We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
FMTESTING: A FEATUREIDE Plug-in for Automated Feature Model Analysis and Diagnosis
Burgstaller T., Le V., Tran T., Felfernig A.
ECAI 2023 - 26th European Conference on Artificial Intelligence, including 12th Conference on Prestigious Applications of Intelligent Systems, PAIS 2023 - Proceedings
The QARMAv2 Family of Tweakable Block Ciphers
Avanzi R., Banik S., Dunkelman O., Eichlseder M., Ghosh S., Nageler M., Regazzoni F.
IACR Transactions on Symmetric Cryptology, Vol. 2023(3), 2023
Finding the Impossible: Automated Search for Full Impossible-Differential, Zero-Correlation, and Integral Attacks
Hadipour H., Sadeghi S., Eichlseder M.
Advances in Cryptology – EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2023, Proceedings
Trust Scheme Interoperability: Connecting Heterogeneous Trust Schemes
More S.
ARES 2023 - 18th International Conference on Availability, Reliability and Security, Proceedings
An inclusive Lifecycle Approach for IoT Devices Trust and Identity Management
Loupos K., Niavis H., Michalopoulos F., Misiakoulis G., Skarmeta A., García J., Palomares A., Song H., Dautov R., Giampaolo F., Mancilla R., Costantino F., Van Landuyt D., Michiels S., More S., Xenakis C., Bampatsikos M., Politis I., Krilakis K., Syvridis D.
ARES 2023 - 18th International Conference on Availability, Reliability and Security, Proceedings
A2P2 - An Android Application Patching Pipeline Based On Generic Changesets
Draschbacher F.
ARES 2023 - 18th International Conference on Availability, Reliability and Security, Proceedings
Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels
Kogler A., Juffinger J., Giner L., Gerlach L., Schwarzl M., Schwarz M., Gruß D., Mangard S.
32nd USENIX Security Symposium, USENIX Security 2023
PT-Guard: Integrity-Protected Page Tables to Defend Against Breakthrough Rowhammer Attacks
Saxena A., Saileshwar G., Juffinger J., Kogler A., Gruß D., Qureshi M.
Proceedings - 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2023
Analyzing Intentional Behavior in Autonomous Agents Under Uncertainty
Cano Cordoba F., Judson S., Antonopoulos T., Bjørner K., Shoemaker N., Shapiro S., Piskac R., Könighofer B.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence
Multi-Tag: A Hardware-Software Co-Design for Memory Safety based on Multi-Granular Memory Tagging
Unterguggenberger M., Schrammel D., Nasahl P., Schilling R., Lamster L., Mangard S.
ASIA CCS 2023 - Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security
SPEAR-V: Secure and Practical Enclave Architecture for RISC-V
Schrammel D., Waser M., Lamster L., Unterguggenberger M., Mangard S.
ASIA CCS 2023 - Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security
Secure Context Switching of Masked Software Implementations
Gigerl B., Primas R., Mangard S.
ASIA CCS 2023 - Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security
CryptoShield - Automatic On-Device Mitigation for Crypto API Misuse in Android Applications
Draschbacher F., Feichtner J.
ASIA CCS 2023 - Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security
Smoothing the Ride: Providing a Seamless Upgrade Path from Established Cross-Border eID Workflows Towards eID Wallet Systems
Czerny R., Kollmann C., Podgorelec B., Prünster B., Zefferer T.
SECRYPT 2023 - Proceedings of the 20th International Conference on Security and Cryptography
Scatter and Split Securely: Defeating Cache Contention and Occupancy Attacks
Giner L., Steinegger S., Purnal A., Eichlseder M., Unterluggauer T., Mangard S., Gruß D.
IEEE S&P
OCScraper: Automated Analysis of the Fingerprintability of the iOS API
Palfinger G.
SECRYPT 2023 - Proceedings of the 20th International Conference on Security and Cryptography
Kavach: Lightweight masking techniques for polynomial arithmetic in lattice-based cryptography
Aikata A., Basso A., Cassiers G., Mert A., Sinha Roy S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2023(3), 2023
SCRAMBLE-CFI: Mitigating Fault-Induced Control-Flow Attacks on OpenTitan
Nasahl P., Mangard S.
GLSVLSI 2023 - Proceedings of the Great Lakes Symposium on VLSI 2023
A Unified Cryptoprocessor for Lattice-based Signature and Key-exchange
Aikata A., Mert A., Jacquemin D., Das A., Matthews D., Ghosh S., Sinha Roy S.
IEEE Transactions on Computers, Vol. 72(6), 2023
Formal Verification of Arithmetic Masking in Hardware and Software
Gigerl B., Primas R., Mangard S.
Applied Cryptography and Network Security
