Raphael Spreitzer

Orcid: 0000-0001-6844-292X

According to our database1, Raphael Spreitzer authored at least 28 papers between 2013 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations.
Proceedings of the 29th USENIX Security Symposium, 2020

2018
Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices.
IEEE Commun. Surv. Tutorials, 2018

SCAnDroid: Automated Side-Channel Analysis of Android APIs.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Automated Binary Analysis on iOS: A Case Study on Cryptographic Misuse in iOS Applications.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

DATA - Differential Address Trace Analysis: Finding Address-based Side-Channels in Binaries.
Proceedings of the 27th USENIX Security Symposium, 2018

KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

DATA - Differential Address Trace Analysis.
Proceedings of the 28. Krypto-Tag, 2018

Single Trace Attack Against RSA Key Generation in Intel SGX SSL.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

ProcHarvester: Fully Automated Analysis of Procfs Side-Channel Leaks on Android.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
KeyDrown: Eliminating Keystroke Timing Side-Channel Attacks.
CoRR, 2017

2016
Group Signatures with Linking-Based Revocation: A Pragmatic Approach for Efficient Revocation Checks.
IACR Cryptol. ePrint Arch., 2016

Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability.
IACR Cryptol. ePrint Arch., 2016

HF/UHF dual band RFID transponders for an information-driven public transportation system.
Elektrotech. Informationstechnik, 2016

SoK: Systematic Classification of Side-Channel Attacks on Mobile Devices.
CoRR, 2016

Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

ARMageddon: Cache Attacks on Mobile Devices.
Proceedings of the 25th USENIX Security Symposium, 2016

Linking-Based Revocation for Group Signatures: A Pragmatic Approach for Efficient Revocation Checks.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

2015
Privacy-Aware Authentication in the Internet of Things.
IACR Cryptol. ePrint Arch., 2015

ARMageddon: Last-Level Cache Attacks on Mobile Devices.
CoRR, 2015

Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches.
Proceedings of the 24th USENIX Security Symposium, 2015

Concept for a security aware automatic fare collection system using HF/UHF dual band RFID transponders.
Proceedings of the 45th European Solid State Device Research Conference, 2015

2014
Adding Controllable Linkability to Pairing-Based Group Signatures For Free.
IACR Cryptol. ePrint Arch., 2014

Towards More Practical Time-Driven Cache Attacks.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014

Group-signature schemes on constrained devices: the gap between theory and practice.
Proceedings of the First Workshop on Cryptography and Security in Computing Systems, 2014

PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices.
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014

2013
On the Applicability of Time-Driven Cache Attacks on Mobile Devices (Extended Version).
IACR Cryptol. ePrint Arch., 2013

On the Applicability of Time-Driven Cache Attacks on Mobile Devices.
Proceedings of the Network and System Security - 7th International Conference, 2013

Cache-Access Pattern Attack on Disaligned AES T-Tables.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013


  Loading...