We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Weak-Key Distinguishers for AES
Grassi L., Leander G., Rechberger C., Tezcan C., Wiemer F.
Selected Areas in Cryptography - 27th International Conference, 2020, Revised Selected Papers
Speculative Dereferencing: Reviving Foreshadow
Schwarzl M., Schuster T., Schwarz M., Gruß D.
2021
Remote Memory-Deduplication Attacks
Schwarzl M., Kraft E., Lipp M., Gruß D.
2021
Specfuscator: Evaluating Branch Removal as a Spectre Mitigation
Schwarzl M., Canella C., Gruß D., Schwarz M.
Financial Cryptography and Data Security - 25th International Conference, FC 2021, Revised Selected Papers
Optimized Polynomial Multiplier Architectures for Post-Quantum KEM Saber
Sinha Roy S., Basso A.
2021 58th ACM/IEEE Design Automation Conference (DAC)
Automating Seccomp Filter Generation for Linux Applications
Canella C., Werner M., Gruß D., Schwarz M.
2020
Malware Guard Extension: abusing Intel SGX to conceal cache attacks
Schwarz M., Weiser S., Gruß D., Maurice C., Mangard S.
Cybersecurity, Vol. 3(1), 2020
Revocable and Offline-Verifiable Self-Sovereign Identities
Abraham A., More S., Rabensteiner C., Hörandner F.
Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020
Privacy-preserving Analytics for Data Markets using MPC
Koch K., Krenn S., Pellegrino D., Ramacher S.
2020
Short-Lived Forward-Secure Delegation for TLS
Alber L., More S., Ramacher S.
CCSW 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop
Shield Synthesis for Reinforcement Learning
Könighofer B., Bloem R., Jansen N., Lorber F.
Leveraging Applications of Formal Methods, Verification and Validation
KASLR
Canella C., Schwarz M., Haubenwallner M., Schwarzl M., Gruß D.
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020
Take A Way: Exploring the Security Implications of AMD's Cache Way Predictors
Lipp M., Hadzic V., Schwarz M., Perais A., Maurice C., Gruß D.
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020
Placement of Runtime Checks to Counteract Fault Injections
Maderbacher B., Karl A., Bloem R.
Runtime Verification - 20th International Conference, RV 2020, Proceedings
Step-Wise Development of Provably Correct Actor Systems
Aichernig B., Maderbacher B.
Leveraging Applications of Formal Methods, Verification and Validation
The Evolution of Transient-Execution Attacks
Canella C., Khasawneh K., Gruß D.
GLSVLSI 2020 - Proceedings of the 2020 Great Lakes Symposium on VLSI
Evolution of Defenses against Transient-Execution Attacks
Canella C., Pudukotai Dinakarrao S., Gruß D., Khasawneh K.
GLSVLSI 2020 - Proceedings of the 2020 Great Lakes Symposium on VLSI
Plundervolt
Murdock K., Oswald D., Garcia F., Van Bulck J., Piessens F., Gruß D.
IEEE Security & Privacy, Vol. 18(5), 2020
How trusted execution environments fuel research on microarchitectural attacks
Schwarz M., Gruß D.
IEEE Security & Privacy, Vol. 18(5), 2020
Nethammer: Inducing Rowhammer Faults through Network Requests
Lipp M., Schwarz M., Raab L., Lamster L., Aga M., Maurice C., Gruß D.
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
