Inhalt des Dokuments
2021
RNNIDS: Enhancing Network Intrusion Detection Systems through Deep Learning S. Sohi, F. Ganji, J.-P. Seifert To appear in Computers & Security |
Nano Security: From Nano-Electronics to Secure Systems I. Polian, F. Altmann, T. Arul, C. Boit, R. Brederlow, L. Davi, R. Drechsler, N. Du, T. Eisenbarth, T. Güneysu, S. Hermann, M. Hiller, R. Leupers, F. Merchant, T. Mussenbrock, S. Katzenbeisser, A. Kumar, W. Kunz,T. Mikolajick, V. Pachauri, J.-P. Seifert, F. Sill Torres, J. Trommer To appear in MPIRP DATE 2021 |
Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model T. Krachenfels, F. Ganji, A. Moradi, S. Tajik, J.-P. Seifert To appear in IEEE S&P 2021 |
2020
On the Quantum vs Classical Learnability of Discrete Distributions R. Sweke, J.-P. Seifert, D. Hangleiter, J. Eisert To appear in Quantum Techniques in Machine Learning (QTML) 2020 |
Second generation of optical IC-backside protection structure E. Amini, T. Kiyan, N. Herfurth, A. Beyreuther, C. Boit, J.-P. Seifert In IPFA 2020 |
Comprehensive parametric investigations of EOFM measurements on single FinFET transistors A. Beyreuther, N. Herfurth, E. Amini, T. Nakamura, B. Motamedi, C. Boit In IPFA 2020 |
Logic State Imaging From FA Techniques for Special Applications to One of the Most Powerful Hardware Security Side-Channel Threats C. Boit, T. Kiyan, T. Krachenfels, J.-P. Seifert Invited paper in IPFA 2020 |
Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model T. Krachenfels, F. Ganji, A. Moradi, S. Tajik, J.-P. Seifert In arXiv:2009.04263 |
On the Quantum versus Classical Learnability of Discrete Distributions R. Sweke, J.-P. Seifert, D. Hangleiter, J. Eisert In arXiv:2007.14451 |
Mehr schlecht als Recht: Grauzone Sicherheitsforschung F. Franzen, D. Maier, M. Wagner In Datenschutz und Datensicherheit - DuD |
AFL ++ : Combining Incremental Steps of Fuzzing Research A. Fioraldi, D. Maier, H. Eißfeldt, M. Heuse In WOOT '20 |
Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints D. Song, F. Hetzelt, J. Kim, B. Byunghoon Kang, J. Seifert, M. Franz In USENIX Security '20, August 12-14 Boston USA |
Camera Fingerprinting Authentication Revisited D. Maier, H. Erb, P. Mullan, V. Haupert In RAID 2020 |
BaseSAFE: Baseband SAnitized Fuzzing through Emulation D. Maier, L. Seidel, S. Park In WiSec '20 |
Second generation of optical IC-backside protection structure E. Amini, T. Kiyan, C. Boit, J.-P. Seifert In IPFA 2020 |
Rock'n'roll PUFs: Crafting Provably Secure PUFs from Less Secure Ones F. Ganji, S. Tajik, P. Stauss, J.-P. Seifert, D. Forte, M. Tehranipoor In Journal of Cryptographic Engineering |
Splitting the Interpose PUF: A Novel Modeling Attack Strategy N. Wisiol, C. Mühl, N. Pirnay, P. H. Nguyen, M. Margraf, J.-P. Seifert, M. van Dijk, U. Rührmair In TCHES 2020, Issue 3 Beijing, China, September 2020 |
Secure IT without Vulnerabilities and Backdoors A. Weber, G. Heiser, D. Kuhlmann, M. Schallbruch, A. Chattopadhyay, S. Guilley, M. Kasper, C. Krauß, P. S. Krüger, S. Reith, and J.-P. Seifert In TATuP - Zeitschrift für Technikfolgenabschätzung in Theorie Und Praxis 29, 2020 |
XOR Arbiter PUFs have Systematic Response Bias N. Wisiol, N. Pirnay In Financial Cryptography 2020 Kota Kinabalu, Sabah, Malaysia, February 2020 |
