Project Details
Projekt Print View

GRK 1817:  New Challenges for Cryptography in Ubiquitous Computing

Subject Area Computer Science
Term from 2012 to 2017
Project identifier Deutsche Forschungsgemeinschaft (DFG) - Project number 200931773
 
Final Report Year 2018

Final Report Abstract

Das Graduiertenkolleg UbiCrypt hatte folgende drei Globalziele: DoktorandInnen-Ausbildung auf hohem internationalen Niveau, fächerübergreifende Forschung in der IT-Sicherheit und Erhöhung der Chancengleichheit. Alle drei Ziele wurden in vollem Umfang erfüllt und haben an dem Horst-Görtz-Institut für IT-Sicherheit der Ruhr-Universität Bochum zur wertvollen Weichenstellung in der Ausbildung des wissenschaftlichen Nachwuchses geführt. Die Erfahrungen von UbiCrypt sind unmittelbar in zwei nachfolgende Doktorandenschulen eingeflossen, SecHuman (Schöne neue Welt: Sicherheit für Menschen im Cyberspace, Start 2016) sowie NERD (North Rhine-Westphalian Experts on Research in Digitalization, Start 2018), welche beide vom Land NRW gefördert werden. Nicht zuletzt haben die Erfahrungen aus UbiCrypt wertvolle Impulse für das Exzellenzcluster „Cyber-Sicherheit im Zeitalter großskaliger Angreifer (CASA)“ gegeben, welches im Januar 2019 seine Arbeit aufnahm. Nachfolgend werden die wichtigsten Erfahrungen mit UbiCrypt zusammenfassend beschrieben. Wissenschaftliche Ausbildung auf hohem internationalen Niveau. In UbiCrypt wurden insgesamt 31 DoktorandInnen zur Promotion geführt. Hiervon wurden 19 durch das Graduiertenkolleg finanziert und 12 waren assoziierte Mitglieder. Die TeilnehmerInnen waren außerordentlich erfolgreich. In Summe publizierten sie mehr als 90 wissenschaftliche Fachbeiträge auf Konferenzen und in Zeitschriften mit „Peer Review“. Besonders stechen dabei 29 Beiträge auf den international führenden Konferenzen hervor, die in der Scientific Community den höchsten Stellenwert haben. Fünf der Beiträge wurden darüber hinaus mit einem Best Paper Award versehen. Bezüglich der wissenschaftlichen Leistung belegt UbiCrypt einen der führenden internationalen Plätze. Fächerübergreifende Nachwuchsausbildung in der IT-Sicherheit. In UbiCrypt wurde eine Reihe innovativer Ausbildungskonzepte angewendet, um Forschung über mehre Disziplinen zu ermöglichen. Als besonders erfolgreich stellten sich dabei zwei Formate heraus. In dem sogenannten crossdisziplinären Projekt absolvierten die TeilnehmerInnen einen sechswöchigen „Forschungsaufenthalt“ bei einer anderen Arbeitsgruppe des Graduiertenkollegs, welche in einer anderen Fakultät angesiedelt war (Bsp: eine Doktorandin aus der Mathematik arbeitete sechs Wochen an einem Lehrstuhl in den Ingenieurwissenschaften). Das zweite Format war die Seminar & Lecture Series. Hierbei konnte jede(r) DoktorandIn eine ausgewählte Veröffentlichung aus seinem/ihrem Fachgebiet vorstellen, der Übersichtscharakter hat. Hierdurch wurde vermieden, dass Spezialthemen vorgestellt wurden, die für viele andere KollegteilnehmerInnen nur von begrenztem Nutzen waren. Erhöhung der Chancengleichheit in der IT-Sicherheit. In UbiCrypt wurden eine vergleichsweise hohe Anzahl von Doktorandinnen ausgebildet. Unter den insgesamt 31 DoktorandInnen waren 25% Frauen. Unter den allein von UbiCrypt geförderten Stellen lag der Anteil sogar bei 42%. Zur Erhöhung der Chancengleichheit wurden eine Reihe spezieller Formate entwickelt. Hierzu gehörte u. a. der Workshop CrossFyre (Workshop on Cryptography, Robustness, and Provably Secure Schemes for Female Young Researchers), der im Juli 2014 an der Ruhr-Universität stattfand. Er wurde von Doktorandinnen von UbiCrypt organisiert und diente der Vernetzung unter Nachwuchswissenschaftlerinnen. CrossFyre hatte über 40 Teilnehmerinnen aus ganz Europa und wurde von allen Teilnehmerinnen als ausgesprochen positiv gewertet. Darüber hinaus gab es ein Austauschprogramm mit mehr als 10 internationalen Gastwissenschaftlerinnen, die den Doktorandinnen als Mentorinnen zur Seite standen und individuell unterstützten. Des Weiteren gab es eine enge Verknüpfung mit den Gleichstellungsmaßnahmen der Hochschule; so wurden beispielsweise Workshops aus der RUB Research School von den Doktorandinnen rege genutzt.

