Publication list for members of
E192 - Institute of Logic and Computation
E192-06 Security and Privacy
as authors or essentially involved persons
115 records (2011 - 2022)
Books and Book Editorships
M. Maffei, M. Ryan, P. Ah-Fat, M. Alabbad, M. Alvim, Z. Aslanyan, N. Atzei, K. Babel, M. Bartoletti, L. Bauer, A. Blot, S. Bursuc, P. Cañones, G. Casini, V. Cheval, T. Cimoli, M. Cramer, J. Dreier, C. Duménil, D. Hedin, M. Hicks, M. Huth, L. Jia, C. Johansen, O. Jones, R. Khedri, B. Köpf, S. Kremer, P. Laud, P. Mardziel, F. Nielson, M. Pettai, F. Piessens, W. Rafnsson, J. Reineke, A. Sabelfeld, R. Sasse, T. Terauchi, S. Xu, M. Yamamoto, A. Sjösten (ed.):
"Principles of Security and Trust";
Springer-Verlag,
Berlin, Heidelberg,
2017,
ISBN: 978-3-662-54454-9;
321 pages.
Publications in Scientific Journals
E. Andreeva, B. Mennink, B. Preneel:
"Open problems in hash function security";
Designs Codes and Cryptography,
77
(2015),
611
- 631.
C. Bodei, L. Ceragioli, P. Degano, R. Focardi, L. Galletta, F. Luccio, M. Tempesta, L. Veronese:
"FWS: Analyzing, Maintaining and Transcompiling Firewalls";
Journal of Computer Security,
29
(2021),
1;
77
- 134.
S. Calzavara, M. Squarcina, M. Tempesta, R. Focardi:
"Surviving the Web: A Journey into Web Session Security";
Acm Computing Surveys,
Volume 50 Issue 1
(2017),
13;
1
- 34.
S. Das, R. Focardi, F. Luccio, E. Markou, M. Squarcina:
"Gathering of robots in a ring with mobile faults";
Theoretical Computer Science,
Volume 764
(2019),
Volume 764;
42 pages.
M. Maffei, G. Malavolta, M. Reinert, D. Schröder:
"Group ORAM for Privacy and AccessControl in Outsourced Personal Records";
Journal of Computer Security,
vol. 27
(2019),
no. 1;
1
- 47.
P. Moreno-Sanchez, U. Mahmood, A. Kate:
"ClearChart: Ensuring integrity of consumer ratings in online marketplaces";
Computers & Security,
Computers & Security 78
(2018),
Volume 78;
90
- 102.
Contributions to Proceedings
H. Aghakhani, F. Gritti, F. Mecca, M. Lindorfer, S. Ortolani, D. Balzarotti, G. Vigna, C. Krügel:
"When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features";
in: "Network and Distributed System Security Symposium (NDSS)",
Internet Society,
2020,
ISBN: 1-891562-61-4.
E. Andreeva, A. Bhati, D. Vizár:
"Nonce-Misuse Security of the SAEF Authenticated Encryption Mode";
in: "27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020",
Lecture Notes in Computer Science, vol 12804;
issued by: Springer;
Springer LNCS,
Cham,
2021,
ISBN: 978-3-030-81651-3,
512
- 534.
E. Andreeva, R. Bhattacharyya, A. Roy:
"Compactness of Hashing Modes and Efficiency Beyond Merkle Tree";
in: "Advances in Cryptology - EUROCRYPT 2021",
LNCS, volume 12697;
issued by: Springer;
Springer,
Cham,
2021,
ISBN: 978-3-030-77885-9,
92
- 123.
E. Andreeva, A. Deprez, J. Bermudo Mera, A. Karmakar, A. Purnal:
"Optimized Software Implementations for the Lightweight Encryption Scheme ForkAE";
in: "CARDIS: International Conference on Smart Card Research and Advanced Applications",
LNCS, volume 12609;
issued by: Springer;
Springer,
Cham,
2021,
ISBN: 978-3-030-68486-0,
68
- 83.
E. Andreeva, J. Lallemand, A. Purnal, R. Reyhanitabar, A. Roy, D. Vizár:
"Forkcipher: A New Primitive for Authenticated Encryption of Very Short Messages";
in: "Advances in Cryptology - ASIACRYPT 2019",
issued by: Springer;
Springer LNCS,
Cham,
2019,
ISBN: 978-3-030-34620-1,
153
- 182.
E. Andreeva, A. Roy, J. Sauer:
"Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions";
in: "27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020",
LNCS, volume 12804;
issued by: Springer;
Springer LNCS,
Cham,
2021,
ISBN: 978-3-030-81651-3,
273
- 300.
B. Bauer, G. Fuchsbauer:
"Efficient Signatures on Randomizable Ciphertexts";
in: "Security and Cryptography for Networks - SCN 2020",
Springer,
2020,
359
- 381.
B. Bauer, G. Fuchsbauer, J. Loss:
"A Classification of Computational Assumptions in the Algebraic Group Model";
in: "Advances in Cryptology - CRYPTO 2020",
Springer,
2020,
121
- 151.
