Publications

Attestable Builds: Compiling Verifiable Binaries on Untrusted Systems using Trusted Execution Environments

D. Hugenroth*, M. Lins*, R. Mayrhofer, and A. R. Beresford • Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security. CCS '25, Taipei, Taiwan, 2025.

* These authors contributed equally.

Unveiling the Critical Attack Path for Implanting Backdoors in Supply Chains: Practical Experience from XZ

M. Lins, M. Roland, and R. Mayrhofer • in Cryptology and Network Security. 24th International Conference, CANS 2025, Osaka, Japan, LNCS, vol. 16351/2026, Springer, pp. 521-541, 2025.

An Architecture for Distributed Digital Identities in the Physical World

R. Mayrhofer, M. Roland, T. Höller, P. Hofer, and M. Lins • Preprint, Computing Research Repository (CoRR), arXiv:2508.10185 [cs.CR], 2025.

Innovative mobile app solution for facial nerve rehabilitation: a usability analysis

K. Machetanz, M. Lins, C. Roder, G. Naros, M. Tatagiba, H. Hurth • Frontiers in Digital Health, Vol. 6 2024

On the critical path to implant backdoors and the effectiveness of potential mitigation techniques: Early learnings from XZ

M. Lins, R. Mayrhofer, M. Roland, D. Hofer, and M. Schwaighofer • Preprint, Computing Research Repository (CoRR), arXiv:2404.08987 [cs.CR], 2024.

Mobile App Distribution Transparency (MADT): Design and evaluation of a system to mitigate necessary trust in mobile app distribution systems

M. Lins, R. Mayrhofer, M. Roland, and A. R. Beresford • Secure IT Systems. 28th Nordic Conference, NordSec 2023, Oslo, Norway, LNCS, vol. 14324/2024, Springer, pp. 185-203, 2023.