Skip to main content

Showing 1–45 of 45 results for author: Seifert, J

.
  1. What All the PHUZZ Is About: A Coverage-guided Fuzzer for Finding Vulnerabilities in PHP Web Applications

    Authors: Sebastian Neef, Lorenz Kleissner, Jean-Pierre Seifert

    Abstract: Coverage-guided fuzz testing has received significant attention from the research community, with a strong focus on binary applications, greatly disregarding other targets, such as web applications. The importance of the World Wide Web in everyone's life cannot be overstated, and to this day, many web applications are developed in PHP. In this work, we address the challenges of applying coverage-g… ▽ More

    Submitted 10 June, 2024; originally announced June 2024.

    Comments: Preprint; Final version to be published in ASIA CCS '24: Proceedings of the 2024 ACM Asia Conference on Computer and Communications Security

    Journal ref: Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2024, pages 1523 to 1538

  2. arXiv:2406.03160  [pdf, other

    physics.atm-clus

    Cold molecular ions via autoionization below the dissociation limit

    Authors: Sascha Schaller, Johannes Seifert, Giacomo Valtolina, André Fielicke, Boris G. Sartakov, Gerard Meijer

    Abstract: Several diatomic transition metal oxides, rare-earth metal oxides and fluorides have the unusual property that their bond dissociation energy is larger than their ionization energy. In these molecules, bound levels above the ionization energy can be populated via strong, resonant transitions from the ground state. The only relevant decay channel of these levels is autoionization; predissociation i… ▽ More

    Submitted 5 June, 2024; originally announced June 2024.

  3. arXiv:2401.08881  [pdf, other

    cs.CR

    Whispering Pixels: Exploiting Uninitialized Register Accesses in Modern GPUs

    Authors: Frederik Dermot Pustelnik, Xhani Marvin Saß, Jean-Pierre Seifert

    Abstract: Graphic Processing Units (GPUs) have transcended their traditional use-case of rendering graphics and nowadays also serve as a powerful platform for accelerating ubiquitous, non-graphical rendering tasks. One prominent task is inference of neural networks, which process vast amounts of personal data, such as audio, text or images. Thus, GPUs became integral components for handling vast amounts of… ▽ More

    Submitted 16 January, 2024; originally announced January 2024.

  4. arXiv:2311.14780  [pdf, other

    eess.IV physics.optics

    Wavelength-multiplexed Multi-mode EUV Reflection Ptychography based on Automatic-Differentiation

    Authors: Yifeng Shao, Sven Weerdenburg, Jacob Seifert, H. Paul Urbach, Allard P. Mosk, Wim Coene

    Abstract: Ptychographic extreme ultraviolet (EUV) diffractive imaging has emerged as a promising candidate for the next-generation metrology solutions in the semiconductor industry, as it can image wafer samples in reflection geometry at the nanoscale. This technique has surged attention recently, owing to the significant progress in high-harmonic generation (HHG) EUV sources and advancements in both hardwa… ▽ More

    Submitted 24 November, 2023; originally announced November 2023.

  5. arXiv:2311.07580  [pdf, other

    eess.IV physics.comp-ph physics.optics

    Noise-robust latent vector reconstruction in ptychography using deep generative models

    Authors: Jacob Seifert, Yifeng Shao, Allard P. Mosk

    Abstract: Computational imaging is increasingly vital for a broad spectrum of applications, ranging from biological to material sciences. This includes applications where the object is known and sufficiently sparse, allowing it to be described with a reduced number of parameters. When no explicit parameterization is available, a deep generative model can be trained to represent an object in a low-dimensiona… ▽ More

    Submitted 14 January, 2024; v1 submitted 18 October, 2023; originally announced November 2023.

    Journal ref: Opt. Express 32(1), 1020-1033 (2024)

  6. arXiv:2309.09782  [pdf, other

    cs.CR

    Modulation to the Rescue: Identifying Sub-Circuitry in the Transistor Morass for Targeted Analysis

    Authors: Xhani Marvin Saß, Thilo Krachenfels, Frederik Dermot Pustelnik, Jean-Pierre Seifert, Christian Große, Frank Altmann

    Abstract: Physical attacks form one of the most severe threats against secure computing platforms. Their criticality arises from their corresponding threat model: By, e.g., passively measuring an integrated circuit's (IC's) environment during a security-related operation, internal secrets may be disclosed. Furthermore, by actively disturbing the physical runtime environment of an IC, an adversary can cause… ▽ More

    Submitted 18 September, 2023; originally announced September 2023.

