We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption
Unterluggauer T., Mangard S.
Constructive Side-Channel Analysis and Secure Design - COSADE 2016
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks
Peßl P., Gruß D., Maurice C., Schwarz M., Mangard S.
Proceedings of the 25th USENIX Security Symposium
Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order
Groß H., Mangard S., Korak T.
TIS@CCS
Flush+Flush
Gruß D., Maurice C., Wagner K., Mangard S.
Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, Proceedings
ARMageddon: Last-Level Cache Attacks on Mobile Devices
Lipp M., Gruß D., Spreitzer R., Maurice C., Mangard S.
25th USENIX Security Symposium (USENIX Security 16)
Learning Models of a Network Protocol using Neural Network Language Models
Aichernig B., Bloem R., Pernkopf F., Röck F., Schrank T., Tappler M.
IEEE Symposium on Security and Privacy, SP 2016, San Jose, CA, USA, May 22-26, 2016
Towards Privacy-preserving Attribute Aggregation in Federated eID Systems
Priesnitz Filho W., Ribeiro C., Zefferer T.
CAiSE Forum 2016
An Ontology-based Interoperability Solution for Electronic-Identity Systems
Priesnitz Filho W., Ribeiro C., Zefferer T.
IEEE International Conference on Services Computing (SCC 2016)
FutureTrust - Future Trust Services for Trustworthy Global Transactions
Hühnlein D., Frosch T., Schwenk J., Piswanger C., Sel M., Hühnlein T., Wich T., Nemmert D., Lottes R., Baszanowski S., Zeuner V., Rauh M., Somorovsky J., Mladenov V., Condovici C., Leitold H., Stalla-Bourdillon S., Tsakalakis N., Eichholz J., Kamm F., Urmann J., Kühne A., Wabisch D., Dean R., Shamah J., Kapanadze M., Ponte N., Martins J., Portela R., Karabat ., Stojičić S., Nedeljkovic S., Bouckaert V., Defays A., Anderson B., Jonas M., Hermanns C., Schubert T., Wegener D., Sazonov A.
Open Identity Summit 2016
GDPR & ePrivacy
Leitold H., Schweighofer E., Mitrakas A., Rannenberg K.
Österreichische Computergesellschaft, 2016
Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE
Grassi L., Rechberger C.
Progress in Cryptology -- INDOCRYPT 2016: 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings, Springer International Publishing AG , 322-342, 2016
Subspace Trail Cryptanalysis and its Applications to AES
Grassi L., Rechberger C., Rønjom S.
FSE 2017 - 24th International Conference on Fast Software Encryption
Analysis of the Kupyna-256 Hash Function
Dobraunig C., Eichlseder M., Mendel F.
Fast Software Encryption
Square Attack on 7-Round Kiasu-BC
Dobraunig C., Eichlseder M., Mendel F.
ACNS 2016
Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes
Dobraunig C., Eichlseder M., Korak T., Lomné V., Mendel F.
Advances in Cryptology - ASIACRYPT 2016
Synthesizing Adaptive Test Strategies from Temporal Logic Specifications
Bloem R., Könighofer R., Pill I., Röck F.
2016
Designing Reliable Cyber-Physical Systems
Aleksandrowicz G., Arbel E., Bloem R., Braak T., Devadze S., Fey G., Jenihhin M., Jutman A., Kerkoff H., Könighofer R., Malburg J., Moran S., Raik J., Rauwerda G., Riener H., Röck F., Shibin K., Sunesen K., Wan J., Zhao Y.
2016 Forum on Specification and Design Languages (FDL)
Towards a Personal Security Device
Rath C., Niedermair T., Zefferer T.
Security and Trust Management
Haraka v2 - Efficient Short-Input Hashing for Post-Quantum Applications
Kölbl S., Lauridsen M., Mendel F., Rechberger C.
IACR Transactions on Symmetric Cryptology, Vol. 2016(2), 2016
