We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Search-Based Testing of Reinforcement Learning
Tappler M., Cano Cordoba F., Aichernig B., Könighofer B.
Thirty-First International Joint Conference on Artificial Intelligence (IJCAI 2022)
Automata Learning meets Shielding
Tappler M., Pranger S., Könighofer B., Muskardin E., Bloem R., Larsen K.
Leveraging Applications of Formal Methods, Verification and Validation. Verification Principles - 11th International Symposium, ISoLA 2022, Proceedings
Correct-by-Construction Runtime Enforcement in AI – A Survey
Könighofer B., Bloem R., Ehlers R., Pek C.
Principles of Systems Design, Springer Science and Business Media Deutschland GmbH, 650-663, 2022
Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks
Kogler A., Gruß D., Schwarz M.
Conference Proceedings 31st USENIX Security Symposium
Finding and Exploiting CPU Features using MSR Templating
Kogler A., Weber D., Haubenwallner M., Lipp M., Gruß D., Schwarz M.
Proceedings - 43rd IEEE Symposium on Security and Privacy, SP 2022
ÆPIC Leak
Borrello P., Kogler A., Schwarzl M., Lipp M., Gruß D., Schwarz M.
Proceedings of the 31st USENIX Security Symposium, Security 2022
Reactive Synthesis Modulo Theories using Abstraction Refinement
Maderbacher B., Bloem R.
Proceedings of the 22nd Formal Methods in Computer-Aided Design, FMCAD 2022
FERPModels: A Certification Framework for Expansion-Based QBF Solving
Bloem R., Hadzic V., Shukla ., Seidl M.
Proceedings - 2022 24th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, SYNASC 2022
Industry Paper: Surrogate Models for Testing Analog Designs under Limited Budget – a Bandgap Case Study
Bloem R., Larrauri Borroto L., Lengfeldner R., Mateis C., Nickovic D., Ziegler B.
Proceedings - 2022 International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2022
Total Eclipse of the Heart – Disrupting the InterPlanetary File System
Prünster B., Marsalek A., Zefferer T.
31st USENIX Security Symposium
Influence of the Linear Layer on the Algebraic Degree in SP-Networks
Cid C., Grassi L., Gunsing A., Lüftenegger R., Rechberger C., Schofnegger M.
IACR Transactions on Symmetric Cryptology, Vol. 2022(1), 2022
Truncated Differential Properties of the Diagonal Set of Inputs for 5-Round AES
Grassi L., Rechberger C.
Information Security and Privacy - 27th Australasian Conference, ACISP 2022, Proceedings
Privacy-Preserving Machine Learning Using Cryptography
Rechberger C., Walch R.
Security and Artificial Intelligence , Springer Science and Business Media Deutschland GmbH, 109-129, 2022
Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges
Hadipour H., Eichlseder M.
Applied Cryptography and Network Security - 20th International Conference, ACNS 2022, Proceedings
Statistical Effective Fault Attacks: The other Side of the Coin
Vafaei N., Zarei S., Bagheri N., Eichlseder M., Primas R., Soleimany H.
IEEE Transactions on Information Forensics and Security, Vol. 17, 2022
Rapid Prototyping for Microarchitectural Attacks
Easdon C., Schwarz M., Schwarzl M., Gruß D.
Proceedings of the 31st USENIX Security Symposium, Security 2022
AMD Prefetch Attacks through Power and Time
Lipp M., Gruß D., Schwarz M.
Proceedings of the 31st USENIX Security Symposium, Security 2022
Automatic Cryptanalysis of Block Ciphers: Finding Efficient Key-Recovery Attacks
Nageler M.
Master's Thesis, 2022
KaLi: A Crystal for Post-Quantum Security Using Kyber and Dilithium
Aikata A., Mert A., Imran M., Pagliarini S., Sinha Roy S.
IEEE Transactions on Circuits and Systems I: Regular Papers, Vol. 2022, 2022
