We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
SERVAS! Secure Enclaves via RISC-V Authenticryption Shield
Steinegger S., Schrammel D., Weiser S., Nasahl P., Mangard S.
Computer Security – ESORICS 2021, 26th European Symposium on Research in Computer Security, 370-391, (Lecture Notes in Computer Science; vol. 12973)
Reappraising Configuration and its Potential for Collaborative Objects
Grass A., Parger A.
Towards a new, configurable architecture - Proceedings of the 39th eCAADe Conference, 39th eCAADe Conference: Education and Research in Computer Aided Architectural Design in Europe: Towards a new, configurable architecture, 181-188
Voxelco—Playing with Collaborative Objects
Grass A.
Virtual Aesthetics in Architecture , Routledge, Taylor and Francis, 186 - 189
Two SAT solvers for solving quantified Boolean formulas with an arbitrary number of quantifier alternations
Bloem R., Braud-Santoni N., Hadzic V., Seidl M., Lonsing F., Egly U.
Formal Methods in System Design, Vol. 57(2), 157-177
L*-Based Learning of Markov Decision Processes (Extended Version)
Tappler M., Aichernig B., Bacci G., Eichlseder M., Larsen K.
Formal Aspects of Computing, Vol. 33(4-5), 575-615
Systematic Analysis of Randomization-based Protected Cache Architectures
Purnal A., Giner L., Gruß D., Verbauwhede I.
2021 IEEE Symposium on Security and Privacy (SP), 42th IEEE Symposium on Security and Privacy, 987-1002
CocoAlma: A Versatile Masking Verifier
Hadzic V., Bloem R.
Proceedings of the 21st Formal Methods in Computer-Aided Design, FMCAD 2021, 21st International Conference on Formal Methods in Computer-Aided Design, 14-23, (Proceedings of the 21st Formal Methods in Computer-Aided Design, FMCAD 2021)
Adaptive Testing for Specification Coverage in CPS Models
Bartocci E., Bloem R., Maderbacher B., Manjunath N., Nickovic D.
IFAC-PapersOnLine, Vol. 54(5), 229-234
Trust Me If You Can: Trusted Transformation Between (JSON) Schemas to Support Global Authentication of Education Credentials
More S., Grassberger P., Hörandner F., Abraham A., Klausner L.
ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, Proceedings, 36th International Conference on ICT Systems Security and Privacy Protection, 19-35, (IFIP Advances in Information and Communication Technology; vol. 625)
Adaptive Shielding under Uncertainty.
Pranger S., Könighofer B., Tappler M., Deixelberger M., Jansen N., Bloem R.
2021 American Control Conference, ACC 2021, 2021 American Control Conference, 3467-3474, (Proceedings of the American Control Conference; vol. 2021-May)
PLATYPUS: Software-based Power Side-Channel Attacks on x86
Lipp M., Kogler A., Oswald D., Schwarz M., Easdon C., Canella C., Gruß D.
2021 IEEE Symposium on Security and Privacy (SP), 42th IEEE Symposium on Security and Privacy, 355-371
HECTOR-V: A Heterogeneous CPU Architecture for a Secure RISC-V Execution Environment
Nasahl P., Schilling R., Werner M., Mangard S.
ASIA CCS '21: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, 2021 ACM Asia Conference on Computer and Communications Security, 187–199
CrypTag: Thwarting Physical and Logical Memory Vulnerabilities using Cryptographically Colored Memory
Nasahl P., Schilling R., Werner M., Hoogerbrugge J., Medwed M., Mangard S.
ASIA CCS '21: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, 2021 ACM Asia Conference on Computer and Communications Security, 200–212
Adapting the TPL Trust Policy Language for a Self-Sovereign Identity World
Alber L., More S., Mödersheim S., Schlichtkrull A.
Lecture Notes in Informatics, Open Identity Summit 2021, 107-118
Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs
Gigerl B., Hadzic V., Primas R., Mangard S., Bloem R.
Proceedings of the 30th USENIX Security Symposium, 30th USENIX Security Symposium, 1469-1486
Protecting Indirect Branches against Fault Attacks using ARM Pointer Authentication
Nasahl P., Schilling R., Mangard S.
Proceedings of the 2021 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2021, 2021 IEEE International Symposium on Hardware Oriented Security and Trust, 68-79, (Proceedings of the 2021 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2021)
SecWalk: Protecting Page Table Walks Against Fault Attacks
Schilling R., Nasahl P., Weiglhofer S., Mangard S.
Proceedings of the 2021 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2021, 56-67, (Proceedings of the 2021 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2021)
Secure and Efficient Software Masking on Superscalar Pipelined Processors
Gigerl B., Primas R., Mangard S.
Advances in Cryptology - ASIACRYPT 2021, ASIACRYPT 2021, 3-32, (Lecture Notes in Computer Science; vol. 13091)
Online Shielding for Stochastic Systems
Könighofer B., Bloem R., Tappler M., Rudolf J., Palmisano A.
NASA Formal Methods - 13th International Symposium, NFM 2021, Proceedings, 13th NASA Formal Methods Symposium, 231-248, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12673 LNCS)
TEMPEST - Synthesis Tool for Reactive Systems and Shields in Probabilistic Environments
Pranger S., Könighofer B., Posch L., Bloem R.
Automated Technology for Verification and Analysis - 19th International Symposium, ATVA 2021, Proceedings, 19th International Symposium on Automated Technology for Verification and Analysis , 222-228, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12971 LNCS)