek, D. Hangleiter, J. Seifert, J. Eisert and R. Sweke, A single T-gate makes distribution learning hard, Jul. 2022.
C. Boit, J. Jatzkowski, F. Altmann, M. DiBattista, S. Silverman, G. Zwicker, N. Herfurth, E. Amini and J. -. Seifert, "The IC Ultra-Thin Back Surface - A Field of Real Nanoscale Fault Isolation Opportunities Requiring a Skillful Sample Preparation" in 2022 IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA), Jul.2022. pp. 1–6.
N. Herfurth, E. Amini, M. Lisker, J. Seifert and C. Boit, "A scalable & comprehensive resilience concept against optical & physical IC backside attacks" in 2022 IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA), Jul.2022. pp. 1–6.
N. Wisiol, "Towards Attack Resilient Delay-Based Strong PUFs" in 2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), Jun.2022. pp. 5–8.
N. Pirnay, A. Pappa and J. Seifert, "Learning classical readout quantum PUFs based on single-qubit gates" , Quantum Machine Intelligence, vol. 4, no. 2, pp. 14, Jun. 2022.
A. Aghaie, A. Moradi, J. Tobisch and N. Wisiol, "Security Analysis of Delay-Based Strong PUFs with Multiple Delay Lines" in 2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), Jun.2022. pp. 125–128.
V. Q. Ulitzsch, S. Park, S. Marzougui and J. Seifert, "A Post-Quantum Secure Subscription Concealed Identifier for 6G" in Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, New York, NY, USA: Association for Computing Machinery, Mai2022. pp. 157–168.
J. Fietkau, S. M. Zahra and M. Hartung, "Secure Authentication for Everyone! Enabling 2nd-Factor Authentication Under Real-World Constraints" in Security in Computer and Information Sciences, Cham: Springer International Publishing, 2022. pp. 89–101.
D. Maier, F. Fäßler and J. Seifert, "Uncovering Smart Contract VM Bugs Via Differential Fuzzing" in Reversing and Offensive-oriented Trends Symposium, New York, NY, USA: Association for Computing Machinery, Jan.2022. pp. 11–22.
S. Parvin, T. Krachenfels, S. Tajik, J. Seifert, F. S. Torres and R. Drechsler, "Toward Optical Probing Resistant Circuits: A Comparison of Logic Styles and Circuit Design Techniques" in 2022 27th Asia and South Pacific Design Automation Conference (ASP-DAC), Jan.2022. pp. 429–435.
N. Wisiol, B. Thapaliya, K. T. Mursi, J. Seifert and Y. Zhuang, "Neural Network Modeling Attacks on Arbiter-PUF-Based Designs" , IEEE Transactions on Information Forensics and Security, vol. 17, pp. 2719–2731, 2022.
A. Fioraldi, A. Mantovani, D. Maier and D. Balzarotti, "Registered report: Dissecting american fuzzy lop-a fuzzbench evaluation" in FUZZING 2022, 1st International Fuzzing Workshop, 24 April 2022, San Diego, CA, USA/Co-located with NDSS 2022, 2022.
S. Marzougui, V. Ulitzsch, M. Tibouchi and J. Seifert, Profiling Side-Channel Attacks on Dilithium: A Small Bit-Fiddling Leak Breaks It All, 2022.
S. Neef and N. Wisiol, "Oh SSH-it, What’s My Fingerprint? A Large-Scale Analysis of SSH Host Key Fingerprint Verification Records in the DNS" in Cryptology and Network Security, Cham: Springer International Publishing, 2022. pp. 71–88.
D. Maier, O. Bittner, M. Munier and J. Beier, "FitM: Binary-only coverage-guided fuzzing for stateful network protocols" in Workshop on binary analysis research (BAR), 2022.
G. Hernandez, M. Muench, D. Maier, A. Milburn, S. Park, T. Scharnowski, T. Tucker, P. Traynor and K. Butler, "FirmWire: Transparent Dynamic Analysis for Cellular Baseband Firmware" in Proceedings 2022 Network and Distributed System Security Symposium, San Diego, CA, USA: Internet Society, 2022.
N. Wisiol, P. Gersch and J. Seifert, Cycle-Accurate Power Side-Channel Analysis Using the ChipWhisperer: a Case Study on Gaussian Sampling, 2022.
V. Ulitzsch and J. Seifert, Breaking the quadratic barrier: Quantum cryptanalysis of Milenage, telecommunications’ cryptographic backbone, 2022.
K. Haßler and D. Maier, "WAFL: Binary-Only WebAssembly Fuzzing with Fast Snapshots" in Reversing and Offensive-oriented Trends Symposium, New York, NY, USA: Association for Computing Machinery, Jan.2022. pp. 23–30.

