explore Our
Publications
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Koch K., Krenn S., Marc T., More S., Ramacher S.
DE 2022 - Proceedings of the 1st International Workshop on Data Economy, Part of CoNEXT 2022, 2022 International Conference on Emerging Networking Experiments and Technologies, 15-20, (DE 2022 - Proceedings of the 1st International Workshop on Data Economy, Part of CoNEXT 2022)
Galijatovic E., Eichlseder M., Heindl S., Klug C.
Frontiers in Future Transportation, Vol. 3
Mert A., Aikata A., Kwon S., Shiin Y., Yoo D., Lee Y., Sinha Roy S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2023(1), 463-500
Bloem R., Gigerl B., Gourjon M., Hadzic V., Mangard S., Primas R.
CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022 ACM SIGSAC Conference on Computer and Communications Security, 381-395, (Proceedings of the ACM Conference on Computer and Communications Security)
Dobraunig C., Kales D., Rechberger C., Schofnegger M., Zaverucha G.
CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 29th ACM Conference on Computer and Communications Security, 843–857, (Proceedings of the ACM Conference on Computer and Communications Security)
Lüftenegger R., Rechberger C., Grassi L., Schofnegger M., Walch R., Khovratovich D.
CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022 ACM SIGSAC Conference on Computer and Communications Security, 1323–1335, (Proceedings of the ACM Conference on Computer and Communications Security)
Bartocci E., Bloem R., Maderbacher B., Manjunath N., Nickovic D.
Nonlinear Analysis: Hybrid Systems, Vol. 46
Kundu A., Aikata A., Karmakar B., Saha D.
Journal of Cryptographic Engineering, Vol. 12(4), 475–494
Zhang J., Huang J., Liu Z., Sinha Roy S.
IEEE Transactions on Computers, Vol. 71(11), 2996-3007
Schilling R., Nasahl P., Unterguggenberger M., Mangard S.
HASP 2022 - Hardware and Architectural Support for Security and Privacy, Hardware and Architectural Support for Security and Privacy, 18-26
Schwarzl M., Borrello P., Kogler A., Varda K., Schuster T., Schwarz M., Gruß D.
European Symposium on Research in Computer Security (ESORICS), 27th European Symposium on Research in Computer Security
Könighofer B., Rudolf J., Palmisano A., Tappler M., Bloem R.
Innovations in Systems and Software Engineering
Grass A., Parger A.
Co-creating the Future: Inclusion in and through Design, 40th eCAADe Conference on Education and Research in Computer Aided Architectural Design in Europe, 431–440
Hadipour H., Nageler M., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2022(3), 271-302
Hadzic V., Primas R., Bloem R.
Innovations in Systems and Software Engineering, Vol. 18(3), 471-481
Nasahl P., Osorio M., Vogel P., Schaffner M., Trippel T., Rizzo D., Mangard S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022(4), 56–87
Nagpal R., Gigerl B., Primas R., Mangard S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022(4), 693–717
More S., Alber L.
Proceedings of the 17th International Conference on Availability, Reliability and Security, ARES 2022, 17th International Conference on Availability, Reliability and Security, (ACM International Conference Proceeding Series)
Giner L., Kogler A., Canella C., Schwarz M., Gruß D.
31th USENIX Security Symposium (USENIX Security 22), 31st USENIX Security Symposium
Kogler A., Juffinger J., Qazi S., Kim Y., Lipp M., Boichat N., Shiu E., Nissler M., Gruß D.
Proceedings of the 31st USENIX Security Symposium, 31st USENIX Security Symposium, 3807-3824