Machine Learning Based Adversary Modeling for Composed Hardware F. Ganji, S. Amir, S. Tajik, D. Forte, J.-P. Seifert In Design, Automation and Test (DATE) Grenoble, France, April 2020 |
IT Security for Measuring Instruments: Confidential Checking of Software Functionality D. Peters, A. Yurchenko, W. Melo, K. Shirono, T. Usuda, J.P. Seifert, F. Thiel In Future of Information and Communications Conference (FICC) San Francisco, California, USA, March 2020 |
2019
Splitting the Interpose PUF: A Novel Modeling Attack Strategy N Wisiol, C. Mühl, N. Pirnay, P. H. Nguyen, M. Margraf, J.-P. Seifert, M. van Dijk, U. Rührmair In Cryptology ePrint Archive, Report 2019/1473 December 2019 |
Evaluation of Low-Cost Thermal Laser Stimulation for Data Extraction and Key Readout T. Krachenfels, H. Lohrke, J.-P. Seifert, E. Dietz, S.Frohmann, H.-W. Hübers In Journal of Hardware and Systems Security November, 2019 |
EOFM for contactless parameter extraction of low k dielectric MIS structures N. Herfurth, E. Amini, A. Beyreuther, T. Nakamura, S. Keil, C. Boit In International Symposium on the Physical and Failure Analysis of Integrated Circuits, IPFA 2019 |
EOFM measurements of lateral and vertical Bipolar Transistors in Silicon and SiGe:C Technologies A. Beyreuther, N. Herfurth, E. Amini, T. Nakamura, G. G. Fischer, S. Keil, C. Boit In International Symposium on the Physical and Failure Analysis of Integrated Circuits, IPFA 2019 |
New Access to Soft Breakdown Parameters of Low-k Dielectrics Through Localisation-Based Analysis N. Herfurth, A. Beyreuther, E. Amini, C. Boit, M. Simon-Najasek, S. Hübner, F. Altmann, R. Herfurth, C. Wu, I. De Wolf, K. Croes In IEEE International Reliability Physics Symposium (IRPS), Monterey, CA, USA, 2019 |
Breaking the Lightweight Secure PUF: Understanding the Relation of Input Transformation and Machine Learning Resistance N. Wisiol, G.T. Becker, M. Margarf, T. Soroceanu, J. Tobisch, B. Zengin In Smart Card Research and Advanced Application Conference (CARDIS) 2019 Prague, Czech Republic, November 2019 |
Generation and Tracking of Optical Signals inside the IC to Improve Device Security and Failure Analysis E. Amini, N. Herfurth, A. Beyreuther, J. P. Seifert, C. Boit In IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA), July 2019 |
PUFmeter: A Property Testing Tool for Assessing the Robustness of Physically Unclonable Functions to Machine Learning Attacks F. Ganji, J.P. Seifert, D. Forte In IEEE Access 2019 |
Insecure Until Proven Updated: Analyzing AMD SEV’s Remote Attestation R. Buhren, C. Werling, J.P. Seifert In ACM Computer Communications Security (CCS) London, UK, November, 2019 |
Anatomy of Commercial IMSI Catchers and Detectors S. Park, A. Shaik, R. Borgaonkar, J. P. Seifert In Workshop on Privacy in the Electronic Society (WPES) London, UK, November, 2019 |
Rock’n’roll PUFs: Crafting Provably Secure PUFs from Less Secure Ones F. Ganji, S. Tajik, P. Stauss, J.P. Seifert, D. Forte, M. Tehranipoor In Security Proofs for Embedded Systems (PROOFS) Atlanta, Georgia, USA, August 2019 |
Unicorefuzz: On the Viability of Emulation for Kernelspace Fuzzing D. Maier, B. Radtke, B. Harren In USENIX Workshop on Offensive Technologies (Woot) Santa Clara, California, USA, August 2019 |
