Publications

Memory Band-Aid: A Principled Rowhammer Defense-in-Depth

Fiedler C., Juffinger J., Neela S., Heckel M., Weissteiner H., Yağlıkçı ., Adamsky F., Gruß D.
NDSS 2026

Epistemology of Rowhammer Attacks: Threats to Rowhammer Research Validity

Heckel M., Weissteiner H., Adamsky F., Gruß D.
ESORICS 2025, 30th European Symposium on Research in Computer Security, ESORICS 2025, (Lecture Notes in Computer Science)

TEEcorrelate: An Information-Preserving Defense against Performance-Counter Attacks on TEEs

Weissteiner H., Rauscher F., Schröder R., Juffinger J., Gast S., Wichelmann J., Eisenbarth T., Gruß D.
USENIX Security 2025, 34th USENIX Security Symposium

TDXploit: Novel Techniques for Single-Stepping and Cache Attacks on Intel TDX

Rauscher F., Wilke L., Weissteiner H., Eisenbarth T., Gruß D.
USENIX Secuirty 2025, 34th USENIX Security Symposium

The HMB Timing Side Channel: Exploiting the SSD's Host Memory Buffer

Juffinger J., Weissteiner H., Steinbauer T., Gruß D.
Detection of Intrusions and Malware, and Vulnerability Assessment - 22st International Conference, DIMVA 2025, Proceedings, 22nd International Conference on Detection of Intrusions and Malware, and Vulnerability Assess, DIMVA 2025

More Publications