Updatable Signatures and Message Authentication Codes /
V. Cini, S. Ramacher, D. Slamanig, C. Striecks, E. Tairi /
accepted as talk for: International Conference on Practice and Theory of Public-Key Cryptography (PKC), Edinburgh, Scotland; 2021-05-09 - 2021-05-13; in: "Proceedings of the 24rd IACR International Conference on the Practice and Theory of Public-Key Cryptography", (2021)
A2L: Anonymous Atomic Locks for Scalability in Payment Channel Hubs /
E. Tairi, P. Moreno-Sanchez, M. Maffei /
accepted as talk for: IEEE Symposium on Security and Privacy, Oakland, USA; 2021-05-23 - 2021-05-27; in: "42nd IEEE Symposium on Security and Privacy", (2021)
Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments /
E. Tairi, P. Moreno-Sanchez, M. Maffei /
accepted as talk for: International Conference on Financial Cryptography and Data Security (FC), Grenada; 2021-03-01 - 2021-03-05; in: "Proceedings of the 25th International Conference on Financial Cryptography and Data Security", (2021)
Blitz: Secure Multi-Hop Payments Without Two-Phase Commits /
L. Aumayr, P. Moreno-Sanchez, A. Kate, M. Maffei /
accepted as talk for: Usenix Security Symposium, Vancouver, B.C., Canada; 2021-08-11 - 2021-08-13; in: "30th USENIX Security Symposium", USENIX: The Advanced Computing Systems Association, (2021), https://eprint.iacr.org/2021/176.pdf
Bitcoin-Compatible Virtual Channels /
L. Aumayr, O. Ersoy, A. Erwig, S. Faust, K. Hostáková, M. Maffei, P. Moreno-Sanchez, S. Riahi /
accepted as talk for: IEEE Symposium on Security and Privacy, Oakland, USA; 2021-05-23 - 2021-05-27; in: "42nd IEEE Symposium on Security and Privacy", IEEE Computer Society, (2021), https://eprint.iacr.org/2020/554.pdf
Language-Based Web Session Integrity /
S. Calzavara, R. Focardi, N. Grimm, M. Maffei, M. Tempesta /
Talk: IEEE Computer Security Foundations Symposium, New York; 2020-06-22 - 2020-06-25; in: "33rd IEEE Computer Security Foundations Symposium", IEEE Computer Society, Washington DC (2020), ISBN: 978-1-5386-3217-8
Generalized Bitcoin-Compatible Channels /
L. Aumayr, O. Ersoy, A. Erwig, S. Faust, K. Hostáková, M. Maffei, P. Moreno-Sanchez, S. Riahi /
Report for Cryptology ePrint Archive; Report No. 2020/476, 2020; 35 pages
Formalizing Graph Trail Properties in Isabelle/HOL /
L. Kovacs, Hanna Lachnitt, S. Szeider /
Talk: International Conference on Intelligent Computer Mathematics (CICM), Bertinoro, Forli, Italy; 2020-07-26 - 2020-07-31; in: "CICM 2020: Intelligent Computer Mathematics", LNCS, 12236 (2020), ISBN: 978-3-030-53518-6; 190 - 205
Bulwark: Holistic and Verified Security Monitoring of Web Protocols /
L. Veronese, S. Calzavara, L. Compagna /
Talk: European Symposium on Research in Computer Security (ESORICS), Guildford, United Kingdom; 2020-09-14 - 2020-09-18; in: "ESORICS 2020: Computer Security", (2020), 23 - 41
From Firewalls to Functions and Back /
L. Ceragioli, L. Galletta, M. Tempesta /
in: "Proceedings of the Third Italian Conference on Cyber Security", 2315; issued by: CEUR-WS.org; CEUR-Proceedings, Aachen, 2019, ISSN: 1613-0073, Paper ID 4, 13 pages
Verifying Relational Properties using Trace Logic /
G. Barthe, R. Eilers, P. Georgiou, B. Gleiss, L. Kovacs, M. Maffei /
Talk: International Conference on Formal Methods in Computer Aided Design (FMCAD) 2019, San Jose, US; 2019-10-22 - 2019-10-25; in: "Proceedings of Formal Methods in Computer Aided Design (FMCAD)", B. Clark, J. Yang (ed.); IEEE, https://ieeexplore.ieee.org/xpl/conhome/8891869/proceeding (2019), ISBN: 978-0-9835678-9-9; 170 - 178
Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability /
G. Malavolta, P. Moreno-Sanchez, C. Schneidewind, A. Kate, M. Maffei /
Talk: Network and Distributed System Security Symposium (NDSS), San Diego, CA, US; 2019-02-24 - 2019-02-27; in: "Proceedings of 2019 Network and Distributed System Security Symposium", Reston (2019), ISBN: 1-891562-55-x; 1 - 15