Preacher: Network Policy Checker for Adversarial Environments K. Thimmaraju, L. Schiff, S. Schmid In International Symposium on Reliable Distributed Systems (SRDS) Lyon, France, October 2019 |
New Vulnerabilities in 5G Networks A. Shaik, R. Borgaonkar Black Hat USA, Las Vegas, Nevada, USA, August 2019 |
PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary D. Song, F. Hetzelt, D. Das, C. Spensky, Y Na, S. Volckaert, G. Vigna, C. Kruegel, J.P. Seifert, M. Franz Black Hat USA, Las Vegas, Nevada, USA, August 2019 |
Evaluation of Low-Cost Thermal Laser Stimulation for Data Extraction and Key Readout T. Krachenfels, H. Lohrke, J.P. Seifert, E. Dietz, S. Frohmann, H.-W. Hübers International Conference on Physical Assurance and Inspection of Electronics (PAINE) Crystal City, Washington D.C., USA, July 2019 |
MTS: Bringing Multi-Tenancy to Virtual Networking K. Thimmaraju, S. Hermak, G. Rétvári, S. Schmid USENIX Annual Technical Conference (ATC), Renton, Washington, USA, July 2019 |
Secure Real-time Communication and Computing Infrastructure for Industry 4.0 – Challenges and Opportunities E. Zielinski, J. Schulz-Zander, H. Ruckstuhl, A. Artemenko, A. Ramirez, F. Zeiger, M. Mormul, F. Hetzelt, F. Beierle, H. Klaus, M. Zimmermann, C. Schellenberger AIComNets, München, Germany, March 2019 |
Application of thin films in IC security E. Amini, C. Boit, B. Szyszka, J.P. Seifert Spring Meeting of the European Materials Research Society, Nice, France, May, 2019 |
Challenges and Solutions for Industry-Grade Secure Connectivity H. Klaus, F. Hetzelt, P. Hofmann, A. Blecker, D. Schwaiger AIComNets, München, Germany, March 2019 |
Device Capabilities exposed on 4G and 5G Networks A. Shaik, R. Borgaonkar, S. Park, J.P Seifert To appear in ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Miami, Florida, USA, 2019 |
PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary D. Song, F. Hetzelt, D. Das, C. Spensky, Y Na, S. Volckaert, G. Vigna, C. Kruegel, J.P. Seifert, M. Franz NDSS, San Diego, California, USA, February, 2019 |
2018
IT-Sicherheit gründlich lösbar? A.Weber, S. Guilley, M. Kasper, C. Krauß, P. S. Krüger, D. Kuhlmann, S. Reith, J.P. Seifert Zukunftsmotor Metropolregion, Rhein-Neckar, Germany, 2018 |
Photon Emission as a Characterization Tool for Bipolar Parasitics in FinFET Technology A. Beyreuther, N. Herfurth, E. Amini, T. Nakamura, I. De Wolf, C. Boit Microelectronics Reliability, Elsevier, 2018 |
Cloning Physically Unclonable Functions C. Helfmeier, C. Boit, D. Nedospasov and J.P. Seifert Top Picks in Hardware Security, International Conference On Computer Aided Design (ICCAD), San Diego, California, USA, 2018 |
Assessment of a Chip Backside Protection E. Amini, A. Beyreuther, N. Herfurth, A. Steigert, B. Szyszka, C. Boit Journal of Hardware and System Security, 2018 |
IC security and quality improvement by protection of chip backside against hardware attacks E. Amini, A. Beyreuther, N. Herfurth, A. Steigert, R. Muydinov, B. Szyszka, C. Boit Microelectronics Reliability, 2018 |
Comparative Assessment of Optical Techniques for Semi-Invasive SRAM Data Read-Out on an MSP430 Microcontroller T. Kiyan, H. Lohrke, and C. Boit Int. Symp. for Testing and Failure Analysis (ISTFA). Phoenix, Arizon, USA, 2018 |
