We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Shields for Safe Reinforcement Learning
Könighofer B., Bloem R., Jansen N., Junges S., Pranger S.
Communications of the ACM
Synthesis of Controllers for Continuous Blackbox Systems
Maderbacher B., Windisch F., Larrauri Borroto L., Bloem R.
Verification, Model Checking, and Abstract Interpretation - 26th International Conference, VMCAI 2025, Proceedings, 26th International Conference on Verification, Model Checking, and Abstract Interpretation, VMCAI 2025, 137–159, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 15530 LNCS)
Efficient and Composable Masked AES S-Box Designs Using Optimized Inverters
Hadzic V., Bloem R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2025(1), 656-683
Synthesis from Infinite-State Generalized Reactivity(1) Specifications
Maderbacher B., Windisch F., Bloem R.
Leveraging Applications of Formal Methods, Verification and Validation
On Threat Model Repair
Bloem R., Chlup S., Nickovic D., Schmittner C.
Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering Methodologies. ISoLA 2024, 12th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation, ISoLA 2024, 302–310, (Lecture Notes in Computer Science; vol. 15222 LNCS)
Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults
Tollec S., Hadzic V., Nasahl P., Asavoae M., Bloem R., Couroussé D., Heydemann K., Jan M., Mangard S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(4), 179-204
Closing the Gap: Leakage Contracts for Processors with Transitions and Glitches
Haring J., Hadzic V., Bloem R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(4), 110-132
An Adaptive, Provable Correct Simplex Architecture
Maderbacher B., Schupp S., Bartocci E., Bloem R., Nickovic D., Könighofer B.
International Journal on Software Tools for Technology Transfer
Quantile: Quantifying Information Leakage
Hadzic V., Cassiers G., Primas R., Mangard S., Bloem R.
Quantile: Quantifying Information Leakage
Hadzic V., Cassiers G., Primas R., Mangard S., Bloem R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(1), 433-456
Learning Mealy machines with one timer
Vaandrager F., Ebrahimi M., Bloem R.
Information and Computation, Vol. 295
Provable Correct and Adaptive Simplex Architecture for Bounded-Liveness Properties
Maderbacher B., Schupp S., Bartocci E., Bloem R., Nickovic D., Könighofer B.
Model Checking Software - 29th International Symposium, SPIN 2023, Proceedings, 29th International Symposium on Model Checking of Software, 141-160, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13872 LNCS)
A Systematic Approach to Automotive Security
Ebrahimi M., Marksteiner S., Nickovic D., Bloem R., Schögler D., Eisner P., Sprung S., Schober T., Chlup S., Schmittner C., König S.
Formal Methods - 25th International Symposium, FM 2023, Proceedings, 25th International Symposium on Formal Methods, 598-609, (Lecture Notes in Computer Science; vol. 14000)
Safety Shielding under Delayed Observation
Cano Cordoba F., Palmisano A., Fränzle M., Bloem R., Könighofer B.
Proceedings of the International Conference on Automated Planning and Scheduling (ICAPS), AAAI Press, 80-85, (Proceedings International Conference on Automated Planning and Scheduling, ICAPS)
Attribute Repair for Threat Prevention
Tarrach T., Ebrahimi M., König S., Schmittner C., Bloem R., Nickovic D.
Computer Safety, Reliability, and Security - 42nd International Conference, SAFECOMP 2023, Proceedings, 42nd International Conference on Computer Safety, Reliability and Security, 135-148, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14181 LNCS)
Power Contracts: Provably Complete Power Leakage Models for Processors
Bloem R., Gigerl B., Gourjon M., Hadzic V., Mangard S., Primas R.
CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022 ACM SIGSAC Conference on Computer and Communications Security, 381-395, (Proceedings of the ACM Conference on Computer and Communications Security)
Adaptive testing for specification coverage and refinement in CPS models
Bartocci E., Bloem R., Maderbacher B., Manjunath N., Nickovic D.
Nonlinear Analysis: Hybrid Systems, Vol. 46
Online shielding for reinforcement learning
Könighofer B., Rudolf J., Palmisano A., Tappler M., Bloem R.
Innovations in Systems and Software Engineering
Proving SIFA protection of masked redundant circuits
Hadzic V., Primas R., Bloem R.
Innovations in Systems and Software Engineering, Vol. 18(3), 471-481
Automata Learning meets Shielding
Tappler M., Pranger S., Könighofer B., Muskardin E., Bloem R., Larsen K.
Leveraging Applications of Formal Methods, Verification and Validation. Verification Principles - 11th International Symposium, ISoLA 2022, Proceedings, ISOLA 2022, 335-359, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13701 LNCS)