We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
OPRFs from Isogenies
Heimberger L., Hennerbichler T., Meisingseth F., Ramacher S., Rechberger C.
ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 19th ACM ASIA Conference on Computer and Communications Security, 575-588
Proteus: A Pipelined NTT Architecture Generator
Hirner F., Mert A., Sinha Roy S.
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol. 32(7), 1228 - 1238
Stitching FPGA Fabrics with FABulous and OpenLane 2
Moser L., Kissich M., Scheipel T., Baunach M.
Proceedings of the 21st ACM International Conference on Computing Frontiers 2024 Workshops and Special Sessions, CF 2024 Companion, 21st ACM International Conference on Computing Frontiers Workshops and Special Sessions, 71-74, (Proceedings of the 21st ACM International Conference on Computing Frontiers 2024 Workshops and Special Sessions, CF 2024 Companion)
Backdooring Post-Quantum Cryptography: Kleptographic Attacks on Lattice-based KEMs
Ravi P., Bhasin S., Chattopadhyay A., Aikata A., Sinha Roy S.
GLSVLSI 2024 - Proceedings of the Great Lakes Symposium on VLSI 2024, 34th Great Lakes Symposium on VLSI, 216 - 221
Security Aspects of Masking on FPGAs
Gigerl B., Pretterhofer K., Mangard S.
Proceedings of the 2024 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2024, 2024 IEEE International Symposium on Hardware Oriented Security and Trust, 199-210
Community-driven design
Grass A.
International Journal of Architectural Computing, Vol. 22(2), 257-272
SUIT: Secure Undervolting with Instruction Traps
Juffinger J., Kalinin S., Gruß D., Mueller F.
ASPLOS 2024: Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 1, ACM International Conference on Architectural Support for Programming Languages and Operating Systems
Lifecycle Management of IoT Devices Via Digital Identities Management and Distributed Ledgers Solutions
Loupos K., Vavilis S., Niavis H., Michalopoulos F., Dafloukas K., Skarmeta A., García J., Palomares A., Song H., Dautov R., Mancilla R., Costantino F., Van Landuyt D., Michiels S., More S., Xenakis C., Krilakis K.
Embedded World Conference 2024, Embedded World 2024
Towards Private Deep Learning-Based Side-Channel Analysis using Homomorphic Encryption
Schmid F., Rechberger C., Mukherjee S., Stöttinger M., Picek S., De Santis F.
Constructive Side-Channel Analysis and Secure Design , 15th International Workshop on Constructive Side-Channel Analysis and Secure Design
'Put the Car on the Stand': SMT-based Oracles for Investigating Decisions
Judson S., Elacqua M., Cano Cordoba F., Antonopoulos T., Könighofer B., Shapiro S., Piskac R.
CSLAW 2024 - Proceedings of the 3rd Symposium on Computer Science and Law, 2024 Computer Science and Law Symposium, 73-85
Remote Scheduler Contention Attacks
Gast S., Juffinger J., Maar L., Royer C., Kogler A., Gruß D.
Financial Cryptography and Data Security - 28th International Conference, FC 2024, Revised Selected Papers, Financial Cryptography and Data Security 2024, 365-383, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics))
IdleLeak: Exploiting Idle State Side Effects for Information Leakage
Rauscher F., Kogler A., Juffinger J., Gruß D.
Network and Distributed System Security Symposium (NDSS) 2024, Network and Distributed System Security Symposium 2024
Learning and Repair of Deep Reinforcement Learning Policies from Fuzz-Testing Data
Tappler M., Pferscher A., Aichernig B., Könighofer B.
ICSE 2024 - Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 46th International Conference on Software Engineering, 27-39
Welcome Remarks from AISoLA 2023/Track C2 Chairs
Jansen N., Könighofer B., Křetínský J., Larsen K.
Bridging the Gap Between AI and Reality - 1st International Conference, AISoLA 2023, Proceedings, 1st International Conference on Bridging the Gap between AI and Reality, 25-32, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14380 LNCS)
On Threat Model Repair
Bloem R., Chlup S., Nickovic D., Schmittner C.
Memory Tagging using Cryptographic Integrity on Commodity x86 CPUs
Schrammel D., Unterguggenberger M., Lamster L., Sultana S., Grewal K., LeMay M., Durham D., Mangard S.
Proceedings - 9th IEEE European Symposium on Security and Privacy, Euro S and P 2024, 9th IEEE European Symposium on Security and Privacy, 311-326
Voodoo: Memory Tagging, Authenticated Encryption, and Error Correction through MAGIC
Lamster L., Unterguggenberger M., Schrammel D., Mangard S.
Proceedings of the 33rd USENIX Conference on Security Symposium, 33rd USENIX Security Symposium: USENIX Security 2024, 7159 - 7176
Continuous Engineering for Trustworthy Learning-Enabled Autonomous Systems
Bensalem S., Katsaros P., Nickovic D., Liao B., Nolasco R., Ahmed M., Beyene T., Cano Cordoba F., Delacourt A., Esen H., Forrai A., He W., Huang X., Kekatos N., Könighofer B., Paulitsch M., Peled D., Ponchant M., Sorokin L., Tong S., Wu C.
Bridging the Gap Between AI and Reality - 1st International Conference, AISoLA 2023, Proceedings, 1st International Conference on Bridging the Gap between AI and Reality, 256-278, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14380 LNCS)
soid: A Tool for Legal Accountability for Automated Decision Making
Judson S., Elacqua M., Cano Cordoba F., Antonopoulos T., Könighofer B., Shapiro S., Piskac R.
Computer Aided Verification - 36th International Conference, CAV 2024, Proceedings, 36th International Conference on Computer Aided Verification, 233–246, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14682 LNCS)
Test Where Decisions Matter: Importance-driven Testing for Deep Reinforcement Learning
Pranger S., Chockler H., Tappler M., Könighofer B.
Conference on Neural Information Processing Systems (NeurIPS), 38th Annual Conference on Neural Information Processing Systems, NeurIPS 2024