explore Our
Publications
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Juffinger J., Neela S., Gruß D.
Applied Cryptography and Network Security, 23rd International Conference on Applied Cryptography and Network Security
Rauscher F., Fiedler C., Kogler A., Gruß D.
Network and Distributed System Security Symposium (NDSS) 2025, Network and Distributed System Security Symposium 2025
Juffinger J., Rauscher F., La Manna G., Gruß D.
Network and Distributed System Security (NDSS) Symposium 2025, Network and Distributed System Security Symposium 2025
Gast S., Weissteiner H., Schröder R., Gruß D.
Network and Distributed System Security (NDSS) Symposium 2025, Network and Distributed System Security Symposium 2025
Unterguggenberger M., Lamster L., Schrammel D., Schwarzl M., Mangard S.
Network and Distributed System Security (NDSS) Symposium 2025, Network and Distributed System Security Symposium 2025
Garber D., Felfernig A., Le V., Burgstaller T., El Mansi M.
Proceedings of the 26th International Workshop on Configuration (ConfWS 2024) co-located with the 30th International Conference on Principles and Practice of Constraint Programming (CP 2024), 26th International Workshop on Configuration, 81-90
Rauscher F., Gruß D.
ACM Conference on Computer and Communications Security (CCS) 2024, ACM Conference on Computer and Communications Security
Maderbacher B., Windisch F., Bloem R.
Leveraging Applications of Formal Methods, Verification and Validation
Grass A., Hirschberg U.
Data-Driven Intelligence, 42nd eCAADe Conference on Education and research in Computer Aided Architectural Design in Europe. Data-Driven Intelligence, 639-646
Grassi L., Khovratovich D., Lüftenegger R., Rechberger C., Schofnegger M., Walch R.
IACR Transactions on Symmetric Cryptology, Vol. 2024(3), 44-83
Tollec S., Hadzic V., Nasahl P., Asavoae M., Bloem R., Couroussé D., Heydemann K., Jan M., Mangard S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(4), 179-204
Haring J., Hadzic V., Bloem R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(4), 110-132
Fasllija E., Heher J., More S.
18th International Conference on Network and System Security Proceedings, 18th International Conference on Network and System Security, ( Lecture Notes in Computer Science)
Burgstaller T., Garber D., Le V., Felfernig A.
SPLC 2024 - 28th ACM International Systems and Software Product Line Conference, Proceedings, 28th ACM International Systems and Software Product Line Conference, 36 - 46, (ACM International Conference Proceeding Series)
Maderbacher B., Schupp S., Bartocci E., Bloem R., Nickovic D., Könighofer B.
International Journal on Software Tools for Technology Transfer
Schmid F., Rechberger C., Grassi L., Liu F., Walch R., Wang Q.
Selected Areas in Cryptography, Springer
Draschbacher F., Maar L.
Annual Computer Security Applications Conference, Annual Computer Security Applications Conference
Hirner F., Streibl M., Krieger F., Mert A., Sinha Roy S.
ACM Conference on Computer and Communications Security (CCS) 2024, ACM/IEEE
Maar L., Draschbacher F., Lamster L., Mangard S.
Usenix Security Symposium 2024, 33rd USENIX Security Symposium: USENIX Security 2024
Prutsch A., Possegger H., Bischof H.
2024 IEEE International Conference on Robotics and Automation (ICRA), 2024 IEEE International Conference on Robotics and Automation, 10757-10763