2021

F. Hetzelt, M. Radev, R. Buhren, M. Morbitzer and J. Seifert, "VIA: Analyzing Device Interfaces of Protected Virtual Machines" in Annual Computer Security Applications Conference, New York, NY, USA: Association for Computing Machinery, Dez.2021. pp. 273–284.
R. Buhren, H. Jacob, T. Krachenfels and J. Seifert, "One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization" in Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA: Association for Computing Machinery, Nov.2021. pp. 2875–2889.
T. Krachenfels, J. Seifert and S. Tajik, "Trojan Awakener: Detecting Dormant Malicious Hardware Using Laser Logic State Imaging" in Proceedings of the 5th Workshop on Attacks and Solutions in Hardware Security, New York, NY, USA: Association for Computing Machinery, Nov.2021. pp. 17–27.
T. Lausen, B. Jusko, T. Kiyan, S. Keil and R. Thewes, "On the Design of Pseudo Resistors in Biomedical CMOS Circuits" in MikroSystemTechnik Congress 2021; Congress, Nov.2021. pp. 1–2.
E. Heftrig, J. Seifert, H. Shulman, M. Waidner and N. Wisiol, "Predictive Cipher-Suite Negotiation for Boosting Deployment of New Ciphers" in Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event Republic of Korea: ACM, Nov.2021. pp. 2423–2425.
J. Fietkau, K. Thimmaraju, F. Kybranz, S. Neef and J. Seifert, "The Elephant in the Background: A Quantitative Approachto Empower Users Against Web Browser Fingerprinting" in Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, New York, NY, USA: Association for Computing Machinery, Nov.2021. pp. 167–180.
M. Hinsche, M. Ioannou, A. Nietner, J. Haferkamp, Y. Quek, D. Hangleiter, J. Seifert, J. Eisert and R. Sweke, Learnability of the Output Distributions of Local Quantum Circuits, Okt. 2021.
D. Maier and F. Toepfer, "BSOD: Binary-only Scalable Fuzzing Of Device Drivers" in Proceedings of the 24th International Symposium on Research in Attacks, Intrusions and Defenses, New York, NY, USA: Association for Computing Machinery, Okt.2021. pp. 48–61.
O. Bittner, T. Krachenfels, A. Galauner and J. Seifert, "The Forgotten Threat of Voltage Glitching: A Case Study on Nvidia Tegra X2 SoCs" in 2021 Workshop on Fault Detection and Tolerance in Cryptography (FDTC), Sep.2021. pp. 86–97.
T. Kiyan, T. Krachenfels, E. Amini, Z. Shakibaei, C. Boit and J. Seifert, "Extraction of Secrets from Allegedly Secret-free IoT Sensors Using Artificial Intelligence" in 2021 IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA), Sep.2021. pp. 1–6.
T. Krachenfels, F. Ganji, A. Moradi, S. Tajik and J. Seifert, "Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model" in 2021 IEEE Symposium on Security and Privacy (SP), Mai2021. pp. 1955–1971.
E. Amini, K. Bartels, C. Boit, M. Eggert, N. Herfurth, T. Kiyan, T. Krachenfels, J. Seifert and S. Tajik, "Special Session: Physical Attacks through the Chip Backside: Threats, Challenges, and Opportunities" in 2021 IEEE 39th VLSI Test Symposium (VTS), Apr.2021. pp. 1–12.
R. Sweke, J. Seifert, D. Hangleiter and J. Eisert, "On the Quantum versus Classical Learnability of Discrete Distributions" , Quantum, vol. 5, pp. 417, Mä. 2021. Verein zur Förderung des Open Access Publizierens in den Quantenwissenschaften.
S. M. Sohi, J. Seifert and F. Ganji, "RNNIDS: Enhancing Network Intrusion Detection Systems through Deep Learning" , Computers & Security, vol. 102, pp. 102151, Mä. 2021.
I. Polian, F. Altmann, T. Arul, C. Boit, R. Brederlow, L. Davi, R. Drechsler, N. Du, T. Eisenbarth, T. Güneysu, S. Hermann, M. Hiller, R. Leupers, F. Merchant, T. Mussenbrock, S. Katzenbeisser, A. Kumar, W. Kunz, T. Mikolajick, V. Pachauri, J. Seifert, F. S. Torres and J. Trommer, "Nano Security: From Nano-Electronics to Secure Systems" in 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), Feb.2021. pp. 1334–1339.
N. Wisiol, Towards Attack Resilient Arbiter PUF-Based Strong PUFs, 2021.
T. Krachenfels, T. Kiyan, S. Tajik and J. Seifert, "Automatic Extraction of Secrets from the Transistor Jungle Using Laser-Assisted Side-Channel Attacks" in Proceedings of the 30th USENIX Security Symposium, 2021.
N. Wisiol, B. Thapaliya, K. T. Mursi, J. Seifert and Y. Zhuang, Neural-Network-Based Modeling Attacks on XOR Arbiter PUFs Revisited, 2021.
D. Maier and L. Seidel, "Jmpscare: Introspection for Binary-Only Fuzzing" in Workshop on Binary Analysis Research (BAR), 2021. pp. 21.
J. Fietkau, D. P. Runge and J. Seifert, "Free by Design: On the Feasibility of Free-Riding Attacks Against Zero-Rated Services" in Cryptology and Network Security, Cham: Springer International Publishing, 2021. pp. 315–333.
S. Marzougui and J. Seifert, "XMSS-based Chain of Trust" in Proceedings of 10th International Workshop on Security Proofs for Embedded Systems, 2021. pp. 66–48.

2020

R. Sweke, J.-P. Seifert, D. Hangleiter, J. Eisert, "On the Quantum vs Classical Learnability of Discrete Distributions", To appear in Quantum Techniques in Machine Learning (QTML) 2020
E. Amini, T. Kiyan, N. Herfurth, A. Beyreuther, C. Boit, J.-P. Seifert, "Second generation of optical IC-backside protection structure", In the IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA 2020)
A. Beyreuther, N. Herfurth, E. Amini, T. Nakamura, B. Motamedi, C. Boit, "Comprehensive parametric investigations of EOFM measurements on single FinFET transistors", In the IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA 2020)
C. Boit, T. Kiyan, T. Krachenfels, J.-P. Seifert, "Logic State Imaging From FA Techniques for Special Applications to One of the Most Powerful Hardware Security Side-Channel Threats", Invited paper in the IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA 2020)
T. Krachenfels, F. Ganji, A. Moradi, S. Tajik, J.-P. Seifert, "Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model", In arXiv:2009.04263
R. Sweke, J.-P. Seifert, D. Hangleiter, J. Eisert, "On the Quantum versus Classical Learnability of Discrete Distributions", In arXiv:2007.14451
F. Franzen, D. Maier, M. Wagner, "Mehr schlecht als Recht: Grauzone Sicherheitsforschung", In Datenschutz und Datensicherheit - DuD
A. Fioraldi, D. Maier, H. Eißfeldt, M. Heuse, "AFL ++ : Combining Incremental Steps of Fuzzing Research", In WOOT '20
D. Song, F. Hetzelt, J. Kim, B. Byunghoon Kang, J. Seifert, M. Franz, "Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints", In USENIX Security '20, August 12-14 Boston USA
D. Maier, H. Erb, P. Mullan, V. Haupert, "Camera Fingerprinting Authentication Revisited", In RAID 2020
D. Maier, L. Seidel, S. Park, "BaseSAFE: Baseband SAnitized Fuzzing through Emulation", In WiSec '20
E. Amini, T. Kiyan, C. Boit, J.-P. Seifert, "Second generation of optical IC-backside protection structure", In IPFA 2020
F. Ganji, S. Tajik, P. Stauss, J.-P. Seifert, D. Forte, M. Tehranipoor, "Rock'n'roll PUFs: Crafting Provably Secure PUFs from Less Secure Ones", In Journal of Cryptographic Engineering
N. Wisiol, C. Mühl, N. Pirnay, P. H. Nguyen, M. Margraf, J.-P. Seifert, M. van Dijk, U. Rührmair, "Splitting the Interpose PUF: A Novel Modeling Attack Strategy", In TCHES 2020, Issue 3, Beijing, China, September 2020
A. Weber, G. Heiser, D. Kuhlmann, M. Schallbruch, A. Chattopadhyay, S. Guilley, M. Kasper, C. Krauß, P. S. Krüger, S. Reith, and J.-P. Seifert, "Secure IT without Vulnerabilities and Backdoors", In TATuP - Zeitschrift für Technikfolgenabschätzung in Theorie Und Praxis 29, 2020
N. Wisiol, N. Pirnay, "XOR Arbiter PUFs have Systematic Response Bias", In Financial Cryptography 2020, Kota Kinabalu, Sabah, Malaysia, February 2020
F. Ganji, S. Amir, S. Tajik, D. Forte, J.-P. Seifert, "Machine Learning Based Adversary Modeling for Composed Hardware", In Design, Automation and Test (DATE), Grenoble, France, April 2020
D. Peters, A. Yurchenko, W. Melo, K. Shirono, T. Usuda, J.P. Seifert, F. Thiel, "IT Security for Measuring Instruments: Confidential Checking of Software Functionality", In Future of Information and Communications Conference (FICC), San Francisco, California, USA, March 2020

