• 55th Design Automation Conference (DAC)(accepted and presented): “Revisiting Context-Based Pairing in IoT” [Markus Miettinen, Thien Duc Nguyen, N. Asokan and Ahmad-Reza Sadeghi] [2018/07]
  • DAC 2019 (accepted): “Mirai Attach Demo
    [Thien Duc Nguyen and Richard Mitev and Markus Miettinen and Ahmad-Reza Sadeghi] 
    [2019/05]
  • JETC 2019 (accepted): “Application and Thermal Reliability-Aware Reinforcement Learning Based Multi-Core Power Management
    [S. Manoj P. D., A. Joseph, A. Haridass, M. Shafique, J. Henkel, H. Homayoun] 
    [2019/05]
  • JOLPE Vol. 15 2019 (Published): “On the Effect of Approximate-Computing in Motion Estimation
    [A. Paltrinieri, R. Peloso, G. Masera, M. Shafique, M. Martina]
    [2019/05]
  • IEEE Access Vol.7 2019 (accepted): “A Roadmap Towards Resilient Internet of Things for Cyber-Physical Systems” [D. Ratasich, F. Khalid, F. Geissler, R. Grosu, M. Shafique, E. Bartocci] 
    [2019/05]
  • Elsevier Microelectronics Journal-MEJ 2019 (accepted): “Self-Compensating Accelerators for Efficient Approximate Computing
    [S. Mazahir, O. Hasan, M. Shafique] 
    [2019/05]
  • DAC 2019 (accepted): “CANN: Curable Approximations for High-Performance Deep Neural Network Accelerators
    [M. A. Hanif, F. Khalid, M. Shafique] 
    [2019/05]
  • DAC 2019 (accepted): “LifeGuard: A Reinforcement Learning-Based Task Mapping Strategy for Performance-Centric Aging Management
    [V. Rathore, V. Chaturvedi, A. K. Singh, T. Srikanthan, M. Shafique] 
    [2019/05]
  • DAC 2019 (accepted): “autoAx: An Automatic Design Space Exploration and Circuit Building Methodology from Elementary Approximate Components
    [V. Mrazek, M. A. Hanif, Z. Vasicek, L. Sekanina, M. Shafique] 
    [2019/05]
  • DAC 2019 (accepted): “XBioSiP: A Methodology for Approximate Bio-Signal Processing at the Edge
    [B. S. Prabakaran, S. Rehman, M. Shafique] 
    [2019/05]
  • ASIACCS 2019 (accepted): “Alexa lied to me: Skill-based Man-in-the-Middle Attacks on Virtual Assistants
    [Richard Mitev, Markus Miettinen, Ahmad-Reza Sadeghi]
    [2019/05]
  • DIMVA 2019 (accepted): “Large-scale Analysis of Infrastructure-leaking DNS Servers” [Dennis Tatang, Carl Schneider, Thorsten Holz]
    [2019/05]
  • Journal of Circuits, Systems, and Computer Applications (accepted): “An Experimental Study of Metastability-Induced Glitching Behavior
    [T.Polzer, F. Huemer and A. Steininger] 
    [2019/04]
  • Journal of Low Power Electronics and Applications (accepted): “Novel Approaches for Efficient Delay-Insensitive Communication
    [F. Huemer and A. Steininger] 
    [2019/04]
  • ACM WiSec 2019 (accepted): “Short Paper: LTE Security Disabled — Misconfiguration in Commercial Networks
    [Merlin Chlosta, David Rupprecht, Thorsten Holz, Christina Pöpper]
    [2019/04]
  • ACM WiSec 2019 (accepted): “Lost Traffic Encryption: Fingerprinting LTE/4G Traffic on Layer Two
    [Katharina Kohls, David Rupprecht, Thorsten Holz, Christina Pöpper] 
    [2019/04]
  • ICDCS 2019 (accepted): “Towards Systematic Design of Collective Remote Attestation Protocols
    [Ivan De Oliveira Nunes, Ghada Dessouky, Ahmad Ibrahim, Norrathep Rattanavipanon, Ahmad-Reza Sadeghi, Gene Tsudik]
    [2019/04]
  • DAC 2019 (Accepted): “Late Breaking Results: Authenticated Call Stack
    [Hans Liljestrand, Thomas Nyman, Jan-Erik Ekberg, N. Asokan]  
    [2019/04]
  • ICDCS 2019 (accepted): “DÏoT: A Federated Self-learning Anomaly Detection System for IoT
