We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Master of Puppets: Trusting Silicon in the Fight for Practical Security in Fully Decentralised Peer-to-Peer Networks
Prünster B., Fasllija E., Mocher D.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications
Fine-Grained Access Control in Industrial Internet of Things
Ziegler D., Sabongui J., Palfinger G.
Proceedings of the 34th International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2019
Practical Enclave Malware with Intel SGX
Schwarz M., Weiser S., Gruß D.
Detection of Intrusions and Malware, and Vulnerability Assessment
Mobile-Only Solution for Server-Based Qualified Electronic Signatures
Theuermann K., Tauber A., Lenz T.
ICC 2019 - 2019 IEEE International Conference on Communications (ICC)
ConTExT: Leakage-Free Transient Execution
Schwarz M., Schilling R., Kargl F., Lipp M., Canella C., Gruß D.
2019
Spectre Attacks: Exploiting Speculative Execution
Kocher P., Horn J., Fogh A., Genkin D., Gruß D., Haas W., Hamburg M., Lipp M., Mangard S., Prescher T., Schwarz M., Yarom Y.
40th IEEE Symposium on Security and Privacy
Unleashing the Full Potential of Blockchain Technology for Security-Sensitive Business Applications
Marsalek A., Kollmann C., Zefferer T., Teufl P.
ICBC 2019 - IEEE International Conference on Blockchain and Cryptocurrency
Flexible und benutzerfreundliche Authentifizierungsverfahren zur Umsetzung transaktionaler E-Government-Services auf mobilen Geräten
Theuermann K., Zefferer T., Lenz T., Tauber A.
Handbuch E-Government, Springer Fachmedien Wiesbaden, 1-30, 2019
Privacy-preserving attribute aggregation in eID federations
Priesnitz Filho W., Ribeiro C., Zefferer T.
Future Generation Computer Systems, Vol. 92(Volume 92), 2019
Dependable Internet of Things
Römer K., Witrisal K., Baunach M., Bloem R., Horn M.
Proceedings of the International Conference on Sensor Networks (SENSORNETS) 2019
JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits
Schwarz M., Lackner F., Gruß D.
NDSS
TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V
Weiser S., Werner M., Brasser F., Malenko M., Mangard S., Sadeghi A.
Proceedings 2019 - Network and Distributed System Security Symposium (NDSS)
Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje
Dobraunig C., Mangard S., Mendel F., Primas R.
Selected Areas in Cryptography – SAC 2018
Small faults grow up - Verification of error masking robustness in arithmetically encoded programs
Karl A., Schilling R., Bloem R., Mangard S.
Verification, Model Checking, and Abstract Interpretation - 20th International Conference, VMCAI 2019, Proceedings
Protecting RISC-V Processors against Physical Attacks
Werner M., Schilling R., Unterluggauer T., Mangard S.
Design, Automation & Test in Europe Conference - DATE 2019
Efficient Information-Flow Verification Under Speculative Execution
Bloem R., Jacobs S., Vizel Y.
Efficient Information-Flow Verification Under Speculative Execution
Qualified Remote Signatures – Solutions, its Certification, and Use
Leitold H., Konrad D.
Proceedings of 29th SmartCard Workshop
Programming Behavioral Test Models for SMT Solving in Scala
Aichernig B., Maderbacher B., Tiran S.
2019 IEEE International Conference on Software Testing, Verification and Validation Workshops, {ICST} Workshops 2019, Xi'an, China, April 22-23, 2019
Software-basierte Mikroarchitekturangriffe
Gruß D.
Ausgezeichnete Informatikdissertationen 2017, Gesellschaft für Informatik e.V., 81-90, 2019