2019

N Wisiol, C. Mühl, N. Pirnay, P. H. Nguyen, M. Margraf, J.-P. Seifert, M. van Dijk, U. Rührmair, "Splitting the Interpose PUF: A Novel Modeling Attack Strategy", In Cryptology ePrint Archive, Report 2019/1473, December 2019
T. Krachenfels, H. Lohrke, J.-P. Seifert, E. Dietz, S.Frohmann, H.-W. Hübers, "Evaluation of Low-Cost Thermal Laser Stimulation for Data Extraction and Key Readout", In Journal of Hardware and Systems Security, November, 2019
N. Herfurth, E. Amini, A. Beyreuther, T. Nakamura, S. Keil, C. Boit, "EOFM for contactless parameter extraction of low k dielectric MIS structures", In International Symposium on the Physical and Failure Analysis of Integrated Circuits, IPFA 2019
A. Beyreuther, N. Herfurth, E. Amini, T. Nakamura, G. G. Fischer, S. Keil, C. Boit, "EOFM measurements of lateral and vertical Bipolar Transistors in Silicon and SiGe:C Technologies", In International Symposium on the Physical and Failure Analysis of Integrated Circuits, IPFA 2019
N. Herfurth, A. Beyreuther, E. Amini, C. Boit, M. Simon-Najasek, S. Hübner, F. Altmann, R. Herfurth, C. Wu, I. De Wolf, K. Croes, "New Access to Soft Breakdown Parameters of Low-k Dielectrics Through Localisation-Based Analysis", In IEEE International Reliability Physics Symposium (IRPS), Monterey, CA, USA, 2019
N. Wisiol, G.T. Becker, M. Margarf, T. Soroceanu, J. Tobisch, B. Zengin, "Breaking the Lightweight Secure PUF: Understanding the Relation of Input Transformation and Machine Learning Resistance", In Smart Card Research and Advanced Application Conference (CARDIS) 2019, Prague, Czech Republic, November 2019
E. Amini, N. Herfurth, A. Beyreuther, J. P. Seifert, C. Boit, "Generation and Tracking of Optical Signals inside the IC to Improve Device Security and Failure Analysis", In IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA), July 2019
F. Ganji, J.P. Seifert, D. Forte, "PUFmeter: A Property Testing Tool for Assessing the Robustness of Physically Unclonable Functions to Machine Learning Attacks", In IEEE Access, 2019
R. Buhren, C. Werling, J.P. Seifert, "Insecure Until Proven Updated: Analyzing AMD SEV’s Remote Attestation", In ACM Computer Communications Security (CCS), London, UK, November, 2019
S. Park, A. Shaik, R. Borgaonkar, J. P. Seifert, "Anatomy of Commercial IMSI Catchers and Detectors", In Workshop on Privacy in the Electronic Society (WPES), London, UK, November, 2019
F. Ganji, S. Tajik, P. Stauss, J.P. Seifert, D. Forte, M. Tehranipoor, "Rock’n’roll PUFs: Crafting Provably Secure PUFs from Less Secure Ones", In Security Proofs for Embedded Systems (PROOFS), Atlanta, Georgia, USA, August 2019
D. Maier, B. Radtke, B. Harren, "Unicorefuzz: On the Viability of Emulation for Kernelspace Fuzzing", In USENIX Workshop on Offensive Technologies (Woot), Santa Clara, California, USA, August 2019
K. Thimmaraju, L. Schiff, S. Schmid, "Preacher: Network Policy Checker for Adversarial Environments", In International Symposium on Reliable Distributed Systems (SRDS), Lyon, France, October 2019
A. Shaik, R. Borgaonkar, "New Vulnerabilities in 5G Networks", Black Hat USA, Las Vegas, Nevada, USA, August 2019
D. Song, F. Hetzelt, D. Das, C. Spensky, Y Na, S. Volckaert, G. Vigna, C. Kruegel, J.P. Seifert, M. Franz, "PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary", Black Hat USA, Las Vegas, Nevada, USA, August 2019
T. Krachenfels, H. Lohrke, J.P. Seifert, E. Dietz, S. Frohmann, H.-W. Hübers, "Evaluation of Low-Cost Thermal Laser Stimulation for Data Extraction and Key Readout", International Conference on Physical Assurance and Inspection of Electronics (PAINE), Crystal City, Washington D.C., USA, July 2019
K. Thimmaraju, S. Hermak, G. Rétvári, S. Schmid, "MTS: Bringing Multi-Tenancy to Virtual Networking", USENIX Annual Technical Conference (ATC), Renton, Washington, USA, July 2019
E. Zielinski, J. Schulz-Zander, H. Ruckstuhl, A. Artemenko, A. Ramirez, F. Zeiger, M. Mormul, F. Hetzelt, F. Beierle, H. Klaus, M. Zimmermann, C. Schellenberger, "Secure Real-time Communication and Computing Infrastructure for Industry 4.0 – Challenges and Opportunities", AIComNets, München, Germany, March 2019
E. Amini, C. Boit, B. Szyszka, J.P. Seifert, "Application of thin films in IC security", Spring Meeting of the European Materials Research Society, Nice, France, May, 2019
H. Klaus, F. Hetzelt, P. Hofmann, A. Blecker, D. Schwaiger, "Challenges and Solutions for Industry-Grade Secure Connectivity", AIComNets, München, Germany, March 2019
A. Shaik, R. Borgaonkar, S. Park, J.P Seifert, "New vulnerabilities in 4G and 5G cellular access network protocols: exposing device capabilities", To appear in ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Miami, Florida, USA, 2019
D. Song, F. Hetzelt, D. Das, C. Spensky, Y Na, S. Volckaert, G. Vigna, C. Kruegel, J.P. Seifert, M. Franz, "PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary", NDSS, San Diego, California, USA, February, 2019

