We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Optimized Polynomial Multiplier Architectures for Post-Quantum KEM Saber
Sinha Roy S., Basso A.
2021 58th ACM/IEEE Design Automation Conference (DAC)
Automating Seccomp Filter Generation for Linux Applications
Canella C., Werner M., Gruß D., Schwarz M.
2020
Malware Guard Extension: abusing Intel SGX to conceal cache attacks
Schwarz M., Weiser S., Gruß D., Maurice C., Mangard S.
Cybersecurity, Vol. 3(1), 2020
Revocable and Offline-Verifiable Self-Sovereign Identities
Abraham A., More S., Rabensteiner C., Hörandner F.
Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020
Privacy-preserving Analytics for Data Markets using MPC
Koch K., Krenn S., Pellegrino D., Ramacher S.
2020
Short-Lived Forward-Secure Delegation for TLS
Alber L., More S., Ramacher S.
CCSW 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop
Shield Synthesis for Reinforcement Learning
Könighofer B., Bloem R., Jansen N., Lorber F.
Leveraging Applications of Formal Methods, Verification and Validation
Take A Way: Exploring the Security Implications of AMD's Cache Way Predictors
Lipp M., Hadzic V., Schwarz M., Perais A., Maurice C., Gruß D.
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020
KASLR
Canella C., Schwarz M., Haubenwallner M., Schwarzl M., Gruß D.
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020
Placement of Runtime Checks to Counteract Fault Injections
Maderbacher B., Karl A., Bloem R.
Runtime Verification - 20th International Conference, RV 2020, Proceedings
Step-Wise Development of Provably Correct Actor Systems
Aichernig B., Maderbacher B.
Leveraging Applications of Formal Methods, Verification and Validation
The Evolution of Transient-Execution Attacks
Canella C., Khasawneh K., Gruß D.
GLSVLSI 2020 - Proceedings of the 2020 Great Lakes Symposium on VLSI
Evolution of Defenses against Transient-Execution Attacks
Canella C., Pudukotai Dinakarrao S., Gruß D., Khasawneh K.
GLSVLSI 2020 - Proceedings of the 2020 Great Lakes Symposium on VLSI
Plundervolt
Murdock K., Oswald D., Garcia F., Van Bulck J., Piessens F., Gruß D.
IEEE Security & Privacy, Vol. 18(5), 2020
How trusted execution environments fuel research on microarchitectural attacks
Schwarz M., Gruß D.
IEEE Security & Privacy, Vol. 18(5), 2020
Nethammer: Inducing Rowhammer Faults through Network Requests
Lipp M., Schwarz M., Raab L., Lamster L., Aga M., Maurice C., Gruß D.
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
AndroPRINT: Analysing the Fingerprintability of the Android API
Palfinger G., Prünster B.
Proceedings of the 15th International Conference on Availability, Reliability and Security, ARES 2020
Donky: Domain Keys – Efficient In-Process Isolation for RISC-V and x86
Schrammel D., Weiser S., Steinegger S., Schwarzl M., Schwarz M., Mangard S., Gruß D.
Proceedings of the 29th USENIX Security Symposium
Revisiting Gilbert’s known-key distinguisher
Grassi L., Rechberger C.
Designs, Codes and Cryptography, Vol. 88(7), 2020
Spectre attacks
Kocher P., Horn J., Fogh A., Genkin D., Gruß D., Haas W., Hamburg M., Lipp M., Mangard S., Prescher T., Schwarz M., Yarom Y.
Communications of the ACM, Vol. 63(7), 2020