Publications

  • Memory Encryption for Smart Cards In 10th Smart Card Research and Advanced Application Conference 2011 (CARDIS’11), Volume 7079 of Lecture Notes in Computer Science, pp. 199-216. Springer, 2011
    Baris Ege, Elif Bilge Kavun, Tolga Yalçýn
    (See online at https://doi.org/10.1007/978-3-642-27257-8_13)
  • RAM-Based Ultra-Lightweight FPGA Implementation of PRESENT In International Conference on ReConFigurable Computing and FPGAs 2011 (ReConFig’11). IEEE Computer Society, 2011
    Elif Bilge Kavun, Tolga Yalçýn
    (See online at https://doi.org/10.1109/reconfig.2011.74)
  • Efficient Reconfigurable Hardware Architecture for Accurately Computing Success Probability and Data Complexity of Linear Attacks In International Conference on ReConFigurable Computing and FPGAs 2012 (ReConFig’12). IEEE Computer Society, 2012
    Andrey Bogdanov, Elif Bilge Kavun, Elmar Tischhauser, Tolga Yalçýn
    (See online at https://doi.org/10.1109/reconfig.2012.6416744)
  • Experimental Evaluation of Success Probability and Data Complexity of Linear Attacks on Hardware In International Conference on Applied and Computational Mathematics (ICACM). 2012
    Andrey Bogdanov, Elif Bilge Kavun, Elmar Tischhauser, Tolga Yalçýn
  • IPSecco: A Lightweight and Reconfigurable IPSec Core In International Conference on ReConFigurable Computing and FPGAs 2012 (ReConFig’12). IEEE Computer Society, 2012
    Benedikt Driessen, Tim Güneysu, Elif Bilge Kavun, Oliver Mischke, Christof Paar, Thomas Pöppelmann
    (See online at https://doi.org/10.1109/reconfig.2012.6416757)
  • On the Implementation Aspects of Sponge-Based Authenticated Encryption for Pervasive Devices In 11th Smart Card Research and Advanced Application Conference 2012 (CARDIS’12), Volume 7771 of Lecture Notes in Computer Science, pp. 141-157. Springer, 2012
    Tolga Yalçýn, Elif Bilge Kavun
    (See online at https://doi.org/10.1007/978-3-642-37288-9_10)
  • PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications. In 18th Annual International Conference on the Theory and Application of Cryptology and Information Security 2012 (ASIACRYPT’12), Volume 7658 of Lecture Notes in Computer Science, pp. 208-225. Springer, 2012
    Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Kneûevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, SÙren S. Thomsen, Tolga Yalçýn
    (See online at https://doi.org/10.1007/978-3-642-34961-4_14)
  • Short Attribute-Based Signatures for Threshold Predicates. Proceedings of CT-RSA 2012, LNCS 7178, pp. 51- 67, Springer (2012)
    Javier Herranz, Fabien Laguillaumie, Benoit Libert, Carla Ràfols
    (See online at https://doi.org/10.1007/978-3-642-27954-6_4)
  • A New Algebraic Framework for Diffie-Hellman Assumptions. Proceedings of CRYPTO 2013 (2), LNCS 8043, pp. 129 - 147, Springer (2013)
    Alex Escala, Gottfried Herold, Eike Kiltz, Carla Ràfols, Jorge Villar
    (See online at https://doi.org/10.1007/978-3-642-40084-1_8)
  • A Non-Linear/Linear Instruction Set Extension for Lightweight Ciphers In 21st IEEE Symposium on Computer Arithmetic 2013 (ARITH 21). IEEE Computer Society, 2013
    Susanne Engels, Elif Bilge Kavun, Hristina Mihajloska, Christof Paar, Tolga Yalçýn