2018

A. Weber, S. Guilley, M. Kasper, C. Krauß, P. S. Krüger, D. Kuhlmann, S. Reith, J.P. Seifert, "IT-Sicherheit gründlich lösbar?", Zukunftsmotor Metropolregion, Rhein-Neckar, Germany, 2018
A. Beyreuther, N. Herfurth, E. Amini, T. Nakamura, I. De Wolf, C. Boit, "Photon Emission as a Characterization Tool for Bipolar Parasitics in FinFET Technology", Microelectronics Reliability, Elsevier, 2018
C. Helfmeier, C. Boit, D. Nedospasov and J.P. Seifert, "Cloning Physically Unclonable Functions", Top Picks in Hardware Security, International Conference On Computer Aided Design (ICCAD), San Diego, California, USA, 2018
E. Amini, A. Beyreuther, N. Herfurth, A. Steigert, B. Szyszka, C. Boit, "Assessment of a Chip Backside Protection", Journal of Hardware and System Security, 2018
E. Amini, A. Beyreuther, N. Herfurth, A. Steigert, R. Muydinov, B. Szyszka, C. Boit, "IC security and quality improvement by protection of chip backside against hardware attacks", Microelectronics Reliability, 2018
T. Kiyan, H. Lohrke, and C. Boit, "Comparative Assessment of Optical Techniques for Semi-Invasive SRAM Data Read-Out on an MSP430 Microcontroller", Int. Symp. for Testing and Failure Analysis (ISTFA). Phoenix, Arizon, USA, 2018
R. Buhren, F. Hetzelt and N. Pirnay, "On the Detectability of Control Flow Using Memory Access Patterns", ACM CCS Workshop on System Software for Trusted Execution (SysTEX), Toronto, Cananda, 2018
N. Wisiol, M. Margraf, "Attacking RO-PUFs with Enhanced Challenge-Response Pairs", IFIP International Conference on Security, Privacy, and Trust, Poznań, Poland, 2018
A. Oppermann, M. Esche, F. Thiel, J.P. Seifert, "Secure Cloud Computing: Risk Analysis for Secure Cloud Reference Architecture in Legal Metrology", IFIP International Conference on Security, Privacy, and Trust, Poznań, Poland, 2018
J. Fietkau, J. Krissler, J.P. Seifert, "Swipe your Fingerprints! How Biometric Authentication Simplifies Payment, Access and Identity Fraud", USENIX WOOT, Baltimore, Maryland, USA, 2018
H. Lohrke, S. Tajik, T. Krachenfels, C. Boit, J.P. Seifert, "Key Extraction using Thermal Laser Stimulation: A Case Study on Xilinx Ultrascale FPGAs", TCHES, Amsterdam, Netherlands, 2018
B. Shastry, D. Maier, V. Ultzsch, "Follow the White Rabbit: Simplifying Fuzz Testing Using FuzzExMachina", Black Hat USA, Las Vegas, Nevada, USA, 2018
A. Weber, S. Reith, D. Kuhlmann, M. Kasper, J.P. Seifert, C. Krauß, "Open Source Value Chains for Addressing Security Issues Efficiently", IEEE Workshop on Cyber Resilience Technologies , Their Benefits and Measurements (CRE), Lisbon, Portugal, 2018
A. Shaik, R. Bargaonkar, S. Park, J.P. Seifert, "On the Impact of Rogue Base Stations in 4G/LTE Self Organizing Network", ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Stockholm, Sweden, 2018
K. Thimmaraju, G. Rétvári, S. Schmid, "Virtual Network Isolation: Are We There Yet?", ACM SIGCOMM 2018 Workshop on Security in Softwarized Networks (SecSoN), Budapest, Hungary, 2018
V. Haupert, D. Maier, N. Schneider, J. Kirsch, T. Müller, "Honey, I Shrunk Your App Security: The State of Android App Hardening", Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Paris-Saclay, France, 2018
F. Ganji, "On the Learnability of Physically Unclonable Functions", Springer, T-Labs Series in Telecommunication Services, ISBN 978-3-319-76717-8, 2018
S. Tajik, "On the Phyiscal Security of Physically Unclonable Functions", Springer, T-Labs Series in Telecommunication Services, ISBN 978-3-319-75820-6, 2018
R. Krösche, K. Thimmaraju, L. Schiff, S. Schmid, "I DPID It My Way!: A Covert Timing Channel in Software-Defined Networks", IFIP Networking, Zürich, Switzerland, 2018
B. Hong, S. Park, H. Kim, D. Kim, H. Hong, H. Choi, J.-P. Seifert, S.-J. Lee, Y. Kim, "Peeking over the Cellular Walled Gardens - A Method for Closed Network Diagnosis", IEEE Transactions on Mobile Computing, 2018
K. Thimmaraju, B. Shastry, T. Fiebig, F. Hetzelt, J.-P. Seifert, A. Feldmann, S. Schmid, "Taking Control of SDN-based Cloud Systems via the Data Plane (Best Paper Award!)", ACM Symposium on SDN Research (SOSR 2018), Los Angeles, USA, 2018
D. Peters, J. Wetzlich, F. Thiel, J.-P. Seifert, "Blockchain Applications for Legal Metrology", International Instrumentation and Measurement Technology Conference (I²MTC 2018), Houston, USA, 2018
F. Ganji, S. Tajik and J.-P. Seifert, "A Fourier Analysis Based Attack against Physically Unclonable Functions", Financial Cryptography and Data Security 2018 (FC'18), Curaçao, 2018

2017

A. Oppermann, F. Grasso Toro, A. Yurchenko J.-P. Seifert, "Secure Cloud Computing: Communication Protocol for Multithreaded Fully Homomorphic Encryption for Remote Data Processing", IEEE ISPA 2017, Guangzhou, China, 2017
B. Shastry, M. Leutner, T. Fiebig, K. Thimmaraju, F. Yamaguchi, K. Rieck, S. Schmid, J.-P. Seifert, A. Feldmann, "Static Analysis as a Fuzzing Aid", RAID'17, Atlanta, USA, 2017
V. Haupert, D. Maier, and T. Müller, "Paying the Price for Disruption: How a FinTech Allowed Account Takeover", ROOTS 2017, Vienna, Austria, 2017
K. Thimmaraju, B. Shastry, T. Fiebig, F. Hetzelt, J.-P. Seifert, A. Feldmann, S. Schmid, "The vAMP Attack: Taking Control of Cloud Systems via the Unified Packet Parser", ACM CCSW 2017, Dallas, USA, 2017
A. Oppermann, A. Yurchenko, M. Esche and J.-P. Seifert, "Secure Cloud Computing: Multithreaded Fully Homomorphic Encryption for Legal Metrology", ISDDC 2017, Vancouver, Canada, 2017
S. Tajik , H. lohrke, J.-P. Seifert, C. Boit, "On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs", ACM CCS 2017, Dallas, USA, 2017
S. Park, A. Shaik, R. Borgaonkar, A. Martin, J.-P. Seifert, "White-Stingray: Evaluating IMSI Catchers Detection Applications", WOOT '17, Vancouver, Canada, 2017
B. Shastry, F. Maggi, F. Yamaguchi, K. Rieck, J.-P. Seifert, "Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing", WOOT '17, Vancouver, Canada, 2017
T. Unruh, B. Shastry, M. Skoruppa, F. Maggi, K. Rieck, J.-P. Seifert, F. Yamaguchi, "Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery", WOOT '17, Vancouver, Canada, 2017
H. Lohrke, H. Zöllner, P. Scholz, S. Tajik, C. Boit, J.-P. Seifert, "Visible Light Techniques in the FinFET Era: Challenges, Threats and Opportunities", IPFA, Chengdu, China, 2017
R. Borgaonkar, S. Park, L. Hirschi, A. Shaik, Andrew Martin, J.-P. Seifert, "New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor", Black Hat, Las Vegas, USA, 2017
R. Borgaonkar, S. Park, L. Hirschi, A. Shaik, Andrew Martin, J.-P. Seifert, "New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor", Black Hat, Las Vegas, USA, 2017
S. Tajik , J. Fietkau, H. lohrke, J.-P. Seifert, C. Boit, "PUFMon: Security Monitoring of FPGAs using Physically Unclonable Functions", IEEE IOLTS, Thessaloniki, Greece, 2017
S. Tajik, E. Dietz, S. Frohmann, H. Dittrich, D. Nedospasov, C. Helfmeier, J.-P. Seifert, C. Boit and H.-W. Hübers, "Photonic Side-Channel Analysis of Arbiter PUFs", Journal of Cryptology, 2017
F. Ganji, S. Tajik, F. Fäßler and J.-P. Seifert, "Having No Mathematical Model May Not Secure PUFs", Journal of Cryptographic Engineering, 2017
E. Carmon, J.-P. Seifert, A. Wool, "Photonic Side Channel Attacks Against RSA", IEEE HOST, McLean, USA, May 1-4, 2017
K. Thimmaraju, L. Schiff, S. Schmid, "Outsmarting Network Security with SDN Teleportation", IEEE Euro S&P, Paris, France, April 26-28, 2017
F. Hetzelt, R. Buhren, "Security Analysis of Encrypted Virtual Machines", ACM VEE, Xi'an, China, April 8-9, 2017
T. Fiebig, K. Borgolte, S. Hao, C. Kruegel, G. Vigna, "Something From Nothing (There): Collecting Global IPv6 Datasets From DNS", PAM, Sydney, Australia, March 30-31, 2017
R. Buhren, S. Gueron, J. Nordholz, J.-P. Seifert, J. Vetter, "Fault Attacks on Encrypted General Purpose Compute Platforms", ACM CODASPY, Scottsdale, USA, March 22-24, 2017

