Direkt zum Inhalt
Symbolfoto: Das AIT ist Österreichs größte außeruniversitäre Forschungseinrichtung

Publikationen & Patente


Anomaly Detection & Cyber Threat Intelligence


Cyber-Physical Systems

  • Piatkowska E., Gavriluta C., Smith P. and Andrén F. P. , "Online Reasoning about the Root Causes of Software Rollout Failures in the Smart Grid," 2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Tempe, AZ, USA, 2020, pp. 1-7, doi: 10.1109/SmartGridComm47815.2020.9303005.
  • Reuter L., Jung O. and Magin J., "Neural network based anomaly detection for SCADA systems," 2020 23rd Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN), Paris, France, 2020, pp. 194-201, doi: 10.1109/ICIN48450.2020.9059436.
  • Friedberg I., Hong X., Mclaughlin K., Smith P., Miller P.C.: "Evidential Network Modeling for Cyber-Physical System State Inference," IEEE Access, vol. 5, pp. 17149-17164, 2017.
  • Friedberg I., McLaughlin K., Smith P., Laverty D., Sezer S.: "STPA-SafeSec: Safety and security analysis for cyber-physical systems," Journal of Information Security and Applications, vol. 34, no. 2, pp. 183-196, June 2017.
  • Langer L., Skopik F., Smith P., Kammerstetter M.: "From old to new: Assessing cybersecurity risks for an evolving smart grid," Computers & Security, vol. 62, pp. 165-176, Sep. 2016.
  • Paudel S., Smith P., Zseby T.: “Stealthy Attacks on Smart Grid PMU State Estimation,” 13th International Conference on Availability, Reliability and Security (ARES 2018), Hamburg, Germany, August 2018, Article 16, 10 pages. DOI: https://doi.org/10.1145/3230833.3230868


Cyber Range & Training

  • Kucek S., & Leitner M. (2020). An Empirical Survey of Functions and Configurations of Open-Source Capture the Flag (CTF) Environments. Journal of Network and Computer Applications, 151, 102470. https://doi.org/10.1016/j.jnca.2019.102470
  • Leitner M., Frank M., Hotwagner W., Langner G., Maurhart O., Pahi T., Reuter L., Skopik F., Smith P., & Warum M. (2020). AIT Cyber Range: Flexible Cyber Security Environment for Exercises, Training and Research. Proceedings of the European Interdisciplinary Cybersecurity Conference, 1–6. https://doi.org/10.1145/3424954.3424959
  • Teuffenbach M., Piatkowska E., Smith P.: “Subverting Network Intrusion Detection: Crafting Adversarial Examples Accounting for Domain-Specific Constraints,” International IFIP Cross Domain (CD) Conference for Machine Learning & Knowledge Extraction (MAKE) 2020, Online Event, pp. 301-320, 2020.
  • Kucek S. and Leitner M., “Training the Human-in-the-Loop in Industrial Cyber Ranges,” in Proceedings of the 1st European Advances in Digital Transformation Conference 2018, 2018.
  • Skopik F., Páhi T. and Leitner M., Eds., Cyber Situational Awareness in Public-Private-Partnerships: Organisationsübergreifende Cyber-Sicherheitsvorfälle effektiv bewältigen. Springer Vieweg, 2018.
  • Frank M., Leitner M. and Pahi T., “Design Considerations for Cyber Security Testbeds: A Case Study on a Cyber Security Testbed for Education,” in 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), 2017, pp. 38–46.
  • Leitner M., Pahi T. and Skopik F., “Situational Awareness for Strategic Decision Making on a National Level,” in Collaborative Cyber Threat Intelligence, F. Skopik, Ed. CRC Press, 2017, pp. 225–276.



  • Derler D., Gellert K., Jager T., Slamanig D., Striecks C., “Bloom Filter Encryption and Applications to Efficient Forward-Secret Key Exchange”, Journal of Cryptology 2021.
  • Cini V., Ramacher S., Slamanig D., Striecks C., “CCA-Secure (Puncturable) KEMs from Encryption with Non-Negligible Decryption Errors”, ASIACRYPT 2020.
  • Abdolmaleki B., Ramacher S., Slamanig D., “Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically”, ACM CCS 2020.
  • Derler D., Samelin K., Slamanig D., Striecks Ch. Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based. In Proc. NDSS 2019
  • Derler D., Jager T., Slamanig D., Striecks Ch. Bloom Filter Encryption and Applications to Efficient Forward-Secret Key Exchange. In Proc. EUROCRYPT 2018
  • Derler D., Krenn S., Lorünser T., Ramacher S., Slamanig D., Striecks Ch. Revisiting Proxy Re-encryption: Forward Secrecy, Improved Security, and Applications. In Proc. PKC 2018
  • Stangl J., Lorünser T., Manoj Pudukotai Dinakarrao S. A fast and resource efficient FPGA implementation of secret sharing for storage applications. In Proc. DATE 2018
  • Krenn S., Lorünser T., Salzer A., Striecks Ch. Towards Attribute-Based Credentials in the Cloud. In Proc. CANS 2017
  • Chase M., Derler D., Goldfeder S., Orlandi C., Ramacher S., Rechberger Ch., Slamanig D., Zaverucha G.: Post Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives.  ACM Conference on Computer and Communications Security 2017
  • Pacher Ch., Abidin A., Lorünser T., Peev M., Ursin R., Zeilinger A., Larsson J.:, Attacks on quantum key distribution protocols that employ non-ITS authentication. In Quantum Information Processing 15(1) 2016