    (See online at https://doi.org/10.1109/arith.2013.36)
  • A Reconfigurable Architecture for Searching Optimal Software Code to Implement Block Cipher Permutation Matrices In International Conference on ReConFigurable Computing and FPGAs 2013 (ReConFig’13). IEEE Computer Society, 2013
    Elif Bilge Kavun, Gregor Leander, Tolga Yalçýn
    (See online at https://doi.org/10.1109/reconfig.2013.6732263)
  • Binaural Signal Processing for Enhanced Speech Recognition Robustness in Complex Listening Environments. The 2nd ’CHiME’ Speech Separation and Recognition Challenge, Vancouver, Canada, June 2013
    Hendrik Meutzner, Anton Schlesinger, Steffen Zeiler, Dorothea Kolossa
  • Control-Flow Restrictor: Compiler-based CFI for iOS. Annual Computer Security Applications Conference (ACSAC), New Orleans, USA, December 2013
    Jannik Pewny, Thorsten Holz
    (See online at https://doi.org/10.1145/2523649.2523674)
  • Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures In 9th Workshop on RFID Security 2013 (RFIDSec’13), Volume 8262 of Lecture Notes in Computer Science, pp. 103-112. Springer, 2013
    Lejla Batina, Amitabh Das, Baris Ege, Elif Bilge Kavun, Nele Mentens, Christof Paar, Ingrid Verbauwhede, Tolga Yalçýn
    (See online at https://doi.org/10.1007/978-3-642-41332-2_7)
  • Efficient Implementation of Cryptographic Primitives on the GA144 Multi-Core Architecture. Application-Specific Systems, Architectures and Processors (ASAP) 2013 - 24th International Conference, Washington D.C., USA, June 05-07, 2013. IEEE, pp. 67-74
    Tobias Schneider, Ingo von Maurich, Tim Güneysu
    (See online at https://doi.org/10.1109/asap.2013.6567552)
  • Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs. CRYPTO 2013
    Vadim Lyubashevsky, Daniel Masny
    (See online at https://doi.org/10.1007/978-3-642-40084-1_18)
  • Quantifying the Security of Graphical Passwords: The Case of Android Unlock Patterns. Proc. ACM Conference on Computer and Communications Security (CCS), 2013
    Sebastian Uellenbeck, Markus Dürmuth, Christopher Wolf, Thorsten Holz
    (See online at https://doi.org/10.1145/2508859.2516700)
  • SVM-Based Preprocessing for Automatic Speech Recognition. AIA-DAGA 2013, Merano, Italy, March 2013
    Hendrik Meutzner, Sarmad Malik, Dorothea Kolossa
  • Block Ciphers - Focus On The Linear Layer (feat. PRIDE) In 34th International Cryptology Conference 2014 (CRYPTO’14), Volume 8616 of Lecture Notes in Computer Science, pp. 57-76. Springer, 2014
    Martin R. Albrecht, Benedikt Driessen, Elif Bilge Kavun, Gregor Leander, Christof Paar, Tolga Yalçýn
    (See online at https://doi.org/10.1007/978-3-662-44371-2_4)
  • Cryptographic Algorithms on the GA144 Asynchronous Multi-Core Processor – Implementation and Side-Channel Analysis. Journal of Signal Processing Systems, Springer, 2014, 77, pp. 151-167
    Tobias Schneider, Ingo von Maurich, Tim Güneysu, David Oswald
    (See online at https://doi.org/10.1007/s11265-014-0872-5)
  • Evaluating the Effectiveness of Current Anti-ROP Defenses. Research in Attacks, Intrusions and Defenses (RAID) Symposium, Gothenburg, Sweden, September 2014
    Felix Schuster, Thomas Tendyck, Jannik Pewny, Andreas Maaß, Martin Steegmanns, Moritz Contag, Thorsten Holz
