explore Our
Publications
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Rauscher F., Fiedler C., Kogler A., Gruß D.
Network and Distributed System Security Symposium (NDSS) 2025, Network and Distributed System Security Symposium 2025
Juffinger J., Rauscher F., La Manna G., Gruß D.
Network and Distributed System Security (NDSS) Symposium 2025, Network and Distributed System Security Symposium 2025
Rauscher F., Gruß D.
ACM Conference on Computer and Communications Security (CCS) 2024, ACM Conference on Computer and Communications Security
Fasllija E., Heher J., More S.
18th International Conference on Network and System Security Proceedings, 18th International Conference on Network and System Security, ( Lecture Notes in Computer Science)
Maderbacher B., Schupp S., Bartocci E., Bloem R., Nickovic D., Könighofer B.
International Journal on Software Tools for Technology Transfer
Schmid F., Rechberger C., Grassi L., Liu F., Walch R., Wang Q.
Selected Areas in Cryptography, Springer
Draschbacher F., Maar L.
Annual Computer Security Applications Conference, Annual Computer Security Applications Conference
Hirner F., Streibl M., Krieger F., Mert A., Sinha Roy S.
ACM Conference on Computer and Communications Security (CCS) 2024, ACM/IEEE
Maar L., Draschbacher F., Lamster L., Mangard S.
Usenix Security Symposium 2024, 33rd USENIX Security Symposium: USENIX Security 2024
Chakraborty D., Hadipour H., Nguyen P., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2024(3)
Gast S., Czerny R., Juffinger J., Rauscher F., Franza S., Gruß D.
USENIX Security Symposium 2024, 33rd USENIX Security Symposium: USENIX Security 2024, 2315-2332
Maar L., Gast S., Unterguggenberger M., Oberhuber M., Mangard S.
Usenix Security Symposium 2024, 33rd USENIX Security Symposium: USENIX Security 2024, 4051-4068
More S., Heher J., Fasllija E., Mathie M.
ARES 2024 - 19th International Conference on Availability, Reliability and Security, Proceedings, 19th International Conference on Availability, Reliability and Security, (ACM International Conference Proceeding Series)
Juffinger J., Neela S., Heckel M., Schwarz L., Adamsky F., Gruß D.
Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), 21st Conference on Detection of Intrusions and Malware & Vulnerability Assessment
Giner L., Czerny R., Gruber C., Rauscher F., Kogler A., De Almeida Braga D., Gruß D.
2024 ACM ASIA Conference on Computer and Communications Security, 19th ACM ASIA Conference on Computer and Communications Security
Maar L., Nasahl P., Mangard S.
ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 19th ACM ASIA Conference on Computer and Communications Security, 866-882, (ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security)
Heimberger L., Hennerbichler T., Meisingseth F., Ramacher S., Rechberger C.
ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 19th ACM ASIA Conference on Computer and Communications Security, 575-588
Moser L., Kissich M., Scheipel T., Baunach M.
Proceedings of the 21st ACM International Conference on Computing Frontiers 2024 Workshops and Special Sessions, CF 2024 Companion, 21st ACM International Conference on Computing Frontiers Workshops and Special Sessions, 71-74, (Proceedings of the 21st ACM International Conference on Computing Frontiers 2024 Workshops and Special Sessions, CF 2024 Companion)
Maderbacher B., Windisch F., Bloem R.
Leveraging Applications of Formal Methods, Verification and Validation