IT security and safety

Verschlüsselung und Sicherheit von Diensten und IT-Systemen.
© welcomia.com/Fotolia.com

Information technology offers organizations numerous opportunities to develop new products, offer innovative services and optimize value chains. At the same time, our daily lives are permeated by IT devices and services that interact in complex ways and are increasingly threatened by attacks and failures. The security and safety of IT systems therefore form the basis for successful modernization in business and industry and for the functioning of the state and society.

IT security and safety technologies enable companies and public authorities to improve the reliability, trustworthiness and manipulation security of IT-based systems and also to guarantee the functional security of critical systems. For example, the Fraunhofer ICT Group develops tools with which programmers can test the security properties of software as early as the development phase. This allows errors and weaknesses to be identified early on and eliminated cost-effectively. In addition, modular safety analyses integrated into the development methodology allow efficient certification of systems. In the context of Industry 4.0, the Group works, among other things, on safeguarding industrial plants and processes. Because IT security and safety are particularly closely interlinked here, the ICT Group develops integrated solutions for safeguarding production processes and data. Fraunhofer develops concepts and solutions to make security mechanisms in hardware and software more intelligent and flexible so that the corresponding solutions are also easy to use. Models focused on IT security and safety relieve users because systems based on such models can automatically and securely react to new situations.

The Fraunhofer ICT Group masters techniques, methods and tools with which the security properties of systems can be efficiently specified, analyzed and validated. Fraunhofer researchers are able to test the attack and failure safety of systems theoretically and practically. Together with our partners, we improve the security and safety properties of devices, services, networks and processes. In addition, the network members develop innovative software and hardware solutions, make them available for licensing and support companies in implementing new developments.

Core competencies

 

  • Usability and security
  • Biometrics
  • cyber security
  • information security
  • IT forensics
  • Modelling and assessment of safety
  • Security- and safety engineering
  • Security for cloud computing
  • Comprehensive security and safety for cyberphysical systems
  • Security for software
  • Security for and through Big Data

 

Fields of application

Security technologies and models form the basis for new developments and successful innovations in many industries and sectors, such as

  • Enterprise software
  • Production systems
  • E-government
  • E-health
  • Big Data
  • Software-defined products
  • Internet of Things
  • Industry 4.0
  • Automotive
  • Medical technology
  • Electric mobility and energy management

Scientific publications

YearTitle/AuthorDocument Type
201929. SmartCard Workshop 2019. Tagungsband: 20. und 21. Februar 2019, Darmstadt
Waldmann, Ulrich ; Fraunhofer-Institut für Sichere Informationstechnologie -SIT-, Darmstadt
Conference Proceedings
2019Anonymization Is Dead - Long Live Privacy
Zibuschka, Jan; Kurowski, Sebastian; Roßnagel, Heiko; Schunck, Christian H.; Zimmermann, Christian
Conference Paper
2019Assessing the Applicability of Authorship Verification Methods
Halvani, Oren; Winter, Christian; Graner, Lukas
Conference Paper
2019A calibratable detector for invasive attacks
Weiner, M.; Wieser, W.; Lupon, E.; Sigl, G.; Manich, S.
Journal Article
2019Detecting Face Morphing Attacks by Analyzing the Directed Distances of Facial Landmarks Shifts
Damer, Naser; Boller, Viola; Wainakh, Yaza; Boutros, Fadi; Terhörst, Philipp; Braun, Andreas; Kuijper, Arjan
Conference Paper
2019Dynamic searchable symmetric encryption for storing geospatial data in the cloud
Hiemenz, Benedikt; Krämer, Michel
Journal Article
2019Evaluation of a Dependability Mechanism for Cyber Physical Systems
Regan, Gilbert; McCaffery, Fergal; Reich, Jan; Armengaud, Eric; Kaypmaz, Cem; Zhensheng Guo, Joe; Longo, Simone; Carroll, Eoin O.
Conference Paper
2019Fraunhofer-Institut für Graphische Datenverarbeitung. Jahresbericht 2018: Künstliche Intelligenz im Visual Computing. Unser Jahr 2018. Forschung im Einsatz
Fellner, Dieter W. (Hrsg.); Welling, Daniela (Red.); Ackeren, Janine van (Red.); Bergstedt, Bettina (Red.); Krüger, Kathrin (Red.); Prasche, Svenja ; Fraunhofer-Institut für Graphische Datenverarbeitung -IGD-, Darmstadt
Annual Report
2019Intrusion Detection - Systeme für vernetzte Fahrzeuge - Konzepte und Herausforderungen für Privatheit und Cyber-Sicherheit
Simo, Hervais; Waidner, Michael; Geminn, Christian
Book Article
2019Minutiae-Based Gender Estimation for Full and Partial Fingerprints of Arbitrary Size and Shape
Terhörst, Philipp; Damer, Naser; Braun, Andreas; Kuijper, Arjan
Conference Paper
2019On the Detection of GAN-Based Face Morphs Using Established Morph Detectors
Debiasi, Luca; Damer, Naser; Moseguí Saladié, Alexandra; Rathgeb, Christian; Scherhag, Ulrich; Busch, Christoph; Kirchbuchner, Florian; Uhl, Andreas
Conference Paper
2019Ontology Population Framework of MAGNETO for Instantiating Heterogeneous Forensic Data Modalities
Behmer, Ernst-Josef; Chandramouli, K.; Garrido, V.; Mühlenberg, Dirk; Müller, Dennis; Müller, Wilmuth; Pallmer, Dirk; Perez, F.; Piatrik, T.; Vargas, C.
