We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
MEMES: Memory Encryption-based Memory Safety on Commodity Hardware
Schrammel D., Sultana S., Grewal K., LeMay M., Durham D., Unterguggenberger M., Nasahl P., Mangard S.
SECRYPT 2023 - Proceedings of the 20th International Conference on Security and Cryptography, 20th International Conference on Security and Cryptography: SECRYPT 2023, 25-36
Safety Shielding under Delayed Observation
Cano Cordoba F., Palmisano A., Fränzle M., Bloem R., Könighofer B.
Proceedings of the International Conference on Automated Planning and Scheduling (ICAPS), AAAI Press, 80-85, (Proceedings International Conference on Automated Planning and Scheduling, ICAPS)
Formal XAI via Syntax-Guided Synthesis
Bjørner K., Judson S., Cano F., Goldman D., Shoemaker N., Piskac R., Könighofer B.
Bridging the Gap Between AI and Reality , 1st International Conference on Bridging the Gap between AI and Reality, 119-137, (Lecture Notes in Computer Science; vol. 14380)
Side-Channel Attacks on Optane Persistent Memory
Liu S., Kanniwadi S., Schwarzl M., Kogler A., Gruß D., Khan S.
Proceedings of the 32nd USENIX Security Symposium, 32nd USENIX Security Symposium
CSI:Rowhammer – Cryptographic Security and Integrity against Rowhammer
Juffinger J., Lamster L., Kogler A., Eichlseder M., Lipp M., Gruß D.
44th IEEE Symposium on Security and Privacy , 43th IEEE Symposium on Security and Privacay
SQUIP: Exploiting the Scheduler Queue Contention Side Channel
Gast S., Juffinger J., Schwarzl M., Saileshwar G., Kogler A., Franza S., Köstl M., Gruß D.
44th IEEE Symposium on Security and Privacy , 43th IEEE Symposium on Security and Privacay
Attribute Repair for Threat Prevention
Tarrach T., Ebrahimi M., König S., Schmittner C., Bloem R., Nickovic D.
Computer Safety, Reliability, and Security - 42nd International Conference, SAFECOMP 2023, Proceedings, 42nd International Conference on Computer Safety, Reliability and Security, 135-148, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14181 LNCS)
Pasta: A Case for Hybrid Homomorphic Encryption
Dobraunig C., Grassi L., Helminger L., Rechberger C., Schofnegger M., Walch R.
TCHES 2023 Volume 2023/3, 25th Conference on Cryptographic Hardware and Embedded Systems
Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications
Grassi L., Hao Y., Rechberger C., Schofnegger M., Walch R., Wang Q.
Crypto 2023, 43rd International Cryptology Conference
Layered Binary Templating
Schwarzl M., Kraft E., Gruß D.
Applied Cryptography and Network Security , 21st International Conference on Applied Cryptography and Network Security, (Lecture Notes in Computer Science ; vol. 13905)
Practical Timing Side-Channel Attacks on Memory Compression
Schwarzl M., Borrello P., Saileshwar G., Müller H., Schwarz M., Gruß D.
43th IEEE Symposium on Security and Privacay: IEEE S&P 2023, 43th IEEE Symposium on Security and Privacay, 1186-1203
Design and Analysis of Client-Side Operations in Homomorphic Encryption for FPGA Platforms
Krieger F.
, Master's Thesis
Computational Evaluation of Model-Agnostic Explainable AI Using Local Feature Importance in Healthcare
Erdeniz S., Schrempf M., Kramer D., Rainer P., Felfernig A., Tran T., Burgstaller T., Lubos S.
Artificial Intelligence in Medicine - 21st International Conference on Artificial Intelligence in Medicine, AIME 2023, Proceedings, 21st International Conference on Artificial Intelligence in Medicine, 114-119, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13897 LNAI)
KRAKEN: A Privacy-Preserving Data Market for Authentic Data
Koch K., Krenn S., Marc T., More S., Ramacher S.
DE 2022 - Proceedings of the 1st International Workshop on Data Economy, Part of CoNEXT 2022, 2022 International Conference on Emerging Networking Experiments and Technologies, 15-20, (DE 2022 - Proceedings of the 1st International Workshop on Data Economy, Part of CoNEXT 2022)
Integrity of virtual testing for crash protection
Galijatovic E., Eichlseder M., Heindl S., Klug C.
Frontiers in Future Transportation, Vol. 3
Medha: Microcoded Hardware Accelerator for computing on Encrypted Data
Mert A., Aikata A., Kwon S., Shiin Y., Yoo D., Lee Y., Sinha Roy S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2023(1), 463-500
Power Contracts: Provably Complete Power Leakage Models for Processors
Bloem R., Gigerl B., Gourjon M., Hadzic V., Mangard S., Primas R.
CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022 ACM SIGSAC Conference on Computer and Communications Security, 381-395, (Proceedings of the ACM Conference on Computer and Communications Security)
Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto
Dobraunig C., Kales D., Rechberger C., Schofnegger M., Zaverucha G.
CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 29th ACM Conference on Computer and Communications Security, 843–857, (Proceedings of the ACM Conference on Computer and Communications Security)
Reinforced Concrete: A Fast Hash Function for Verifiable Computation
Lüftenegger R., Rechberger C., Grassi L., Schofnegger M., Walch R., Khovratovich D.
CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022 ACM SIGSAC Conference on Computer and Communications Security, 1323–1335, (Proceedings of the ACM Conference on Computer and Communications Security)
Adaptive testing for specification coverage and refinement in CPS models
Bartocci E., Bloem R., Maderbacher B., Manjunath N., Nickovic D.
Nonlinear Analysis: Hybrid Systems, Vol. 46