We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Page Cache Attacks
Gruß D., Kraft E., Tiwari T., Schwarz M., Trachtenberg A., Hennessey J., Ionescu A., Fogh A.
CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 26th ACM Conference on Computer and Communications Security, 167-180
Forgery Attacks on FlexAE and FlexAEAD
Eichlseder M., Kales D., Schofnegger M.
Cryptography and Coding - IMACC 2019, IMACC 2019, 200-214, (Lecture Notes in Computer Science; vol. 11929)
Phish-Hook: Detecting Phishing Certificates Using Certificate Transparency Logs
Fasllija E., Enişer H., Prünster B.
15th EAI International Conference on Security and Privacy in Communication Networks, 15th EAI International Conference on Security and Privacy in Communication Networks
SGXJail: Defeating Enclave Malware via Confinement
Weiser S., Mayr L., Schwarz M., Gruß D.
RAID 2019 Proceedings, RAiD 2019, 353-366
NetSpectre: Read Arbitrary Memory over Network
Schwarz M., Schwarzl M., Lipp M., Masters J., Gruß D.
Computer Security - ESORICS 2019, ESORICS 2019, 279-299, (Lecture Notes in Computer Science; vol. 11735)
Wait a second
Eger M., Gruß D.
Proceedings of the 14th International Conference on the Foundations of Digital Games, FDG 2019, 14th International Conference on the Foundations of Digital Games, FDG 2019, (ACM International Conference Proceeding Series)
Towards an Architecture of Collaborative Objects
Grass A.
Proceedings of 37th eCAADe and 23rd SIGraDi Conference, 37th eCAADe and 23rd SIGraDi Conference, 325-332
Mobile Private Contact Discovery at Scale
Kales D., Rechberger C., Schneider T., Senker M., Weinert C.
28th USENIX Security Symposium, 28th USENIX Security Symposium, 1447-1464
A Systematic Evaluation of Transient Execution Attacks and Defenses
Canella C., Bulck J., Schwarz M., Lipp M., Berg B., Ortner P., Piessens F., Evtyushkin D., Gruß D.
Proceedings of the 28th USENIX Security Symposium, USENIX Association, 249-266
ScatterCache: Thwarting Cache Attacks via Cache Set Randomization
Werner M., Unterluggauer T., Giner L., Schwarz M., Gruß D., Mangard S.
28th USENIX Security Symposium (USENIX Security 19), USENIX Association, 675-692
A Correctable Public Blockchain
Marsalek A., Zefferer T.
2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019, 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering, 554-561
Tackling data inefficiency: Compressing the bitcoin blockchain
Marsalek A., Zefferer T., Fasllija E., Ziegler D.
2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering, 626-633, (Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019)
TPL: A Trust Policy Language
Mödersheim S., Schlichtkrull A., Wagner G., More S., Alber L.
Trust Management XIII, IFIPTM 2019, 209-223
Run-Time Optimization for Learned Controllers Through Quantitative Games
Avni G., Bloem R., Chatterjee K., Henzinger T., Könighofer B., Pranger S.
Computer Aided Verification (CAV), 31st International Conference on Computer Aided Verification, 630-649, ( Lecture Notes in Computer Science; vol. 11561)
Synthesis of Minimum-Cost Shields for Multi-agent Systems
Bharadwaj S., Bloem R., Dimitrova R., Könighofer B., Topcu U.
2019 American Control Conference (ACC), 2019 American Control Conference, 1048-1055
Prying CoW: Inferring Secrets Across Virtual Machine Boundaries
Palfinger G., Prünster B., Ziegler D.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 16th International Joint Conference on e-Business and Telecommunications, 187 - 197
Fides – Unleashing the Full Potential of Remote Attestation
Prünster B., Palfinger G., Kollmann C.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, SciTePress - Science and Technology Publications, 314--321
Master of Puppets: Trusting Silicon in the Fight for Practical Security in Fully Decentralised Peer-to-Peer Networks
Prünster B., Fasllija E., Mocher D.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, SciTePress - Science and Technology Publications, 252--259
Fine-Grained Access Control in Industrial Internet of Things
Ziegler D., Sabongui J., Palfinger G.
Proceedings of the 34th International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2019, 34th International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2019, 91-104
Practical Enclave Malware with Intel SGX
Schwarz M., Weiser S., Gruß D.
Detection of Intrusions and Malware, and Vulnerability Assessment, 16th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, 177-196, (Lecture Notes in Computer Science; vol. 11543)