We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
AndroPRINT: Analysing the Fingerprintability of the Android API
Palfinger G., Prünster B.
Proceedings of the 15th International Conference on Availability, Reliability and Security, ARES 2020
Donky: Domain Keys – Efficient In-Process Isolation for RISC-V and x86
Schrammel D., Weiser S., Steinegger S., Schwarzl M., Schwarz M., Mangard S., Gruß D.
Proceedings of the 29th USENIX Security Symposium
Revisiting Gilbert’s known-key distinguisher
Grassi L., Rechberger C.
Designs, Codes and Cryptography, Vol. 88(7), 2020
Spectre attacks
Kocher P., Horn J., Fogh A., Genkin D., Gruß D., Haas W., Hamburg M., Lipp M., Mangard S., Prescher T., Schwarz M., Yarom Y.
Communications of the ACM, Vol. 63(7), 2020
ISAP v2.0
Dobraunig C., Eichlseder M., Mangard S., Mendel F., Mennink B., Primas R., Unterluggauer T.
IACR Transactions on Symmetric Cryptology, Vol. 2020(Special Issue 1), 2020
Meltdown
Lipp M., Schwarz M., Gruß D., Prescher T., Haas W., Horn J., Mangard S., Kocher P., Genkin D., Yarom Y., Hamburg M., Strackx R.
Communications of the ACM, Vol. 63(6), 2020
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection
Van Bulck J., Moghimi D., Schwarz M., Lipp M., Minkin M., Genkin D., Yarom Y., Sunar B., Gruß D., Piessens F.
Proceedings - 2020 IEEE Symposium on Security and Privacy, SP 2020
On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy
Grassi L., Lüftenegger R., Rechberger C., Rotaru D., Schofnegger M.
Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
Plundervolt
Murdock K., Oswald D., Garcia F., Van Bulck J., Gruß D., Piessens F.
Proceedings - 2020 IEEE Symposium on Security and Privacy, SP 2020
RAMBleed
Kwong A., Genkin D., Gruß D., Yarom Y.
Proceedings - 2020 IEEE Symposium on Security and Privacy, SP 2020
Framework for faster key search using related-key higher-order differential properties
Dobraunig C., Moazami F., Rechberger C., Soleimany H.
IET Information Security, Vol. 14(2), 2020
Efficient FPGA Implementations of LowMC and Picnic
Kales D., Ramacher S., Rechberger C., Walch R., Werner M.
Topics in Cryptology – CT-RSA 2020 - The Cryptographers Track at the RSA Conference 2020, Proceedings
ConTExT: A Generic Approach for Mitigating Spectre
Schwarz M., Lipp M., Canella C., Schilling R., Kargl F., Gruß D.
Network and Distributed System Security Symposium 2020
Algebraic Cryptanalysis of Variants of Frit
Dobraunig C., Eichlseder M., Mendel F., Schofnegger M.
Selected Areas in Cryptography – SAC 2019 - 26th International Conference, Revised Selected Papers
Preface for the SYNT
Bloem R., Tabuada P.
Acta informatica, Vol. 57(1-2), 2020
Safe Reinforcement Learning Using Probabilistic Shields
Jansen N., Könighofer B., Junges S., Serban A., Bloem R.
31st International Conference on Concurrency Theory, CONCUR 2020
E-Government in the Public Cloud: Requirements and Opportunities
Abraham A., Hörandner F., Zefferer T., Zwattendorfer B.
Electronic Government, Vol. 16(3), 2020
Evaluation in Pilot-Based Research Projects: A Hierarchical Approach
Zefferer T.
Web Information Systems and Technologies - 14th International Conference, WEBIST 2018, Revised Selected Papers
Multiply, Divide, and Conquer - Making Fully Decentralised Access Control a Reality
Prünster B., Palfinger G., Ziegler D.
Network and System Security - 14th International Conference, NSS 2020, Proceedings
This Selfie Does Not Exist - On the Security of Electroneum Cloud Mining
Marsalek A., Fasllija E., Ziegler D.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunication: SECRYPT
