We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
When Good Kernel Defenses Go Bad: Reliable and Stable Kernel Exploits via Defense-Amplified TLB Side-Channel Leaks
Maar L., Giner L., Gruß D., Mangard S.
Proceedings of the 34rd USENIX Security Symposium, 34th USENIX Security Symposium, (Proceedings of the 34rd USENIX Security Symposium)
Not So Secure TSC
Juffinger J., Neela S., Gruß D.
Applied Cryptography and Network Security, 23rd International Conference on Applied Cryptography and Network Security
KernelSnitch: Side-Channel Attacks on Kernel Data Structures
Maar L., Juffinger J., Steinbauer T., Gruß D., Mangard S.
Network and Distributed System Security Symposium (NDSS) 2025, Network and Distributed System Security Symposium 2025
A Systematic Evaluation of Novel and Existing Cache Side Channels
Rauscher F., Fiedler C., Kogler A., Gruß D.
Network and Distributed System Security Symposium (NDSS) 2025, Network and Distributed System Security Symposium 2025
Secret Spilling Drive: Leaking User Behavior through SSD Contention
Juffinger J., Rauscher F., La Manna G., Gruß D.
Network and Distributed System Security (NDSS) Symposium 2025, Network and Distributed System Security Symposium 2025
CounterSEVeillance: Performance-Counter Attacks on AMD SEV-SNP
Gast S., Weissteiner H., Schröder R., Gruß D.
Network and Distributed System Security (NDSS) Symposium 2025, Network and Distributed System Security Symposium 2025
Voodoo: Memory Tagging, Authenticated Encryption, and Error Correction through MAGIC
Lamster L., Unterguggenberger M., Schrammel D., Mangard S.
Proceedings of the 33rd USENIX Conference on Security Symposium, 33rd USENIX Security Symposium: USENIX Security 2024, 7159 - 7176
TME-Box: Scalable In-Process Isolation through Intel TME-MK Memory Encryption
Unterguggenberger M., Lamster L., Schrammel D., Schwarzl M., Mangard S.
Network and Distributed System Security (NDSS) Symposium 2025, Network and Distributed System Security Symposium 2025
Power-Related Side-Channel Attacks using the Android Sensor Framework
Oberhuber M., Unterguggenberger M., Maar L., Kogler A., Mangard S.
Network and Distributed System Security Symposium (NDSS) 2025, Network and Distributed System Security Symposium 2025
On Loopy Belief Propagation for SASCAs: An Analysis and Empirical Study of the Inference Problem
Nagpal R., Cassiers G., Knoll C., Pernkopf F., Primas R., Mangard S.
IACR Communications in Crypology, Vol. 1(4)
ChoiceJacking: Compromising Mobile Devices through Malicious Chargers like a Decade ago
Draschbacher F., Maar L., Oberhuber M., Mangard S.
Usenix Security Symposium 2025, 34th USENIX Security Symposium
Tools at the Frontiers of Quantitative Verification
Andriushchenko R., Bork A., Budde C., Češka M., Grover K., Hahn E., Hartmanns A., Israelsen B., Jansen N., Jeppson J., Junges S., Köhl M., Könighofer B., Křetínský J., Meggendorfer T., Parker D., Pranger S., Quatmann T., Ruijters E., Taylor L., Volk M., Weininger M., Zhang Z.
TOOLympics Challenge 2023 - Updates, Results, Successes of the Formal-Methods Competitions, 30th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, 90–146, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14550 LNCS)
Shields for Safe Reinforcement Learning
Könighofer B., Bloem R., Jansen N., Junges S., Pranger S.
Communications of the ACM
Input Uncertainty Attribution by Uncertainty Propagation
Kantz B., Steger S., Staudinger C., Feilmayr C., Wachlmayr J., Haberl A., Schuster S., Pernkopf F.
ICASSP
SoK: Computational and Distributed Differential Privacy for MPC
Meisingseth F., Rechberger C.
Proceedings on Privacy Enhancing Technologies, 25th Privacy Enhancing Technologies Symposium, PETS 2025, 420-439
Practical Two-party Computational Differential Privacy with Active Security
Meisingseth F., Rechberger C., Schmid F.
Proceedings on Privacy Enhancing Technologies, 25th Privacy Enhancing Technologies Symposium, PETS 2025, 341-360
One Tree to Rule Them All
Baum C., Beullens W., Mukherjee S., Orsini E., Ramacher S., Rechberger C., Roy L., Scholl P.
Advances in Cryptology – ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, 30th Annual International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, 463-493, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 15484 LNCS)
AutoDiVer: Automatically Verifying Differential Characteristics and Learning Key Conditions
Nageler M., Ghosh S., Jüttler M., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2025(1)
Exploring Large Integer Multiplication for Cryptography Targeting In-Memory Computing
Krieger F., Hirner F., Sinha Roy S.
2025 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2025 Design, Automation and Test in Europe Conference: DATE 2025
REED: Chiplet-Based Scalable Hardware Accelerator for Fully Homomorphic Encryption
Aikata A., Mert A., Kwon S., Deryabin M., Sinha Roy S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2025(2)