B. Bauer, G. Fuchsbauer, A. Plouviez:
"The One-More Discrete Logarithm Assumption in the Generic Group Model";
in: "Advances in Cryptology - ASIACRYPT 2021",
Lecture Notes in Computer Science, vol 13093;
Springer,
Springer Link,
2021,
ISBN: 978-3-030-92067-8,
587
- 617.
B. Bauer, G. Fuchsbauer, C. Qian:
"Transferable E-cash: A Cleaner Model and the First Practical Instantiation";
in: "Public-Key Cryptography - PKC 2021",
2;
Springer,
2021,
559
- 590.
C. Bodei, P. Degano, R. Focardi, L. Galletta, M. Tempesta:
"Transcompiling Firewalls";
in: "Principles of Security and Trust: 7th International Conference, POST 2018 Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018 Thessaloniki, Greece, April 14-20, 2018, Proceedings",
LNCS 10804;
issued by: ETAPS;
Springer International Publishing AG,
Cham,
2018,
ISBN: 978-3-319-89721-9,
303
- 324.
C. Bodei, P. Degano, L. Galletta, R. Focardi, M. Tempesta, L. Veronese:
"Language-Independent Synthesis of Firewall Policies";
in: "2018 IEEE European Symposium on Security and Privacy (EuroS&P 2018)",
issued by: Institute of Electrical and Electronics Engineers ( IEEE );
IEEE,
2018,
ISBN: 978-1-5386-4228-3,
92
- 106.
S. Calzavara, R. Focardi, W. Khan, M. Tempesta:
"Provably Sound Browser-Based Enforcement of Web Session Integrity";
in: "2014 IEEE 27th Computer Security Foundations Symposium",
IEEE Computer Society,
2014,
ISBN: 978-1-4799-4290-9,
366
- 380.
S. Calzavara, R. Focardi, M. Nemec, A. Rabitti, M. Squarcina:
"Postcards from the Post-HTTP World: Amplification of HTTPS Vulnerabilities in the Web Ecosystem";
in: "2019 IEEE Symposium on Security and Privacy (SP)",
issued by: IEEE;
IEEE,
2019,
ISBN: 978-1-5386-6661-6,
281
- 298.
S. Calzavara, M. Maffei, C. Schneidewind, M. Tempesta, M. Squarcina:
"WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring";
in: "Proceedings of the 27th USENIX Security Symposium",
27th;
issued by: USENIX Association Berkley, CA, USA;
USENIX,
2018,
ISBN: 978-1-931971-46-1,
1493
- 1510.
S. Calzavara, M. Squarcina, R. Focardi, M. Tempesta:
"Surviving the Web: A Journey into Web Session Security (Extended Abstract)";
in: "Proceedings of the 2018 World Wide Web Conference",
issued by: International World Wide Web Conferences Steering Committee Republic and Canton of Geneva, Switzerland ©2018;
ACM,
Schwitzerland,
2018,
ISBN: 978-1-4503-5640-4,
451
- 455.
P. Carter, C. Mulliner, M. Lindorfer, W. Robertson, E. Kirda:
"CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes";
in: "International Conference on Financial Cryptography and Data Security (FC)",
Springer,
2016,
ISBN: 978-3-662-54969-8,
231
- 249.
D. Catalano, G. Fuchsbauer, A. Soleimanian:
"Double-Authentication-Preventing Signatures in the Standard Model";
in: "Security and Cryptography for Networks - SCN 2020",
Springer,
2020,
338
- 358.
L. Ceragioli, L. Galletta, M. Tempesta:
"From Firewalls to Functions and Back";
in: "Proceedings of the Third Italian Conference on Cyber Security",
2315;
issued by: CEUR-WS.org;
CEUR-Proceedings,
Aachen,
2019,
ISSN: 1613-0073,
Paper ID 4,
13 pages.
A. Continella, Y. Fratantonio, M. Lindorfer, A. Puccetti, A. Zand, C. Krügel, G. Vigna:
"Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis";
in: "Network and Distributed System Security Symposium (NDSS)",
Internet Society,
2017.
V. Cortier, N. Grimm, J. Lallemand, M. Maffei:
"Equivalence Properties by Typing in Cryptographic Branching Protocols";
in: "Principles of Security and Trust",
LNCS 10804;
issued by: Springer, Cham;
Springer LNCS,
Schwitzerland,
2018,
ISBN: 978-3-319-89721-9,
160
- 187.
D. Deuber, M. Maffei, G. Malavolta, M. Rabkin, D. Schröder, M. Simkin:
"Functional Credentials";
in: "Proceedings on Privacy Enhancing Technologies",
Volume 2018: Issue 2;
issued by: De Gruyter Open;
Walter de Gruyter GmbH,
Berlin,
2018,
64
- 84.
