explore Our
Publications
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Easdon C., Schwarz M., Schwarzl M., Gruß D.
Proceedings of the 31st USENIX Security Symposium, Security 2022, 31st USENIX Security Symposium, 3861-3877
Lipp M., Gruß D., Schwarz M.
Proceedings of the 31st USENIX Security Symposium, Security 2022, 31st USENIX Security Symposium, 643-660
Aikata A., Mert A., Imran M., Pagliarini S., Sinha Roy S.
IEEE Transactions on Circuits and Systems I: Regular Papers, Vol. 2022, 1-12
Ravi P., Ezerman M., Bhasin S., Chattopadhyay A., Sinha Roy S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022(1), 722–761
Podgorelec B., Alber L., Zefferer T.
Proceedings - 2022 IEEE 46th Annual Computers, Software, and Applications Conference, COMPSAC 2022, 46th IEEE Computer Society Signature Conference on Computers, Software, and Applications: Computers, Software & Applications in an Uncertain World, 809-818, (Proceedings - 2022 IEEE 46th Annual Computers, Software, and Applications Conference, COMPSAC 2022)
Podgorelec B., Loupos K., Kalogirou C., Niavis H., Skarmeta Gomez A., Torroglosa-Garcia E., Palomares A., Song H., Brun P., Giampaolo F., Van Landuyt D., Michiels S., Xenakis C., Bampatsikos M., Krilakis K.
Internet of Things , 5th The Global IoT Summit, 338–347, (Lecture Notes in Computer Science; vol. 13533)
Soleimany H., Bagheri N., Hadipour H., Ravi P., Bhasin S., Mansouri S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022(1), 367-390
Ravi P., Bhasin S., Sinha Roy S., Chattopadhyay A.
IEEE Transactions on Information Forensics and Security, Vol. 17, 684-699
Naseredini A., Gast S., Schwarzl M., Bernardo P., Smajic A., Canella C., Berger M., Gruß D.
Canella C., Werner M., Gruß D., Schwarz M.
CCSW'21 - Proceedings of the 2021 Cloud Computing Security Workshop, ACM Cloud Computing Security Workshop 2021, 139-151
Imran M., Almeida F., Raik J., Basso A., Sinha Roy S., Pagliarini S.
ASHES '21: Proceedings of the 5th Workshop on Attacks and Solutions in Hardware Security, 5th Workshop on Attacks and Solutions in Hardware Security, 85-90
Xu Z., Pemberton O., Sinha Roy S., Oswald D., Yao W., Zheng Z.
IEEE Transactions on Computers
Steinegger S., Schrammel D., Weiser S., Nasahl P., Mangard S.
Computer Security – ESORICS 2021, 26th European Symposium on Research in Computer Security, 370-391, (Lecture Notes in Computer Science; vol. 12973)
Grass A., Parger A.
Towards a new, configurable architecture - Proceedings of the 39th eCAADe Conference, 39th eCAADe Conference: Education and Research in Computer Aided Architectural Design in Europe: Towards a new, configurable architecture, 181-188
Grass A.
Virtual Aesthetics in Architecture , Routledge, Taylor and Francis, 186 - 189
Bloem R., Braud-Santoni N., Hadzic V., Seidl M., Lonsing F., Egly U.
Formal Methods in System Design, Vol. 57(2), 157-177
Tappler M., Aichernig B., Bacci G., Eichlseder M., Larsen K.
Formal Aspects of Computing, Vol. 33(4-5), 575-615
Purnal A., Giner L., Gruß D., Verbauwhede I.
2021 IEEE Symposium on Security and Privacy (SP), 42th IEEE Symposium on Security and Privacy, 987-1002