We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
The Doom of Device Drivers: Your Android Device (Most Likely) has N-Day Kernel Vulnerabilities
Maar L., Draschbacher F., Schumm L., Martinez Garcia E., Mangard S.
Proceedings of the 34th USENIX Security Symposium
TEEcorrelate: An Information-Preserving Defense against Performance-Counter Attacks on TEEs
Weissteiner H., Rauscher F., Schröder R., Juffinger J., Gast S., Wichelmann J., Eisenbarth T., Gruß D.
USENIX Security 2025
TDXploit: Novel Techniques for Single-Stepping and Cache Attacks on Intel TDX
Rauscher F., Wilke L., Weissteiner H., Eisenbarth T., Gruß D.
USENIX Secuirty 2025
Fast and Efficient Secure L1 Caches for SMT
Giner L., Czerny R., Lammer S., Giner A., Gollob P., Juffinger J., Gruß D.
Availability, Reliability and Security - 20th International Conference, ARES 2025, Proceedings
Guardians of the Registry: Certificate Transparency for Relying Party Authorization in eIDAS 2
Fasllija E., More S.
Availability, Reliability and Security
CHERI UNCHAINED: Generic Instruction and Register Control for CHERI Capabilities
Waser M., Lamster L., Schrammel D., Unterguggenberger M., Mangard S.
Availability, Reliability and Security
A Flexible Hardware Design Tool for Fast Fourier and Number-Theoretic Transformation Architectures
Krieger F., Hirner F., Mert A., Sinha Roy S.
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2025
Microarchitectural Attacks and Defenses for Isolated Domains
Giner L.
Doctoral Thesis, 2025
OnSET: Ontology and Semantic Exploration Toolkit
Kantz B., Innerebner K., Waldert P., Lengauer S., Lex E., Schreck T.
SIGIR 2025 - Proceedings of the 48th International ACM SIGIR Conference on Research and Development in Information Retrieval
Cohere+Reload: Re-enabling High-Resolution Cache Attacks on AMD SEV-SNP
Giner L., Neela S., Gruß D.
Detection of Intrusions and Malware, and Vulnerability Assessment
The HMB Timing Side Channel: Exploiting the SSD's Host Memory Buffer
Juffinger J., Weissteiner H., Steinbauer T., Gruß D.
Detection of Intrusions and Malware, and Vulnerability Assessment - 22st International Conference, DIMVA 2025, Proceedings
Simple Power Analysis Attack on SQIsign
Mukherjee A., Czuprynko M., Jacquemin D., Kutas P., Sinha Roy S.
Progress in Cryptology - AFRICACRYPT 2025
Correlation power analysis of LESS and CROSS
Czuprynko M., Mukherjee A., Sinha Roy S.
Progress in Cryptology - AFRICACRYPT 2025
Constant-time Integer Arithmetic for SQIsign
Kouider F., Mukherjee A., Jacquemin D., Kutas P.
Progress in Cryptology - AFRICACRYPT 2025
Real-World Study of the Security of Educational Test Systems
Gast S., Felix S., Steinmaurer A., Juffinger J., Gruß D.
10th IEEE European Symposium on Security and Privacy, Workshop Proceedings
Not So Secure TSC
Juffinger J., Neela S., Gruß D.
Applied Cryptography and Network Security
Poseidon and Neptune
Grassi L., Koschatko K., Rechberger C.
IACR Transactions on Symmetric Cryptology, Vol. 2025(2), 2025
ToFA: Towards Fault Analysis of GIFT and GIFT-like Ciphers Leveraging Truncated Impossible Differentials
Kundu A., Ghosh S., Aikata A., Saha D.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2025(3), 2025
Preimage-type Attacks for Reduced Ascon-Hash: Application to Ed25519
Nageler M., Schmid L., Eichlseder M.
Selected Areas in Cryptography – SAC 2025
