We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Statistical Effective Fault Attacks: The other Side of the Coin
Vafaei N., Zarei S., Bagheri N., Eichlseder M., Primas R., Soleimany H.
IEEE Transactions on Information Forensics and Security, Vol. 17, 1855-1867
Rapid Prototyping for Microarchitectural Attacks
Easdon C., Schwarz M., Schwarzl M., Gruß D.
Proceedings of the 31st USENIX Security Symposium, Security 2022, 31st USENIX Security Symposium, 3861-3877
AMD Prefetch Attacks through Power and Time
Lipp M., Gruß D., Schwarz M.
Proceedings of the 31st USENIX Security Symposium, Security 2022, 31st USENIX Security Symposium, 643-660
Automatic Cryptanalysis of Block Ciphers: Finding Efficient Key-Recovery Attacks
Nageler M.
, Master's Thesis
KaLi: A Crystal for Post-Quantum Security Using Kyber and Dilithium
Aikata A., Mert A., Imran M., Pagliarini S., Sinha Roy S.
IEEE Transactions on Circuits and Systems I: Regular Papers, Vol. 2022, 1-12
Will You Cross the Threshold for Me? Generic Side-Channel Assisted Chosen-Ciphertext Attacks on NTRU-based KEMs
Ravi P., Ezerman M., Bhasin S., Chattopadhyay A., Sinha Roy S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022(1), 722–761
On Exploiting Message Leakage in (few) NIST PQC Candidates for Practical Message Recovery Attacks
Ravi P., Bhasin S., Sinha Roy S., Chattopadhyay A.
IEEE Transactions on Information Forensics and Security, Vol. 17, 684-699
Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks
Naseredini A., Gast S., Schwarzl M., Bernardo P., Smajic A., Canella C., Berger M., Gruß D.
Automating Seccomp Filter Generation for Linux Applications
Canella C., Werner M., Gruß D., Schwarz M.
CCSW'21 - Proceedings of the 2021 Cloud Computing Security Workshop, ACM Cloud Computing Security Workshop 2021, 139-151
Design Space Exploration of SABER in 65nm ASIC
Imran M., Almeida F., Raik J., Basso A., Sinha Roy S., Pagliarini S.
ASHES '21: Proceedings of the 5th Workshop on Attacks and Solutions in Hardware Security, 5th Workshop on Attacks and Solutions in Hardware Security, 85-90
Magnifying Side-Channel Leakage of Lattice-Based Cryptosystems with Chosen Ciphertexts: The Case Study of Kyber
Xu Z., Pemberton O., Sinha Roy S., Oswald D., Yao W., Zheng Z.
IEEE Transactions on Computers
SERVAS! Secure Enclaves via RISC-V Authenticryption Shield
Steinegger S., Schrammel D., Weiser S., Nasahl P., Mangard S.
Computer Security – ESORICS 2021, 26th European Symposium on Research in Computer Security, 370-391, (Lecture Notes in Computer Science; vol. 12973)
Two SAT solvers for solving quantified Boolean formulas with an arbitrary number of quantifier alternations
Bloem R., Braud-Santoni N., Hadzic V., Seidl M., Lonsing F., Egly U.
Formal Methods in System Design, Vol. 57(2), 157-177
L*-Based Learning of Markov Decision Processes (Extended Version)
Tappler M., Aichernig B., Bacci G., Eichlseder M., Larsen K.
Formal Aspects of Computing, Vol. 33(4-5), 575-615
Systematic Analysis of Randomization-based Protected Cache Architectures
Purnal A., Giner L., Gruß D., Verbauwhede I.
2021 IEEE Symposium on Security and Privacy (SP), 42th IEEE Symposium on Security and Privacy, 987-1002
CocoAlma: A Versatile Masking Verifier
Hadzic V., Bloem R.
Proceedings of the 21st Formal Methods in Computer-Aided Design, FMCAD 2021, 21st International Conference on Formal Methods in Computer-Aided Design, 14-23, (Proceedings of the 21st Formal Methods in Computer-Aided Design, FMCAD 2021)
Adaptive Testing for Specification Coverage in CPS Models
Bartocci E., Bloem R., Maderbacher B., Manjunath N., Nickovic D.
IFAC-PapersOnLine, Vol. 54(5), 229-234
Trust Me If You Can: Trusted Transformation Between (JSON) Schemas to Support Global Authentication of Education Credentials
More S., Grassberger P., Hörandner F., Abraham A., Klausner L.
ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, Proceedings, 36th International Conference on ICT Systems Security and Privacy Protection, 19-35, (IFIP Advances in Information and Communication Technology; vol. 625)