We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
SQUIP: Exploiting the Scheduler Queue Contention Side Channel
Gast S., Juffinger J., Schwarzl M., Saileshwar G., Kogler A., Franza S., Köstl M., Gruß D.
44th IEEE Symposium on Security and Privacy
Attribute Repair for Threat Prevention
Tarrach T., Ebrahimi M., König S., Schmittner C., Bloem R., Nickovic D.
Computer Safety, Reliability, and Security - 42nd International Conference, SAFECOMP 2023, Proceedings
Pasta: A Case for Hybrid Homomorphic Encryption
Dobraunig C., Grassi L., Helminger L., Rechberger C., Schofnegger M., Walch R.
TCHES 2023 Volume 2023/3
Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications
Grassi L., Hao Y., Rechberger C., Schofnegger M., Walch R., Wang Q.
Crypto 2023
Layered Binary Templating
Schwarzl M., Kraft E., Gruß D.
Applied Cryptography and Network Security
Practical Timing Side-Channel Attacks on Memory Compression
Schwarzl M., Borrello P., Saileshwar G., Müller H., Schwarz M., Gruß D.
43th IEEE Symposium on Security and Privacay: IEEE S&P 2023
Design and Analysis of Client-Side Operations in Homomorphic Encryption for FPGA Platforms
Krieger F.
Master's Thesis, 2023
Computational Evaluation of Model-Agnostic Explainable AI Using Local Feature Importance in Healthcare
Erdeniz S., Schrempf M., Kramer D., Rainer P., Felfernig A., Tran T., Burgstaller T., Lubos S.
Artificial Intelligence in Medicine - 21st International Conference on Artificial Intelligence in Medicine, AIME 2023, Proceedings
KRAKEN: A Privacy-Preserving Data Market for Authentic Data
Koch K., Krenn S., Marc T., More S., Ramacher S.
DE 2022 - Proceedings of the 1st International Workshop on Data Economy, Part of CoNEXT 2022
Integrity of virtual testing for crash protection
Galijatovic E., Eichlseder M., Heindl S., Klug C.
Frontiers in Future Transportation, Vol. 3, 2022
Medha: Microcoded Hardware Accelerator for computing on Encrypted Data
Mert A., Aikata A., Kwon S., Shiin Y., Yoo D., Lee Y., Sinha Roy S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2023(1), 2022
Power Contracts: Provably Complete Power Leakage Models for Processors
Bloem R., Gigerl B., Gourjon M., Hadzic V., Mangard S., Primas R.
CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto
Dobraunig C., Kales D., Rechberger C., Schofnegger M., Zaverucha G.
CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
Reinforced Concrete: A Fast Hash Function for Verifiable Computation
Lüftenegger R., Rechberger C., Grassi L., Schofnegger M., Walch R., Khovratovich D.
CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
Adaptive testing for specification coverage and refinement in CPS models
Bartocci E., Bloem R., Maderbacher B., Manjunath N., Nickovic D.
Nonlinear Analysis: Hybrid Systems, Vol. 46, 2022
Fault Analysis of the PRINCE Family of Lightweight Ciphers
Kundu A., Aikata A., Karmakar B., Saha D.
Journal of Cryptographic Engineering, Vol. 12(4), 2022
Time-Memory Trade-Offs for Saber+ on Memory-Constrained RISC-V Platform
Zhang J., Huang J., Liu Z., Sinha Roy S.
IEEE Transactions on Computers, Vol. 71(11), 2022
SFP: Providing System Call Flow Protection against Software and Fault Attacks
Schilling R., Nasahl P., Unterguggenberger M., Mangard S.
HASP 2022 - Hardware and Architectural Support for Security and Privacy
Robust and Scalable Process Isolation against Spectre in the Cloud
Schwarzl M., Borrello P., Kogler A., Varda K., Schuster T., Schwarz M., Gruß D.
European Symposium on Research in Computer Security (ESORICS)
Online shielding for reinforcement learning
Könighofer B., Rudolf J., Palmisano A., Tappler M., Bloem R.
Innovations in Systems and Software Engineering, 2022
