Raphael Spreitzer
Raphael Spreitzer
SGS Digital Trust Services
Bestätigte E-Mail-Adresse bei sgs.com - Startseite
TitelZitiert vonJahr
ARMageddon: Cache Attacks on Mobile Devices
M Lipp, D Gruss, R Spreitzer, C Maurice, S Mangard
USENIX Security Symposium (USENIX Security 16), 549-564, 2016
1982016
Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches
D Gruss, R Spreitzer, S Mangard
USENIX Security Symposium (USENIX Security 15), 897-912, 2015
1782015
PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices
R Spreitzer
Security and Privacy in Smartphones & Mobile Devices (SPSM@CCS), 51-62, 2014
682014
Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices
R Spreitzer, V Moonsamy, T Korak, S Mangard
IEEE Communications Surveys and Tutorials, 2017
442017
Cache-Access Pattern Attack on Disaligned AES T-Tables
R Spreitzer, T Plos
Constructive Side-Channel Analysis and Secure Design (COSADE), 200-214, 2013
382013
On the Applicability of Time-Driven Cache Attacks on Mobile Devices
R Spreitzer, T Plos
Network and System Security (NSS), 656-662, 2013
31*2013
Towards More Practical Time-Driven Cache Attacks
R Spreitzer, B Gérard
Information Security Theory and Practice (WISTP), 24-39, 2014
262014
KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks
M Schwarz, M Lipp, D Gruss, S Weiser, C Maurice, R Spreitzer, ...
Network and Distributed Systems Security (NDSS), 2018
212018
Adding Controllable Linkability to Pairing-Based Group Signatures For Free
D Slamanig, R Spreitzer, T Unterluggauer
Information Security (ISC), 388-400, 2014
202014
Privacy-Aware Authentication in the Internet of Things
H Gross, M Hölbl, D Slamanig, R Spreitzer
Cryptology and Network Security (CANS), 32-39, 2015
152015
Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android
R Spreitzer, S Griesmayr, T Korak, S Mangard
Security & Privacy in Wireless and Mobile Networks (WiSec), 49-60, 2016
142016
DATA - Differential Address Trace Analysis: Finding Address-based Side-Channels in Binaries
S Weiser, A Zankl, R Spreitzer, K Miller, S Mangard, G Sigl
USENIX Security Symposium (USENIX Security 18), 603-620, 2018
102018
ProcHarvester: Fully Automated Analysis of Procfs Side-Channel Leaks on Android
R Spreitzer, F Kirchengast, D Gruss, S Mangard
ASIA Conference on Computer and Communications Security (AsiaCCS), 749-763, 2018
92018
Group-Signature Schemes on Constrained Devices: The Gap Between Theory and Practice
R Spreitzer, JM Schmidt
Cryptography and Security in Computing Systems (CS2), 31-36, 2014
92014
Single Trace Attack Against RSA Key Generation in Intel SGX SSL
S Weiser, R Spreitzer, L Bodner
ASIA Conference on Computer and Communications Security (AsiaCCS), 575-586, 2018
82018
Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability
O Blazy, D Derler, D Slamanig, R Spreitzer
Topics in Cryptology (CT-RSA), 127-143, 2016
82016
Concept for a Security Aware Automatic Fare Collection System Using HF/UHF Dual Band RFID Transponders
L Zöscher, J Grosinger, R Spreitzer, U Muehlmann, H Gross, W Bösch
European Solid State Device Research Conference (ESSDERC), 194-197, 2015
72015
Linking-Based Revocation for Group Signatures: A Pragmatic Approach for Efficient Revocation Checks
D Slamanig, R Spreitzer, T Unterluggauer
International Conference on Cryptology in Malaysia (Mycrypt), 364-388, 2016
6*2016
HF/UHF Dual Band RFID Transponders for an Information-Driven Public Transportation System
L Zöscher, R Spreitzer, H Gross, J Grosinger, U Mühlmann, D Amschl, ...
e & i Elektrotechnik und Informationstechnik 133 (3), 163-175, 2016
52016
Automated Binary Analysis on iOS - A Case Study on Cryptographic Misuse in iOS Applications
J Feichtner, D Missmann, R Spreitzer
Security and Privacy in Wireless and Mobile Networks (WiSec), 236-247, 2018
32018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20