We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Model-Based Testing IoT Communication via Active Automata Learning
Tappler M., Aichernig B., Bloem R.
2017 IEEE International Conference on Software Testing, Verification and Validation (ICST), 10th IEEE International Conference on Software Testing, Verification and Validation (ICST 2017), 276-287
Hybrid Mobile Edge Computing: Unleashing the Full Potential of Edge Computing in Mobile Device Use Cases
Reiter A., Prünster B., Zefferer T.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, IEEE Press, 935-944
SUNFISH ID1v1 – Identity Management and Access Control
Reiter A., Suzic B., Leitold H., Marsalek A., Prünster B., Ziegler D.
A new structural-differential property of 5-round AES
Grassi L., Rechberger C., Rønjom S.
Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings, Springer Verlag Wien, 289-317, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10211 LNCS)
Dependability for the Internet of Things
Boano C., Römer K., Bloem R., Witrisal K., Baunach M., Horn M.
Elektrotechnik und Informationstechnik, Vol. 133(7), 304–309
Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order
Groß H., Mangard S., Korak T.
ACM Workshop on Theory of Implementation Security, 3
Prefetch Side-Channel Attacks
Gruß D., Maurice C., Fogh A., Lipp M., Mangard S.
CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 23rd ACM Conference on Computer and Communications Security, 368-379
Drammer
Van Der Veen V., Fratantonio Y., Lindorfer M., Gruß D., Maurice C., Vigna G., Bos H., Razavi K., Giuffrida C.
CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 23rd ACM Conference on Computer and Communications Security, 1675-1689
Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android
Spreitzer R., Griesmayr S., Korak T., Mangard S.
9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2016), Darmstadt, Germany, ACM Conference on Security and Privacy in Wireless and Mobile Networks
Synthesis of Self-Stabilizing and Byzantine-Resilient Distributed Systems
Braud-Santoni N., Bloem R., Jacobs S.
Computer Aided Verification - 28th International Conference, CAV 2016, Proceedings, 28th International Conference on Computer Aided Verification, CAV 2016, 157-176, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9779)
Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript
Gruß D., Maurice C., Mangard S.
Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), Springer, (DIMVA)
The first reactive synthesis competition (SYNTCOMP 2014)
Jacobs S., Bloem R., Brenguier R., Ehlers R., Hell T., Könighofer R., Pérez G., Raskin J., Ryzhyk L., Sankur O., Seidl M., Tentrup L., Walker A.
International Journal on Software Tools for Technology Transfer, 1-24
Flexible and Secure Resource Sharing for Mobile Augmentation Systems
Reiter A., Zefferer T.
2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, IEEE Mobile Cloud
CrySIL: Bringing Crypto to the Modern User
Reimair F., Teufl P., Zefferer T.
Web Information Systems and Technologies, Springer International Publishing, 70-90, (Lecture Notes in Business Information Processing; vol. 246)
Protecting the Control Flow of Embedded Processors against Fault Attacks
Werner M., Wenger E., Mangard S.
Smart Card Research and Advanced Applications, International Conference on Smart Card Research and Advanced Applications
The second reactive synthesis competition (SYNTCOMP 2015)
Jacobs S., Bloem R., Brenguier R., Pérez G., Raskin J., Ryzhyk L., Sankur O., Seidl M., Tentrup L., Walker A., Könighofer R.
Electronic Proceedings in Theoretical Computer Science, Vol. 202, 27-57
Enhancing Side-Channel Analysis of Binary-Field Multiplication with Bit Reliability
Peßl P., Mangard S.
Topics in Cryptology - CT-RSA 2016, Cryptographers´ Track at the RSA Conference
Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption
Unterluggauer T., Mangard S.
Constructive Side-Channel Analysis and Secure Design - COSADE 2016, International Workshop on Constructive Side-Channel Analysis and Secure Design, 3-18, (LNCS; vol. 9689)
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks
Peßl P., Gruß D., Maurice C., Schwarz M., Mangard S.
Proceedings of the 25th USENIX Security Symposium, 565-581
Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order
Groß H., Mangard S., Korak T.
TIS@CCS, ACM SIGWEB , 3