We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Lifecycle Management of IoT Devices Via Digital Identities Management and Distributed Ledgers Solutions
Loupos K., Vavilis S., Niavis H., Michalopoulos F., Dafloukas K., Skarmeta A., García J., Palomares A., Song H., Dautov R., Mancilla R., Costantino F., Van Landuyt D., Michiels S., More S., Xenakis C., Krilakis K.
Embedded World Conference 2024, Embedded World 2024
Towards Private Deep Learning-Based Side-Channel Analysis using Homomorphic Encryption
Schmid F., Rechberger C., Mukherjee S., Stöttinger M., Picek S., De Santis F.
Constructive Side-Channel Analysis and Secure Design , 15th International Workshop on Constructive Side-Channel Analysis and Secure Design
'Put the Car on the Stand': SMT-based Oracles for Investigating Decisions
Judson S., Elacqua M., Cano F., Antonopoulos T., Könighofer B., Shapiro S., Piskac R.
CSLAW 2024 - Proceedings of the 3rd Symposium on Computer Science and Law, 2024 Computer Science and Law Symposium, 73-85
Remote Scheduler Contention Attacks
Gast S., Juffinger J., Maar L., Royer C., Kogler A., Gruß D.
Financial Cryptography and Data Security - 28th International Conference, FC 2024, Revised Selected Papers, Financial Cryptography and Data Security 2024, 365-383, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics))
IdleLeak: Exploiting Idle State Side Effects for Information Leakage
Rauscher F., Kogler A., Juffinger J., Gruß D.
Network and Distributed System Security Symposium (NDSS) 2024, Network and Distributed System Security Symposium 2024
Learning and Repair of Deep Reinforcement Learning Policies from Fuzz-Testing Data
Tappler M., Pferscher A., Aichernig B., Könighofer B.
ICSE 2024 - Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 46th International Conference on Software Engineering, 27-39
Exploiting GPU caches from the browser with WebGPU
Czerny R.
, Master's Thesis
Welcome Remarks from AISoLA 2023/Track C2 Chairs
Jansen N., Könighofer B., Křetínský J., Larsen K.
Bridging the Gap Between AI and Reality - 1st International Conference, AISoLA 2023, Proceedings, 1st International Conference on Bridging the Gap between AI and Reality, 25-32, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14380 LNCS)
Memory Tagging using Cryptographic Integrity on Commodity x86 CPUs
Schrammel D., Unterguggenberger M., Lamster L., Sultana S., Grewal K., LeMay M., Durham D., Mangard S.
Proceedings - 9th IEEE European Symposium on Security and Privacy, Euro S and P 2024, 9th IEEE European Symposium on Security and Privacy, 311-326
Voodoo: Memory Tagging, Authenticated Encryption, and Error Correction through MAGIC
Lamster L., Unterguggenberger M., Schrammel D., Mangard S.
Proceedings of the 33rd USENIX Conference on Security Symposium, 33rd USENIX Security Symposium: USENIX Security 2024, 7159 - 7176
Continuous Engineering for Trustworthy Learning-Enabled Autonomous Systems
Bensalem S., Katsaros P., Nickovic D., Liao B., Nolasco R., Ahmed M., Beyene T., Cano F., Delacourt A., Esen H., Forrai A., He W., Huang X., Kekatos N., Könighofer B., Paulitsch M., Peled D., Ponchant M., Sorokin L., Tong S., Wu C.
Bridging the Gap Between AI and Reality - 1st International Conference, AISoLA 2023, Proceedings, 1st International Conference on Bridging the Gap between AI and Reality, 256-278, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14380 LNCS)
soid: A Tool for Legal Accountability for Automated Decision Making
Judson S., Elacqua M., Cano F., Antonopoulos T., Könighofer B., Shapiro S., Piskac R.
Computer Aided Verification - 36th International Conference, CAV 2024, Proceedings, 36th International Conference on Computer Aided Verification, 233–246, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14682 LNCS)
Test Where Decisions Matter: Importance-driven Testing for Deep Reinforcement Learning
Pranger S., Chockler H., Tappler M., Könighofer B.
Conference on Neural Information Processing Systems (NeurIPS), 38th Annual Conference on Neural Information Processing Systems, NeurIPS 2024
Efficient Motion Prediction: A Lightweight & Accurate Trajectory Prediction Model With Fast Training and Inference Speed
Prutsch A., Bischof H., Possegger H.
IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), 2024 IEEE/RSJ International Conference on Intelligent Robots and Systems, IROS 2024
Politics in Games - An Overview and Classification
Gutwenger L., Keller S., Dolezal M., Schnogl B., Rous S., Poier K., Pirker J.
2024 IEEE Gaming, Entertainment, and Media Conference, GEM 2024, 2024 IEEE Gaming, Entertainment, and Media Conference
Fostering AI Literacy: An Investigation of Learning Resources for Secondary School Students
Keller S., Steinbauer-Wagner G.
Towards Private Deep Learning-Based Side-Channel Analysis Using Homomorphic Encryption
Schmid F., Mukherjee S., Picek S., Stöttinger M., De Santis F., Rechberger C.
Constructive Side-Channel Analysis and Secure Design - 15th International Workshop, COSADE 2024, Proceedings, 15th International Workshop on Constructive Side-Channel Analysis and Secure Design, 133-154, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14595 LNCS)
Hiding Your Awful Online Choices Made More Efficient and Secure
Mukherjee S., Walch R., Meisingseth F., Lex E., Rechberger C.
ICT Systems Security and Privacy Protection - 39th IFIP International Conference, SEC 2024, Proceedings, 39th IFIP International Conference on ICT Systems Security and Privacy Protection, 353-366, (IFIP Advances in Information and Communication Technology; vol. 710)
Authenticated Encryption Schemes
Eichlseder M.
Symmetric Cryptography, Volume 1: Design and Security Proofs, ISTE; Wiley, 87-97
Ascon MAC, PRF, and Short-Input PRF
Dobraunig C., Eichlseder M., Mendel F., Schläffer M.
Topics in Cryptology – CT-RSA 2024 - Cryptographers’ Track at the RSA Conference 2024, Proceedings, Springer, 381-403, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14643 LNCS)