Wissenschaftliche Publikationen

  1. S. Borkotoky, C. Bettstetter, U. Schilcher, C. Raffelsberger. Allocation of Repetition Redundancy in LoRa. European Wireless, May 2019.
  2. V. J. Expósito Jiménez und H. Zeiner, „Serverless Cloud Computing: A Comparison Between “Function As A Service” Platforms,“ in 7th International Conference on Information Technology Convergence and Services (ITCSE 2018), Vienna, 2018.
  3. C. Dobraunig, M. Eichlseder, T. Korak, S. Mangard, F. Mendel and R. Primas: Exploiting Ineffective Fault Inductions on Symmetric Cryptography. CHES 2018
  4. L. Görtschacher, et al.: Fast Two Dimensional Position Update System for UHF RFID Tag Tracking, Proc. IEEE IMS 2017
  5. L. Görtschacher, W. Bösch and J. Grosinger, “UHF RFID Sensor Tag Antenna Concept for Stable and Distance Independent Remote Monitoring,” 2018 IEEE International Microwave Biomedical Conference (IMBioC), Philadelphia, PA, 2018, pp. 16-18.
    doi: 10.1109/IMBIOC.2018.8428853
  6. D. Gruss, M. Lipp, M. Schwarz, D. Genkin, J. Juffinger, S. O’Connell, W. Schoechl, Y. Yarom: Another Flip in the Wall of Rowhammer Defenses. IEEE S&P 2018, San Fransisco, CA, USA
  7. D. Gruss, M. Schwarz, M. Wübbeling, S. Guggi, T. Malderle, S. More, M. Lipp . Use-After-FreeMail: Generalizing the Use-After-Free Problem and Applying it to Email Services. AsiaCCS 2018, Songdo, Incheon, Korea
  8. M. Lipp, D. Gruss, M. Schwarz, D. Bidner, C. Maurice, S. Mangard; Practical Keystroke Timing Attacks in Sandboxed JavaScript. ESORICS 2017, Oslo, Norway
  9. S. Marksteiner, V. J. Expósito Jiménez, H. Vallant, H. Zeiner, An Overview of Wireless IoT Protocol Security in the Smart Home Domain, in Proceedings of the Joint 13th CTTE and 10th CMI Conference on Internet of Things Business Models, Users, and Networks. Copenhagen, Denmark 11/2017
  10. R. Primas, P. Pessl, S. Mangard: Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption. CHES 2017, Taipei, Taiwan
  11. Robert Schilling, Mario Werner, Stefan Mangard: Securing Conditional Branches in the Presence of Fault Attacks. DATE 2018
  12. M. Schwarz, M. Lipp, D. Gruss, S. Weiser, C. Maurice, R. Spreitzer, S. Mangard. KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks. NDSS 2018, San Diego, CA, USA
  13. M. Schwarz, M. Lipp, D. Gruss. JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks, NDSS 2018, CA, USA
  14. M. Schwarz, D. Gruss, M. Lipp, C. Maurice, T. Schuster, A. Fogh, S. Mangard. Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features. AsiaCCS 2018, Songdo, Incheon, Korea
  15. S. Weiser, R. Spreitzer, L. Bodner. Single Trace Attack against RSA Key Generation in Intel SGX SSL. AsiaCCS 2018, Songdo, Incheon, Korea
  16. Samuel Weiser, Andreas Zankl, Raphael Spreitzer, Katja Miller, Stefan Mangard, Georg Sigl: DATA – Differential Address Trace Analysis: Finding Address-based Side-Channels in BinariesUSENIX Security 2018
  17. Zöscher, et al.: Passive Differential UHF RFID Front-Ends in a 40 nm CMOS Technology, Proc. EuMC 2017;
  18. Zöscher, et al.: A Differential Threshold Voltage Compensated RF-DC Power Converter for RFID Tag ICs, Proc. INMMiC 2017
  19. Zeiner, et. al.: Time-aware Knowledge Graphs for Decision Making in the Building Industry . To appear Springer. 2019


