We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Memory Band-Aid: A Principled Rowhammer Defense-in-Depth
Fiedler C., Juffinger J., Neela S., Heckel M., Weissteiner H., Yağlıkçı  ., Adamsky F., Gruß D.
NDSS 2026
Zero-Click SnailLoad: From Minimal to No User Interaction
Gast S., Puntigam N., Franza S., Neela S., Gruß D., Ullrich J.
Computer Security – ESORICS 2025
Don't Stop Receiving: Ensuring Availability of Critical Services on Compromised Mobile Devices
Van Eyck T., More S., Draschbacher F., Michiels S., Hughes D.
23rd IEEE International Symposium on Network Computing and Applications
Kernel Security in the Wild
Maar L.
Doctoral Thesis, 2025
Greyhound: A Reconfigurable and Extensible RISC-V SoC and eFPGA on IHP SG13G2
Moser L., Kissich M., Scheipel T., Baunach M.
Austrochip 2025: 33rd Austrian Workshop on Microelectronics
Epistemology of Rowhammer Attacks: Threats to Rowhammer Research Validity
Heckel M., Weissteiner H., Adamsky F., Gruß D.
ESORICS 2025
Special Issue on Open Hardware for Embedded System Security and Cryptography
Tempelmeier M., De Santis F., Bhasin S., Mangard S.
ACM Transactions on Embedded Computing Systems, Vol. 24(5), 2025
FHERMA Cookbook: FHE Components for Privacy-Preserving Applications
Adamek J., Aikata A., Al Badawi A., Alexandru A., Arakelov A., Arakelov G., Binfet P., Correa V., Dumezy J., Gomenyuk S., Kononova V., Lekomtsev D., Maloney V., Nguyen C., Polyakov Y., Pianykh D., Shaul H., Schulze Darup M., Teichrib D., Tronin D.
13th Workshop on Encrypted Computing & Applied Homomorphic Cryptography
Accelerating Hash-Based Polynomial Commitment Schemes with Linear Prover Time
Hirner F., Krieger F., Piber C., Sinha Roy S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2025(4), 2025
BISON: Blind Identification with Stateless scOped pseudoNyms
Heher J., More S., Heimberger L.
ACM ASIA CCS 2025 - Proceedings of the 20th ACM ASIA Conference on Computer and Communications Security
Systematic Analysis of Kernel Security Performance and Energy Costs
Rauscher F., Herzog B., Hönig T., Gruß D.
ACM ASIA CCS 2025
Scalable visual exploration of time series and anomalies with adaptive level of detail
Rakuschek J., Suschnigg J., Louis P., Mutlu B., Schreck T.
Information Visualization, 2025
When Good Kernel Defenses Go Bad: Reliable and Stable Kernel Exploits via Defense-Amplified TLB Side-Channel Leaks
Maar L., Giner L., Gruß D., Mangard S.
Proceedings of the 34rd USENIX Security Symposium
The Doom of Device Drivers: Your Android Device (Most Likely) has N-Day Kernel Vulnerabilities
Maar L., Draschbacher F., Schumm L., Martinez Garcia E., Mangard S.
Proceedings of the 34rd USENIX Security Symposium
TEEcorrelate: An Information-Preserving Defense against Performance-Counter Attacks on TEEs
Weissteiner H., Rauscher F., Schröder R., Juffinger J., Gast S., Wichelmann J., Eisenbarth T., Gruß D.
USENIX Security 2025
TDXploit: Novel Techniques for Single-Stepping and Cache Attacks on Intel TDX
Rauscher F., Wilke L., Weissteiner H., Eisenbarth T., Gruß D.
USENIX Secuirty 2025
Fast and Efficient Secure L1 Caches for SMT
Giner L., Czerny R., Lammer S., Giner A., Gollob P., Juffinger J., Gruß D.
Availability, Reliability and Security - 20th International Conference, ARES 2025, Proceedings
Guardians of the Registry: Certificate Transparency for Relying Party Authorization in eIDAS 2
Fasllija E., More S.
Availability, Reliability and Security
A Flexible Hardware Design Tool for Fast Fourier and Number-Theoretic Transformation Architectures
Krieger F., Hirner F., Mert A., Sinha Roy S.
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2025
 
				