We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Big Numbers – Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations
Weiser S., Schrammel D., Bodner L., Spreitzer R.
Proceedings of the 29th USENIX Security Symposium
Design and Development of a Web-based Tool for Inpainting of Dissected Aortae in Angiography Images
Prutsch A., Pepe A., Egger J.
2020 Central European Seminar on Computer Graphics
Fallout: Leaking Data on Meltdown-resistant CPUs
Canella C., Genkin D., Giner L., Gruß D., Lipp M., Minkin M., Moghimi D., Piessens F., Schwarz M., Sunar B., Bulck J., Yarom Y.
CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
ZombieLoad
Schwarz M., Lipp M., Moghimi D., Bulck J., Stecklina J., Prescher T., Gruß D.
CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
Page Cache Attacks
Gruß D., Kraft E., Tiwari T., Schwarz M., Trachtenberg A., Hennessey J., Ionescu A., Fogh A.
CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
Forgery Attacks on FlexAE and FlexAEAD
Eichlseder M., Kales D., Schofnegger M.
Cryptography and Coding - IMACC 2019
Phish-Hook: Detecting Phishing Certificates Using Certificate Transparency Logs
Fasllija E., Enişer H., Prünster B.
15th EAI International Conference on Security and Privacy in Communication Networks
SGXJail: Defeating Enclave Malware via Confinement
Weiser S., Mayr L., Schwarz M., Gruß D.
RAID 2019 Proceedings
NetSpectre: Read Arbitrary Memory over Network
Schwarz M., Schwarzl M., Lipp M., Masters J., Gruß D.
Computer Security - ESORICS 2019
Wait a second
Eger M., Gruß D.
Proceedings of the 14th International Conference on the Foundations of Digital Games, FDG 2019
Mobile Private Contact Discovery at Scale
Kales D., Rechberger C., Schneider T., Senker M., Weinert C.
28th USENIX Security Symposium
A Systematic Evaluation of Transient Execution Attacks and Defenses
Canella C., Bulck J., Schwarz M., Lipp M., Berg B., Ortner P., Piessens F., Evtyushkin D., Gruß D.
Proceedings of the 28th USENIX Security Symposium
ScatterCache: Thwarting Cache Attacks via Cache Set Randomization
Werner M., Unterluggauer T., Giner L., Schwarz M., Gruß D., Mangard S.
28th USENIX Security Symposium (USENIX Security 19)
A Correctable Public Blockchain
Marsalek A., Zefferer T.
2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019
Tackling data inefficiency: Compressing the bitcoin blockchain
Marsalek A., Zefferer T., Fasllija E., Ziegler D.
2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering
TPL: A Trust Policy Language
Mödersheim S., Schlichtkrull A., Wagner G., More S., Alber L.
Trust Management XIII
Run-Time Optimization for Learned Controllers Through Quantitative Games
Avni G., Bloem R., Chatterjee K., Henzinger T., Könighofer B., Pranger S.
Computer Aided Verification (CAV)
Synthesis of Minimum-Cost Shields for Multi-agent Systems
Bharadwaj S., Bloem R., Dimitrova R., Könighofer B., Topcu U.
2019 American Control Conference (ACC)
Prying CoW: Inferring Secrets Across Virtual Machine Boundaries
Palfinger G., Prünster B., Ziegler D.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications
Fides – Unleashing the Full Potential of Remote Attestation
Prünster B., Palfinger G., Kollmann C.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications
