We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Shields for Safe Reinforcement Learning
Könighofer B., Bloem R., Jansen N., Junges S., Pranger S.
Communications of the ACM, Vol. 68(11), 2025
An Adaptive, Provable Correct Simplex Architecture
Maderbacher B., Schupp S., Bartocci E., Bloem R., Nickovic D., Könighofer B.
International Journal on Software Tools for Technology Transfer, 2025
Synthesis of Controllers for Continuous Blackbox Systems
Maderbacher B., Windisch F., Larrauri Borroto L., Bloem R.
Verification, Model Checking, and Abstract Interpretation - 26th International Conference, VMCAI 2025, Proceedings
Efficient and Composable Masked AES S-Box Designs Using Optimized Inverters
Hadzic V., Bloem R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2025(1), 2024
Synthesis from Infinite-State Generalized Reactivity(1) Specifications
Maderbacher B., Windisch F., Bloem R.
Leveraging Applications of Formal Methods, Verification and Validation
On Threat Model Repair
Bloem R., Chlup S., Nickovic D., Schmittner C.
Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering Methodologies. ISoLA 2024
Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults
Tollec S., Hadzic V., Nasahl P., Asavoae M., Bloem R., Couroussé D., Heydemann K., Jan M., Mangard S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(4), 2024
Closing the Gap: Leakage Contracts for Processors with Transitions and Glitches
Haring J., Hadzic V., Bloem R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(4), 2024
Quantile: Quantifying Information Leakage
Hadzic V., Cassiers G., Primas R., Mangard S., Bloem R.
2023
Quantile: Quantifying Information Leakage
Hadzic V., Cassiers G., Primas R., Mangard S., Bloem R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(1), 2023
Learning Mealy machines with one timer
Vaandrager F., Ebrahimi M., Bloem R.
Information and Computation, Vol. 295, 2023
Provable Correct and Adaptive Simplex Architecture for Bounded-Liveness Properties
Maderbacher B., Schupp S., Bartocci E., Bloem R., Nickovic D., Könighofer B.
Model Checking Software - 29th International Symposium, SPIN 2023, Proceedings
A Systematic Approach to Automotive Security
Ebrahimi M., Marksteiner S., Nickovic D., Bloem R., Schögler D., Eisner P., Sprung S., Schober T., Chlup S., Schmittner C., König S.
Formal Methods - 25th International Symposium, FM 2023, Proceedings
Safety Shielding under Delayed Observation
Cano Cordoba F., Palmisano A., Fränzle M., Bloem R., Könighofer B.
Proceedings of the International Conference on Automated Planning and Scheduling (ICAPS)
Attribute Repair for Threat Prevention
Tarrach T., Ebrahimi M., König S., Schmittner C., Bloem R., Nickovic D.
Computer Safety, Reliability, and Security - 42nd International Conference, SAFECOMP 2023, Proceedings
Power Contracts: Provably Complete Power Leakage Models for Processors
Bloem R., Gigerl B., Gourjon M., Hadzic V., Mangard S., Primas R.
CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
Adaptive testing for specification coverage and refinement in CPS models
Bartocci E., Bloem R., Maderbacher B., Manjunath N., Nickovic D.
Nonlinear Analysis: Hybrid Systems, Vol. 46, 2022
Online shielding for reinforcement learning
Könighofer B., Rudolf J., Palmisano A., Tappler M., Bloem R.
Innovations in Systems and Software Engineering, 2022
Proving SIFA protection of masked redundant circuits
Hadzic V., Primas R., Bloem R.
Innovations in Systems and Software Engineering, Vol. 18(3), 2022
Automata Learning meets Shielding
Tappler M., Pranger S., Könighofer B., Muskardin E., Bloem R., Larsen K.
Leveraging Applications of Formal Methods, Verification and Validation. Verification Principles - 11th International Symposium, ISoLA 2022, Proceedings