    [Thien Duc Nguyen, Samuel Marchal, Markus Miettinen, Hossein Fereidooni, N. Asokan, Ahmad-Reza Sadeghi]
    [2019/04]
  • NDSS 2019 (Presented): “SANCTUARY: ARMing TrustZone with User-space Enclaves
    [Ferdinand Brasser, David Gens, Patrick Jauernig, Ahmad-Reza Sadeghi, Emmanuel Stapf] 
    [2019/03]
  • NDSS 2019 (Presented): “DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems
    [Tigist Abera, Raad Bahmani, Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter] 
    [2019/03]
  • NDSS 2019 (Presented): “TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V
    [Samuel Weiser, Mario Werner, Ferdinand Brasser, Maja Malenko, Stefan Mangard, Ahmad-Reza Sadeghi] 
    [2019/03]
  • WiSec 2019 (accepted): “HomeSnitch: Behavior Transparency and Controller for Smart Home IoT Devices” [TJ OConnor, Reham Mohamed, Markus Miettinen, William Enck, Bradley Reaves, Ahmad-Reza Sadeghi] 
    [2019/03]
  • IEEE Euro S&P 2019 (accepted): “It’s Not What It Looks Like: Measuring Attacks and Defensive Registrations of Homograph Domains
    [Florian Quinkert, Tobias Lauinger, William Robertson, Engin Kirda, Thorsten Holz] 
    [2019/03]
  • IEEE Euro S&P 2019 (accepted): “Challenges in Designing Exploit Mitigations for Deeply Embedded Systems
    [Ali Abbasi, Jos Wetzels, Thorsten Holz, and Sandro Etalle] 
    [2019/03]
  • IEEE Euro S&P 2019 (accepted): “Steroids for DOPed Applications: A Compiler for Automated Data-Oriented Programming
    [Jannik Pewny, Philipp Koppe, and Thorsten Holz] 
    [2019/03]
  • USENIX Security Symposium 2019 (accepted): “FastKitten: Practical Smart Contracts on Bitcoin
    [Poulami Das, Lisa Eckey, Tommaso Frassetto, David Gens, Kristina Hostáková, Patrick Jauernig, Sebastian Faust, and Ahmad-Reza Sadeghi]
    [2019/03]
  • DAC 2019 (accepted): “HardScope: Hardening Embedded Systems Against Data-Oriented Attacks
    [Thomas Nyman, Ghada Dessouky, Shaza Zeitouni, Aaro Lehikoinen, Andrew Paverd, N. Asokan, Ahmad-Reza Sadeghi] 
    [2019/03]
  • IEEE JSAC Special Issue on Artificial Intelligence and Machine Learning for Networking and Communications (accepted): “AuDI: Towards Autonomous IoT Device-Type Identification using Periodic Communication
    [Samuel Marchal, Markus Miettinen, Thien Duc Nguyen, Ahmad-Reza Sadeghi, N. Asokan]
    [2019/03]
  • USENIX Security Symposium 2019 (accepted): “AntiFuzz: Impeding Fuzzing Audits of Binary Executables
    [Emre Güler, Cornelius Aschermann, Ali Abbasi, Thorsten Holz]
    [2019/02]
  • Usenix SEC 2019 (accepted): “PAC it up: Towards Pointer Integrity usingARM Pointer Authentication
    [Hans Liljestrand, Thomas Nyman, Kui Wang, Carlos Chinea Perez, Jan-Erik Ekberg, N. Asokan]
    [2019/02]
  • PETS 2019 (accepted): “Circumventing Cryptographic Deniability with Remote Attestation
    [Lachlan J. Gunn, Ricardo Vieitez Parra, N. Asokan]
    [2019/02]
  • NDSS 2019 (accepted): “NAUTILUS: Fishing for Deep Bugs with Grammars
    [Cornelius Aschermann, Patrick Jauernig, Tommaso Frassetto, Ahmad-Reza Sadeghi, Thorsten Holz, Daniel Teuchert]
    [2019/02]
  • MADWeb workshop NDSS 2019 (accepted): “DorkPot: A Honeypot-based Analysis of Google Dorks
    [Florian Quinkert, Eduard Leonhardt, Thorsten Holz]
    [2019/02]
  • It-Information Technology 2019 (accepted): “Evaluation of (power) side-channels in cryptographic implementations
    [Florian Bache, Christina Plump, Jonas Wloka, Tim Güneysu, Rolf Drechsler]
