We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
TELESCOPE: TDX Exploit Leaking Encrypted Data using Sibling Core Performance Counters
Rauscher F., Weissteiner H., Gruß D.
ACM Asia Conference on Computer and Communications Security (ASIA CCS ’26)
Continuous User Behavior Monitoring using DNS Cache Timing Attacks
Weissteiner H., Czerny R., Franza S., Gast S., Ullrich J., Gruß D.
NDSS 2026
Relating Definitions of Computational Differential Privacy in Wider Parameter Regimes
Meisingseth F., Rechberger C.
IACR Communications in Crypology, Vol. 2(4), 2026
Poseidon(2)b
Koschatko K., Grassi L., Khovratovich D., Rechberger C., Schofnegger M., Schröppel V., Wu Z.
IACR Communications in Crypology, Vol. 2(4), 2026
Parameterized Infinite-State Reactive Synthesis
Maderbacher B., Bloem R.
Proceedings of the ACM on Programming Languages, Vol. 10(POPL), 2026
Memory Band-Aid: A Principled Rowhammer Defense-in-Depth
Fiedler C., Juffinger J., Neela S., Heckel M., Weissteiner H., Yağlıkçı ., Adamsky F., Gruß D.
Network and Distributed System Security (NDSS) 2026
FLIPPYRAM: A Large-Scale Study of Rowhammer Prevalence
Heckel M., Sayadi N., Juffinger J., Fiedler C., Gruß D., Adamsky F.
Network and Distributed System Security (NDSS) 2026
webSPDZ
Buchsteiner T., Koch K., Rotaru D., Rechberger C.
Cryptology and Network Security - 24th International Conference, CANS 2025, Proceedings
Preimage-type Attacks for Reduced Ascon-Hash: Application to Ed25519
Nageler M., Schmid L., Eichlseder M.
Selected Areas in Cryptography – SAC 2025
Verifying DRAM Addressing in Software
Heckel M., Adamsky F., Juffinger J., Rauscher F., Gruß D.
Computer Security - ESORICS 2025 - 30th European Symposium on Research in Computer Security, 2025, Proceedings
Eviction Notice: Reviving and Advancing Page Cache Attacks
Neela S., Juffinger J., Maar L., Gruß D.
Network and Distributed System Security (NDSS) Symposium
High-Performance SIMD Software for Spielman Codes in Zero-Knowledge Proofs
Krieger F., Dobrouschek C., Hirner F., Sinha Roy S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2026(2), 2026
Attacking and Securing Hybrid Homomorphic Encryption Against Power Analysis
Aikata A., Czuprynko M., Musovic N., Salkić E., Sinha Roy S.
2026
SOF: Sorted Opacity Fields for Fast Unbounded Surface Reconstruction
Radl L., Windisch F., Deixelberger T., Hladky J., Steiner M., Schmalstieg D., Steinberger M.
Proceedings of the SIGGRAPH Asia 2025 Conference Papers
Genuine PDF Forgeries
Heher J., Pichler E., More S.
IFIP Advances in Information and Communication Technology
Step by Step
Disch L., Fessl A., Franza S., Kimmerle J., Pammer-Schindler V.
Discover Education, Vol. 4(1), 2025
Don't Stop Receiving: Ensuring Availability of Critical Services on Compromised Mobile Devices
Van Eyck T., More S., Draschbacher F., Michiels S., Hughes D.
23rd IEEE International Symposium on Network Computing and Applications
BEANIE – A 32-bit Cipher for Cryptographic Mitigations against Software Attacks
Gerhalter S., Hodžić S., Medwed M., Nageler M., Folwarczny A., Nikov V., Hoogerbrugge J., Schneider T., McConville G., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2025(4), 2025
Privacy-Preserving Visual Exploration of Healthcare Data with a Language Model Integration
Grabner M., Waldert P., Kantz B., Schreck T.
Joint Proceedings of the ECAI 2025 Workshops XAI-KRKG and UCEX-XAI, Bologna, Italy
