Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM´s TrustZone /
D. Quarta, M. Ianni, A. Machiry, Y. Fratantonio, E. Gustafson, D. Balzarotti, M. Lindorfer, G. Vigna, C. Krügel /
in: "Research on offensive and defensive techniques in the Context of Man At The End (MATE) Attacks (Checkmate ´21)", ACM (ed.); issued by: ACM; ACM, New York, 2021, ISBN: 978-1-4503-8552-7
Generalized Channels from Limited Blockchain Scripts and Adaptor Signatures /
L. Aumayr, O. Ersoy, A. Erwig, S. Faust, K. Hostáková, M. Maffei, P. Moreno-Sanchez, S. Riahi /
Talk: Asiacrypt 2021, the 27th Annual International Conference on the Theory and Application of Cryptology and Information Security, Singapore; 2021-12-06 - 2021-12-10; in: "Advances in Cryptology - ASIACRYPT 2021", Springer, (2021), ISBN: 978-3-030-92074-6; 635 - 664
Blitz: Secure Multi-Hop Payments Without Two-Phase Commits /
L. Aumayr, P. Moreno-Sanchez, A. Kate, M. Maffei /
Talk: Usenix Security Symposium, Vancouver, B.C., Canada; 2021-08-11 - 2021-08-13; in: "30th USENIX Security Symposium", USENIX: The Advanced Computing Systems Association, (2021), ISBN: 978-1-939133-24-3; 4043 - 4060
Static Analysis of Low-Level Code /
I. Grishchenko /
Supervisor, Reviewer: M. Maffei, G. Weissenbacher, A. Sabelfeld, K. Bhargavan; Institut of Logic and Computation, Security and Privacy, 2021; oral examination: 2021-01-25
Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments /
E. Tairi, P. Moreno-Sanchez, M. Maffei /
Talk: International Conference on Financial Cryptography and Data Security (FC), Grenada; 2021-03-01 - 2021-03-05; in: "Proceedings of the 25th International Conference on Financial Cryptography and Data Security", (2021)
Bitcoin-Compatible Virtual Channels /
L. Aumayr, O. Ersoy, A. Erwig, S. Faust, K. Hostáková, M. Maffei, P. Moreno-Sanchez, S. Riahi /
Talk: IEEE Symposium on Security and Privacy, Oakland, USA; 2021-05-23 - 2021-05-27; in: "42nd IEEE Symposium on Security and Privacy", IEEE Computer Society, (2021), 901 - 918
Cross-Layer Deanonymization Methods in the Lightning Protocol /
M. Romiti, F. Victor, P. Moreno-Sanchez, P. Nordholt, B. Haslhofer, M. Maffei /
in: "Financial Cryptography and Data Security", LNCS, volume 12674; issued by: Springer Verlag; Springer LNCS, Berlin Heidelberg, 2021, ISBN: 978-3-662-64321-1, 187 - 204
Optimized Software Implementations for the Lightweight Encryption Scheme ForkAE /
E. Andreeva, A. Deprez, J. Bermudo Mera, A. Karmakar, A. Purnal /
in: "CARDIS: International Conference on Smart Card Research and Advanced Applications", LNCS, volume 12609; issued by: Springer; Springer, Cham, 2021, ISBN: 978-3-030-68486-0, 68 - 83
Compactness of Hashing Modes and Efficiency Beyond Merkle Tree /
E. Andreeva, R. Bhattacharyya, A. Roy /
in: "Advances in Cryptology - EUROCRYPT 2021", LNCS, volume 12697; issued by: Springer; Springer, Cham, 2021, ISBN: 978-3-030-77885-9, 92 - 123
Can I Take Your Subdomain? Exploring Same-Site Attacks in the Modern Web /
M. Squarcina, M. Tempesta, L. Veronese, S. Calzavara, M. Maffei /
Talk: 30th USENIX Security Symposium, Online; 2021-08-11 - 2021-08-13; in: "30th USENIX Security Symposium", 30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021, (2021), 2917 - 2934
Updatable Signatures and Message Authentication Codes /
V. Cini, S. Ramacher, D. Slamanig, C. Striecks, E. Tairi /
Talk: International Conference on Practice and Theory of Public-Key Cryptography (PKC), Edinburgh, Scotland; 2021-05-09 - 2021-05-13; in: "Proceedings of the 24rd IACR International Conference on the Practice and Theory of Public-Key Cryptography", Springer, Cham, Lecture Notes in Computer Science, vol 12710 (2021), ISBN: 978-3-030-75244-6; 691 - 723
Filter List Generation for Underserved Regions /
A. Sjösten, P. Snyder, A. Pastor, P. Papadopoulos, B. Livshits /
