We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Mobile-Only Solution for Server-Based Qualified Electronic Signatures
Theuermann K., Tauber A., Lenz T.
ICC 2019 - 2019 IEEE International Conference on Communications (ICC), 2019 IEEE International Conference on Communications
ConTExT: Leakage-Free Transient Execution
Schwarz M., Schilling R., Kargl F., Lipp M., Canella C., Gruß D.
, Cornell University Library, (arXiv.org e-Print archive)
Spectre Attacks: Exploiting Speculative Execution
Kocher P., Horn J., Fogh A., Genkin D., Gruß D., Haas W., Hamburg M., Lipp M., Mangard S., Prescher T., Schwarz M., Yarom Y.
40th IEEE Symposium on Security and Privacy
Store-to-Leak Forwarding
Schwarz M., Canella C., Giner L., Gruß D.
, Cornell University Library, (arXiv.org e-Print archive)
Unleashing the Full Potential of Blockchain Technology for Security-Sensitive Business Applications
Marsalek A., Kollmann C., Zefferer T., Teufl P.
ICBC 2019 - IEEE International Conference on Blockchain and Cryptocurrency, 1st IEEE International Conference on Blockchain and Cryptocurrency, 394-402
Flexible und benutzerfreundliche Authentifizierungsverfahren zur Umsetzung transaktionaler E-Government-Services auf mobilen Geräten
Theuermann K., Zefferer T., Lenz T., Tauber A.
Handbuch E-Government, Springer Fachmedien Wiesbaden, 1-30
Privacy-preserving attribute aggregation in eID federations
Priesnitz Filho W., Ribeiro C., Zefferer T.
Future Generation Computer Systems, Vol. 92(Volume 92), 1-16
Dependable Internet of Things
Römer K., Witrisal K., Baunach M., Bloem R., Horn M.
Proceedings of the International Conference on Sensor Networks (SENSORNETS) 2019
JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits
Schwarz M., Lackner F., Gruß D.
NDSS, Network and Distributed System Security Symposium 2018
TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V
Weiser S., Werner M., Brasser F., Malenko M., Mangard S., Sadeghi A.
Proceedings 2019 - Network and Distributed System Security Symposium (NDSS) , Internet Society
Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje
Dobraunig C., Mangard S., Mendel F., Primas R.
Selected Areas in Cryptography – SAC 2018, Springer, 257-277, (Lecture Notes in Computer Science; vol. 11349)
Small faults grow up - Verification of error masking robustness in arithmetically encoded programs
Karl A., Schilling R., Bloem R., Mangard S.
Verification, Model Checking, and Abstract Interpretation - 20th International Conference, VMCAI 2019, Proceedings, 2019 International Conference on Verification, Model Checking, and Abstract Interpretation , 183-204, (Lecture Notes in Computer Science; vol. 11388)
Protecting RISC-V Processors against Physical Attacks
Werner M., Schilling R., Unterluggauer T., Mangard S.
Design, Automation & Test in Europe Conference - DATE 2019, 2019 Design, Automation & Test in Europe Conference & Exhibition, 1136-1141
Efficient Information-Flow Verification Under Speculative Execution
Bloem R., Jacobs S., Vizel Y.
Efficient Information-Flow Verification Under Speculative Execution
Qualified Remote Signatures – Solutions, its Certification, and Use
Leitold H., Konrad D.
Proceedings of 29th SmartCard Workshop, 219-231
Policy-based access control for the IoT and Smart Cities
Omolola O., More S., Fasllija E., Wagner G., Alber L.
Open Identity Summit 2019, Proceedings, Open Identity Summit 2019, 157-163, (Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI); vol. P-293)
DNS-based trust scheme publication and discovery
Wagner G., Wagner S., More S., Hoffmann M.
Open Identity Summit 2019, Proceedings, Open Identity Summit 2019, 49-58, (Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI); vol. P-293)
Programming Behavioral Test Models for SMT Solving in Scala
Aichernig B., Maderbacher B., Tiran S.
2019 IEEE International Conference on Software Testing, Verification and Validation Workshops, {ICST} Workshops 2019, Xi'an, China, April 22-23, 2019, IEEE Publications, 52-60
Software-basierte Mikroarchitekturangriffe
Gruß D.
Ausgezeichnete Informatikdissertationen 2017, Gesellschaft für Informatik e.V., 81-90
Learning a Behavior Model of Hybrid Systems Through Combining Model-Based Testing and Machine Learning
Aichernig B., Bloem R., Ebrahimi M., Horn M., Pernkopf F., Roth W., Rupp A., Tappler M., Tranninger M.
Testing Software and Systems, 31st IFIP International Conference on Testing Software and Systems, 3-21, (Lecture Notes in Computer Science; vol. 11812)