We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Zero-Click SnailLoad: From Minimal to No User Interaction
Gast S., Puntigam N., Franza S., Neela S., Gruß D., Ullrich J.
ESORICS 2025, Springer, (Lecture Notes in Computer Science)
Systematic Analysis of Kernel Security Performance and Energy Costs
Rauscher F., Herzog B., Hönig T., Gruß D.
ASIA CCS '25, 20th ACM ASIA Conference on Computer and Communications Security, ACM ASIACCS 2025
When Good Kernel Defenses Go Bad: Reliable and Stable Kernel Exploits via Defense-Amplified TLB Side-Channel Leaks
Maar L., Giner L., Gruß D., Mangard S.
Proceedings of the 34rd USENIX Security Symposium, 34th USENIX Security Symposium, (Proceedings of the 34rd USENIX Security Symposium)
The Doom of Device Drivers: Your Android Device (Most Likely) has N-Day Kernel Vulnerabilities
Maar L., Draschbacher F., Schumm L., Martinez Garcia E., Mangard S.
Proceedings of the 34rd USENIX Security Symposium, 34th USENIX Security Symposium
TEEcorrelate: An Information-Preserving Defense against Performance-Counter Attacks on TEEs
Weissteiner H., Rauscher F., Schröder R., Juffinger J., Gast S., Wichelmann J., Eisenbarth T., Gruß D.
USENIX Security 2025, 34th USENIX Security Symposium
The HMB Timing Side Channel: Exploiting the SSD's Host Memory Buffer
Juffinger J., Weissteiner H., Steinbauer T., Gruß D.
Detection of Intrusions and Malware, and Vulnerability Assessment - 22st International Conference, DIMVA 2025, Proceedings, 22nd International Conference on Detection of Intrusions and Malware, and Vulnerability Assess, DIMVA 2025
Real-World Study of the Security of Educational Test Systems
Gast S., Felix S., Steinmaurer A., Juffinger J., Gruß D.
10th IEEE European Symposium on Security and Privacy, Workshop Proceedings, Workshop on Operating Systems and Virtualization Security
Not So Secure TSC
Juffinger J., Neela S., Gruß D.
Applied Cryptography and Network Security, 23rd International Conference on Applied Cryptography and Network Security
Step by Step
Disch L., Fessl A., Franza S., Kimmerle J., Pammer-Schindler V.
Discover Education, Vol. 4(1)
Poseidon and Neptune
Grassi L., Koschatko K., Rechberger C.
IACR Transactions on Symmetric Cryptology, Vol. 2025(2), 34-86
Chasing Shadows: Advancements in Differential-Linear Cryptanalysis for ChaCha
Sahoo S., Chakraborty D., Sarkar S.
IEEE Transactions on Information Theory, Vol. 71(8), 6451 - 6469
ToFA: Towards Fault Analysis of GIFT and GIFT-like Ciphers Leveraging Truncated Impossible Differentials
Kundu A., Ghosh S., Aikata A., Saha D.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2025(3), 614-643
Genuine PDF Forgeries (Extended Abstract)
Heher J., Pichler E., More S.
, ( 20th IFIP Summer School on Privacy and Identity Management 2025)
Preimage-type Attacks for Reduced Ascon-Hash: Application to Ed25519
Nageler M., Schmid L., Eichlseder M.
Selected Areas in Cryptography – SAC 2025, Springer
Exploring the Foundations of Artificial Intelligence in Secondary Education – A Workshop-Based Study
Keller S., Kandlhofer M., Steinbauer-Wagner G.
Learning and Collaboration Technologies , 12th International Conference on Learning and Collaboration Technologies, LCT 2025, held as part of the 27th HCI International Conference, HCII 2025, 93-104, (Lecture Notes in Computer Science; vol. 15807 LNCS)
Guardians of the Registry: Certificate Transparency for Relying Party Authorization in eIDAS 2
Fasllija E., More S.
ARES 2025 - 20th International Conference on Availability, Reliability and Security, 20th International Conference on Availability, Reliability and Security, ARES 2025
Future-Proof Asynchronous IoT Backups: An Evaluation of Secure IoT Data Recovery Considering Post-Quantum Threats
Shvets D., Fasllija E., Heher J., More S.
ICT Systems Security and Privacy Protection. SEC 2025., 40th International Conference on ICT Systems Security and Privacy Protection, IFIP SEC 2025, 34-48, (IFIP Advances in Information and Communication Technology; vol. 746 IFIPAICT)
LEAP: A Fast, Lattice-based OPRF with Application to Private Set Intersection
Heimberger L., Kales D., Lolato R., Mir O., Ramacher S., Rechberger C.
Advances in Cryptology – EUROCRYPT 2025 - 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings, Eurocrypt 2025, 254-283, (Lecture Notes in Computer Science; vol. 15607 LNCS)
Exploring Large Integer Multiplication for Cryptography Targeting In-Memory Computing
Krieger F., Hirner F., Sinha Roy S.
2025 Design, Automation and Test in Europe Conference, DATE 2025 - Proceedings, 2025 Design, Automation and Test in Europe Conference: DATE 2025, 1-7, (Proceedings -Design, Automation and Test in Europe, DATE)
BISON: Blind Identification with Stateless scOped pseudoNyms
Heher J., More S., Heimberger L.
Proceedings of the 2025 ACM Asia Conference on Computer and Communications Security, 20th ACM ASIA Conference on Computer and Communications Security