Conference Paper
2019Recent Advancements in Digital Forensics, Pt.2
Mazurczyk, Wojciech; Caviglione, Luca; Wendzel, Steffen
Journal Article
2019Syntactical Carving of PNGs and Automated Generation of Reproducible Datasets
Hilgert, J.-N.; Lambertz, M.; Rybalka, M.; Schell, R.
Journal Article
2019Unsupervised Privacy-enhancement of Face Representations Using Similarity-sensitive Noise Transformations
Terhörst, Philipp; Damer, Naser; Kirchbuchner, Florian; Kuijper, Arjan
Journal Article
201828. SmartCard Workshop 2018. Tagungsband: 21. und 22. Februar 2018, Darmstadt
Waldmann, Ulrich ; Fraunhofer-Institut für Sichere Informationstechnologie -SIT-, Darmstadt
Conference Proceedings
2018Adding Channel Binding for an Out-of-Band OTP Authentication Protocol in an Industrial Use-Case
Plaga, S.; Niethammer, M.; Wiedermann, N.; Borisov, A.
Conference Paper
2018Application-driven advances in multi-biometric fusion
Damer, Naser; Kuijper, Arjan (Referent); Fellner, Dieter W. (Referent); Ramachandra, Raghavendra (Referent)
Dissertation
2018Attribute-based Person Retrieval and Search in Video Sequences
Schumann, Arne; Specker, Andreas; Beyerer, Jürgen
Conference Paper
2018B-TREPID: Batteryless tamper-resistant envelope with a PUF and integrity detection
Immler, V.; Obermaier, J.; König, M.; Hiller, M.; Sig, G.
Conference Paper
2018Die Chancen der Digitalisierung sicher nutzen
Usländer, Thomas; Goll, F.
Journal Article
2018Cloud Mall Baden-Württemberg: Eine Umfrage zur Nutzung von Cloud-Lösungen bei kleinen und mittelständischen Unternehmen in Baden-Württemberg; Anwenderstudie
Falkner, Jürgen; Kutzias, Damian; Härle, Julia; Kett, Holger
Study
2018CrazyFaces: Unassisted Circumvention of Watchlist Face Identification
Damer, Naser; Wainakh, Yaza; Boller, Viola; Berken von den, Sven; Terhörst, Philipp; Braun, Andreas; Kuijper, Arjan
Conference Paper
2018CrySL: An extensible approach to validating the correct usage of cryptographic APIs
Krüger, S.; Späth, J.; Ali, K.; Bodden, E.; Mezini, M.
Conference Paper
2018The dark side of the face: Exploring the ultraviolet spectrum for face biometrics
Samartzidis, Timotheos; Siegmund, Dirk; Gödde, Michael; Damer, Naser; Braun, Andreas; Kuijper, Arjan
Conference Paper
2018Dataset adaptation for the evaluation of small object retrieval in heavily cluttered background
Manger, Daniel
Conference Paper
2018Deep and multi-algorithmic gender classification of single fingerprint minutiae
Terhörst, Philipp; Damer, Naser; Braun, Andreas; Kuijper, Arjan
Conference Paper
2018Deep learning-based face recognition and the robustness to perspective distortion
Damer, Naser; Wainakh, Yaza; Henniger, Olaf; Croll, Christian; Berthe, Benoit; Braun, Andreas; Kuijper, Arjan
Conference Paper
2018Dividing the threshold: Multi-probe localized EM analysis on threshold implementations
Specht, R.; Immler, V.; Unterstein, F.; Heyszl, J.; Sig, G.