    [2019/02]
  • IEEE Transactions on Computers 2019 (accepted): “RepuCoin: Your Reputation is Your Power
    [Jiangshan Yu, David Kozhaya, Jeremie Decouchant, Paulo Estves-Verissimo]  
    [2019/02]
  • DAC 2019 (accepted): “HardScope: Hardening Embedded Systems Against Data-Oriented Attacks
    [Thomas Nyman, Ghada Dessouky, Shaza Zeitouni, Aaro Lehikoinen, Andrew Paverd, N. Asokan, Ahmad-Reza Sadeghi]
    [2019/02]
  • DAC 2019 (accepted): “ARM2GC: Succinct Garbled Processor for Secure Computation
    [Ebrahim Songhori, Sadegh Riazi, Siam Hussain, Ahmad-Reza Sadeghi, Farinaz Koushanfar]  [2019/02]
  • CODASPY 2019 (accepted): “Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots
    [Amit Tambe, Yan Lin Aung, Ragav Sridharan, Martin Ochoa, Nils Ole Tippenhauer, Asaf Shabtai, Yuval Elovici] 
    [2019/02]
  • ACM CSUR 2019 (accepted): “Text Analysis in Adversarial Settings: Does Deception Leave a Stylistic Trace?
    [Tommi Gröndahl, N. Asokan]  
    [2019/02]
  • NDSS 2019 (accepted): “SANCTUARY: ARMing TrustZone with User-space Enclaves
    [Ferdinand Brasser, David Gens, Patrick Jauernig, Ahmad-Reza Sadeghi, Emmanuel Stapf] 
    [2019/02]
  • NDSS 2019 (accepted): “DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems
    [Tigist Abera, Raad Bahmani, Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, and Matthias Schunter]
    [2019/01]
  • Elsevier Computer Networks (accepted): “PrivICN: Privacy-Preserving Content Retrieval in Information-Centric Networking” [Cesar Bernardini, Samuel Marchal, Muhammad Rizwan Asghar, Bruno Crispo] [2018/12]
  • DATE 2019 (accepted): “Securing Cryptographic Circuits by Exploiting Implementation Diversity and Partial Reconfiguration on FPGAs” [Benjamin Hettwer, Johannes Petersen, Stefan Gehrer, Heike Neumann, Tim Güneysu][2018/12]
  • NDSS 2019 (accepted): “Redqueen: Fuzzing with Input-to-State Correspondence”, [Cornelius Aschermann, Sergej Schumilo, Tim Blazytko, Robert Gawlik, Thorsten Holz]  [2018/11]
  • NDSS 2019 (accepted): “On the Challenges of Geographical Avoidance for Tor”, [Katharina Kohls, Kai Jansen, David Rupprecht, Thorsten Holz, Christina Pöpper] [2018/11]
  • NDSS 2019 (accepted): “Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding”, [Lea Schönherr, Katharina Kohls, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa] [2018/11]
  • IEEE/ACM DATE 2019 (accepted): “TrojanZero: Switching Activity-Aware Design of Undetectable Hardware Trojans with Zero Power and Area Footprint”, [I. Abbasi, F. Khalid, S. Rehman, A. Kamboh, A. Jantsch, S. Garg, M. Shafique] [2018/11]
  • IEEE/ACM DATE 2019 (accepted): “TransRec: Improving Adaptability in Single-ISA Heterogeneous Systems with Transparent and Reconfigurable Acceleration”, [M. Brandalero, M. Shafique, L. Carro, A. C. Schneider Beck] [2018/11]
  • IEEE/ACM DATE 2019 (accepted): “Thermal-Awareness in a Soft Error Tolerant Architecture”, [S. Hussain, M. Shafique, J. Henkel] [2018/11]
  • IEEE/ACM Euromicro Conference on Digital System Design (DSD), August 2018. “Intelligent Security Measures for Cyber Physical Systems” [M. Shafique, F. Khalid, S. Rehman] [2018/09]
  • IEEE/ACM 24th Symposium on On-Line Testing and Robust System Design (IOLTS), July 2018 (accepted): “Robust Machine Learning Systems: Reliability and Security for Deep Neural Networks” [M. A. Hanif, F. Khalid, R.V.W. Putra, S. Rehman, M. Shafique] [2018/09]
