We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
On Loopy Belief Propagation for SASCAs: An Analysis and Empirical Study of the Inference Problem
Nagpal R., Cassiers G., Knoll C., Pernkopf F., Primas R., Mangard S.
IACR Communications in Crypology, Vol. 1(4)
ChoiceJacking: Compromising Mobile Devices through Malicious Chargers like a Decade ago
Draschbacher F., Maar L., Oberhuber M., Mangard S.
Usenix Security Symposium 2025, 34th USENIX Security Symposium
Cryptographic Least Privilege Enforcement for Scalable Memory Isolation
Unterguggenberger M., Schrammel D., Maar L., Lamster L., Hadzic V., Mangard S.
IEEE International Symposium on Hardware Oriented Security and Trust (HOST), IEEE International Symposium on Hardware Oriented Security and Trust 2025: HOST 2025
Tools at the Frontiers of Quantitative Verification
Andriushchenko R., Bork A., Budde C., Češka M., Grover K., Hahn E., Hartmanns A., Israelsen B., Jansen N., Jeppson J., Junges S., Köhl M., Könighofer B., Křetínský J., Meggendorfer T., Parker D., Pranger S., Quatmann T., Ruijters E., Taylor L., Volk M., Weininger M., Zhang Z.
TOOLympics Challenge 2023 - Updates, Results, Successes of the Formal-Methods Competitions, 30th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, 90–146, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14550 LNCS)
Shields for Safe Reinforcement Learning
Könighofer B., Bloem R., Jansen N., Junges S., Pranger S.
Communications of the ACM
Fairness Shields: Safeguarding against Biased Decision Makers
Cano Cordoba F., Henzinger T., Könighofer B., Kueffner K., Mallik K.
Proceedings of the AAAI Conference on Artificial Intelligence, AAAI Press, 15659-15668
Towards Responsible AI: Advances in Safety, Fairness, and Accountability of Autonomous Systems
Cano Cordoba F.
, Doctoral Thesis
Input Uncertainty Attribution by Uncertainty Propagation
Kantz B., Steger S., Staudinger C., Feilmayr C., Wachlmayr J., Haberl A., Schuster S., Pernkopf F.
ICASSP
Synthesis of Controllers for Continuous Blackbox Systems
Maderbacher B., Windisch F., Larrauri Borroto L., Bloem R.
Verification, Model Checking, and Abstract Interpretation - 26th International Conference, VMCAI 2025, Proceedings, 26th International Conference on Verification, Model Checking, and Abstract Interpretation, VMCAI 2025, 137–159, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 15530 LNCS)
SoK: Computational and Distributed Differential Privacy for MPC
Meisingseth F., Rechberger C.
Proceedings on Privacy Enhancing Technologies, 25th Privacy Enhancing Technologies Symposium, PETS 2025, 420-439
Practical Two-party Computational Differential Privacy with Active Security
Meisingseth F., Rechberger C., Schmid F.
Proceedings on Privacy Enhancing Technologies, 25th Privacy Enhancing Technologies Symposium, PETS 2025, 341-360
One Tree to Rule Them All
Baum C., Beullens W., Mukherjee S., Orsini E., Ramacher S., Rechberger C., Roy L., Scholl P.
Advances in Cryptology – ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, 30th Annual International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, 463-493, (Lecture Notes in Computer Science; vol. 15484 LNCS)
Exploring Large Integer Multiplication for Cryptography Targeting In-Memory Computing
Krieger F., Hirner F., Sinha Roy S.
2025 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2025 Design, Automation and Test in Europe Conference: DATE 2025
PASTA on Edge: Cryptoprocessor for Hybrid Homomorphic Encryption
Aikata A., Sanz Sobrino D., Sinha Roy S.
DATE: Design, Automation and Test in Europe Conference, 2025 Design, Automation and Test in Europe Conference: DATE 2025
REED: Chiplet-Based Scalable Hardware Accelerator for Fully Homomorphic Encryption
Aikata A., Mert A., Kwon S., Deryabin M., Sinha Roy S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2025(2)
ToFA: Towards Fault Analysis of GIFT and GIFT-like Ciphers Leveraging Truncated Impossible Differentials
Kundu A., Ghosh S., Aikata A., Saha D.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2025(3)
Exploring the Six Worlds of Gröbner Basis Cryptanalysis: Application to Anemoi
Koschatko K., Lüftenegger R., Rechberger C.
IACR Transactions on Symmetric Cryptology, Vol. 2024(4), 138-190
Opening the Blackbox: Collision Attacks on Round-Reduced Tip5, Tip4, Tip4’ and Monolith
Liu F., Koschatko K., Grassi L., Yan H., Chen S., Banik S., Meier W.
IACR Transactions on Symmetric Cryptology, Vol. 2024(4), 97-137
Efficient and Composable Masked AES S-Box Designs Using Optimized Inverters
Hadzic V., Bloem R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2025(1), 656-683
Cross-Core Interrupt Detection: Exploiting User and Virtualized IPIs
Rauscher F., Gruß D.
CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security, ACM Conference on Computer and Communications Security, 94 - 108