We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Synthesizing adaptive test strategies from temporal logic specifications
Bloem R., Fey G., Greif F., Könighofer R., Pill I., Riener H., Röck F.
Formal Methods in System Design, Vol. 55(2), 103-135
Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC
Dinur I., Promitzer A., Kales D., Ramacher S., Rechberger C.
Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings, EUROCRYPT 2019, 343-372, (Lecture Notes in Computer Science; vol. 11476)
Feistel Structures for MPC, and More
Albrecht M., Grassi L., Perrin L., Ramacher S., Rechberger C., Rotaru D., Roy A., Schofnegger M.
Computer Security – ESORICS 2019, ESORICS 2019, 151-171, (Lecture Notes in Computer Science; vol. 11736)
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC
Albrecht M., Cid C., Grassi L., Khovratovich D., Lüftenegger R., Rechberger C., Schofnegger M.
Advances in Cryptology - ASIACRYPT 2019, ASIACRYPT 2019, 371-397, (Lecture Notes in Computer Science; vol. 11923)
L*-Based Learning of Markov Decision Processes
Tappler M., Aichernig B., Bacci G., Eichlseder M., Larsen K.
Formal Methods - The Next 30 Years , International Symposium on Formal Methods, 651 - 669, (Lecture Notes in Computer Science; vol. 11800)
Analyzing the Linear Keystream Biases in AEGIS
Eichlseder M., Nageler M., Primas R.
IACR Transactions on Symmetric Cryptology, Vol. 2019(4), 348-368
Kernel Isolation
Gruß D., Hansen D., Gregg B.
;login: , Vol. 43(4), 10-14
Software-based microarchitectural attacks
Gruß D.
Information Technology
Generic Low-Latency Masking in Hardware
Groß H., Iusupov R., Bloem R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2018(2), 1-21
Meltdown: Reading Kernel Memory from User Space
Lipp M., Schwarz M., Gruß D., Prescher T., Haas W., Fogh A., Horn J., Mangard S., Kocher P., Genkin D., Yarom Y., Hamburg M.
27th USENIX Security Symposium, 27th USENIX Security Symposium, 973-990
Erfahrungen aus eIDAS Zertifizierung
Leitold H., Konrad D.
Datenschutz und Datensicherheit, Vol. 42(7), 429-433
TIGHTest - Towards automating global Academic Mobility
More S.
, Master's Thesis
Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features
Schwarz M., Gruß D., Lipp M., Maurice C., Schuster T., Fogh A., Mangard S.
AsiaCCS' 18, Proceedings of the 2018 on Asia Conference on Computer and Communications Security , 13th ACM ASIA Conference on Information, Computer and Communications Security, 587-600
Use-after-FreeMail
Gruß D., Schwarz M., Wübbeling M., Guggi S., Malderle T., More S., Lipp M.
ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security, 13th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2018, 297-311
Best of two worlds: Secure cloud federations meet eIDAS
Zefferer T., Ziegler D., Reiter A.
2017 12th International Conference for Internet Technology and Secured Transactions (ICITST), 396-401
A unified masking approach
Groß H., Mangard S.
Journal of Cryptographic Engineering
Securing Conditional Branches in the Presence of Fault Attacks
Schilling R., Werner M., Mangard S.
Design, Automation & Test in Europe Conference - DATE 2018, Design, Automation & Test in Europe Conference 2018
High Speed ASIC Implementations of Leakage-Resilient Cryptography
Schilling R., Unterluggauer T., Mangard S., Gürkaynak F., Mühlberghuber M., Benini L.
Design, Automation & Test in Europe Conference - DATE 2018, IEEE
A Federation of Federations: Secure Cloud Federations meet European Identity Federations
Zefferer T., Ziegler D., Reiter A.
International Journal for Information Security Research, Vol. Volume 8(Issue 1)
Synthesis of distributed algorithms with parameterized threshold guards
Lazić M., Konnov I., Widder J., Bloem R.
21st International Conference on Principles of Distributed Systems, OPODIS 2017, 21st International Conference on Principles of Distributed Systems, OPODIS 2017