  • IEEE/ACM 24th Symposium on On-Line Testing and Robust System Design (IOLTS), July 2018 (accepted): “Hardware/Software Techniques for Heterogeneous Fault-Tolerance” [S. Rehman, F. Kriebel, B. S. Prabakaran, F. Khalid, M. Shafique] [2018/09]
  • IEEE Transactions on Computers (TC), 2018 (accepted): “adBoost: Thermal Aware Performance Boosting through Dark Silicon Patterning” [A. Kanduri, M.-H. Haghbayan, M. A. Rahmani, M. Shafique, A. Jantsch, P. Liljeberg] [2018/09]
  • IEEE Micro, 2018 (accepted): “Towards Approximate Computing for Coarse-Grained Reconfigurable Architectures” [O. Akbari, M. Kamal, A. Afzali-Kusha, M. Pedram, M. Shafique] [2018/09]
  • IEEE Access, 2018 (accepted): “SquASH: Approximate Square-Accumulate with Self-Healing” [G. A. Gillani, M. A. Hanif, M. Krone, S.H. Gerez, M. Shafique, A. B. J. Kokkeler] [2018/09]
  • IEEE Access, 2018 (accepted): “McSeVIC: A Model Checking Based Framework for Security Vulnerability Analysis of Integrated Circuits” [I. H. Abbassi, F. Khalid, O. Hasan, A. M. Kamboh, M. Shafique] [2018/09]
  • IEEE 12th International Symposium on Embedded Multicore/Many-core Systems-on-Chip (MCSoC), September 2018 (accepted): “Scalable Dynamic Task Scheduling on Adaptive Many-Core” [V. Venkatramani, A. Pathania, M. Shafique, T. Mitra, J. Henkel] [2018/09]
  • IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018(3), 372-393 (published): “Standard Lattice-Based Key Encapsulation on Embedded Devices” [James Howe, Tobias Oder, Markus Krausz, Tim Güneysu] [2018/09]
  • NDSS 2019 (accepted) “We Value Your Privacy … Now Take Some Cookies: Measuring the GDPR’s Impact on Web Privacy” [Martin Degeling, Christine Utz, Christopher Lentzsch, Henry Hosseini, Florian Schaub, Thorsten Holz] [2018/09]
  • ESORICS 2018 (accepted and presented): “Stay On-Topic: Generating Context-specific Fake Restaurant Reviews” [Mika Juuti, Bo Sun, Tatsuya Mori, N. Asokan] [2018/09]
  • ESORICS 2018 (accepted and presented): “Towards Understanding Privacy Implications of Adware and Potentially Unwanted Programs” [Tobias Urban, Dennis Tatang, Thorsten Holz, Norbert Pohlmann] [2018/09]
  • Austrian Workshop on Microelectronics (Austrochip 2018), September 27, 2018, Graz, Austria (accepted): “Advanced Delay-Insensitive 4-Phase Protocols” [F. Huemer and A. Steininger] [2018/09]
  • Annual Computer Security Applications Conference (ACSAC) 2018 (accepted): “Towards Automated Generation of Exploitation Primitives for Web Browsers” [Behrad Garmany, Martin Stoffel, Robert Gawlik, Philipp Koppe, Tim Blazytko, Thorsten Holz] [2018/09]
  • ACM Workshop on Artificial Intelligence and Security, 2018 (accepted): “All You Need Is “Love“: Evading Hate Speech Detection” [Tommi Gröndahl, Luca Pajola, Mika Juuti, Mauro Conti, N. Asokan] [2018/09]
  • ACM CCS 2018 (accepted): “An Exploratory Analysis of Microcode as a Building Block for System Defenses” [Benjamin Kollenda, Philipp Koppe, Marc Fyrbiak, Christian Kison, Christof Paar, Thorsten Holz] [2018/09]
  • 3rd Workshop on System Software for Trusted Execution (SysTEX), CCS 2018 Workshop (accepted): “Mitigating Branch-Shadowing Attacks on Intel SGX using Control Flow Randomization” [Shohreh Hosseinzadeh, Hans Liljestrand, Ville Leppänen, Andrew Paverd] [2018/09]
  • 11th USENIX Workshop on Cyber Security Experimentation and Test (CSET’18)(accepted and presented): “On Designing and Evaluating Phishing Webpage Detection Techniques for the Real World” [Samuel Marchal and N. Asokan] [2018/09]