in: "The Web Conference 2020", ACM/IW3C2, 2020, ISBN: 978-1-4503-7023-3, 1682 - 1692
Language-Based Web Session Integrity /
S. Calzavara, R. Focardi, N. Grimm, M. Maffei, M. Tempesta /
Talk: IEEE Computer Security Foundations Symposium, New York; 2020-06-22 - 2020-06-25; in: "33rd IEEE Computer Security Foundations Symposium", IEEE Computer Society, Washington DC (2020), ISBN: 978-1-5386-3217-8; 107 - 122
eThor: Practical and Provably Sound Static Analysis of Ethereum Smart Contracts /
C. Schneidewind, I. Grishchenko, M. Scherer, M. Maffei /
Talk: ACM Conference on Computer and Communications Security (CCS), Orlando; 2020-11-09 - 2020-11-13; in: "CCS '20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security", Association for Computing Machinery ACM, (2020), ISBN: 978-1-4503-7089-9; 621 - 640
Static Amalysis of eWASM Contracts /
A. Schwarz /
Supervisor: C. Schneidewind, M. Maffei; Institut of Logic and Computation, Security and Privacy, 2020; final examination: 2020-01-15
Generalized Bitcoin-Compatible Channels /
L. Aumayr, O. Ersoy, A. Erwig, S. Faust, K. Hostáková, M. Maffei, P. Moreno-Sanchez, S. Riahi /
Report for Cryptology ePrint Archive; Report No. 2020/476, 2020; 35 pages
Bulwark: Holistic and Verified Security Monitoring of Web Protocols /
L. Veronese, S. Calzavara, L. Compagna /
Talk: European Symposium on Research in Computer Security (ESORICS), Guildford, United Kingdom; 2020-09-14 - 2020-09-18; in: "ESORICS 2020: Computer Security", Springer, Lecture Notes in Computer Science, vol 12308 (2020), ISBN: 978-3-030-58950-9; 23 - 41
Verifying Relational Properties using Trace Logic /
G. Barthe, R. Eilers, P. Georgiou, B. Gleiss, L. Kovacs, M. Maffei /
Talk: International Conference on Formal Methods in Computer Aided Design (FMCAD) 2019, San Jose, US; 2019-10-22 - 2019-10-25; in: "Proceedings of Formal Methods in Computer Aided Design (FMCAD)", B. Clark, J. Yang (ed.); IEEE, https://ieeexplore.ieee.org/xpl/conhome/8891869/proceeding (2019), ISBN: 978-0-9835678-9-9; 170 - 178
Reducing Automotive Counterfeiting usingBlockchain: Benefits and Challenges /
D. Lu, P. Moreno-Sanchez, A. Zeryihun, S. Bajpayi, S. Yin, K. Feldman, J. Kosofsky, P. Mitra, A. Kate /
in: "2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON)", issued by: IEEE; IEEE Computer Society, USA, 2019, ISBN: 978-1-7281-1264-0, 39 - 48
From Firewalls to Functions and Back /
L. Ceragioli, L. Galletta, M. Tempesta /
in: "Proceedings of the Third Italian Conference on Cyber Security", 2315; issued by: CEUR-WS.org; CEUR-Proceedings, Aachen, 2019, ISSN: 1613-0073, Paper ID 4, 13 pages
Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability /
G. Malavolta, P. Moreno-Sanchez, C. Schneidewind, A. Kate, M. Maffei /
Talk: Network and Distributed System Security Symposium (NDSS), San Diego, CA, US; 2019-02-24 - 2019-02-27; in: "Proceedings of 2019 Network and Distributed System Security Symposium", Reston (2019), ISBN: 1-891562-55-x; 1 - 15
Reversible Proofs of Sequential Work /
K. Pietrzak, M. Walter, K. Klein, C. Kamath, H. Abusalah /
in: "Advances in Cryptology - EUROCRYPT 2019", volume 11476; issued by: Springer; Springer LNCS, 2019, ISBN: 978-3-030-17652-5, 277 - 291
Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions /
S. Roos, P. Moreno-Sanchez, A. Kate, I. Goldberg /
Talk: Network and Distributed System Security Symposium (NDSS), San Diego; 2018-02-18 - 2018-02-21; in: "25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18-21, 2018", Reston (2018), ISBN: 1-1891562-49-5; 1 - 15
Language-Independent Synthesis of Firewall Policies /
C. Bodei, P. Degano, L. Galletta, R. Focardi, M. Tempesta, L. Veronese /
in: "2018 IEEE European Symposium on Security and Privacy (EuroS&P 2018)", issued by: Institute of Electrical and Electronics Engineers ( IEEE ); IEEE, 2018, ISBN: 978-1-5386-4228-3, 92 - 106