  1. K. Bogner, U. Pferschy, R. Unterberger & H. Zeiner (2018).  Optimised scheduling in human–robot collaboration – a use case in the assembly of printed circuit boards, International Journal of Production Research, 56:16, 5522-5540, DOI: 10.1080/00207543.2018.1470695
  2. J. Grosinger, W. Pachler, & W. Bösch. (2018). Tag Size Matters: Miniaturized RFID Tags to Connect Smart Objects to the InternetIEEE Microwave Magazine19(6), 101-111. DOI:  10.1109/MMM.2018.2844029
  3. L. G. Bruinderink, P. Pessl: Differential Fault Attacks on Deterministic Lattice Signatures. CHES 2018
  4. U. Schilcher, S. Jorge, M. K. Atiq and C. Bettstetter, “Autocorrelation and Coherence Time of Interference in Poisson Networks,” in IEEE Transactions on Mobile Computing.
    doi: 10.1109/TMC.2019.2912373
  5. U. Schilcher, S. Jorge and C. Bettstetter, “On Interference Dynamics in Matérn Networks,” in IEEE Transactions on Mobile Computing.
    doi: 10.1109/TMC.2019.2911498


  1. H. Zeiner, Dependable, secure and time-aware sensor networks, Instandhaltungstage 2019, Klagenfurt, Österreich. 11.4.2019
  2. R. A. Jöbstl. DeSSnet: smart building features.  #LetsCluster Conference, Graz, Österreich. 26.3.2019
  3. Görtschacher, L. J., Priller, P., Zeiner, H., Bösch, W., & Grosinger, J. (2019). Dependable, secure, and time-aware sensor networks.  #LetsCluster
    Conference, Graz, Österreich. 25.3.2019
  4. H. Zeiner, Daten Analytik im Industrie 4.0 Umfeld – anhand von Praxisbeispielen. Zukunftsperspektive Data Analytics. RRZ Partnerevent. Graz, Österreich. 24.9.2018
  5. H. Zeiner, Dependable, secure and time-aware sensor networks (project overview). Spot on RFID. Klagenfurt, Österreich. 18.6.2018
  6. A. Kercek, Dependable secure time-aware sensor networks. Spot on RFID. Klagenfurt, Österreich. 18.6.2018
  7. C. Gaugeler, Firmenvorstellung Messfeld GmbH und Rolle in DeSSnet. Spot on RFID. Klagenfurt, Österreich. 18.6.2018
  8. G. Bauer, Firmenvorstellung IoT40 Systems GmbH und Rolle in DeSSnetSpot on RFID. Klagenfurt, Österreich. 18.6.2018
  9. L.J. Görtschacher, J. Grosinger. Rapid Prototyping Platform for Advanced UHF RFID Sensing Applications. 9th COST WIPE Management Committee/Working Group Meeting and Workshop. Porto, Portugal. 17.9.2017
  10. J. Grosinger, Miniaturisierte RFID Tags für Objektidentifikation und Objektüberwachung. Spot on RFID. Graz, Österreich. 21.3.2018
  11. J. Grosinger, Miniaturized RFID Transponders for Object Identification and Sensing. 1st Symposium on Dependable Internet of Things in Adverse Environments. Graz, Österreich. 11.9.2017
  12. H. Zeiner,  Dependable, secure and time-aware sensor networks (DeSSnet). Industrie 4.0 Plattform Austria, F&E Gruppe. Wien, Österreich. 28.4.2017
  13. H. Zeiner, Time-aware“ Datenanalytik in der Industrie, Big Data & Industrie 4.0: Wie kann die Fülle an Informationen sinnvoll verarbeitet werden? CMG-AG. Wien, Österreich. 20.4.2017
  14. H. Zeiner, Dependable, secure and time-aware sensor networks, Instandhaltungstage 2017, Klagenfurt, Österreich. 6.4.2017
  15. H. Zeiner, Dependable, secure and time-aware sensor networks, Enabling Spaces, Gratkorn, Österreich. 19.1.2017


  1. H. Zeiner, Dependable, secure and time-aware sensor networks. Beitrag im BioNanoNet News 2, 2018
  2. H. Zeiner, M. Winter, R. Unterberger. Time-aware Analytik – Dynamische Modellbildung im Bereich der Prozessanalytik. Jahrbuch Instandhaltungstage 2018.
  3. H. Zeiner. Projektvorstellung: K-Projekt DeSSnet “Dependable, secure and time-aware sensor networks”. Jahrbuch Instandhaltungstage 2017.