Follow
Raphael Spreitzer
Title
Cited by
Cited by
Year
Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches
D Gruss, R Spreitzer, S Mangard
USENIX Security Symposium (USENIX Security 15), 897-912, 2015
6012015
ARMageddon: Cache Attacks on Mobile Devices
M Lipp, D Gruss, R Spreitzer, C Maurice, S Mangard
USENIX Security Symposium (USENIX Security 16), 549-564, 2016
5922016
Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices
R Spreitzer, V Moonsamy, T Korak, S Mangard
IEEE Communications Surveys and Tutorials, 2017
2972017
PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices
R Spreitzer
Security and Privacy in Smartphones & Mobile Devices (SPSM@CCS), 51-62, 2014
1192014
KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks
M Schwarz, M Lipp, D Gruss, S Weiser, C Maurice, R Spreitzer, ...
Network and Distributed Systems Security (NDSS), 2018
922018
DATA - Differential Address Trace Analysis: Finding Address-based Side-Channels in Binaries
S Weiser, A Zankl, R Spreitzer, K Miller, S Mangard, G Sigl
USENIX Security Symposium (USENIX Security 18), 603-620, 2018
852018
Cache-Access Pattern Attack on Disaligned AES T-Tables
R Spreitzer, T Plos
Constructive Side-Channel Analysis and Secure Design (COSADE), 200-214, 2013
652013
On the Applicability of Time-Driven Cache Attacks on Mobile Devices
R Spreitzer, T Plos
Network and System Security (NSS), 656-662, 2013
592013
Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android
R Spreitzer, S Griesmayr, T Korak, S Mangard
Security & Privacy in Wireless and Mobile Networks (WiSec), 49-60, 2016
582016
Big Numbers – Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations
S Weiser, D Schrammel, L Bodner, R Spreitzer
USENIX Security Symposium (USENIX Security 20), 2020
532020
Single Trace Attack Against RSA Key Generation in Intel SGX SSL
S Weiser, R Spreitzer, L Bodner
ASIA Conference on Computer and Communications Security (AsiaCCS), 575-586, 2018
532018
Towards More Practical Time-Driven Cache Attacks
R Spreitzer, B Gérard
Information Security Theory and Practice (WISTP), 24-39, 2014
442014
Privacy-Aware Authentication in the Internet of Things
H Gross, M Hölbl, D Slamanig, R Spreitzer
Cryptology and Network Security (CANS), 32-39, 2015
432015
ProcHarvester: Fully Automated Analysis of Procfs Side-Channel Leaks on Android
R Spreitzer, F Kirchengast, D Gruss, S Mangard
ASIA Conference on Computer and Communications Security (AsiaCCS), 749-763, 2018
422018
SCAnDroid: Automated Side-Channel Analysis of Android APIs
R Spreitzer, G Palfinger, S Mangard
Security and Privacy in Wireless and Mobile Networks (WiSec), 224-235, 2018
362018
Adding Controllable Linkability to Pairing-Based Group Signatures For Free
D Slamanig, R Spreitzer, T Unterluggauer
Information Security (ISC), 388-400, 2014
342014
Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability
O Blazy, D Derler, D Slamanig, R Spreitzer
Topics in Cryptology (CT-RSA), 127-143, 2016
262016
Automated Binary Analysis on iOS - A Case Study on Cryptographic Misuse in iOS Applications
J Feichtner, D Missmann, R Spreitzer
Security and Privacy in Wireless and Mobile Networks (WiSec), 236-247, 2018
192018
Linking-Based Revocation for Group Signatures: A Pragmatic Approach for Efficient Revocation Checks
D Slamanig, R Spreitzer, T Unterluggauer
International Conference on Cryptology in Malaysia (Mycrypt), 364-388, 2016
18*2016
Concept for a Security Aware Automatic Fare Collection System Using HF/UHF Dual Band RFID Transponders
L Zöscher, J Grosinger, R Spreitzer, U Muehlmann, H Gross, W Bösch
European Solid State Device Research Conference (ESSDERC), 194-197, 2015
182015
The system can't perform the operation now. Try again later.
Articles 1–20