    (See online at https://doi.org/10.1007/978-3-319-11379-1_5)
  • Large-Scale High-Resolution Computational Validation of Novel Complexity Models in Linear Cryptanalysis In Journal of Computational and Applied Mathematics, Volume 259, part B, pp. 592-598. Elsevier, 2014
    Andrey Bogdanov, Elif Bilge Kavun, Elmar Tischhauser, Tolga Yalçýn
    (See online at https://doi.org/10.1016/j.cam.2013.10.020)
  • Lattice-base Proxy Re-encryption Public-Key Cryptography - PKC 2014, Volume 8383, Lecture Notes in Computer Science, pp. 77-94
    Elena Kirshanova
    (See online at https://doi.org/10.1007/978-3-642-54631-0_5)
  • Leveraging Semantic Signatures for Bug Search in Binary Programs. Annual Computer Security Applications Conference (ACSAC), New Orleans, USA, December 2014
    Jannik Pewny, Felix Schuster, Lukas Bernhard, Christian Rossow, Thorsten Holz
    (See online at https://doi.org/10.1145/2664243.2664269)
  • On Password Guessing with GPUs and FPGAs. In Proc. International Conference on Passwords (PasswordCon), Springer, 2014
    Markus Dürmuth, Thorsten Kranz
    (See online at https://doi.org/10.1007/978-3-319-24192-0_2)
  • Randomized Response Schemes, Privacy and Usefulness In Proceedings of the 7th ACM Workshop on Artificial Intelligence and Security, pp. 15-26, ACM, 2014
    Francesco Aldà, Hans Ulrich Simon
    (See online at https://doi.org/10.1145/2666652.2666654)
  • Reducing the Cost of Breaking Audio CAPTCHAs by Active and Semi-Supervised Learning. ICMLA, Detroit, USA, December 2014
    Malte Darnstädt, Hendrik Meutzner, Dorothea Kolossa
    (See online at https://doi.org/10.1109/icmla.2014.16)
  • Secure Fallback Authentication and the Trusted Friend Attack In Proc. International Conference on Distributed Computing Systems Workshops (ICDCSWorkshops), 2014
    Ashar Javed, David Bletgen, Florian Kohlar, Markus Dürmuth, Jörg Schwenk
    (See online at https://doi.org/10.1109/icdcsw.2014.30)
  • Simple Chosen-Ciphertext Security from Low-Noise LPN. Public Key Cryptography 2014
    Eike Kiltz, Daniel Masny, Krzysztof Pietrzak
    (See online at https://doi.org/10.1007/978-3-642-54631-0_1)
  • Statistics on Password Re-use and Adaptive Strength for Financial Accounts In Proc. 9th International Conference on Security and Cryptography (SCN), 2014
    Daniel Bailey, Markus Dürmuth, Christof Paar
    (See online at https://doi.org/10.1007/978-3-319-10879-7_13)
  • Typing Passwords with Voice Recognition –or- How to Authenticate to Google Glass Adventures in Authentication: WAY Workshop. 2014
    Daniel Bailey, Markus Dürmuth, Christof Paar
  • Using Automatic Speech Recognition for Attacking Acoustic CAPTCHAs: The Trade-off between Usability and Security. ACSAC, New Orleans, USA, December 2014
    Hendrik Meutzner, Viet-Hung Nguyen, Thorsten Holz, Dorothea Kolossa
    (See online at https://doi.org/10.1145/2664243.2664262)
  • You Can Run but You Can’t Read: Preventing Disclosure Exploits in Executable Code. 21st ACM Conference on Computer and Communications Security (CCS), Scottsdale, Arizona, USA, November 2014
    Michael Backes, Thorsten Holz, Benjamin Kollenda, Philipp Koppe, Stefan Nürnberger, Jannik Pewny