2016

O. Keren, I. Polian, M. M. Tehranipoor, "Hardware Security (Dagstuhl Seminar 16202)", Dagstuhl Reports, Vol. 6, Issue 5, 2016, (Editor: F. Ganji)
R. Buhren, J. Vetter, J. Nordholz, "The threat of virtualization: Hypervisor-based rootkits on the ARM architecture", accepted for ICICS, Singapore, November 29, 2016
H. Lohrke, S. Tajik, P. Scholz, J.-P. Seifert, C. Boit, "Automated Detection of Fault Sensitive Locations for Reconfiguration Attacks on Programmable Logic", accepted for ISTFA, Forth Worth, Texas, USA, November 8, 2016
A. Mikityuk, O. Friedrich, P. Pogrzeba, C. Meerveld, M. Nemani, H. Yun, R. Mizrahi, "Cloud Browser Business Opportunities (Version 1.0)", GSMA Position Paper, 3 November, 2016
S. Park‚ A. Shaik‚ R. Borgaonkar, J.-P. Seifert, "White Rabbit in Mobile: Effect of Unsecured Clock Source in Smartphones", accepted for CCS SPSM, Vienna, Austria, October 24-28, 2016
M. Piekarska, S. Park, A. Shaik, "Back to the Future: Evaluation Model for Wearables Based On the Past Experience", accepted for INNOV2016, Rome, Italy, August 21-25, 2016
M. Piekarska, "Hide, Don't Seek: on User-Centric Location Accuracy", accepted for INNOV2016, Rome, Italy, August 21-25, 2016
H. Lohrke, S. Tajik, C. Boit and J.-P. Seifert, "No Place to Hide: Contactless Probing of Secret Data on FPGAs", accepted for CHES, Santa Barbara, USA, 17-19 August, 2016
F. Ganji, S. Tajik, F. Fäßler and J.-P. Seifert, "Strong Machine Learning Attack against PUFs with No Mathematical Model", accepted for CHES, Santa Barbara, USA, 17-19 August, 2016
C. Boit, S. Tajik, P. Scholz, E. Amini, A. Beyreuther, H. Lohrke, J.P. Seifert, "From IC Debug to Hardware Security Risk: The Power of Backside Access and Optical Interaction", invited paper for IEEE IPFA, Marina Bay Sands, Singapore, 18-21 July, 2016
B.Shastry, F.Yamaguchi, K.Rieck, J.-P.Seifert, "Towards Vulnerability Discovery Using Staged Program Analysis", accepted for DIMVA, Donostia-San Sebastián, Spain, 7-8 July, 2016
A. Feldmann, P. Heyder, M. Kreutzer, S. Schmid, J.-P. Seifert, H. Shulman, J. Sieberg, K. Thimmaraju, M. Waidner, "NetCo: Reliable Routing With Unreliable Routers", accepted for DISN, Toulouse, France, 28 June, 2016
L. Schiff, K. Thimmaraju, S. Schmid, "Routing-Verification-as-a-Service (RVaaS): Trustworthy Routing Despite Insecure Providers", accepted for DISN, Toulouse, France, 28 June, 2016
A. Oppermann, J.-P. Seifert, F. Thiel, "Poster: Secure Cloud Reference Architectures for Measuring Instruments under Legal Control", accepted for CLOSER, Rome, Italy, 23-25 April, 2016
Á. Kiss, J. Krämer, P. Rauzy and J.-P. Seifert, "Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT", accepted for COSADE, Graz, Austria, 14-15 April, 2016
E. Carmon, J.-P. Seifert, A. Wool, "Simple Photonic Emission Attack with Reduced Data Complexity", accepted for COSADE, Graz, Austria, 14-15 April, 2016
F. Ganji, S. Tajik and J.-P. Seifert, "PAC Learning of Arbiter PUFs (Extended Version)", Journal of Cryptographic Engineering, 2016
M. Piekarska, "Can I Let You In? On Event-Centric Context-Aware Authorization", accepted for ICONS, Lisbon, Portugal, 21-25, February, 2016
A. Shaik, R. Borgaonkar, N. Asokan, V. Niemi, J.-P. Seifert, "Practical attacks against privacy and availability in 4G/LTE mobile communication systems", accepted for NDSS, San Diego, California, USA, 21-24 February, 2016

2015

E. Carmon, J.-P. Seifert, A. Wool, " Simple Photonic Emission Attack with Reduced Data Complexity", Cryptology ePrint Archive, Report 2015/1206
A. Mikityuk, M. Platschek, O. Friedrich, „On Virtualization of Red-button Signaling in Hybrid TV“, IEEE ISM2015, Miami, USA, December 14-16, 2015
D. Livshits, A. Mikityuk, S. Pham, A. Shabtai, „Towards Security of Native DRM Execution in HTML5“, IEEE ISM2015, Miami, USA, December 14-16, 2015
F. Ganji, S. Tajik, J.-P. Seifert, "Let Me Prove it to You: RO PUFs are Provably Learnable", ICISC 2015, Seoul, Korea, November 25-27, 2015
J. Vetter, M. Petschik-Junker, J. Nordholz, M. Peter; J. Danisevskis, "Uncloaking rootkits on mobile devices with a hypervisor-based detector", ICISC 2015, Seoul, Korea, November 25-27, 2015
J. Krämer, "Why Cryptography Should Not Rely on Physical Attack Complexity", Springer, T-Labs Series in Telecommunication Services, ISBN: 978-981-287-786-4, 2015
H. Decke and J.-P. Seifert, "Designing and Optimizing a Security Requirements Engineering Methodology with the Security Engineering System Model Core", accepted for escar, Cologne, Germany, November 11-12, 2015
J.-P. Seifert, C. Bayer, "Trojan-Resilient Circuits", Securing Cyber-Physical Systems, CRC Press, ISBN 9781498700986, October 19, 2015
H. Decke, J.-P. Seifert, "Checking and Verifying Security Requirements With the Security Engineering System Model Core", accepted for VEHICULAR, St. Julians, Malta, October 11-16, 2015
A. Mikityuk, S. Pham, S. Kaiser, O. Friedrich, S. Arbanowski, "Content Protection in HTML5 TV Platforms: towards Browser-agnostic DRM and Cloud UI environments", CCS TrustED, Denver, Colorado, USA, October 16, 2015
J. Nordholz, J. Vetter, M. Peter, M.Petschick and J. Danisevskis, "XNPro: Low-Impact Hypervisor-Based Execution Prevention on ARM", accepted for CCS TrustED, Denver, Colorado, USA, October 16, 2015
F. Ganji, J. Krämer, J. -P. Seifert, S. Tajik, "Lattice Basis Reduction Attack against Physically Unclonable Functions", ACM CCS 2015, Denver, Colorado, USA, October 12-16, 2015
M. Peter, M. Petschick, J. Vetter, J. Nordholz, J. Danisevskis, J.-P. Seifert, "Undermining Isolation through Covert Channels in the Fiasco.OC Microkernel", accepted for ISCIS, London, UK, September 21-25, 2015
S. Tajik, H. Lohrke, F. Ganji, J. -P. Seifert, C. Boit, "Laser Fault Attack on Physically Unclonable Functions", FDTC 2015, Saint Malo, France, September 13, 2015
A. Mikityuk, O. Friedrich, R. Skupin, Y. Sánchez, T. Schierl, "Compositing without Transcoding for H.265/HEVC in Cloud IPTV and VoD services", accepted for IEEE ICCE, Berlin, Germany, September 6, 2015
F. Ganji, S. Tajik, J. -P. Seifert, "Why Attackers Win: On the Learnability of XOR Arbiter PUFs", TRUST 2015, Heraklion, Crete, Greece, August 2015
A. Mikityuk, O. Friedrich, R. Nikutta: "HbbTV goes Cloud: Decoupling Application Signaling and Application Execution in Hybrid TV", accepted for ACM TVX Work-in-Progress, Brussels, Belgium, June 3-5, 2015
J. Danisevskis, M. Peter, J. Nordholz, M. Petschick, J. Vetter, "Graphical User Interface for Virtualized Mobile Handsets", accepted for S&P MoST Workshop, San Jose, CA, May 21, 2015
L. Kraus, T. Fiebig, V. Miruchna, S. Möller, A. Shabtai, "Analyzing End-Users’ Knowledge and Feelings Surrounding Smartphone Security and Privacy", accepted for S&P MoST Workshop, San Jose, CA, May 21, 2015
M. Piekarska, Y. Zhou, D. Strohmeier, A. Raake, "Because we care: Privacy Dashboard on Firefox OS", accepted for Web 2.0 Security and Privacy workshop co-located with IEEE Security and Privacy Symposium, San Jose, CA, May 18-21, 2015
D. Peters, F. Thiel, M. Peter, J.-P. Seifert, "A Secure Software Framework for Measuring Instruments in Legal Metrology", accepted for IEEE International Instrumentation and Measurement Technology Conference (I2MTC), Pisa, Italy, May 11-14, 2015
D. Peters, M. Peter, J.-P. Seifert, F. Thiel: "A Secure System Architecture for Measuring Instruments in Legal Metrology", Computers Vol. 4, pages 61-86, March, 2015
P. Stewin, "Detecting Peripheral-based Attacks on the Host Memory", T-Labs Series in Telecommunication Services, Springer International Publishing, Heidelberg, Germany, 2015

