We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC
Eichlseder M., Grassi L., Lüftenegger R., Øygarden M., Rechberger C., Schofnegger M., Wang Q.
Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, 2020, Proceedings
Protecting against Statistical Ineffective Fault Attacks
Daemen J., Dobraunig C., Eichlseder M., Groß H., Mendel F., Primas R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2020(3), 2020
Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems
Beyne T., Canteaut A., Dinur I., Eichlseder M., Leander G., Leurent G., Naya-Plasencia M., Sasaki Y., Todo Y., Wiemer F.
Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, Proceedings
Computing Expected Differential Probability of (Truncated) Differentials and Expected Linear Potential of (Multidimensional) Linear Hulls in SPN Block Ciphers
Eichlseder M., Leander G., Rasoolzadeh S.
Progress in Cryptology – INDOCRYPT 2020 - 21st International Conference on Cryptology in India 2020, Proceedings
Design and Development of a Web-based Tool for Inpainting of Dissected Aortae in Angiography Images
Prutsch A., Pepe A., Egger J.
2020 Central European Seminar on Computer Graphics
Fallout: Leaking Data on Meltdown-resistant CPUs
Canella C., Genkin D., Giner L., Gruß D., Lipp M., Minkin M., Moghimi D., Piessens F., Schwarz M., Sunar B., Bulck J., Yarom Y.
CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
ZombieLoad
Schwarz M., Lipp M., Moghimi D., Bulck J., Stecklina J., Prescher T., Gruß D.
CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
Page Cache Attacks
Gruß D., Kraft E., Tiwari T., Schwarz M., Trachtenberg A., Hennessey J., Ionescu A., Fogh A.
CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
Forgery Attacks on FlexAE and FlexAEAD
Eichlseder M., Kales D., Schofnegger M.
Cryptography and Coding - IMACC 2019
Phish-Hook: Detecting Phishing Certificates Using Certificate Transparency Logs
Fasllija E., Enişer H., Prünster B.
15th EAI International Conference on Security and Privacy in Communication Networks
SGXJail: Defeating Enclave Malware via Confinement
Weiser S., Mayr L., Schwarz M., Gruß D.
RAID 2019 Proceedings
NetSpectre: Read Arbitrary Memory over Network
Schwarz M., Schwarzl M., Lipp M., Masters J., Gruß D.
Computer Security - ESORICS 2019
Wait a second
Eger M., Gruß D.
Proceedings of the 14th International Conference on the Foundations of Digital Games, FDG 2019
Mobile Private Contact Discovery at Scale
Kales D., Rechberger C., Schneider T., Senker M., Weinert C.
28th USENIX Security Symposium
A Systematic Evaluation of Transient Execution Attacks and Defenses
Canella C., Bulck J., Schwarz M., Lipp M., Berg B., Ortner P., Piessens F., Evtyushkin D., Gruß D.
Proceedings of the 28th USENIX Security Symposium
ScatterCache: Thwarting Cache Attacks via Cache Set Randomization
Werner M., Unterluggauer T., Giner L., Schwarz M., Gruß D., Mangard S.
28th USENIX Security Symposium (USENIX Security 19)
A Correctable Public Blockchain
Marsalek A., Zefferer T.
2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019
Tackling data inefficiency: Compressing the bitcoin blockchain
Marsalek A., Zefferer T., Fasllija E., Ziegler D.
2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering
TPL: A Trust Policy Language
Mödersheim S., Schlichtkrull A., Wagner G., More S., Alber L.
Trust Management XIII
Run-Time Optimization for Learned Controllers Through Quantitative Games
Avni G., Bloem R., Chatterjee K., Henzinger T., Könighofer B., Pranger S.
Computer Aided Verification (CAV)