On the Detectability of Control Flow Using Memory Access Patterns R. Buhren, F. Hetzelt and N. Pirnay ACM CCS Workshop on System Software for Trusted Execution (SysTEX), Toronto, Cananda, 2018 |
Attacking RO-PUFs with Enhanced Challenge-Response Pairs N. Wisiol, M. Margraf IFIP International Conference on Security, Privacy, and Trust, Poznań, Poland, 2018 |
Secure Cloud Computing: Risk Analysis for Secure Cloud Reference Architecture in Legal Metrology A. Oppermann, M. Esche, F. Thiel, J.P. Seifert IFIP International Conference on Security, Privacy, and Trust, Poznań, Poland, 2018 |
Swipe your Fingerprints! How Biometric Authentication Simplifies Payment, Access and Identity Fraud J. Fietkau, J. Krissler, J.P. Seifert USENIX WOOT, Baltimore, Maryland, USA, 2018 |
Key Extraction using Thermal Laser Stimulation: A Case Study on Xilinx Ultrascale FPGAs H. Lohrke, S. Tajik, T. Krachenfels, C. Boit, J.P. Seifert TCHES, Amsterdam, Netherlands, 2018 |
Follow the White Rabbit: Simplifying Fuzz Testing Using FuzzExMachina B. Shastry, D. Maier, V. Ultzsch Black Hat USA, Las Vegas, Nevada, USA, 2018 |
Open Source Value Chains for Addressing Security Issues Efficiently A. Weber, S. Reith, D. Kuhlmann, M. Kasper, J.P. Seifert, C. Krauß IEEE Workshop on Cyber Resilience Technologies , Their Benefits and Measurements (CRE), Lisbon, Portugal, 2018 |
On the Impact of Rogue Base Stations in 4G/LTE Self Organizing Network A. Shaik, R. Bargaonkar, S. Park, J.P. Seifert ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Stockholm, Sweden, 2018 |
Virtual Network Isolation: Are We There Yet? K. Thimmaraju, G. Rétvári, S. Schmid ACM SIGCOMM 2018 Workshop on Security in Softwarized Networks (SecSoN), Budapest, Hungary, 2018 |
Honey, I Shrunk Your App Security: The State of Android App Hardening V. Haupert, D. Maier, N. Schneider, J. Kirsch, T. Müller Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Paris-Saclay, France, 2018 |
On the Learnability of Physically Unclonable Functions F. Ganji Springer, T-Labs Series in Telecommunication Services, ISBN 978-3-319-76717-8, 2018 |
On the Phyiscal Security of Physically Unclonable Functions S. Tajik Springer, T-Labs Series in Telecommunication Services, ISBN 978-3-319-75820-6, 2018 |
I DPID It My Way!: A Covert Timing Channel in Software-Defined Networks R. Krösche, K. Thimmaraju, L. Schiff, S. Schmid IFIP Networking, Zürich, Switzerland, 2018 |
Peeking over the Cellular Walled Gardens - A Method for Closed Network Diagnosis B. Hong, S. Park, H. Kim, D. Kim, H. Hong, H. Choi, J.-P. Seifert, S.-J. Lee, Y. Kim IEEE Transactions on Mobile Computing, 2018 |
Taking Control of SDN-based Cloud Systems via the Data Plane (Best Paper Award!) K. Thimmaraju, B. Shastry, T. Fiebig, F. Hetzelt, J.-P. Seifert, A. Feldmann, S. Schmid ACM Symposium on SDN Research (SOSR 2018), Los Angeles, USA, 2018 |
Blockchain Applications for Legal Metrology D. Peters, J. Wetzlich, F. Thiel, J.-P. Seifert International Instrumentation and Measurement Technology Conference (I²MTC 2018), Houston, USA, 2018 |
A Fourier Analysis Based Attack against Physically Unclonable Functions F. Ganji, S. Tajik and J.-P. Seifert Financial Cryptography and Data Security 2018 (FC'18), Curaçao, 2018 |
2017
Secure Cloud Computing: Communication Protocol for Multithreaded Fully Homomorphic Encryption for Remote Data Processing A. Oppermann, F. Grasso Toro, A. Yurchenko J.-P. Seifert IEEE ISPA 2017, Guangzhou, China, 2017 |
Static Analysis as a Fuzzing Aid B. Shastry, M. Leutner, T. Fiebig, K. Thimmaraju, F. Yamaguchi, K. Rieck, S. Schmid, J.-P. Seifert, A. Feldmann RAID'17, Atlanta, USA, 2017 |
Paying the Price for Disruption: How a FinTech Allowed Account Takeover V. Haupert, D. Maier, and T. Müller ROOTS 2017, Vienna, Austria, 2017 |
The vAMP Attack: Taking Control of Cloud Systems via the Unified Packet Parser K. Thimmaraju, B. Shastry, T. Fiebig, F. Hetzelt, J.-P. Seifert, A. Feldmann, S. Schmid ACM CCSW 2017, Dallas, USA, 2017 |
Secure Cloud Computing: Multithreaded Fully Homomorphic Encryption for Legal Metrology A. Oppermann, A. Yurchenko, M. Esche and J.-P. Seifert ISDDC 2017, Vancouver, Canada, 2017 |
On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs S. Tajik , H. lohrke, J.-P. Seifert, C. Boit ACM CCS 2017, Dallas, USA, 2017 |
White-Stingray: Evaluating IMSI Catchers Detection Applications S. Park, A. Shaik, R. Borgaonkar, A. Martin, J.-P. Seifert WOOT '17, Vancouver, Canada, 2017 |
Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing B. Shastry, F. Maggi, F. Yamaguchi, K. Rieck, J.-P. Seifert WOOT '17, Vancouver, Canada, 2017 |
Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery T. Unruh, B. Shastry, M. Skoruppa, F. Maggi, K. Rieck, J.-P. Seifert, F. Yamaguchi WOOT '17, Vancouver, Canada, 2017 |
Visible Light Techniques in the FinFET Era: Challenges, Threats and Opportunities H. Lohrke, H. Zöllner, P. Scholz, S. Tajik, C. Boit, J.-P. Seifert IPFA, Chengdu, China, 2017 |
New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor R. Borgaonkar, S. Park, L. Hirschi, A. Shaik, Andrew Martin, J.-P. Seifert Black Hat, Las Vegas, USA, 2017 |
New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor R. Borgaonkar, S. Park, L. Hirschi, A. Shaik, Andrew Martin, J.-P. Seifert Black Hat, Las Vegas, USA, 2017 |
PUFMon: Security Monitoring of FPGAs using Physically Unclonable Functions S. Tajik , J. Fietkau, H. lohrke, J.-P. Seifert, C. Boit IEEE IOLTS, Thessaloniki, Greece, 2017 |
Photonic Side-Channel Analysis of Arbiter PUFs S. Tajik, E. Dietz, S. Frohmann, H. Dittrich, D. Nedospasov, C. Helfmeier, J.-P. Seifert, C. Boit and H.-W. Hübers Journal of Cryptology, 2017 |
Having No Mathematical Model May Not Secure PUFs F. Ganji, S. Tajik, F. Fäßler and J.-P. Seifert Journal of Cryptographic Engineering, 2017 |
Photonic Side Channel Attacks Against RSA E. Carmon, J.-P. Seifert, A. Wool IEEE HOST, McLean, USA, May 1-4, 2017 |
Outsmarting Network Security with SDN Teleportation K. Thimmaraju, L. Schiff, S. Schmid IEEE Euro S&P, Paris, France, April 26-28, 2017 |
Security Analysis of Encrypted Virtual Machines F. Hetzelt, R. Buhren ACM VEE, Xi'an, China, April 8-9, 2017 |
Something From Nothing (There): Collecting Global IPv6 Datasets From DNS T. Fiebig, K. Borgolte, S. Hao, C. Kruegel, G. Vigna PAM, Sydney, Australia, March 30-31, 2017 |
Fault Attacks on Encrypted General Purpose Compute Platforms R. Buhren, S. Gueron, J. Nordholz, J.-P. Seifert, J. Vetter ACM CODASPY, Scottsdale, USA, March 22-24, 2017 |