We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Security Aspects of Masking on FPGAs
Gigerl B., Pretterhofer K., Mangard S.
Proceedings of the 2024 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2024
Learning and Repair of Deep Reinforcement Learning Policies from Fuzz-Testing Data
Tappler M., Pferscher A., Aichernig B., Könighofer B.
ICSE 2024 - Proceedings of the 46th IEEE/ACM International Conference on Software Engineering
SUIT: Secure Undervolting with Instruction Traps
Juffinger J., Kalinin S., Gruß D., Mueller F.
ASPLOS 2024: Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 1
Lifecycle Management of IoT Devices Via Digital Identities Management and Distributed Ledgers Solutions
Loupos K., Vavilis S., Niavis H., Michalopoulos F., Dafloukas K., Skarmeta A., García J., Palomares A., Song H., Dautov R., Mancilla R., Costantino F., Van Landuyt D., Michiels S., More S., Xenakis C., Krilakis K.
Embedded World Conference 2024
Towards Private Deep Learning-Based Side-Channel Analysis using Homomorphic Encryption
Schmid F., Rechberger C., Mukherjee S., Stöttinger M., Picek S., De Santis F.
Constructive Side-Channel Analysis and Secure Design
'Put the Car on the Stand': SMT-based Oracles for Investigating Decisions
Judson S., Elacqua M., Cano F., Antonopoulos T., Könighofer B., Shapiro S., Piskac R.
CSLAW 2024 - Proceedings of the 3rd Symposium on Computer Science and Law
Remote Scheduler Contention Attacks
Gast S., Juffinger J., Maar L., Royer C., Kogler A., Gruß D.
Financial Cryptography and Data Security - 28th International Conference, FC 2024, Revised Selected Papers
IdleLeak: Exploiting Idle State Side Effects for Information Leakage
Rauscher F., Kogler A., Juffinger J., Gruß D.
Network and Distributed System Security Symposium (NDSS) 2024
Exploiting GPU caches from the browser with WebGPU
Czerny R.
Master's Thesis, 2024
Welcome Remarks from AISoLA 2023/Track C2 Chairs
Jansen N., Könighofer B., Křetínský J., Larsen K.
Bridging the Gap Between AI and Reality - 1st International Conference, AISoLA 2023, Proceedings
Memory Tagging using Cryptographic Integrity on Commodity x86 CPUs
Schrammel D., Unterguggenberger M., Lamster L., Sultana S., Grewal K., LeMay M., Durham D., Mangard S.
Proceedings - 9th IEEE European Symposium on Security and Privacy, Euro S and P 2024
Voodoo: Memory Tagging, Authenticated Encryption, and Error Correction through MAGIC
Lamster L., Unterguggenberger M., Schrammel D., Mangard S.
Proceedings of the 33rd USENIX Conference on Security Symposium
Continuous Engineering for Trustworthy Learning-Enabled Autonomous Systems
Bensalem S., Katsaros P., Nickovic D., Liao B., Nolasco R., Ahmed M., Beyene T., Cano F., Delacourt A., Esen H., Forrai A., He W., Huang X., Kekatos N., Könighofer B., Paulitsch M., Peled D., Ponchant M., Sorokin L., Tong S., Wu C.
Bridging the Gap Between AI and Reality - 1st International Conference, AISoLA 2023, Proceedings
soid: A Tool for Legal Accountability for Automated Decision Making
Judson S., Elacqua M., Cano F., Antonopoulos T., Könighofer B., Shapiro S., Piskac R.
Computer Aided Verification - 36th International Conference, CAV 2024, Proceedings
Test Where Decisions Matter: Importance-driven Testing for Deep Reinforcement Learning
Pranger S., Chockler H., Tappler M., Könighofer B.
Conference on Neural Information Processing Systems (NeurIPS)
Politics in Games - An Overview and Classification
Gutwenger L., Keller S., Dolezal M., Schnogl B., Rous S., Poier K., Pirker J.
2024 IEEE Gaming, Entertainment, and Media Conference, GEM 2024
Fostering AI Literacy: An Investigation of Learning Resources for Secondary School Students
Keller S., Steinbauer-Wagner G.
2024
Towards Private Deep Learning-Based Side-Channel Analysis Using Homomorphic Encryption
Schmid F., Mukherjee S., Picek S., Stöttinger M., De Santis F., Rechberger C.
Constructive Side-Channel Analysis and Secure Design - 15th International Workshop, COSADE 2024, Proceedings
Hiding Your Awful Online Choices Made More Efficient and Secure
Mukherjee S., Walch R., Meisingseth F., Lex E., Rechberger C.
ICT Systems Security and Privacy Protection - 39th IFIP International Conference, SEC 2024, Proceedings
Authenticated Encryption Schemes
Eichlseder M.
Symmetric Cryptography, Volume 1: Design and Security Proofs, ISTE; Wiley, 87-97, 2024
