We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Cryptographically Enforced Memory Safety
Unterguggenberger M., Schrammel D., Lamster L., Nasahl P., Mangard S.
CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 30th ACM Conference on Computer and Communications Security, 889-903, (CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security)
Improved Search for Integral, Impossible-Differential and Zero-Correlation Attacks
Hadipour H., Gerhalter S., Sadeghi S., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2024(1)
High-speed SABER Key Encapsulation Mechanism in 65nm CMOS
Imran M., Almeida F., Basso A., Sinha Roy S., Pagliarini S.
Journal of Cryptographic Engineering, Vol. 13(4), 461-471
Collaborative Recommendation of Search Heuristics For Constraint Solvers
Garber D., Burgstaller T., Felfernig A., Le V., Lubos S., Tran T., Polat Erdeniz S.
, 38-44
CacheWarp: Software-based Fault Injection using Selective State Reset
Zhang R., Gerlach L., Weber D., Hetterich L., Lü Y., Kogler A., Schwarz M.
Proceedings of the 33nd USENIX Security Symposium, 33rd USENIX Security Symposium: USENIX Security 2024
FMTESTING: A FEATUREIDE Plug-in for Automated Feature Model Analysis and Diagnosis
Burgstaller T., Le V., Tran T., Felfernig A.
ECAI 2023 - 26th European Conference on Artificial Intelligence, including 12th Conference on Prestigious Applications of Intelligent Systems, PAIS 2023 - Proceedings, 26th European Conference on Artificial Intelligence , 3190 - 3195, (Frontiers in Artificial Intelligence and Applications; vol. 372)
The QARMAv2 Family of Tweakable Block Ciphers
Avanzi R., Banik S., Dunkelman O., Eichlseder M., Ghosh S., Nageler M., Regazzoni F.
IACR Transactions on Symmetric Cryptology, Vol. 2023(3), 25-73
Finding the Impossible: Automated Search for Full Impossible-Differential, Zero-Correlation, and Integral Attacks
Hadipour H., Sadeghi S., Eichlseder M.
Advances in Cryptology – EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2023, Proceedings, 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 128-157, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2023)
Trust Scheme Interoperability: Connecting Heterogeneous Trust Schemes
More S.
ARES 2023 - 18th International Conference on Availability, Reliability and Security, Proceedings, The 18th International Conference on Availability, Reliability and Security, 1173-1181, (ACM International Conference Proceeding Series)
An inclusive Lifecycle Approach for IoT Devices Trust and Identity Management
Loupos K., Niavis H., Michalopoulos F., Misiakoulis G., Skarmeta A., García J., Palomares A., Song H., Dautov R., Giampaolo F., Mancilla R., Costantino F., Van Landuyt D., Michiels S., More S., Xenakis C., Bampatsikos M., Politis I., Krilakis K., Syvridis D.
ARES 2023 - 18th International Conference on Availability, Reliability and Security, Proceedings, The 18th International Conference on Availability, Reliability and Security, (ACM International Conference Proceeding Series)
A2P2 - An Android Application Patching Pipeline Based On Generic Changesets
Draschbacher F.
ARES 2023 - 18th International Conference on Availability, Reliability and Security, Proceedings, 18th International Conference on Availability, Reliability and Security, 55-65, (ACM International Conference Proceeding Series)
Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels
Kogler A., Juffinger J., Giner L., Gerlach L., Schwarzl M., Schwarz M., Gruß D., Mangard S.
32nd USENIX Security Symposium, USENIX Security 2023, 32nd USENIX Security Symposium, 7285-7302
PT-Guard: Integrity-Protected Page Tables to Defend Against Breakthrough Rowhammer Attacks
Saxena A., Saileshwar G., Juffinger J., Kogler A., Gruß D., Qureshi M.
Proceedings - 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2023, 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 95-108
Analyzing Intentional Behavior in Autonomous Agents Under Uncertainty
Cano Cordoba F., Judson S., Antonopoulos T., Bjørner K., Shoemaker N., Shapiro S., Piskac R., Könighofer B.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 32nd International Joint Conference on Artificial Intelligence, 372--381
Multi-Tag: A Hardware-Software Co-Design for Memory Safety based on Multi-Granular Memory Tagging
Unterguggenberger M., Schrammel D., Nasahl P., Schilling R., Lamster L., Mangard S.
ASIA CCS 2023 - Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023 ACM ASIA Conference on Computer and Communications Security, 177-189, (Proceedings of the ACM Conference on Computer and Communications Security)
SPEAR-V: Secure and Practical Enclave Architecture for RISC-V
Schrammel D., Waser M., Lamster L., Unterguggenberger M., Mangard S.
ASIA CCS 2023 - Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023 ACM ASIA Conference on Computer and Communications Security, 457-468, (Proceedings of the ACM Conference on Computer and Communications Security)
Secure Context Switching of Masked Software Implementations
Gigerl B., Primas R., Mangard S.
ASIA CCS 2023 - Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 18th ACM ASIA Conference on Computer and Communications Security, 980-992, (Proceedings of the ACM Conference on Computer and Communications Security)
CryptoShield - Automatic On-Device Mitigation for Crypto API Misuse in Android Applications
Draschbacher F., Feichtner J.
ASIA CCS 2023 - Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 18th ACM ASIA Conference on Computer and Communications Security, 899-912, (Proceedings of the ACM Conference on Computer and Communications Security)
Smoothing the Ride: Providing a Seamless Upgrade Path from Established Cross-Border eID Workflows Towards eID Wallet Systems
Czerny R., Kollmann C., Podgorelec B., Prünster B., Zefferer T.
SECRYPT 2023 - Proceedings of the 20th International Conference on Security and Cryptography, 20th International Conference on Security and Cryptography: SECRYPT 2023, 460-468, (Proceedings of the International Conference on Security and Cryptography; vol. 1)
Scatter and Split Securely: Defeating Cache Contention and Occupancy Attacks
Giner L., Steinegger S., Purnal A., Eichlseder M., Unterluggauer T., Mangard S., Gruß D.
IEEE S&P, 44th IEEE Symposium on Security and Privacy, 2273-2287