We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
TELESCOPE: TDX Exploit Leaking Encrypted Data using Sibling Core Performance Counters
Rauscher F., Weissteiner H., Gruß D.
ACM Asia Conference on Computer and Communications Security (ASIA CCS ’26)
Continuous User Behavior Monitoring using DNS Cache Timing Attacks
Weissteiner H., Czerny R., Franza S., Gast S., Ullrich J., Gruß D.
NDSS 2026
Memory Band-Aid: A Principled Rowhammer Defense-in-Depth
Fiedler C., Juffinger J., Neela S., Heckel M., Weissteiner H., Yağlıkçı ., Adamsky F., Gruß D.
Network and Distributed System Security (NDSS) 2026
Epistemology of Rowhammer Attacks: Threats to Rowhammer Research Validity
Heckel M., Weissteiner H., Adamsky F., Gruß D.
Computer Security – ESORICS 2025
TEEcorrelate: An Information-Preserving Defense against Performance-Counter Attacks on TEEs
Weissteiner H., Rauscher F., Schröder R., Juffinger J., Gast S., Wichelmann J., Eisenbarth T., Gruß D.
USENIX Security 2025
TDXploit: Novel Techniques for Single-Stepping and Cache Attacks on Intel TDX
Rauscher F., Wilke L., Weissteiner H., Eisenbarth T., Gruß D.
USENIX Secuirty 2025
The HMB Timing Side Channel: Exploiting the SSD's Host Memory Buffer
Juffinger J., Weissteiner H., Steinbauer T., Gruß D.
Detection of Intrusions and Malware, and Vulnerability Assessment - 22st International Conference, DIMVA 2025, Proceedings
CounterSEVeillance: Performance-Counter Attacks on AMD SEV-SNP
Gast S., Weissteiner H., Schröder R., Gruß D.
Network and Distributed System Security (NDSS) Symposium 2025