  • The 31st IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, October 8 – October 10, 2018, Chicago, IL, USA (accepted): “State Recovery for Distributed TMR Designs in FPGAs Using Partial Reconfiguration”  [2018/08]
  • IEEE Transactions on Computers (accepted): “Scalable Byzantine Consensus via Hardware-assisted Secret Sharding” [Jian Liu, Wenting Li, Ghassan Karame, N. Asokan] [2018/08]
  • IEEE TC (accepted): “RT-ByzCast: Byzantine-Resilient Real-Time Reliable Broadcast” [David Kozhaya, Jérémie Decouchant, Paulo Esteves-Verissimo] [2018/08]
  • IEEE Security \& Privacy Journal, 2018 (accepted): “The KISS principle in Software-Defined Networking: a framework for secure communications” [Diego Kreutz, Jiangshan Yu, Paulo Verissimo, Catia Magalhaes, Fernando Ramos] [2018/08]
  • Cryptology ePrint Archive: Report 2018/239: “RepuCoin: Your Reputation is Your Power” [Jiangshan Yu, David Kozhaya, Jeremie Decouchant, and Paulo Esteves-Verissimo] [2018/08]
  • International Conference on Computer-Aided Design (ICCAD 2018) (accepted): “LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution” [Ghada Dessouky, Tigist Abera, Ahmad Ibrahim, Ahmad-Reza Sadeghi] [2018/07]
  • International Conference On Computer Aided Design, ICCAD 2018, San Diego, CA, USA, November 5-8, 2018 (accepted): “Remote Inter-Chip Power Analyses Side-Channel Attacks at Board-Level” [Falk Schellenberg, Dennis R.E. Gnad, Amir Moradi, Mehdi B. Tahoori] [2018/07]
  • IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems – Special Issue ESWEEK 2018, CASES 2018, CODES + ISSS 2018 and EMSOFT 2018 (accepted): “ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices” [N. Asokan, Thomas Nyman, Norrathep Rattanavipanon, Ahmad-Reza Sadeghi, Gene Tsudik]  [2018/07]
  • IEEE Symposium on Security \& Privacy 2019 (accepted): “Breaking LTE on Layer Two” [David Rupprecht, Katharina Kohls, Christina Pöpper, Thorsten Holz] [2018/07]
  • IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 1, No.2, pp 123-148, 2018. (accepted)(presentation at CHES 2018, Amsterdam, The Netherlands, September 9-12, 2018): “Hardware Masking, Revisited” [Thomas De Cnudde, Maik Ender, Amir Moradi] [2018/07]
  • European Symposium on Research in Computer Security (ESORICS) 2019 (accepted): “Towards Understanding Privacy Implications of Adware and Potentially Unwanted Programs” [Tobias Urban, Dennis Tatang, Thorsten Holz, Norbert Pohlmann]  [2018/07]
  • Detection of Intrusions and Malware \& Vulnerability Assessment (DIMVA 2018)(published): “On the Weaknesses of Function Table Randomization” [Moritz Contag, Robert Gawlik, Andre Pawlowski, Thorsten Holz] [2018/07]
  • ACM SIGCOMM 2018 Workshop on Security in Softwarized Networks: Prospects and Challenges (SecSoN 2018)(accepted): “Preventing Malicious SDN Applications From Hiding Adverse Network Manipulations” [Christian Röpke, Thorsten Holz] [2018/07]
  • 12th USENIX Workshop on Offensive Technologies (USENIX WOOT 2018) (accepted): “Make JIT-Spray Great Again” [Robert Gawlik and Thorsten Holz] [2018/07]
  • Journal of Biomedical Informatics (JBI) (accepted): “Accurate filtering of privacy-preserving information in raw genomic data” [Jeremie Decouchant, Maria Fernandes, Marcus Völp, Francisco Couto, Paulo Esteves-Veríssimo] [2018/06]
