We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
SQUIP: Exploiting the Scheduler Queue Contention Side Channel
Gast S., Juffinger J., Schwarzl M., Saileshwar G., Kogler A., Franza S., Köstl M., Gruß D.
44th IEEE Symposium on Security and Privacy , 43th IEEE Symposium on Security and Privacay
Attribute Repair for Threat Prevention
Tarrach T., Ebrahimi M., König S., Schmittner C., Bloem R., Nickovic D.
Computer Safety, Reliability, and Security - 42nd International Conference, SAFECOMP 2023, Proceedings, 42nd International Conference on Computer Safety, Reliability and Security, 135-148, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14181 LNCS)
Pasta: A Case for Hybrid Homomorphic Encryption
Dobraunig C., Grassi L., Helminger L., Rechberger C., Schofnegger M., Walch R.
TCHES 2023 Volume 2023/3, 25th Conference on Cryptographic Hardware and Embedded Systems
Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications
Grassi L., Hao Y., Rechberger C., Schofnegger M., Walch R., Wang Q.
Crypto 2023, 43rd International Cryptology Conference
Layered Binary Templating
Schwarzl M., Kraft E., Gruß D.
Applied Cryptography and Network Security , 21st International Conference on Applied Cryptography and Network Security, (Lecture Notes in Computer Science ; vol. 13905)
Practical Timing Side-Channel Attacks on Memory Compression
Schwarzl M., Borrello P., Saileshwar G., Müller H., Schwarz M., Gruß D.
43th IEEE Symposium on Security and Privacay: IEEE S&P 2023, 43th IEEE Symposium on Security and Privacay, 1186-1203
Design and Analysis of Client-Side Operations in Homomorphic Encryption for FPGA Platforms
Krieger F.
, Master's Thesis
Computational Evaluation of Model-Agnostic Explainable AI Using Local Feature Importance in Healthcare
Erdeniz S., Schrempf M., Kramer D., Rainer P., Felfernig A., Tran T., Burgstaller T., Lubos S.
Artificial Intelligence in Medicine - 21st International Conference on Artificial Intelligence in Medicine, AIME 2023, Proceedings, 21st International Conference on Artificial Intelligence in Medicine, 114-119, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13897 LNAI)
KRAKEN: A Privacy-Preserving Data Market for Authentic Data
Koch K., Krenn S., Marc T., More S., Ramacher S.
DE 2022 - Proceedings of the 1st International Workshop on Data Economy, Part of CoNEXT 2022, 2022 International Conference on Emerging Networking Experiments and Technologies, 15-20, (DE 2022 - Proceedings of the 1st International Workshop on Data Economy, Part of CoNEXT 2022)
Integrity of virtual testing for crash protection
Galijatovic E., Eichlseder M., Heindl S., Klug C.
Frontiers in Future Transportation, Vol. 3
Medha: Microcoded Hardware Accelerator for computing on Encrypted Data
Mert A., Aikata A., Kwon S., Shiin Y., Yoo D., Lee Y., Sinha Roy S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2023(1), 463-500
Power Contracts: Provably Complete Power Leakage Models for Processors
Bloem R., Gigerl B., Gourjon M., Hadzic V., Mangard S., Primas R.
CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022 ACM SIGSAC Conference on Computer and Communications Security, 381-395, (Proceedings of the ACM Conference on Computer and Communications Security)
Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto
Dobraunig C., Kales D., Rechberger C., Schofnegger M., Zaverucha G.
CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 29th ACM Conference on Computer and Communications Security, 843–857, (Proceedings of the ACM Conference on Computer and Communications Security)
Reinforced Concrete: A Fast Hash Function for Verifiable Computation
Lüftenegger R., Rechberger C., Grassi L., Schofnegger M., Walch R., Khovratovich D.
CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022 ACM SIGSAC Conference on Computer and Communications Security, 1323–1335, (Proceedings of the ACM Conference on Computer and Communications Security)
Adaptive testing for specification coverage and refinement in CPS models
Bartocci E., Bloem R., Maderbacher B., Manjunath N., Nickovic D.
Nonlinear Analysis: Hybrid Systems, Vol. 46
Fault Analysis of the PRINCE Family of Lightweight Ciphers
Kundu A., Aikata A., Karmakar B., Saha D.
Journal of Cryptographic Engineering, Vol. 12(4), 475–494
Time-Memory Trade-Offs for Saber+ on Memory-Constrained RISC-V Platform
Zhang J., Huang J., Liu Z., Sinha Roy S.
IEEE Transactions on Computers, Vol. 71(11), 2996-3007
SFP: Providing System Call Flow Protection against Software and Fault Attacks
Schilling R., Nasahl P., Unterguggenberger M., Mangard S.
HASP 2022 - Hardware and Architectural Support for Security and Privacy, Hardware and Architectural Support for Security and Privacy, 18-26
Robust and Scalable Process Isolation against Spectre in the Cloud
Schwarzl M., Borrello P., Kogler A., Varda K., Schuster T., Schwarz M., Gruß D.
European Symposium on Research in Computer Security (ESORICS), 27th European Symposium on Research in Computer Security
Online shielding for reinforcement learning
Könighofer B., Rudolf J., Palmisano A., Tappler M., Bloem R.
Innovations in Systems and Software Engineering