We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
A Systematic Evaluation of Novel and Existing Cache Side Channels
Rauscher F., Fiedler C., Kogler A., Gruß D.
Network and Distributed System Security Symposium (NDSS) 2025
Meltdown
Gruß D.
Encyclopedia of Cryptography, Security and Privacy, Third Edition, Springer, Cham, 1516-1520, 2025
CounterSEVeillance: Performance-Counter Attacks on AMD SEV-SNP
Gast S., Weissteiner H., Schröder R., Gruß D.
Network and Distributed System Security (NDSS) Symposium 2025
Cross-Core Interrupt Detection: Exploiting User and Virtualized IPIs
Rauscher F., Gruß D.
CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security
SnailLoad: Exploiting Remote Network Latency Measurements without JavaScript
Gast S., Czerny R., Juffinger J., Rauscher F., Franza S., Gruß D.
Proceedings of the 33rd USENIX Security Symposium
Generic and Automated Drive-by GPU Cache Attacks from the Browser
Giner L., Czerny R., Gruber C., Rauscher F., Kogler A., De Almeida Braga D., Gruß D.
ACM AsiaCCS
SUIT: Secure Undervolting with Instruction Traps
Juffinger J., Kalinin S., Gruß D., Mueller F.
ASPLOS 2024: Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 1
Remote Scheduler Contention Attacks
Gast S., Juffinger J., Maar L., Royer C., Kogler A., Gruß D.
Financial Cryptography and Data Security - 28th International Conference, FC 2024, Revised Selected Papers
IdleLeak: Exploiting Idle State Side Effects for Information Leakage
Rauscher F., Kogler A., Juffinger J., Gruß D.
Network and Distributed System Security Symposium (NDSS) 2024
Presshammer: Rowhammer and Rowpress without Physical Address Information
Juffinger J., Neela S., Heckel M., Schwarz L., Adamsky F., Gruß D.
Detection of Intrusions and Malware, and Vulnerability Assessment - 21st International Conference, DIMVA 2024, Proceedings
DOPE: DOmain Protection Enforcement with PKS
Maar L., Schwarzl M., Rauscher F., Gruß D., Mangard S.
Proceedings - 39th Annual Computer Security Applications Conference, ACSAC 2023
Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels
Kogler A., Juffinger J., Giner L., Gerlach L., Schwarzl M., Schwarz M., Gruß D., Mangard S.
32nd USENIX Security Symposium, USENIX Security 2023
PT-Guard: Integrity-Protected Page Tables to Defend Against Breakthrough Rowhammer Attacks
Saxena A., Saileshwar G., Juffinger J., Kogler A., Gruß D., Qureshi M.
Proceedings - 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2023
Scatter and Split Securely: Defeating Cache Contention and Occupancy Attacks
Giner L., Steinegger S., Purnal A., Eichlseder M., Unterluggauer T., Mangard S., Gruß D.
IEEE S&P
CSI:Rowhammer – Cryptographic Security and Integrity against Rowhammer
Juffinger J., Lamster L., Kogler A., Eichlseder M., Lipp M., Gruß D.
44th IEEE Symposium on Security and Privacy
Side-Channel Attacks on Optane Persistent Memory
Liu S., Kanniwadi S., Schwarzl M., Kogler A., Gruß D., Khan S.
Proceedings of the 32nd USENIX Security Symposium
Layered Binary Templating
Schwarzl M., Kraft E., Gruß D.
Applied Cryptography and Network Security
Practical Timing Side-Channel Attacks on Memory Compression
Schwarzl M., Borrello P., Saileshwar G., Müller H., Schwarz M., Gruß D.
43th IEEE Symposium on Security and Privacay: IEEE S&P 2023
SQUIP: Exploiting the Scheduler Queue Contention Side Channel
Gast S., Juffinger J., Schwarzl M., Saileshwar G., Kogler A., Franza S., Köstl M., Gruß D.
44th IEEE Symposium on Security and Privacy
Robust and Scalable Process Isolation against Spectre in the Cloud
Schwarzl M., Borrello P., Kogler A., Varda K., Schuster T., Schwarz M., Gruß D.
European Symposium on Research in Computer Security (ESORICS)