    (See online at https://doi.org/10.1145/2660267.2660378)
  • Analyzing permutations for AES-like ciphers: Understanding ShiftRows Topics in Cryptology — CT-RSA 2015, Volume 9048 of Lecture Notes in Computer Science, pp. 37-58. Springer International Publishing, 2015
    Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger
    (See online at https://doi.org/10.1007/978-3-319-16715-2_3)
  • Constructing Secure Audio CAPTCHAs by Exploiting Differences between Humans and Machines. CHI, Seoul, Korea, April 2015
    Hendrik Meutzner, Santosh Gupta, Dorothea Kolossa
    (See online at https://doi.org/10.1145/2702123.2702127)
  • Cross-Architecture Bug Search in Binary Executables 36th IEEE Symposium on Security and Privacy, San Jose, May 2015
    Jannik Pewny, Behrad Garmany, Robert Gawlik, Christian Rossow, Thorsten Holz
    (See online at https://doi.org/10.1109/sp.2015.49)
  • Implementation and Improvement of the Partial Sum Attack on 6-Round AES In Physical and Data-Link Security Techniques for Future Communication Systems, Volume 358 of Lecture Notes in Electrical Engineering, pp. 181-195, Springer, 2015
    Francesco Aldà, Riccardo Aragona, Lorenzo Nicolodi, Massimiliano Sala
    (See online at https://doi.org/10.1007/978-3-319-23609-4_12)
  • Leakage Assessment Methodology - A Clear Roadmap for Side-Channel Evaluations Cryptographic Hardware and Embedded Systems (CHES) 2015 - 17th International Workshop, Saint- Malo, France, September 13-16, 2015. Springer, 2015, 9293, pp. 495-513
    Tobias Schneider, Amir Moradi
    (See online at https://doi.org/10.1007/978-3-662-48324-4_25)
  • Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice. ACNS 2015
    Marcin Andrychowicz, Daniel Masny, Edoardo Persichetti
    (See online at https://doi.org/10.1007/978-3-319-28166-7_32)
  • On Locational Privacy in the Absence of Anonymous Payments 2015. Privacy & Data Protection (CPDP)
    Tilman Frosch, Sven Schäge, Martin Goll, Thorsten Holz
    (See online at https://doi.org/10.1007/978-94-017-7376-8_4)
  • On the Selective Opening Security of Practical Public-Key 2015 Encryption Schemes pp. 25-51 in Jonathan Katz (Ed.): Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015. Proceedings. Lecture Notes in Computer Science 9020, Springer 2015, ISBN 978-3-662-46446-5
    Felix Heuer, Tibor Jager, Eike Kiltz, Sven Schäge
    (See online at https://doi.org/10.1007/978-3-662-46447-2_2)
  • Tight Security For Signatures Without Random Oracles 2015 pp. 641-670, Volume 28/3 in Journal of Cryptology. Springer US, July 2015
    Sven Schäge
    (See online at https://doi.org/10.1007/s00145-013-9173-6)
  • TOPAS: 2-Pass Key Exchange with Full Perfect Forward 2015 Secrecy and Optimal Communication Complexity Page 1224_1235, in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications CCS 2015, Denver, US, October 12-15, 2015. Proceedings. ACM, New York, NY, US, 2015, ISBN: 978-1-4503-3832-5
    Sven Schäge
    (See online at https://doi.org/10.1145/2810103.2813683)
  • Chosen-Ciphertext Security from Subset Sum. Public Key Cryptography (1) 2016: pp. 35-46
    Sebastian Faust, Daniel Masny, Daniele Venturi
    (See online at https://doi.org/10.1007/978-3-662-49384-7_2)