Conference Paper
2018Domain validation++ for MitM-resilient PKI
Brandt, Markus; Dai, Tiaxing; Klein, Amit; Shulman, Haya; Waidner, Michael
Conference Paper
2018Double Embedding Steganalysis: Steganalysis with Low False Positive Rates
Steinebach, Martin; Ester, Andre; Liu, Huajian; Zmudzinski, Sascha
Conference Paper
2018Emerging and unconventional: New attacks and innovative detection techniques. Editorial
Caviglione, Luca; Mazurczyk, Wojciech; Wendzel, Steffen; Zander, Sebastian
Journal Article
2018Face verification robustness & camera-subject distance: Camera-subject distance marginally affects automatic face verification
Berthe, Benoit; Croll, Christian; Henniger, Olaf
Journal Article
2018Fingerprint and iris multi-biometric data indexing and retrieval
Damer, Naser; Terhörst, Philipp; Braun, Andreas; Kuijper, Arjan
Conference Paper
2018Forensic analysis of multiple device BTRFS configurations using The Sleuth Kit
Hilgert, Jan-Niclas; Lambertz, Martin; Yang, Shuijan
Journal Article
2018Fraunhofer-Institut für Graphische Datenverarbeitung. Jahresbericht 2017
Fellner, Dieter W. (Hrsg.); Welling, Daniela (Red.); Ackeren, Janine van (Red.); Kröchert, Charlott (Red.); Prasche, Svenja (Red.); Roth, Anahit (Red.); Egner, Julian (Gestaltung); Gollnast, Anja (Gestaltung); Jahnke, Anne (Gestaltung); Kunkel, Andreas (Red.) ; Fraunhofer-Institut für Graphische Datenverarbeitung -IGD-, Darmstadt
Annual Report
2018Implementing Joux-Vitse's crossbred algorithm for solving MQ systems over F2 on GPUs
Niederhagen, Ruben; Ning, Kai-Chun; Yang, Bo-Yin
Conference Paper
2018Information hiding. Challenges for forensic experts
Mazurczyk, Wojciech; Wendzel, Steffen
Journal Article
2018Internet As a Source of Randomness
Brandt, Markus; Shulman, Haya; Waidner, Michael
Conference Paper
2018IT-Sicherheit für TCP/IP- und IoT-Netzwerke: Grundlagen, Konzepte, Protokolle, Härtung
Wendzel, Steffen
Book
2018ivisX: An Integrated Video Investigation Suite for Forensic Applications
Qu, Chengchao; Metzler, Jürgen; Monari, Eduardo
Conference Paper
2018Joint Standard German and Bavarian Subdialect Identification of Broadcast Speech
Stadtschnitzer, Michael; Schmidt, Christoph Andreas
Conference Paper
2018MorGAN: Recognition Vulnerability and Attack Detectability of Face Morphing Attacks Created by Generative Adversarial Network
Damer, Naser; Moseguí Saladié, Alexandra; Braun, Andreas; Kuijper, Arjan
Conference Paper
2018P-score: Performance aligned normalization and an evaluation in score-level multi-biometric fusion
Damer, Naser; Boutros, Fadi; Terhörst, Philipp; Braun, Andreas; Kuijper, Arjan
Conference Paper
2018Post-quantum cryptography on FPGAs. The Niederreiter cryptosystem. Extended Abstract
Wang, Wen; Szefer, Jakub; Niederhagen, Ruben
Abstract
2018A Privacy Preserving Approach to Collaborative Systemic Risk Identification: The Use-case of Supply Chain Networks
Zare Garizy, Tirazheh; Fridgen, Gilbert; Wederhake, Lars
Journal Article
2018Privacy Preserving Forensics for JPEG Images
Steinebach, Martin; Liu, Huajian; Stein, Richard; Mayer, Felix
Conference Paper
2018Removing the Bottleneck for Practical 2PC
Shrishak, Kris; Shulman, Haya; Waidner, Michael
Conference Paper
2018Secure your SSH Keys! Motivation and practical implementation of a HSM-based approach securing private SSH-Keys
Plaga, S.; Wiedermann, N.; Hansch, G.; Newe, T.
Conference Paper
2018Testing Cryptographically Secure Pseudo Random Number Generators with Artificial Neural Networks
Fischer, T.
Conference Paper
2018Visual-Interactive Identification of Anomalous IP-Block Behavior Using Geo-IP Data
Ulmer, Alex; Schufrin, Marija; Sessler, David; Kohlhammer, Jörn
Conference Paper
2018What can a single minutia tell about gender?
Terhörst, Philipp; Damer, Naser; Braun, Andreas; Kuijper, Arjan
Conference Paper
2018XMSS and Embedded Systems. XMSS Hardware Accelerators for RISC-V
Wang, Wen; Jungk, Bernhard; Wälde, Julian; Deng, Shuwen; Gupta, Naina; Szefer, Jakub; Niederhagen, Ruben
Journal Article
2018Your rails cannot hide from localized EM: How dual-rail logic fails on FPGAs - extended version
Immler, V.; Specht, R.; Unterstein, F.
Journal Article
201727. SIT-SmartCard Workshop 2017: 15. und 16. Februar 2017, Darmstadt
Waldmann, Ulrich ; Fraunhofer-Institut für Sichere Informationstechnologie -SIT-, Darmstadt
Conference Proceedings
2017Ant Colony-Inspired Parallel Algorithm to Improve Cryptographic Pseudo Random Number Generators
Keller, Jörg; Spenger, Gabriele; Wendzel, Steffen
Conference Paper
2017AuthentiCap - a touchless vehicle authentication and personalization system
Frank, Sebastian; Kuijper, Arjan
Conference Paper
2017Authorship verification based on compression-models
Halvani, Oren; Winter, Christian; Graner, Lukas
Report
2017Automated detection of instruction cache leaks in modular exponentiation software
Zankl, A.; Heyszl, J.; Sigl, G.
Conference Paper
2017Automated face detection for occurrence and occupancy estimation in chimpanzees
Crunchant, A.-S.; Egerer, M.; Loos, A.; Burghardt, T.; Zuberbühler, K.; Corogenes, K.; Leinert, V.; Kulik, L.; Kühl, H.S.
