


Остановите войну!
for scientists:


default search action
Jean-Pierre Seifert
Person information

- affiliation: Telekom Innovation Laboratories, Berlin, Germany
- affiliation: Technical University of Berlin, Department of Mathematics, Germany
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j25]Niklas Pirnay
, Anna Pappa, Jean-Pierre Seifert:
Learning classical readout quantum PUFs based on single-qubit gates. Quantum Mach. Intell. 4(2): 1-10 (2022) - [j24]Nils Wisiol
, Bipana Thapaliya
, Khalid T. Mursi
, Jean-Pierre Seifert, Yu Zhuang:
Neural Network Modeling Attacks on Arbiter-PUF-Based Designs. IEEE Trans. Inf. Forensics Secur. 17: 2719-2731 (2022) - [c133]Soundes Marzougui, Nils Wisiol, Patrick Gersch, Juliane Krämer, Jean-Pierre Seifert:
Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS. ARES 2022: 34:1-34:11 - [c132]Sajjad Parvin, Thilo Krachenfels, Shahin Tajik, Jean-Pierre Seifert, Frank Sill Torres, Rolf Drechsler:
Toward Optical Probing Resistant Circuits: A Comparison of Logic Styles and Circuit Design Techniques. ASP-DAC 2022: 429-435 - [c131]Nils Wisiol, Patrick Gersch, Jean-Pierre Seifert:
Cycle-Accurate Power Side-Channel Analysis Using the ChipWhisperer: A Case Study on Gaussian Sampling. CARDIS 2022: 205-224 - [c130]Vincent Quentin Ulitzsch, Shinjo Park, Soundes Marzougui, Jean-Pierre Seifert:
A Post-Quantum Secure Subscription Concealed Identifier for 6G. WISEC 2022: 157-168 - [i56]Marcel Hinsche, Marios Ioannou, Alexander Nietner
, Jonas Haferkamp, Yihui Quek, Dominik Hangleiter
, Jean-Pierre Seifert, Jens Eisert, Ryan Sweke:
A single T-gate makes distribution learning hard. CoRR abs/2207.03140 (2022) - [i55]Niclas Kühnapfel, Robert Buhren, Hans Niklas Jacob, Thilo Krachenfels, Christian Werling, Jean-Pierre Seifert:
EM-Fault It Yourself: Building a Replicable EMFI Setup for Desktop and Server Hardware. CoRR abs/2209.09835 (2022) - [i54]Niklas Pirnay, Ryan Sweke, Jens Eisert, Jean-Pierre Seifert:
A super-polynomial quantum-classical separation for density modelling. CoRR abs/2210.14936 (2022) - [i53]Niklas Pirnay, Vincent Ulitzsch, Frederik Wilde, Jens Eisert, Jean-Pierre Seifert:
A super-polynomial quantum advantage for combinatorial optimization problems. CoRR abs/2212.08678 (2022) - [i52]Soundes Marzougui, Vincent Ulitzsch, Mehdi Tibouchi, Jean-Pierre Seifert:
Profiling Side-Channel Attacks on Dilithium: A Small Bit-Fiddling Leak Breaks It All. IACR Cryptol. ePrint Arch. 2022: 106 (2022) - [i51]Vincent Ulitzsch, Jean-Pierre Seifert:
Breaking the quadratic barrier: Quantum cryptanalysis of Milenage, telecommunications' cryptographic backbone. IACR Cryptol. ePrint Arch. 2022: 733 (2022) - [i50]Nils Wisiol, Patrick Gersch, Jean-Pierre Seifert:
Cycle-Accurate Power Side-Channel Analysis Using the ChipWhisperer: a Case Study on Gaussian Sampling. IACR Cryptol. ePrint Arch. 2022: 903 (2022) - 2021
- [j23]Soroush M. Sohi, Jean-Pierre Seifert, Fatemeh Ganji:
RNNIDS: Enhancing network intrusion detection systems through deep learning. Comput. Secur. 102: 102151 (2021) - [j22]Fatemeh Ganji, Shahin Tajik, Pascal Stauss, Jean-Pierre Seifert, Mark M. Tehranipoor, Domenic Forte
:
Rock'n'roll PUFs: crafting provably secure pufs from less secure ones (extended version). J. Cryptogr. Eng. 11(2): 105-118 (2021) - [j21]Ryan Sweke, Jean-Pierre Seifert, Dominik Hangleiter
