We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Whipping the Multivariate-based MAYO Signature Scheme using Hardware Platforms
Hirner F., Streibl M., Krieger F., Mert A., Sinha Roy S.
CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security, ACM Conference on Computer and Communications Security, CCS 2024, 3421-3435
Manifest Problems: Analyzing Code Transparency for Android Application Bundles
Draschbacher F., Maar L.
Annual Computer Security Applications Conference, Annual Computer Security Applications Conference
An extensive comparison of preprocessing methods in the context of configuration space learning
Garber D., Felfernig A., Le V., Burgstaller T., El Mansi M.
Proceedings of the 26th International Workshop on Configuration (ConfWS 2024) co-located with the 30th International Conference on Principles and Practice of Constraint Programming (CP 2024), 26th International Workshop on Configuration, 81-90, (CEUR Workshop Proceedings)
Synthesis from Infinite-State Generalized Reactivity(1) Specifications
Maderbacher B., Windisch F., Bloem R.
Leveraging Applications of Formal Methods, Verification and Validation
On Threat Model Repair
Bloem R., Chlup S., Nickovic D., Schmittner C.
Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering Methodologies. ISoLA 2024, 12th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation, ISoLA 2024, 302–310, (Lecture Notes in Computer Science; vol. 15222 LNCS)
Active Model Learning of Git Version Control System
Muskardin E., Burgstaller T., Tappler M., Aichernig B.
Proceedings - 2024 IEEE International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2024, 2024 IEEE International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2024, 78-82, (Proceedings - 2024 IEEE International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2024)
Fostering Collective Creativity in Architectural Education
Grass A., Hirschberg U.
Data-Driven Intelligence, 42nd eCAADe Conference on Education and research in Computer Aided Architectural Design in Europe. Data-Driven Intelligence, 639-646
Monolith
Grassi L., Khovratovich D., Lüftenegger R., Rechberger C., Schofnegger M., Walch R.
IACR Transactions on Symmetric Cryptology, Vol. 2024(3), 44-83
Finding Complete Impossible Differential Attacks on AndRX Ciphers and Efficient Distinguishers for ARX Designs
Chakraborty D., Hadipour H., Nguyen P., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2024(3), 84-176
Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults
Tollec S., Hadzic V., Nasahl P., Asavoae M., Bloem R., Couroussé D., Heydemann K., Jan M., Mangard S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(4), 179-204
Closing the Gap: Leakage Contracts for Processors with Transitions and Glitches
Haring J., Hadzic V., Bloem R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(4), 110-132
Credential Issuance Transparency: A Privacy-preserving Audit Log of Credential Issuance
Fasllija E., Heher J., More S.
18th International Conference on Network and System Security Proceedings, 18th International Conference on Network and System Security, ( Lecture Notes in Computer Science)
An Adaptive, Provable Correct Simplex Architecture
Maderbacher B., Schupp S., Bartocci E., Bloem R., Nickovic D., Könighofer B.
International Journal on Software Tools for Technology Transfer
Exact Soft Analytical Side-Channel Attacks using Tractable Circuits
Wedenig T., Nagpal R., Cassiers G., Mangard S., Peharz R.
Proceedings of Machine Learning Research, Vol. 235, 52472-52483
Optimization Space Learning: A Lightweight, Noniterative Technique for Compiler Autotuning
Burgstaller T., Garber D., Le V., Felfernig A.
SPLC 2024 - 28th ACM International Systems and Software Product Line Conference, Proceedings, 28th ACM International Systems and Software Product Line Conference, 36 - 46, (ACM International Conference Proceeding Series)
Minimize the Randomness in Rasta-Like Designs: How Far Can We Go?
Schmid F., Rechberger C., Grassi L., Liu F., Walch R., Wang Q.
Selected Areas in Cryptography, Springer
Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT
Hadipour H., Derbez P., Eichlseder M.
Advances in Cryptology – CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings, 44th Annual International Cryptology Conference, 38–72, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14923 LNCS)
Defects-in-Depth: Analyzing the Integration of Effective Defenses against One-Day Exploits in Android Kernels
Maar L., Draschbacher F., Lamster L., Mangard S.
Usenix Security Symposium 2024, 33rd USENIX Security Symposium: USENIX Security 2024
Action-By-Detection
Prutsch A., Possegger H., Bischof H.
2024 IEEE International Conference on Robotics and Automation (ICRA), 2024 IEEE International Conference on Robotics and Automation, 10757-10763