Volgen
Clemens Hlauschek
Clemens Hlauschek
RISE - Research Industrial Systems Engineering GmbH
Geverifieerd e-mailadres voor hlauschek.com - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Scalable, Behavior-Based Malware Clustering.
U Bayer, PM Comparetti, C Hlauschek, C Kruegel, E Kirda
16th Symposium on Network and Distributed System Security (NDSS) 9, 8-11, 2009
9862009
Don’t Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE
Q Guo, C Hlauschek, T Johansson, N Lahr, A Nilsson, RL Schröder
CHES 2022, 2022
302022
Prying Open Pandora's Box: KCI Attacks against TLS
C Hlauschek, M Gruber, F Fankhauser, C Schanes
9th USENIX Workshop on Offensive Technologies (WOOT 15), 2015
272015
Automated security test approach for sip-based voip softphones
S Taber, C Schanes, C Hlauschek, F Fankhauser, T Grechenig
2010 Second International Conference on Advances in System Testing and …, 2010
142010
On the Timing Leakage of the Deterministic Re-encryption in HQC KEM
C Hlauschek, N Lahr, RL Schröder
Cryptology ePrint Archive, 2021
42021
Abusing Trust: Mobile Kernel Subversion via TrustZone Rootkits
D Marth, C Hlauschek, C Schanes, T Grechenig
16th IEEE Workshop on Offensive Technologies (WOOT'22), 2022
22022
Limited-linkable Group Signatures with Distributed-Trust Traceability⋆
C Hlauschek, J Black, G Vigna, C Kruegel
12012
KCI-based Man-in-the-Middle Attacks against TLS
C Hlauschek, M Gruber, F Fankhauser, C Schanes
2015
Vorträge und Posterpräsentationen (ohne Tagungsband-Eintrag)
B Klocker, G Raidl
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–9