We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Learning and Repair of Deep Reinforcement Learning Policies from Fuzz-Testing Data
Tappler M., Pferscher A., Aichernig B., Könighofer B.
ICSE 2024 - Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 46th International Conference on Software Engineering, 27-39
Welcome Remarks from AISoLA 2023/Track C2 Chairs
Jansen N., Könighofer B., Křetínský J., Larsen K.
Bridging the Gap Between AI and Reality - 1st International Conference, AISoLA 2023, Proceedings, 1st International Conference on Bridging the Gap between AI and Reality, 25-32, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14380 LNCS)
Memory Tagging using Cryptographic Integrity on Commodity x86 CPUs
Schrammel D., Unterguggenberger M., Lamster L., Sultana S., Grewal K., LeMay M., Durham D., Mangard S.
Proceedings - 9th IEEE European Symposium on Security and Privacy, Euro S and P 2024, 9th IEEE European Symposium on Security and Privacy, 311-326
Voodoo: Memory Tagging, Authenticated Encryption, and Error Correction through MAGIC
Lamster L., Unterguggenberger M., Schrammel D., Mangard S.
Proceedings of the 33rd USENIX Conference on Security Symposium, 33rd USENIX Security Symposium: USENIX Security 2024, 7159 - 7176
Continuous Engineering for Trustworthy Learning-Enabled Autonomous Systems
Bensalem S., Katsaros P., Nickovic D., Liao B., Nolasco R., Ahmed M., Beyene T., Cano Cordoba F., Delacourt A., Esen H., Forrai A., He W., Huang X., Kekatos N., Könighofer B., Paulitsch M., Peled D., Ponchant M., Sorokin L., Tong S., Wu C.
Bridging the Gap Between AI and Reality - 1st International Conference, AISoLA 2023, Proceedings, 1st International Conference on Bridging the Gap between AI and Reality, 256-278, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14380 LNCS)
soid: A Tool for Legal Accountability for Automated Decision Making
Judson S., Elacqua M., Cano Cordoba F., Antonopoulos T., Könighofer B., Shapiro S., Piskac R.
Computer Aided Verification - 36th International Conference, CAV 2024, Proceedings, 36th International Conference on Computer Aided Verification, 233–246, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14682 LNCS)
Test Where Decisions Matter: Importance-driven Testing for Deep Reinforcement Learning
Pranger S., Chockler H., Tappler M., Könighofer B.
Conference on Neural Information Processing Systems (NeurIPS), 38th Annual Conference on Neural Information Processing Systems, NeurIPS 2024
Efficient Motion Prediction: A Lightweight & Accurate Trajectory Prediction Model With Fast Training and Inference Speed
Prutsch A., Bischof H., Possegger H.
IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), 2024 IEEE/RSJ International Conference on Intelligent Robots and Systems, IROS 2024
Politics in Games - An Overview and Classification
Gutwenger L., Keller S., Dolezal M., Schnogl B., Rous S., Poier K., Pirker J.
2024 IEEE Gaming, Entertainment, and Media Conference, GEM 2024, 2024 IEEE Gaming, Entertainment, and Media Conference
Fostering AI Literacy: An Investigation of Learning Resources for Secondary School Students
Keller S., Steinbauer-Wagner G.
Towards Private Deep Learning-Based Side-Channel Analysis Using Homomorphic Encryption
Schmid F., Mukherjee S., Picek S., Stöttinger M., De Santis F., Rechberger C.
Constructive Side-Channel Analysis and Secure Design - 15th International Workshop, COSADE 2024, Proceedings, 15th International Workshop on Constructive Side-Channel Analysis and Secure Design, 133-154, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14595 LNCS)
Hiding Your Awful Online Choices Made More Efficient and Secure
Mukherjee S., Walch R., Meisingseth F., Lex E., Rechberger C.
ICT Systems Security and Privacy Protection - 39th IFIP International Conference, SEC 2024, Proceedings, 39th IFIP International Conference on ICT Systems Security and Privacy Protection, 353-366, (IFIP Advances in Information and Communication Technology; vol. 710)
Authenticated Encryption Schemes
Eichlseder M.
Symmetric Cryptography, Volume 1: Design and Security Proofs, ISTE; Wiley, 87-97
Ascon MAC, PRF, and Short-Input PRF
Dobraunig C., Eichlseder M., Mendel F., Schläffer M.
Topics in Cryptology – CT-RSA 2024 - Cryptographers’ Track at the RSA Conference 2024, Proceedings, Springer, 381-403, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14643 LNCS)
Presshammer: Rowhammer and Rowpress without Physical Address Information
Juffinger J., Neela S., Heckel M., Schwarz L., Adamsky F., Gruß D.
Detection of Intrusions and Malware, and Vulnerability Assessment - 21st International Conference, DIMVA 2024, Proceedings, 21st Conference on Detection of Intrusions and Malware & Vulnerability Assessment, 460–479, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14828 LNCS)
Aloha-HE: A Low-Area Hardware Accelerator for Client-Side Operations in Homomorphic Encryption
Krieger F., Hirner F., Mert A., Sinha Roy S.
2024 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2024 Design, Automation and Test in Europe Conference
OpenNTT - An Automated Toolchain for Compiling High-Performance NTT Accelerators in FHE
Krieger F., Hirner F., Mert A., Sinha Roy S.
2024 ACM/IEEE International Conference on Computer-Aided Design, ACM/IEEE
ModHE: Modular Homomorphic Encryption Using Module Lattices
Mukherjee A., Aikata A., Mert A., Lee Y., Kwon S., Deriyabin M., Sinha Roy S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(1), 527-562
REPQC: Reverse Engineering and Backdooring Hardware Accelerators for Post-quantum Cryptography
Pagliarini S., Aikata A., Imran M., Sinha Roy S.
AsiaCCS
Exploring the Advantages and Challenges of Fermat NTT in FHE Acceleration
Kim A., Mert A., Mukherjee A., Aikata A., Deryabin M., Kwon S., Kang H., Sinha Roy S.
Advances in Cryptology – CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings, 44th Annual International Cryptology Conference, 76–106, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14922 LNCS)