, Jens Eisert:
On the Quantum versus Classical Learnability of Discrete Distributions. Quantum 5: 417 (2021) - [c129]Felicitas Hetzelt, Martin Radev, Robert Buhren, Mathias Morbitzer, Jean-Pierre Seifert:
VIA: Analyzing Device Interfaces of Protected Virtual Machines. ACSAC 2021: 273-284 - [c128]Julian Fietkau, David Pascal Runge, Jean-Pierre Seifert:
Free by Design: On the Feasibility of Free-Riding Attacks Against Zero-Rated Services. CANS 2021: 315-333 - [c127]Thilo Krachenfels, Jean-Pierre Seifert, Shahin Tajik:
Trojan Awakener: Detecting Dormant Malicious Hardware Using Laser Logic State Imaging. ASHES@CCS 2021: 17-27 - [c126]Elias Heftrig, Jean-Pierre Seifert, Haya Shulman, Michael Waidner, Nils Wisiol:
Predictive Cipher-Suite Negotiation for Boosting Deployment of New Ciphers. CCS 2021: 2423-2425 - [c125]Robert Buhren, Hans Niklas Jacob, Thilo Krachenfels
, Jean-Pierre Seifert:
One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization. CCS 2021: 2875-2889 - [c124]Ilia Polian, Frank Altmann, Tolga Arul, Christian Boit, Ralf Brederlow, Lucas Davi, Rolf Drechsler, Nan Du
, Thomas Eisenbarth
, Tim Güneysu, Sascha Hermann, Matthias Hiller, Rainer Leupers, Farhad Merchant, Thomas Mussenbrock, Stefan Katzenbeisser, Akash Kumar, Wolfgang Kunz, Thomas Mikolajick, Vivek Pachauri, Jean-Pierre Seifert, Frank Sill Torres, Jens Trommer:
Nano Security: From Nano-Electronics to Secure Systems. DATE 2021: 1334-1339 - [c123]Otto Bittner, Thilo Krachenfels
, Andreas Galauner, Jean-Pierre Seifert:
The Forgotten Threat of Voltage Glitching: A Case Study on Nvidia Tegra X2 SoCs. FDTC 2021: 86-97 - [c122]Thilo Krachenfels
, Fatemeh Ganji, Amir Moradi
, Shahin Tajik, Jean-Pierre Seifert:
Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model. IEEE Symposium on Security and Privacy 2021: 1955-1971 - [c121]Thilo Krachenfels, Tuba Kiyan, Shahin Tajik, Jean-Pierre Seifert:
Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks. USENIX Security Symposium 2021: 627-644 - [c120]Elham Amini, Kai Bartels, Christian Boit, Marius Eggert, Norbert Herfurth, Tuba Kiyan, Thilo Krachenfels
, Jean-Pierre Seifert, Shahin Tajik:
Special Session: Physical Attacks through the Chip Backside: Threats, Challenges, and Opportunities. VTS 2021: 1-12 - [c119]Julian Fietkau, Kashyap Thimmaraju, Felix Kybranz, Sebastian Neef
, Jean-Pierre Seifert:
The Elephant in the Background: A Quantitative Approachto Empower Users Against Web Browser Fingerprinting. WPES@CCS 2021: 167-180 - [i49]Thilo Krachenfels, Tuba Kiyan, Shahin Tajik, Jean-Pierre Seifert:
Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks. CoRR abs/2102.11656 (2021) - [i48]Thilo Krachenfels, Jean-Pierre Seifert, Shahin Tajik:
Trojan Awakener: Detecting Dormant Malicious Hardware Using Laser Logic State Imaging. CoRR abs/2107.10147 (2021) - [i47]Robert Buhren, Hans Niklas Jacob, Thilo Krachenfels, Jean-Pierre Seifert:
One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization. CoRR abs/2108.04575 (2021) - [i46]Otto Bittner, Thilo Krachenfels, Andreas Galauner, Jean-Pierre Seifert:
The Forgotten Threat of Voltage Glitching: A Case Study on Nvidia Tegra X2 SoCs. CoRR abs/2108.06131 (2021) - [i45]Soundes Marzougui, Nils Wisiol, Patrick Gersch, Juliane Krämer, Jean-Pierre Seifert:
Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS. CoRR abs/2109.09461 (2021) - [i44]Felicitas Hetzelt, Martin Radev, Robert Buhren, Mathias Morbitzer, Jean-Pierre Seifert:
VIA: Analyzing Device Interfaces of Protected Virtual Machines. CoRR abs/2109.10660 (2021) - [i43]Marcel Hinsche, Marios Ioannou, Alexander Nietner
, Jonas Haferkamp, Yihui Quek, Dominik Hangleiter
, Jean-Pierre Seifert, Jens Eisert, Ryan Sweke:
Learnability of the output distributions of local quantum circuits. CoRR abs/2110.05517 (2021) - [i42]Anna Pappa, Niklas Pirnay, Jean-Pierre Seifert:
Learning Classical Readout Quantum PUFs based on single-qubit gates. CoRR abs/2112.06661 (2021) - [i41]Nils Wisiol, Khalid T. Mursi, Jean-Pierre Seifert, Yu Zhuang:
Neural-Network-Based Modeling Attacks on XOR Arbiter PUFs Revisited. IACR Cryptol. ePrint Arch. 2021: 555 (2021) - 2020
- [j20]Thilo Krachenfels
, Heiko Lohrke, Jean-Pierre Seifert, Enrico Dietz, Sven Frohmann, Heinz-Wilhelm Hübers:
Evaluation of Low-Cost Thermal Laser Stimulation for Data Extraction and Key Readout. J. Hardw. Syst. Secur. 4(1): 24-33 (2020) - [j19]Nils Wisiol, Christopher Mühl, Niklas Pirnay, Phuong Ha Nguyen, Marian Margraf, Jean-Pierre Seifert, Marten van Dijk, Ulrich Rührmair:
Splitting the Interpose PUF: A Novel Modeling Attack Strategy. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3): 97-120 (2020) - [c118]Fatemeh Ganji, Sarah Amir, Shahin Tajik, Domenic Forte
, Jean-Pierre Seifert:
Pitfalls in Machine Learning-based Adversary Modeling for Hardware Systems. DATE 2020: 514-519 - [c117]Dokyung Song, Felicitas Hetzelt, Jonghwan Kim, Brent ByungHoon Kang, Jean-Pierre Seifert, Michael Franz:
Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints. USENIX Security Symposium 2020: 2541-2557 - [i40]Thilo Krachenfels, Heiko Lohrke, Jean-Pierre Seifert, Enrico Dietz, Sven Frohmann, Heinz-Wilhelm Hübers:
Evaluation of Low-Cost Thermal Laser Stimulation for Data Extraction and Key Readout. CoRR abs/2006.06290 (2020) - [i39]Ryan Sweke, Jean-Pierre Seifert, Dominik Hangleiter
, Jens Eisert:
On the Quantum versus Classical Learnability of Discrete Distributions. CoRR abs/2007.14451 (2020) - [i38]Thilo Krachenfels, Fatemeh Ganji, Amir Moradi, Shahin Tajik, Jean-Pierre Seifert:
Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model. CoRR abs/2009.04263 (2020)
2010 – 2019
- 2019
- [j18]Fatemeh Ganji
, Domenic Forte
, Jean-Pierre Seifert:
PUFmeter a Property Testing Tool for Assessing the Robustness of Physically Unclonable Functions to Machine Learning Attacks. IEEE Access 7: 122513-122521 (2019) - [c116]Robert Buhren, Christian Werling, Jean-Pierre Seifert:
Insecure Until Proven Updated: Analyzing AMD SEV's Remote Attestation. CCS 2019: 1087-1099 - [c115]Shinjo Park, Altaf Shaik, Ravishankar Borgaonkar, Jean-Pierre Seifert:
Anatomy of Commercial IMSI Catchers and Detectors. Krypto-Tag 2019 - [c114]Dokyung Song, Felicitas Hetzelt, Dipanjan Das, Chad Spensky, Yeoul Na, Stijn Volckaert, Giovanni Vigna, Christopher Kruegel, Jean-Pierre Seifert, Michael Franz:
PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary. NDSS 2019 - [c113]Fatemeh Ganji, Shahin Tajik, Pascal Stauss, Jean-Pierre Seifert, Domenic Forte, Mark M. Tehranipoor:
