We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Truncated Differential Properties of the Diagonal Set of Inputs for 5-Round AES
Grassi L., Rechberger C.
Information Security and Privacy - 27th Australasian Conference, ACISP 2022, Proceedings
Privacy-Preserving Machine Learning Using Cryptography
Rechberger C., Walch R.
Security and Artificial Intelligence , Springer Science and Business Media Deutschland GmbH, 109-129, 2022
Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges
Hadipour H., Eichlseder M.
Applied Cryptography and Network Security - 20th International Conference, ACNS 2022, Proceedings
Statistical Effective Fault Attacks: The other Side of the Coin
Vafaei N., Zarei S., Bagheri N., Eichlseder M., Primas R., Soleimany H.
IEEE Transactions on Information Forensics and Security, Vol. 17, 2022
Rapid Prototyping for Microarchitectural Attacks
Easdon C., Schwarz M., Schwarzl M., Gruß D.
Proceedings of the 31st USENIX Security Symposium, Security 2022
ÆPIC Leak
Borrello P., Kogler A., Schwarzl M., Lipp M., Gruß D., Schwarz M.
Proceedings of the 31st USENIX Security Symposium, Security 2022
Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks
Kogler A., Gruß D., Schwarz M.
Conference Proceedings 31st USENIX Security Symposium
Finding and Exploiting CPU Features using MSR Templating
Kogler A., Weber D., Haubenwallner M., Lipp M., Gruß D., Schwarz M.
Proceedings - 43rd IEEE Symposium on Security and Privacy, SP 2022
AMD Prefetch Attacks through Power and Time
Lipp M., Gruß D., Schwarz M.
Proceedings of the 31st USENIX Security Symposium, Security 2022
Automatic Cryptanalysis of Block Ciphers: Finding Efficient Key-Recovery Attacks
Nageler M.
Master's Thesis, 2022
KaLi: A Crystal for Post-Quantum Security Using Kyber and Dilithium
Aikata A., Mert A., Imran M., Pagliarini S., Sinha Roy S.
IEEE Transactions on Circuits and Systems I: Regular Papers, Vol. 2022, 2022
Will You Cross the Threshold for Me? Generic Side-Channel Assisted Chosen-Ciphertext Attacks on NTRU-based KEMs
Ravi P., Ezerman M., Bhasin S., Chattopadhyay A., Sinha Roy S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022(1), 2022
On Exploiting Message Leakage in (few) NIST PQC Candidates for Practical Message Recovery Attacks
Ravi P., Bhasin S., Sinha Roy S., Chattopadhyay A.
IEEE Transactions on Information Forensics and Security, Vol. 17, 2021
Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks
Naseredini A., Gast S., Schwarzl M., Bernardo P., Smajic A., Canella C., Berger M., Gruß D.
2021
Automating Seccomp Filter Generation for Linux Applications
Canella C., Werner M., Gruß D., Schwarz M.
CCSW'21 - Proceedings of the 2021 Cloud Computing Security Workshop
Design Space Exploration of SABER in 65nm ASIC
Imran M., Almeida F., Raik J., Basso A., Sinha Roy S., Pagliarini S.
ASHES '21: Proceedings of the 5th Workshop on Attacks and Solutions in Hardware Security
Magnifying Side-Channel Leakage of Lattice-Based Cryptosystems with Chosen Ciphertexts: The Case Study of Kyber
Xu Z., Pemberton O., Sinha Roy S., Oswald D., Yao W., Zheng Z.
IEEE Transactions on Computers, 2021
SERVAS! Secure Enclaves via RISC-V Authenticryption Shield
Steinegger S., Schrammel D., Weiser S., Nasahl P., Mangard S.
Computer Security – ESORICS 2021