Transcompiling Firewalls /
C. Bodei, P. Degano, R. Focardi, L. Galletta, M. Tempesta /
in: "Principles of Security and Trust: 7th International Conference, POST 2018 Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018 Thessaloniki, Greece, April 14-20, 2018, Proceedings", LNCS 10804; issued by: ETAPS; Springer International Publishing AG, Cham, 2018, ISBN: 978-3-319-89721-9, 303 - 324
Mind Your Keys? A Security Evaluation of Java Keystores /
R. Focardi, M. Squarcina, G. Steel, M. Palmarini, M. Tempesta /
Talk: Network and Distributed System Security Symposium (NDSS), San Diego; 2018-02-18 - 2018-02-21; in: "Proceedings of 2019 Network and Distributed System Security Symposium", (2018), ISBN: 1-891562-49-5; 1 - 15
Subset Predicate Encryption and its Applications /
J. Katz, M. Maffei, G. Malavolta, D. Schröder /
in: "Cryptology and Network Security", LNCS 11261; Springer International Publishing, Cham, Switzerland, 2018, ISBN: 978-3-030-02640-0, 115 - 134
UniTraX: Protecting Data Privacy with Discoverable Biases /
M. Maffei, R. Munz, F. Eigner, P. Francis, D. Garg /
in: "Principles of Security and Trust", LNCS 10804; Springer, Lecture Notes in Computer Science, Schwitzerland, 2018, ISBN: 978-3-319-89721-9, 278 - 299
Firewall Management With FireWall Synthesizer /
M. Tempesta, C. Bodei, P. Degano, R. Forcardi, L. Galletta, L. Veronese /
in: "keiner", issued by: Italian Conference on CyberSecurity (ITASEC); ITASEC, 2018, 1 pages
Functional Credentials /
D. Deuber, M. Maffei, G. Malavolta, M. Rabkin, D. Schröder, M. Simkin /
in: "Proceedings on Privacy Enhancing Technologies", Volume 2018: Issue 2; issued by: De Gruyter Open; Walter de Gruyter GmbH, Berlin, 2018, 64 - 84
Simple Password Hardened Encryption Services /
M. Maffei, M. Reinert, R. Lai, C. Egger, S. Chow, D. Schröder /
in: "Proceedings of the 27th USENIX Security Symposium", 27th; issued by: USENIX Association Berkley, CA, USA; USENIX, 2018, ISBN: 978-1-931971-46-1, 1405 - 1421
GuardION: Practical Mitigation of DMA-based Rowhammer Attacks on ARM /
V. van der Veen, M. Lindorfer, Y. Fratantonio, H. Padmanabha Pillai, G. Vigna, C. Krügel, H. Bos, K. Razavi /
in: "Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)", Springer, 2018, ISBN: 978-3-319-93410-5, 92 - 113
WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring /
S. Calzavara, M. Maffei, C. Schneidewind, M. Tempesta, M. Squarcina /
in: "Proceedings of the 27th USENIX Security Symposium", 27th; issued by: USENIX Association Berkley, CA, USA; USENIX, 2018, ISBN: 978-1-931971-46-1, 1493 - 1510
Foundations and Tools for the Static Analysis of Ethereum Smart Contracts /
I. Gishchenko, M. Maffei, C. Schneidewind /
in: "Proceedings of the 30th International Conference on Computer-Aided Verification", LNCS 10981; G. Weissenbacher, H. Chockler (ed.); issued by: Springer, Cham; Springer Open, 2018, ISBN: 978-3-319-96145-3, 51 - 78
Information Flow Tracking for Side-Effectful Libraries /
A. Sjösten, D. Hedin, A. Sabelfeld /
in: "International Conference on Formal Techniques for Distributed Objects, Components, and Systems", Springer, 2018, ISBN: 978-3-319-92611-7, 141 - 160
A Type System for Privacy Properties /
M. Maffei, J. Lallemand, V. Cortier, N. Grimm /
Talk: ACM CCS 2017 Conference on Computer and Communications Security, Dallas, USA; 2017-10-30 - 2017-11-03; in: "CCS '17 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security", ACM Digital Library, New York (2017), ISBN: 978-1-4503-4946-8; 409 - 423
A Sound Flow-Sensitive Heap Abstraction for the Static Analysis of Android Applications /
M. Maffei, S. Calzavara, I. Grishchenko, A. Koutsos /