  • Interspeech 2018 (accepted): “VoiceGuard: Secure and Private Speech Processing” [Ferdinand Brasser; Tommaso Frassetto,Korbinian Riedhammer, Ahmad-Reza Sadeghi, Thomas Schneider Christian Weinert] [2018/06]
  • 3rd Workshop on Security, Privacy, and Identity Management in the Cloud (SECPID) at ARES 2018 (accepted): “Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials”[Arseny Kurnikov, Andrew Paverd, Mohammad Mannan, N. Asokan] [2018/06]
  • 21st IEEE International Symposium on Real-time Computing (ISORC) 2018 (accepted and presented): “Intrusion-Tolerant Autonomous Driving” [Marcus Völp and Paulo Esteves-Verissimo] [2018/06]
  • The Web Conference (WWW) 2018 (Published): “SafeKeeper: Protecting Web Passwords using Trusted Execution Environments” [Klaudia Krawiecka, Arseny Kurnikov, Andrew Paverd, Mohammad Mannan, N. Asokan] [2018/05]
  • IEEE Transactions on Mobile Computing (Accepted): “Sensor-based Proximity Detection in the Face of Active Adversaries” [Babins Shrestha, Nitesh Saxena, Hien Thi Thu Truong, N. Asokan] [2018/05]
  • IEEE Communications Surveys and Tutorials (Accepted): “On Security Research Towards Future Mobile Network Generations” [David Rupprecht, Adrian Dabrowski, Thorsten Holz, Edgar Weippl, Christina Pöpper] [2018/05]
  • USENIX Security Symposium, August 2018 (Accepted): “The Guard’s Dilemma: Efficient Code-Reuse Attacks Against Intel SGX” [Andrea Biondo, Mauro Conti, Lucas Davi, Tommaso Frassetto, Ahmad-Reza Sadeghi] [2018/05]
  • 27th USENIX Security Symposium, August 2018 (Accepted): “IMIX: In-Process Memory Isolation EXtension” [Tommaso Frassetto, Patrick Jauernig, Christopher Liebchen, Ahmad-Reza Sadeghi] [2018/05]
  • 21st IEEE International Symposium on Design and Diagnostics of Electronic Circuits and Systems, April 25-27, 2018, Budapest, Hungary (Presented): “Using a Duplex Time-to-Digital Converter for Metastability Characterization of an FPGA” [Florian Huemer, Thomas Polzer, Andreas Steininger] [2018/05]
  • 2018 International Conference On Computer Aided Design (ICCAD 2018) (Submitted): “LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution” [Ghada Dessouky, Ahmad Ibrahim, Tigist Abera, and Ahmad-Reza Sadeghi] [2018/05]
  • USENIX, August 15-17, 2018, Baltimore, MD, USA (Submitted) “DÏOT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices”[Thien Duc Nguyen, Markus Miettinen, Ahmad-Reza Sadeghi, Samuel Marchal, N. Asokan, Minh Hoang Dang] [2018/04]
  • IEEE International Symposium on Hardware Oriented Security and Trust HOST, April 30 – May 4, 2018, McLean, VA, USA (Accepted) “SAT-based Reverse Engineering of Gate-Level Schematics using Fault Injection and Probing”[Shahrzad Keshavarz, Falk Schellenberg, Bastian Richter, Christof Paar, Daniel Holcomb] [2018/04]
  • IEEE European Symposium on Security and Privacy (Euro S&P), April, 2018, London, United Kingdom (Accepted) “Position-independent Code Reuse: On the Effectiveness of ASLR in the Absence of Infor-mation Disclosure”[Enes Göktaş, Benjamin Kollenda, Philipp Koppe, Erik Bosman, Georgios Portokalidis, Thorsten Holz, Herbert Bos, Christiano Giuffrida] [2018/04]
  • 2018-4 & DSN 2018 (Accepted) “Migrating SGX Enclaves with Persistent State”[Fritz Alder, Arseny Kurnikov, Andrew Paverd, N. Asokan] [2018/04]
  • DFG/FWF International Cooperation Project (research project proposal was accepted and will receive funding (Accepted) “Ensuring Robustness in Low-Power Asynchronous Circuits (ENROL)”[Milos Krstic, Andreas Steininger] [2018/04]