2014

M. Peter, M. Petschick, J. Vetter, J. Nordholz, J. Danisevskis, J.-P. Seifert, "Undermining Isolation through Covert Channels in the Fiasco.OC Microkernel", Cryptology ePrint Archive, Report 2014/984
F. Ganji, Ł. Budzisz, F. Debele, N. Li, M. Meo, M. Ricca, Y. Zhang, A. Wolisz, "Greening campus WLANs: energy-relevant usage and mobility patterns", "Computer Networks - Special Issue on Green Communications", Elsevier, November 25, 2014
P. Stewin, "Forschungsbericht: Enhanced BARM - Authentic Reporting to External Platforms", TU Berlin, Berlin, Germany, September, 2014
C. Mulliner, R. Borgaonkar, P. Stewin, J.-P. Seifert, "Forschungsbericht: SMS-based One-Time Passwords: Attacks and Defense", TU Berlin, Berlin, Germany, September, 2014
A. Mikityuk, B. Zachey, O. Friedrich, "Digital Rights Management and its evolution in the context of IPTV platforms in the Web domain", accepted for IEEE ICCCC, Shanghai, China, October 13-15, 2014
F. Ganji, S. Tajik and J.-P. Seifert, "PAC Learning of Arbiter PUFs", PROOFS: Security Proofs for Embedded Systems, Busan, Korea, 27 September, 2014
M. Suraev, "Implementing an affordable and effective GSM IMSI catcher with 3G authentication", accepted for SecureComm: 10th International Conference on Security and Privacy in Communication Networks, Beijing, China, 25 September, 2014
J. Blömer, R. Gomes da Silva, P. Günther, J. Krämer, J.-P. Seifert, "A Practical Second‐Order Fault Attack against a Real‐World Pairing Implementation", accepted for FDTC, Busan, Korea, 23 September, 2014
T. Fiebig, J. Krissler and R. Hänsch, "Security Impact of HighResolution Smartphone Cameras", accepted for WOOT, San Diego, CA, USA, August 18, 2014
S.Tajik, D. Nedospasov, C. Helfmeier, J.-P Seifert, C. Boit,"Emission Analysis of Hardware Implementations", accepted for EUROMICRO DSD, Verona Italy, August 27-29, 2014
C. Horn, L. Hempel, M. Chemnitz, P. Stewin, J. Krüger, "STEUERUNG: Advanced Information Security for Critical Infrastructures", accepted for 9th SECURITY RESEARCH CONFERENCE "Future Security", Berlin, Germany, 16-18 September, 2014
D. Peters, U. Grottker, F. Thiel, M. Peter, J.-P. Seifert, "Achieving Software Security for Measuring Instruments under Legal Control", accepted for EAIS, Warsaw, Poland, 7-10 September, 2014
T. Fiebig, J. Danisevskis and M. Piekarska, "A Metric for the Evaluation and Comparison of Keylogger Performance", accepted for CSET, San Diego, CA, USA, August 18, 2014
S. Tajik, E. Dietz, J.-P. Seifert, D. Nedospasov, S. Frohmann, C. Helfmeier, H. Dittrich, C. Boit, "Physical Characterization of Arbiter PUFs", accepted for CHES, Busan, South Korea, September 23-26, 2014
M. Piekarska, B. Shastry and R. Borgaonkar, "What does the Fox Say? On the Security Architecture of Firefox OS", accepted for ARES 2014
F. Ganji, A. Zubow, L. Budzisz, A. Wolisz, "On detecting WLAN users communication attempts", accepted for 7th IFIP Wireless and Mobile Networking Conference, 2014
M. Roshandel, A. Munjal, P. Moghadam, S. Tajik and H. Ketabdar, "Multi-sensor Finger Ring for Authentication Based on 3D Signatures", accepted for Human-Computer Interaction (HCI) International 2014
A. Mikityuk, "Securing Virtual Service Generation on the Network: Adapting Digital Rights Management to cloud-Delivered Media", CyberSecurity, Stanford, CA, USA, 27-31 May, 2014
A. Cherkaoui, L. Bossuet, L. Seitz, G. Selander and R. Borgaonkar, "New Paradigms for Access Control in Constrained Environnements", ReCoSoC, Montpellier, France, 26 - 28 May, 2014
D. Defreez, B. Shastry, H. Chen and J.-P. Seifert, "A First Look at Firefox OS Security", Mobile Security Technologies (MoST), San Jose, CA, USA, 17 May, 2014
M. Piekarska, "Hide me if you can. Location Blurring on Firefox OS", IEEE S&P Poster Session, San Jose, CA, USA, 18-21 May, 2014
C. Helfmeier, D. Nedospasov, S. Tajik, C. Boit, J.-P. Seifert, "Physical Vulnerabilities of Physically Unclonable Functions", Design, Automation & Test in Eruope (DATE), Dresden, Germany, 24-28 March, 2014
X. Zhang, J.-P. Seifert, O. Aciicmez, "Design and Implementation of Efficient Integrity Protection for Open Mobile Platforms", IEEE Transactions on Mobile Computing, Jan. 2014. IEEE computer Society Digital Library. IEEE Computer Society
R. Borgaonkar, S. Liebergeld and M. Lange: "Cellpot: A Concept for Next Generation Cellular Network Honeypots", NDSS Workshop on Security of Emerging Networking Technologies (SENT), San Diego, 23-26 February, 2014
J.-P. Seifert, "Sicherheitsanalyse von kommerziell verfügbaren PUFs", SmartCard Workshop, Darmstadt, Germany, 5-6 February, 2014
J. Krämer, "Anwendungen von identitätsbasierter Kryptographie", SmartCard Workshop, Darmstadt, Germany, 5-6 February, 2014
J. Krämer, M. Kasper, J.-P. Seifert, "The role of photons in cryptanalysis", ASP-DAC Singapore, 20-23 January, 2014
B. Michéle, Andrew Karpow, "Watch and be Watched: Compromising All Smart TV Generations", IEEE CCNC, Las Vegas, USA, 10-13 January, 2014
A. Mikityuk, O. Friedrich, J.-P. Seifert: "Paradigm Shift in IPTV Service Generation: Comparision between locally- and Cloud-rendered IPTV UI", IEEE CCNC, Las Vegas, USA, 10-13 January, 2014

