We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
CHERI UNCHAINED: Generic Instruction and Register Control for CHERI Capabilities
Waser M., Lamster L., Schrammel D., Unterguggenberger M., Mangard S.
Proceedings of the 20th International Conference on Availability, Reliability and Security, ARES 2025, 20th International Conference on Availability, Reliability and Security, ARES 2025
TME-Box: Scalable In-Process Isolation through Intel TME-MK Memory Encryption
Unterguggenberger M., Lamster L., Schrammel D., Schwarzl M., Mangard S.
Network and Distributed System Security (NDSS) Symposium 2025, Network and Distributed System Security Symposium 2025
Cryptographic Least Privilege Enforcement for Scalable Memory Isolation
Unterguggenberger M., Schrammel D., Maar L., Lamster L., Hadzic V., Mangard S.
IEEE International Symposium on Hardware Oriented Security and Trust (HOST), IEEE International Symposium on Hardware Oriented Security and Trust 2025: HOST 2025
FatPTE - Expanding Page Table Entries for Security
Lamster L., Unterguggenberger M., Waser M., Schrammel D., Mangard S.
Proceedings of the 20th International Conference on Availability, Reliability and Security, ARES 2025, 20th International Conference on Availability, Reliability and Security, ARES 2025
Defects-in-Depth: Analyzing the Integration of Effective Defenses against One-Day Exploits in Android Kernels
Maar L., Draschbacher F., Lamster L., Mangard S.
Usenix Security Symposium 2024, 33rd USENIX Security Symposium: USENIX Security 2024
Memory Tagging using Cryptographic Integrity on Commodity x86 CPUs
Schrammel D., Unterguggenberger M., Lamster L., Sultana S., Grewal K., LeMay M., Durham D., Mangard S.
Proceedings - 9th IEEE European Symposium on Security and Privacy, Euro S and P 2024, 9th IEEE European Symposium on Security and Privacy, 311-326
Voodoo: Memory Tagging, Authenticated Encryption, and Error Correction through MAGIC
Lamster L., Unterguggenberger M., Schrammel D., Mangard S.
Proceedings of the 33rd USENIX Conference on Security Symposium, 33rd USENIX Security Symposium: USENIX Security 2024, 7159 - 7176
Cryptographically Enforced Memory Safety
Unterguggenberger M., Schrammel D., Lamster L., Nasahl P., Mangard S.
CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 30th ACM Conference on Computer and Communications Security, 889-903, (CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security)
Multi-Tag: A Hardware-Software Co-Design for Memory Safety based on Multi-Granular Memory Tagging
Unterguggenberger M., Schrammel D., Nasahl P., Schilling R., Lamster L., Mangard S.
ASIA CCS 2023 - Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023 ACM ASIA Conference on Computer and Communications Security, 177-189, (Proceedings of the ACM Conference on Computer and Communications Security)
SPEAR-V: Secure and Practical Enclave Architecture for RISC-V
Schrammel D., Waser M., Lamster L., Unterguggenberger M., Mangard S.
ASIA CCS 2023 - Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023 ACM ASIA Conference on Computer and Communications Security, 457-468, (Proceedings of the ACM Conference on Computer and Communications Security)
HashTag: Hash-based Integrity Protection for Tagged Architectures
Lamster L., Unterguggenberger M., Schrammel D., Mangard S.
Proceedings of the 32nd USENIX Security Symposium, 32nd USENIX Security Symposium, 2797-2814
CSI:Rowhammer – Cryptographic Security and Integrity against Rowhammer
Juffinger J., Lamster L., Kogler A., Eichlseder M., Lipp M., Gruß D.
44th IEEE Symposium on Security and Privacy , 43th IEEE Symposium on Security and Privacay
Nethammer: Inducing Rowhammer Faults through Network Requests
Lipp M., Schwarz M., Raab L., Lamster L., Aga M., Maurice C., Gruß D.
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 5th IEEE European Symposium on Security and Privacy, 710-719