Publications &
Talks
We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Eichlseder M., Leander G., Rasoolzadeh S.
Progress in Cryptology – INDOCRYPT 2020 - 21st International Conference on Cryptology in India 2020, Proceedings, 21st International Conference on Cryptology in India, 345-369, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12578 LNCS)
Theuermann K.
Information Systems Security - 16th International Conference, ICISS 2020, Proceedings, 16th International Conference, ICISS 2020, Jammu, India, December 16–20, 2020, Proceedings, 16th International Conference on Information Systems Security, 45-65, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12553 LNCS)
Canella C., Werner M., Gruß D., Schwarz M.
Schwarz M., Weiser S., Gruß D., Maurice C., Mangard S.
Cybersecurity, Vol. 3(1)
Abraham A., More S., Rabensteiner C., Hörandner F.
Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 1020-1027, (Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020
Ziegler D., Marsalek A.
Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 1638-1645, (Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020
Koch K., Krenn S., Pellegrino D., Ramacher S.
Soust-Verdaguer B., García Martínez A., Llatas C., Gómez de Cózar J., Allacker K., Trigaux D., Alsema E., Berg B., Dowdell D., Debacker W., Frischknecht R., Ramseier L., Veselka J., Volf M., Hajek P., Lupíšek A., Malik Z., Habert G., Hollberg A., Lasvaux S., Peuportier B., Pomponi F., Wastiel L., Gomes V., Zara O., Gomes M., Gusson Baiocchi A., Pulgrossi L., Ouellet-Plamondon C., Moncaster A., di Bari R., Horn R., Lenz K., Balouktsi M., Lützkendorf T., Röck M., Hoxha E., Passer A.
, World Sustainable Built Environment - Beyond 2020, WSBE 2020
Alber L., More S., Ramacher S.
CCSW 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop, The ACM Cloud Computing Security Workshop, 119-132, (CCSW 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop
Könighofer B., Bloem R., Jansen N., Lorber F.
Leveraging Applications of Formal Methods, Verification and Validation, Verification Principles - 9th International Symposium on Leveraging Applications of Formal Methods, ISoLA 2020, Proceedings, 2020 International Symposium on Leveraging Applications of Formal Methods, 290-306, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12476 LNCS)
Prünster B., Marsalek A., Zefferer T.
30th USENIX Security Symposium (USENIX Security 21), 30th USENIX Security Symposium
Pranger S., Könighofer B., Tappler M., Deixelberger M., Jansen N., Bloem R.
arXiv.org e-Print archive
Lipp M., Hadzic V., Schwarz M., Perais A., Maurice C., Gruß D.
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020, AsiaCCS 2020: The 15th ACM ASIA Conference on Computer and Communications Security, 813–825
Canella C., Schwarz M., Haubenwallner M., Schwarzl M., Gruß D.
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020, AsiaCCS 2020: The 15th ACM ASIA Conference on Computer and Communications Security, 481-493, (Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020
Maderbacher B., Karl A., Bloem R.
Runtime Verification - 20th International Conference, RV 2020, Proceedings, 20th International Conference, RV 2020, 20th International Conference on Runtime Verification, 241-258, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12399 LNCS)
Aichernig B., Maderbacher B.
Leveraging Applications of Formal Methods, Verification and Validation, Verification Principles - 9th International Symposium on Leveraging Applications of Formal Methods, ISoLA 2020, Proceedings, 426-448, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12476 LNCS)
Theuermann K., Hörandner F., Abraham A., Ziegler D.
Trust, Privacy and Security in Digital Business - 17th International Conference, TrustBus 2020, Proceedings, 17th International Conference, TrustBus 2020 Bratislava, Slovakia, September 14–17, 2020 Proceedings, 17th International Conference on Trust, Privacy and Security in Digital Business, 109-124, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12395 LNCS)
Kales D., Zaverucha G.
, CHES 2020, 154-188
Canella C., Khasawneh K., Gruß D.
GLSVLSI 2020 - Proceedings of the 2020 Great Lakes Symposium on VLSI, GLSVLSI 2020, 163-168, (Proceedings of the ACM Great Lakes Symposium on VLSI, GLSVLSI
Canella C., Pudukotai Dinakarrao S., Gruß D., Khasawneh K.
GLSVLSI 2020 - Proceedings of the 2020 Great Lakes Symposium on VLSI, GLSVLSI 2020, 169-174, (Proceedings of the ACM Great Lakes Symposium on VLSI, GLSVLSI