We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits
Schwarz M., Lackner F., Gruß D.
NDSS
TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V
Weiser S., Werner M., Brasser F., Malenko M., Mangard S., Sadeghi A.
Proceedings 2019 - Network and Distributed System Security Symposium (NDSS)
Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje
Dobraunig C., Mangard S., Mendel F., Primas R.
Selected Areas in Cryptography – SAC 2018
Small faults grow up - Verification of error masking robustness in arithmetically encoded programs
Karl A., Schilling R., Bloem R., Mangard S.
Verification, Model Checking, and Abstract Interpretation - 20th International Conference, VMCAI 2019, Proceedings
Protecting RISC-V Processors against Physical Attacks
Werner M., Schilling R., Unterluggauer T., Mangard S.
Design, Automation & Test in Europe Conference - DATE 2019
Efficient Information-Flow Verification Under Speculative Execution
Bloem R., Jacobs S., Vizel Y.
Efficient Information-Flow Verification Under Speculative Execution
Qualified Remote Signatures – Solutions, its Certification, and Use
Leitold H., Konrad D.
Proceedings of 29th SmartCard Workshop
Policy-based access control for the IoT and Smart Cities
Omolola O., More S., Fasllija E., Wagner G., Alber L.
Open Identity Summit 2019, Proceedings
DNS-based trust scheme publication and discovery
Wagner G., Wagner S., More S., Hoffmann M.
Open Identity Summit 2019, Proceedings
Software-basierte Mikroarchitekturangriffe
Gruß D.
Ausgezeichnete Informatikdissertationen 2017, Gesellschaft für Informatik e.V., 81-90, 2019
Learning a Behavior Model of Hybrid Systems Through Combining Model-Based Testing and Machine Learning
Aichernig B., Bloem R., Ebrahimi M., Horn M., Pernkopf F., Roth W., Rupp A., Tappler M., Tranninger M.
Testing Software and Systems
Synthesizing adaptive test strategies from temporal logic specifications
Bloem R., Fey G., Greif F., Könighofer R., Pill I., Riener H., Röck F.
Formal Methods in System Design, Vol. 55(2), 2019
Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC
Dinur I., Promitzer A., Kales D., Ramacher S., Rechberger C.
Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
Feistel Structures for MPC, and More
Albrecht M., Grassi L., Perrin L., Ramacher S., Rechberger C., Rotaru D., Roy A., Schofnegger M.
Computer Security – ESORICS 2019
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC
Albrecht M., Cid C., Grassi L., Khovratovich D., Lüftenegger R., Rechberger C., Schofnegger M.
Advances in Cryptology - ASIACRYPT 2019
L*-Based Learning of Markov Decision Processes
Tappler M., Aichernig B., Bacci G., Eichlseder M., Larsen K.
Formal Methods - The Next 30 Years
Analyzing the Linear Keystream Biases in AEGIS
Eichlseder M., Nageler M., Primas R.
IACR Transactions on Symmetric Cryptology, Vol. 2019(4), 2019
Kernel Isolation
Gruß D., Hansen D., Gregg B.
;login: , Vol. 43(4), 2018
Software-based microarchitectural attacks
Gruß D.
Information Technology, 2018
Generic Low-Latency Masking in Hardware
Groß H., Iusupov R., Bloem R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2018(2), 2018