  • Environmentally Robust Audio-Visual Speaker Identification. SLT 2016: pp. 312-318
    Lea Schönherr, Dennis Orth, Martin Heckmann, Dorothea Kolossa
    (See online at https://doi.org/10.1109/slt.2016.7846282)
  • EvilCoder: automated bug insertion. ACSAC 2016: pp. 214-225
    Jannik Pewny, Thorsten Holz
    (See online at https://doi.org/10.1145/2991079.2991103)
  • Neuralyzer: Flexible Expiration Times for the Revocation of Online Data ACM conference on Data and Application Security and Privacy (CODASPY) 2016
    Apostolis Zarras, Katharina Kohls, Markus Dürmuth, Christina Pöpper
    (See online at https://doi.org/10.1145/2857705.2857714)
  • On the Hardness of Learning with Rounding over Small Modulus. TCC (A1) 2016: pp. 209-224
    Andrej Bogdanov, Siyao Guo, Daniel Masny, Silas Richelson, Alon Rosen
    (See online at https://doi.org/10.1007/978-3-662-49096-9_9)
  • Side-Channel Analysis Protection and Low-Latency in Action - Case Study of PRINCE and Midori. ASIACRYPT (1) 2016: pp. 517-547
    Amir Moradi, Tobias Schneider
    (See online at https://doi.org/10.1007/978-3-662-53887-6_19)
  • "I want my money back!" Limiting Online Password-Guessing Financially. SOUPS 2017
    Maximilian Golla, Daniel V. Bailey, Markus Dürmuth
    (See online at https://doi.org/10.5040/9781350934603)
  • A Modular Analysis of the Fujisaki-Okamoto Transformation. TCC (1) 2017: pp. 341-371
    Dennis Hofheinz, Kathrin Hövelmanns, Eike Kiltz
    (See online at https://doi.org/10.1007/978-3-319-70500-2_12)
  • Amortizing Randomness Complexity in Private Circuits. ASIACRYPT (1) 2017: pp. 781-810
    Sebastian Faust, Clara Paglialonga, Tobias Schneider
    (See online at https://doi.org/10.1007/978-3-319-70694-8_27)
  • Consolidating Inner Product Masking. ASIACRYPT (1) 2017: pp. 724-754
    Josep Balasch, Sebastian Faust, Benedikt Gierlichs, Clara Paglialonga, François-Xavier Standaert
    (See online at https://doi.org/10.1007/978-3-319-70694-8_25)
  • Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers. IACR Trans. Symmetric Cryptol. 2017(1): pp. 474-505 (2017)
    Thorsten Kranz, Gregor Leander, Friedrich Wiemer
    (See online at https://doi.org/10.46586/tosc.v2017.i1.474-505)
  • LPN Decoded. CRYPTO (2) 2017: pp. 486-514
    Andre Esser, Robert Kübler, Alexander May
    (See online at https://doi.org/10.1007/978-3-319-63715-0_17)
  • Proving Resistance Against Invariant Attacks: How to Choose the Round Constants. CRYPTO (2) 2017: pp. 647-678
    Christof Beierle, Anne Canteaut, Gregor Leander, Yann Rotella
    (See online at https://doi.org/10.1007/978-3-319-63715-0_22)
  • Shorter Linear Straight-Line Programs for MDS Matrices. IACR Trans. Symmetric Cryptol. 2017(4): pp. 188-211 (2017)
    Thorsten Kranz, Gregor Leander, Ko Stoffelen, Friedrich Wiemer
    (See online at https://doi.org/10.46586/tosc.v2017.i4.188-211)
  • Spoofing detection via simultaneous verification of audio-visual synchronicity and transcription. ASRU 2017: pp. 591-598
    Lea Schönherr, Steffen Zeiler, Dorothea Kolossa
    (See online at https://doi.org/10.1109/asru.2017.8268990)
  • Syntia: Synthesizing the Semantics of Obfuscated Code. USENIX Security Symposium 2017: pp. 643-659
