We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
TELESCOPE: TDX Exploit Leaking Encrypted Data using Sibling Core Performance Counters
Rauscher F., Weissteiner H., Gruß D.
ACM Asia Conference on Computer and Communications Security (ASIA CCS ’26)
Continuous User Behavior Monitoring using DNS Cache Timing Attacks
Weissteiner H., Czerny R., Franza S., Gast S., Ullrich J., Gruß D.
NDSS 2026
Stealthy Hardware Trojan Attacks on MQ-Based Post-Quantum Digital Signatures
Sinha Roy S., Aikata A., Mukherjee A.
Lightweight Cryptography for Security and Privacy - 6th International Workshop, LightSec 2025, Revised Selected Papers
Guided spiral visualization for periodic time series and residual analysis
Rakuschek J., Hauser H., Schreck T.
Computers & Graphics, Vol. 135, 2026
Defense-in-Depth Techniques for Memory Safety in Hardware
Unterguggenberger M.
Doctoral Thesis, 2026
Parameterized Infinite-State Reactive Synthesis
Maderbacher B., Bloem R.
Proceedings of the ACM on Programming Languages, Vol. 10(POPL), 2026
Relating Definitions of Computational Differential Privacy in Wider Parameter Regimes
Meisingseth F., Rechberger C.
IACR Communications in Crypology, Vol. 2(4), 2026
Poseidon(2)b
Koschatko K., Grassi L., Khovratovich D., Rechberger C., Schofnegger M., Schröppel V., Wu Z.
IACR Communications in Crypology, Vol. 2(4), 2026
Efficient SPA Countermeasures using Redundant Number Representation with Application to ML-KEM
Nagpal R., Hadzic V., Primas R., Mangard S.
Selected Areas in Cryptography - SAC 2025 - 32nd International Conference, Revised Selected Papers
Clone2Pwn: A Systematic Security Analysis of Data Migration Tools in the Android Ecosystem
Draschbacher F., Maar L., Schumm L., Denifl R., Treffner L., Mangard S.
European Symposium on Research in Computer Security
Memory Band-Aid: A Principled Rowhammer Defense-in-Depth
Fiedler C., Juffinger J., Neela S., Heckel M., Weissteiner H., Yağlıkçı ., Adamsky F., Gruß D.
Network and Distributed System Security (NDSS) 2026
FLIPPYRAM: A Large-Scale Study of Rowhammer Prevalence
Heckel M., Sayadi N., Juffinger J., Fiedler C., Gruß D., Adamsky F.
Network and Distributed System Security (NDSS) 2026
Streaming Real-Time Trajectory Prediction Using Endpoint-Aware Modeling
Prutsch A., Schinagl D., Possegger H.
IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)
ASCENT: Transformer-Based Aircraft Trajectory Prediction in Non-Towered Terminal Airspace
Prutsch A., Schinagl D., Possegger H.
IEEE International Conference on Robotics & Automation (ICRA)
SHARP: Short-Window Streaming for Accurate and Robust Prediction in Motion Forecasting
Prutsch A., Fruhwirth-Reisinger C., Schinagl D., Possegger H.
IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)
webSPDZ
Buchsteiner T., Koch K., Rotaru D., Rechberger C.
Cryptology and Network Security - 24th International Conference, CANS 2025, Proceedings
Preimage-type Attacks for Reduced Ascon-Hash: Application to Ed25519
Nageler M., Schmid L., Eichlseder M.
Selected Areas in Cryptography - SAC 2025 - 32nd International Conference, Revised Selected Papers
Verifying DRAM Addressing in Software
Heckel M., Adamsky F., Juffinger J., Rauscher F., Gruß D.
Computer Security - ESORICS 2025 - 30th European Symposium on Research in Computer Security, 2025, Proceedings
Eviction Notice: Reviving and Advancing Page Cache Attacks
Neela S., Juffinger J., Maar L., Gruß D.
Network and Distributed System Security (NDSS) Symposium
High-Performance SIMD Software for Spielman Codes in Zero-Knowledge Proofs
Krieger F., Dobrouschek C., Hirner F., Sinha Roy S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2026(2), 2026