P. Farshim, G. Fuchsbauer, A. Passelegue:
"Simpler Constructions of Asymmetric Primitives from Obfuscation";
in: "Progress in Cryptology - INDOCRYPT 2020",
Springer,
2020,
715
- 738.
G. Fuchsbauer, A. Plouviez, Y. Seurin:
"Blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic Group Model";
in: "Advances in Cryptology - EUROCRYPT 2020",
Springer,
2020,
63
- 95.
G. Girol, B. Farinier, S. Bardin:
"Not All Bugs Are Created Equal, But Robust Reachability Can Tell The Difference";
in: "Computer Aided Verification - 33rd International Conference",
vol 12759;
Springer LNCS,
2021,
ISBN: 978-3-030-81684-1,
669
- 693.
I. Gishchenko, M. Maffei, C. Schneidewind:
"Foundations and Tools for the Static Analysis of Ethereum Smart Contracts";
in: "Proceedings of the 30th International Conference on Computer-Aided Verification",
LNCS 10981;
G. Weissenbacher, H. Chockler (ed.);
issued by: Springer, Cham;
Springer Open,
2018,
ISBN: 978-3-319-96145-3,
51
- 78.
N. Grimm, K. Maillard, C. Fournet, C. Hritcu, M. Maffei, J. Protzenko, T. Ramananandro, N. Swamy, S. Zanella-Béguelin:
"A Monadic Framework for Relational Verification: Applied to Information Security, Program Equivalence, and Optimization.";
in: "Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and Proofs",
ACM Digital Library,
New York,
2018,
ISBN: 978-1-4503-5586-5,
130
- 145.
I. Grishchenko, C. Schneidewind, M. Maffei:
"A Semantic Framework for the Security Analysis of Ethereum smart contracts.";
in: "Principles of Security and Trust",
LNCS 10804;
issued by: Springer Link;
Springer Open,
Schwitzerland,
2018,
ISBN: 978-3-319-89721-9,
243
- 269.
D. Hedin, A. Sjösten, F. Piessens, A. Sabelfeld:
"A Principled Approach to Tracking Information Flow in the Presence of Libraries";
in: "6th International Conference on Principles of Security and Trust",
Springer,
2017,
ISBN: 978-3-662-54454-9,
49
- 70.
J. Katz, M. Maffei, G. Malavolta, D. Schröder:
"Subset Predicate Encryption and its Applications";
in: "Cryptology and Network Security",
LNCS 11261;
Springer International Publishing,
Cham, Switzerland,
2018,
ISBN: 978-3-030-02640-0,
115
- 134.
R. Konoth, E. Vineti, V. Moonsamy, M. Lindorfer, C. Krügel, H. Bos, G. Vigna:
"MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense";
in: "Proceedings of the 2018 ACM Conference on Computer and Communications Security (CCS)",
ACM (ed.);
ACM,
2018,
ISBN: 978-1-4503-5693-0,
1714
- 1730.
M. Lindorfer, A. Di Federico, F. Maggi, P. Milani Comparetti, S. Zanero:
"Lines of Malicious Code: Insights Into the Malicious Software Industry";
in: "Proceedings of the 28th Annual Computer Security Applications Conference",
ACM,
New York,
2012,
ISBN: 978-1-4503-1312-4,
349
- 358.
M. Lindorfer, C. Kolbitsch, P. Milani Comparetti:
"Detecting Environment-Sensitive Malware";
in: "Proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection (2011)",
Springer,
2011,
ISBN: 978-3-642-23643-3.
M. Lindorfer, B. Miller, M. Neugschwandtner, Ch. Platzer:
"Take a Bite - Finding the Worm in the Apple";
in: "International Conference on Information, Communications and Signal Processing (ICICS)",
IEEE,
2013.
M. Lindorfer, M. Neugschwandtner, Ch. Platzer:
"Marvin: Efficient and Comprehensive Mobile App Classification Through Static and Dynamic Analysis";
in: "Proceedings of the IEEE 39th Annual Computer Software and Applications Conference (COMPSAC)",
IEEE,
2015,
ISBN: 978-1-4673-6564-2,
422
- 433.
M. Lindorfer, M. Neugschwandtner, L. Weichselbaum, Y. Fratantonio, V. van der Veen, Ch. Platzer:
"Andrubis - 1,000,000 Apps Later: A View on Current Android Malware Behaviors";
in: "Proceedings of the 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS)",
IEEE,
2014,
ISBN: 978-1-4799-8308-7,
3
- 17.
M. Lindorfer, V. Volanis, A. Sisto, M. Neugschwandtner, E. Athanasopoulos, F. Maggi, Ch. Platzer, S. Zanero, S. Ioannidis:
"AndRadar: Fast Discovery of Android Applications in Alternative Markets";
in: "Proceedings of the 11th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA)",
Springer,
LNCS 8550,
2014,
ISBN: 978-3-319-08508-1,
51
- 71.
