We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Pointing in the Right Direction - Securing Memory Accesses in a Faulty World
Schilling R., Werner M., Nasahl P., Mangard S.
Annual Computer Security Applications Conference
Safe Reinforcement Learning via Shielding
Alshiekh M., Bloem R., Ehlers R., Könighofer B., Niekum S., Topcu U.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, (AAAI-18), the 30th innovative Applications of Artificial Intelligence (IAAI-18), and the 8th AAAI Symposium on Educational Advances in Artificial Intelligence (EAAI-18), New Orleans, Louisiana, USA, February 2-7, 2018
Leakage Bounds for Gaussian Side Channels
Unterluggauer T., Korak T., Mangard S., Schilling R., Benini L., Gürkaynak F., Muehlberghuber M.
16th Smart Card Research and Advanced Application Conference - CARDIS 2017
ProcHarvester: Fully Automated Analysis of Procfs Side-Channel Leaks on Android
Spreitzer R., Kirchengast F., Gruß D., Mangard S.
ASIACCS '18 - Proceedings of the 2018 on Asia Conference on Computer and Communications Security
Sponge-Based Control-Flow Protection for IoT Devices
Werner M., Unterluggauer T., Schaffenrath D., Mangard S.
2018 IEEE European Symposium on Security and Privacy
Bounded Synthesis of Register Transducers
Khalimov A., Maderbacher B., Bloem R.
Automated Technology for Verification and Analysis
A Counting Semantics for Monitoring LTL Specifications over Finite Traces
Bartocci E., Bloem R., Nickovic D., Röck F.
Computer Aided Verification
Graph Games and Reactive Synthesis
Bloem R., Chatterjee K., Jobstmann B.
Handbook of Model Checking, Springer, 921-962, 2018
Handbook of Model Checking
Clarke E., Henzinger T., Veith H., Bloem R.
Springer, 2018
Expansion-Based QBF Solving Without Recursion
Bloem R., Braud-Santoni N., Hadzic V., Egly U., Lonsing F., Seidl M.
fmcad.18
A Hierarchical Evaluation Scheme for Pilot-based Research Projects
Zefferer T.
Proceedings of the 14th International Conference on Web Information Systems and Technologies
Rasta: A Cipher with Low ANDdepth and Few ANDs per Bit
Dobraunig C., Eichlseder M., Grassi L., Lallemend V., Leander G., List E., Mendel F., Rechberger C.
Advances in Cryptology – CRYPTO 2018
Zero-Sum Partitions of PHOTON Permutations
Wang Q., Grassi L., Rechberger C.
Topics in Cryptology - CT-RSA 2018 - The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings
Cryptanalysis of MORUS
Ashur T., Eichlseder M., Lauridsen M., Leurent G., Minaud B., Rotella Y., Viguier B.
Advances in Cryptology – ASIACRYPT 2018
Clustering Related-Tweak Characteristics: Application to MANTIS-6
Eichlseder M., Kales D.
IACR Transactions on Symmetric Cryptology, Vol. 2018(2), 2018
Differential Cryptanalysis of Symmetric Primitives
Eichlseder M.
Doctoral Thesis, 2018
Automata Learning for Symbolic Execution
Aichernig B., Bloem R., Ebrahimi M., Tappler M., Winter J.
2018 Formal Methods in Computer Aided Design, FMCAD 2018, Austin, TX, USA, October 30 - November 2, 2018
A Security Analysis of FirstCoin
Marsalek A., Kollmann C., Zefferer T.
ICT Systems Security and Privacy Protection
SeDiCom
Marsalek A., Prünster B., Suzic B., Zefferer T.
Information Systems Security - 14th International Conference, ICISS 2018, Proceedings
Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices
Spreitzer R., Moonsamy V., Korak T., Mangard S.
IEEE Communications Surveys & Tutorials, Vol. 20(1), 2017
