We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
SPEAR-V: Secure and Practical Enclave Architecture for RISC-V
Schrammel D., Waser M., Lamster L., Unterguggenberger M., Mangard S.
ASIA CCS 2023 - Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023 ACM ASIA Conference on Computer and Communications Security, 457-468, (Proceedings of the ACM Conference on Computer and Communications Security)
Secure Context Switching of Masked Software Implementations
Gigerl B., Primas R., Mangard S.
ASIA CCS 2023 - Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 18th ACM ASIA Conference on Computer and Communications Security, 980-992, (Proceedings of the ACM Conference on Computer and Communications Security)
CryptoShield - Automatic On-Device Mitigation for Crypto API Misuse in Android Applications
Draschbacher F., Feichtner J.
ASIA CCS 2023 - Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 18th ACM ASIA Conference on Computer and Communications Security, 899-912, (Proceedings of the ACM Conference on Computer and Communications Security)
Smoothing the Ride: Providing a Seamless Upgrade Path from Established Cross-Border eID Workflows Towards eID Wallet Systems
Czerny R., Kollmann C., Podgorelec B., Prünster B., Zefferer T.
SECRYPT 2023 - Proceedings of the 20th International Conference on Security and Cryptography, 20th International Conference on Security and Cryptography: SECRYPT 2023, 460-468, (Proceedings of the International Conference on Security and Cryptography; vol. 1)
Scatter and Split Securely: Defeating Cache Contention and Occupancy Attacks
Giner L., Steinegger S., Purnal A., Eichlseder M., Unterluggauer T., Mangard S., Gruß D.
2023 IEEE Symposium on Security and Privacy (SP), 44th IEEE Symposium on Security and Privacy, 2273-2287
OCScraper: Automated Analysis of the Fingerprintability of the iOS API
Palfinger G.
SECRYPT 2023 - Proceedings of the 20th International Conference on Security and Cryptography, 20th International Conference on Security and Cryptography: SECRYPT 2023, 433-441, (Proceedings of the International Conference on Security and Cryptography; vol. 1)
Kavach: Lightweight masking techniques for polynomial arithmetic in lattice-based cryptography
Aikata A., Basso A., Cassiers G., Mert A., Sinha Roy S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2023(3), 366-390
SCRAMBLE-CFI: Mitigating Fault-Induced Control-Flow Attacks on OpenTitan
Nasahl P., Mangard S.
GLSVLSI 2023 - Proceedings of the Great Lakes Symposium on VLSI 2023, 2023 ACM Great Lakes Symposium on VLSI, 45 - 50, (Proceedings of the ACM Great Lakes Symposium on VLSI, GLSVLSI)
A Unified Cryptoprocessor for Lattice-based Signature and Key-exchange
Aikata A., Mert A., Jacquemin D., Das A., Matthews D., Ghosh S., Sinha Roy S.
IEEE Transactions on Computers, Vol. 72(6), 1568-1580
Formal Verification of Arithmetic Masking in Hardware and Software
Gigerl B., Primas R., Mangard S.
Applied Cryptography and Network Security , 21st International Conference on Applied Cryptography and Network Security, 3-32, (Lecture Notes in Computer Science; vol. 13905)
HashTag: Hash-based Integrity Protection for Tagged Architectures
Lamster L., Unterguggenberger M., Schrammel D., Mangard S.
Proceedings of the 32nd USENIX Security Symposium, 32nd USENIX Security Symposium, 2797-2814
Machine Learning Based Risk Prediction for Major Adverse Cardiovascular Events for ELGA-Authorized Clinics
Polat Erdeniz S., Kramer D., Schrempf M., Rainer P., Felfernig A., Tran T., Burgstaller T., Lubos S.
Studies in Health Technology and Informatics, Vol. 301, 20-25
CustomProcessingUnit: Reverse Engineering and Customization of Intel Microcode
Borrello P., Easdon C., Schwarzl M., Czerny R., Schwarz M.
IEEE Workshop on Offensive Technologies (WOOT 23), 17th IEEE Workshop on Offensive Technologies
Provable Correct and Adaptive Simplex Architecture for Bounded-Liveness Properties
Maderbacher B., Schupp S., Bartocci E., Bloem R., Nickovic D., Könighofer B.
Model Checking Software - 29th International Symposium, SPIN 2023, Proceedings, 29th International Symposium on Model Checking of Software, 141-160, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13872 LNCS)
High-speed Design of Post Quantum Cryptography with Optimized Hashing and Multiplication
Imran M., Aikata A., Sinha Roy S., Pagliarini S.
IEEE Transactions on Circuits and Systems, Part II: Express Briefs , 1
Digital Communication Tools in Private and Professional Environments
Keller S., Pirker J., List E.
Learning in the Age of Digital and Green Transition , 25th International Conference on Interactive Collaborative Learning "Learning in the Age of Digital and Green Transition", 36-43, (Lecture Notes in Networks and Systems; vol. 633)
Finding Collisions for Round-Reduced Romulus-H
Nageler M., Pallua F., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2023(1), 67-88
A Systematic Approach to Automotive Security
Ebrahimi M., Marksteiner S., Nickovic D., Bloem R., Schögler D., Eisner P., Sprung S., Schober T., Chlup S., Schmittner C., König S.
Formal Methods - 25th International Symposium, FM 2023, Proceedings, 25th International Symposium on Formal Methods, 598-609, (Lecture Notes in Computer Science; vol. 14000)
Extending Expressive Access Policies with Privacy Features
More S., Ramacher S., Alber L., Herzl M.
The 21th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2022), 21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 574-581
Preventing a Cryptoapocalypse
Sinha Roy S., Banerjee U.
IEEE Solid-State Circuits Magazine, Vol. 15, 38-44