    Tim Blazytko, Moritz Contag, Cornelius Aschermann, Thorsten Holz
  • Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables. DSN 2017: pp. 189-200
    Benjamin Kollenda, Enes Göktas, Tim Blazytko, Philipp Koppe, Robert Gawlik, Radhesh Krishnan Konoth, Cristiano Giuffrida, Herbert Bos, Thorsten Holz
    (See online at https://doi.org/10.1109/dsn.2017.58)
  • Towards Implicit Visual Memory-Based Authentication. NDSS 2017
    Claude Castelluccia, Markus Dürmuth, Maximilian Golla, Fatma Deniz
    (See online at https://doi.org/10.14722/ndss.2017.23292)
  • Traffic Analysis Attacks in Anonymity Networks. AsiaCCS 2017: pp. 917-919
    Katharina Kohls, Christina Pöpper
    (See online at https://doi.org/10.1145/3052973.3055159)
  • Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding. CoRR abs/1808.05665 (2018)
    Lea Schönherr, Katharina Kohls, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa
    (See online at https://doi.org/10.14722/ndss.2019.23288)
  • Composable Masking Schemes in the Presence of Physical Defaults & the Robust Probing Model. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3): pp. 89-120 (2018)
    Sebastian Faust, Vincent Grosso, Santos Merino Del Pozo, Clara Paglialonga, François-Xavier Standaert
    (See online at https://doi.org/10.46586/tches.v2018.i3.89-120)
  • DigesTor: Comparing Passive Traffic Analysis Attacks on Tor. ESORICS (1) 2018: pp. 512-530
    Katharina Kohls, Christina Pöpper
    (See online at https://doi.org/10.1007/978-3-319-99073-6_25)
  • Dissection-BKW. CRYPTO (2) 2018: pp. 638-666
    Andre Esser, Felix Heuer, Robert Kübler, Alexander May, Christian Sohler
    (See online at https://doi.org/10.1007/978-3-319-96881-0_22)
  • Nonlinear Approximations in Cryptanalysis Revisited. IACR Trans. Symmetric Cryptol. 2018(4): pp. 80-101 (2018)
    Christof Beierle, Anne Canteaut, Gregor Leander
    (See online at https://doi.org/10.46586/tosc.v2018.i2.20-47)
  • Rethinking Access Control and Authentication for the Home Internet of Things (IoT). USENIX Security Symposium 2018: 255-272
    Weijia He, Maximilian Golla, Roshni Padhi, Jordan Ofek, Markus Dürmuth, Earlence Fernandes, Blase Ur
  • Searching for Subspace Trails and Truncated Differentials. IACR Trans. Symmetric Cryptol. 2018(1): pp. 74-100 (2018)
    Gregor Leander, Cihangir Tezcan, Friedrich Wiemer
    (See online at https://doi.org/10.46586/tosc.v2018.i1.74-100)
  • ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny. IACR Trans. Symmetric Cryptol. 2018(2): 20-47 (2018)
    Gianira N. Alfarano, Christof Beierle, Takanori Isobe, Stefan Kölbl, Gregor Leander
    (See online at https://doi.org/10.46586/tosc.v2018.i2.20-47)
  • Towards Automated Generation of Exploitation Primitives for Web Browsers. ACSAC 2018: pp. 300-312
    Behrad Garmany, Martin Stoffel, Robert Gawlik, Philipp Koppe, Tim Blazytko, Thorsten Holz
    (See online at https://doi.org/10.1145/3274694.3274723)
  • Wi-Fi Network Testing Using an Integrated Evil-Twin Framework. IoTSMS 2018: pp. 216-221
    Andre Esser, Carlos Serrão
    (See online at https://doi.org/10.1109/iotsms.2018.8554388)
 
 

Additional Information

Textvergrößerung und Kontrastanpassung