2013

M. Lange, S. Liebergeld: "Crossover: Secure and Usable User Interface for Mobile Devices with Multiple Isolated OS Personalities", ACSAC, Louisiana, USA, 9-13 Dec, 2013
Janis Danisevskis, Marta Piekarska, Jean-Pierre Seifert, "Dark Side of the Shader: Advanced GPU-aided Payload Delivery", ICISC, Seoul, Korea, 27-29 Nov, 2013
C. Boit, C. Helfmeier, D. Nedospasov, "Feasibly clonable functions", TrustED '13 Proceedings of the 3rd international workshop on Trustworthy embedded devices, pp. 73-74, ACM New York, USA 2013, ISBN: 978-1-4503-2486-1
C. Helfmeier, D. Nedospasov, C. Tarnovsky, J. Krissler, C. Boit, J-P. Seifert, "Breaking and Entering through the Silicon", ACM CCS, Berlin, Germany, November 4-8, 2013
Frederik Armknecht, Jean-Pierre Seifert: "Third international workshop on trustworthy embedded devices (TrustED 2013)". ACM Conference on Computer and Communications Security 2013: P. 1479-1480
Gelenbe, Gorbil, Tzovaras, Liebergeld, Garcia, Baltatu, Lyberopoulos "NEMESYS: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem", ISCIS, London, October 28-29, 2013
Patrick Stewin, "A Primitive for Revealing Stealthy Peripheral-based Attacks on the Computing Platform's Main Memory", RAID, St. Lucia, USA, October 23-25, 2013
Alexandra Mikityuk, Oliver Friedrich, Jean-Pierre Seifert: "The Virtual Set-Top Box: On the Shift of IPTV Service Execution, Service & UI Composition Into the Cloud", ICIN, Venice, October 15-16, 2013
Christoph Bayer, Jean-Pierre Seifert, "Trojan-Resilient Circuits", PROOFS Workshop, Santa Babara, USA,24 August, 2013
Dmitry Nedospasov, Clemens Helfmeier, Jean-Pierre Seifert, Christian Boit, "Invasive PUF Analysis", FDTC, Santa Barbara, CA, USA, 20 August, 2013
Nico Golde, Kevin Redon, and Jean-Pierre Seifert, "Let Me Answer That for You: Exploiting Broadcast Information in Cellular Networks", 22nd USENIX Security Symposium, Washington, D.C., USA, August 14–16, 2013
Jingfei Kong, Onur Aciicmez, Jean-Pierre Seifert, Huiyang Zhou: "Architecting against Software Cache-Based Side-Channel Attacks", IEEE Transactions on Computers, vol. 62, no. 7, pp. 1276-1288, July, 2013
Konrad Rieck, Patrick Stewin, Jean-Pierre Seifert (eds.), Proceedings of the Conference on Detection of Intrusions and Malware, and Vulnerability Assessment - 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013, Revised Selected Papers. Lecture Notes in Computer Science 7697, Springer 2013, ISBN 978-3-642-39234-4
C. Mulliner, R. Borgaonkar, P. Stewin, J.-P. Seifert, "SMS-based One-Time Passwords: Attacks and Defense", Conference on Detection of Intrusions and Malware & Vulnerability Assessment, Berlin, Germany, 17-19 July, 2013
Gelenbe, Gorbil, Tzovaras, Liebergeld, Garcia, Baltatu, Lyberopoulos"Security for Smart Mobile Networks: The NEMESYS Approach", PRISMS, New Jersey, June 24-27, 2013
Nordholz, Aigner, England, "Improving Trusted Tickets with State-Bound Keys", 6th International Conference on Trust & Trustworthy Computing (TRUST 2013), London, June 17-19, 2013
Helfmeier, Nedospasov, Boit, Seifert, "Cloning Physically Unclonable Functions", IEEE Symposium on Hardware-Oriented Security and Trust (HOST), Austin TX, June 2-3, 2013
Schlösser, Nedospasov, Krämer, Orlic, Seifert, "Simple Photonic Emission Analysis of AES", Journal of Cryptographic Engineering, Springer-Verlag, 2013
Liebergeld, Lange, Mulliner, "Nomadic Honeypots: A Novel Concept for Smartphone Honeypots", Workshop on Mobile Security Technology (MoST), in conjunction with the 34th IEEE Symposium on Security and Privacy, May 2013
Matthias Lange, "Securing Two-factor Authentication for Smartphones in a Usable Way by Adding a Connected Token", TinyToCS Vol. 2, Tiny Transactions on Computer Systems, 2013
Krämer, Nedospasov, Schlösser, Seifert, "Differential Photonic Emission Analysis", COSADE 2013, Paris, France, March 7-8, 2013

2012

M. Arapinis, L. Mancini, E. Ritter, M. Ryan, Nico Golde, Kevin Redon and Ravishankar Borgaonkar "New privacy issues in mobile telephony: fix and verification" to be appear in 19th ACM Conference on Computer and Communications Security (CCS 2012), Raleigh, NC, USA, Oct. 2012
Alexander Schlösser, Dmitry Nedospasov, Juliane Krämer, Susanna Orlic and Jean-Pierre Seifert: Simple Photonic Emission Analysis of AES. Workshop on Cryptographic Hardware and Embedded Systems (CHES 2012), Leuven, Belgium, September 2012
Collin Mulliner, Benjamin Michéle: "Read It Twice! A mass-storage-based TOCTTOU attack", In the Proceedings of the 6th USENIX Workshop on Offensive Technologies (WOOT) Bellevue, WA, USA August 2012
Patrick Stewin and Iurii Bystrov: Understanding DMA Malware, Proceedings of the 9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, July 26-27th, 2012, Heraklion, Crete, Greece
Christoph Bayer: Hardware Trojans. In Patrick Stewin and Collin Mulliner, editors, Proceedings of the Seventh GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING). Technical Report SR-2012-01, page 11. GI FG SIDAR, Berlin, Juli 2012
Patrick Stewin and Collin Mulliner (eds.), Proceedings of the 7th GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING), Technical Report SR-2012-01, ISSN 2190-846X, Berlin, Germany, July 5-6, 2012
Collin Mulliner, Steffen Liebergeld, Matthias Lange, and Jean-Pierre Seifert: Taming Mr Hayes: Mitigating Signaling Based Attacks on Smartphones to appear in the Proceedings of the IEEE/IFIP 41st International Conference on Dependable Systems Networks (DSN) Boston, MA, USA 25-28 June 2012
Dmitry Nedospasov, Alexander Schlösser, Jean-Pierre Seifert, Susanna Orlic: Functional integrated circuit analysis. IEEE HOST 2012, San Francisco, June 2012: pp. 102-107
Benjamin Michéle, Juliane Krämer and Jean-Pierre Seifert: Structure-Based RSA Fault Attacks. 8th International Conference on Information Security Practice and Experience (ISPEC 2012), Hangzhou, China, April 2012
Jingfei Kong, Onur Aciicmez, Jean-Pierre Seifert, Huiyang Zhou, "Architecting Against Software Cache-based Side Channel Attacks," IEEE Transactions on Computers, 28 March 2012. IEEE computer Society Digital Library. IEEE Computer Society
Collin Mulliner: Persönliche Datenspuren bei der mobilen Internetnutzung Datenschutz und Datensicherheit (DuD) Issue 3/2012, pages 180-184 Germany March 2012
Wenjuan Xu, Xinwen Zhang, Hongxin Hu, Gail-Joon Ahn, Jean-Pierre Seifert: Remote Attestation with Domain-Based Integrity Model and Policy Analysis. IEEE Trans. Dependable Sec. Comput. 9(3): 429-442 (2012)
Nico Golde, Kevin Redon and Ravishankar Borgaonkar " Weaponizing Femtocells: The Effect of Rogue Devices on Mobile Telecommunications " to be appear in 19th Annual Network and Distributed System Security Symposium, (NDSS 2012), San Diego, February 2012

