We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Systematic Analysis of Kernel Security Performance and Energy Costs
Rauscher F., Herzog B., Hönig T., Gruß D.
ASIA CCS '25
When Good Kernel Defenses Go Bad: Reliable and Stable Kernel Exploits via Defense-Amplified TLB Side-Channel Leaks
Maar L., Giner L., Gruß D., Mangard S.
Proceedings of the 34rd USENIX Security Symposium, 34th USENIX Security Symposium, (Proceedings of the 34rd USENIX Security Symposium)
TEEcorrelate: An Information-Preserving Defense against Performance-Counter Attacks on TEEs
Weissteiner H., Rauscher F., Schröder R., Juffinger J., Gast S., Wichelmann J., Eisenbarth T., Gruß D.
USENIX Security 2025
The HMB Timing Side Channel: Exploiting the SSD's Host Memory Buffer
Juffinger J., Weissteiner H., Steinbauer T., Gruß D.
Detection of Intrusions and Malware, and Vulnerability Assessment - 22st International Conference, DIMVA 2025, Proceedings, 22nd International Conference on Detection of Intrusions and Malware, and Vulnerability Assess, DIMVA 2025
Real-World Study of the Security of Educational Test Systems
Gast S., Felix S., Steinmaurer A., Juffinger J., Gruß D.
10th IEEE European Symposium on Security and Privacy, Workshop Proceedings, Workshop on Operating Systems and Virtualization Security
Not So Secure TSC
Juffinger J., Neela S., Gruß D.
Applied Cryptography and Network Security, 23rd International Conference on Applied Cryptography and Network Security
Genuine PDF Forgeries (Extended Abstract)
Heher J., Pichler E., More S.
, ( 20th IFIP Summer School on Privacy and Identity Management 2025)
Guardians of the Registry: Certificate Transparency for Relying Party Authorization in eIDAS 2
Fasllija E., More S.
ARES 2025 - 20th International Conference on Availability, Reliability and Security, 20th International Conference on Availability, Reliability and Security, ARES 2025
Future-Proof Asynchronous IoT Backups: An Evaluation of Secure IoT Data Recovery Considering Post-Quantum Threats
Shvets D., Fasllija E., Heher J., More S.
ICT Systems Security and Privacy Protection, 40th International Conference on ICT Systems Security and Privacy Protection, IFIP SEC 2025, (IFIP Advances in Information and Communication Technology)
LEAP: A Fast, Lattice-based OPRF with Application to Private Set Intersection
Heimberger L., Kales D., Lolato R., Mir O., Ramacher S., Rechberger C.
Advances in Cryptology – EUROCRYPT 2025, Eurocrypt 2025, (Lecture Notes in Computer Science; vol. 15607 LNCS)
BISON: Blind Identification with Stateless scOped pseudoNyms
Heher J., More S., Heimberger L.
Proceedings of the 2025 ACM Asia Conference on Computer and Communications Security, 20th ACM ASIA Conference on Computer and Communications Security
Fairness Shields: Safeguarding against Biased Decision Makers
Cano Cordoba F., Henzinger T., Könighofer B., Kueffner K., Mallik K.
Proceedings of the AAAI Conference on Artificial Intelligence, AAAI Press, 15659-15668, (Proceedings of the AAAI Conference on Artificial Intelligence)
Cohere+Reload: Re-enabling High-Resolution Cache Attacks on AMD SEV-SNP
Giner L., Neela S., Gruß D.
DIMVA, 22nd International Conference on Detection of Intrusions and Malware, and Vulnerability Assess, DIMVA 2025
Accelerating Isogeny Walks for VDF Evaluation
Jacquemin D., Mukherjee A., Mert A., Sinha Roy S.
IACR Communications in Crypology, Vol. 2(1)
Final Integrated Solution and Validation Results of the ERATOSTHENES Holistic IoT Devices Security and Privacy Respecting Architecture
Loupos K., Vavilis S., Niavis H., Michalopoulos F., Dafloukas K., Skarmeta A., García J., Palomares A., Song H., Dautov R., Mancilla R., Giampaolo F., Van Landuyt D., Michiels S., More S., Xenakis C., Krilakis K.
Embedded World Conference 2025, Embedded World 2025
AutoDiVer: Automatically Verifying Differential Characteristics and Learning Key Conditions
Nageler M., Ghosh S., Jüttler M., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2025(1), 471-514
Skyscraper: Fast Hashing on Big Primes
Schmid F., Rechberger C., Koschatko K., Grassi L., Bouvier C., Khovratovich D., Schofnegger M.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2025(2), 743-780
REED
Aikata A., Mert A., Kwon S., Deryabin M., Sinha Roy S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2025(2), 163-208
Selected Areas in Cryptography - SAC 2024, Part II
Eichlseder M., Gambs S.
, Springer, (Lecture Notes in Computer Science; vol. 15517 LNCS)
Selected Areas in Cryptography - SAC 2024, Part I
Eichlseder M., Gambs S.
, Springer, (Lecture Notes in Computer Science; vol. 15516 LNCS)