Our Memory Tracing - Forensic Reverse Engineering presentation at recon 2014 in Montreal gives an overview of KAN and also contains a walk through demo of the analysis of a zeroaccess malware sample using KAN. The demo is only partially found in the slides, however the video of the talk should contain the full details.
We have also presented KAN at the Open Memory Forensics Workshop 2014 in Herndon/VA. The slides are quite similar to those shown at recon.
The presentation Finding malware through memory diffing given at area41 2014 in Zurich reports on our initial version of Vortessence.
Stephan Krenn: A Framework for Practical Universally Composable Zero-Knowledge Protocols. At: Advances in Cryptology - ASIACRYPT. Seoul.
Stefan Bühlmann: Efficient and Stealthy Instruction Tracing and Its Applications in Automated Malware Analysis: Open Problems and Challenges. At: Open Research Problems in Network Security - iNetSec. Lucerne.
David Gullasch: Cache Games. At: 0sec 2010. Bern.
Stephan Krenn: A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Σ-Protocols. At: European Symposium on Research in Computer Security - ESORICS 2010. Athens.
Stephan Krenn: Efficiency Limitations for Sigma-Protocols for Group Homomorphisms. At: Theory of Cryptography Conference - TCC 2010. Zurich.
Stephan Krenn: On the Design and Implementation of Efficient Zero-Knowledge Proofs of Knowledge. At: Software Performance Enhancement for Encryption and Decryption and Cryptographic Compilers - SPEED-CC 2009. Berlin.
Stephan Krenn: Bringing Zero-Knowledge Proofs of Knowledge to Practice. At: 17th International Workshop on Security Protocols - SPW 2009. University of Cambridge.
Endre Bangerter: A Compiler for Generating Efficient ZK Proofs of Knowledge for Homomorphisms. At: ECRYPT VAMPIRE meeting 2007. University of Bristol.
Endre Bangerter: On Efficient Proofs Of Knowledge for Homomorphisms. At: Workshop on Provable Security 2004. INRIA, Versailles, Paris.
Endre Bangerter: A Cryptographic Framework for the Controlled Release of Certified Data. At: 17th International Workshop on Security Protocols - SPW 2004. University of Cambridge.
José Bacelar Almeida, Manuel Barbosa, Endre Bangerter, Gilles Barthe, Stephan Krenn, Santiago Zanella Béguelin: Full proof cryptography: verifiable compilation of efficient zero-knowledge protocols. ACM Conference on Computer and Communications Security 2012: 488-500.
José Bacelar Almeida, Manuel Barbosa, Endre Bangerter, Gilles Barthe, Stephan Krenn, Santiago Zanella Béguelin: Full Proof Cryptography: Verifiable Compilation of Efficient Zero-Knowledge Protocols. IACR Cryptology ePrint Archive 2012: 258 (2012).
Jan Camenisch, Stephan Krenn and Victor Shoup: A Framework for Practical Universally Composable Zero-Knowledge Protocols. Advances in Cryptology - ASIACRYPT 2011. (Winner of the Best Paper Award).
Endre Bangerter, Stephan Krenn, Martial Seifriz, and Ulrich Ultes-Nitsche: cPLC - A Cryptographic Programming Language and Compiler. Information Security South Africa - ISSA - 2011.
David Gullasch, Endre Bangerter, and Stephan Krenn: Cache Games - Bringing Access-Based Cache Attacks on AES to Practice. IEEE Symposium on Security and Privacy - S&P 2011.
Endre Bangerter, David Gullasch, and Stephan Krenn: Cache Games - Bringing Access-Based Cache Attacks on AES to Practice. Constructive Side-Channel Analysis and Secure Design - COSADE 2011.
Endre Bangerter, Stephan Krenn, Ahmad-Reza Sadeghi, and Thomas Schneider: YAZKC: Yet Another Zero-Knowledge Compiler. Poster session of USENIX Security Symposium 2010.
José Bacelar Almeida, Endre Bangerter, Manuel Barbosa, Stephan Krenn, Ahmad-Reza Sadeghi and Thomas Schneider: A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Σ-Protocols. European Symposium on Research in Computer Security - ESORICS 2010.
Endre Bangerter, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider, and Joe-Kai Tsay: On the Design and Implementation of Efficient Zero-Knowledge Proofs of Knowledge. Software Performance Enhancement for Encryption and Decryption and Cryptographic Compilers - SPEED-CC.
Endre Bangerter, Thomas Briner, Wilko Henecka, Stephan Krenn, Ahmad-Reza Sadeghi, and Thomas Schneider: Automatic Generation of Sigma-Protocols. European Workshop on Public Key Services, Applications and Infrastructures - EuroPKI 2009.
Endre Bangerter, Manuel Barbosa, Daniel J. Bernstein, Ivan Damgård, Dan Page, Jakob I. Pagter, Ahmad-Reza Sadeghi, and Sampo Sovio: Using Compilers to Enhance Cryptographic Product Development. Securing Electronic Business Processes - ISSE 2009.
Endre Bangerter, Stefania Barzan, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider, and Joe-Kai Tsay: Bringing Zero-Knowledge Proofs of Knowledge to Practice. To appear in: 17th International Workshop on Security Protocols - SPW 2009.
Endre Bangerter, Jan Camenisch, Stephan Krenn, Ahmad-Reza Sadeghi, and Thomas Schneider: Automatic Generation of Sound Zero-Knowledge Protocols. Poster session of Advances in Cryptology - EUROCRYPT 2009. [poster]
Endre Bangerter: On Efficient Zero-Knowledge Proofs of Knowledge. PhD thesis, University of Bochum, 2005.
Endre Bangerter, Andy Rupp, and Ahmad-Reza Sadeghi: Simplified Hardness Proofs in the Generic Group Model. Western European Workshop on Research in Cryptology - WEWoRC 2005.
Endre Bangerter, Jan Camenisch, and Ueli Maurer: Efficient Proofs Of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order. International Workshop on Practice and Theory in Public-Key Cryptography - PKC 2005.
Endre Bangerter, Jan Camenisch, and Anna Lysyanskaya: A Cryptographic Framework for the Controlled Release Of Certified Data. 12th International Workshop on Security Protocols - SPW 2004.
Sunil Hadap, Endre Bangerter, Pascal Volino, and Nadia Magnenat-Thalmann: Animating Wrinkles on Clothes. IEEE Visualization 1999.
Endre Bangerter, and Markus Christen: Sicherheitslücken beim Online-Banking. Neue Zürcher Zeitung 7.11.2007.
Endre Bangerter, and Markus Christen: IT Security und Verantwortung. digma vol 4, p. 166-167, 2007.
Endre Bangerter, and Markus Christen: SSE - Plattform für Security-Diskurse. digma vol 4, p. 176-179, 2006.
Endre Bangerter, and Michael Doleschal: Security Governance trägt zur Wertschöpfung bei.
Netzguide E-Security (ISBN 3-907096-24-X), 2006.
Endre Bangerter, Jan Camenisch, Els Van Herreweghen, and Michael Waidner:
idemix for Internet Anonymity. ERCIM News No. 49, April 2002.