We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Multi-Party Computation in the GDPR
Helminger L., Rechberger C.
Privacy Symposium 2022 - Data Protection Law International Convergence and Compliance with Innovative Technologies (DPLICIT)
Integral Cryptanalysis of WARP based on Monomial Prediction
Hadipour H., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2022(2), 2022
Information-Combining Differential Fault Attacks on DEFAULT
Nageler M., Dobraunig C., Eichlseder M.
EUROCRYPT 2022
Multidimensional study on users’ evaluation of the KRAKEN personal data sharing platform
Gabrielli S., Rizzi S., Mayora O., More S., Perez Baun J., Vandevelde W.
Applied Sciences, Vol. 12(7), 2022
Studierfenster
Egger J., Wild D., Weber M., Bedoya C., Karner F., Prutsch A., Schmied M., Dionysio C., Krobath D., Jin Y., Gsaxner C., Li J., Pepe A.
Journal of Digital Imaging, Vol. 35(2), 2022
Bounds for the Security of Ascon against Differential and Linear Cryptanalysis
Erlacher J., Mendel F., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2022(1), 2022
Practical Key Recovery Attacks on FlexAEAD
Dunkelman O., Eichlseder M., Kales D., Keller N., Leurent G., Schofnegger M.
Designs, Codes and Cryptography, 2022
SFIP: Coarse-Grained Syscall-Flow-Integrity Protection in Modern Systems
Canella C., Dorn S., Gruß D., Schwarz M.
2022
Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks
Naseredini A., Gast S., Schwarzl M., Bernardo P., Smajic A., Canella. C., Berger M., Gruß D.
ICISSP 2022 - Proceedings of the 8th International Conference on Information Systems Security and Privacy
FIPAC: Thwarting Fault- and Software-Induced Control-Flow Attacks with ARM Pointer Authentication
Schilling R., Nasahl P., Mangard S.
COSADE: Constructive Side-Channel Analysis and Secure Design
Jenny: Securing Syscalls for PKU-based Memory Isolation Systems
Schrammel D., Weiser S., Sadek R., Mangard S.
Proceedings of the 31st USENIX Security Symposium
Search-Based Testing of Reinforcement Learning
Tappler M., Cano Cordoba F., Aichernig B., Könighofer B.
Thirty-First International Joint Conference on Artificial Intelligence (IJCAI 2022)
Automata Learning meets Shielding
Tappler M., Pranger S., Könighofer B., Muskardin E., Bloem R., Larsen K.
Leveraging Applications of Formal Methods, Verification and Validation. Verification Principles - 11th International Symposium, ISoLA 2022, Proceedings
Correct-by-Construction Runtime Enforcement in AI – A Survey
Könighofer B., Bloem R., Ehlers R., Pek C.
Principles of Systems Design, Springer Science and Business Media Deutschland GmbH, 650-663, 2022
Reactive Synthesis Modulo Theories using Abstraction Refinement
Maderbacher B., Bloem R.
Proceedings of the 22nd Formal Methods in Computer-Aided Design, FMCAD 2022
FERPModels: A Certification Framework for Expansion-Based QBF Solving
Bloem R., Hadzic V., Shukla ., Seidl M.
Proceedings - 2022 24th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, SYNASC 2022
Industry Paper: Surrogate Models for Testing Analog Designs under Limited Budget – a Bandgap Case Study
Bloem R., Larrauri Borroto L., Lengfeldner R., Mateis C., Nickovic D., Ziegler B.
Proceedings - 2022 International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2022
Total Eclipse of the Heart – Disrupting the InterPlanetary File System
Prünster B., Marsalek A., Zefferer T.
31st USENIX Security Symposium
Influence of the Linear Layer on the Algebraic Degree in SP-Networks
Cid C., Grassi L., Gunsing A., Lüftenegger R., Rechberger C., Schofnegger M.
IACR Transactions on Symmetric Cryptology, Vol. 2022(1), 2022
