Skip to main content

Showing 1–7 of 7 results for author: Bugiel, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2306.03643  [pdf, other

    cs.CR

    TALUS: Reinforcing TEE Confidentiality with Cryptographic Coprocessors (Technical Report)

    Authors: Dhiman Chakraborty, Michael Schwarz, Sven Bugiel

    Abstract: Platforms are nowadays typically equipped with tristed execution environments (TEES), such as Intel SGX and ARM TrustZone. However, recent microarchitectural attacks on TEEs repeatedly broke their confidentiality guarantees, including the leakage of long-term cryptographic secrets. These systems are typically also equipped with a cryptographic coprocessor, such as a TPM or Google Titan. These copr… ▽ More

    Submitted 6 June, 2023; originally announced June 2023.

    Comments: In proceedings of Financial Cryptography 2023. This is the technical report of the published paper

  2. arXiv:2210.09373  [pdf, other

    cs.CR

    A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites (Extended Version)

    Authors: Sanam Ghorbani Lyastani, Michael Backes, Sven Bugiel

    Abstract: Heuristics for user experience state that users will transfer their expectations from one product to another. A lack of consistency between products can increase users' cognitive friction, leading to frustration and rejection. This paper presents the first systematic study of the external, functional consistency of two-factor authentication user journeys on top-ranked websites. We find that these… ▽ More

    Submitted 17 October, 2022; originally announced October 2022.

  3. arXiv:2110.05619  [pdf, other

    cs.CR

    Towards a Principled Approach for Dynamic Analysis of Android's Middleware

    Authors: Oliver Schranz, Sebastian Weisgerber, Erik Derr, Michael Backes, Sven Bugiel

    Abstract: The Android middleware, in particular the so-called systemserver, is a crucial and central component to Android's security and robustness. To understand whether the systemserver provides the demanded security properties, it has to be thoroughly tested and analyzed. A dedicated line of research focuses exclusively on this task. While static analysis builds on established tools, dynamic testing appr… ▽ More

    Submitted 11 October, 2021; originally announced October 2021.

    Comments: Version submitted to USENIX OSDI'20

  4. arXiv:1905.08164  [pdf, other

    cs.CR

    simTPM: User-centric TPM for Mobile Devices (Technical Report)

    Authors: Dhiman Chakraborty, Lucjan Hanzlik, Sven Bugiel

    Abstract: Trusted Platform Modules are valuable building blocks for security solutions and have also been recognized as beneficial for security on mobile platforms, like smartphones and tablets. However, strict space, cost, and power constraints of mobile devices prohibit an implementation as dedicated on-board chip and the incumbent implementations are software TPMs protected by Trusted Execution Environme… ▽ More

    Submitted 20 May, 2019; originally announced May 2019.

    Comments: Accepted at 28th Usenix Security Symposium, 2019. This is the longer version. The bibtex is required as soon as possible, for the camera ready version for the conference

  5. arXiv:1712.08940  [pdf, other

    cs.CR

    Studying the Impact of Managers on Password Strength and Reuse

    Authors: Sanam Ghorbani Lyastani, Michael Schilling, Sascha Fahl, Sven Bugiel, Michael Backes

    Abstract: Despite their well-known security problems, passwords are still the incumbent authentication method for virtually all online services. To remedy the situation, end-users are very often referred to password managers as a solution to the password reuse and password weakness problems. However, to date the actual impact of password managers on password security and reuse has not been studied systemati… ▽ More

    Submitted 24 December, 2017; originally announced December 2017.

    Comments: 20 pages

  6. arXiv:1607.06619  [pdf, other

    cs.CR

    ARTist: The Android Runtime Instrumentation and Security Toolkit

    Authors: Michael Backes, Sven Bugiel, Oliver Schranz, Philipp von Styp-Rekowsky, Sebastian Weisgerber

    Abstract: We present ARTist, a compiler-based application instrumentation solution for Android. ARTist is based on the new ART runtime and the on-device dex2oat compiler of Android, which replaced the interpreter-based managed runtime (DVM) from Android version 5 onwards. Since dex2oat is yet uncharted, our approach required first and foremost a thorough study of the compiler suite's internals and in partic… ▽ More

    Submitted 22 July, 2016; originally announced July 2016.

    Comments: 13 pages

  7. arXiv:1404.1395  [pdf, other

    cs.CR

    Android Security Framework: Enabling Generic and Extensible Access Control on Android

    Authors: Michael Backes, Sven Bugiel, Sebastian Gerling, Philipp von Styp-Rekowsky

    Abstract: We introduce the Android Security Framework (ASF), a generic, extensible security framework for Android that enables the development and integration of a wide spectrum of security models in form of code-based security modules. The design of ASF reflects lessons learned from the literature on established security frameworks (such as Linux Security Modules or the BSD MAC Framework) and intertwines t… ▽ More

    Submitted 4 April, 2014; originally announced April 2014.

    Report number: A/01/2014