Sebastian Schinzel
University of Erlangen-Nuremberg
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Sebastian Schinzel.
Proceedings of the 10th European Workshop on Systems Security | 2017
Johannes Götzfried; Moritz Eckert; Sebastian Schinzel; Tilo Müller
For the first time, we practically demonstrate that Intel SGX enclaves are vulnerable against cache-timing attacks. As a case study, we present an access-driven cache-timing attack on AES when running inside an Intel SGX enclave. Using Neve and Seiferts elimination method, as well as a cache probing mechanism relying on Intel PMC, we are able to extract the AES secret key in less than 10 seconds by investigating 480 encrypted blocks on average. The AES implementation we attack is based on a Gladman AES implementation taken from an older version of OpenSSL, which is known to be vulnerable to cache-timing attacks. In contrast to previous works on cache-timing attacks, our attack is executed with root privileges running on the same host as the vulnerable enclave. Intel SGX, however, was designed to precisely protect applications against such root-level attacks. As a consequence, we show that SGX cannot withstand its designated attacker model when it comes to side-channel vulnerabilities. To the contrary, the attack surface for side-channels increases dramatically in the scenario of SGX due to the power of root-level attackers, for example, by exploiting the accuracy of PMC, which is restricted to kernel code.
european symposium on research in computer security | 2012
Tibor Jager; Sebastian Schinzel; Juraj Somorovsky
We describe several attacks against the PKCS#1 v1.5 key transport mechanism of XML Encryption. Our attacks allow to recover the secret key used to encrypt transmitted payload data within a few minutes or several hours, depending on the considered scenario.
hardware oriented security and trust | 2016
Johannes Bauer; Sebastian Schinzel; Felix C. Freiling; Andreas Dewald
We present a new class of covert channels which can be created by utilizing common hardware but that cannot be detected by such. Our idea is to abuse anti-EMI features of a processor to create a covert channel on the physical layer. Thus, the sender uses the invariants in how digital signals are encoded over analog channels to covertly transport information. This leaked data is present on the wire bound connections of the compromised device, but is also by definition present in the vicinity of the device and can be picked up by radio equipment. As the covert channel is present only on the physical layer, the data on all layers above, as well as the timing behavior on those layers is indistinguishable from uncompromised devices.
2011 First SysSec Workshop | 2011
Zinainda Benenson; Andreas Dewald; Hans-Georg Eßer; Felix C. Freiling; Tilo Müller; Christian Moch; Stefan Vömel; Sebastian Schinzel; Michael Spreitzenbarth; Ben Stock; Johannes Stüttgen
This document gives an overview over current research within the security group at Friedrich-Alexander-University Erlangen-Nuremberg, Germany, and attempts to describe the future research roadmap of the group. This roadmap is structured around the landscape of cyber crime with its three main groups of actors (attackers, users and investigators) and their main activities and deficits: attack and evasion for attackers, awareness and education for victims, evidence extraction and analysis for investigators.
usenix security symposium | 2014
Christopher Meyer; Juraj Somorovsky; Eugen Weiss; Jörg Schwenk; Sebastian Schinzel; Erik Tews
usenix security symposium | 2016
Christoph Paar; David Adrian; Emilia Käsper; J. Alex Halderman; Jens Steube; Juraj Somorovsky; Luke Valenta; Maik Dankel; Nadia Heninger; Nimrod Aviram; Sebastian Schinzel; Shaanan Cohney; Susanne Engels; Viktor Dukhovni; Yuval Shavitt
WOOT'12 Proceedings of the 6th USENIX conference on Offensive Technologies | 2012
Isabell Schmitt; Sebastian Schinzel
ieee european symposium on security and privacy | 2018
Damian Poddebniak; Juraj Somorovsky; Sebastian Schinzel; Manfred Lochter; Paul Rösler
usenix security symposium | 2017
Sergej Schumilo; Cornelius Aschermann; Robert Gawlik; Sebastian Schinzel; Thorsten Holz
usenix security symposium | 2018
Damian Poddebniak; Christian Dresen; Jens Müller; Fabian Ising; Sebastian Schinzel; Simon Friedberger; Juraj Somorovsky; Jörg Schwenk