We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Qualified Remote Signatures – Solutions, its Certification, and Use
Leitold H., Konrad D.
Proceedings of 29th SmartCard Workshop
Policy-based access control for the IoT and Smart Cities
Omolola O., More S., Fasllija E., Wagner G., Alber L.
Open Identity Summit 2019, Proceedings
DNS-based trust scheme publication and discovery
Wagner G., Wagner S., More S., Hoffmann M.
Open Identity Summit 2019, Proceedings
Programming Behavioral Test Models for SMT Solving in Scala
Aichernig B., Maderbacher B., Tiran S.
2019 IEEE International Conference on Software Testing, Verification and Validation Workshops, {ICST} Workshops 2019, Xi'an, China, April 22-23, 2019
Software-basierte Mikroarchitekturangriffe
Gruß D.
Ausgezeichnete Informatikdissertationen 2017, Gesellschaft für Informatik e.V., 81-90, 2019
Learning a Behavior Model of Hybrid Systems Through Combining Model-Based Testing and Machine Learning
Aichernig B., Bloem R., Ebrahimi M., Horn M., Pernkopf F., Roth W., Rupp A., Tappler M., Tranninger M.
Testing Software and Systems
Synthesizing adaptive test strategies from temporal logic specifications
Bloem R., Fey G., Greif F., Könighofer R., Pill I., Riener H., Röck F.
Formal Methods in System Design, Vol. 55(2), 2019
Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC
Dinur I., Promitzer A., Kales D., Ramacher S., Rechberger C.
Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
Feistel Structures for MPC, and More
Albrecht M., Grassi L., Perrin L., Ramacher S., Rechberger C., Rotaru D., Roy A., Schofnegger M.
Computer Security – ESORICS 2019
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC
Albrecht M., Cid C., Grassi L., Khovratovich D., Lüftenegger R., Rechberger C., Schofnegger M.
Advances in Cryptology - ASIACRYPT 2019
L*-Based Learning of Markov Decision Processes
Tappler M., Aichernig B., Bacci G., Eichlseder M., Larsen K.
Formal Methods - The Next 30 Years
Analyzing the Linear Keystream Biases in AEGIS
Eichlseder M., Nageler M., Primas R.
IACR Transactions on Symmetric Cryptology, Vol. 2019(4), 2019
Kernel Isolation
Gruß D., Hansen D., Gregg B.
;login: , Vol. 43(4), 2018
Software-based microarchitectural attacks
Gruß D.
Information Technology, 2018
Generic Low-Latency Masking in Hardware
Groß H., Iusupov R., Bloem R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2018(2), 2018
Meltdown: Reading Kernel Memory from User Space
Lipp M., Schwarz M., Gruß D., Prescher T., Haas W., Fogh A., Horn J., Mangard S., Kocher P., Genkin D., Yarom Y., Hamburg M.
27th USENIX Security Symposium
Erfahrungen aus eIDAS Zertifizierung
Leitold H., Konrad D.
Datenschutz und Datensicherheit, Vol. 42(7), 2018
TIGHTest - Towards automating global Academic Mobility
More S.
Master's Thesis, 2018
Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features
Schwarz M., Gruß D., Lipp M., Maurice C., Schuster T., Fogh A., Mangard S.
AsiaCCS' 18, Proceedings of the 2018 on Asia Conference on Computer and Communications Security
Use-after-FreeMail
Gruß D., Schwarz M., Wübbeling M., Guggi S., Malderle T., More S., Lipp M.
ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security