2011

Juliane Krämer, Dmitry Nedospasov and Jean-Pierre Seifert: Weaknesses in Current RSA Signature Schemes. Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea
Steffen Liebergeld, Matthias Lange, Adam Lackorzynski, Alexander Warg: "Hochsichere Smartphones mit L4Android". In "Smart Mobile Apps", ISBN 978-3-642-22258-0, Hrsg Verclas, Stephan und Linnhoff-Popien, Claudia.
Ravishankar Borgaonkar, Kevin Redon and Jean-Pierre Seifert. "Security Analysis of a Femtocell device". To be published in the 4th ACM International Conference on Security of Information and Networks (SIN), Sydney, Australia, November 14-19, 2011.
Patrick Stewin, Jean-Pierre Seifert and Collin Mulliner (2011). "Poster: Towards Detecting DMA Malware." to be published in CCS '11: Proceedings of the 18th ACM Conference on Computer and Communications Security. ACM.
Jean-Pierre Seifert: "Security in Telecommunications", in PIK - Praxis der Informationsverarbeitung und Kommunikation, Volume 34, pp. 160-162, 2011.
Matthias Lange, Steffen Liebergeld, Adam Lackorzynski, Alexander Warg, Michael Peter: "L4Android: A Generic Operating System Framework for Secure Smartphones", In proceedings of the 2011 ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, Chicago, IL, USA, OCT 17-21 2011
Collin Mulliner, Nico Golde, and Jean-Pierre Seifert: SMS of Death: from analyzing to attacking mobile phones on a large scale, In the Proceedings of the 20th USENIX Security Symposium San Francisco, CA, USA 10-12 August 2011
Patrick Stewin: "Evaluating "Ring -3" Rootkits", In Sebastian Uellenbeck, editor, Proceedings of the Sixth GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING). Technical Report SR-2011-01, page 7. GI FG SIDAR, Bochum, March 2011.
Matthias Lange: "OS Agnostic Sandboxing Using Virtual CPUs", In Sebastian Uellenbeck, editor, Proceedings of the Sixth GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING). Technical Report SR-2011-01, page 8. GI FG SIDAR, Bochum, March 2011.

2010

Juliane Krämer and Benjamin Michéle, "Erfolgreiche Faktorisierungsangriffe gegen RSA in der Praxis", Tagungsband des 13. Kryptotags (p. 8), Workshop der Fachgruppe "Angewandte Kryptographie" der "Gesellschaft für Informatik e.V.", Darmstadt, 14 December, 2010
Xinwen Zhang, Jean-Pierre Seifert, and Onur Aciicmez. SEIP: Simple and Efficient Integrity Protection for Open Mobile Platforms. In the 12th International Conference on Information and Communications Security (ICICS), 2010
Wenjuan Xu, Gail-Joon Ahn, Hongxin Hu, Xinwen Zhang, and Jean-Pierre Seifert. DR@FT: Efficient Remote Attestation Framework for Dynamics Systems. In the 15th European Symposium on Research in Computer Security (ESORICS), 2010
Mohammad Nauman, Sohail Khan, Xinwen Zhang, and Jean-Pierre Seifert. Beyond Kernel-level Integrity Measurement: Enabling Remote Attestation for the Android Platform. In the 3rd International Conference on Trust and Trustworthy Computing (TRUST), 2010
Ravishankar Borgaonkar and Kevin Redon and Jean-Pierre Seifert "Experimental Analysis of the Femtocell Location Verification Techniques" In the Proceedings of the 15th Nordic Conference in Secure IT Systems (NordSec) Helsinki, Finland 27-30 October, 2010
Collin Mulliner and Jean-Pierre Seifert "Rise of the iBots: 0wning a telco network" In the Proceedings of the 5th IEEE International Conference on Malicious and Unwanted Software (Malware) Nancy, France 19-20 October, 2010
Collin Mulliner "Privacy Leaks in Mobile Phone Internet Access" In the Proceedings of the 14th International Conference on Intelligence in Next Generation Networks (ICIN) Berlin, Germany 11-14 October, 2010
Sachin Agarwal, Christoph Peylo, Ravishankar Borgaonkar and Jean-Pierre Seifert "Operator Based Over-the-air M2M Wirelss Sensor Network Security" In the Proceedings of the 14th International Conference on Intelligence in Next Generation Networks (ICIN) Berlin, Germany 11-14 October, 2010
Patrick Stewin and Jean-Pierre Seifert: "In God We Trust All Others We Monitor - Extended Abstract", Accepted for Poster/Demo Session at the 17th ACM Conference on Computer and Communications Security, October 5, 2010, Chicago, Illinois, USA
Ravishankar Borgaonkar " An Analysis of Asprox Botnet" In the prodeedings of the Fourth International Conference on Emerging Security Information, Systems and Technologies (Securware) 2010, 18-25 July, Venice, Italy
Patrick Stewin: "Learning from Rootkits", In Sebastian Schmerl, Simon Hunke, editors, Proceedings of the Fifth GI SIG SIDAR Graduate Workshop on Reactive Security (SPRING), Technical Report SR-2010-01, page 12, GI FG SIDAR, Bonn, July 2010
Jean-Pierre Seifert, Xie Liang, Zhang Xinwen, Zhu Sencun. pBMDS: A Behavior-based Malware Detection System for Cellphone Devices. In the proceedings of 3rd ACM conference on wireless network security (WiSec), March 2010, NY, USA.

2009

Jean-Pierre Seifert, Jingfei Kong, Onur Aciiçmez and Huiyang Zhou. Hardware-software integrated approaches to defend against software cache-based side channel attacks. In the proceedings of 15th International Conference on High-Performance Computer Architecture (HPCA-15 2009), 14-18 February 2009, Raleigh, North Carolina, USA.
Collin Mulliner and Charlie Miller "Injecting SMS Messages into Smart Phones for Security Analysis" In the Proceedings of the 3rd USENIX Workshop on Offensive Technologies (WOOT) Montreal, Canada August 2009
Jean-Pierre Seifert, Xinwen Zhang, Onur Aciiçmez. Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms. pp 71-82, MobiSec 2009.
Jean-Pierre Seifert, Onur Aciiçmez, Xinwen Zhang. A secure DVB set-top box via trusting computing technologies. In the proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, 2009, Las Vegas, NV, USA.
Jean-Pierre Seifert and Shay Gueron. Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009.