We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Adaptive Shielding under Uncertainty.
Pranger S., Könighofer B., Tappler M., Deixelberger M., Jansen N., Bloem R.
2021 American Control Conference, ACC 2021, 2021 American Control Conference, 3467-3474, (Proceedings of the American Control Conference; vol. 2021-May)
PLATYPUS: Software-based Power Side-Channel Attacks on x86
Lipp M., Kogler A., Oswald D., Schwarz M., Easdon C., Canella C., Gruß D.
2021 IEEE Symposium on Security and Privacy (SP), 42th IEEE Symposium on Security and Privacy, 355-371
HECTOR-V: A Heterogeneous CPU Architecture for a Secure RISC-V Execution Environment
Nasahl P., Schilling R., Werner M., Mangard S.
ASIA CCS '21: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, 2021 ACM Asia Conference on Computer and Communications Security, 187–199
CrypTag: Thwarting Physical and Logical Memory Vulnerabilities using Cryptographically Colored Memory
Nasahl P., Schilling R., Werner M., Hoogerbrugge J., Medwed M., Mangard S.
ASIA CCS '21: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, 2021 ACM Asia Conference on Computer and Communications Security, 200–212
Adapting the TPL Trust Policy Language for a Self-Sovereign Identity World
Alber L., More S., Mödersheim S., Schlichtkrull A.
Lecture Notes in Informatics, Open Identity Summit 2021, 107-118
Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs
Gigerl B., Hadzic V., Primas R., Mangard S., Bloem R.
Proceedings of the 30th USENIX Security Symposium, 30th USENIX Security Symposium, 1469-1486
Protecting Indirect Branches against Fault Attacks using ARM Pointer Authentication
Nasahl P., Schilling R., Mangard S.
Proceedings of the 2021 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2021, 2021 IEEE International Symposium on Hardware Oriented Security and Trust, 68-79, (Proceedings of the 2021 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2021)
SecWalk: Protecting Page Table Walks Against Fault Attacks
Schilling R., Nasahl P., Weiglhofer S., Mangard S.
Proceedings of the 2021 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2021, 56-67, (Proceedings of the 2021 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2021)
Secure and Efficient Software Masking on Superscalar Pipelined Processors
Gigerl B., Primas R., Mangard S.
Advances in Cryptology - ASIACRYPT 2021, ASIACRYPT 2021, 3-32, (Lecture Notes in Computer Science; vol. 13091)
Online Shielding for Stochastic Systems
Könighofer B., Bloem R., Tappler M., Rudolf J., Palmisano A.
NASA Formal Methods - 13th International Symposium, NFM 2021, Proceedings, 13th NASA Formal Methods Symposium, 231-248, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12673 LNCS)
TEMPEST - Synthesis Tool for Reactive Systems and Shields in Probabilistic Environments
Pranger S., Könighofer B., Posch L., Bloem R.
Automated Technology for Verification and Analysis - 19th International Symposium, ATVA 2021, Proceedings, 19th International Symposium on Automated Technology for Verification and Analysis , 222-228, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12971 LNCS)
White-Box Traceable Attribute-Based Encryption with Hidden Policies and Outsourced Decryption
Ziegler D., Marsalek A., Palfinger G.
Proceedings - 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
SSI Strong Authentication using a Mobile-Phone based Identity Wallet reaching a High Level of Assurance
Abraham A., Schinnerl C., More S.
Proceedings of the 8th International Conference on Security and Cryptography (SECRYPT 2021), 18th International Conference on Security and Cryptography, 137-148
Privacy-Preserving eID Derivation to Self-Sovereign Identity Systems with Offline Revocation
Abraham A., Koch K., More S., Ramacher S., Stopar M.
Proceedings - 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 506-513, (Proceedings - 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021)
Ascon v1.2: Lightweight Authenticated Encryption and Hashing
Dobraunig C., Eichlseder M., Mendel F., Schläffer M.
Journal of Cryptology, Vol. 34(3)
Learning Mealy Machines with One Timer
Vaandrager F., Bloem R., Ebrahimi M.
Language and Automata Theory and Applications - 15th International Conference, LATA 2021, Proceedings, 14th-15th International Conference on Language and Automata Theory and Applications, 157-170, (Lecture Notes in Computer Science; vol. 12638)
Proving SIFA Protection of Masked Redundant Circuits
Hadzic V., Primas R., Bloem R.
Automated Technology for Verification and Analysis, 19th International Symposium on Automated Technology for Verification and Analysis , 249-265, (Lecture Notes in Computer Science; vol. 12971)
AndroTIME: Identifying Timing Side Channels in the Android API
Palfinger G., Prünster B., Ziegler D.
Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 1849-1856
Poseidon: A New Hash Function for Zero-Knowledge Proof Systems
Grassi L., Khovratovich D., Rechberger C., Roy A., Schofnegger M.
Proceedings of the 30th USENIX Security Symposium, 30th USENIX Security Symposium, 519-535, (Proceedings of the 30th USENIX Security Symposium)
Proving Resistance Against Infinitely Long Subspace Trails: How to Choose the Linear Layer
Grassi L., Rechberger C., Schofnegger M.
IACR Transactions on Symmetric Cryptology, Vol. 2021(2), 314-352