Journal Article
2017Automatic analysis of facial expressions in an advertising test with Chinese respondents
Dieckmann, Anja; Unfried, Matthias; Garbas, Jens; Mortillaro, Marcello
Report
2017Benefits of combining forensic image creation and file carving
Yannikos, York; Steinebach, Martin; Rettig, Michael
Conference Paper
2017Cache attacks and countermeasures for NTRUEncrypt on MPSoCs: Post-quantum resistance for the IoT
Sepulveda, J.; Zankl, A.; Mischke, O.
Conference Paper
2017ChaCha20-Poly1305 authenticated encryption for high-speed embedded IoT applications
Santis, F. de; Schauer, A.; Sigl, G.
Conference Paper
2017Cloud Computing im Mittelstand 2017: Ergebnisse der Bedarfsanalyse der Mittelstand 4.0-Agentur Cloud
Frings, Sandra; Falkner, Jürgen; Kett, Holger
Study
2017Cybersicherheit beyond 2020!: Herausforderungen für die IT-Sicherheitsforschung
Eckert, C.
Journal Article
2017Data residency challenges and opportunities for standardization
Abramson, Mike; Arbuckle, Brian; Baudoin, Claude; Dani, Jayant; DiPaula-Coyle, Michael; Gawade, Preetam; Gharote, Mangesh; Harris, David; Iyengar, Sridhar; Jung, Christian; Kumar Nutheti, Kiran; O'Neill, Dennis; Scaduto, Justin; Schalk, Karolyn; Schwarz, Reinhard; Stavros, Nick; Tessier, Denise; Tumashov, Alex; Wales, Char
Report
2017Datenpotenziale sicher nutzen
Reis, Claudia; Jung, Christian; Ochs, Michael A.
Journal Article
2017Design and architecture of an industrial IT security lab
Pfrang, Steffen; Kippe, Jörg; Meier, David; Haas, Christian
Conference Paper
2017Detection of face morphing attacks by deep learning
Seibold, C.; Samek, W.; Hilsmann, A.; Eisert, P.
Conference Paper
2017Digital watermarking for verification of perception-based integrity of audio data
Zmudzinski, Sascha; Waidner, Michael; Steinebach, Martin
Dissertation
2017Dissecting leakage resilient PRFs with multivariate localized EM attacks: A practical security evaluation on FPGA
Unterstein, F.; Heyszl, J.; Santis, F. de; Specht, R.
Conference Paper
2017Efficient, accurate, and rotation-invariant iris code
Damer, Naser; Terhörst, Philipp; Braun, Andreas; Kuijper, Arjan
Journal Article
2017ESPRIT-Hilbert-Based Audio Tampering Detection With SVM Classifier for Forensic Analysis via Electrical Network Frequency
Reis, P.M.G.I.; Costa, J.P.C.L. da; Miranda, R.K.; Galdo, G. del
Journal Article
2017Extending The Sleuth Kit and its underlying model for pooled storage file system forensic analysis
Hilgert, J.-N.; Lambertz, M.; Plohmann, D.
Journal Article
2017Forensic Image Inspection Assisted by Deep Learning
Steinebach, Martin; Mayer, Felix
Conference Paper
2017Fraunhofer-Institut für Graphische Datenverarbeitung. Jahresbericht 2016
Fellner, Dieter W. (Hrsg.); Baier, Konrad (Red.); Ackeren, Janine van (Red.); Alexandrin, Max (Red.); Barth, Anna (Red.); Bockholt, Ulrich (Red.); Kopold, Franziska (Red.); Löwer, Chris (Red.); May, Thorsten (Red.); Peters, Wiebke (Red.); Wehner, Detlef (Red.); Gollnast, Anja; Bumke, Carina ; Fraunhofer-Institut für Graphische Datenverarbeitung -IGD-, Darmstadt
Annual Report
2017The Future of Digital Forensics: Challenges and the Road Ahead
Caviglione, Luca; Wendzel, Steffen; Mazurczyk, Wojciech
Journal Article
2017General borda count for multi-biometric retrieval
Damer, Naser; Terhörst, Philipp; Braun, Andreas; Kuijper, Arjan
Conference Paper
2017Hiding secrecy leakage in leaky helper data
Hiller, M.; Önalan, A.G.
Conference Paper
2017Indexing of single and multi-instance iris data based on LSH-forest and rotation invariant representation
Damer, Naser; Terhörst, Philipp; Braun, Andreas; Kuijper, Arjan
Conference Paper
2017Internet-wide study of DNS cache injections
Klein, A.; Shulman, H.; Waidner, M.
Conference Paper
2017Introducing remote attestation and hardware-based cryptography to OPC UA
Birnstill, Pascal; Haas, Christian; Hassler, D.; Beyerer, Jürgen
Conference Paper
2017Mythos Blockchain: Herausforderungen für den Öffentlichen Sektor
Welzel, Christian; Eckert, Klaus-Peter; Kirstein, Fabian; Jacumeit, Volker
Report
2017Neighbor distance ratios and dynamic weighting in multi-biometric fusion
Damer, Naser; Alkhatib, Wael; Braun, Andreas; Kuijper, Arjan
Conference Paper
2017Offline Mode for Corporate Mobile Client Security Architecture
Galibus, T.; Vieira, T.P.D.; Freitas, E.P. de; Albuquerque, R.D.; Costa, J.P.C.L. da; Sousa, R.T. de; Krasnoproshin, V.; Zaleski, A.; Vissia, H.E.R.M.; Galdo, G. del
Journal Article
2017On the usefulness of compression models for authorship verification
Halvani, Oren; Winter, C.; Graner, L.
