We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Throwing Boomerangs into Feistel Structures
Hadipour H., Nageler M., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2022(3), 2022
Proving SIFA protection of masked redundant circuits
Hadzic V., Primas R., Bloem R.
Innovations in Systems and Software Engineering, Vol. 18(3), 2022
SYNFI: Pre-Silicon Fault Analysis of an Open-Source Secure Element
Nasahl P., Osorio M., Vogel P., Schaffner M., Trippel T., Rizzo D., Mangard S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022(4), 2022
Riding the Waves Towards Generic Single-Cycle Masking in Hardware
Nagpal R., Gigerl B., Primas R., Mangard S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022(4), 2022
YOU SHALL NOT COMPUTE on my Data: Access Policies for Privacy-Preserving Data Marketplaces and an Implementation for a Distributed Market using MPC
More S., Alber L.
Proceedings of the 17th International Conference on Availability, Reliability and Security, ARES 2022
Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX
Giner L., Kogler A., Canella C., Schwarz M., Gruß D.
USENIX Security
Half-Double: Hammering From the Next Row Over
Kogler A., Juffinger J., Qazi S., Kim Y., Lipp M., Boichat N., Shiu E., Nissler M., Gruß D.
Proceedings of the 31st USENIX Security Symposium
Privately Connecting Mobility to Infectious Diseases via Applied Cryptography
Bampoulidis A., Bruni A., Helminger L., Kales D., Rechberger C., Walch R.
Proceedings on Privacy Enhancing Technologies 2022
Offline-verifiable Data from Distributed Ledger-based Registries
More S., Heher J., Walluschek C.
Proceedings - 19th International Conference on Security and Cryptography (SECRYPT 2022)
Multi-Party Computation in the GDPR
Helminger L., Rechberger C.
Privacy Symposium 2022 - Data Protection Law International Convergence and Compliance with Innovative Technologies (DPLICIT)
Integral Cryptanalysis of WARP based on Monomial Prediction
Hadipour H., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2022(2), 2022
Information-Combining Differential Fault Attacks on DEFAULT
Nageler M., Dobraunig C., Eichlseder M.
EUROCRYPT 2022
Multidimensional study on users’ evaluation of the KRAKEN personal data sharing platform
Gabrielli S., Rizzi S., Mayora O., More S., Perez Baun J., Vandevelde W.
Applied Sciences, Vol. 12(7), 2022
Studierfenster
Egger J., Wild D., Weber M., Bedoya C., Karner F., Prutsch A., Schmied M., Dionysio C., Krobath D., Jin Y., Gsaxner C., Li J., Pepe A.
Journal of Digital Imaging, Vol. 35(2), 2022
Bounds for the Security of Ascon against Differential and Linear Cryptanalysis
Erlacher J., Mendel F., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2022(1), 2022
Practical Key Recovery Attacks on FlexAEAD
Dunkelman O., Eichlseder M., Kales D., Keller N., Leurent G., Schofnegger M.
Designs, Codes and Cryptography, 2022
SFIP: Coarse-Grained Syscall-Flow-Integrity Protection in Modern Systems
Canella C., Dorn S., Gruß D., Schwarz M.
2022
Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks
Naseredini A., Gast S., Schwarzl M., Bernardo P., Smajic A., Canella. C., Berger M., Gruß D.
ICISSP 2022 - Proceedings of the 8th International Conference on Information Systems Security and Privacy
FIPAC: Thwarting Fault- and Software-Induced Control-Flow Attacks with ARM Pointer Authentication
Schilling R., Nasahl P., Mangard S.
COSADE: Constructive Side-Channel Analysis and Secure Design
Jenny: Securing Syscalls for PKU-based Memory Isolation Systems
Schrammel D., Weiser S., Sadek R., Mangard S.
Proceedings of the 31st USENIX Security Symposium
