Publications &
Talks
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Reiter A., Suzic B., Leitold H., Marsalek A., Prünster B., Ziegler D.
Groß H., Jelinek M., Mangard S., Unterluggauer T., Werner M.
15th Smart Card Research and Advanced Application Conference - CARDIS 2016, 15th Smart Card Research and Advanced Application Conference , 89-104
Unterluggauer T., Werner M., Mangard S.
ACM Asia Conference on Computer and Communications Security - ASIACCS'17, ACM Asia Conference on Computer and Communications Security, 690-702
Dobraunig C., Eichlseder M., Mangard S., Mendel F., Unterluggauer T.
IACR Transactions on Symmetric Cryptology, Vol. 2017(1), 80-105
Primas R., Peßl P., Mangard S.
Cryptographic Hardware and Embedded Systems – CHES 2017, 513-533, (Lecture Notes in Computer Science; vol. 10529)
Gruß D., Lipp M., Schwarz M., Fellner R., Maurice C., Mangard S.
Engineering Secure Software and Systems - 9th International Symposium, ESSoS 2017, Proceedings, 9th International Symposium on Engineering Secure Software and Systems, ESSoS 2017, 161-176, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10379 LNCS)
Lipp M., Gruß D., Schwarz M., Bidner D., Maurice C., Mangard S.
Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings, 22nd European Symposium on Research in Computer Security, ESORICS 2017, 191-209, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10493 LNCS)
Schwarz M., Weiser S., Gruß D., Maurice C., Mangard S.
Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, 2017, 14th International Conference on Detection of Intrusions and Malware, and Vulnerability Assess, DIMVA 2017, 3-24, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10327 LNCS)
Groß H., Mangard S.
CHES, 115-136, (Lecture Notes in Computer Science
Groß H., Mangard S., Korak T.
CT-RSA, 95-112, (Lecture Notes in Computer Science
Groß H., Schaffenrath D., Mangard S.
DSD, 205-212
Gürkaynak F., Schilling R., Mühlberghuber M., Conti F., Mangard S., Benini L.
CS2 '17, Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems , CS2 Cryptography and Security in Computing Systems, 19-24
Dash P., Rabensteiner C., Hörandner F., Roth S.
Open Identity Summit 2017
Tappler M., Aichernig B., Bloem R.
2017 IEEE International Conference on Software Testing, Verification and Validation (ICST), 10th IEEE International Conference on Software Testing, Verification and Validation (ICST 2017), 276-287
Khalimov A., Bloem R.
CAV
Bloem R., Chockler H., Ebrahimi M., Strichman O.
Verification, Model Checking, and Abstract Interpretation, 55-72
Zefferer T.
WEBIST 2015 - Selected and Revised Papers, 343
Reiter A., Prünster B., Zefferer T.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, 935-944
Reiter A., Marsalek A.
Proceedings of the Symposium on Applied Computing, 664-669
Schweighofer E., Leitold H., Mitrakas A., Rannenberg K.