We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android
Spreitzer R., Griesmayr S., Korak T., Mangard S.
9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2016), Darmstadt, Germany
Synthesis of Self-Stabilizing and Byzantine-Resilient Distributed Systems
Braud-Santoni N., Bloem R., Jacobs S.
Computer Aided Verification - 28th International Conference, CAV 2016, Proceedings
Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript
Gruß D., Maurice C., Mangard S.
Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA)
The first reactive synthesis competition (SYNTCOMP 2014)
Jacobs S., Bloem R., Brenguier R., Ehlers R., Hell T., Könighofer R., Pérez G., Raskin J., Ryzhyk L., Sankur O., Seidl M., Tentrup L., Walker A.
International Journal on Software Tools for Technology Transfer, 2016
Flexible and Secure Resource Sharing for Mobile Augmentation Systems
Reiter A., Zefferer T.
2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering
CrySIL: Bringing Crypto to the Modern User
Reimair F., Teufl P., Zefferer T.
Web Information Systems and Technologies, Springer International Publishing, 70-90, 2016
Protecting the Control Flow of Embedded Processors against Fault Attacks
Werner M., Wenger E., Mangard S.
Smart Card Research and Advanced Applications
The second reactive synthesis competition (SYNTCOMP 2015)
Jacobs S., Bloem R., Brenguier R., Pérez G., Raskin J., Ryzhyk L., Sankur O., Seidl M., Tentrup L., Walker A., Könighofer R.
Electronic Proceedings in Theoretical Computer Science, Vol. 202, 2016
Enhancing Side-Channel Analysis of Binary-Field Multiplication with Bit Reliability
Peßl P., Mangard S.
Topics in Cryptology - CT-RSA 2016
Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption
Unterluggauer T., Mangard S.
Constructive Side-Channel Analysis and Secure Design - COSADE 2016
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks
Peßl P., Gruß D., Maurice C., Schwarz M., Mangard S.
Proceedings of the 25th USENIX Security Symposium
Flush+Flush
Gruß D., Maurice C., Wagner K., Mangard S.
Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, Proceedings
ARMageddon: Last-Level Cache Attacks on Mobile Devices
Lipp M., Gruß D., Spreitzer R., Maurice C., Mangard S.
25th USENIX Security Symposium (USENIX Security 16)
Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order
Groß H., Mangard S., Korak T.
TIS '16: Proceedings of the 2016 ACM Workshop on Theory of Implementation Security
Learning Models of a Network Protocol using Neural Network Language Models
Aichernig B., Bloem R., Pernkopf F., Röck F., Schrank T., Tappler M.
IEEE Symposium on Security and Privacy, SP 2016, San Jose, CA, USA, May 22-26, 2016
Towards Privacy-preserving Attribute Aggregation in Federated eID Systems
Priesnitz Filho W., Ribeiro C., Zefferer T.
CAiSE Forum 2016
An Ontology-based Interoperability Solution for Electronic-Identity Systems
Priesnitz Filho W., Ribeiro C., Zefferer T.
IEEE International Conference on Services Computing (SCC 2016)
FutureTrust - Future Trust Services for Trustworthy Global Transactions
Hühnlein D., Frosch T., Schwenk J., Piswanger C., Sel M., Hühnlein T., Wich T., Nemmert D., Lottes R., Baszanowski S., Zeuner V., Rauh M., Somorovsky J., Mladenov V., Condovici C., Leitold H., Stalla-Bourdillon S., Tsakalakis N., Eichholz J., Kamm F., Urmann J., Kühne A., Wabisch D., Dean R., Shamah J., Kapanadze M., Ponte N., Martins J., Portela R., Karabat ., Stojičić S., Nedeljkovic S., Bouckaert V., Defays A., Anderson B., Jonas M., Hermanns C., Schubert T., Wegener D., Sazonov A.
Open Identity Summit 2016
GDPR & ePrivacy
Leitold H., Schweighofer E., Mitrakas A., Rannenberg K.
Österreichische Computergesellschaft, 2016