    Comments: 6 pages, short paper at ASHES2023

  7. arXiv:2308.02436  [pdf, other

    eess.IV physics.comp-ph physics.optics

    Maximum-likelihood estimation in ptychography in the presence of Poisson-Gaussian noise statistics

    Authors: Jacob Seifert, Yifeng Shao, Rens van Dam, Dorian Bouchet, Tristan van Leeuwen, Allard P. Mosk

    Abstract: Optical measurements often exhibit mixed Poisson-Gaussian noise statistics, which hampers image quality, particularly under low signal-to-noise ratio (SNR) conditions. Computational imaging falls short in such situations when solely Poissonian noise statistics are assumed. In response to this challenge, we define a loss function that explicitly incorporates this mixed noise nature. By using maximu… ▽ More

    Submitted 11 October, 2023; v1 submitted 3 August, 2023; originally announced August 2023.

    Comments: Contains main and supplementary documents

    Journal ref: Opt. Lett. 48, 6027-6030 (2023)

  8. arXiv:2307.16844  [pdf

    cond-mat.mes-hall

    Nanoscale rheology: Dynamic Mechanical Analysis over a broad and continuous frequency range using Photothermal Actuation Atomic Force Microscopy

    Authors: Alba R. Piacenti, Casey Adam, Nicholas Hawkins, Ryan Wagner, Jacob Seifert, Yukinori Taniguchi, Roger Proksch, Sonia Contera

    Abstract: Polymeric materials are widely used in industries ranging from automotive to biomedical. Their mechanical properties play a crucial role in their application and function and arise from the nanoscale structures and interactions of their constitutive polymer molecules. Polymeric materials behave viscoelastically, i.e. their mechanical responses depend on the time scale of the measurements; quantify… ▽ More

    Submitted 31 July, 2023; originally announced July 2023.

    Comments: The file includes Supporting information

  9. arXiv:2304.14717  [pdf, other

    cs.CR

    faulTPM: Exposing AMD fTPMs' Deepest Secrets

    Authors: Hans Niklas Jacob, Christian Werling, Robert Buhren, Jean-Pierre Seifert

    Abstract: Trusted Platform Modules constitute an integral building block of modern security features. Moreover, as Windows 11 made a TPM 2.0 mandatory, they are subject to an ever-increasing academic challenge. While discrete TPMs - as found in higher-end systems - have been susceptible to attacks on their exposed communication interface, more common firmware TPMs (fTPMs) are immune to this attack vector as… ▽ More

    Submitted 2 May, 2023; v1 submitted 28 April, 2023; originally announced April 2023.

    Comments: The first two authors contributed equally. We publish all code necessary to mount the attack under https://github.com/PSPReverse/ftpm_attack. The repository further includes several intermediate results, e.g., flash memory dumps, to retrace the attack process without possessing the target boards and required hardware tools

  10. arXiv:2303.02432  [pdf, other

    quant-ph cs.CR cs.IT

    Good Gottesman-Kitaev-Preskill codes from the NTRU cryptosystem

    Authors: Jonathan Conrad, Jens Eisert, Jean-Pierre Seifert

    Abstract: We introduce a new class of random Gottesman-Kitaev-Preskill (GKP) codes derived from the cryptanalysis of the so-called NTRU cryptosystem. The derived codes are good in that they exhibit constant rate and average distance scaling $Δ\propto \sqrt{n}$ with high probability, where $n$ is the number of bosonic modes, which is a distance scaling equivalent to that of a GKP code obtained by concatenati… ▽ More

    Submitted 1 July, 2024; v1 submitted 4 March, 2023; originally announced March 2023.

    Comments: 23 pages, 10 figures, comments welcome! The final contains added clarifications and an additional proof of the Gaussian heuristic for a class of NTRU-like lattices

  11. arXiv:2212.08678  [pdf, other

    quant-ph cond-mat.other cs.CC

    An in-principle super-polynomial quantum advantage for approximating combinatorial optimization problems via computational learning theory

    Authors: Niklas Pirnay, Vincent Ulitzsch, Frederik Wilde, Jens Eisert, Jean-Pierre Seifert

    Abstract: Combinatorial optimization - a field of research addressing problems that feature strongly in a wealth of scientific and industrial contexts - has been identified as one of the core potential fields of applicability of quantum computers. It is still unclear, however, to what extent quantum algorithms can actually outperform classical algorithms for this type of problems. In this work, by resorting… ▽ More

    Submitted 13 February, 2024; v1 submitted 16 December, 2022; originally announced December 2022.

