explore Our
Publications
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Kales D., Rechberger C., Schneider T., Senker M., Weinert C.
28th USENIX Security Symposium, 28th USENIX Security Symposium, 1447-1464
Canella C., Bulck J., Schwarz M., Lipp M., Berg B., Ortner P., Piessens F., Evtyushkin D., Gruß D.
Proceedings of the 28th USENIX Security Symposium, USENIX Association, 249-266
Marsalek A., Zefferer T.
2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019, 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering, 554-561
Marsalek A., Zefferer T., Fasllija E., Ziegler D.
2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering, 626-633, (Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019)
Werner M., Unterluggauer T., Giner L., Schwarz M., Gruß D., Mangard S.
28th USENIX Security Symposium (USENIX Security 19), USENIX Association, 675-692
Mödersheim S., Schlichtkrull A., Wagner G., More S., Alber L.
Trust Management XIII, IFIPTM 2019, 209-223
Avni G., Bloem R., Chatterjee K., Henzinger T., Könighofer B., Pranger S.
Computer Aided Verification (CAV), 31st International Conference on Computer Aided Verification, 630-649, ( Lecture Notes in Computer Science; vol. 11561)
Bharadwaj S., Bloem R., Dimitrova R., Könighofer B., Topcu U.
2019 American Control Conference (ACC), 2019 American Control Conference, 1048-1055
Prünster B., Fasllija E., Mocher D.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, SciTePress - Science and Technology Publications, 252--259
Schwarz M., Weiser S., Gruß D.
Detection of Intrusions and Malware, and Vulnerability Assessment, 16th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, 177-196, (Lecture Notes in Computer Science; vol. 11543)
Theuermann K., Tauber A., Lenz T.
ICC 2019 - 2019 IEEE International Conference on Communications (ICC), 2019 IEEE International Conference on Communications
Schwarz M., Schilling R., Kargl F., Lipp M., Canella C., Gruß D.
, Cornell University Library, (arXiv.org e-Print archive)
Kocher P., Horn J., Fogh A., Genkin D., Gruß D., Haas W., Hamburg M., Lipp M., Mangard S., Prescher T., Schwarz M., Yarom Y.
40th IEEE Symposium on Security and Privacy
Schwarz M., Canella C., Giner L., Gruß D.
, Cornell University Library, (arXiv.org e-Print archive)
Marsalek A., Kollmann C., Zefferer T., Teufl P.
ICBC 2019 - IEEE International Conference on Blockchain and Cryptocurrency, 1st IEEE International Conference on Blockchain and Cryptocurrency, 394-402
Theuermann K., Zefferer T., Lenz T., Tauber A.
Handbuch E-Government, Springer Fachmedien Wiesbaden, 1-30
Priesnitz Filho W., Ribeiro C., Zefferer T.
Future Generation Computer Systems, Vol. 92(Volume 92), 1-16
Römer K., Witrisal K., Baunach M., Bloem R., Horn M.
Proceedings of the International Conference on Sensor Networks (SENSORNETS) 2019
Schwarz M., Lackner F., Gruß D.
NDSS, Network and Distributed System Security Symposium 2018
Omolola O., More S., Fasllija E., Wagner G., Alber L.
Open Identity Summit 2019, Proceedings, Open Identity Summit 2019, 157-163, (Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI); vol. P-293)