Rock'n'roll PUFs: Crafting Provably Secure PUFs from Less Secure Ones. PROOFS 2019: 33-48 - [c112]Altaf Shaik, Ravishankar Borgaonkar, Shinjo Park, Jean-Pierre Seifert:
New vulnerabilities in 4G and 5G cellular access network protocols: exposing device capabilities. WiSec 2019: 221-231 - [c111]Shinjo Park, Altaf Shaik, Ravishankar Borgaonkar, Jean-Pierre Seifert:
Anatomy of Commercial IMSI Catchers and Detectors. WPES@CCS 2019: 74-86 - [i37]Robert Buhren, Christian Werling, Jean-Pierre Seifert:
Insecure Until Proven Updated: Analyzing AMD SEV's Remote Attestation. CoRR abs/1908.11680 (2019) - [i36]Fatemeh Ganji, Shahin Tajik, Pascal Stauss, Jean-Pierre Seifert, Domenic Forte, Mark M. Tehranipoor:
Theoretical and Practical Approaches for Hardness Amplification of PUFs. IACR Cryptol. ePrint Arch. 2019: 534 (2019) - [i35]Fatemeh Ganji, Shahin Tajik, Domenic Forte, Jean-Pierre Seifert:
Blockchain-enabled Cryptographically-secure Hardware Obfuscation. IACR Cryptol. ePrint Arch. 2019: 928 (2019) - [i34]Nils Wisiol, Christopher Mühl, Niklas Pirnay, Phuong Ha Nguyen, Marian Margraf, Jean-Pierre Seifert, Marten van Dijk, Ulrich Rührmair:
Splitting the Interpose PUF: A Novel Modeling Attack Strategy. IACR Cryptol. ePrint Arch. 2019: 1473 (2019) - 2018
- [j17]Arnd Weber, Steffen Reith, Michael Kasper, Dirk Kuhlmann, Jean-Pierre Seifert, Christoph Krauß:
Souveränität und die IT-Wertschöpfungskette. Datenschutz und Datensicherheit 42(5): 291-293 (2018) - [j16]Alexander Oppermann
, Federico Grasso Toro, Florian Thiel, Jean-Pierre Seifert:
Secure Cloud Computing: Reference Architecture for Measuring Instrument under Legal Control. Secur. Priv. 1(3) (2018) - [j15]Heiko Lohrke, Shahin Tajik, Thilo Krachenfels, Christian Boit, Jean-Pierre Seifert:
Key Extraction Using Thermal Laser Stimulation A Case Study on Xilinx Ultrascale FPGAs. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3): 573-595 (2018) - [j14]Byeongdo Hong, Shinjo Park, Hongil Kim, Dongkwan Kim
, Hyunwook Hong, Hyunwoo Choi, Jean-Pierre Seifert, Sung-Ju Lee, Yongdae Kim:
Peeking Over the Cellular Walled Gardens - A Method for Closed Network Diagnosis -. IEEE Trans. Mob. Comput. 17(10): 2366-2380 (2018) - [c110]Alexander Oppermann, Federico Grasso Toro, Florian Thiel, Jean-Pierre Seifert:
Anomaly Detection Approaches for Secure Cloud Reference Architectures in Legal Metrology. CLOSER 2018: 549-556 - [c109]Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:
A Fourier Analysis Based Attack Against Physically Unclonable Functions. Financial Cryptography 2018: 310-328 - [c108]Alexander Oppermann, Marko Esche, Florian Thiel, Jean-Pierre Seifert:
Secure Cloud Computing: Risk Analysis for Secure Cloud Reference Architecture in Legal Metrology. FedCSIS 2018: 593-602 - [c107]Alexander Oppermann, Federico Grasso Toro, Florian Thiel, Jean-Pierre Seifert:
Secure cloud computing: Continuous anomaly detection approach in legal metrology. I2MTC 2018: 1-6 - [c106]Daniel Peters, Jan Wetzlich, Florian Thiel, Jean-Pierre Seifert:
Blockchain applications for legal metrology. I2MTC 2018: 1-6 - [c105]Arnd Weber, Steffen Reith, Dirk Kuhlmann, Michael Kasper, Jean-Pierre Seifert, Christoph Krauß
:
