default search action
Andrea Höller
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c42]Johannes Winkler, Andrea Höller, Christian Steger:
Optimizing Picnic for Limited Memory Resources. DSD 2020: 200-204
2010 – 2019
- 2019
- [j2]Martin R. Albrecht, Christian Hanser, Andrea Höller, Thomas Pöppelmann, Fernando Virdia, Andreas Wallner:
Implementing RLWE-based Schemes Using an RSA Co-Processor. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(1): 169-208 (2019) - 2018
- [c41]Andrea Höller, Ronald Toegl:
Trusted Platform Modules in Cyber-Physical Systems: On the Interference Between Security and Dependability. EuroS&P Workshops 2018: 136-144 - [c40]Sarah Haas, Andrea Höller, Thomas Ulz, Christian Steger:
Inter-device Sensor-Fusion for Action Authorization on Industrial Mobile Robots. SAFECOMP 2018: 282-296 - [c39]Thomas Ulz, Thomas W. Pieber, Christian Steger, Andrea Höller, Sarah Haas, Rainer Matischek:
Automated Authentication Credential Derivation for the Secured Configuration of IoT Devices. SIES 2018: 1-8 - [i2]Martin R. Albrecht, Christian Hanser, Andrea Höller, Thomas Pöppelmann, Fernando Virdia, Andreas Wallner:
Learning with Errors on RSA Co-Processors. IACR Cryptol. ePrint Arch. 2018: 425 (2018) - 2017
- [c38]Thomas Fischer, Christian H. Lesjak, Andrea Höller, Christian Steger:
Security for building automation with hardware-based node authentication. ETFA 2017: 1-6 - [c37]Tobias Rauter, Andrea Höller, Johannes Iber, Michael Krisper, Christian Kreiner:
Integration of Integrity Enforcing Technologies into Embedded Control Devices: Experiences and Evaluation. PRDC 2017: 155-164 - 2016
- [c36]Tobias Rauter, Andrea Höller, Johannes Iber, Christian Kreiner:
Using Model-Based Testing for Manufacturing and Integration-Testing of Embedded Control Systems. DSD 2016: 463-470 - [c35]Andrea Höller, Bernhard Spitzer, Tobias Rauter, Johannes Iber, Christian Kreiner:
Diverse Compiling for Software-Based Recovery of Permanent Faults in COTS Processors. DSN Workshops 2016: 143-148 - [c34]Johannes Iber, Andrea Höller, Tobias Rauter, Christian Kreiner:
Patterns for designing configurability into domain-specific language elements. EuroPLoP 2016: 1 - [c33]Tobias Rauter, Andrea Höller, Johannes Iber, Christian Kreiner:
Static and dynamic integrity properties patterns. EuroPLoP 2016: 14 - [c32]Tobias Rauter, Andrea Höller, Johannes Iber, Christian Kreiner:
Development and Production Processes for Secure Embedded Control Devices. EuroSPI 2016: 119-131 - [c31]Tobias Rauter, Andrea Höller, Johannes Iber, Christian Kreiner:
Thingtegrity: A Scalable Trusted Computing Architecture for the Internet of Things. EWSN 2016: 23-34 - [c30]Andrea Höller, Johannes Iber, Tobias Rauter, Christian Kreiner:
Poster: Towards a Secure, Resilient, and Distributed Infrastructure for Hydropower Plant Unit Control. EWSN 2016: 253-254 - [c29]Tobias Rauter, Andrea Höller, Nermin Kajtazovic, Christian Kreiner:
Asset-Centric Security Risk Assessment of Software Components. MILS@HiPEAC 2016 - 2015
- [c28]Andrea Höller, Tobias Rauter, Johannes Iber, Christian Kreiner:
Diverse Compiling for Microprocessor Fault Detection in Temporal Redundant Systems. CIT/IUCC/DASC/PICom 2015: 1928-1935 - [c27]Tobias Rauter, Andrea Höller, Nermin Kajtazovic, Christian Kreiner:
Privilege-Based Remote Attestation: Towards Integrity Assurance for Lightweight Clients. IoTPTS@AsiaCCS 2015: 3-9 - [c26]Andrea Höller, Nermin Kajtazovic, Tobias Rauter, Kay Römer, Christian Kreiner:
Evaluation of diverse compiling for software-fault detection. DATE 2015: 531-536 - [c25]Andrea Höller, Armin Krieg, Tobias Rauter, Johannes Iber, Christian Kreiner:
QEMU-Based Fault Injection for a System-Level Analysis of Software Countermeasures Against Fault Attacks. DSD 2015: 530-533 - [c24]Georg Macher, Andrea Höller, Harald Sporer, Eric Armengaud, Christian Kreiner:
Service Deterioration Analysis (SDA): An Early Development Phase Dependability Analysis Method. DSN Workshops 2015: 27-32 - [c23]Andrea Höller, Georg Macher, Tobias Rauter, Johannes Iber, Christian Kreiner:
A Virtual Fault Injection Framework for Reliability-Aware Software Development. DSN Workshops 2015: 69-74 - [c22]Georg Macher, Andrea Höller, Eric Armengaud, Christian Kreiner:
Pattern catalog for multicore migration of embedded automotive systems. EuroPLoP 2015: 24:1-24:11 - [c21]Andrea Höller, Tobias Rauter, Johannes Iber, Christian Kreiner:
Patterns for automated software diversity to support security and reliability. EuroPLoP 2015: 38:1-38:13 - [c20]Tobias Rauter, Andrea Höller, Johannes Iber, Christian Kreiner:
Patterns for software integrity protection. EuroPLoP 2015: 49:1-49:10 - [c19]Georg Macher, Andrea Höller, Eric Armengaud, Christian Kreiner:
Automotive embedded software: Migration challenges to multi-core computing platforms. INDIN 2015: 1386-1393 - [c18]Tobias Rauter, Andrea Höller, Nermin Kajtazovic, Christian Kreiner:
Towards an automated generation of application confinement policies with binary analysis. ISNCC 2015: 1-6 - [c17]Johannes Iber, Andrea Höller, Tobias Rauter, Christian Kreiner:
Towards a Generic Modeling Language for Contract-Based Design. ModComp@MoDELS 2015: 24-29 - [c16]Johannes Iber, Nermin Kajtazovic, Andrea Höller, Tobias Rauter, Christian Kreiner:
Ubtl - UML Testing Profile based Testing Language. MODELSWARD 2015: 99-110 - [c15]Johannes Iber, Nermin Kajtazovic, Georg Macher, Andrea Höller, Tobias Rauter, Christian Kreiner:
A Textual Domain-Specific Language Based on the UML Testing Profile. MODELSWARD (Revised Selected Papers) 2015: 155-171 - [c14]Georg Macher, Andrea Höller, Harald Sporer, Eric Armengaud, Christian Kreiner:
A Combined Safety-Hazards and Security-Threat Analysis Method for Automotive Systems. SAFECOMP Workshops 2015: 237-250 - [c13]Georg Macher, Andrea Höller, Harald Sporer, Eric Armengaud, Christian Kreiner:
A Comprehensive Safety, Security, and Serviceability Assessment Method. SAFECOMP 2015: 410-424 - [c12]Andrea Höller, Tobias Rauter, Johannes Iber, Christian Kreiner:
Towards Dynamic Software Diversity for Resilient Redundant Embedded Systems. SERENE 2015: 16-30 - [c11]Harald Sporer, Georg Macher, Andrea Höller, Christian Kreiner:
Bidirectional Crosslinking of System and Software Modeling in the Automotive Domain. SERENE 2015: 99-113 - [p1]Nermin Kajtazovic, Christopher Preschern, Andrea Höller, Christian Kreiner:
Constraint-Based Verification of Compositions in Safety-Critical Component-Based Systems. Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing 2015: 113-130 - [i1]Andrea Höller, Tobias Rauter, Johannes Iber, Georg Macher, Christian Kreiner:
Software-Based Fault Recovery via Adaptive Diversity for COTS Multi-Core Processors. CoRR abs/1511.03528 (2015) - 2014
- [j1]Nermin Kajtazovic, Christopher Preschern, Andrea Höller, Christian Kreiner:
On Design-time Modelling and Verification of Safety-critical Component-based Systems. Int. J. Networked Distributed Comput. 2(3): 175-188 (2014) - [c10]Andrea Höller, Norbert Druml, Christian Kreiner, Christian Steger, Tomaz Felicijan:
Hardware/Software Co-Design of Elliptic-Curve Cryptography for Resource-Constrained Applications. DAC 2014: 207:1-207:6 - [c9]Christopher Preschern, Nermin Kajtazovic, Andrea Höller, Christian Kreiner:
Pattern-based safety development methods: overview and comparison. EuroPLoP 2014: 28:1-28:20 - [c8]Nermin Kajtazovic, Christopher Preschern, Andrea Höller, Christian Kreiner:
Towards pattern-based reuse in safety-critical systems. EuroPLoP 2014: 33:1-33:15 - [c7]Nermin Kajtazovic, Andrea Höller, Tobias Rauter, Christian Kreiner:
Reducing Certification Costs through Assured Dynamic Software Configuration. ISSRE Workshops 2014: 515-520 - [c6]Nermin Kajtazovic, Andrea Höller, Tobias Rauter, Christian Kreiner:
A Lightweight Framework for Testing Safety-critical Component-based Systems on Embedded Targets. ModComp@MoDELS 2014: 78-87 - [c5]Andrea Höller, Gerhard Schonfelder, Nermin Kajtazovic, Tobias Rauter, Christian Kreiner:
FIES: A Fault Injection Framework for the Evaluation of Self-Tests for COTS-Based Safety-Critical Systems. MTV 2014: 105-110 - [c4]Nermin Kajtazovic, Christopher Preschern, Andrea Höller, Christian Kreiner:
Towards Assured Dynamic Configuration of Safety-Critical Embedded Systems. SAFECOMP Workshops 2014: 167-179 - [c3]Andrea Höller, Nermin Kajtazovic, Christopher Preschern, Christian Kreiner:
Formal Fault Tolerance Analysis of Algorithms for Redundant Systems in Early Design Stages. SERENE 2014: 71-85 - 2013
- [c2]Andrea Höller, Christopher Preschern, Christian Steger, Christian Kreiner, Armin Krieg, Holger Bock, Josef Haid:
Automatized high-level evaluation of security properties for RTL hardware designs. WESS 2013: 6:1-6:8 - [c1]Christopher Preschern, Nermin Kajtazovic, Andrea Höller, Christian Steger, Christian Kreiner:
Verifying generic IEC 61508 CPU self-tests with fault injection. IDT 2013: 1-2
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint