We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Two SAT solvers for solving quantified Boolean formulas with an arbitrary number of quantifier alternations
Bloem R., Braud-Santoni N., Hadzic V., Seidl M., Lonsing F., Egly U.
Formal Methods in System Design, Vol. 57(2), 2021
L*-Based Learning of Markov Decision Processes (Extended Version)
Tappler M., Aichernig B., Bacci G., Eichlseder M., Larsen K.
Formal Aspects of Computing, Vol. 33(4-5), 2021
Systematic Analysis of Randomization-based Protected Cache Architectures
Purnal A., Giner L., Gruß D., Verbauwhede I.
2021 IEEE Symposium on Security and Privacy (SP)
CocoAlma: A Versatile Masking Verifier
Hadzic V., Bloem R.
Proceedings of the 21st Formal Methods in Computer-Aided Design, FMCAD 2021
Adaptive Testing for Specification Coverage in CPS Models
Bartocci E., Bloem R., Maderbacher B., Manjunath N., Nickovic D.
IFAC-PapersOnLine, Vol. 54(5), 2021
Trust Me If You Can: Trusted Transformation Between (JSON) Schemas to Support Global Authentication of Education Credentials
More S., Grassberger P., Hörandner F., Abraham A., Klausner L.
ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, Proceedings
Adaptive Shielding under Uncertainty.
Pranger S., Könighofer B., Tappler M., Deixelberger M., Jansen N., Bloem R.
2021 American Control Conference, ACC 2021
PLATYPUS: Software-based Power Side-Channel Attacks on x86
Lipp M., Kogler A., Oswald D., Schwarz M., Easdon C., Canella C., Gruß D.
2021 IEEE Symposium on Security and Privacy (SP)
HECTOR-V: A Heterogeneous CPU Architecture for a Secure RISC-V Execution Environment
Nasahl P., Schilling R., Werner M., Mangard S.
ASIA CCS '21: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security
CrypTag: Thwarting Physical and Logical Memory Vulnerabilities using Cryptographically Colored Memory
Nasahl P., Schilling R., Werner M., Hoogerbrugge J., Medwed M., Mangard S.
ASIA CCS '21: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security
Adapting the TPL Trust Policy Language for a Self-Sovereign Identity World
Alber L., More S., Mödersheim S., Schlichtkrull A.
Lecture Notes in Informatics
Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs
Gigerl B., Hadzic V., Primas R., Mangard S., Bloem R.
Proceedings of the 30th USENIX Security Symposium
Protecting Indirect Branches against Fault Attacks using ARM Pointer Authentication
Nasahl P., Schilling R., Mangard S.
Proceedings of the 2021 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2021
SecWalk: Protecting Page Table Walks Against Fault Attacks
Schilling R., Nasahl P., Weiglhofer S., Mangard S.
Proceedings of the 2021 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2021
Secure and Efficient Software Masking on Superscalar Pipelined Processors
Gigerl B., Primas R., Mangard S.
Advances in Cryptology - ASIACRYPT 2021
White-Box Traceable Attribute-Based Encryption with Hidden Policies and Outsourced Decryption
Ziegler D., Marsalek A., Palfinger G.
Proceedings - 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021
Online Shielding for Stochastic Systems
Könighofer B., Bloem R., Tappler M., Rudolf J., Palmisano A.
NASA Formal Methods - 13th International Symposium, NFM 2021, Proceedings
TEMPEST - Synthesis Tool for Reactive Systems and Shields in Probabilistic Environments
Pranger S., Könighofer B., Posch L., Bloem R.
Automated Technology for Verification and Analysis - 19th International Symposium, ATVA 2021, Proceedings
SSI Strong Authentication using a Mobile-Phone based Identity Wallet reaching a High Level of Assurance
Abraham A., Schinnerl C., More S.
Proceedings of the 8th International Conference on Security and Cryptography (SECRYPT 2021)
PRINCEv2 - More Security for (Almost) No Overhead
Božilov D., Eichlseder M., Knezevic M., Lambin B., Leander G., Moos T., Nikov V., Rasoolzadeh S., Todo Y., Wiemer F.
Selected Areas in Cryptography
