We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Memory Band-Aid: A Principled Rowhammer Defense-in-Depth
Fiedler C., Juffinger J., Neela S., Heckel M., Weissteiner H., Yağlıkçı ., Adamsky F., Gruß D.
NDSS 2026
Step by Step
Disch L., Fessl A., Franza S., Kimmerle J., Pammer-Schindler V.
Discover Education, Vol. 4(1), 2025
Don't Stop Receiving: Ensuring Availability of Critical Services on Compromised Mobile Devices
Van Eyck T., More S., Draschbacher F., Michiels S., Hughes D.
23rd IEEE International Symposium on Network Computing and Applications
BEANIE – A 32-bit Cipher for Cryptographic Mitigations against Software Attacks
Gerhalter S., Hodžić S., Medwed M., Nageler M., Folwarczny A., Nikov V., Hoogerbrugge J., Schneider T., McConville G., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2025(4), 2025
Shields for Safe Reinforcement Learning
Könighofer B., Bloem R., Jansen N., Junges S., Pranger S.
Communications of the ACM, Vol. 68(11), 2025
WaitWatcher and WaitGuard
Lamster L., Rauscher F., Unterguggenberger M., Mangard S.
Computer Security – ESORICS 2025
Epistemology of Rowhammer Attacks: Threats to Rowhammer Research Validity
Heckel M., Weissteiner H., Adamsky F., Gruß D.
Computer Security – ESORICS 2025
FHERMA Cookbook: FHE Components for Privacy-Preserving Applications
Adamek J., Aikata A., Al Badawi A., Alexandru A., Arakelov A., Arakelov G., Binfet P., Correa V., Dumezy J., Gomenyuk S., Kononova V., Lekomtsev D., Maloney V., Nguyen C., Polyakov Y., Pianykh D., Shaul H., Schulze Darup M., Teichrib D., Tronin D.
Proceedings of the 13th Workshop on Encrypted Computing & Applied Homomorphic Computing, WAHC 2025
Zero-Click SnailLoad: From Minimal to No User Interaction
Gast S., Puntigam N., Franza S., Neela S., Gruß D., Ullrich J.
Computer Security – ESORICS 2025
Cache Timing Leakages in Zero-Knowledge Protocols
Mukherjee S., Rechberger C., Schofnegger M.
7th Conference on Advances in Financial Technologies
Scalable visual exploration of time series and anomalies with adaptive level of detail
Rakuschek J., Suschnigg J., Louis P., Mutlu B., Schreck T.
Information Visualization, Vol. 24(4), 2025
Kernel Security in the Wild
Maar L.
Doctoral Thesis, 2025
Special Issue on Open Hardware for Embedded System Security and Cryptography
Tempelmeier M., De Santis F., Bhasin S., Mangard S.
ACM Transactions on Embedded Computing Systems, Vol. 24(5), 2025
Accelerating Hash-Based Polynomial Commitment Schemes with Linear Prover Time
Hirner F., Krieger F., Piber C., Sinha Roy S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2025(4), 2025
BISON: Blind Identification with Stateless scOped pseudoNyms
Heher J., More S., Heimberger L.
ACM ASIA CCS 2025 - Proceedings of the 20th ACM ASIA Conference on Computer and Communications Security
Systematic Analysis of Kernel Security Performance and Energy Costs
Rauscher F., Herzog B., Hönig T., Gruß D.
ACM ASIA CCS 2025
When Good Kernel Defenses Go Bad: Reliable and Stable Kernel Exploits via Defense-Amplified TLB Side-Channel Leaks
Maar L., Giner L., Gruß D., Mangard S.
Proceedings of the 34rd USENIX Security Symposium
The Doom of Device Drivers: Your Android Device (Most Likely) has N-Day Kernel Vulnerabilities
Maar L., Draschbacher F., Schumm L., Martinez Garcia E., Mangard S.
Proceedings of the 34rd USENIX Security Symposium
TEEcorrelate: An Information-Preserving Defense against Performance-Counter Attacks on TEEs
Weissteiner H., Rauscher F., Schröder R., Juffinger J., Gast S., Wichelmann J., Eisenbarth T., Gruß D.
USENIX Security 2025