    Comments: 5+15 pages, 6 figures, replaced with final version

    Journal ref: Science Advances 10, eadj5170 (2024)

  12. arXiv:2210.14936  [pdf, other

    quant-ph cs.LG stat.ML

    A super-polynomial quantum-classical separation for density modelling

    Authors: Niklas Pirnay, Ryan Sweke, Jens Eisert, Jean-Pierre Seifert

    Abstract: Density modelling is the task of learning an unknown probability density function from samples, and is one of the central problems of unsupervised machine learning. In this work, we show that there exists a density modelling problem for which fault-tolerant quantum computers can offer a super-polynomial advantage over classical learning algorithms, given standard cryptographic assumptions. Along t… ▽ More

    Submitted 26 October, 2022; originally announced October 2022.

    Comments: 15 pages, one figure

    Journal ref: Phys. Rev. A 107, 042416 (2023)

  13. arXiv:2209.09835  [pdf, other

    cs.CR

    EM-Fault It Yourself: Building a Replicable EMFI Setup for Desktop and Server Hardware

    Authors: Niclas Kühnapfel, Robert Buhren, Hans Niklas Jacob, Thilo Krachenfels, Christian Werling, Jean-Pierre Seifert

    Abstract: EMFI has become a popular fault injection (FI) technique due to its ability to inject faults precisely considering timing and location. Recently, ARM, RISC-V, and even x86 processing units in different packages were shown to be vulnerable to electromagnetic fault injection (EMFI) attacks. However, past publications lack a detailed description of the entire attack setup, hindering researchers and c… ▽ More

    Submitted 20 September, 2022; originally announced September 2022.

    Comments: This is the authors' version of the article accepted for publication at IEEE International Conference on Physical Assurance and Inspection of Electronics (PAINE 2022)

  14. arXiv:2207.03140  [pdf, other

    quant-ph cs.CC stat.ML

    A single $T$-gate makes distribution learning hard

    Authors: Marcel Hinsche, Marios Ioannou, Alexander Nietner, Jonas Haferkamp, Yihui Quek, Dominik Hangleiter, Jean-Pierre Seifert, Jens Eisert, Ryan Sweke

    Abstract: The task of learning a probability distribution from samples is ubiquitous across the natural sciences. The output distributions of local quantum circuits form a particularly interesting class of distributions, of key importance both to quantum advantage proposals and a variety of quantum machine learning algorithms. In this work, we provide an extensive characterization of the learnability of the… ▽ More

    Submitted 7 July, 2022; originally announced July 2022.

    Comments: 5+12 pages, 3 figures

    Journal ref: Phys. Rev. Lett. 130, 240602 (2023)

  15. arXiv:2203.09794  [pdf, other

    eess.IV physics.optics

    Sensor fusion in ptychography

    Authors: Kira A. M. Maathuis, Jacob Seifert, Allard P. Mosk

    Abstract: Ptychography is a lensless, computational imaging method that utilises diffraction patterns to determine the amplitude and phase of an object. In transmission ptychography, the diffraction patterns are recorded by a detector positioned along the optical axis downstream of the object. The light scattered at the highest diffraction angle carries information about the finest structures of the object.… ▽ More

    Submitted 3 January, 2023; v1 submitted 18 March, 2022; originally announced March 2022.

    Comments: 8 pages, 4 figures, 1 table

    Journal ref: Opt. Continuum 1, 1909-1917 (2022)

  16. Spectroscopic characterization of singlet-triplet doorway states of aluminum monofluoride

    Authors: Nicole Walter, Johannes Seifert, Stefan Truppe, Hanns Christian Schewe, Boris Sartakov, Gerard Meijer

    Abstract: Aluminum monofluoride (AlF) possesses highly favorable properties for laser cooling, both via the A$^1Π$ and a$^3Π$ states. Determining efficient pathways between the singlet and the triplet manifold of electronic states will be advantageous for future experiments at ultralow temperatures. The lowest rotational levels of the A$^1Π, v=6$ and b$^3Σ^+, v=5$ states of AlF are nearly iso-energetic and… ▽ More

    Submitted 16 February, 2022; originally announced February 2022.

    Comments: 12 pages, 11 figures

  17. arXiv:2112.09498  [pdf, ps, other

    physics.chem-ph physics.atom-ph quant-ph

    Spectroscopic characterization of the a$^3Π$ state of aluminum monofluoride

    Authors: Nicole Walter, Maximilian Doppelbauer, Silvio Marx, Johannes Seifert, Xiangyue Liu, Jesús Pérez Ríos, Boris Sartakov, Stefan Truppe, Gerard Meijer

    Abstract: Spectroscopic studies of aluminum monofluoride (AlF) have revealed its highly favorable properties for direct laser cooling. All $Q$ lines of the strong A$^1Π$ $\leftarrow$ X$^1Σ^+$ transition around 227~nm are rotationally closed and thereby suitable for the main cooling cycle. The same holds for the narrow, spin-forbidden a$^3Π$ $\leftarrow$ X$^1Σ^+$ transition around 367 nm which has a recoil l… ▽ More

    Submitted 16 February, 2022; v1 submitted 17 December, 2021; originally announced December 2021.

