We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Continuous User Behavior Monitoring using DNS Cache Timing Attacks
Weissteiner H., Czerny R., Franza S., Gast S., Ullrich J., Gruß D.
NDSS 2026
Memory Band-Aid: A Principled Rowhammer Defense-in-Depth
Fiedler C., Juffinger J., Neela S., Heckel M., Weissteiner H., Yağlıkçı ., Adamsky F., Gruß D.
NDSS 2026
Step by Step
Disch L., Fessl A., Franza S., Kimmerle J., Pammer-Schindler V.
Discover Education, Vol. 4(1), 2025
Don't Stop Receiving: Ensuring Availability of Critical Services on Compromised Mobile Devices
Van Eyck T., More S., Draschbacher F., Michiels S., Hughes D.
23rd IEEE International Symposium on Network Computing and Applications
BEANIE – A 32-bit Cipher for Cryptographic Mitigations against Software Attacks
Gerhalter S., Hodžić S., Medwed M., Nageler M., Folwarczny A., Nikov V., Hoogerbrugge J., Schneider T., McConville G., Eichlseder M.
IACR Transactions on Symmetric Cryptology, Vol. 2025(4), 2025
Privacy-Preserving Visual Exploration of Healthcare Data with a Language Model Integration
Grabner M., Waldert P., Kantz B., Schreck T.
Joint Proceedings of the ECAI 2025 Workshops XAI-KRKG and UCEX-XAI, Bologna, Italy
Shields for Safe Reinforcement Learning
Könighofer B., Bloem R., Jansen N., Junges S., Pranger S.
Communications of the ACM, Vol. 68(11), 2025
WaitWatcher and WaitGuard
Lamster L., Rauscher F., Unterguggenberger M., Mangard S.
Computer Security – ESORICS 2025
Epistemology of Rowhammer Attacks: Threats to Rowhammer Research Validity
Heckel M., Weissteiner H., Adamsky F., Gruß D.
Computer Security – ESORICS 2025
FHERMA Cookbook: FHE Components for Privacy-Preserving Applications
Adamek J., Aikata A., Al Badawi A., Alexandru A., Arakelov A., Arakelov G., Binfet P., Correa V., Dumezy J., Gomenyuk S., Kononova V., Lekomtsev D., Maloney V., Nguyen C., Polyakov Y., Pianykh D., Shaul H., Schulze Darup M., Teichrib D., Tronin D.
WAHC 2025 - Proceedings of the 13th Workshop on Encrypted Computing and Applied Homomorphic Cryptography
Zero-Click SnailLoad: From Minimal to No User Interaction
Gast S., Puntigam N., Franza S., Neela S., Gruß D., Ullrich J.
Computer Security – ESORICS 2025
Cache Timing Leakages in Zero-Knowledge Protocols
Mukherjee S., Rechberger C., Schofnegger M.
7th Conference on Advances in Financial Technologies
Scalable visual exploration of time series and anomalies with adaptive level of detail
Rakuschek J., Suschnigg J., Louis P., Mutlu B., Schreck T.
Information Visualization, Vol. 24(4), 2025
Kernel Security in the Wild
Maar L.
Doctoral Thesis, 2025
Special Issue on Open Hardware for Embedded System Security and Cryptography
Tempelmeier M., De Santis F., Bhasin S., Mangard S.
ACM Transactions on Embedded Computing Systems, Vol. 24(5), 2025
Accelerating Hash-Based Polynomial Commitment Schemes with Linear Prover Time
Hirner F., Krieger F., Piber C., Sinha Roy S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2025(4), 2025
Stealthy Hardware Trojan Attacks on MQ-Based Post-Quantum Digital Signatures
Sinha Roy S., Aikata A., Mukherjee A.
LightSEC 2025
BISON: Blind Identification with Stateless scOped pseudoNyms
Heher J., More S., Heimberger L.
ACM ASIA CCS 2025 - Proceedings of the 20th ACM ASIA Conference on Computer and Communications Security
Systematic Analysis of Kernel Security Performance and Energy Costs
Rauscher F., Herzog B., Hönig T., Gruß D.
ACM ASIA CCS 2025
When Good Kernel Defenses Go Bad: Reliable and Stable Kernel Exploits via Defense-Amplified TLB Side-Channel Leaks
Maar L., Giner L., Gruß D., Mangard S.
Proceedings of the 34rd USENIX Security Symposium