Reducing Automotive Counterfeiting usingBlockchain: Benefits and Challenges /
D. Lu, P. Moreno-Sanchez, A. Zeryihun, S. Bajpayi, S. Yin, K. Feldman, J. Kosofsky, P. Mitra, A. Kate /
in: "2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON)", issued by: IEEE; IEEE Computer Society, USA, 2019, ISBN: 978-1-7281-1264-0, 39 - 48
Simple Password Hardened Encryption Services /
M. Maffei, M. Reinert, R. Lai, C. Egger, S. Chow, D. Schröder /
in: "Proceedings of the 27th USENIX Security Symposium", 27th; issued by: USENIX Association Berkley, CA, USA; USENIX, 2018, ISBN: 978-1-931971-46-1, 1405 - 1421
UniTraX: Protecting Data Privacy with Discoverable Biases /
M. Maffei, R. Munz, F. Eigner, P. Francis, D. Garg /
in: "Principles of Security and Trust", LNCS 10804; Springer, Lecture Notes in Computer Science, Schwitzerland, 2018, ISBN: 978-3-319-89721-9, 278 - 299
Firewall Management With FireWall Synthesizer /
M. Tempesta, C. Bodei, P. Degano, R. Forcardi, L. Galletta, L. Veronese /
in: "keiner", issued by: Italian Conference on CyberSecurity (ITASEC); ITASEC, 2018, 1 pages
GuardION: Practical Mitigation of DMA-based Rowhammer Attacks on ARM /
V. van der Veen, M. Lindorfer, Y. Fratantonio, H. Padmanabha Pillai, G. Vigna, C. Krügel, H. Bos, K. Razavi /
in: "Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)", Springer, 2018, ISBN: 978-3-319-93410-5, 92 - 113
Mind Your Keys? A Security Evaluation of Java Keystores /
R. Focardi, M. Squarcina, G. Steel, M. Palmarini, M. Tempesta /
Talk: Network and Distributed System Security Symposium (NDSS), San Diego; 2018-02-18 - 2018-02-21; in: "Proceedings of 2019 Network and Distributed System Security Symposium", (2018), 1-1891562-49-5; 1 - 15
Transcompiling Firewalls /
C. Bodei, P. Degano, R. Focardi, L. Galletta, M. Tempesta /
in: "Principles of Security and Trust: 7th International Conference, POST 2018 Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018 Thessaloniki, Greece, April 14-20, 2018, Proceedings", LNCS 10804; issued by: ETAPS; Springer International Publishing AG, Cham, 2018, ISBN: 978-3-319-89721-9, 303 - 324
Language-Independent Synthesis of Firewall Policies /
C. Bodei, P. Degano, L. Galletta, R. Focardi, M. Tempesta, L. Veronese /
in: "2018 IEEE European Symposium on Security and Privacy (EuroS&P 2018)", issued by: Institute of Electrical and Electronics Engineers ( IEEE ); IEEE, 2018, ISBN: 978-1-5386-4228-3, 92 - 106
Functional Credentials /
D. Deuber, M. Maffei, G. Malavolta, M. Rabkin, D. Schröder, M. Simkin /
in: "Proceedings on Privacy Enhancing Technologies", Volume 2018: Issue 2; issued by: De Gruyter Open; Walter de Gruyter GmbH, Berlin, 2018, 64 - 84
WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring /
S. Calzavara, M. Maffei, C. Schneidewind, M. Tempesta, M. Squarcina /
in: "Proceedings of the 27th USENIX Security Symposium", 27th; issued by: USENIX Association Berkley, CA, USA; USENIX, 2018, ISBN: 978-1-931971-46-1, 1493 - 1510
Foundations and Tools for the Static Analysis of Ethereum Smart Contracts /
I. Gishchenko, M. Maffei, C. Schneidewind /
in: "Proceedings of the 30th International Conference on Computer-Aided Verification", LNCS 10981; G. Weissenbacher, H. Chockler (ed.); issued by: Springer, Cham; Springer Open, 2018, ISBN: 978-3-319-96145-3, 51 - 78
Run-Time Attack Detection in Cryptographic APIs /
M. Squarcina, R. Focardi /
Talk: IEEE Computer Security Foundations Symposium, Santa Barbara, USA; 2017-08-21 - 2017-08-25; in: "Run-Time Attack Detection in Cryptographic APIs", IEEE Xplore Digital Library, (2017), ISBN: 978-1-5386-3217-8; 176 - 188
A Sound Flow-Sensitive Heap Abstraction for the Static Analysis of Android Applications /
M. Matteo, S. Calzavara, I. Grishchenko, A. Koutsos /