    Comments: 16 pages, 9 figures

  18. Learning Classical Readout Quantum PUFs based on single-qubit gates

    Authors: Niklas Pirnay, Anna Pappa, Jean-Pierre Seifert

    Abstract: Physical Unclonable Functions (PUFs) have been proposed as a way to identify and authenticate electronic devices. Recently, several ideas have been presented that aim to achieve the same for quantum devices. Some of these constructions apply single-qubit gates in order to provide a secure fingerprint of the quantum device. In this work, we formalize the class of Classical Readout Quantum PUFs (CR-… ▽ More

    Submitted 16 May, 2022; v1 submitted 13 December, 2021; originally announced December 2021.

    Comments: 12 pages, 9 figures

    Journal ref: Quantum Machine Intelligence, volume 4, number: 14 (2022)

  19. arXiv:2110.05517  [pdf, other

    quant-ph cs.CC cs.LG stat.ML

    Learnability of the output distributions of local quantum circuits

    Authors: Marcel Hinsche, Marios Ioannou, Alexander Nietner, Jonas Haferkamp, Yihui Quek, Dominik Hangleiter, Jean-Pierre Seifert, Jens Eisert, Ryan Sweke

    Abstract: There is currently a large interest in understanding the potential advantages quantum devices can offer for probabilistic modelling. In this work we investigate, within two different oracle models, the probably approximately correct (PAC) learnability of quantum circuit Born machines, i.e., the output distributions of local quantum circuits. We first show a negative result, namely, that the output… ▽ More

    Submitted 11 October, 2021; originally announced October 2021.

    Comments: 24+11 pages, 5 figures, comments welcome

  20. arXiv:2109.10660  [pdf, other

    cs.CR

    VIA: Analyzing Device Interfaces of Protected Virtual Machines

    Authors: Felicitas Hetzelt, Martin Radev, Robert Buhren, Mathias Morbitzer, Jean-Pierre Seifert

    Abstract: Both AMD and Intel have presented technologies for confidential computing in cloud environments. The proposed solutions - AMD SEV (-ES, -SNP) and Intel TDX - protect Virtual Machines (VMs) against attacks from higher privileged layers through memory encryption and integrity protection. This model of computation draws a new trust boundary between virtual devices and the VM, which in so far lacks th… ▽ More

    Submitted 22 September, 2021; originally announced September 2021.

  21. Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS

    Authors: Soundes Marzougui, Nils Wisiol, Patrick Gersch, Juliane Krämer, Jean-Pierre Seifert

    Abstract: Due to the advancing development of quantum computers, practical attacks on conventional public-key cryptography may become feasible in the next few decades. To address this risk, post-quantum schemes that are secure against quantum attacks are being developed. Lattice-based algorithms are promising replacements for conventional schemes, with BLISS being one of the earliest post-quantum signatur… ▽ More

    Submitted 8 June, 2022; v1 submitted 20 September, 2021; originally announced September 2021.

    Comments: 23 pages, 4 Figures, 7 algorithms

    Journal ref: The 17th International Conference on Availability, Reliability and Security (ARES 2022), August 23--26, 2022, Vienna, Austria

  22. arXiv:2108.06131  [pdf, other

    cs.CR

    The Forgotten Threat of Voltage Glitching: A Case Study on Nvidia Tegra X2 SoCs

    Authors: Otto Bittner, Thilo Krachenfels, Andreas Galauner, Jean-Pierre Seifert

    Abstract: Voltage fault injection (FI) is a well-known attack technique that can be used to force faulty behavior in processors during their operation. Glitching the supply voltage can cause data value corruption, skip security checks, or enable protected code paths. At the same time, modern systems on a chip (SoCs) are used in security-critical applications, such as self-driving cars and autonomous machine… ▽ More

    Submitted 16 August, 2021; v1 submitted 13 August, 2021; originally announced August 2021.

