We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Jenny: Securing Syscalls for PKU-based Memory Isolation Systems
Schrammel D., Weiser S., Sadek R., Mangard S.
Proceedings of the 31st USENIX Security Symposium, 31st USENIX Security Symposium
Search-Based Testing of Reinforcement Learning
Tappler M., Cano Cordoba F., Aichernig B., Könighofer B.
Thirty-First International Joint Conference on Artificial Intelligence (IJCAI 2022), 31st International Joint Conference on Artificial Intelligence and the 25th European Conference on Artificial Intelligence, 503-510
Automata Learning meets Shielding
Tappler M., Pranger S., Könighofer B., Muskardin E., Bloem R., Larsen K.
Leveraging Applications of Formal Methods, Verification and Validation. Verification Principles - 11th International Symposium, ISoLA 2022, Proceedings, ISOLA 2022, 335-359, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13701 LNCS)
Correct-by-Construction Runtime Enforcement in AI – A Survey
Könighofer B., Bloem R., Ehlers R., Pek C.
Principles of Systems Design, Springer Science and Business Media Deutschland GmbH, 650-663, (Lecture Notes in Computer Science ; vol. 13660 )
Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks
Kogler A., Gruß D., Schwarz M.
Conference Proceedings 31st USENIX Security Symposium, 31st USENIX Security Symposium, 4147-4164
Finding and Exploiting CPU Features using MSR Templating
Kogler A., Weber D., Haubenwallner M., Lipp M., Gruß D., Schwarz M.
Proceedings - 43rd IEEE Symposium on Security and Privacy, SP 2022, 43rd IEEE Symposium on Security and Privacy, 1474-1490, (Proceedings - IEEE Symposium on Security and Privacy; vol. 2022-May)
ÆPIC Leak
Borrello P., Kogler A., Schwarzl M., Lipp M., Gruß D., Schwarz M.
Proceedings of the 31st USENIX Security Symposium, Security 2022, 31st USENIX Security Symposium, 3917-3934
Reactive Synthesis Modulo Theories using Abstraction Refinement
Maderbacher B., Bloem R.
Proceedings of the 22nd Formal Methods in Computer-Aided Design, FMCAD 2022, 22nd Formal Methods in Computer-Aided Design, 315-324, (Conference Series: Formal Methods in Computer-Aided Design; vol. 3)
FERPModels: A Certification Framework for Expansion-Based QBF Solving
Bloem R., Hadzic V., Shukla ., Seidl M.
Proceedings - 2022 24th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, SYNASC 2022, 24th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 80-83
Industry Paper: Surrogate Models for Testing Analog Designs under Limited Budget – a Bandgap Case Study
Bloem R., Larrauri Borroto L., Lengfeldner R., Mateis C., Nickovic D., Ziegler B.
Proceedings - 2022 International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2022, 2022 International Conference on Hardware/Software Codesign and System Synthesis, 21-24, (Proceedings - 2022 International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2022)
Total Eclipse of the Heart – Disrupting the InterPlanetary File System
Prünster B., Marsalek A., Zefferer T.
31st USENIX Security Symposium, 31st USENIX Security Symposium, 3735-3752
Influence of the Linear Layer on the Algebraic Degree in SP-Networks
Cid C., Grassi L., Gunsing A., Lüftenegger R., Rechberger C., Schofnegger M.
IACR Transactions on Symmetric Cryptology, Vol. 2022(1), 110-137
Truncated Differential Properties of the Diagonal Set of Inputs for 5-Round AES
Grassi L., Rechberger C.
Information Security and Privacy - 27th Australasian Conference, ACISP 2022, Proceedings, 27th Australasian Conference on Information Security and Privacy, ACISP 2022, 24-45, (Lecture Notes in Computer Science; vol. 13494)
Privacy-Preserving Machine Learning Using Cryptography
Rechberger C., Walch R.
Security and Artificial Intelligence , Springer Science and Business Media Deutschland GmbH, 109-129, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13049 LNCS)
Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges
Hadipour H., Eichlseder M.
Applied Cryptography and Network Security - 20th International Conference, ACNS 2022, Proceedings, 20th International Conference on Applied Cryptography and Network Security, 230-250, (Lecture Notes in Computer Science; vol. 13269 )
Statistical Effective Fault Attacks: The other Side of the Coin
Vafaei N., Zarei S., Bagheri N., Eichlseder M., Primas R., Soleimany H.
IEEE Transactions on Information Forensics and Security, Vol. 17, 1855-1867
Rapid Prototyping for Microarchitectural Attacks
Easdon C., Schwarz M., Schwarzl M., Gruß D.
Proceedings of the 31st USENIX Security Symposium, Security 2022, 31st USENIX Security Symposium, 3861-3877
AMD Prefetch Attacks through Power and Time
Lipp M., Gruß D., Schwarz M.
Proceedings of the 31st USENIX Security Symposium, Security 2022, 31st USENIX Security Symposium, 643-660