  • ACM Great Lakes Symposium on VLSI (GLSVLSI), May 23-25, 2018, Chicago, IL, USA (Accept-ed) “Physical Protection of Lattice-Based Cryptography”[Ayesha Khalid, Tobias Oder, Felipe Valencia, Marie O’ Neill, Tim Güneysu, Francesco Regaz-zoni] [2018/04]
  • JBI (submitted)“Accurate filtering of privacy-preserving information in raw genomic data” [Jeremie Decouchant, Maria Fernandes, Marcus Völp, Francisco Couto, Paulo Esteves Verissi-mo] [2018/03]
  • DATE 18 (accepted)“A faithful binary circuit model with adversarial noise”[M. Függer, J. Maier, R. Najvirt, T. Nowak, U. Schmid] [2018/03]
  • COSADE 2018, April 23 – 24 , 2018, Singapore (accepted) “Threshold Implementation in Software – Case Study of PRESENT” [Pascal Sasdrich, Rene Bock, Amir Moradi] [2018/03]
  • COSADE 2018, April 23 – 24 , 2018, Singapore (accepted) “Protecting Triple-DES Against DPA – A Practical Application of Domain-Oriented Masking” [Pascal Sasdrich, Michael Hutter] [2018/03]
  • COSADE 2018, April 23 – 24 , 2018, Singapore (accepted) “A First-Order SCA Resistant AES Without Fresh Randomness” [Felix Wegener, Amir Moradi] [2018/03]
  • BMC Medical Informatics and Decision Making (submitted) “Sensitivity Levels: Optimizing the Performance of Privacy Preserving DNA Alignment”[Maria Fernandes, Jeremie Decouchant, Francisco Couto, Paulo Esteves Verissimo] [2018/03]
  • arXiv:1803.01598 (submitted)“RAPTOR: Ransomware Attack PredicTOR”[Florian Quinkert, Thorsten Holz, KSM Tozammel Hossain, Emilio Ferrara, Kristina Lerman] [2018/03]
  • ADHS 2018 – IFAC Conference on Analysis and Design of Hybrid SystemsOxford, UK during FLOC 2018 (accepted)“Verifying nonlinear analog and mixed-signal circuits with inputs”[Chuchu Fan, Yu Meng, Jürgen Maier, Ezio Bartocci, Sayan Mitra, Ulrich Schmid] [2018/03]
  • ACM Transactions on Privacy and Security (submitted) “ANCHOR: logically-centralized security for Software- Defined Networks”[Diego Kreutz, Jiangshan Yu, Fernando M.V. Ramos, Paulo Esteves Verissimo] [2018/03]
  • 24th IEEE International Symposium on Asynchronous Circuits and Systems, May 13-18, Vienna, Austria (accepted)“Partially Systematic Constant Weight Codes for Delay-Insensitive Communication” [F. Huemer, A. Steininger] [2018/03]
  • Third IEEE International Workshop on Security in NFV-SDN, 6-8 November 2017, Berlin (presented) “SDN-GUARD: Protecting SDN Controllers Against SDN Rootkits”  [Dennis Tatang, Florian Quinkert, Joel Frank, Christian Ropke, and Thorsten Holz] [2018/02]
  • Technical Report, 8th ACM Conference on Data and Application Security and Privacy, March 19 – 21, 2018. Tempe, AZ, USA (accepted) “An Empirical Study on Price Differentiation Based on System Fingerprints” [Thomas Hupperich, Dennis Tatang, Nicolai Wilkop, Thorsten Holz] [2018/02]
  • Springer Book Proposal Jan. 2018, Draft Contract Signed, Under Publishing (accepted) “Ad-vanced Techniques for Power, Energy, and Thermal Management for Clustered Manycores“[S. Pagani, J.-J. Chen, M. Shafique, J. Henkel] [2018/02]
  • Proceedings of ACSAC 2017, San Juan, PR, USA, December 4–8, 2017 (presented) “ECFI: Asyn-chronous Control Flow Integrity for Programmable Logic Controllers” [Ali Abbasi, Thorsten Holz, Emmanuele Zambon, Sandro Etalle] [2018/02]
  • Proceedings of ACSAC 2017, San Juan, PR, USA, December 4–8, 2017 (presented)   “Breaking and Fixing Destructive Code Read Defenses”  [Jannik Pewny, Philipp Koppe, Lucas Davi, Thor-sten Holz] [2018/02]
