Publications &
Talks
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Weiser S., Werner M.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 7th ACM Conference on Data and Application Security and Privacy, 261-268
Chase M., Derler D., Goldfeder S., Orlandi C., Ramacher S., Rechberger C., Slamanig D., Zaverucha G.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, USA, October 30 - November 3, 2017
Grassi L., Rechberger C., Rønjom S.
Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings, 289-317, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10211 LNCS)
Eichlseder M., Dobraunig C., Mendel F.
Selected Areas in Cryptography - SAC 2016, 23rd Conference on Selected Areas in Cryptography, 284-298, (Lecture Notes in Computer Science; vol. 10532)
Dobraunig C., Eichlseder M., Korak T., Mendel F.
Constructive Side-Channel Analysis and Secure Design, COSADE 2017, 138-152, (Lecture Notes in Computer Science; vol. 10348)
Boano C., Römer K., Bloem R., Witrisal K., Baunach M., Horn M.
e&i - Elektrotechnik und Informationstechnik, Vol. 133(7), 304–309
Groß H., Mangard S., Korak T.
ACM Workshop on Theory of Implementation SecurityWorkshop, 3
Gruß D., Maurice C., Fogh A., Lipp M., Mangard S.
CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 23rd ACM Conference on Computer and Communications Security, CCS 2016, 368-379
Van Der Veen V., Fratantonio Y., Lindorfer M., Gruß D., Maurice C., Vigna G., Bos H., Razavi K., Giuffrida C.
CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 23rd ACM Conference on Computer and Communications Security, CCS 2016, 1675-1689
Reimair F., Prünster B., Reiter A., Ertler C.
2016 IEEE Conference on Communications and Network Security (CNS 2016)
Reimair F., Kollmann C., Marsalek A.
2016 IEEE Conference on Communications and Network Security (CNS 2016)
Brügger B., Lipp P.
, 15
Spreitzer R., Griesmayr S., Korak T., Mangard S.
9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2016), Darmstadt, Germany, ACM Conference on Security and Privacy in Wireless and Mobile Networks
Gruß D., Maurice C., Mangard S.
Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), (DIMVA
Braud-Santoni N., Bloem R., Jacobs S.
Jacobs S., Bloem R., Brenguier R., Ehlers R., Hell T., Könighofer R., Pérez G., Raskin J., Ryzhyk L., Sankur O., Seidl M., Tentrup L., Walker A.
International journal on software tools for technology transfer, 1-24
Reiter A., Zefferer T.
2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, IEEE Mobile Cloud
Reimair F., Teufl P., Zefferer T.
Web Information Systems and Technologies, 11th International Conference, WEBIST 2015, Lisbon, Portugal, May 20-22, 2015, Revised Selected Papers, 70-90, (Lecture Notes in Business Information Processing; vol. 246)
Werner M., Wenger E., Mangard S.
Smart Card Research and Advanced Applications, 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers, International Conference on Smart Card Research and Advanced Applications
Jacobs S., Bloem R., Brenguier R., Pérez G., Raskin J., Ryzhyk L., Sankur O., Seidl M., Tentrup L., Walker A., Könighofer R.
Electronic Proceedings in Theoretical Computer Science, Vol. 202, 27-57