We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Policy-based access control for the IoT and Smart Cities
Omolola O., More S., Fasllija E., Wagner G., Alber L.
Open Identity Summit 2019, Proceedings
DNS-based trust scheme publication and discovery
Wagner G., Wagner S., More S., Hoffmann M.
Open Identity Summit 2019, Proceedings
Learning a Behavior Model of Hybrid Systems Through Combining Model-Based Testing and Machine Learning
Aichernig B., Bloem R., Ebrahimi M., Horn M., Pernkopf F., Roth W., Rupp A., Tappler M., Tranninger M.
Testing Software and Systems
Synthesizing adaptive test strategies from temporal logic specifications
Bloem R., Fey G., Greif F., Könighofer R., Pill I., Riener H., Röck F.
Formal Methods in System Design, Vol. 55(2), 2019
Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC
Dinur I., Promitzer A., Kales D., Ramacher S., Rechberger C.
Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
Feistel Structures for MPC, and More
Albrecht M., Grassi L., Perrin L., Ramacher S., Rechberger C., Rotaru D., Roy A., Schofnegger M.
Computer Security – ESORICS 2019
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC
Albrecht M., Cid C., Grassi L., Khovratovich D., Lüftenegger R., Rechberger C., Schofnegger M.
Advances in Cryptology - ASIACRYPT 2019
L*-Based Learning of Markov Decision Processes
Tappler M., Aichernig B., Bacci G., Eichlseder M., Larsen K.
Formal Methods - The Next 30 Years
Analyzing the Linear Keystream Biases in AEGIS
Eichlseder M., Nageler M., Primas R.
IACR Transactions on Symmetric Cryptology, Vol. 2019(4), 2019
Kernel Isolation
Gruß D., Hansen D., Gregg B.
;login: , Vol. 43(4), 2018
Software-based microarchitectural attacks
Gruß D.
Information Technology, 2018
Generic Low-Latency Masking in Hardware
Groß H., Iusupov R., Bloem R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2018(2), 2018
Meltdown: Reading Kernel Memory from User Space
Lipp M., Schwarz M., Gruß D., Prescher T., Haas W., Fogh A., Horn J., Mangard S., Kocher P., Genkin D., Yarom Y., Hamburg M.
27th USENIX Security Symposium
Erfahrungen aus eIDAS Zertifizierung
Leitold H., Konrad D.
Datenschutz und Datensicherheit, Vol. 42(7), 2018
TIGHTest - Towards automating global Academic Mobility
More S.
Master's Thesis, 2018
Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features
Schwarz M., Gruß D., Lipp M., Maurice C., Schuster T., Fogh A., Mangard S.
AsiaCCS' 18, Proceedings of the 2018 on Asia Conference on Computer and Communications Security
Use-after-FreeMail
Gruß D., Schwarz M., Wübbeling M., Guggi S., Malderle T., More S., Lipp M.
ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security
Best of two worlds: Secure cloud federations meet eIDAS
Zefferer T., Ziegler D., Reiter A.
2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)
A unified masking approach
Groß H., Mangard S.
Journal of Cryptographic Engineering, 2018
Securing Conditional Branches in the Presence of Fault Attacks
Schilling R., Werner M., Mangard S.
Design, Automation & Test in Europe Conference - DATE 2018