D. Lu, P. Moreno-Sanchez, A. Zeryihun, S. Bajpayi, S. Yin, K. Feldman, J. Kosofsky, P. Mitra, A. Kate:
"Reducing Automotive Counterfeiting usingBlockchain: Benefits and Challenges";
in: "2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON)",
issued by: IEEE;
IEEE Computer Society,
USA,
2019,
ISBN: 978-1-7281-1264-0,
39
- 48.
M. Maffei, A. Kate, G. Malavolta, P. Moreno-Sanchez, S. Ravi:
"Concurrency and Privacy with Payment-Channel Networks";
in: "CCS '17 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security",
ACM Digital Library,
New York,
2017,
ISBN: 978-1-4503-4946-8,
455
- 471.
M. Maffei, P. Moreno-Sanchez, A. Kate, G. Malavolta:
"SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks";
in: "2017 Network and Distributed System Security Symposium",
Internet Society,
Reston, Virginia, USA,
2017,
ISBN: 1-891562-46-0,
1
- 15.
M. Maffei, R. Munz, F. Eigner, P. Francis, D. Garg:
"UniTraX: Protecting Data Privacy with Discoverable Biases";
in: "Principles of Security and Trust",
LNCS 10804;
Springer, Lecture Notes in Computer Science,
Schwitzerland,
2018,
ISBN: 978-3-319-89721-9,
278
- 299.
M. Maffei, M. Reinert, R. Lai, C. Egger, S. Chow, D. Schröder:
"Simple Password Hardened Encryption Services";
in: "Proceedings of the 27th USENIX Security Symposium",
27th;
issued by: USENIX Association Berkley, CA, USA;
USENIX,
2018,
ISBN: 978-1-931971-46-1,
1405
- 1421.
G. Malavolta, M. Reinert, D. Schröder, M. Maffei:
"Maliciously Secure Multi-Client ORAM";
in: "Applied Cryptography and Network Security",
LNCS 10355;
D. Gollmann, A. Miyaji, H. Kikuchi (ed.);
© Springer International Publishing AG 2017,
Cham,
2017,
ISBN: 978-3-319-61203-4,
645
- 664.
P. Moreno-Sanchez, N. Modi, R. Songhela, A. Kate, S. Fahmy:
"Mind Your Credit: Assessing the Health of the Ripple Credit Network";
in: "Proceedings of the 2018 World Wide Web Conference",
Volume 2018;
issued by: International World Wide Web Conferences Steering Committee Republic and Canton of Geneva, Switzerland ©2018;
ACM Digital Library,
Schwitzerland,
2018,
ISBN: 978-1-4503-5639-8,
329
- 338.
A. Naseredini, S. Gast, M. Schwarzl, Pedro Sousa Bernardo, A. Smajic, C. Canella, D. Gruss:
"Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks";
in: "Proceedings of the 8th International Conference on Information Systems Security and Privacy",
SciTePress,
2022,
ISBN: 978-989-758-553-1,
48
- 59.
M. Neugschwandtner, M. Lindorfer, Ch. Platzer:
"A View to a Kill: WebView Exploitation";
in: "USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)",
USENIX,
2013.
S. Neuner, v. Victor, M. Lindorfer, M. Huber, M. Georg, M. Mulazzani, E. Weippl:
"Enter Sandbox: Android Sandbox Comparison";
in: "Proceedings of the IEEE Mobile Security Technologies Workshop (MoST)",
IEEE,
2014.
E. Pan, J. Ren, M. Lindorfer, C. Wilson, D. Choffnes:
"Panoptispy: Characterizing Audio and Video Exfiltration from Android Applications";
in: "Privacy Enhancing Technologies Symposium (PETS)",
DeGruyter,
4,
2018,
33
- 50.
K. Pietrzak, M. Walter, K. Klein, C. Kamath, H. Abusalah:
"Reversible Proofs of Sequential Work";
in: "Advances in Cryptology - EUROCRYPT 2019",
volume 11476;
issued by: Springer;
Springer LNCS,
2019,
ISBN: 978-3-030-17652-5,
277
- 291.
Ch. Platzer, M. Stütz, M. Lindorfer:
"Skin Sheriff: A Machine Learning Solution for Detecting Explicit Images";
in: "Proceedings of the 2nd International Workshop on Security and Forensics in Communication Systems (ASIACCS-SFCS)",
IEEE,
2014,
ISBN: 978-1-4503-2802-9,
45
- 56.
D. Quarta, M. Ianni, A. Machiry, Y. Fratantonio, E. Gustafson, D. Balzarotti, M. Lindorfer, G. Vigna, C. Krügel:
"Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM´s TrustZone";
in: "Research on offensive and defensive techniques in the Context of Man At The End (MATE) Attacks (Checkmate ´21)",
ACM (ed.);
issued by: ACM;
ACM,
New York,
2021,
ISBN: 978-1-4503-8552-7.
M. Reinert, D. Schröder, M. Maffei:
"On the Security of Frequency-Hiding Order-Preserving Encryption";
in: "Cryptology and Network Security",
Lecture Notes in Computer Science, vol 11261;
Springer International Publishing,
Cham, Switzerland,
2017,
ISBN: 978-3-030-02640-0,
51
- 70.
