We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Synthesis from Infinite-State Generalized Reactivity(1) Specifications
Maderbacher B., Windisch F., Bloem R.
Leveraging Applications of Formal Methods, Verification and Validation
On Threat Model Repair
Bloem R., Chlup S., Nickovic D., Schmittner C.
Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering Methodologies. ISoLA 2024
Active Model Learning of Git Version Control System
Muskardin E., Burgstaller T., Tappler M., Aichernig B.
Proceedings - 2024 IEEE International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2024
Monolith
Grassi L., Khovratovich D., Lüftenegger R., Rechberger C., Schofnegger M., Walch R.
IACR Transactions on Symmetric Cryptology, Vol. 2024(3), 2024
Finding Complete Impossible Differential Attacks on AndRX Ciphers and Efficient Distinguishers for ARX Designs
Chakraborty D., Hadipour H., Nguyen P., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2024(3), 2024
Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults
Tollec S., Hadzic V., Nasahl P., Asavoae M., Bloem R., Couroussé D., Heydemann K., Jan M., Mangard S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(4), 2024
Closing the Gap: Leakage Contracts for Processors with Transitions and Glitches
Haring J., Hadzic V., Bloem R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(4), 2024
Exact Soft Analytical Side-Channel Attacks using Tractable Circuits
Wedenig T., Nagpal R., Cassiers G., Mangard S., Peharz R.
Proceedings of Machine Learning Research, Vol. 235, 2024
Optimization Space Learning: A Lightweight, Noniterative Technique for Compiler Autotuning
Burgstaller T., Garber D., Le V., Felfernig A.
SPLC 2024 - 28th ACM International Systems and Software Product Line Conference, Proceedings
Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT
Hadipour H., Derbez P., Eichlseder M.
Advances in Cryptology – CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings
Defects-in-Depth: Analyzing the Integration of Effective Defenses against One-Day Exploits in Android Kernels
Maar L., Draschbacher F., Lamster L., Mangard S.
Usenix Security Symposium 2024
Action-By-Detection
Prutsch A., Possegger H., Bischof H.
2024 IEEE International Conference on Robotics and Automation (ICRA)
SnailLoad: Exploiting Remote Network Latency Measurements without JavaScript
Gast S., Czerny R., Juffinger J., Rauscher F., Franza S., Gruß D.
Proceedings of the 33rd USENIX Security Symposium
SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel
Maar L., Gast S., Unterguggenberger M., Oberhuber M., Mangard S.
Proceedings of the 33rd USENIX Security Symposium
Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks
Schröder R., Gast S., Guo Q.
Proceedings of the 33rd USENIX Security Symposium
Service Provider Accreditation: Enabling and Enforcing Privacy-by-Design in Credential-based Authentication Systems
More S., Heher J., Fasllija E., Mathie M.
ARES 2024 - 19th International Conference on Availability, Reliability and Security, Proceedings
COMPRESS: Generate Small and Fast Masked Pipelined Circuits
Cassiers G., Gigerl B., Mangard S., Momin C., Nagpal R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(3), 2024
Abstraction-Based Decision Making for Statistical Properties
Cano F., Henzinger T., Könighofer B., Kueffner K., Mallik K.
9th International Conference on Formal Structures for Computation and Deduction, FSCD 2024
Generic and Automated Drive-by GPU Cache Attacks from the Browser
Giner L., Czerny R., Gruber C., Rauscher F., Kogler A., De Almeida Braga D., Gruß D.
ACM AsiaCCS
Beyond the Edges of Kernel Control-Flow Hijacking Protection with HEK-CFI
Maar L., Nasahl P., Mangard S.
ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security