    Comments: This is the authors' version of the article accepted for publication at the 2021 Workshop on Fault Detection and Tolerance in Cryptography (FDTC)

  23. arXiv:2108.04575  [pdf, other

    cs.CR

    One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization

    Authors: Robert Buhren, Hans Niklas Jacob, Thilo Krachenfels, Jean-Pierre Seifert

    Abstract: AMD Secure Encrypted Virtualization (SEV) offers protection mechanisms for virtual machines in untrusted environments through memory and register encryption. To separate security-sensitive operations from software executing on the main x86 cores, SEV leverages the AMD Secure Processor (AMD-SP). This paper introduces a new approach to attack SEV-protected virtual machines (VMs) by targeting the AMD… ▽ More

    Submitted 26 August, 2021; v1 submitted 10 August, 2021; originally announced August 2021.

  24. arXiv:2107.10147  [pdf, other

    cs.CR

    Trojan Awakener: Detecting Dormant Malicious Hardware Using Laser Logic State Imaging (Extended Version)

    Authors: Thilo Krachenfels, Jean-Pierre Seifert, Shahin Tajik

    Abstract: The threat of hardware Trojans (HTs) and their detection is a widely studied field. While the effort for inserting a Trojan into an application-specific integrated circuit (ASIC) can be considered relatively high, especially when trusting the chip manufacturer, programmable hardware is vulnerable to Trojan insertion even after the product has been shipped or during usage. At the same time, detecti… ▽ More

    Submitted 2 February, 2023; v1 submitted 21 July, 2021; originally announced July 2021.

    Comments: This is the extended version prepared for journal submission. For remarks on the changes, see the last paragraph of Section 1

  25. arXiv:2102.11656  [pdf, other

    cs.CR

    Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks

    Authors: Thilo Krachenfels, Tuba Kiyan, Shahin Tajik, Jean-Pierre Seifert

    Abstract: The security of modern electronic devices relies on secret keys stored on secure hardware modules as the root-of-trust (RoT). Extracting those keys would break the security of the entire system. As shown before, sophisticated side-channel analysis (SCA) attacks, using chip failure analysis (FA) techniques, can extract data from on-chip memory cells. However, since the chip's layout is unknown to t… ▽ More

    Submitted 23 February, 2021; originally announced February 2021.

    Comments: This is the preprint of the article accepted for publication at USENIX Security 2021

  26. arXiv:2010.03306  [pdf, other

    physics.optics eess.IV

    Optimizing illumination for precise multi-parameter estimations in coherent diffractive imaging

    Authors: Dorian Bouchet, Jacob Seifert, Allard P. Mosk

    Abstract: Coherent diffractive imaging (CDI) is widely used to characterize structured samples from measurements of diffracting intensity patterns. We introduce a numerical framework to quantify the precision that can be achieved when estimating any given set of parameters characterizing the sample from measured data. The approach, based on the calculation of the Fisher information matrix, provides a clear… ▽ More

    Submitted 7 January, 2021; v1 submitted 7 October, 2020; originally announced October 2020.

    Journal ref: Opt. Lett. 46, 254-257 (2021)

  27. arXiv:2010.02074  [pdf, other

    eess.IV physics.app-ph

    Efficient and flexible approach to ptychography using an optimization framework based on automatic differentiation

    Authors: Jacob Seifert, Dorian Bouchet, Lars Loetgering, Allard P. Mosk

    Abstract: Ptychography is a lensless imaging method that allows for wavefront sensing and phase-sensitive microscopy from a set of diffraction patterns. Recently, it has been shown that the optimization task in ptychography can be achieved via automatic differentiation (AD). Here, we propose an open-access AD-based framework implemented with TensorFlow, a popular machine learning library. Using simulations,… ▽ More

    Submitted 12 January, 2021; v1 submitted 5 October, 2020; originally announced October 2020.

    Journal ref: OSA Continuum, OSAC 4, 121-128 (2021)

  28. Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model

    Authors: Thilo Krachenfels, Fatemeh Ganji, Amir Moradi, Shahin Tajik, Jean-Pierre Seifert

    Abstract: Due to its sound theoretical basis and practical efficiency, masking has become the most prominent countermeasure to protect cryptographic implementations against physical side-channel attacks (SCAs). The core idea of masking is to randomly split every sensitive intermediate variable during computation into at least t+1 shares, where t denotes the maximum number of shares that are allowed to be ob… ▽ More

    Submitted 9 September, 2020; originally announced September 2020.

