Implementing RLWE-based Schemes Using an RSA Co-Processor MR Albrecht, C Hanser, A Hoeller, T Pöppelmann, F Virdia, A Wallner IACR Transactions on Cryptographic Hardware and Embedded Systems, 169-208, 2019 | 59 | 2019 |
A combined safety-hazards and security-threat analysis method for automotive systems G Macher, A Höller, H Sporer, E Armengaud, C Kreiner International Conference on Computer Safety, Reliability, and Security, 237-250, 2015 | 56 | 2015 |
QEMU-based fault injection for a system-level analysis of software countermeasures against fault attacks A Höller, A Krieg, T Rauter, J Iber, C Kreiner Digital System Design (DSD), 2015 Euromicro Conference on, 530-533, 2015 | 51 | 2015 |
Automotive embedded software: Migration challenges to multi-core computing platforms G Macher, A Höller, E Armengaud, C Kreiner 2015 IEEE 13th International Conference on Industrial Informatics (INDIN …, 2015 | 38 | 2015 |
A virtual fault injection framework for reliability-aware software development A Höller, G Macher, T Rauter, J Iber, C Kreiner Dependable Systems and Networks Workshops (DSN-W), 2015 IEEE International …, 2015 | 37 | 2015 |
FIES: a fault injection framework for the evaluation of self-tests for COTS-based safety-critical systems A Höller, G Schönfelder, N Kajtazovic, T Rauter, C Kreiner 2014 15th International Microprocessor Test and Verification Workshop, 105-110, 2014 | 34 | 2014 |
Towards Integrated Quantitative Security and Safety Risk Assessment G Macher Computer Safety, Reliability, and Security: SAFECOMP 2019 Workshops, ASSURE …, 2019 | 23* | 2019 |
Trusted Platform Modules in Cyber-Physical Systems: On the Interference Between Security and Dependability A Hoeller, R Toegl 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2018 | 21 | 2018 |
Secured and Easy-to-Use NFC-Based Device Configuration for the Internet of Things T Ulz, T Pieber, A Höller, S Haas, C Steger IEEE Journal of Radio Frequency Identification, 2017 | 21 | 2017 |
Hardware/software co-design of elliptic-curve cryptography for resource-constrained applications A Höller, N Druml, C Kreiner, C Steger, T Felicijan Proceedings of the 51st Annual Design Automation Conference, 1-6, 2014 | 20 | 2014 |
Privilege-Based Remote Attestation: Towards Integrity Assurance for Lightweight Clients T Rauter, A Höller, N Kajtazovic, C Kreiner Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security, 3-9, 2015 | 17 | 2015 |
Asset-centric security risk assessment of software components T Rauter, A Höller, J Iber, CJ Kreiner 2nd International Workshop on MILS: Architecture and Assurance for Secure …, 2016 | 16 | 2016 |
A Comprehensive Safety, Security, and Serviceability Assessment Method G Macher, A Höller, H Sporer, E Armengaud, C Kreiner International Conference on Computer Safety, Reliability, and Security, 410-424, 2014 | 14 | 2014 |
Software-Based Fault Recovery via Adaptive Diversity for COTS Multi-Core Processors A Höller, T Rauter, J Iber, G Macher, C Kreiner arXiv preprint arXiv:1511.03528, 2015 | 13 | 2015 |
Evaluation of Diverse Compiling for Software-Fault Tolerance A Höller, N Kajtazovic, T Rauter, KU Römer, CJ Kreiner Design, Automation and Test in Europe Conference and Exhibition, 1-100, 2015 | 11 | 2015 |
Towards Dynamic Software Diversity for Resilient Redundant Embedded Systems A Höller, T Rauter, J Iber, C Kreiner International Workshop on Software Engineering for Resilient Systems, 16-30, 2015 | 9 | 2015 |
Evaluation of diverse compiling for software-fault detection A Höller, N Kajtazovic, T Rauter, K Römer, C Kreiner 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE), 531-536, 2015 | 9 | 2015 |
Towards a Generic Modeling Language for Contract-Based Design. J Iber, A Höller, T Rauter, C Kreiner ModComp@ MoDELS, 24-29, 2015 | 9 | 2015 |
Power consumption-based application classification and malware detection on android using machine-learning techniques T Zefferer, P Teufl, D Derler, K Potzmader, A Oprisnik, H Gasparitz, ... Future Computing, 26-31, 2013 | 9 | 2013 |
Towards Secure Mobile Computing: Employing Power-Consumption Information to Detect Malware on Mobile Devices T Zefferer, P Teufl, D Derler, K Potzmader, A Oprisnik, H Gasparitz, ... | 8* | |