We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Client-Side Mitigation of Remote Latency Side-Channel Attacks
Gast S., Franza S., Heckel M., Juffinger J., Gruß D., Ullrich J.
Detection of Intrusions and Malware, and Vulnerability Assessment - 23rd International Conference, DIMVA 2026, Proceedings
TELESCOPE: TDX Exploit Leaking Encrypted Data using Sibling Core Performance Counters
Rauscher F., Weissteiner H., Gruß D.
ACM Asia Conference on Computer and Communications Security (ASIA CCS ’26)
Integral Resistance and Degree Bounds for Complex Linear Layers
Gerhalter S., Eichlseder M.
Selected Areas in Cryptography
CAGE-V: Confidential Computing Architecture supporting Guest Enclaves for RISC-V
Waser M., Gollob P., Unterguggenberger M., Mangard S.
Proceedings of the ACM Asia Conference on Computer and Communications Security (ASIA CCS ’26),
Guided spiral visualization for periodic time series and residual analysis
Rakuschek J., Hauser H., Schreck T.
Computers & Graphics, Vol. 135, 2026
Efficient Low-Latency Masking of Ascon without Fresh Randomness
Hari Prasad S., Mendel F., Schläffer M., Nagpal R.
IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
Continuous User Behavior Monitoring using DNS Cache Timing Attacks
Weissteiner H., Czerny R., Franza S., Gast S., Ullrich J., Gruß D.
NDSS 2026
Stealthy Hardware Trojan Attacks on MQ-Based Post-Quantum Digital Signatures
Sinha Roy S., Aikata A., Mukherjee A.
Lightweight Cryptography for Security and Privacy - 6th International Workshop, LightSec 2025, Revised Selected Papers
Defense-in-Depth Techniques for Memory Safety in Hardware
Unterguggenberger M.
Doctoral Thesis, 2026
Parameterized Infinite-State Reactive Synthesis
Maderbacher B., Bloem R.
Proceedings of the ACM on Programming Languages, Vol. 10(POPL), 2026
Relating Definitions of Computational Differential Privacy in Wider Parameter Regimes
Meisingseth F., Rechberger C.
IACR Communications in Crypology, Vol. 2(4), 2026
Poseidon(2)b
Koschatko K., Grassi L., Khovratovich D., Rechberger C., Schofnegger M., Schröppel V., Wu Z.
IACR Communications in Crypology, Vol. 2(4), 2026
Efficient SPA Countermeasures using Redundant Number Representation with Application to ML-KEM
Nagpal R., Hadzic V., Primas R., Mangard S.
Selected Areas in Cryptography - SAC 2025 - 32nd International Conference, Revised Selected Papers
Clone2Pwn: A Systematic Security Analysis of Data Migration Tools in the Android Ecosystem
Draschbacher F., Maar L., Schumm L., Denifl R., Treffner L., Mangard S.
European Symposium on Research in Computer Security
PowerHooK: Enabling Software-Based Power Side Channels Against AMD SEV Technologies via Transient-Execution Replay
Oberhuber M., Unterguggenberger M., Wistauder M., Kogler A., Nagpal R., Mangard S.
USENIX WOOT Conference on Offensive Technologies (WOOT '26)
Memory Band-Aid: A Principled Rowhammer Defense-in-Depth
Fiedler C., Juffinger J., Neela S., Heckel M., Weissteiner H., Yağlıkçı ., Adamsky F., Gruß D.
Network and Distributed System Security (NDSS) 2026
FLIPPYRAM: A Large-Scale Study of Rowhammer Prevalence
Heckel M., Sayadi N., Juffinger J., Fiedler C., Gruß D., Adamsky F.
Network and Distributed System Security (NDSS) 2026
Streaming Real-Time Trajectory Prediction Using Endpoint-Aware Modeling
Prutsch A., Schinagl D., Possegger H.
IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)
SHARP: Short-Window Streaming for Accurate and Robust Prediction in Motion Forecasting
Prutsch A., Fruhwirth-Reisinger C., Schinagl D., Possegger H.
IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)
webSPDZ
Buchsteiner T., Koch K., Rotaru D., Rechberger C.
Cryptology and Network Security - 24th International Conference, CANS 2025, Proceedings