    Comments: This is the authors' version of the article accepted for publication at IEEE Symposium on Security and Privacy 2021

  29. On the Quantum versus Classical Learnability of Discrete Distributions

    Authors: Ryan Sweke, Jean-Pierre Seifert, Dominik Hangleiter, Jens Eisert

    Abstract: Here we study the comparative power of classical and quantum learners for generative modelling within the Probably Approximately Correct (PAC) framework. More specifically we consider the following task: Given samples from some unknown discrete probability distribution, output with high probability an efficient algorithm for generating new samples from a good approximation of the original distribu… ▽ More

    Submitted 9 March, 2021; v1 submitted 28 July, 2020; originally announced July 2020.

    Comments: Main theorem has been strengthened to provide a separation with respect to the TV-distance and an additional section on verification of learners has been included. Accepted in Quantum

    Journal ref: Quantum 5, 417 (2021)

  30. Evaluation of Low-Cost Thermal Laser Stimulation for Data Extraction and Key Readout

    Authors: Thilo Krachenfels, Heiko Lohrke, Jean-Pierre Seifert, Enrico Dietz, Sven Frohmann, Heinz-Wilhelm Hübers

    Abstract: Recent attacks using thermal laser stimulation (TLS) have shown that it is possible to extract cryptographic keys from the battery-backed memory on state-of-the-art field-programmable gate arrays (FPGAs). However, the professional failure analysis microscopes usually employed for these attacks cost in the order of 500k to 1M dollars. In this work, we evaluate the use of a cheaper commercial laser… ▽ More

    Submitted 11 June, 2020; originally announced June 2020.

  31. Insecure Until Proven Updated: Analyzing AMD SEV's Remote Attestation

    Authors: Robert Buhren, Christian Werling, Jean-Pierre Seifert

    Abstract: Customers of cloud services have to trust the cloud providers, as they control the building blocks that form the cloud. This includes the hypervisor enabling the sharing of a single hardware platform among multiple tenants. AMD Secure Encrypted Virtualization (SEV) claims a new level of protection in cloud scenarios. AMD SEV encrypts the main memory of virtual machines with VM-specific keys, there… ▽ More

    Submitted 2 September, 2019; v1 submitted 30 August, 2019; originally announced August 2019.

  32. Influence of composition and heating schedules on compatibility of FeCrAl alloys with high-temperature steam

    Authors: Chongchong Tang, Adrian Jianu, Martin Steinbrueck, Mirco Grosse, Alfons Weisenburger, Hans Juergen Seifert

    Abstract: FeCrAl alloys are proposed and being intensively investigated as alternative accident tolerant fuel (ATF) cladding for nuclear fission application. Herein, the influence of major alloy elements (Cr and Al), reactive element effect and heating schedules on the oxidation behavior of FeCrAl alloys in steam up to 1500°C was examined. In case of transient ramp tests, catastrophic oxidation, i.e. rapid… ▽ More

    Submitted 5 December, 2018; originally announced December 2018.

    Comments: Submitted to Journal of nuclear materials, accepted recently

  33. RNNIDS: Enhancing Network Intrusion Detection Systems through Deep Learning

    Authors: Soroush M. Sohi, Jean-Pierre Seifert, Fatemeh Ganji

    Abstract: Security of information passing through the Internet is threatened by today's most advanced malware ranging from orchestrated botnets to simpler polymorphic worms. These threats, as examples of zero-day attacks, are able to change their behavior several times in the early phases of their existence to bypass the network intrusion detection systems (NIDS). In fact, even well-designed, and frequently… ▽ More

    Submitted 20 December, 2020; v1 submitted 9 July, 2018; originally announced July 2018.

  34. arXiv:1706.00206  [pdf, ps, other

    cs.CR cs.PL cs.SE

    Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing

    Authors: Bhargava Shastry, Federico Maggi, Fabian Yamaguchi, Konrad Rieck, Jean-Pierre Seifert

    Abstract: Taint-style vulnerabilities comprise a majority of fuzzer discovered program faults. These vulnerabilities usually manifest as memory access violations caused by tainted program input. Although fuzzers have helped uncover a majority of taint-style vulnerabilities in software to date, they are limited by (i) extent of test coverage; and (ii) the availability of fuzzable test cases. Therefore, fuzzi… ▽ More

    Submitted 1 June, 2017; originally announced June 2017.

    Comments: 10 pages excl. bibliography

  35. arXiv:1704.05659  [pdf, other

    cond-mat.soft

    Hindered nematic alignment of hematite spindles in viscoelastic matrices

    Authors: Annemarie Nack, Julian Seifert, Christopher Passow, Joachim Wagner

    Abstract: The viscoelastic behavior of composites consisting of spindle-shaped hematite particles in poly-N-isopropylacrylamide hydrogels is investigated both, by means of rheological oscillatory shear experiments, and the field-induced alignment of these mesoscale, anisotropic particles in external magnetic fields. Due to their magnetic moment and magnetic anisotropy hematite spindles align with their long… ▽ More

    Submitted 19 April, 2017; originally announced April 2017.