J. Ren, M. Lindorfer, D. Dubois, A. Rao, D. Choffnes, N. Vallina-Rodriguez:
"Bug Fixes, Improvements, ... and Privacy Leaks - A Longitudinal Study of PII Leaks Across Android App Versions";
in: "Network and Distributed System Security Symposium (NDSS)",
Internet Society,
2018.
J. Ren, A. Rao, M. Lindorfer, A. Legout, D. Choffnes:
"ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic";
in: "International Conference on Mobile Systems, Applications and Services (MobiSys)",
ACM,
2016,
361
- 374.
M. Romiti, F. Victor, P. Moreno-Sanchez, P. Nordholt, B. Haslhofer, M. Maffei:
"Cross-Layer Deanonymization Methods in the Lightning Protocol";
in: "Financial Cryptography and Data Security",
LNCS, volume 12674;
issued by: Springer Verlag;
Springer LNCS,
Berlin Heidelberg,
2021,
ISBN: 978-3-662-64321-1,
187
- 204.
A. Saha, T. Denning, V. Srikumar, S.K. Kasera:
"Secrets in Source Code: Reducing False Positives using Machine Learning";
in: "2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)",
IEEE Xplore Digital Library,
2020,
ISBN: 978-1-7281-3187-0,
168
- 175.
G. Scaffino, S. Schulte, M. Sober, C. Spanring:
"A Voting-Based Blockchain Interoperability Oracle";
in: "4th IEEE Blockchain 2021",
IEEE,
2020.
A. Sjösten, D. Hedin, A. Sabelfeld:
"Information Flow Tracking for Side-Effectful Libraries";
in: "International Conference on Formal Techniques for Distributed Objects, Components, and Systems",
Springer,
2018,
ISBN: 978-3-319-92611-7,
141
- 160.
A. Sjösten, P. Snyder, A. Pastor, P. Papadopoulos, B. Livshits:
"Filter List Generation for Underserved Regions";
in: "The Web Conference 2020",
ACM/IW3C2,
2020,
ISBN: 978-1-4503-7023-3,
1682
- 1692.
A. Sjösten, S. Van Acker, P. Picazo-Sanchez, A. Sabelfeld:
"Latex Gloves: Protecting Browser Extensions from Probing and Revelation Attacks";
in: "26th Annual Network and Distributed System Security Symposium",
The Internet Society,
2019,
ISBN: 1-891562-55-x,
1
- 15.
A. Sjösten, S. Van Acker, A. Sabelfeld:
"Discovering Browser Extensions via Web Accessible Resources";
in: "7th ACM Conference on Data and Application Security and Privacy",
ACM,
2017,
ISBN: 978-1-4503-4523-1,
329
- 336.
M. Tempesta, C. Bodei, P. Degano, R. Forcardi, L. Galletta, L. Veronese:
"Firewall Management With FireWall Synthesizer";
in: "keiner",
issued by: Italian Conference on CyberSecurity (ITASEC);
ITASEC,
2018,
1 pages.
O. van der Toorn, R. van Rijswijk-Deij, T. Fiebig, M. Lindorfer, A. Sperotto:
"TXTing 101: Finding Security Issues in the Long Tail of DNS TXT Records";
in: "International Workshop on Traffic Measurements for Cybersecurity (WTMC)",
IEEE,
2020,
ISBN: 978-1-7281-8598-9.
V. van der Veen, Y. Fratantonio, M. Lindorfer, D. Gruss, C. Maurice, G. Vigna, H. Bos, K. Razavi, C. Giuffrida:
"Drammer: Deterministic Rowhammer Attacks on Mobile Platforms";
in: "ACM Conference on Computer and Communications Security (CCS)",
ACM,
2016,
ISBN: 978-1-4503-4139-4,
1675
- 1689.
V. van der Veen, M. Lindorfer, Y. Fratantonio, H. Padmanabha Pillai, G. Vigna, C. Krügel, H. Bos, K. Razavi:
"GuardION: Practical Mitigation of DMA-based Rowhammer Attacks on ARM";
in: "Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)",
Springer,
2018,
ISBN: 978-3-319-93410-5,
92
- 113.
T. van Ede, R. Bortolameotti, A. Continella, J. Ren, D. Dubois, M. Lindorfer, D. Choffnes, M. van Steen, A. Peter:
"FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic";
in: "Network and Distributed System Security Symposium (NDSS)",
Internet Society,
2020,
ISBN: 1-891562-61-4.
Talks and Poster Presentations (with Proceedings-Entry)
L. Aumayr, O. Ersoy, A. Erwig, S. Faust, K. Hostáková, M. Maffei, P. Moreno-Sanchez, S. Riahi:
"Bitcoin-Compatible Virtual Channels";
Talk: IEEE Symposium on Security and Privacy,
Oakland, USA;
2021-05-23
- 2021-05-27; in: "42nd IEEE Symposium on Security and Privacy",
IEEE Computer Society,
(2021),
901
- 918.
