We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
SUNFISH D2.2 – Requirement Definition and Threat Model
Reiter A., Suzic B., Leitold H., Cassar J., Nicoletti L., Rozenberg B., Jones C.
SUNFISH D2.1 – State of the Art and Legal Aspects
Reiter A., Leitold H., Suzic B., Reimair F., Moffie M., Cordina D., Pullonen P., Pettai M., Kubo B., Venturi D.
Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches
Gruß D., Spreitzer R., Mangard S.
24th USENIX Security Symposium, Washington, D.C., USA, August 12-14, 2015, 24th USENIX Security Symposium, 897-912
Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security
Dobraunig C., Koeune F., Mangard S., Mendel F., Standaert F.
CARDIS, International Conference on Smart Card Research and Advanced Applications, 225-241, (LNCS; vol. 9514)
Decidability of Parameterized Verification
Khalimov A., Bloem R., Veith H., Widder J., Konnov I., Rubin S., Jacobs S.
Practical memory deduplication attacks in sandboxed javascript
Gruß D., Bidner D., Mangard S.
Computer Security – ESORICS 2015 - 20th European Symposium on Research in Computer Security, Proceedings, 20th European Symposium on Research in Computer Security, ESORICS 2015, 108-122, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9326)
Case Study: Automatic Test Case Generation for a Secure Cache Implementation
Bloem R., Hein D., Röck F., Schumi R.
International Conference on Tests And Proofs, International Conference on Tests and Proofs
Leveraging the Adoption of Mobile eID and e-Signature Solutions in Europe
Zefferer T., Teufl P.
Electronic Government and the Information Systems Perspective, 4th International Conference on Electronic Government and the Information Systems Perspective , 86-100
Towards Transactional Electronic Services on Mobile End-User Devices - A Sustainable Architecture for Mobile Signature Solutions
Zefferer T.
11th International Conference on Web Information Systems and Technologies, 586-597
Shield Synthesis: - Runtime Enforcement for Reactive Systems
Bloem R., Könighofer B., Könighofer R., Wang C.
Tools and Algorithms for the Construction and Analysis of Systems (TACAS) - 21st International Conference, 21st International Conference on Tools and Algorithms for the Construction and Analysis of Systems, 533-548, (Lecture Notes in Computer Science; vol. 9035)
Towards a New Generation of Mobile Government
Zefferer T.
13th International Conference on e-Society 2015, 13th International Conference on e-Society (ES 2015), 191-198
Games for BCI Skill Learning
Scherer R., Müller-Putz G., Friedrich E., Pammer-Schindler V., Wilding K., Keller S., Pirker J.
Handbook of Digital Games and Entertainment Technologies, 1-19
Designing for Engaging BCI Training: A Jigsaw Puzzle
Pammer-Schindler V., Simon J., Wilding K., Keller S., Scherer R.
CHI PLAY '15, ACM SIGCHI Annual Symposium on Computer-Human Interaction in Play, 667-672
Java Privacy Guard - The OpenPGP Message Format and an Implementation in Java
More S.
, Bachelor's Thesis
Fortgeschrittene PDF Signaturen mit PAdES
Fitzek A., Maierhofer C., Tauber A., Zwattendorfer B.
eGovernment Review, 16-17
Cooperative Reactive Synthesis
Bloem R., Ehlers R., Könighofer R.
Automated Technology for Verification and Analysis (ATVA'15), International Symposium on Automated Technology for Verification and Analysis, 394-410, (Lecture Notes in Computer Science; vol. 9364)
Analysis of SHA-512/224 and SHA-512/256
Dobraunig C., Eichlseder M., Mendel F.
Advances in Cryptology - ASIACRYPT 2015, 2015 International Conference on the Theory and Application of Cryptology and Information Security, 612-630, (LNCS)
Higher-Order Cryptanalysis of LowMC
Dobraunig C., Eichlseder M., Mendel F.
Information Security and Cryptology - ICISC 2015, International Conference on Information Security and Cryptology, 87-101, (LNCS; vol. 9558)
Synthesizing cooperative reactive mission plans
Ehlers R., Könighofer R., Bloem R.
2015 IEEE/RSJ International Conference on Intelligent Robots and Systems , 2015 IEEE/RSJ International Conference on Intelligent Robots and Systems , 3478-3485
Assume-Guarantee Synthesis for Concurrent Reactive Programs with Partial Information
Bloem R., Chatterjee K., Jacobs S., Könighofer R.
Tools and Algorithms for the Construction and Analysis of Systems (TACAS) - 21st International Conference, 21st International Conference on Tools and Algorithms for the Construction and Analysis of Systems, 517-532, (Lecture Notes in Computer Science; vol. 9035)