We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Optimization Space Learning: A Lightweight, Noniterative Technique for Compiler Autotuning
Burgstaller T., Garber D., Le V., Felfernig A.
SPLC 2024 - 28th ACM International Systems and Software Product Line Conference, Proceedings, 28th ACM International Systems and Software Product Line Conference, 36 - 46, (ACM International Conference Proceeding Series)
An Adaptive, Provable Correct Simplex Architecture
Maderbacher B., Schupp S., Bartocci E., Bloem R., Nickovic D., Könighofer B.
International Journal on Software Tools for Technology Transfer
Exact Soft Analytical Side-Channel Attacks using Tractable Circuits
Wedenig T., Nagpal R., Cassiers G., Mangard S., Peharz R.
Proceedings of Machine Learning Research, Vol. 235, 52472-52483
Minimize the Randomness in Rasta-Like Designs: How Far Can We Go?
Schmid F., Rechberger C., Grassi L., Liu F., Walch R., Wang Q.
Selected Areas in Cryptography, Springer
Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT
Hadipour H., Derbez P., Eichlseder M.
Advances in Cryptology – CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings, 44th Annual International Cryptology Conference, 38–72, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14923 LNCS)
Defects-in-Depth: Analyzing the Integration of Effective Defenses against One-Day Exploits in Android Kernels
Maar L., Draschbacher F., Lamster L., Mangard S.
Usenix Security Symposium 2024, 33rd USENIX Security Symposium: USENIX Security 2024
Action-By-Detection
Prutsch A., Possegger H., Bischof H.
2024 IEEE International Conference on Robotics and Automation (ICRA), 2024 IEEE International Conference on Robotics and Automation, 10757-10763
SnailLoad: Exploiting Remote Network Latency Measurements without JavaScript
Gast S., Czerny R., Juffinger J., Rauscher F., Franza S., Gruß D.
Proceedings of the 33rd USENIX Security Symposium, 33rd USENIX Security Symposium: USENIX Security 2024, 2315-2332
SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel
Maar L., Gast S., Unterguggenberger M., Oberhuber M., Mangard S.
Proceedings of the 33rd USENIX Security Symposium, 33rd USENIX Security Symposium: USENIX Security 2024, 4051-4068, (Proceedings of the 33rd USENIX Security Symposium)
Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks
Schröder R., Gast S., Guo Q.
Proceedings of the 33rd USENIX Security Symposium, 33rd USENIX Security Symposium: USENIX Security 2024, 6669-6686
Service Provider Accreditation: Enabling and Enforcing Privacy-by-Design in Credential-based Authentication Systems
More S., Heher J., Fasllija E., Mathie M.
ARES 2024 - 19th International Conference on Availability, Reliability and Security, Proceedings, 19th International Conference on Availability, Reliability and Security, (ACM International Conference Proceeding Series)
COMPRESS: Generate Small and Fast Masked Pipelined Circuits
Cassiers G., Gigerl B., Mangard S., Momin C., Nagpal R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(3), 500-529
Abstraction-Based Decision Making for Statistical Properties
Cano Cordoba F., Henzinger T., Könighofer B., Kueffner K., Mallik K.
9th International Conference on Formal Structures for Computation and Deduction, FSCD 2024, 9th International Conference on Formal Structures for Computation and Deduction, 2:1–2:17, (Leibniz International Proceedings in Informatics, LIPIcs; vol. 299)
Generic and Automated Drive-by GPU Cache Attacks from the Browser
Giner L., Czerny R., Gruber C., Rauscher F., Kogler A., De Almeida Braga D., Gruß D.
ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 19th ACM ASIA Conference on Computer and Communications Security, 128-140, (ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security)
Beyond the Edges of Kernel Control-Flow Hijacking Protection with HEK-CFI
Maar L., Nasahl P., Mangard S.
ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 19th ACM ASIA Conference on Computer and Communications Security, 1214-1230, (ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security)
OPRFs from Isogenies
Heimberger L., Hennerbichler T., Meisingseth F., Ramacher S., Rechberger C.
ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 19th ACM ASIA Conference on Computer and Communications Security, 575-588
Proteus: A Pipelined NTT Architecture Generator
Hirner F., Mert A., Sinha Roy S.
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol. 32(7), 1228 - 1238
Stitching FPGA Fabrics with FABulous and OpenLane 2
Moser L., Kissich M., Scheipel T., Baunach M.
Proceedings of the 21st ACM International Conference on Computing Frontiers 2024 Workshops and Special Sessions, CF 2024 Companion, 21st ACM International Conference on Computing Frontiers Workshops and Special Sessions, 71-74, (Proceedings of the 21st ACM International Conference on Computing Frontiers 2024 Workshops and Special Sessions, CF 2024 Companion)
Backdooring Post-Quantum Cryptography: Kleptographic Attacks on Lattice-based KEMs
Ravi P., Bhasin S., Chattopadhyay A., Aikata A., Sinha Roy S.
GLSVLSI 2024 - Proceedings of the Great Lakes Symposium on VLSI 2024, 34th Great Lakes Symposium on VLSI, 216 - 221
Security Aspects of Masking on FPGAs
Gigerl B., Pretterhofer K., Mangard S.
Proceedings of the 2024 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2024, 2024 IEEE International Symposium on Hardware Oriented Security and Trust, 199-210