We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Trust and Privacy in a Heterogeneous World
More S.
, Doctoral Thesis
Efficient Design-Time Flexible Hardware Architecture for Accelerating Homomorphic Encryption
Ayduman C., Kocer E., Kirbiyik S., Mert A., Savaş E.
2023 IFIP/IEEE 31st International Conference on Very Large Scale Integration, VLSI-SoC 2023, 31st IFIP/IEEE International Conference on Very Large Scale Integration, (IEEE/IFIP International Conference on VLSI and System-on-Chip, VLSI-SoC)
Cryptographically Enforced Memory Safety
Unterguggenberger M., Schrammel D., Lamster L., Nasahl P., Mangard S.
CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 30th ACM Conference on Computer and Communications Security, 889-903, (CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security)
A Survey of Software Implementations for the Number Theoretic Transform
Mert A., Yaman F., Karabulut E., Öztürk E., Savaş E., Aysu A.
International Conference on Embedded Computer Systems , 2023 International Conference on Embedded Computer Systems
Improved Search for Integral, Impossible-Differential and Zero-Correlation Attacks
Hadipour H., Gerhalter S., Sadeghi S., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2024(1)
High-speed SABER Key Encapsulation Mechanism in 65nm CMOS
Imran M., Almeida F., Basso A., Sinha Roy S., Pagliarini S.
Journal of Cryptographic Engineering, Vol. 13(4), 461-471
Meta Form: Co-Creating Open Architectures
Grass A., Parger A.
Projects ACADIA Proceedings 2023, ACADIA 2023, 63-67
Collaborative Recommendation of Search Heuristics For Constraint Solvers
Garber D., Burgstaller T., Felfernig A., Le V., Lubos S., Tran T., Polat Erdeniz S.
, 38-44
CacheWarp: Software-based Fault Injection using Selective State Reset
Zhang R., Gerlach L., Weber D., Hetterich L., Lü Y., Kogler A., Schwarz M.
Proceedings of the 33nd USENIX Security Symposium, 33rd USENIX Security Symposium: USENIX Security 2024
FMTESTING: A FEATUREIDE Plug-in for Automated Feature Model Analysis and Diagnosis
Burgstaller T., Le V., Tran T., Felfernig A.
ECAI 2023 - 26th European Conference on Artificial Intelligence, including 12th Conference on Prestigious Applications of Intelligent Systems, PAIS 2023 - Proceedings, 26th European Conference on Artificial Intelligence , 3190 - 3195, (Frontiers in Artificial Intelligence and Applications; vol. 372)
Decentralized Participation and Agency in Digital Art and Architecture, An Exploration of Pixel and Voxel-Based Case Studies
Grass A.
eCAADe 2023 - Digital Design Reconsidered, 41st Conference on Education and Research in Computer Aided Architectural Design in Europe, 691-700
The QARMAv2 Family of Tweakable Block Ciphers
Avanzi R., Banik S., Dunkelman O., Eichlseder M., Ghosh S., Nageler M., Regazzoni F.
IACR Transactions on Symmetric Cryptology, Vol. 2023(3), 25-73
Finding the Impossible: Automated Search for Full Impossible-Differential, Zero-Correlation, and Integral Attacks
Hadipour H., Sadeghi S., Eichlseder M.
Advances in Cryptology – EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2023, Proceedings, 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 128-157, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2023)
Trust Scheme Interoperability: Connecting Heterogeneous Trust Schemes
More S.
ARES 2023 - 18th International Conference on Availability, Reliability and Security, Proceedings, The 18th International Conference on Availability, Reliability and Security, 1173-1181, (ACM International Conference Proceeding Series)
An inclusive Lifecycle Approach for IoT Devices Trust and Identity Management
Loupos K., Niavis H., Michalopoulos F., Misiakoulis G., Skarmeta A., García J., Palomares A., Song H., Dautov R., Giampaolo F., Mancilla R., Costantino F., Van Landuyt D., Michiels S., More S., Xenakis C., Bampatsikos M., Politis I., Krilakis K., Syvridis D.
ARES 2023 - 18th International Conference on Availability, Reliability and Security, Proceedings, The 18th International Conference on Availability, Reliability and Security, (ACM International Conference Proceeding Series)
A2P2 - An Android Application Patching Pipeline Based On Generic Changesets
Draschbacher F.
ARES 2023 - 18th International Conference on Availability, Reliability and Security, Proceedings, 18th International Conference on Availability, Reliability and Security, 55-65, (ACM International Conference Proceeding Series)
Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels
Kogler A., Juffinger J., Giner L., Gerlach L., Schwarzl M., Schwarz M., Gruß D., Mangard S.
32nd USENIX Security Symposium, USENIX Security 2023, 32nd USENIX Security Symposium, 7285-7302
PT-Guard: Integrity-Protected Page Tables to Defend Against Breakthrough Rowhammer Attacks
Saxena A., Saileshwar G., Juffinger J., Kogler A., Gruß D., Qureshi M.
Proceedings - 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2023, 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 95-108
Analyzing Intentional Behavior in Autonomous Agents Under Uncertainty
Cano Cordoba F., Judson S., Antonopoulos T., Bjørner K., Shoemaker N., Shapiro S., Piskac R., Könighofer B.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 32nd International Joint Conference on Artificial Intelligence, 372--381
Multi-Tag: A Hardware-Software Co-Design for Memory Safety based on Multi-Granular Memory Tagging
Unterguggenberger M., Schrammel D., Nasahl P., Schilling R., Lamster L., Mangard S.
ASIA CCS 2023 - Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023 ACM ASIA Conference on Computer and Communications Security, 177-189, (Proceedings of the ACM Conference on Computer and Communications Security)