Talk: IEEE Computer Security Foundations Symposium, Santa Barbara, USA; 2017-08-21 - 2017-08-25; in: "IEEE 30th Computer Security Foundations Symposium CSF 2017", IEEE Xplore Digital Library, (2017), ISBN: 978-1-5386-3217-8; Paper ID 3, 15 pages
Principles of Security and Trust /
M. Matteo, M. Ryan, P. Ah-Fat, M. Alabbad, M. Alvim, Z. Aslanyan, N. Atzei, K. Babel, M. Bartoletti, L. Bauer, A. Blot, S. Bursuc, P. Cañones, G. Casini, V. Cheval, T. Cimoli, M. Cramer, J. Dreier, C. Duménil, D. Hedin, M. Hicks, M. Huth, L. Jia, C. Johansen, O. Jones, R. Khedri, B. Köpf, S. Kremer, P. Laud, P. Mardziel, F. Nielson, M. Pettai, F. Piessens, W. Rafnsson, J. Reineke, A. Sabelfeld, R. Sasse, A. Sjösten, T. Terauchi, S. Xu, M. Yamamoto /
Springer-Verlag, Berlin, Heidelberg, 2017, ISBN: 978-3-662-54454-9; 1 pages
Concurrency and Privacy with Payment-Channel Networks /
M. Matteo, A. Kate, G. Malavolta, P. Moreno-Sanchez, S. Ravi /
in: "CCS '17 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security", ACM Digital Library, New York, 2017, ISBN: 978-1-4503-4946-8, 455 - 471
A Type System for Privacy Properties /
M. Matteo, J. Lallemand, V. Cortier, N. Grimm /
Talk: ACM CCS 2017 Conference on Computer and Communications Security, Dallas, USA; 2017-10-30 - 2017-11-03; in: "CCS '17 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security", ACM Digital Library, New York (2017), ISBN: 978-1-4503-4946-8; 409 - 423
2016
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms /
V. van der Veen, Y. Fratantonio, M. Lindorfer, D. Gruss, C. Maurice, G. Vigna, H. Bos, K. Razavi, C. Giuffrida /
in: "ACM Conference on Computer and Communications Security (CCS)", ACM, 2016, ISBN: 978-1-4503-4139-4, 1675 - 1689
Enter Sandbox: Android Sandbox Comparison /
S. Neuner, v. Victor, M. Lindorfer, M. Huber, M. Georg, M. Mulazzani, E. Weippl /
in: "Proceedings of the IEEE Mobile Security Technologies Workshop (MoST)", IEEE, 2014
Andrubis - 1,000,000 Apps Later: A View on Current Android Malware Behaviors /
M. Lindorfer, M. Neugschwandtner, L. Weichselbaum, Y. Fratantonio, V. van der Veen, Ch. Platzer /
in: "Proceedings of the 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS)", IEEE, 2014, ISBN: 978-1-4799-8308-7, 3 - 17
AndRadar: Fast Discovery of Android Applications in Alternative Markets /
M. Lindorfer, V. Volanis, A. Sisto, M. Neugschwandtner, E. Athanasopoulos, F. Maggi, Ch. Platzer, S. Zanero, S. Ioannidis /
in: "Proceedings of the 11th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA)", Springer, LNCS 8550, 2014, ISBN: 978-3-319-08508-1, 51 - 71
2013
Take a Bite - Finding the Worm in the Apple /
M. Lindorfer, B. Miller, M. Neugschwandtner, Ch. Platzer /
in: "International Conference on Information, Communications and Signal Processing (ICICS)", IEEE, 2013
POSTER: Cross-Platform Malware: Write Once, Infect Everywhere /
M. Lindorfer, M. Neumayr, J. Caballero, Ch. Platzer /
Poster: ACM Conference on Computer and Communications Security (CCS), Berlin; 2013-11-04 - 2013-11-08; in: "ACM Conference on Computer and Communications Security (CCS)", (2013)
A View to a Kill: WebView Exploitation /
M. Neugschwandtner, M. Lindorfer, Ch. Platzer /
in: "USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)", USENIX, 2013
2012
Lines of Malicious Code: Insights Into the Malicious Software Industry /
M. Lindorfer, A. Di Federico, F. Maggi, P. Milani Comparetti, S. Zanero /
in: "Proceedings of the 28th Annual Computer Security Applications Conference", ACM, New York, 2012, ISBN: 978-1-4503-1312-4, 349 - 358
2011
Detecting Environment-Sensitive Malware /
M. Lindorfer, C. Kolbitsch, P. Milani Comparetti /
in: "Proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection (2011)", Springer, 2011, ISBN: 978-3-642-23643-3
Detecting Environment-Sensitive Malware /
M. Lindorfer /
Supervisor: E. Kirda, P. Milani Comparetti, C. Kolbitsch; Institut für Rechnergestützte Automation, 2011