We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
KASLR is Dead
Gruß D., Lipp M., Schwarz M., Fellner R., Maurice C., Mangard S.
Engineering Secure Software and Systems - 9th International Symposium, ESSoS 2017, Proceedings
Practical Keystroke Timing Attacks in Sandboxed JavaScript
Lipp M., Gruß D., Schwarz M., Bidner D., Maurice C., Mangard S.
Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings
Malware guard extension
Schwarz M., Weiser S., Gruß D., Maurice C., Mangard S.
Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, 2017
An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order
Groß H., Mangard S., Korak T.
Topics in Cryptology – CT-RSA 2017
Fantastic timers and where to find them
Schwarz M., Maurice C., Gruß D., Mangard S.
Financial Cryptography and Data Security - 21st International Conference, FC 2017, Revised Selected Papers
Bounded Synthesis for Streett, Rabin, and CTL*
Khalimov A., Bloem R.
CAV
A Sustainable Architecture for Secure and Usable Mobile Signature Solutions
Zefferer T.
WEBIST 2015 - Selected and Revised Papers, Springer, 343, 2017
Privacy Technologies and Policy
Schweighofer E., Leitold H., Mitrakas A., Rannenberg K.
Springer Verlag, 2017
Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives
Chase M., Derler D., Goldfeder S., Orlandi C., Ramacher S., Rechberger C., Slamanig D., Zaverucha G.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, USA, October 30 - November 3, 2017
Cryptanalysis of Simpira v1
Eichlseder M., Dobraunig C., Mendel F.
Selected Areas in Cryptography - SAC 2016
Side-Channel Analysis of Keymill
Dobraunig C., Eichlseder M., Korak T., Mendel F.
Constructive Side-Channel Analysis and Secure Design
Model-Based Testing IoT Communication via Active Automata Learning
Tappler M., Aichernig B., Bloem R.
2017 IEEE International Conference on Software Testing, Verification and Validation (ICST)
Hybrid Mobile Edge Computing: Unleashing the Full Potential of Edge Computing in Mobile Device Use Cases
Reiter A., Prünster B., Zefferer T.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing
SUNFISH ID1v1 – Identity Management and Access Control
Reiter A., Suzic B., Leitold H., Marsalek A., Prünster B., Ziegler D.
2017
A new structural-differential property of 5-round AES
Grassi L., Rechberger C., Rønjom S.
Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
Dependability for the Internet of Things
Boano C., Römer K., Bloem R., Witrisal K., Baunach M., Horn M.
Elektrotechnik und Informationstechnik, Vol. 133(7), 2016
Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order
Groß H., Mangard S., Korak T.
ACM Workshop on Theory of Implementation Security, TIS 2016, 3
Prefetch Side-Channel Attacks
Gruß D., Maurice C., Fogh A., Lipp M., Mangard S.
CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
Drammer
Van Der Veen V., Fratantonio Y., Lindorfer M., Gruß D., Maurice C., Vigna G., Bos H., Razavi K., Giuffrida C.
CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android
Spreitzer R., Griesmayr S., Korak T., Mangard S.
9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2016), Darmstadt, Germany