L. Aumayr, O. Ersoy, A. Erwig, S. Faust, K. Hostáková, M. Maffei, P. Moreno-Sanchez, S. Riahi:
"Generalized Channels from Limited Blockchain Scripts and Adaptor Signatures";
Talk: Asiacrypt 2021, the 27th Annual International Conference on the Theory and Application of Cryptology and Information Security,
Singapore;
2021-12-06
- 2021-12-10; in: "Advances in Cryptology - ASIACRYPT 2021",
Springer,
(2021),
ISBN: 978-3-030-92074-6;
635
- 664.
L. Aumayr, P. Moreno-Sanchez, A. Kate, M. Maffei:
"Blitz: Secure Multi-Hop Payments Without Two-Phase Commits";
Talk: Usenix Security Symposium,
Vancouver, B.C., Canada;
2021-08-11
- 2021-08-13; in: "30th USENIX Security Symposium",
USENIX: The Advanced Computing Systems Association,
(2021),
ISBN: 978-1-939133-24-3;
4043
- 4060.
G. Barthe, R. Eilers, P. Georgiou, B. Gleiss, L. Kovacs, M. Maffei:
"Verifying Relational Properties using Trace Logic";
Talk: International Conference on Formal Methods in Computer Aided Design (FMCAD) 2019,
San Jose, US;
2019-10-22
- 2019-10-25; in: "Proceedings of Formal Methods in Computer Aided Design (FMCAD)",
B. Clark, J. Yang (ed.);
IEEE,
https://ieeexplore.ieee.org/xpl/conhome/8891869/proceeding
(2019),
ISBN: 978-0-9835678-9-9;
170
- 178.
S. Calzavara, R. Focardi, N. Grimm, M. Maffei, M. Tempesta:
"Language-Based Web Session Integrity";
Talk: IEEE Computer Security Foundations Symposium,
New York;
2020-06-22
- 2020-06-25; in: "33rd IEEE Computer Security Foundations Symposium",
IEEE Computer Society,
Washington DC
(2020),
ISBN: 978-1-5386-3217-8;
107
- 122.
V. Cini, S. Ramacher, D. Slamanig, C. Striecks, E. Tairi:
"Updatable Signatures and Message Authentication Codes";
Talk: International Conference on Practice and Theory of Public-Key Cryptography (PKC),
Edinburgh, Scotland;
2021-05-09
- 2021-05-13; in: "Proceedings of the 24rd IACR International Conference on the Practice and Theory of Public-Key Cryptography",
Springer, Cham,
Lecture Notes in Computer Science, vol 12710
(2021),
ISBN: 978-3-030-75244-6;
691
- 723.
C. Egger, M. Maffei, P. Moreno-Sanchez:
"Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks";
Talk: ACM Conference on Computer and Communications Security (CCS),
London;
2019-11-11
- 2019-11-15; in: "ACM Conference on Computer and Communications Security",
ACM (ed.);
ACM,
(2019),
ISBN: 978-1-4503-6747-9;
801
- 815.
C. Egger, P. Moreno-Sanchez, M. Maffei:
"Atomic Multi-Channel Updates with Constant Collateralin Bitcoin-Compatible Payment-Channel Networks";
Talk: Scaling Bitcoin,
Israel, Tel Aviv (invited);
2019-09-11
- 2019-09-12; in: "Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security",
New York
(2019),
ISBN: 978-1-4503-6747-9;
801
- 815.
R. Focardi, M. Squarcina, G. Steel, M. Palmarini, M. Tempesta:
"Mind Your Keys? A Security Evaluation of Java Keystores";
Talk: Network and Distributed System Security Symposium (NDSS),
San Diego;
2018-02-18
- 2018-02-21; in: "Proceedings of 2019 Network and Distributed System Security Symposium",
(2018),
ISBN: 1-891562-49-5;
1
- 15.
L. Kovacs, Hanna Lachnitt, S. Szeider:
"Formalizing Graph Trail Properties in Isabelle/HOL";
Talk: International Conference on Intelligent Computer Mathematics (CICM),
Bertinoro, Forli, Italy;
2020-07-26
- 2020-07-31; in: "CICM 2020: Intelligent Computer Mathematics",
LNCS,
12236
(2020),
ISBN: 978-3-030-53518-6;
190
- 205.
M. Lindorfer, M. Neumayr, J. Caballero, Ch. Platzer:
"POSTER: Cross-Platform Malware: Write Once, Infect Everywhere";
Poster: ACM Conference on Computer and Communications Security (CCS),
Berlin;
2013-11-04
- 2013-11-08; in: "ACM Conference on Computer and Communications Security (CCS)",
(2013).
