We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
TELESCOPE: TDX Exploit Leaking Encrypted Data using Sibling Core Performance Counters
Rauscher F., Weissteiner H., Gruß D.
ACM Asia Conference on Computer and Communications Security (ASIA CCS ’26)
Continuous User Behavior Monitoring using DNS Cache Timing Attacks
Weissteiner H., Czerny R., Franza S., Gast S., Ullrich J., Gruß D.
NDSS 2026
Defense-in-Depth Techniques for Memory Safety in Hardware
Unterguggenberger M.
Doctoral Thesis, 2026
Relating Definitions of Computational Differential Privacy in Wider Parameter Regimes
Meisingseth F., Rechberger C.
IACR Communications in Crypology, Vol. 2(4), 2026
Poseidon(2)b
Koschatko K., Grassi L., Khovratovich D., Rechberger C., Schofnegger M., Schröppel V., Wu Z.
IACR Communications in Crypology, Vol. 2(4), 2026
Parameterized Infinite-State Reactive Synthesis
Maderbacher B., Bloem R.
Proceedings of the ACM on Programming Languages, Vol. 10(POPL), 2026
Efficient SPA Countermeasures using Redundant Number Representation with Application to ML-KEM
Nagpal R., Hadzic V., Primas R., Mangard S.
Selected Areas in Cryptography - SAC 2025 - 32nd International Conference, Revised Selected Papers
Memory Band-Aid: A Principled Rowhammer Defense-in-Depth
Fiedler C., Juffinger J., Neela S., Heckel M., Weissteiner H., Yağlıkçı ., Adamsky F., Gruß D.
Network and Distributed System Security (NDSS) 2026
FLIPPYRAM: A Large-Scale Study of Rowhammer Prevalence
Heckel M., Sayadi N., Juffinger J., Fiedler C., Gruß D., Adamsky F.
Network and Distributed System Security (NDSS) 2026
webSPDZ
Buchsteiner T., Koch K., Rotaru D., Rechberger C.
Cryptology and Network Security - 24th International Conference, CANS 2025, Proceedings
Preimage-type Attacks for Reduced Ascon-Hash: Application to Ed25519
Nageler M., Schmid L., Eichlseder M.
Selected Areas in Cryptography - SAC 2025 - 32nd International Conference, Revised Selected Papers
Verifying DRAM Addressing in Software
Heckel M., Adamsky F., Juffinger J., Rauscher F., Gruß D.
Computer Security - ESORICS 2025 - 30th European Symposium on Research in Computer Security, 2025, Proceedings
Eviction Notice: Reviving and Advancing Page Cache Attacks
Neela S., Juffinger J., Maar L., Gruß D.
Network and Distributed System Security (NDSS) Symposium
High-Performance SIMD Software for Spielman Codes in Zero-Knowledge Proofs
Krieger F., Dobrouschek C., Hirner F., Sinha Roy S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2026(2), 2026
Attacking and Securing Hybrid Homomorphic Encryption Against Power Analysis
Aikata A., Czuprynko M., Musovic N., Salkić E., Sinha Roy S.
2026
KnitSim
Kantz B., Waldert P., Schreck T., Preiner R.
18th International Symposium on Visual Information Communication and Interaction, VINCI 2025
Visual Exploration of Ontologies Supported by Language Models and Interactive Lenses
Kantz B., Waldert P., Lengauer S., Schreck T.
18th International Symposium on Visual Information Communication and Interaction, VINCI 2025
AnoScout - Visual Exploration of Anomalies and Anomaly Detection Algorithm Ensembles in Time Series Data
Rakuschek J., Leitner M., Bernard J., Wriessnegger S., Schreck T.
18th International Symposium on Visual Information Communication and Interaction, VINCI 2025
SOF: Sorted Opacity Fields for Fast Unbounded Surface Reconstruction
Radl L., Windisch F., Deixelberger T., Hladky J., Steiner M., Schmalstieg D., Steinberger M.
Proceedings of the SIGGRAPH Asia 2025 Conference Papers
Genuine PDF Forgeries
Heher J., Pichler E., More S.
IFIP Advances in Information and Communication Technology