Conference Paper
2017One key to sign them all considered vulnerable: Evaluation of DNSSEC in the internet
Shulman, Haya; Waidner, Michael
Conference Paper
2017Opportunities for biometric technologies in smart environments
Henniger, Olaf; Damer, Naser; Braun, Andreas
Conference Paper
2017Positionspapier: Cybersicherheit in Deutschland
Waidner, Michael; Backes, Michael; Müller-Quade, Jörn; Waidner, Michael
Report
2017Practical post-quantum cryptography. White Paper
Niederhagen, Ruben; Waidner, Michael
Report
2017Problems of video-based pain detection in patients with dementia: A road map to an interdisciplinary solution
Kunz, Miriam; Seuss, Dominik; Hassan, Teena; Garbas, Jens U.; Siebers, Michael; Schmid, Ute; Schöberl, Michael; Lautenbacher, Stefan
Journal Article
2017Ratgeber für eine sichere zentrale Softwareverteilung
Herfert, Michael; Kunz, Thomas; Wolf, Ruben; Waidner, Michael
Book
2017Recent Advancements in Digital Forensics. Pt.1: Guest editors' introduction
Mazurczyk, Wojciech; Caviglione, Luca; Wendzel, Steffen
Journal Article
2017Risikobeurteilung in der IT-Sicherheit Kritischer Infrastrukturen - Eine Analyse der Risikobeurteilung im Förderschwerpunkt ITS|KRITIS
Gurschler, Tamara; Großmann, Jürgen; Kotarski, David; Teichmann, Clemens; Thim, Christof; Eichler, Jörn; Göllner, Johannes; Gronau, Norbert; Lechner, Ulrike
Conference Paper
2017Rolling DICE. Lightweight remote attestation for COTS IoT hardware
Jäger, L.; Petri, R.; Fuchs, A.
Conference Paper
2017SecurePLUGandWORK. Abschlussbericht
Schleipen, Miriam; Henßen, Robert; Bischoff, Tino; Pfrommer, Julius; Sauer, Olaf; Schneider, Daniel; Jungbluth, Florian; Flatt, Holger; Barton, David; Fleischer, Jürgen; Bollhöfer, Esther; Moll, Cornelius; Lindauer, Jochen; Davis, Ralph; Baron, Heiko; Danner, Thomas; Hillerich, Thomas; Schmuck, Christian; Blume, Marco; Finster, Sören; Fechner, Andreas; Tschepat, Roman; Kazakov, Dmitry; Kühbauch, Reinhard; Klöblen, Wolfgang; Sproll, Dietmar; Fellhauer, Bruno; Osswald, Dirk; Sauer, Olaf (Hrsg.)
Report
2017Securing FPGA SoC configurations independent of their manufacturers
Jacob, N.; Wittmann, J.; Heyszl, J.; Hesselbarth, R.; Wilde, F.; Pehl, M.; Sigl, G.; Fischer, K.
Conference Paper
2017Squeezing polynomial masking in tower fields. A higher-order masked AES S-box
Santis, F. de; Bauer, T.; Sigl, G.
Conference Paper
2017A step towards measuring the fetal head circumference with the use of obstetric ultrasound in a low resource setting
Heuvel, T.L.A. van den; Petros, H.; Santini, S.; Korte, C.L. de; Ginneken, B. van
Conference Paper
2017Towards Dependability Engineering of Cooperative Automotive Cyber-Physical Systems
Macher, Georg; Armengaud, Eric; Schneider, Daniel; Brenner, Eugen; Kreiner, Christian
Conference Paper
2017Towards post-quantum security for IoT endpoints with NTRU
Guillen, O.M.; Pöppelmann, T.; Bermudo Mera, J.M.; Bongenaar, E.F.; Sigl, G.; Sepulveda, J.
Conference Paper
2017Towards side-channel secure firmware updates: A minimalist anomaly detection approach
Guillen, O.M.; Santis, F. de; Brederlow, R.; Sigl, G.
Conference Paper
2017Towards trace-driven cache attacks on Systems-on-Chips - exploiting bus communication
Sepulveda, J.; Gross, M.; Zankl, A.; Sigl, G.
Conference Paper
2017Trust the biometric mainstream: Multi-biometric fusion and score coherence
Damer, Naser; Rhaibani, Chadi Izzou; Braun, Andreas; Kuijper, Arjan
Conference Paper
2017Umfassende Sicherheit - Safety und Security im Kontext autonomer Systeme
Schneider, Daniel; Trapp, Mario; Dörr, Jörg; Dukanovic, Sinisa; Henkel, Thorsten; Khondoker, Rahamatullah; Krauß, Christoph; Mauthofer, Sebastian; Scheuermann, Dirk; Zelle, Daniel
Journal Article
2017Using echo state networks for cryptography
Ramamurthy, Rajkumar; Bauckhage, Christian; Buza, Krisztian; Wrobel, Stefan
Conference Paper
2017Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs
Immler, V.; Hiller, M.; Liu, Q.; Lenz, A.; Wachter-Zeh, A.