  • B. Aichernig, H. Brandl, E. Jöbstl, W. Krenn, R. Schlick, and S. Tiran, “MoMuT::UML model-based mutation testing for UML,” in Software testing, verification and validation (icst), 2015 ieee 8th international conference on, 2015, pp. 1-8.
  • P. Daca, T. A. Henzinger, W. Krenn, and D. Ničković, “Compositional specifications for ioco testing,” in Software testing, verification and validation (icst), seventh international conference on, 2014, pp. 373-382.
  • B. K. Aichernig, K. Hörmaier, F. Lorber, D. Ničković, R. Schlick, D. Simoneau, and S. Tiran, “Integration of Requirements Engineering and Test-Case Generation via OSLC,” in Qsic ’14: proceedings of the 2014 14th international conference on quality software, Dallas, USA, 2014, p. 117–126.
  • B. K. Aichernig, K. Hörmaier, and F. Lorber, “Debugging with timed automata mutations,” in Computer safety, reliability, and security, A. Bondavalli and F. Di Giandomenico, Eds., Springer International Publishing, 2014, vol. 8666, pp. 49-64.
  • B. K. Aichernig, E. Jöbstl, and S. Tiran, “Model-based mutation testing via symbolic refinement checking,” Science of computer programming, 2014.
  • B. K. Aichernig, H. Brandl, E. Jöbstl, W. Krenn, R. Schlick, and S. Tiran, “Killing strategies for model-based mutation testing,” Software testing, verification and reliability, p. n/a–n/a, 2014.
  • B. K. Aichernig, J. Auer, E. Jöbstl, R. Korošec, W. Krenn, R. Schlick, and B. V. Schmidt, “Model-based mutation testing of an industrial measurement device,” in Tests and proofs, M. Seidl and N. Tillmann, Eds., Springer International Publishing, 2014, vol. 8570, p. 1–19.
  • W. Krenn, D. Ničković, and L. Tec, “Incremental language inclusion checking for networks of timed automata,” in Formal modeling and analysis of timed systems, V. Braberman and L. Fribourg, Eds., Springer Berlin Heidelberg, 2013, vol. 8053, pp. 152-167.
  • W. Krenn, R. Schlick, and B. K. Aichernig, “Mapping UML to labeled transition systems for test-case generation: a translation via object-oriented action systems,” in Proceedings of the 8th international conference on formal methods for components and objects, Berlin, Heidelberg, 2010, p. 186–207.
  • B. K. Aichernig, H. Brandl, and W. Krenn, “Qualitative action systems,” in Formal methods and software engineering, D. Hutchison, T. Kanade, J. Kittler, J. M. Kleinberg, F. Mattern, J. C. Mitchell, M. Naor, O. Nierstrasz, C. Pandu Rangan, B. Steffen, M. Sudan, D. Terzopoulos, D. Tygar, M. Y. Vardi, G. Weikum, K. Breitman, and A. Cavalcanti, Eds., Berlin, Heidelberg: Springer Berlin Heidelberg, 2009, vol. 5885, p. 206–225.


Risk Management

  • Schmittner, C., Latzenhofer, M., Abdelkader, S., & Hofer, M. (2018). A Proposal for a Comprehensive Automotive Cybersecurity Reference Architecture. VEHICULAR 2018, The Seventh International Conference on Advances in Vehicular Systems, Technologies and Applications, 30–36. https://www.thinkmind.org/download.php?articleid=vehicular_2018_3_10_30004
  • Schmittner, C., Latzenhofer, M., Shaaban, A. M., Bonitz, A., & Hofer, M. (2019). Towards a Comprehensive Automotive Cybersecurity Reference Architecture. International Journal of Advanced Computer Science and Applications, 12(no 1 & 2), 1–12.
  • Vogt T., Spahovic E., Doms T., Seyer R., Weiskirchner H., Pollhammer K., Raab T., Rührup S., Latzenhofer M., Schmittner C., Hofer M., Bonitz A., Kloibhofer C., Chlup S.: „A Comprehensive Risk Management Approach to Information Security in Intelligent Transport Systems”, SAE International Journal of Transportation Cybersecurity and Privacy, (2021)
  • Schauer S., Grafenauer T., König S., Warum M. and Rass S., “Estimating Cascading Effects in Cyber-Physical Critical Infrastructures”, in The 14th International Conference on Critical Information Infrastructures Security, Linköping, Sweden, 2019
  • König S. and Schauer S., “Cascading Threats in Critical Infrastructures with Control Systems”, in Proceedings of ISCRAM 2019, Valencia, Spain, 2019
  • Grafenauer T., König S., Rass S. and Schauer S., „A Simulation Tool for Cascading Effects in Interdependent Critical Infrastructures“, in Proceedings of the 13th International Conference on Availability, Reliability and Security  - ARES 2018, Hamburg, Germany, 2018, S. 1–8.
  • König S. and Rass S., „Stochastic Dependencies Between Critical Infrastructures“, in SECURWARE 2017, The Eleventh International Conference on Emerging Security Information, Systems and Technologies, Rome, Italy, 2017, S. 106–110.
  • Schauer S., König S., Latzenhofer M., Rass S. and Grafenauer T., „Analyzing Cascading Effects among Critical Infrastructures : The CERBERUS Approach“, in Proceedings of ISCRAM 2018, Rochester, USA, 2018.





Anomaly Detection & Cyber Threat Intelligence


  • Lorünser T., Krenn S., Schrenk B., Pacher Ch. A method for creating and distributing cryptographic keys. AT519476B1, 2017
  • Krenn S., Lorünser T. Method for testing the availability and integrity of a distributed data stored object. AT518910B1, 2016
  • Krenn S., Lorünser T., Striecks Ch. Method for exchanging data fields of certified documents. AT519025B1, 2016