Scalable, Behavior-Based Malware Clustering. U Bayer, PM Comparetti, C Hlauschek, C Kruegel, E Kirda 16th Symposium on Network and Distributed System Security (NDSS) 9, 8-11, 2009 | 1004 | 2009 |
Don’t Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE Q Guo, C Hlauschek, T Johansson, N Lahr, A Nilsson, RL Schröder CHES 2022, 2022 | 39 | 2022 |
Prying Open Pandora's Box: KCI Attacks against TLS C Hlauschek, M Gruber, F Fankhauser, C Schanes 9th USENIX Workshop on Offensive Technologies (WOOT 15), 2015 | 27 | 2015 |
Automated security test approach for sip-based voip softphones S Taber, C Schanes, C Hlauschek, F Fankhauser, T Grechenig 2010 Second International Conference on Advances in System Testing and …, 2010 | 14 | 2010 |
Abusing Trust: Mobile Kernel Subversion via TrustZone Rootkits D Marth, C Hlauschek, C Schanes, T Grechenig 16th IEEE Workshop on Offensive Technologies (WOOT'22), 2022 | 4 | 2022 |
On the Timing Leakage of the Deterministic Re-encryption in HQC KEM C Hlauschek, N Lahr, RL Schröder Cryptology ePrint Archive, 2021 | 4 | 2021 |
Limited-linkable Group Signatures with Distributed-Trust Traceability⋆ C Hlauschek, J Black, G Vigna, C Kruegel | 1 | 2012 |
KCI-based Man-in-the-Middle Attacks against TLS C Hlauschek, M Gruber, F Fankhauser, C Schanes | | 2015 |
Vorträge und Posterpräsentationen (ohne Tagungsband-Eintrag) B Klocker, G Raidl | | |