Publications

Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types

2021 - Sergej Schumilo, Cornelius Aschermann, Ali Abbasi, Simon Wör­ner, Thorsten Holz

USENIX Security Symposium, Vancouver, Canada, August 2021

Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model

2021 - Thilo Krachenfels, Fatemeh Ganji, Amir Moradi, Shahin Tajik, Jean-Pierre Seifert

42nd IEEE Sym­po­si­um on Se­cu­ri­ty & Pri­va­cy (Oak­land), San Francisco, USA, May 23-27, 2021. [pdf]

On the Impact of Aging on Power Analysis Attacks Targeting Power-Equalized Cryptographic Circuits

2021 - Md Toufiq Hasan Anik, Bijan Fadaeinia, Amir Moradi, Naghmeh Karimi

26th Asia and South Pacific Design Automation Conference, ASP-DAC 2021, January 18-21, 2021

SoK: Managing Longitudinal Privacy of Publicly Shared Personal Online Data

2021 - Theodor Schnitzler, Shujaat Mirza, Markus Dürmuth, Christina Pöpper

Proceedings of Privacy Enhancing Technologies 2021, Volume 1, pp. 228-248, January 2021 [PDF]

Revisiting ECM on GPUs

2020 - Jonas Wloka, Jan Richter-Brockmann, Colin Stahlke, Thorsten Kleinjung, Christine Priplata, Tim Güneysu

19th International Conference on Cryptology and Network Security (CANS 2020), December 14-16, 2020, [pdf] [code]

SILVER - Statistical Independence and Leakage Verification

2020 - David Knichel, Pascal Sasdrich, Amir Moradi

26th Annual International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, Daejeon, Korea, December 6-10, 2020. [pdf] [GitHub]

Cupid: Automatic Fuzzer Selection for Collaborative Fuzzing

2020 - Emre Güler, Philipp Görz, Elia Geretto, Andrea Jemmett, Sebastian Österlund, Herbert Bos, Cristiano Giuffrida, Thorsten Holz

Annual Computer Security Applications Conference (ACSAC), Virtual, December 2020 [PDF]

Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems

2020 - Lea Schönherr, Thorsten Eisenhofer, Steffen Zeiler, Thorsten Holz, Do­ro­thea Kolossa

Annual Computer Security Applications Conference (ACSAC), Virtual, December 2020 [arXiv Preprint] [PDF]

More Than Just Good Passwords? A Study on Usability and Security Perceptions of Risk-based Authentication

2020 - Stephan Wiefling, Markus Dürmuth, Luigi Lo Iacono

Annual Computer Security Applications Conference (ACSAC '20). Austin, USA, December 7-11, 2020 [Website] [Paper]

Doppelganger Obfuscation - Exploring the Defensive and Offensive Aspects of Hardware Camouflaging

2020 - Max Hoffmann, Chris­tof Paar

IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 1, to appear.
Page: