We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
OCScraper: Automated Analysis of the Fingerprintability of the iOS API
Palfinger G.
SECRYPT 2023 - Proceedings of the 20th International Conference on Security and Cryptography, 20th International Conference on Security and Cryptography: SECRYPT 2023, 433-441, (Proceedings of the International Conference on Security and Cryptography; vol. 1)
Kavach: Lightweight masking techniques for polynomial arithmetic in lattice-based cryptography
Aikata A., Basso A., Cassiers G., Mert A., Sinha Roy S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2023(3), 366-390
SCRAMBLE-CFI: Mitigating Fault-Induced Control-Flow Attacks on OpenTitan
Nasahl P., Mangard S.
GLSVLSI 2023 - Proceedings of the Great Lakes Symposium on VLSI 2023, 2023 ACM Great Lakes Symposium on VLSI, 45 - 50, (Proceedings of the ACM Great Lakes Symposium on VLSI, GLSVLSI)
A Unified Cryptoprocessor for Lattice-based Signature and Key-exchange
Aikata A., Mert A., Jacquemin D., Das A., Matthews D., Ghosh S., Sinha Roy S.
IEEE Transactions on Computers, Vol. 72(6), 1568-1580
Formal Verification of Arithmetic Masking in Hardware and Software
Gigerl B., Primas R., Mangard S.
Applied Cryptography and Network Security , 21st International Conference on Applied Cryptography and Network Security, 3-32, (Lecture Notes in Computer Science; vol. 13905)
HashTag: Hash-based Integrity Protection for Tagged Architectures
Lamster L., Unterguggenberger M., Schrammel D., Mangard S.
Proceedings of the 32nd USENIX Security Symposium, 32nd USENIX Security Symposium, 2797-2814
Machine Learning Based Risk Prediction for Major Adverse Cardiovascular Events for ELGA-Authorized Clinics
Polat Erdeniz S., Kramer D., Schrempf M., Rainer P., Felfernig A., Tran T., Burgstaller T., Lubos S.
Studies in Health Technology and Informatics, Vol. 301, 20-25
CustomProcessingUnit: Reverse Engineering and Customization of Intel Microcode
Borrello P., Easdon C., Schwarzl M., Czerny R., Schwarz M.
IEEE Workshop on Offensive Technologies (WOOT 23), 17th IEEE Workshop on Offensive Technologies
Provable Correct and Adaptive Simplex Architecture for Bounded-Liveness Properties
Maderbacher B., Schupp S., Bartocci E., Bloem R., Nickovic D., Könighofer B.
Model Checking Software - 29th International Symposium, SPIN 2023, Proceedings, 29th International Symposium on Model Checking of Software, 141-160, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13872 LNCS)
High-speed Design of Post Quantum Cryptography with Optimized Hashing and Multiplication
Imran M., Aikata A., Sinha Roy S., Pagliarini S.
IEEE Transactions on Circuits and Systems, Part II: Express Briefs , 1
Digital Communication Tools in Private and Professional Environments
Keller S., Pirker J., List E.
Learning in the Age of Digital and Green Transition , 25th International Conference on Interactive Collaborative Learning "Learning in the Age of Digital and Green Transition", 36-43, (Lecture Notes in Networks and Systems; vol. 633)
Finding Collisions for Round-Reduced Romulus-H
Nageler M., Pallua F., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2023(1), 67-88
A Systematic Approach to Automotive Security
Ebrahimi M., Marksteiner S., Nickovic D., Bloem R., Schögler D., Eisner P., Sprung S., Schober T., Chlup S., Schmittner C., König S.
Formal Methods - 25th International Symposium, FM 2023, Proceedings, 25th International Symposium on Formal Methods, 598-609, (Lecture Notes in Computer Science; vol. 14000)
Extending Expressive Access Policies with Privacy Features
More S., Ramacher S., Alber L., Herzl M.
The 21th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2022), 21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 574-581
Preventing a Cryptoapocalypse
Sinha Roy S., Banerjee U.
IEEE Solid-State Circuits Magazine, Vol. 15, 38-44
A Security-Evaluation Framework for Mobile Cross-Border e-Government Solutions
Zefferer T., Prünster B., Kollmann C., Corici A., Alber L., Czerny R., Podgorelec B.
DGO '23: Proceedings of the 24th Annual International Conference on Digital Government Research, 24th Annual International Conference on Digital Government Research, 536–543, (ACM International Conference Proceeding Series)
Towards a Mobile-First Cross-Border eID Framework
Czerny R., Kollmann C., Podgorelec B., Prünster B., Zefferer T.
Proceedings of the 24th Annual International Conference on Digital Government Research - Together in the Unstable World, 24th Annual International Conference on Digital Government Research, 526–535, (ACM International Conference Proceeding Series)
The IJCAI-23 Joint Workshop on Artificial Intelligence Safety and Safe Reinforcement Learning (AISafety-SafeRL2023)
Pedroza G., Chen X., Hernández-Orallo J., Huang X., Theodorou A., Matragkas N., Espinoza H., Mallah R., McDermid J., Castillo-Effen M., Bossens D., Könighofer B., Tschiatschek S., Liu A.
CEUR Workshop Proceedings, Vol. 3505
SCFI: State Machine Control-Flow Hardening Against Fault Attacks
Nasahl P., Unterguggenberger M., Nagpal R., Schilling R., Schrammel D., Mangard S.
2023 Design, Automation and Test in Europe Conference and Exhibition, DATE 2023 - Proceedings, Design, Automation & Test in Europe Conference & Exhibition, (Proceedings -Design, Automation and Test in Europe, DATE; vol. 2023-April)
EC-CFI: Control-Flow Integrity via Code Encryption Counteracting Fault Attacks
Nasahl P., Sultana S., Liljestrand H., Grewal K., LeMay M., Durham D., Schrammel D., Mangard S.
Proceedings of the 2023 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2023, IEEE International Symposium on Hardware Oriented Security and Trust, 24-35