M. Maffei, S. Calzavara, I. Grishchenko, A. Koutsos:
"A Sound Flow-Sensitive Heap Abstraction for the Static Analysis of Android Applications";
Talk: IEEE Computer Security Foundations Symposium,
Santa Barbara, USA;
2017-08-21
- 2017-08-25; in: "IEEE 30th Computer Security Foundations Symposium CSF 2017",
IEEE Xplore Digital Library,
(2017),
ISBN: 978-1-5386-3217-8;
Paper ID 3,
15 pages.
M. Maffei, J. Lallemand, V. Cortier, N. Grimm:
"A Type System for Privacy Properties";
Talk: ACM CCS 2017 Conference on Computer and Communications Security,
Dallas, USA;
2017-10-30
- 2017-11-03; in: "CCS '17 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security",
ACM Digital Library,
New York
(2017),
ISBN: 978-1-4503-4946-8;
409
- 423.
G. Malavolta, P. Moreno-Sanchez, C. Schneidewind, A. Kate, M. Maffei:
"Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability";
Talk: Network and Distributed System Security Symposium (NDSS),
San Diego, CA, US;
2019-02-24
- 2019-02-27; in: "Proceedings of 2019 Network and Distributed System Security Symposium",
Reston
(2019),
ISBN: 1-891562-55-x;
1
- 15.
S. Roos, P. Moreno-Sanchez, A. Kate, I. Goldberg:
"Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions";
Talk: Network and Distributed System Security Symposium (NDSS),
San Diego;
2018-02-18
- 2018-02-21; in: "25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18-21, 2018",
Reston
(2018),
ISBN: 1-1891562-49-5;
1
- 15.
C. Schneidewind, I. Grishchenko, M. Scherer, M. Maffei:
"eThor: Practical and Provably Sound Static Analysis of Ethereum Smart Contracts";
Talk: ACM Conference on Computer and Communications Security (CCS),
Orlando;
2020-11-09
- 2020-11-13; in: "CCS '20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security",
Association for Computing Machinery ACM,
(2020),
ISBN: 978-1-4503-7089-9;
621
- 640.
C. Schneidewind, M. Scherer, M. Maffei:
"The Good, the Bad and the Ugly: Pitfalls and Best Practices in Automated Sound Static Analysis of Ethereum Smart Contracts";
Talk: International Symposium on Leveraging Applications of Formal Methods (ISoLA),
Rhodes;
2020-10-20
- 2020-10-30; in: "International Symposium On Leveraging Applications of Formal Methods, Verification and Validation",
Springer,
7609
(2020),
ISBN: 978-3-642-34025-3;
1
- 20.
A. Sjösten, D. Hedin, A. Sabelfeld:
"EssentialFP: Exposing the Essence of Browser Fingerprinting";
Talk: EuroS&P 2021 SecWeb Workshop,
Vienna;
2021-09-06; in: "IEEE European Symposium on Security and Privacy Workshops",
(2021),
32
- 48.
M. Squarcina, S. Calzavara, M. Maffei:
"The Remote on the Local: Exacerbating Web Attacks Via Service Workers Caches";
Talk: 15th IEEE Workshop on Offensive Technologies,
San Francisco, CA, USA;
2021-05-27; in: "IEEE Security and Privacy Workshops",
(2021),
432
- 443.
M. Squarcina, R. Focardi:
"Run-Time Attack Detection in Cryptographic APIs";
Talk: IEEE Computer Security Foundations Symposium,
Santa Barbara, USA;
2017-08-21
- 2017-08-25; in: "Run-Time Attack Detection in Cryptographic APIs",
IEEE Xplore Digital Library,
(2017),
ISBN: 978-1-5386-3217-8;
176
- 188.
M. Squarcina, M. Tempesta, L. Veronese, S. Calzavara, M. Maffei:
"Can I Take Your Subdomain? Exploring Same-Site Attacks in the Modern Web";
Talk: 30th USENIX Security Symposium,
Online;
2021-08-11
- 2021-08-13; in: "30th USENIX Security Symposium",
30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021,
(2021),
2917
- 2934.
E. Tairi, P. Moreno-Sanchez, M. Maffei:
"A2L: Anonymous Atomic Locks for Scalability in Payment Channel Hubs";
Talk: IEEE Symposium on Security and Privacy,
Oakland, USA;
2021-05-23
- 2021-05-27; in: "42nd IEEE Symposium on Security and Privacy",
(2021).
E. Tairi, P. Moreno-Sanchez, M. Maffei:
"Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments";
Talk: International Conference on Financial Cryptography and Data Security (FC),
Grenada;
2021-03-01
- 2021-03-05; in: "Proceedings of the 25th International Conference on Financial Cryptography and Data Security",
(2021).
S. Tikhomirov, P. Moreno-Sanchez, M. Maffei:
"A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network";
Talk: IEEE Security & Privacy On The Blockchain,
Genova;
2020-11-07
- 2020-11-11; in: "2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)",
IEEE,
(2020),
ISBN: 978-1-7281-8598-9;
387
- 396.
L. Veronese, S. Calzavara, L. Compagna:
"Bulwark: Holistic and Verified Security Monitoring of Web Protocols";
Talk: European Symposium on Research in Computer Security (ESORICS),
Guildford, United Kingdom;
2020-09-14
- 2020-09-18; in: "ESORICS 2020: Computer Security",
Springer,
Lecture Notes in Computer Science, vol 12308
(2020),
ISBN: 978-3-030-58950-9;
23
- 41.
Talks and Poster Presentations (without Proceedings-Entry)
P. Georgiou, B. Gleiss, L. Kovacs, M. Maffei:
"Trace Reasoning for Formal Verification using the First-Order Superposition Calculus";
Poster: FMCAD 2019 Student Forum,
San Jose, US;
2019-10-22
- 2019-10-25.
G. Malavolta, P. Moreno-Sanchez, C. Schneidewind, A. Kate, M. Maffei:
"Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability";
Talk: ACM Advances in Financial Technologies AFT 2019,
Zurich, Switzerland (invited);
2019-10-21
- 2019-10-23.
D. Somé, M. Squarcina, S. Calzavara, M. Maffei:
"The Remote on the Local: Exacerbating Web Attacks Via Service Workers Caches in Progressive Web Applications";
Talk: EuroS&P 2020 SecWeb Workshop,
Genova, IT;
2020-09-11.
Doctor's Theses (authored and supervised)
N. Grimm:
"Static and Dynamic Enforcement of Security via Relational Reasoning";
Supervisor, Reviewer: M. Maffei, F. Piessens, G. Barthe;
Institut of Logic and Computation, Security and Privacy,
2021;
oral examination: 2021-03-15.
I. Grishchenko:
"Static Analysis of Low-Level Code";
Supervisor, Reviewer: M. Maffei, G. Weissenbacher, A. Sabelfeld, K. Bhargavan;
Institut of Logic and Computation, Security and Privacy,
2021;
oral examination: 2021-01-25.
M. Lindorfer:
"Malware Through the Looking Glass: Malware Analysis in an Evolving Threat Landscape";
Supervisor, Reviewer: E. Weippl, T. Holz, E. Kirda;
Institut für Rechnergestützte Automation,
2016;
oral examination: 2016-02-02.
C. Schneidewind:
"Foundations for the Security Analysis of Distributed Blockchain Applications";
Supervisor, Reviewer: M. Maffei, A. Gervais, B. Scholz;
Institut of Logic and Computation, Security and Privacy,
2021;
oral examination: 2021-05-28.
Diploma and Master Theses (authored and supervised)
J. Abfalter:
"Adaptor Signature Based Atomic Swaps Between Bitcoin and a Mimblewimble Based Cryptocurrency";
Supervisor: M. Maffei, P. Moreno-Sanchez;
Institut of Logic and Computation, Security and Privacy,
2021;
final examination: 2021-07-01.
L. Aumayr:
"Automated Prognosis of the Development of Cryptocurrency Prices";
Supervisor: H. Eidenberger;
Visual Computing and Human-Centered Technology,
2019;
final examination: 2019-06.
P. Holzer:
"Payment Channel Network Analysis with Focus on Lightning Network";
Supervisor: M. Maffei, B. Haslhofer;
Institut of Logic and Computation, Security and Privacy,
2020;
final examination: 2020-05-29.
M. Lindorfer:
"Detecting Environment-Sensitive Malware";
Supervisor: E. Kirda, P. Milani Comparetti, C. Kolbitsch;
Institut für Rechnergestützte Automation,
2011.
M. Neumayr:
"Current State of Browser Extension Security and Extension-based Malware";
Supervisor: W. Kastner, M. Lindorfer;
Rechnergestützte Automation,
2015;
final examination: 2015-04-14.
J. Schneider:
"Theoretical and Practical Smart Contracts Realization of an Investment Fund";
Supervisor: M. Maffei, C. Schneidewind, I. Grishchenko;
Institut of Logic and Computation, Security and Privacy,
2018;
final examination: 2018-08-31.
A. Schwarz:
"Static Amalysis of eWASM Contracts";
Supervisor: C. Schneidewind, M. Maffei;
Institut of Logic and Computation, Security and Privacy,
2020;
final examination: 2020-01-15.
J. Stockinger:
"Analysis of Decentralized Mixing Services in the Greater Bitcoin Ecosystem";
Supervisor: M. Maffei, B. Haslhofer;
Institut of Logic and Computation, Security and Privacy,
2021;
final examination: 2021-10-07.
A Weninger:
"Privacy Preserving Authenticated Key Exchange - Modelling, Constructions, Proofs and Verification using Tamarin";
Supervisor: M. Maffei, D. Slamanig;
Institut of Logic and Computation, Security and Privacy,
2021;
final examination: 2021-08-27.
Scientific Reports
L. Aumayr, O. Ersoy, A. Erwig, S. Faust, K. Hostáková, M. Maffei, P. Moreno-Sanchez, S. Riahi:
"Generalized Bitcoin-Compatible Channels";
Report for Cryptology ePrint Archive;
Report No. 2020/476,
2020;
35 pages.