explore Our
Publications
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Rauscher F., Fiedler C., Kogler A., Gruß D.
Network and Distributed System Security Symposium (NDSS) 2025, Network and Distributed System Security Symposium 2025
Juffinger J., Rauscher F., La Manna G., Gruß D.
Network and Distributed System Security (NDSS) Symposium 2025, Network and Distributed System Security Symposium 2025
Gast S., Weissteiner H., Schröder R., Gruß D.
Network and Distributed System Security (NDSS) Symposium 2025, Network and Distributed System Security Symposium 2025
Unterguggenberger M., Lamster L., Schrammel D., Schwarzl M., Mangard S.
Network and Distributed System Security (NDSS) Symposium 2025, Network and Distributed System Security Symposium 2025
Rauscher F., Gruß D.
ACM Conference on Computer and Communications Security (CCS) 2024, ACM Conference on Computer and Communications Security
Grass A., Hirschberg U.
Data-Driven Intelligence, 42nd eCAADe Conference on Education and research in Computer Aided Architectural Design in Europe. Data-Driven Intelligence, 639-646
Grassi L., Khovratovich D., Lüftenegger R., Rechberger C., Schofnegger M., Walch R.
IACR Transactions on Symmetric Cryptology, Vol. 2024(3), 44-83
Tollec S., Hadzic V., Nasahl P., Asavoae M., Bloem R., Couroussé D., Heydemann K., Jan M., Mangard S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(4), 179-204
Haring J., Hadzic V., Bloem R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(4), 110-132
Fasllija E., Heher J., More S.
18th International Conference on Network and System Security Proceedings, 18th International Conference on Network and System Security, ( Lecture Notes in Computer Science)
Burgstaller T., Garber D., Le V., Felfernig A.
SPLC 2024 - 28th ACM International Systems and Software Product Line Conference, Proceedings, 28th ACM International Systems and Software Product Line Conference, 36 - 46, (ACM International Conference Proceeding Series)
Maderbacher B., Schupp S., Bartocci E., Bloem R., Nickovic D., Könighofer B.
International Journal on Software Tools for Technology Transfer
Schmid F., Rechberger C., Grassi L., Liu F., Walch R., Wang Q.
Selected Areas in Cryptography, Springer
Draschbacher F., Maar L.
Annual Computer Security Applications Conference, Annual Computer Security Applications Conference
Hirner F., Streibl M., Krieger F., Mert A., Sinha Roy S.
ACM Conference on Computer and Communications Security (CCS) 2024, ACM/IEEE
Maar L., Draschbacher F., Lamster L., Mangard S.
Usenix Security Symposium 2024, 33rd USENIX Security Symposium: USENIX Security 2024
Prutsch A., Possegger H., Bischof H.
2024 IEEE International Conference on Robotics and Automation (ICRA), 2024 IEEE International Conference on Robotics and Automation, 10757-10763
Chakraborty D., Hadipour H., Nguyen P., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2024(3)
Gast S., Czerny R., Juffinger J., Rauscher F., Franza S., Gruß D.
USENIX Security Symposium 2024, 33rd USENIX Security Symposium: USENIX Security 2024, 2315-2332
Maar L., Gast S., Unterguggenberger M., Oberhuber M., Mangard S.
Usenix Security Symposium 2024, 33rd USENIX Security Symposium: USENIX Security 2024, 4051-4068