Conference Paper
2017Die Volksverschlüsselung: Förderung vertrauenswürdiger Ende-zu-Ende-Verschlüsselung durch benutzerfreundliches Schlüssel- und Zertifikatsmanagement
Spychalski, Dominik; Eckstein, Levona; Herfert, Michael; Trick, Daniel; Rubinstein, Tatjana
Conference Paper
2017Your rails cannot hide from localized EM: How dual-rail logic fails on FPGAs
Immler, V.; Specht, R.; Unterstein, F.
Conference Paper
201626. SIT-SmartCard Workshop 2016: Darmstadt, 17. und 18. Februar 2016
Waldmann, Ulrich ; Fraunhofer-Institut für Sichere Informationstechnologie -SIT-, Darmstadt
Conference Proceedings
2016AAC encoding detection and bitrate estimation using a convolutional neural network
Seichter, Daniel; Cuccovillo, Luca; Aichroth, Patrick
Conference Paper
2016Analyzing the Spanish strip cipher by combining combinatorial and statistical methods
Sanguino, L.A.B.; Leander, G.; Paar, C.; Esslinger, B.; Niebel, I.
Journal Article
2016Applying base value of fundamental frequency via the multivariate Kernel-Density in forensic speaker comparison
Rodrigues da Silva, Ronaldo; Carvalho Lustosa da Costa, Joao Paulo; Kehrle Miranda, Ricardo; Galdo, Giovanni del
Conference Paper
2016Authentication and searchable symmetric encryption for cloud-based storage of geospatial data
Hiemenz, Benedikt; Kuijper, Arjan (1. Gutachten); Krämer, Michel (Betreuer)
Master Thesis
2016Authorship verification for different languages, genres and topics
Halvani, Oren; Winter, Christian; Pflug, Anika
Journal Article
2016CoKey: Fast token-based cooperative cryptography
Horsch, J.; Wessel, S.; Eckert, C.
Conference Paper
2016Combining low-level features of offline questionnaires for handwriting identification
Siegmund, Dirk; Ebert, Tina; Damer, Naser
Conference Paper
2016Consumer oriented privacy preserving access control for electronic health records in the cloud
Fernando, Ruchith; Ranchal, Rohit; An, Byungchan; Ben Othmane, Lotfi; Bhargava, Bharat
Conference Paper
2016CREDENTIAL: A framework for privacy-preserving cloud-based data sharing
Hörandner, Felix; Krenn, Stephan; Migliavacca, Andrea; Thiemer, Florian; Zwattendorfer, Bernd
Conference Paper
2016Cryptographically enforced four-eyes principle
Bilzhause, A.; Huber, M.; Pöhls, H.C.; Samelin, K.
Conference Paper
2016Datennutzungskontrolle mit IND2UCE
Jung, Christian; Feth, Denis
Book Article
2016A deep neural network for image quality assessment
Bosse, S.; Maniry, D.; Wiegand, T.; Samek, W.
Conference Paper
2016Developers are not the enemy!: The need for usable security APIs
Green, M.; Smith, M.
Journal Article
2016Effects of image compression on ear biometrics
Rathgeb, C.; Pflug, A.; Wagner, J.; Busch, C.
Journal Article
2016A flexible framework for mobile device forensics based on cold boot attacks
Huber, M.; Taubmann, B.; Wessel, S.; Reiser, H.P.; Sigl, G.
Journal Article
2016Fraunhofer-Institut für Graphische Datenverarbeitung. Jahresbericht 2015
Fellner, Dieter W. (Hrsg.); Baier, Konrad (Red.); Ackeren, Janine van (Red.); Bornemann, Heidrun (Red.); Wehner, Detlef (Red.); Bumke, Carina; Boysens, Oliver; Egner, Juliane ; Fraunhofer-Institut für Graphische Datenverarbeitung -IGD-, Darmstadt
Annual Report
2016Future digital forensics in an advanced trusted environment
Maybaum, M.; Toelle, J.
Conference Paper
2016Jumping through hoops: Why do Java developers struggle with cryptography APIs?
Nadi, S.; Krüger, S.; Mezini, M.; Bodden, E.
