We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
A Systematic Evaluation of Transient Execution Attacks and Defenses
Canella C., Bulck J., Schwarz M., Lipp M., Berg B., Ortner P., Piessens F., Evtyushkin D., Gruß D.
Proceedings of the 28th USENIX Security Symposium
ScatterCache: Thwarting Cache Attacks via Cache Set Randomization
Werner M., Unterluggauer T., Giner L., Schwarz M., Gruß D., Mangard S.
28th USENIX Security Symposium (USENIX Security 19)
A Correctable Public Blockchain
Marsalek A., Zefferer T.
2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019
Tackling data inefficiency: Compressing the bitcoin blockchain
Marsalek A., Zefferer T., Fasllija E., Ziegler D.
2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering
TPL: A Trust Policy Language
Mödersheim S., Schlichtkrull A., Wagner G., More S., Alber L.
Trust Management XIII
Run-Time Optimization for Learned Controllers Through Quantitative Games
Avni G., Bloem R., Chatterjee K., Henzinger T., Könighofer B., Pranger S.
Computer Aided Verification (CAV)
Synthesis of Minimum-Cost Shields for Multi-agent Systems
Bharadwaj S., Bloem R., Dimitrova R., Könighofer B., Topcu U.
2019 American Control Conference (ACC)
Prying CoW: Inferring Secrets Across Virtual Machine Boundaries
Palfinger G., Prünster B., Ziegler D.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications
Fides – Unleashing the Full Potential of Remote Attestation
Prünster B., Palfinger G., Kollmann C.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications
Master of Puppets: Trusting Silicon in the Fight for Practical Security in Fully Decentralised Peer-to-Peer Networks
Prünster B., Fasllija E., Mocher D.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications
Fine-Grained Access Control in Industrial Internet of Things
Ziegler D., Sabongui J., Palfinger G.
Proceedings of the 34th International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2019
Practical Enclave Malware with Intel SGX
Schwarz M., Weiser S., Gruß D.
Detection of Intrusions and Malware, and Vulnerability Assessment
Mobile-Only Solution for Server-Based Qualified Electronic Signatures
Theuermann K., Tauber A., Lenz T.
ICC 2019 - 2019 IEEE International Conference on Communications (ICC)
ConTExT: Leakage-Free Transient Execution
Schwarz M., Schilling R., Kargl F., Lipp M., Canella C., Gruß D.
2019
Spectre Attacks: Exploiting Speculative Execution
Kocher P., Horn J., Fogh A., Genkin D., Gruß D., Haas W., Hamburg M., Lipp M., Mangard S., Prescher T., Schwarz M., Yarom Y.
40th IEEE Symposium on Security and Privacy
Unleashing the Full Potential of Blockchain Technology for Security-Sensitive Business Applications
Marsalek A., Kollmann C., Zefferer T., Teufl P.
ICBC 2019 - IEEE International Conference on Blockchain and Cryptocurrency
Flexible und benutzerfreundliche Authentifizierungsverfahren zur Umsetzung transaktionaler E-Government-Services auf mobilen Geräten
Theuermann K., Zefferer T., Lenz T., Tauber A.
Handbuch E-Government, Springer Fachmedien Wiesbaden, 1-30, 2019
Privacy-preserving attribute aggregation in eID federations
Priesnitz Filho W., Ribeiro C., Zefferer T.
Future Generation Computer Systems, Vol. 92(Volume 92), 2019
Dependable Internet of Things
Römer K., Witrisal K., Baunach M., Bloem R., Horn M.
Proceedings of the International Conference on Sensor Networks (SENSORNETS) 2019
