We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
NetSpectre: Read Arbitrary Memory over Network
Schwarz M., Schwarzl M., Lipp M., Masters J., Gruß D.
Computer Security - ESORICS 2019, ESORICS 2019, 279-299, (Lecture Notes in Computer Science; vol. 11735)
Wait a second
Eger M., Gruß D.
Proceedings of the 14th International Conference on the Foundations of Digital Games, FDG 2019, 14th International Conference on the Foundations of Digital Games, FDG 2019, (ACM International Conference Proceeding Series)
Mobile Private Contact Discovery at Scale
Kales D., Rechberger C., Schneider T., Senker M., Weinert C.
28th USENIX Security Symposium, 28th USENIX Security Symposium, 1447-1464
A Systematic Evaluation of Transient Execution Attacks and Defenses
Canella C., Bulck J., Schwarz M., Lipp M., Berg B., Ortner P., Piessens F., Evtyushkin D., Gruß D.
Proceedings of the 28th USENIX Security Symposium, USENIX Association, 249-266
ScatterCache: Thwarting Cache Attacks via Cache Set Randomization
Werner M., Unterluggauer T., Giner L., Schwarz M., Gruß D., Mangard S.
28th USENIX Security Symposium (USENIX Security 19), USENIX Association, 675-692
A Correctable Public Blockchain
Marsalek A., Zefferer T.
2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019, 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering, 554-561
Tackling data inefficiency: Compressing the bitcoin blockchain
Marsalek A., Zefferer T., Fasllija E., Ziegler D.
2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering, 626-633, (Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019)
TPL: A Trust Policy Language
Mödersheim S., Schlichtkrull A., Wagner G., More S., Alber L.
Trust Management XIII, IFIPTM 2019, 209-223
Run-Time Optimization for Learned Controllers Through Quantitative Games
Avni G., Bloem R., Chatterjee K., Henzinger T., Könighofer B., Pranger S.
Computer Aided Verification (CAV), 31st International Conference on Computer Aided Verification, 630-649, ( Lecture Notes in Computer Science; vol. 11561)
Synthesis of Minimum-Cost Shields for Multi-agent Systems
Bharadwaj S., Bloem R., Dimitrova R., Könighofer B., Topcu U.
2019 American Control Conference (ACC), 2019 American Control Conference, 1048-1055
Prying CoW: Inferring Secrets Across Virtual Machine Boundaries
Palfinger G., Prünster B., Ziegler D.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 16th International Joint Conference on e-Business and Telecommunications, 187 - 197
Fides – Unleashing the Full Potential of Remote Attestation
Prünster B., Palfinger G., Kollmann C.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, SciTePress - Science and Technology Publications, 314--321
Master of Puppets: Trusting Silicon in the Fight for Practical Security in Fully Decentralised Peer-to-Peer Networks
Prünster B., Fasllija E., Mocher D.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, SciTePress - Science and Technology Publications, 252--259
Fine-Grained Access Control in Industrial Internet of Things
Ziegler D., Sabongui J., Palfinger G.
Proceedings of the 34th International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2019, 34th International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2019, 91-104
Practical Enclave Malware with Intel SGX
Schwarz M., Weiser S., Gruß D.
Detection of Intrusions and Malware, and Vulnerability Assessment, 16th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, 177-196, (Lecture Notes in Computer Science; vol. 11543)
Mobile-Only Solution for Server-Based Qualified Electronic Signatures
Theuermann K., Tauber A., Lenz T.
ICC 2019 - 2019 IEEE International Conference on Communications (ICC), 2019 IEEE International Conference on Communications
ConTExT: Leakage-Free Transient Execution
Schwarz M., Schilling R., Kargl F., Lipp M., Canella C., Gruß D.
, Cornell University Library, (arXiv.org e-Print archive)
Spectre Attacks: Exploiting Speculative Execution
Kocher P., Horn J., Fogh A., Genkin D., Gruß D., Haas W., Hamburg M., Lipp M., Mangard S., Prescher T., Schwarz M., Yarom Y.
40th IEEE Symposium on Security and Privacy
Store-to-Leak Forwarding
Schwarz M., Canella C., Giner L., Gruß D.
, Cornell University Library, (arXiv.org e-Print archive)
Unleashing the Full Potential of Blockchain Technology for Security-Sensitive Business Applications
Marsalek A., Kollmann C., Zefferer T., Teufl P.
ICBC 2019 - IEEE International Conference on Blockchain and Cryptocurrency, 1st IEEE International Conference on Blockchain and Cryptocurrency, 394-402