Conference Paper
2016Laientaugliche Schlüsselgenerierung für die End-zu-End-Verschlüsselung
Herfert, Michael; Selzer, Annika; Waldmann, Ulrich
Journal Article
2016Laser vibration sensing at Fraunhofer IOSB: Review and applications
Lutzmann, Peter; Göhler, Benjamin; Hill, Chris A.; Putten, Frank van
Journal Article
2016Low complexity blind separation technique to solve the permutation ambiguity of convolutive speech mixtures
Lima, Pedro F.C.; Kehrle Miranda, Ricardo; Costa, Joao Paulo C.L. da; Zelenovsky, Ricardo; Yuan, Yizheng; Galdo, Giovanni del
Conference Paper
2016Low-resolution convolutional neural networks for video face recognition
Herrmann, C.; Willersinn, Dieter; Beyerer, Jürgen
Conference Paper
2016Minimum requirements for evaluating side-channel attack resistance of elliptic curve implementations
Kasper, Michael; Petri, Richard; Feldhusen, Dirk; Gebhardt, Max; Illies, Georg; Lochter, Manfred; Stein, Oliver; Thumser, Wolfgang; Wicke, Guntram
Report
2016Mobile biometrics device for future border control
Strobl, B.; Monari, Eduardo
Conference Paper
2016Multi-biometric continuous authentication. A trust model for an asynchronous system
Damer, Naser; Maul, Fabian; Busch, Christoph
Conference Paper
2016NetCo: Reliable routing with unreliable routers
Feldmann, Anja; Heyder, Philipp; Kreutzer, Michael; Schmid, Stefan; Seifert, Jean-Pierre; Shulman, Haya; Thimmaraju, Kashyap; Waidner, Michael; Sieberg, Jens
Conference Paper
2016Obfuscation combiners
Fischlin, Marc; Herzberg, Amir; Bin Noon, Hod; Shulman, Haya
Conference Paper
2016Obfuscation Combiners
Fischlin, Marc; Herzberg, Amir; Bin Noon, Hod; Shulman, Haya
Journal Article
2016Online reliability testing for PUF key derivation
Hiller, M.; Önalan, A.G.; Sigl, G.; Bossert, M.
Conference Paper
2016Open-set microphone classification via blind channel analysis
Cuccovillo, Luca; Aichroth, Patrick
Conference Paper
2016Policy-based implicit attestation for microkernel-based virtualized systems
Wagner, S.; Eckert, C.
Conference Paper
2016Practical aspects of quantization and tamper-sensitivity for physically obfuscated keys
Immler, V.; Hennig, M.; Kürzinger, L.; Sigl, G.
Conference Paper
2016Practical view on face presentation attack detection
Damer, Naser; Dimitrov, Kristiyan
Conference Paper
2016Risks of Industrie 4.0 - an information technology perspective
Usländer, Thomas; Thomalla, Christoph
Abstract
2016SecuSpot: Toward cloud-assisted secure multi-tenant WiFi hotspot infrastructures
Schulz-Zander, J.; Lisicki, R.; Schmid, S.; Feldmann, A.
Conference Paper
2016Simple photonic emission attack with reduced data complexity
Carmon, E.; Seifert, J.-P.; Wool, A.
Conference Paper
2016Towards efficient evaluation of a time-driven cache attack on modern processors
Zankl, A.; Miller, K.; Heyszl, J.; Sigl, G.
Conference Paper
2016Vernetzte IT-Sicherheit in kritischen Infrastrukturen. Tl.2: Informationssicherheit - PREVENT - Integriertes Risikomanagement zur Prävention von Cyber-Angriffen auf die Kernsysteme einer Bank
Großmann, Jürgen
Journal Article
2016Verwundbarkeitsprüfungen mit Shodan
Simon, Kai; Moucha, Cornelius
Journal Article
2016X25519 hardware implementation for low-latency applications
Koppermann, P.; Santis, F. de; Heyszl, J.; Sigl, G.
Conference Paper
201525. SmartCard Workshop 2015. Tagungsband: Darmstadt, 4./5. Februar 2015
Waldmann, U. ; Fraunhofer-Institut für Sichere Informationstechnologie -SIT-, Darmstadt
Conference Proceedings
20156doku: Towards secure over-the-air preloading of 6LoWPAN nodes using PHY key generation
Krentz, K.-F.; Wunder, G.
Conference Paper
2015Bedeutung der Internationalen Norm ISO/IEC 27018 im Kontext von Cloud-Lösungen: IT-Sicherheit
Blind, Knut; Löhe, Martin
Journal Article
2015BOTWATCHER: Transparent and generic botnet tracking
Barabosch, T.; Dombeck, A.; Yakdan, K.; Gerhards-Padilla, E.
Conference Paper
2015Cipher-suite negotiation for DNSSEC: Hop-by-hop or end-to-end?
Herzberg, Amir; Shulman, Haya
Journal Article
2015Closing the gap between speed and configurability of multi-bit fault emulation environments for security and safety-critical designs
Nyberg, R.; Heyszl, J.; Rabe, D.; Sigl, G.
Journal Article
2015Datensicherheit neu interpretieren. Das "Datengold" und Geschäftsmodelle
Jung, Christian; Kalmar, Ralf
Journal Article
2015Datensicherheit neu interpretieren. Das "Datengold" und Geschäftsmodelle
Jung, Christian; Kalmar, Ralf
Report
2015Detection and forensics of domains hijacking
Borgwart, Andreas; Boukoros, Spyros; Shulman, Haya; Royeen, Carel van; Waidner, Michael
Conference Paper
2015Face recognition for great apes: Identification of primates in videos
Loos, Alexander; Kalyanasundaram, Talat Anand Mohan
Conference Paper
2015Face- and appearance-based person identification for forensic analysis of surveillance videos
Herrmann, C.; Metzler, Jürgen; Willersinn, Dieter; Beyerer, Jürgen
Conference Paper
2015Forensic readiness: Emerging discipline for creating reliable and secure digital evidence
Endicott-Popovsky, B.; Kuntze, N.; Rudolph, C.