Open Source Value Chains for Addressing Security Issues Efficiently. QRS Companion 2018: 599-606 - [c104]Kashyap Thimmaraju, Bhargava Shastry, Tobias Fiebig
, Felicitas Hetzelt, Jean-Pierre Seifert, Anja Feldmann, Stefan Schmid
:
Taking Control of SDN-based Cloud Systems via the Data Plane. SOSR 2018: 1:1-1:15 - [c103]Altaf Shaik, Ravishankar Borgaonkar, Shinjo Park, Jean-Pierre Seifert:
On the Impact of Rogue Base Stations in 4G/LTE Self Organizing Networks. WISEC 2018: 75-86 - [c102]Julian Fietkau, Starbug, Jean-Pierre Seifert:
Swipe Your Fingerprints! How Biometric Authentication Simplifies Payment, Access and Identity Fraud. WOOT @ USENIX Security Symposium 2018 - [i33]Soroush M. Sohi, Fatemeh Ganji, Jean-Pierre Seifert:
Recurrent Neural Networks for Enhancement of Signature-based Network Intrusion Detection Systems. CoRR abs/1807.03212 (2018) - [i32]Heiko Lohrke, Shahin Tajik, Thilo Krachenfels, Christian Boit, Jean-Pierre Seifert:
Key Extraction using Thermal Laser Stimulation: A Case Study on Xilinx Ultrascale FPGAs. IACR Cryptol. ePrint Arch. 2018: 717 (2018) - 2017
- [j13]Fatemeh Ganji, Shahin Tajik, Fabian Fäßler, Jean-Pierre Seifert:
Having no mathematical model may not secure PUFs. J. Cryptogr. Eng. 7(2): 113-128 (2017) - [j12]Shahin Tajik, Enrico Dietz, Sven Frohmann, Helmar Dittrich, Dmitry Nedospasov, Clemens Helfmeier, Jean-Pierre Seifert, Christian Boit, Heinz-Wilhelm Hübers:
Photonic Side-Channel Analysis of Arbiter PUFs. J. Cryptol. 30(2): 550-571 (2017) - [c101]Kashyap Thimmaraju, Bhargava Shastry, Tobias Fiebig
, Felicitas Hetzelt, Jean-Pierre Seifert, Anja Feldmann, Stefan Schmid
:
The vAMP Attack: Taking Control of Cloud Systems via the Unified Packet Parser. CCSW@CCS 2017: 11-15 - [c100]Shahin Tajik, Heiko Lohrke, Jean-Pierre Seifert, Christian Boit:
On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs. CCS 2017: 1661-1674 - [c99]Robert Buhren, Shay Gueron, Jan Nordholz, Jean-Pierre Seifert, Julian Vetter:
Fault Attacks on Encrypted General Purpose Compute Platforms. CODASPY 2017: 197-204 - [c98]Daniel Peters, Johannes Fischer, Florian Thiel, Jean-Pierre Seifert:
FLOUDS: A Succinct File System Structure. FedCSIS (Position Papers) 2017: 51-57 - [c97]Jan Wetzlich, Martin Nischwitz, Florian Thiel, Jean-Pierre Seifert:
A Modular Testbed for Intelligent Meters and their Ecosystem. FedCSIS (Position Papers) 2017: 119-125 - [c96]Elad Carmon, Jean-Pierre Seifert, Avishai Wool:
Photonic side channel attacks against RSA. HOST 2017: 74-78 - [c95]Shahin Tajik, Julian Fietkau, Heiko Lohrke, Jean-Pierre Seifert, Christian Boit:
PUFMon: Security monitoring of FPGAs using physically unclonable functions. IOLTS 2017: 186-191 - [c94]Alexander Oppermann, Artem Yurchenko, Marko Esche, Jean-Pierre Seifert:
Secure Cloud Computing: Multithreaded Fully Homomorphic Encryption for Legal Metrology. ISDDC 2017: 35-54 - [c93]Alexander Oppermann, Federico Grasso Toro, Artem Yurchenko, Jean-Pierre Seifert:
Secure Cloud Computing: Communication Protocol for Multithreaded Fully Homomorphic Encryption for Remote Data Processing. ISPA/IUCC 2017: 503-510 - [c92]Bhargava Shastry, Markus Leutner, Tobias Fiebig
, Kashyap Thimmaraju, Fabian Yamaguchi, Konrad Rieck, Stefan Schmid, Jean-Pierre Seifert, Anja Feldmann:
Static Program Analysis as a Fuzzing Aid. RAID 2017: 26-47 - [c91]Shinjo Park, Altaf Shaik, Ravishankar Borgaonkar, Andrew Martin, Jean-Pierre Seifert:
White-Stingray: Evaluating IMSI Catchers Detection Applications. WOOT 2017 - [c90]Bhargava Shastry, Federico Maggi, Fabian Yamaguchi, Konrad Rieck, Jean-Pierre Seifert:
Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing. WOOT 2017 - [c89]Tommi Unruh, Bhargava Shastry, Malte Skoruppa, Federico Maggi, Konrad Rieck, Jean-Pierre Seifert, Fabian Yamaguchi:
Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery. WOOT 2017 - [i31]Tommi Unruh, Bhargava Shastry, Malte Skoruppa, Federico Maggi, Konrad Rieck, Jean-Pierre Seifert, Fabian Yamaguchi:
Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery. CoRR abs/1704.02786 (2017) - [i30]Bhargava Shastry, Federico Maggi, Fabian Yamaguchi, Konrad Rieck, Jean-Pierre Seifert:
Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing. CoRR abs/1706.00206 (2017) - [i29]Elad Carmon, Jean-Pierre Seifert, Avishai Wool:
Photonic Side Channel Attacks Against RSA. IACR Cryptol. ePrint Arch. 2017: 108 (2017) - [i28]Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:
Noise-Tolerant Machine Learning Attacks against Physically Unclonable Functions. IACR Cryptol. ePrint Arch. 2017: 551 (2017) - [i27]Shahin Tajik, Heiko Lohrke, Jean-Pierre Seifert, Christian Boit:
On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs. IACR Cryptol. ePrint Arch. 2017: 822 (2017) - 2016
- [j11]Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:
PAC learning of arbiter PUFs. J. Cryptogr. Eng. 6(3): 249-258 (2016) - [c88]Shinjo Park, Altaf Shaik, Ravishankar Borgaonkar, Jean-Pierre Seifert:
White Rabbit in Mobile: Effect of Unsecured Clock Source in Smartphones. SPSM@CCS 2016: 13-21 - [c87]Heiko Lohrke, Shahin Tajik, Christian Boit, Jean-Pierre Seifert:
No Place to Hide: Contactless Probing of Secret Data on FPGAs. CHES 2016: 147-167 - [c86]Fatemeh Ganji, Shahin Tajik, Fabian Fäßler, Jean-Pierre Seifert:
Strong Machine Learning Attack Against PUFs with No Mathematical Model. CHES 2016: 391-411 - [c85]Alexander Oppermann, Jean-Pierre Seifert, Florian Thiel:
Secure Cloud Reference Architectures for Measuring Instruments under Legal Control. CLOSER (1) 2016: 289-294 - [c84]Elad Carmon, Jean-Pierre Seifert, Avishai Wool:
Simple Photonic Emission Attack with Reduced Data Complexity. COSADE 2016: 35-51 - [c83]Ágnes Kiss, Juliane Krämer, Pablo Rauzy
, Jean-Pierre Seifert:
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT. COSADE 2016: 111-129 - [c82]Bhargava Shastry, Fabian Yamaguchi, Konrad Rieck, Jean-Pierre Seifert:
Towards Vulnerability Discovery Using Staged Program Analysis. DIMVA 2016: 78-97 - [c81]Anja Feldmann, Philipp Heyder, Michael Kreutzer, Stefan Schmid
, Jean-Pierre Seifert, Haya Shulman, Kashyap Thimmaraju, Michael Waidner, Jens Sieberg:
NetCo: Reliable Routing With Unreliable Routers. DSN Workshops 2016: 128-135 - [c80]Altaf Shaik, Jean-Pierre Seifert, Ravishankar Borgaonkar, N. Asokan, Valtteri Niemi:
Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems. NDSS 2016 - [i26]Kashyap Thimmaraju, Bhargava Shastry, Tobias Fiebig, Felicitas Hetzelt, Jean-Pierre Seifert, Anja Feldmann, Stefan Schmid:
Reigns to the Cloud: Compromising Cloud Systems via the Data Plane. CoRR abs/1610.08717 (2016) - [i25]Robert Buhren, Shay Gueron, Jan Nordholz, Jean-Pierre Seifert, Julian Vetter:
Fault Attacks on Encrypted General Purpose Compute Platforms. CoRR abs/1612.03744 (2016) - [i24]Lejla Batina, Swarup Bhunia, Patrick Schaumont
, Jean-Pierre Seifert:
Foundations of Secure Scaling (Dagstuhl Seminar 16342). Dagstuhl Reports 6(8): 65-90 (2016) - [i23]Ágnes Kiss, Juliane Krämer, Pablo Rauzy, Jean-Pierre Seifert:
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT. IACR Cryptol. ePrint Arch. 2016: 238 (2016) - [i22]Heiko Lohrke, Shahin Tajik, Christian Boit, Jean-Pierre Seifert:
No Place to Hide: Contactless Probing of Secret Data on FPGAs. IACR Cryptol. ePrint Arch. 2016: 593 (2016) - [i21]Fatemeh Ganji, Shahin Tajik, Fabian Fäßler, Jean-Pierre Seifert:
Strong Machine Learning Attack against PUFs with No Mathematical Model. IACR Cryptol. ePrint Arch. 2016: 606 (2016) - 2015
- [j10]Daniel Peters, Michael Peter, Jean-Pierre Seifert, Florian Thiel:
A Secure System Architecture for Measuring Instruments in Legal Metrology. Comput. 4(2): 61-86 (2015) - [c79]Fatemeh Ganji, Juliane Krämer, Jean-Pierre Seifert, Shahin Tajik:
Lattice Basis Reduction Attack against Physically Unclonable Functions. CCS 2015: 1070-1080 - [c78]Shahin Tajik, Heiko Lohrke, Fatemeh Ganji, Jean-Pierre Seifert, Christian Boit:
Laser Fault Attack on Physically Unclonable Functions. FDTC 2015: 85-96 - [c77]Jean-Pierre Seifert, Michael Peter:
Automotive MILS. GI-Jahrestagung 2015: 1647 - [c76]Daniel Peters, Florian Thiel, Michael Peter, Jean-Pierre Seifert:
A secure software framework for Measuring Instruments in legal metrology. I2MTC 2015: 1596-1601 - [c75]Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:
Let Me Prove It to You: RO PUFs Are Provably Learnable. ICISC 2015: 345-358 - [c74]Michael Peter, Matthias Petschick, Julian Vetter, Jan Nordholz, Janis Danisevskis, Jean-Pierre Seifert:
Undermining Isolation Through Covert Channels in the Fiasco.OC Microkernel. ISCIS 2015: 147-156 - [c73]Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:
Why Attackers Win: On the Learnability of XOR Arbiter PUFs. TRUST 2015: 22-39 - [i20]Altaf Shaik, Ravishankar Borgaonkar, N. Asokan, Valtteri Niemi, Jean-Pierre Seifert:
Practical attacks against privacy and availability in 4G/LTE mobile communication systems. CoRR abs/1510.07563 (2015) - [i19]Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:
PAC Learning of Arbiter PUFs. IACR Cryptol. ePrint Arch. 2015: 378 (2015) - [i18]Shahin Tajik, Enrico Dietz, Sven Frohmann, Helmar Dittrich, Dmitry Nedospasov, Clemens Helfmeier, Jean-Pierre Seifert, Christian Boit, Heinz-Wilhelm Hübers:
A Complete and Linear Physical Characterization Methodology for the Arbiter PUF Family. IACR Cryptol. ePrint Arch. 2015: 871 (2015) - [i17]Elad Carmon, Jean-Pierre Seifert, Avishai Wool:
Simple Photonic Emission Attack with Reduced Data Complexity. IACR Cryptol. ePrint Arch. 2015: 1206 (2015) - 2014
- [j9]Xinwen Zhang, Jean-Pierre Seifert, Onur Aciiçmez:
Design and Implementation of Efficient Integrity Protection for Open Mobile Platforms. IEEE Trans. Mob. Comput. 13(1): 188-201 (2014) - [c72]Juliane Krämer, Michael Kasper, Jean-Pierre Seifert:
The role of photons in cryptanalysis. ASP-DAC 2014: 780-787 - [c71]Alexandra Mikityuk, Jean-Pierre Seifert,