    Comments: 15 pages, 7 figures

  36. arXiv:1704.02786  [pdf, other

    cs.CR

    Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery

    Authors: Tommi Unruh, Bhargava Shastry, Malte Skoruppa, Federico Maggi, Konrad Rieck, Jean-Pierre Seifert, Fabian Yamaguchi

    Abstract: The Web is replete with tutorial-style content on how to accomplish programming tasks. Unfortunately, even top-ranked tutorials suffer from severe security vulnerabilities, such as cross-site scripting (XSS), and SQL injection (SQLi). Assuming that these tutorials influence real-world software development, we hypothesize that code snippets from popular tutorials can be used to bootstrap vulnerabil… ▽ More

    Submitted 10 April, 2017; originally announced April 2017.

    Comments: 17+3 pages

  37. arXiv:1703.08478  [pdf

    cond-mat.mtrl-sci

    Disorder Dependent Valley Properties in Monolayer WSe2

    Authors: Kha Tran, Akshay Singh, Joe Seifert, Yi** Wang, Kai Hao, **g-Kai Huang, Lain-Jong Li, Takashi Taniguchi, Kenji Watanabe, Xiaoqin Li

    Abstract: We investigate the effect on disorder potential on exciton valley polarization and valley coherence in monolayer WSe2. By analyzing polarization properties of photoluminescence, the valley coherence (VC) and valley polarization (VP) is quantified across the inhomogeneously broadened exciton resonance. We find that disorder plays a critical role in the exciton VC, while minimally affecting VP. For… ▽ More

    Submitted 28 August, 2017; v1 submitted 24 March, 2017; originally announced March 2017.

    Comments: 5 pages, 3 figures

    Journal ref: Phys. Rev. B 96, 041302 (2017)

  38. arXiv:1612.03744  [pdf, ps, other

    cs.CR

    Fault Attacks on Encrypted General Purpose Compute Platforms

    Authors: Robert Buhren, Shay Gueron, Jan Nordholz, Jean-Pierre Seifert, Julian Vetter

    Abstract: Adversaries with physical access to a target platform can perform cold boot or DMA attacks to extract sensitive data from the RAM. In response, several main-memory encryption schemes have been proposed to prevent such attacks. Also hardware vendors have acknowledged the threat and already announced respective hardware extensions. Intel's SGX and AMD's SME will provide means to encrypt parts of the… ▽ More

    Submitted 12 December, 2016; originally announced December 2016.

  39. arXiv:1610.08717  [pdf, other

    cs.NI

    Reins to the Cloud: Compromising Cloud Systems via the Data Plane

    Authors: Kashyap Thimmaraju, Bhargava Shastry, Tobias Fiebig, Felicitas Hetzelt, Jean-Pierre Seifert, Anja Feldmann, Stefan Schmid

    Abstract: Virtual switches have become popular among cloud operating systems to interconnect virtual machines in a more flexible manner. However, this paper demonstrates that virtual switches introduce new attack surfaces in cloud setups, whose effects can be disastrous. Our analysis shows that these vulnerabilities are caused by: (1) inappropriate security assumptions (privileged virtual switch execution i… ▽ More

    Submitted 10 February, 2017; v1 submitted 27 October, 2016; originally announced October 2016.

  40. Long-Lived Valley Polarization of Intra-Valley Trions in Monolayer WSe2

    Authors: Akshay Singh, Kha Tran, Mirco Kolarczik, Joe Seifert, Yi** Wang, Kai Hao, Dennis Pleskot, Nathaniel M. Gabor, Sophia Helmrich, Nina Owschimikow, Ulrike Woggon, Xiaoqin Li

    Abstract: We investigate valley dynamics associated with trions in monolayer tungsten diselenide (WSe2) using polarization resolved two-color pump-probe spectroscopy. When tuning the pump and probe energy across the trion resonance, distinct trion valley polarization dynamics are observed as a function of energy and attributed to the intra-valley and inter-valley trions in monolayer WSe2. We observe no deca… ▽ More

    Submitted 2 January, 2017; v1 submitted 29 July, 2016; originally announced August 2016.

