We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Memory Band-Aid: A Principled Rowhammer Defense-in-Depth
Fiedler C., Juffinger J., Neela S., Heckel M., Weissteiner H., Yağlıkçı ., Adamsky F., Gruß D.
NDSS 2026
Zero-Click SnailLoad: From Minimal to No User Interaction
Gast S., Puntigam N., Franza S., Neela S., Gruß D., Ullrich J.
Computer Security – ESORICS 2025
Epistemology of Rowhammer Attacks: Threats to Rowhammer Research Validity
Heckel M., Weissteiner H., Adamsky F., Gruß D.
ESORICS 2025
Systematic Analysis of Kernel Security Performance and Energy Costs
Rauscher F., Herzog B., Hönig T., Gruß D.
ACM ASIA CCS 2025
When Good Kernel Defenses Go Bad: Reliable and Stable Kernel Exploits via Defense-Amplified TLB Side-Channel Leaks
Maar L., Giner L., Gruß D., Mangard S.
Proceedings of the 34rd USENIX Security Symposium
TEEcorrelate: An Information-Preserving Defense against Performance-Counter Attacks on TEEs
Weissteiner H., Rauscher F., Schröder R., Juffinger J., Gast S., Wichelmann J., Eisenbarth T., Gruß D.
USENIX Security 2025
TDXploit: Novel Techniques for Single-Stepping and Cache Attacks on Intel TDX
Rauscher F., Wilke L., Weissteiner H., Eisenbarth T., Gruß D.
USENIX Secuirty 2025
Fast and Efficient Secure L1 Caches for SMT
Giner L., Czerny R., Lammer S., Giner A., Gollob P., Juffinger J., Gruß D.
Availability, Reliability and Security - 20th International Conference, ARES 2025, Proceedings
The HMB Timing Side Channel: Exploiting the SSD's Host Memory Buffer
Juffinger J., Weissteiner H., Steinbauer T., Gruß D.
Detection of Intrusions and Malware, and Vulnerability Assessment - 22st International Conference, DIMVA 2025, Proceedings
Real-World Study of the Security of Educational Test Systems
Gast S., Felix S., Steinmaurer A., Juffinger J., Gruß D.
10th IEEE European Symposium on Security and Privacy, Workshop Proceedings
Not So Secure TSC
Juffinger J., Neela S., Gruß D.
Applied Cryptography and Network Security
KernelSnitch: Side-Channel Attacks on Kernel Data Structures
Maar L., Juffinger J., Steinbauer T., Gruß D., Mangard S.
Network and Distributed System Security Symposium (NDSS) 2025
A Systematic Evaluation of Novel and Existing Cache Side Channels
Rauscher F., Fiedler C., Kogler A., Gruß D.
Network and Distributed System Security Symposium (NDSS) 2025
Secret Spilling Drive: Leaking User Behavior through SSD Contention
Juffinger J., Rauscher F., La Manna G., Gruß D.
Network and Distributed System Security (NDSS) Symposium 2025
CounterSEVeillance: Performance-Counter Attacks on AMD SEV-SNP
Gast S., Weissteiner H., Schröder R., Gruß D.
Network and Distributed System Security (NDSS) Symposium 2025
Cross-Core Interrupt Detection: Exploiting User and Virtualized IPIs
Rauscher F., Gruß D.
CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security
SnailLoad: Exploiting Remote Network Latency Measurements without JavaScript
Gast S., Czerny R., Juffinger J., Rauscher F., Franza S., Gruß D.
Proceedings of the 33rd USENIX Security Symposium
Generic and Automated Drive-by GPU Cache Attacks from the Browser
Giner L., Czerny R., Gruber C., Rauscher F., Kogler A., De Almeida Braga D., Gruß D.
ACM AsiaCCS
SUIT: Secure Undervolting with Instruction Traps
Juffinger J., Kalinin S., Gruß D., Mueller F.
ASPLOS 2024: Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 1
