Follow
Clemens Hlauschek
Clemens Hlauschek
RISE - Research Industrial Systems Engineering GmbH
Verified email at hlauschek.com - Homepage
Title
Cited by
Cited by
Year
Scalable, Behavior-Based Malware Clustering.
U Bayer, PM Comparetti, C Hlauschek, C Kruegel, E Kirda
16th Symposium on Network and Distributed System Security (NDSS) 9, 8-11, 2009
9892009
Don’t Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE
Q Guo, C Hlauschek, T Johansson, N Lahr, A Nilsson, RL Schröder
CHES 2022, 2022
342022
Prying Open Pandora's Box: KCI Attacks against TLS
C Hlauschek, M Gruber, F Fankhauser, C Schanes
9th USENIX Workshop on Offensive Technologies (WOOT 15), 2015
272015
Automated security test approach for sip-based voip softphones
S Taber, C Schanes, C Hlauschek, F Fankhauser, T Grechenig
2010 Second International Conference on Advances in System Testing and …, 2010
142010
Abusing Trust: Mobile Kernel Subversion via TrustZone Rootkits
D Marth, C Hlauschek, C Schanes, T Grechenig
16th IEEE Workshop on Offensive Technologies (WOOT'22), 2022
42022
On the Timing Leakage of the Deterministic Re-encryption in HQC KEM
C Hlauschek, N Lahr, RL Schröder
Cryptology ePrint Archive, 2021
42021
Limited-linkable Group Signatures with Distributed-Trust Traceability⋆
C Hlauschek, J Black, G Vigna, C Kruegel
12012
KCI-based Man-in-the-Middle Attacks against TLS
C Hlauschek, M Gruber, F Fankhauser, C Schanes
2015
Vorträge und Posterpräsentationen (ohne Tagungsband-Eintrag)
B Klocker, G Raidl
The system can't perform the operation now. Try again later.
Articles 1–9