    Comments: 4 figures, 7 pages v2 has minor edits over v1, and is the final version of the paper

    Journal ref: Phys. Rev. Lett. 117, 257402 (2016)

  41. arXiv:1510.07563  [pdf, other

    cs.CR

    Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems

    Authors: Altaf Shaik, Ravishankar Borgaonkar, N. Asokan, Valtteri Niemi, Jean-Pierre Seifert

    Abstract: Mobile communication systems now constitute an essential part of life throughout the world. Fourth generation "Long Term Evolution" (LTE) mobile communication networks are being deployed. The LTE suite of specifications is considered to be significantly better than its predecessors not only in terms of functionality but also with respect to security and privacy for subscribers. We carefully anal… ▽ More

    Submitted 7 August, 2017; v1 submitted 26 October, 2015; originally announced October 2015.

  42. arXiv:1508.04627  [pdf, other

    cs.CR cs.PL

    Towards Vulnerability Discovery Using Staged Program Analysis

    Authors: Bhargava Shastry, Fabian Yamaguchi, Konrad Rieck, Jean-Pierre Seifert

    Abstract: Eliminating vulnerabilities from low-level code is vital for securing software. Static analysis is a promising approach for discovering vulnerabilities since it can provide developers early feedback on the code they write. But, it presents multiple challenges not the least of which is understanding what makes a bug exploitable and conveying this information to the developer. In this paper, we pres… ▽ More

    Submitted 6 April, 2016; v1 submitted 19 August, 2015; originally announced August 2015.

    Comments: A revised version to appear in the proceedings of the 13th conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), July 2016

  43. arXiv:1507.04463  [pdf

    cond-mat.mes-hall cond-mat.mtrl-sci

    Trion Formation Dynamics in Monolayer Transition Metal Dichalcogenides

    Authors: Akshay Singh, Galan Moody, Kha Tran, Marie Scott, Vincent Overbeck, Gunnar Berghäuser, John Schaibley, Edward J. Seifert, Dennis Pleskot, Nathaniel M. Gabor, Jiaqiang Yan, David G. Mandrus, Marten Richter, Ermin Malic, Xiaodong Xu, Xiaoqin Li

    Abstract: We report charged exciton (trion) formation dynamics in doped monolayer transition metal dichalcogenides (TMDs), specifically molybdenum diselenide (MoSe2), using resonant two-color pump-probe spectroscopy. When resonantly pum** the exciton transition, trions are generated on a picosecond timescale through exciton-electron interaction. As the pump energy is tuned from the high energy to low ener… ▽ More

    Submitted 16 December, 2015; v1 submitted 16 July, 2015; originally announced July 2015.

    Comments: 6 pages, 4 figures; accepted to PRB rapid

    MSC Class: 00A82

    Journal ref: Phys. Rev. B 93, 041401 (2016)

  44. arXiv:1410.7754  [pdf

    cs.CR cs.OS

    A First Look at Firefox OS Security

    Authors: Daniel Defreez, Bhargava Shastry, Hao Chen, Jean-Pierre Seifert

    Abstract: With Firefox OS, Mozilla is making a serious push for an HTML5-based mobile platform. In order to assuage security concerns over providing hardware access to web applications, Mozilla has introduced a number of mechanisms that make the security landscape of Firefox OS distinct from both the desktop web and other mobile operating systems. From an application security perspective, the two most signi… ▽ More

    Submitted 28 October, 2014; originally announced October 2014.

    Comments: In Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014 (http://arxiv.longhoe.net/abs/1410.6674)

    Report number: MoST/2014/10

  45. R & D for Future Zeplin

    Authors: R. Bisset, M. J. Carson, H. Chagani, D. B. Cline, E. J. Daw, T. Ferbel, J. Gao, Y. S. Gao, V. A. Kudryavtsev, P. K. Lightfoot, P. Majewski, J. Maxin, J. Miller, W. C. Ooi, M. Robinson, G. Salinas, U. Schroeder, J. Seifert, F. Sergiampietri, W. Skulski, P. F. Smith, N. J. C. Spooner, J. Toke, H. Wang, J. T. White , et al. (2 additional authors not shown)

    Abstract: We propose a new concept for a very low background multi-ton liquid xenon Dark Matter experiment. The detector consists of two concentric spheres and a charge readout device in the centre. Xenon between the two spheres forms a self-shield and veto device. The inner surface of the central sphere is coated with CsI to form an internal photocathode with minimum of 2πcoverage for any event in the ac… ▽ More

    Submitted 15 May, 2007; originally announced May 2007.

    Comments: to appear in Proc. 7th UCLA Symposium on Sources and Detection of Dark Matter and Dark Energy in the Universe, 22-24 February, Marina del Rey, USA; Nucl. Phys. B Proc. Suppl., in press; 4 pages, 3 figues

    Journal ref: Nucl.Phys.Proc.Suppl.173:164-167,2007