We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Practical Key Recovery Attacks on FlexAEAD
Dunkelman O., Eichlseder M., Kales D., Keller N., Leurent G., Schofnegger M.
Designs, Codes and Cryptography
SFIP: Coarse-Grained Syscall-Flow-Integrity Protection in Modern Systems
Canella C., Dorn S., Gruß D., Schwarz M.
Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks
Naseredini A., Gast S., Schwarzl M., Bernardo P., Smajic A., Canella. C., Berger M., Gruß D.
ICISSP 2022 - Proceedings of the 8th International Conference on Information Systems Security and Privacy, 8th International Conference on Information Systems Security and Privacy, 48-59
FIPAC: Thwarting Fault- and Software-Induced Control-Flow Attacks with ARM Pointer Authentication
Schilling R., Nasahl P., Mangard S.
COSADE: Constructive Side-Channel Analysis and Secure Design, COSADE 2022
Jenny: Securing Syscalls for PKU-based Memory Isolation Systems
Schrammel D., Weiser S., Sadek R., Mangard S.
Proceedings of the 31st USENIX Security Symposium, 31st USENIX Security Symposium
Search-Based Testing of Reinforcement Learning
Tappler M., Cano Cordoba F., Aichernig B., Könighofer B.
Thirty-First International Joint Conference on Artificial Intelligence (IJCAI 2022), 31st International Joint Conference on Artificial Intelligence and the 25th European Conference on Artificial Intelligence, 503-510
Automata Learning meets Shielding
Tappler M., Pranger S., Könighofer B., Muskardin E., Bloem R., Larsen K.
Leveraging Applications of Formal Methods, Verification and Validation. Verification Principles - 11th International Symposium, ISoLA 2022, Proceedings, ISOLA 2022, 335-359, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13701 LNCS)
Correct-by-Construction Runtime Enforcement in AI – A Survey
Könighofer B., Bloem R., Ehlers R., Pek C.
Principles of Systems Design, Springer Science and Business Media Deutschland GmbH, 650-663, (Lecture Notes in Computer Science ; vol. 13660 )
Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks
Kogler A., Gruß D., Schwarz M.
Conference Proceedings 31st USENIX Security Symposium, 31st USENIX Security Symposium, 4147-4164
Finding and Exploiting CPU Features using MSR Templating
Kogler A., Weber D., Haubenwallner M., Lipp M., Gruß D., Schwarz M.
Proceedings - 43rd IEEE Symposium on Security and Privacy, SP 2022, 43rd IEEE Symposium on Security and Privacy, 1474-1490, (Proceedings - IEEE Symposium on Security and Privacy; vol. 2022-May)
ÆPIC Leak
Borrello P., Kogler A., Schwarzl M., Lipp M., Gruß D., Schwarz M.
Proceedings of the 31st USENIX Security Symposium, Security 2022, 31st USENIX Security Symposium, 3917-3934
Reactive Synthesis Modulo Theories using Abstraction Refinement
Maderbacher B., Bloem R.
Proceedings of the 22nd Formal Methods in Computer-Aided Design, FMCAD 2022, 22nd Formal Methods in Computer-Aided Design, 315-324, (Conference Series: Formal Methods in Computer-Aided Design; vol. 3)
FERPModels: A Certification Framework for Expansion-Based QBF Solving
Bloem R., Hadzic V., Shukla ., Seidl M.
Proceedings - 2022 24th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, SYNASC 2022, 24th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 80-83
Industry Paper: Surrogate Models for Testing Analog Designs under Limited Budget – a Bandgap Case Study
Bloem R., Larrauri Borroto L., Lengfeldner R., Mateis C., Nickovic D., Ziegler B.
Proceedings - 2022 International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2022, 2022 International Conference on Hardware/Software Codesign and System Synthesis, 21-24, (Proceedings - 2022 International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2022)
Total Eclipse of the Heart – Disrupting the InterPlanetary File System
Prünster B., Marsalek A., Zefferer T.
31st USENIX Security Symposium, 31st USENIX Security Symposium, 3735-3752
Influence of the Linear Layer on the Algebraic Degree in SP-Networks
Cid C., Grassi L., Gunsing A., Lüftenegger R., Rechberger C., Schofnegger M.
IACR Transactions on Symmetric Cryptology, Vol. 2022(1), 110-137
Truncated Differential Properties of the Diagonal Set of Inputs for 5-Round AES
Grassi L., Rechberger C.
Information Security and Privacy - 27th Australasian Conference, ACISP 2022, Proceedings, 27th Australasian Conference on Information Security and Privacy, ACISP 2022, 24-45, (Lecture Notes in Computer Science; vol. 13494)
Privacy-Preserving Machine Learning Using Cryptography
Rechberger C., Walch R.
Security and Artificial Intelligence , Springer Science and Business Media Deutschland GmbH, 109-129, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13049 LNCS)
Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges
Hadipour H., Eichlseder M.
Applied Cryptography and Network Security - 20th International Conference, ACNS 2022, Proceedings, 20th International Conference on Applied Cryptography and Network Security, 230-250, (Lecture Notes in Computer Science; vol. 13269 )