We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Dependability for the Internet of Things
Boano C., Römer K., Bloem R., Witrisal K., Baunach M., Horn M.
Elektrotechnik und Informationstechnik, Vol. 133(7), 304–309
Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order
Groß H., Mangard S., Korak T.
ACM Workshop on Theory of Implementation Security, 3
Prefetch Side-Channel Attacks
Gruß D., Maurice C., Fogh A., Lipp M., Mangard S.
CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 23rd ACM Conference on Computer and Communications Security, 368-379
Drammer
Van Der Veen V., Fratantonio Y., Lindorfer M., Gruß D., Maurice C., Vigna G., Bos H., Razavi K., Giuffrida C.
CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 23rd ACM Conference on Computer and Communications Security, 1675-1689
Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android
Spreitzer R., Griesmayr S., Korak T., Mangard S.
9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2016), Darmstadt, Germany, ACM Conference on Security and Privacy in Wireless and Mobile Networks
Synthesis of Self-Stabilizing and Byzantine-Resilient Distributed Systems
Braud-Santoni N., Bloem R., Jacobs S.
Computer Aided Verification - 28th International Conference, CAV 2016, Proceedings, 28th International Conference on Computer Aided Verification, CAV 2016, 157-176, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9779)
Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript
Gruß D., Maurice C., Mangard S.
Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), Springer, (DIMVA)
The first reactive synthesis competition (SYNTCOMP 2014)
Jacobs S., Bloem R., Brenguier R., Ehlers R., Hell T., Könighofer R., Pérez G., Raskin J., Ryzhyk L., Sankur O., Seidl M., Tentrup L., Walker A.
International Journal on Software Tools for Technology Transfer, 1-24
Flexible and Secure Resource Sharing for Mobile Augmentation Systems
Reiter A., Zefferer T.
2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, IEEE Mobile Cloud
CrySIL: Bringing Crypto to the Modern User
Reimair F., Teufl P., Zefferer T.
Web Information Systems and Technologies, Springer International Publishing, 70-90, (Lecture Notes in Business Information Processing; vol. 246)
Protecting the Control Flow of Embedded Processors against Fault Attacks
Werner M., Wenger E., Mangard S.
Smart Card Research and Advanced Applications, International Conference on Smart Card Research and Advanced Applications
The second reactive synthesis competition (SYNTCOMP 2015)
Jacobs S., Bloem R., Brenguier R., Pérez G., Raskin J., Ryzhyk L., Sankur O., Seidl M., Tentrup L., Walker A., Könighofer R.
Electronic Proceedings in Theoretical Computer Science, Vol. 202, 27-57
Enhancing Side-Channel Analysis of Binary-Field Multiplication with Bit Reliability
Peßl P., Mangard S.
Topics in Cryptology - CT-RSA 2016, Cryptographers´ Track at the RSA Conference
Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption
Unterluggauer T., Mangard S.
Constructive Side-Channel Analysis and Secure Design - COSADE 2016, International Workshop on Constructive Side-Channel Analysis and Secure Design, 3-18, (LNCS; vol. 9689)
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks
Peßl P., Gruß D., Maurice C., Schwarz M., Mangard S.
Proceedings of the 25th USENIX Security Symposium, 565-581
Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order
Groß H., Mangard S., Korak T.
TIS@CCS, ACM SIGWEB , 3
Flush+Flush
Gruß D., Maurice C., Wagner K., Mangard S.
Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, Proceedings, 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, 279-299, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9721)
ARMageddon: Last-Level Cache Attacks on Mobile Devices
Lipp M., Gruß D., Spreitzer R., Maurice C., Mangard S.
25th USENIX Security Symposium (USENIX Security 16), USENIX Association, 549-564
Learning Models of a Network Protocol using Neural Network Language Models
Aichernig B., Bloem R., Pernkopf F., Röck F., Schrank T., Tappler M.
IEEE Symposium on Security and Privacy, SP 2016, San Jose, CA, USA, May 22-26, 2016