We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks
Schwarz M., Lipp M., Gruß D., Weiser S., Maurice C., Spreitzer R., Mangard S.
Network and Distributed System Security Symposium 2018, Network and Distributed System Security Symposium 2018, 15
JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks
Schwarz M., Lipp M., Gruß D.
Network and Distributed System Security Symposium 2018, Network and Distributed System Security Symposium 2018, 15
Another Flip in the Wall of Rowhammer Defenses
Gruß D., Lipp M., Schwarz M., Genkin D., Juffinger J., O'Connell S., Schoechl W., Yarom Y.
39th IEEE Symposium on Security and Privacy 2018
MEAS: memory encryption and authentication secure against side-channel attacks
Unterluggauer T., Werner M., Mangard S.
Journal of Cryptographic Engineering, 1-22
Formal Verification of Masked Hardware Implementations in the Presence of Glitches
Bloem R., Groß H., Iusupov R., Könighofer B., Mangard S., Winter J.
EUROCRYPT , Springer, 321-353, (Lecture Notes in Computer Science)
SCAnDroid: Automated Side-Channel Analysis of Android APIs
Spreitzer R., Palfinger G., Mangard S.
WISEC '18, Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 224-235
DATA - Differential Address Trace Analysis: Finding Address-based Side-Channels in Binaries
Weiser S., Zankl A., Spreitzer R., Miller K., Mangard S., Sigl G.
Proceedings of the 27th USENIX Security Symposium , 27th USENIX Security Symposium, 603-620
SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography
Dobraunig C., Eichlseder M., Korak T., Mangard S., Mendel F., Primas R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2018(3), 547-572
Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures
Dobraunig C., Eichlseder M., Groß H., Mangard S., Mendel F., Primas R.
Advances in Cryptology – ASIACRYPT 2018, 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, 315-342, (Lecture Notes in Computer Science; vol. 11273)
Leakage Bounds for Gaussian Side Channels
Unterluggauer T., Korak T., Mangard S., Schilling R., Benini L., Gürkaynak F., Muehlberghuber M.
16th Smart Card Research and Advanced Application Conference - CARDIS 2017, International Conference on Smart Card Research and Advanced Applications
Pointing in the Right Direction - Securing Memory Accesses in a Faulty World
Schilling R., Werner M., Nasahl P., Mangard S.
Annual Computer Security Applications Conference, 2018 Annual Computer Security Applications Conference
Safe Reinforcement Learning via Shielding
Alshiekh M., Bloem R., Ehlers R., Könighofer B., Niekum S., Topcu U.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, (AAAI-18), the 30th innovative Applications of Artificial Intelligence (IAAI-18), and the 8th AAAI Symposium on Educational Advances in Artificial Intelligence (EAAI-18), New Orleans, Louisiana, USA, February 2-7, 2018, 32nd AAAI Conference on Artificial Intelligence, 2669-2678
ProcHarvester: Fully Automated Analysis of Procfs Side-Channel Leaks on Android
Spreitzer R., Kirchengast F., Gruß D., Mangard S.
ASIACCS '18 - Proceedings of the 2018 on Asia Conference on Computer and Communications Security , 749-763
Sponge-Based Control-Flow Protection for IoT Devices
Werner M., Unterluggauer T., Schaffenrath D., Mangard S.
2018 IEEE European Symposium on Security and Privacy, 2018 IEEE European Symposium on Security and Privacy
Bounded Synthesis of Register Transducers
Khalimov A., Maderbacher B., Bloem R.
Automated Technology for Verification and Analysis , 16th International Symposium on Automated Technology for Verification and Analysis, 494-510, ( Lecture Notes in Computer Science; vol. 11138)
A Counting Semantics for Monitoring LTL Specifications over Finite Traces
Bartocci E., Bloem R., Nickovic D., Röck F.
Computer Aided Verification , 30th International Conference on Computer Aided Verification, 547-564, (Lecture Notes in Computer Science; vol. 10980)
Graph Games and Reactive Synthesis
Bloem R., Chatterjee K., Jobstmann B.
Handbook of Model Checking, Springer, 921-962
Handbook of Model Checking
Clarke E., Henzinger T., Veith H., Bloem R.
, Springer
Expansion-Based QBF Solving Without Recursion
Bloem R., Braud-Santoni N., Hadzic V., Egly U., Lonsing F., Seidl M.
fmcad.18, 18th Conference on Formal Methods in Computer-Aided Design, 40-49
A Hierarchical Evaluation Scheme for Pilot-based Research Projects
Zefferer T.
Proceedings of the 14th International Conference on Web Information Systems and Technologies, 14th International Conference on Web Information Systems and Technologies, WEBIST 2018, 356-363