We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Cryptographic Least Privilege Enforcement for Scalable Memory Isolation
Unterguggenberger M., Schrammel D., Maar L., Lamster L., Hadzic V., Mangard S.
IEEE International Symposium on Hardware Oriented Security and Trust (HOST), IEEE International Symposium on Hardware Oriented Security and Trust 2025: HOST 2025
Efficient and Composable Masked AES S-Box Designs Using Optimized Inverters
Hadzic V., Bloem R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2025(1), 656-683
Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults
Tollec S., Hadzic V., Nasahl P., Asavoae M., Bloem R., Couroussé D., Heydemann K., Jan M., Mangard S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(4), 179-204
Closing the Gap: Leakage Contracts for Processors with Transitions and Glitches
Haring J., Hadzic V., Bloem R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(4), 110-132
Quantile: Quantifying Information Leakage
Hadzic V., Cassiers G., Primas R., Mangard S., Bloem R.
Quantile: Quantifying Information Leakage
Hadzic V., Cassiers G., Primas R., Mangard S., Bloem R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(1), 433-456
Power Contracts: Provably Complete Power Leakage Models for Processors
Bloem R., Gigerl B., Gourjon M., Hadzic V., Mangard S., Primas R.
CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022 ACM SIGSAC Conference on Computer and Communications Security, 381-395, (Proceedings of the ACM Conference on Computer and Communications Security)
Proving SIFA protection of masked redundant circuits
Hadzic V., Primas R., Bloem R.
Innovations in Systems and Software Engineering, Vol. 18(3), 471-481
FERPModels: A Certification Framework for Expansion-Based QBF Solving
Bloem R., Hadzic V., Shukla ., Seidl M.
Proceedings - 2022 24th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, SYNASC 2022, 24th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 80-83
Two SAT solvers for solving quantified Boolean formulas with an arbitrary number of quantifier alternations
Bloem R., Braud-Santoni N., Hadzic V., Seidl M., Lonsing F., Egly U.
Formal Methods in System Design, Vol. 57(2), 157-177
CocoAlma: A Versatile Masking Verifier
Hadzic V., Bloem R.
Proceedings of the 21st Formal Methods in Computer-Aided Design, FMCAD 2021, 21st International Conference on Formal Methods in Computer-Aided Design, 14-23, (Proceedings of the 21st Formal Methods in Computer-Aided Design, FMCAD 2021)
Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs
Gigerl B., Hadzic V., Primas R., Mangard S., Bloem R.
Proceedings of the 30th USENIX Security Symposium, 30th USENIX Security Symposium, 1469-1486
Proving SIFA Protection of Masked Redundant Circuits
Hadzic V., Primas R., Bloem R.
Automated Technology for Verification and Analysis, 19th International Symposium on Automated Technology for Verification and Analysis , 249-265, (Lecture Notes in Computer Science; vol. 12971)
Take A Way: Exploring the Security Implications of AMD's Cache Way Predictors
Lipp M., Hadzic V., Schwarz M., Perais A., Maurice C., Gruß D.
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020, 15th ACM ASIA Conference on Computer and Communications Security, 813–825
Expansion-Based QBF Solving Without Recursion
Bloem R., Braud-Santoni N., Hadzic V., Egly U., Lonsing F., Seidl M.
fmcad.18, 18th Conference on Formal Methods in Computer-Aided Design, 40-49