We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Digital Communication Tools in Private and Professional Environments
Keller S., Pirker J., List E.
Learning in the Age of Digital and Green Transition , 25th International Conference on Interactive Collaborative Learning "Learning in the Age of Digital and Green Transition", 36-43, (Lecture Notes in Networks and Systems; vol. 633)
Finding Collisions for Round-Reduced Romulus-H
Nageler M., Pallua F., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2023(1), 67-88
A Systematic Approach to Automotive Security
Ebrahimi M., Marksteiner S., Nickovic D., Bloem R., Schögler D., Eisner P., Sprung S., Schober T., Chlup S., Schmittner C., König S.
Formal Methods - 25th International Symposium, FM 2023, Proceedings, 25th International Symposium on Formal Methods, 598-609, (Lecture Notes in Computer Science; vol. 14000)
Extending Expressive Access Policies with Privacy Features
More S., Ramacher S., Alber L., Herzl M.
The 21th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2022), 21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 574-581
Preventing a Cryptoapocalypse
Sinha Roy S., Banerjee U.
IEEE Solid-State Circuits Magazine, Vol. 15, 38-44
A Security-Evaluation Framework for Mobile Cross-Border e-Government Solutions
Zefferer T., Prünster B., Kollmann C., Corici A., Alber L., Czerny R., Podgorelec B.
DGO '23: Proceedings of the 24th Annual International Conference on Digital Government Research, 24th Annual International Conference on Digital Government Research, 536–543, (ACM International Conference Proceeding Series)
Towards a Mobile-First Cross-Border eID Framework
Czerny R., Kollmann C., Podgorelec B., Prünster B., Zefferer T.
Proceedings of the 24th Annual International Conference on Digital Government Research - Together in the Unstable World, 24th Annual International Conference on Digital Government Research, 526–535, (ACM International Conference Proceeding Series)
The IJCAI-23 Joint Workshop on Artificial Intelligence Safety and Safe Reinforcement Learning (AISafety-SafeRL2023)
Pedroza G., Chen X., Hernández-Orallo J., Huang X., Theodorou A., Matragkas N., Espinoza H., Mallah R., McDermid J., Castillo-Effen M., Bossens D., Könighofer B., Tschiatschek S., Liu A.
CEUR Workshop Proceedings, Vol. 3505
SCFI: State Machine Control-Flow Hardening Against Fault Attacks
Nasahl P., Unterguggenberger M., Nagpal R., Schilling R., Schrammel D., Mangard S.
2023 Design, Automation and Test in Europe Conference and Exhibition, DATE 2023 - Proceedings, Design, Automation & Test in Europe Conference & Exhibition, (Proceedings -Design, Automation and Test in Europe, DATE; vol. 2023-April)
EC-CFI: Control-Flow Integrity via Code Encryption Counteracting Fault Attacks
Nasahl P., Sultana S., Liljestrand H., Grewal K., LeMay M., Durham D., Schrammel D., Mangard S.
Proceedings of the 2023 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2023, IEEE International Symposium on Hardware Oriented Security and Trust, 24-35
MEMES: Memory Encryption-based Memory Safety on Commodity Hardware
Schrammel D., Sultana S., Grewal K., LeMay M., Durham D., Unterguggenberger M., Nasahl P., Mangard S.
SECRYPT 2023 - Proceedings of the 20th International Conference on Security and Cryptography, 20th International Conference on Security and Cryptography: SECRYPT 2023, 25-36
Safety Shielding under Delayed Observation
Cano Cordoba F., Palmisano A., Fränzle M., Bloem R., Könighofer B.
Proceedings of the International Conference on Automated Planning and Scheduling (ICAPS), AAAI Press, 80-85, (Proceedings International Conference on Automated Planning and Scheduling, ICAPS)
Formal XAI via Syntax-Guided Synthesis
Bjørner K., Judson S., Cano Cordoba F., Goldman D., Shoemaker N., Piskac R., Könighofer B.
Bridging the Gap Between AI and Reality , 1st International Conference on Bridging the Gap between AI and Reality, 119-137, (Lecture Notes in Computer Science; vol. 14380)
Side-Channel Attacks on Optane Persistent Memory
Liu S., Kanniwadi S., Schwarzl M., Kogler A., Gruß D., Khan S.
Proceedings of the 32nd USENIX Security Symposium, 32nd USENIX Security Symposium
CSI:Rowhammer – Cryptographic Security and Integrity against Rowhammer
Juffinger J., Lamster L., Kogler A., Eichlseder M., Lipp M., Gruß D.
44th IEEE Symposium on Security and Privacy , 43th IEEE Symposium on Security and Privacay
SQUIP: Exploiting the Scheduler Queue Contention Side Channel
Gast S., Juffinger J., Schwarzl M., Saileshwar G., Kogler A., Franza S., Köstl M., Gruß D.
44th IEEE Symposium on Security and Privacy , 43th IEEE Symposium on Security and Privacay
Attribute Repair for Threat Prevention
Tarrach T., Ebrahimi M., König S., Schmittner C., Bloem R., Nickovic D.
Computer Safety, Reliability, and Security - 42nd International Conference, SAFECOMP 2023, Proceedings, 42nd International Conference on Computer Safety, Reliability and Security, 135-148, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14181 LNCS)
Pasta: A Case for Hybrid Homomorphic Encryption
Dobraunig C., Grassi L., Helminger L., Rechberger C., Schofnegger M., Walch R.
TCHES 2023 Volume 2023/3, 25th Conference on Cryptographic Hardware and Embedded Systems
Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications
Grassi L., Hao Y., Rechberger C., Schofnegger M., Walch R., Wang Q.
Crypto 2023, 43rd International Cryptology Conference
Layered Binary Templating
Schwarzl M., Kraft E., Gruß D.
Applied Cryptography and Network Security , 21st International Conference on Applied Cryptography and Network Security, (Lecture Notes in Computer Science ; vol. 13905)