Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sebastian Schinzel is active.

Publication


Featured researches published by Sebastian Schinzel.


Proceedings of the 10th European Workshop on Systems Security | 2017

Cache Attacks on Intel SGX

Johannes Götzfried; Moritz Eckert; Sebastian Schinzel; Tilo Müller

For the first time, we practically demonstrate that Intel SGX enclaves are vulnerable against cache-timing attacks. As a case study, we present an access-driven cache-timing attack on AES when running inside an Intel SGX enclave. Using Neve and Seiferts elimination method, as well as a cache probing mechanism relying on Intel PMC, we are able to extract the AES secret key in less than 10 seconds by investigating 480 encrypted blocks on average. The AES implementation we attack is based on a Gladman AES implementation taken from an older version of OpenSSL, which is known to be vulnerable to cache-timing attacks. In contrast to previous works on cache-timing attacks, our attack is executed with root privileges running on the same host as the vulnerable enclave. Intel SGX, however, was designed to precisely protect applications against such root-level attacks. As a consequence, we show that SGX cannot withstand its designated attacker model when it comes to side-channel vulnerabilities. To the contrary, the attack surface for side-channels increases dramatically in the scenario of SGX due to the power of root-level attackers, for example, by exploiting the accuracy of PMC, which is restricted to kernel code.


european symposium on research in computer security | 2012

Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption

Tibor Jager; Sebastian Schinzel; Juraj Somorovsky

We describe several attacks against the PKCS#1 v1.5 key transport mechanism of XML Encryption. Our attacks allow to recover the secret key used to encrypt transmitted payload data within a few minutes or several hours, depending on the considered scenario.


hardware oriented security and trust | 2016

Information leakage behind the curtain: Abusing anti-EMI features for covert communication

Johannes Bauer; Sebastian Schinzel; Felix C. Freiling; Andreas Dewald

We present a new class of covert channels which can be created by utilizing common hardware but that cannot be detected by such. Our idea is to abuse anti-EMI features of a processor to create a covert channel on the physical layer. Thus, the sender uses the invariants in how digital signals are encoded over analog channels to covertly transport information. This leaked data is present on the wire bound connections of the compromised device, but is also by definition present in the vicinity of the device and can be picked up by radio equipment. As the covert channel is present only on the physical layer, the data on all layers above, as well as the timing behavior on those layers is indistinguishable from uncompromised devices.


2011 First SysSec Workshop | 2011

Exploring the Landscape of Cybercrime

Zinainda Benenson; Andreas Dewald; Hans-Georg Eßer; Felix C. Freiling; Tilo Müller; Christian Moch; Stefan Vömel; Sebastian Schinzel; Michael Spreitzenbarth; Ben Stock; Johannes Stüttgen

This document gives an overview over current research within the security group at Friedrich-Alexander-University Erlangen-Nuremberg, Germany, and attempts to describe the future research roadmap of the group. This roadmap is structured around the landscape of cyber crime with its three main groups of actors (attackers, users and investigators) and their main activities and deficits: attack and evasion for attackers, awareness and education for victims, evidence extraction and analysis for investigators.


usenix security symposium | 2014

Revisiting SSL/TLS implementations: new Bleichenbacher side channels and attacks

Christopher Meyer; Juraj Somorovsky; Eugen Weiss; Jörg Schwenk; Sebastian Schinzel; Erik Tews


usenix security symposium | 2016

DROWN: Breaking TLS using SSLv2

Christoph Paar; David Adrian; Emilia Käsper; J. Alex Halderman; Jens Steube; Juraj Somorovsky; Luke Valenta; Maik Dankel; Nadia Heninger; Nimrod Aviram; Sebastian Schinzel; Shaanan Cohney; Susanne Engels; Viktor Dukhovni; Yuval Shavitt


WOOT'12 Proceedings of the 6th USENIX conference on Offensive Technologies | 2012

WAFFle: fingerprinting filter rules of web application firewalls

Isabell Schmitt; Sebastian Schinzel


ieee european symposium on security and privacy | 2018

Attacking Deterministic Signature Schemes Using Fault Attacks

Damian Poddebniak; Juraj Somorovsky; Sebastian Schinzel; Manfred Lochter; Paul Rösler


usenix security symposium | 2017

kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels.

Sergej Schumilo; Cornelius Aschermann; Robert Gawlik; Sebastian Schinzel; Thorsten Holz


usenix security symposium | 2018

Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels.

Damian Poddebniak; Christian Dresen; Jens Müller; Fabian Ising; Sebastian Schinzel; Simon Friedberger; Juraj Somorovsky; Jörg Schwenk

Collaboration


Dive into the Sebastian Schinzel's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Felix C. Freiling

University of Erlangen-Nuremberg

View shared research outputs
Top Co-Authors

Avatar

Alexander Maedche

Karlsruhe Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Tilo Müller

University of Erlangen-Nuremberg

View shared research outputs
Researchain Logo
Decentralizing Knowledge