  • IEEE/ACM 21st Design, Automation and Test in Europe Conference (DATE), March, 2018 “An Overview of Next-Generation Architectures for Machine Learning: Roadmap, Opportunities and Challenges in the IoT Era” [M. Shafique, T. Theocharides, C.-S. Bouganis, M. A. Hanif, F. Khalid, R. Hafiz, S. Rehman] [2018/02]
  • IEEE Transactions on Computer (TC), 2018 (accepted) “adBoost: Thermal Aware Performance Boosting through Dark Silicon Patterning” [A. Kanduri, M.-H. Haghbayan, M. A. Rahmani, M. Shafique, A. Jantsch, P. Liljeberg] [2018/02]
  • IEEE Access 5: 11909-11926 (2017) (presented) “Securing Systems With Indispensable En-tropy: LWE-Based Lossless Computational Fuzzy Extractor for the Internet of Things”  [Chris-topher Huth, Daniela Becker, Jorge Guajardo, Paul Duplys, Tim Erhan Güneysu] [2018/02]
  • Future Internet 9(4): 94, 2017. doi: 10.3390/fi9040094. “Approximate Networking for Univer-sal Internet Access” [J. Qadir, A. Sathiaseelan, U. B. Farooq, M. Usama, M. A. Imran, M. Shafique] [2018/02]
  • DATE 2018, March 18 – 23 , 2018, Dresden, Germany, (accepted)  “An Inside Job: Remote Power Analysis Attacks on FPGAs” https://eprint.iacr.org/2018/012.pdf   [Falk Schellenberg, Dennis R.E. Gnad, Amir Moradi, Mehdi B. Tahoori] [2018/02]
  • 21st IEEE International Symposium on Design and Diagnostics of Electronic Circuits and Systems, April 25-27, 2018, Budapest, Hungary (submitted) “How can Metastability Charac-terization benefit from a Duplex Time-to-Digital Converter?” [Florian Huemer, Thomas Polzer and Andreas Steininger] [2018/02]
  • WWW 2018 (Accepted) “SafeKeeper: Protecting Web Passwords using Trusted Execution Environments” [Klaudia Krawiecka, Arseny Kurnikov, Andrew Paverd, Mohammad Mannan, N. Asokan] [2018/01]
  • International Conference on the Theory and Applications of Cryptology and Information Se-curity, ASIACRYPT 2017, Hong Kong, China, December 3-7, 2017 (??PRESENTED??) “The First Thorough Side-Channel Hardware Trojan” [Maik Ender, Samaneh Ghandali, Amir Moradi, Christof Paar] [2018/01]
  • IEEE Transactions on Computers (TC), 2018, doi: 10.1109/TC.2018.2789904 “Aging-aware Workload Management on Embedded GPU Under Process Variation” [H. Lee, M. Shafique, M. A. Al Faruque] [2018/01]
  • IEEE COMSOC MMTC Communications – Frontiers, vol. 12, no.5, pp. 27-35, Sep. 2017. Ap-peared in the Special Issue on “Low Complexity Codecs for Power Constrained Video Communications” [2018/01]
  • IEEE COMSOC MMTC Communications – Frontiers “Advanced Techniques for Power- and Energy-Efficient Design of Video Codecs in the Era of Internet-of-Things” [M. Shafique, R. Hafiz, S. Rehman, J. Henkel] [2018/01]
  • CT-RSA 2018 (Accepted) “Secure deduplication of Encrypted Data: “Refined Model and New Constructions” [Jian Liu, Li Duan, Yong Li, N. Asokan] [2018/01]
  • Concurrency and Computation: Practice and Experience (Published) “A Framework for application partitioning using trusted execution environments” [Atamli-Reineh, A., Paverd, A., Petracca, G. \& Martin, A.] [2018/01]
  • CHES 2018, to appear (Accepted) “Practical CCA2-Secure and Masked Ring-LW Implementation” [Tobias Oder, Tobias Schneider, Thomas Pöppelmann, Tim Güneysu] [2018/01]
  • Annual Computer Security Applications Conference (ACSAC), Puerto Rico, USA, December 2017 (“Breaking and Fixing Destructive Code Read Defenses” [Jannik Pewny, Philipp Koppe, Lucas Davi, Thorsten Holz] [2018/01]