We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
HashTag: Hash-based Integrity Protection for Tagged Architectures
Lamster L., Unterguggenberger M., Schrammel D., Mangard S.
Proceedings of the 32nd USENIX Security Symposium
Machine Learning Based Risk Prediction for Major Adverse Cardiovascular Events for ELGA-Authorized Clinics
Polat Erdeniz S., Kramer D., Schrempf M., Rainer P., Felfernig A., Tran T., Burgstaller T., Lubos S.
Studies in Health Technology and Informatics, Vol. 301, 2023
CustomProcessingUnit: Reverse Engineering and Customization of Intel Microcode
Borrello P., Easdon C., Schwarzl M., Czerny R., Schwarz M.
IEEE Workshop on Offensive Technologies (WOOT 23)
Provable Correct and Adaptive Simplex Architecture for Bounded-Liveness Properties
Maderbacher B., Schupp S., Bartocci E., Bloem R., Nickovic D., Könighofer B.
Model Checking Software - 29th International Symposium, SPIN 2023, Proceedings
High-speed Design of Post Quantum Cryptography with Optimized Hashing and Multiplication
Imran M., Aikata A., Sinha Roy S., Pagliarini S.
IEEE Transactions on Circuits and Systems, Part II: Express Briefs , 2023
Digital Communication Tools in Private and Professional Environments
Keller S., Pirker J., List E.
Learning in the Age of Digital and Green Transition
Finding Collisions for Round-Reduced Romulus-H
Nageler M., Pallua F., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2023(1), 2023
A Systematic Approach to Automotive Security
Ebrahimi M., Marksteiner S., Nickovic D., Bloem R., Schögler D., Eisner P., Sprung S., Schober T., Chlup S., Schmittner C., König S.
Formal Methods - 25th International Symposium, FM 2023, Proceedings
Extending Expressive Access Policies with Privacy Features
More S., Ramacher S., Alber L., Herzl M.
The 21th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2022)
Preventing a Cryptoapocalypse
Sinha Roy S., Banerjee U.
IEEE Solid-State Circuits Magazine, Vol. 15, 2023
A Security-Evaluation Framework for Mobile Cross-Border e-Government Solutions
Zefferer T., Prünster B., Kollmann C., Corici A., Alber L., Czerny R., Podgorelec B.
DGO '23: Proceedings of the 24th Annual International Conference on Digital Government Research
Towards a Mobile-First Cross-Border eID Framework
Czerny R., Kollmann C., Podgorelec B., Prünster B., Zefferer T.
Proceedings of the 24th Annual International Conference on Digital Government Research - Together in the Unstable World
The IJCAI-23 Joint Workshop on Artificial Intelligence Safety and Safe Reinforcement Learning (AISafety-SafeRL2023)
Pedroza G., Chen X., Hernández-Orallo J., Huang X., Theodorou A., Matragkas N., Espinoza H., Mallah R., McDermid J., Castillo-Effen M., Bossens D., Könighofer B., Tschiatschek S., Liu A.
CEUR Workshop Proceedings, Vol. 3505, 2023
SCFI: State Machine Control-Flow Hardening Against Fault Attacks
Nasahl P., Unterguggenberger M., Nagpal R., Schilling R., Schrammel D., Mangard S.
2023 Design, Automation and Test in Europe Conference and Exhibition, DATE 2023 - Proceedings
EC-CFI: Control-Flow Integrity via Code Encryption Counteracting Fault Attacks
Nasahl P., Sultana S., Liljestrand H., Grewal K., LeMay M., Durham D., Schrammel D., Mangard S.
Proceedings of the 2023 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2023
MEMES: Memory Encryption-based Memory Safety on Commodity Hardware
Schrammel D., Sultana S., Grewal K., LeMay M., Durham D., Unterguggenberger M., Nasahl P., Mangard S.
SECRYPT 2023 - Proceedings of the 20th International Conference on Security and Cryptography
Safety Shielding under Delayed Observation
Cano Cordoba F., Palmisano A., Fränzle M., Bloem R., Könighofer B.
Proceedings of the International Conference on Automated Planning and Scheduling (ICAPS)
Formal XAI via Syntax-Guided Synthesis
Bjørner K., Judson S., Cano F., Goldman D., Shoemaker N., Piskac R., Könighofer B.
Bridging the Gap Between AI and Reality
Side-Channel Attacks on Optane Persistent Memory
Liu S., Kanniwadi S., Schwarzl M., Kogler A., Gruß D., Khan S.
Proceedings of the 32nd USENIX Security Symposium
CSI:Rowhammer – Cryptographic Security and Integrity against Rowhammer
Juffinger J., Lamster L., Kogler A., Eichlseder M., Lipp M., Gruß D.
44th IEEE Symposium on Security and Privacy