Talk: IEEE Computer Security Foundations Symposium, Santa Barbara, USA; 2017-08-21 - 2017-08-25; in: "IEEE 30th Computer Security Foundations Symposium CSF 2017", IEEE Xplore Digital Library, (2017), ISBN: 978-1-5386-3217-8; Paper ID 3, 15 pages
Concurrency and Privacy with Payment-Channel Networks /
M. Maffei, A. Kate, G. Malavolta, P. Moreno-Sanchez, S. Ravi /
in: "CCS '17 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security", ACM Digital Library, New York, 2017, ISBN: 978-1-4503-4946-8, 455 - 471
Principles of Security and Trust /
M. Maffei, M. Ryan, P. Ah-Fat, M. Alabbad, M. Alvim, Z. Aslanyan, N. Atzei, K. Babel, M. Bartoletti, L. Bauer, A. Blot, S. Bursuc, P. Cañones, G. Casini, V. Cheval, T. Cimoli, M. Cramer, J. Dreier, C. Duménil, D. Hedin, M. Hicks, M. Huth, L. Jia, C. Johansen, O. Jones, R. Khedri, B. Köpf, S. Kremer, P. Laud, P. Mardziel, F. Nielson, M. Pettai, F. Piessens, W. Rafnsson, J. Reineke, A. Sabelfeld, R. Sasse, T. Terauchi, S. Xu, M. Yamamoto, A. Sjösten /
Springer-Verlag, Berlin, Heidelberg, 2017, ISBN: 978-3-662-54454-9; 321 pages
On the Security of Frequency-Hiding Order-Preserving Encryption /
M. Reinert, D. Schröder, M. Maffei /
in: "Cryptology and Network Security", Lecture Notes in Computer Science, vol 11261; Springer International Publishing, Cham, Switzerland, 2017, ISBN: 978-3-030-02640-0, 51 - 70
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms /
V. van der Veen, Y. Fratantonio, M. Lindorfer, D. Gruss, C. Maurice, G. Vigna, H. Bos, K. Razavi, C. Giuffrida /
in: "ACM Conference on Computer and Communications Security (CCS)", ACM, 2016, ISBN: 978-1-4503-4139-4, 1675 - 1689
Andrubis - 1,000,000 Apps Later: A View on Current Android Malware Behaviors /
M. Lindorfer, M. Neugschwandtner, L. Weichselbaum, Y. Fratantonio, V. van der Veen, Ch. Platzer /
in: "Proceedings of the 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS)", IEEE, 2014, ISBN: 978-1-4799-8308-7, 3 - 17
AndRadar: Fast Discovery of Android Applications in Alternative Markets /
M. Lindorfer, V. Volanis, A. Sisto, M. Neugschwandtner, E. Athanasopoulos, F. Maggi, Ch. Platzer, S. Zanero, S. Ioannidis /
in: "Proceedings of the 11th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA)", Springer, LNCS 8550, 2014, ISBN: 978-3-319-08508-1, 51 - 71
Enter Sandbox: Android Sandbox Comparison /
S. Neuner, v. Victor, M. Lindorfer, M. Huber, M. Georg, M. Mulazzani, E. Weippl /
in: "Proceedings of the IEEE Mobile Security Technologies Workshop (MoST)", IEEE, 2014
2013
Take a Bite - Finding the Worm in the Apple /
M. Lindorfer, B. Miller, M. Neugschwandtner, Ch. Platzer /
in: "International Conference on Information, Communications and Signal Processing (ICICS)", IEEE, 2013
POSTER: Cross-Platform Malware: Write Once, Infect Everywhere /
M. Lindorfer, M. Neumayr, J. Caballero, Ch. Platzer /
Poster: ACM Conference on Computer and Communications Security (CCS), Berlin; 2013-11-04 - 2013-11-08; in: "ACM Conference on Computer and Communications Security (CCS)", (2013)
A View to a Kill: WebView Exploitation /
M. Neugschwandtner, M. Lindorfer, Ch. Platzer /
in: "USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)", USENIX, 2013
2012
Lines of Malicious Code: Insights Into the Malicious Software Industry /
M. Lindorfer, A. Di Federico, F. Maggi, P. Milani Comparetti, S. Zanero /
in: "Proceedings of the 28th Annual Computer Security Applications Conference", ACM, New York, 2012, ISBN: 978-1-4503-1312-4, 349 - 358
2011
Detecting Environment-Sensitive Malware /
M. Lindorfer /
Supervisor: E. Kirda, P. Milani Comparetti, C. Kolbitsch; Institut für Rechnergestützte Automation, 2011
Detecting Environment-Sensitive Malware /
M. Lindorfer, C. Kolbitsch, P. Milani Comparetti /
in: "Proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection (2011)", Springer, 2011, ISBN: 978-3-642-23643-3