ARMageddon: Cache Attacks on Mobile Devices M Lipp, D Gruss, R Spreitzer, C Maurice, S Mangard USENIX Security Symposium (USENIX Security 16), 549-564, 2016 | 576 | 2016 |
Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches D Gruss, R Spreitzer, S Mangard USENIX Security Symposium (USENIX Security 15), 897-912, 2015 | 576 | 2015 |
Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices R Spreitzer, V Moonsamy, T Korak, S Mangard IEEE Communications Surveys and Tutorials, 2017 | 284 | 2017 |
PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices R Spreitzer Security and Privacy in Smartphones & Mobile Devices (SPSM@CCS), 51-62, 2014 | 116 | 2014 |
KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks M Schwarz, M Lipp, D Gruss, S Weiser, C Maurice, R Spreitzer, ... Network and Distributed Systems Security (NDSS), 2018 | 87 | 2018 |
DATA - Differential Address Trace Analysis: Finding Address-based Side-Channels in Binaries S Weiser, A Zankl, R Spreitzer, K Miller, S Mangard, G Sigl USENIX Security Symposium (USENIX Security 18), 603-620, 2018 | 79 | 2018 |
Cache-Access Pattern Attack on Disaligned AES T-Tables R Spreitzer, T Plos Constructive Side-Channel Analysis and Secure Design (COSADE), 200-214, 2013 | 64 | 2013 |
On the Applicability of Time-Driven Cache Attacks on Mobile Devices R Spreitzer, T Plos Network and System Security (NSS), 656-662, 2013 | 58 | 2013 |
Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android R Spreitzer, S Griesmayr, T Korak, S Mangard Security & Privacy in Wireless and Mobile Networks (WiSec), 49-60, 2016 | 56 | 2016 |
Single Trace Attack Against RSA Key Generation in Intel SGX SSL S Weiser, R Spreitzer, L Bodner ASIA Conference on Computer and Communications Security (AsiaCCS), 575-586, 2018 | 50 | 2018 |
Big Numbers – Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations S Weiser, D Schrammel, L Bodner, R Spreitzer USENIX Security Symposium (USENIX Security 20), 2020 | 49 | 2020 |
Towards More Practical Time-Driven Cache Attacks R Spreitzer, B Gérard Information Security Theory and Practice (WISTP), 24-39, 2014 | 44 | 2014 |
Privacy-Aware Authentication in the Internet of Things H Gross, M Hölbl, D Slamanig, R Spreitzer Cryptology and Network Security (CANS), 32-39, 2015 | 43 | 2015 |
ProcHarvester: Fully Automated Analysis of Procfs Side-Channel Leaks on Android R Spreitzer, F Kirchengast, D Gruss, S Mangard ASIA Conference on Computer and Communications Security (AsiaCCS), 749-763, 2018 | 40 | 2018 |
Adding Controllable Linkability to Pairing-Based Group Signatures For Free D Slamanig, R Spreitzer, T Unterluggauer Information Security (ISC), 388-400, 2014 | 34 | 2014 |
SCAnDroid: Automated Side-Channel Analysis of Android APIs R Spreitzer, G Palfinger, S Mangard Security and Privacy in Wireless and Mobile Networks (WiSec), 224-235, 2018 | 33 | 2018 |
Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability O Blazy, D Derler, D Slamanig, R Spreitzer Topics in Cryptology (CT-RSA), 127-143, 2016 | 25 | 2016 |
Automated Binary Analysis on iOS - A Case Study on Cryptographic Misuse in iOS Applications J Feichtner, D Missmann, R Spreitzer Security and Privacy in Wireless and Mobile Networks (WiSec), 236-247, 2018 | 18 | 2018 |
Linking-Based Revocation for Group Signatures: A Pragmatic Approach for Efficient Revocation Checks D Slamanig, R Spreitzer, T Unterluggauer International Conference on Cryptology in Malaysia (Mycrypt), 364-388, 2016 | 17* | 2016 |
Concept for a Security Aware Automatic Fare Collection System Using HF/UHF Dual Band RFID Transponders L Zöscher, J Grosinger, R Spreitzer, U Muehlmann, H Gross, W Bösch European Solid State Device Research Conference (ESSDERC), 194-197, 2015 | 17 | 2015 |