We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Placement of Runtime Checks to Counteract Fault Injections
Maderbacher B., Karl A., Bloem R.
Runtime Verification - 20th International Conference, RV 2020, Proceedings
The Evolution of Transient-Execution Attacks
Canella C., Khasawneh K., Gruß D.
GLSVLSI 2020 - Proceedings of the 2020 Great Lakes Symposium on VLSI
Evolution of Defenses against Transient-Execution Attacks
Canella C., Pudukotai Dinakarrao S., Gruß D., Khasawneh K.
GLSVLSI 2020 - Proceedings of the 2020 Great Lakes Symposium on VLSI
Plundervolt
Murdock K., Oswald D., Garcia F., Van Bulck J., Piessens F., Gruß D.
IEEE Security & Privacy, Vol. 18(5), 2020
How trusted execution environments fuel research on microarchitectural attacks
Schwarz M., Gruß D.
IEEE Security & Privacy, Vol. 18(5), 2020
Nethammer: Inducing Rowhammer Faults through Network Requests
Lipp M., Schwarz M., Raab L., Lamster L., Aga M., Maurice C., Gruß D.
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
AndroPRINT: Analysing the Fingerprintability of the Android API
Palfinger G., Prünster B.
Proceedings of the 15th International Conference on Availability, Reliability and Security, ARES 2020
Donky: Domain Keys – Efficient In-Process Isolation for RISC-V and x86
Schrammel D., Weiser S., Steinegger S., Schwarzl M., Schwarz M., Mangard S., Gruß D.
Proceedings of the 29th USENIX Security Symposium
Revisiting Gilbert’s known-key distinguisher
Grassi L., Rechberger C.
Designs, Codes and Cryptography, Vol. 88(7), 2020
Spectre attacks
Kocher P., Horn J., Fogh A., Genkin D., Gruß D., Haas W., Hamburg M., Lipp M., Mangard S., Prescher T., Schwarz M., Yarom Y.
Communications of the ACM, Vol. 63(7), 2020
ISAP v2.0
Dobraunig C., Eichlseder M., Mangard S., Mendel F., Mennink B., Primas R., Unterluggauer T.
IACR Transactions on Symmetric Cryptology, Vol. 2020(Special Issue 1), 2020
Meltdown
Lipp M., Schwarz M., Gruß D., Prescher T., Haas W., Horn J., Mangard S., Kocher P., Genkin D., Yarom Y., Hamburg M., Strackx R.
Communications of the ACM, Vol. 63(6), 2020
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection
Van Bulck J., Moghimi D., Schwarz M., Lipp M., Minkin M., Genkin D., Yarom Y., Sunar B., Gruß D., Piessens F.
Proceedings - 2020 IEEE Symposium on Security and Privacy, SP 2020
On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy
Grassi L., Lüftenegger R., Rechberger C., Rotaru D., Schofnegger M.
Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
Plundervolt
Murdock K., Oswald D., Garcia F., Van Bulck J., Gruß D., Piessens F.
Proceedings - 2020 IEEE Symposium on Security and Privacy, SP 2020
RAMBleed
Kwong A., Genkin D., Gruß D., Yarom Y.
Proceedings - 2020 IEEE Symposium on Security and Privacy, SP 2020
Framework for faster key search using related-key higher-order differential properties
Dobraunig C., Moazami F., Rechberger C., Soleimany H.
IET Information Security, Vol. 14(2), 2020
Efficient FPGA Implementations of LowMC and Picnic
Kales D., Ramacher S., Rechberger C., Walch R., Werner M.
Topics in Cryptology – CT-RSA 2020 - The Cryptographers Track at the RSA Conference 2020, Proceedings
ConTExT: A Generic Approach for Mitigating Spectre
Schwarz M., Lipp M., Canella C., Schilling R., Kargl F., Gruß D.
Network and Distributed System Security Symposium 2020
Algebraic Cryptanalysis of Variants of Frit
Dobraunig C., Eichlseder M., Mendel F., Schofnegger M.
Selected Areas in Cryptography – SAC 2019 - 26th International Conference, Revised Selected Papers
