We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Memory Band-Aid: A Principled Rowhammer Defense-in-Depth
Fiedler C., Juffinger J., Neela S., Heckel M., Weissteiner H., Yağlıkçı ., Adamsky F., Gruß D.
NDSS 2026
Don't Stop Receiving: Ensuring Availability of Critical Services on Compromised Mobile Devices
Van Eyck T., More S., Draschbacher F., Michiels S., Hughes D.
23rd IEEE International Symposium on Network Computing and Applications
BEANIE – A 32-bit Cipher for Cryptographic Mitigations against Software Attacks
Gerhalter S., Hodžić S., Medwed M., Nageler M., Folwarczny A., Nikov V., Hoogerbrugge J., Schneider T., McConville G., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2025(4), 2025
Code Encryption with Intel TME-MK for Control-Flow Enforcement
Unterguggenberger M., Lamster L., Oberhuber M., Scherer S., Mangard S.
Computer Security - ESORICS 2025 - 30th European Symposium on Research in Computer Security, 2025, Proceedings
Zero-Click SnailLoad: From Minimal to No User Interaction
Gast S., Puntigam N., Franza S., Neela S., Gruß D., Ullrich J.
Computer Security – ESORICS 2025
Kernel Security in the Wild
Maar L.
Doctoral Thesis, 2025
Greyhound: A Reconfigurable and Extensible RISC-V SoC and eFPGA on IHP SG13G2
Moser L., Kissich M., Scheipel T., Baunach M.
33rd Austrian Workshop on Microelectronics September 25, 2025 - Linz, Austria
Epistemology of Rowhammer Attacks: Threats to Rowhammer Research Validity
Heckel M., Weissteiner H., Adamsky F., Gruß D.
ESORICS 2025
Special Issue on Open Hardware for Embedded System Security and Cryptography
Tempelmeier M., De Santis F., Bhasin S., Mangard S.
ACM Transactions on Embedded Computing Systems, Vol. 24(5), 2025
FHERMA Cookbook: FHE Components for Privacy-Preserving Applications
Adamek J., Aikata A., Al Badawi A., Alexandru A., Arakelov A., Arakelov G., Binfet P., Correa V., Dumezy J., Gomenyuk S., Kononova V., Lekomtsev D., Maloney V., Nguyen C., Polyakov Y., Pianykh D., Shaul H., Schulze Darup M., Teichrib D., Tronin D.
13th Workshop on Encrypted Computing & Applied Homomorphic Cryptography
Accelerating Hash-Based Polynomial Commitment Schemes with Linear Prover Time
Hirner F., Krieger F., Piber C., Sinha Roy S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2025(4), 2025
BISON: Blind Identification with Stateless scOped pseudoNyms
Heher J., More S., Heimberger L.
ACM ASIA CCS 2025 - Proceedings of the 20th ACM ASIA Conference on Computer and Communications Security
Systematic Analysis of Kernel Security Performance and Energy Costs
Rauscher F., Herzog B., Hönig T., Gruß D.
ACM ASIA CCS 2025
Scalable visual exploration of time series and anomalies with adaptive level of detail
Rakuschek J., Suschnigg J., Louis P., Mutlu B., Schreck T.
Information Visualization, 2025
When Good Kernel Defenses Go Bad: Reliable and Stable Kernel Exploits via Defense-Amplified TLB Side-Channel Leaks
Maar L., Giner L., Gruß D., Mangard S.
Proceedings of the 34rd USENIX Security Symposium
The Doom of Device Drivers: Your Android Device (Most Likely) has N-Day Kernel Vulnerabilities
Maar L., Draschbacher F., Schumm L., Martinez Garcia E., Mangard S.
Proceedings of the 34rd USENIX Security Symposium
TEEcorrelate: An Information-Preserving Defense against Performance-Counter Attacks on TEEs
Weissteiner H., Rauscher F., Schröder R., Juffinger J., Gast S., Wichelmann J., Eisenbarth T., Gruß D.
USENIX Security 2025
TDXploit: Novel Techniques for Single-Stepping and Cache Attacks on Intel TDX
Rauscher F., Wilke L., Weissteiner H., Eisenbarth T., Gruß D.
USENIX Secuirty 2025
Fast and Efficient Secure L1 Caches for SMT
Giner L., Czerny R., Lammer S., Giner A., Gollob P., Juffinger J., Gruß D.
Availability, Reliability and Security - 20th International Conference, ARES 2025, Proceedings
