Skip to main content

Showing 1–9 of 9 results for author: Jacob, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2304.14717  [pdf, other

    cs.CR

    faulTPM: Exposing AMD fTPMs' Deepest Secrets

    Authors: Hans Niklas Jacob, Christian Werling, Robert Buhren, Jean-Pierre Seifert

    Abstract: Trusted Platform Modules constitute an integral building block of modern security features. Moreover, as Windows 11 made a TPM 2.0 mandatory, they are subject to an ever-increasing academic challenge. While discrete TPMs - as found in higher-end systems - have been susceptible to attacks on their exposed communication interface, more common firmware TPMs (fTPMs) are immune to this attack vector as… ▽ More

    Submitted 2 May, 2023; v1 submitted 28 April, 2023; originally announced April 2023.

    Comments: The first two authors contributed equally. We publish all code necessary to mount the attack under https://github.com/PSPReverse/ftpm_attack. The repository further includes several intermediate results, e.g., flash memory dumps, to retrace the attack process without possessing the target boards and required hardware tools

  2. arXiv:2209.09835  [pdf, other

    cs.CR

    EM-Fault It Yourself: Building a Replicable EMFI Setup for Desktop and Server Hardware

    Authors: Niclas Kühnapfel, Robert Buhren, Hans Niklas Jacob, Thilo Krachenfels, Christian Werling, Jean-Pierre Seifert

    Abstract: EMFI has become a popular fault injection (FI) technique due to its ability to inject faults precisely considering timing and location. Recently, ARM, RISC-V, and even x86 processing units in different packages were shown to be vulnerable to electromagnetic fault injection (EMFI) attacks. However, past publications lack a detailed description of the entire attack setup, hindering researchers and c… ▽ More

    Submitted 20 September, 2022; originally announced September 2022.

    Comments: This is the authors' version of the article accepted for publication at IEEE International Conference on Physical Assurance and Inspection of Electronics (PAINE 2022)

  3. arXiv:2206.11832  [pdf, other

    cs.DM

    On the parameterized complexity of computing tree-partitions

    Authors: Hans L. Bodlaender, Carla Groenland, Hugo Jacob

    Abstract: We study the parameterized complexity of computing the tree-partition-width, a graph parameter equivalent to treewidth on graphs of bounded maximum degree. On one hand, we can obtain approximations of the tree-partition-width efficiently: we show that there is an algorithm that, given an $n$-vertex graph $G$ and an integer $k$, constructs a tree-partition of width $O(k^7)$ for $G$ or reports that… ▽ More

    Submitted 29 April, 2024; v1 submitted 23 June, 2022; originally announced June 2022.

  4. arXiv:2206.11828  [pdf, other

    cs.CC

    On the Complexity of Problems on Tree-structured Graphs

    Authors: Hans L. Bodlaender, Carla Groenland, Hugo Jacob, Marcin Pilipczuk, Michał Pilipczuk

    Abstract: In this paper, we introduce a new class of parameterized problems, which we call XALP: the class of all parameterized problems that can be solved in $f(k)n^{O(1)}$ time and $f(k)\log n$ space on a non-deterministic Turing Machine with access to an auxiliary stack (with only top element lookup allowed). Various natural problems on `tree-structured graphs' are complete for this class: we show that L… ▽ More

    Submitted 19 January, 2024; v1 submitted 23 June, 2022; originally announced June 2022.

  5. arXiv:2206.09750  [pdf, ps, other

    cs.DM cs.CC cs.DS

    List Colouring Trees in Logarithmic Space

    Authors: Hans L. Bodlaender, Carla Groenland, Hugo Jacob

    Abstract: We show that List Colouring can be solved on $n$-vertex trees by a deterministic Turing machine using $O(\log n)$ bits on the worktape. Given an $n$-vertex graph $G=(V,E)$ and a list $L(v)\subseteq\{1,\dots,n\}$ of available colours for each $v\in V$, a list colouring for $G$ is a proper colouring $c$ such that $c(v)\in L(v)$ for all $v$.

    Submitted 20 June, 2022; originally announced June 2022.

    Comments: 18 pages, accepted to ESA

  6. arXiv:2201.13119  [pdf, other

    cs.CC

    XNLP-completeness for Parameterized Problems on Graphs with a Linear Structure

    Authors: Hans L. Bodlaender, Carla Groenland, Hugo Jacob, Lars Jaffke, Paloma T. Lima

    Abstract: In this paper, we showcase the class XNLP as a natural place for many hard problems parameterized by linear width measures. This strengthens existing $W[1]$-hardness proofs for these problems, since XNLP-hardness implies $W[t]$-hardness for all $t$. It also indicates, via a conjecture by Pilipczuk and Wrochna [ToCT 2018], that any XP algorithm for such problems is likely to require XP space. In… ▽ More

    Submitted 13 July, 2022; v1 submitted 31 January, 2022; originally announced January 2022.

    Comments: Results and authors added

  7. arXiv:2201.09749  [pdf, other

    cs.DM cs.DS math.CO

    Bounding twin-width for bounded-treewidth graphs, planar graphs, and bipartite graphs

    Authors: Hugo Jacob, Marcin Pilipczuk

    Abstract: Twin-width is a newly introduced graph width parameter that aims at generalizing a wide range of "nicely structured" graph classes. In this work, we focus on obtaining good bounds on twin-width $\text{tww}(G)$ for graphs $G$ from a number of classic graph classes. We prove the following: - $\text{tww}(G) \leq 3\cdot 2^{\text{tw}(G)-1}$, where $\text{tw}(G)$ is the treewidth of $G$, -… ▽ More

    Submitted 24 January, 2022; originally announced January 2022.

    Comments: 13 pages, 2 figures

  8. arXiv:2108.04575  [pdf, other

    cs.CR

    One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization

    Authors: Robert Buhren, Hans Niklas Jacob, Thilo Krachenfels, Jean-Pierre Seifert

    Abstract: AMD Secure Encrypted Virtualization (SEV) offers protection mechanisms for virtual machines in untrusted environments through memory and register encryption. To separate security-sensitive operations from software executing on the main x86 cores, SEV leverages the AMD Secure Processor (AMD-SP). This paper introduces a new approach to attack SEV-protected virtual machines (VMs) by targeting the AMD… ▽ More

    Submitted 26 August, 2021; v1 submitted 10 August, 2021; originally announced August 2021.

  9. arXiv:2106.16015  [pdf, other

    cs.DM cs.CC cs.DS math.CO

    Close relatives (of Feedback Vertex Set), revisited

    Authors: Hugo Jacob, Thomas Bellitto, Oscar Defrain, Marcin Pilipczuk

    Abstract: At IPEC 2020, Bergougnoux, Bonnet, Brettell, and Kwon showed that a number of problems related to the classic Feedback Vertex Set (FVS) problem do not admit a $2^{o(k \log k)} \cdot n^{\mathcal{O}(1)}$-time algorithm on graphs of treewidth at most $k$, assuming the Exponential Time Hypothesis. This contrasts with the $3^{k} \cdot k^{\mathcal{O}(1)} \cdot n$-time algorithm for FVS using the Cut&Cou… ▽ More

    Submitted 30 June, 2021; originally announced June 2021.

    Comments: 32 pages, 4 figures