Journal Article
2015Fraunhofer-Institut für Graphische Datenverarbeitung. Jahresbericht 2014
Fellner, Dieter W. (Hrsg.); Baier, Konrad (Red.); Ackeren, Janine van (Red.); Bornemann, Heidrun (Red.); Fraunhoffer, Katrin (Red.); Wehner, Detlef (Red.) ; Fraunhofer-Institut für Graphische Datenverarbeitung -IGD-, Darmstadt
Annual Report
2015Fuzzy logic and multi-biometric fusion: An Overview
Maul, Fabian; Damer, Naser
Conference Paper
2015Human authentication implemented for mobile applications based on ECG-data acquired from sensorized garments
Tantinger, D.; Zrenner, M.; Lang, N.R.; Leutheuser, H.; Eskofier, B.M.; Weigand, C.; Struck, M.
Conference Paper
2015I feel like i'm taking selfies all day! Towards understanding biometric authentication on smartphones
Luca, A. de; Hang, A.; Zezschwitz, E. von; Hussmann, H.
Conference Paper
2015Improving non-profiled attacks on exponentiations based on clustering and extracting leakage from multi-channel high-resolution EM measurements
Specht, R.; Heyszl, J.; Kleinsteuber, M.; Sigl, G.
Conference Paper
2015Industrial Software Defined Networking
Neff, Sebastian; Margraf, Marian; Müller, Andreas; Larbig, Pedro; Khondoker, Rahamatullah
Bachelor Thesis
2015IT-Sicherheit und Datenschutz im vernetzten Fahrzeug
Krauß, Christoph; Waidner, Michael
Journal Article
2015A lightweight framework for cold boot based forensics on mobile devices
Taubmann, B.; Huber, M.; Wessel, S.; Heim, L.; Reiser, H.P.; Sigl, G.
Conference Paper
2015Low-area reed decoding in a generalized concatenated code construction for PUFs
Hiller, M.; Kürzinger, L.; Sigl, G.; Müelich, S.; Puchinger, S.; Bossert, M.
Conference Paper
2015Multi-biometric continuous authentication: Defining a trust model for an asynchronous system
Maul, Fabian; Busch, Christoph; Damer, Naser (Betreuer)
Master Thesis
2015A new definition and classification of physical unclonable functions
Plaga, R.; Merli, D.
Conference Paper
2015New interpretation of data security. Treasure trove of date and business models
Jung, Christian; Kalmar, Ralf
Journal Article
2015New interpretation of data security. Treasure trove of date and business models
Jung, Christian; Kalmar, Ralf
Report
2015Personalized face reference from video: Key-face selection and feature-level fusion
Damer, Naser; Samartzidis, Timotheos; Nouak, Alexander
Conference Paper
2015Quantum cryptography over the FSO channel with PPM and FSK modulations
Roediger, J.; Perlot, N.; Freund, R.
Conference Paper
2015Robust 2D face recognition under different illuminations using binarized partial face features: Towards protecting ID documents
Butt, Moazzam; Alkhatib, Wael
Conference Paper
2015Schlussbericht zu BMBF-Projekt MisPel: Multi-Biometriebasierte Forensische Personensuche in Lichtbild- und Videomassendaten (MisPel). Teilvorhaben: Fernbereichsbiometrie und IT-Sicherheit: Laufzeit des Vorhabens: 01.01.2012 – 30.04.2015
Willersinn, Dieter ; Fraunhofer-Institut für Optronik, Systemtechnik und Bildauswertung -IOSB-, Karlsruhe
Report
2015Secure cloud-based risk assessment for urban areas
Frese, Sven; Kuijper, Arjan (1. Gutachter); Krämer, Michel (2. Gutachter)
Master Thesis
2015Security overlay for distributed encrypted containers
Patzer, F.; Jakoby, A.; Kresken, Thomas; Müller, Wilmuth
Conference Paper
2015SoK: Secure messaging
Unger, N.; Dechand, S.; Bonneau, J.; Fahl, S.; Perl, H.; Goldberg, I.; Smith, M.
Conference Paper
2015Supply chain network risk analysis - a privacy preserving approach
Fridgen, Gilbert; Zare Garizy, Tirazheh
Conference Paper
2015Towards mobile and touchless fingerprint verification
Jonietz, Christof; Monari, Eduardo; Widak, Heiko; Qu, C.
Conference Paper
2015Towards secure integration of cryptographic software
Arzt, Steven; Nadi, S.; Ali, Karim; Bodden, Eric; Erdweg, S.; Mezini, Mira
Conference Paper
2015Towards touchless palm and finger detection for fingerprint extraction with mobile devices
Jonietz, Christof; Monari, Eduardo; Qu, Chengchao
Conference Paper
2015Weighted integration of neighbors distance ratio in multi-biometric fusion
Damer, Naser; Nouak, Alexander
Conference Paper
This publication list has been generated from the publication database Fraunhofer-Publica.