We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
An Analysis of HMB-based SSD Rowhammer
Juffinger J.
Proceeding of the 1st Microarchitecture Security Conference (uASC '25), Microarchitecture Security Conference
An Adaptive, Provable Correct Simplex Architecture
Maderbacher B., Schupp S., Bartocci E., Bloem R., Nickovic D., Könighofer B.
International Journal on Software Tools for Technology Transfer
CounterSEVeillance: Performance-Counter Attacks on AMD SEV-SNP
Gast S., Weissteiner H., Schröder R., Gruß D.
Network and Distributed System Security (NDSS) Symposium 2025, Network and Distributed System Security Symposium 2025
TME-Box: Scalable In-Process Isolation through Intel TME-MK Memory Encryption
Unterguggenberger M., Lamster L., Schrammel D., Schwarzl M., Mangard S.
Network and Distributed System Security (NDSS) Symposium 2025, Network and Distributed System Security Symposium 2025
Power-Related Side-Channel Attacks using the Android Sensor Framework
Oberhuber M., Unterguggenberger M., Maar L., Kogler A., Mangard S.
Network and Distributed System Security Symposium (NDSS) 2025, Network and Distributed System Security Symposium 2025
On Loopy Belief Propagation for SASCAs: An Analysis and Empirical Study of the Inference Problem
Nagpal R., Cassiers G., Knoll C., Pernkopf F., Primas R., Mangard S.
IACR Communications in Crypology, Vol. 1(4)
ChoiceJacking: Compromising Mobile Devices through Malicious Chargers like a Decade ago
Draschbacher F., Maar L., Oberhuber M., Mangard S.
Usenix Security Symposium 2025, 34th USENIX Security Symposium
Cryptographic Least Privilege Enforcement for Scalable Memory Isolation
Unterguggenberger M., Schrammel D., Maar L., Lamster L., Hadzic V., Mangard S.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2025, IEEE International Symposium on Hardware Oriented Security and Trust 2025: HOST 2025, 312-323
FAULTLESS: Flexible and Transparent Fault Protection for Superscalar RISC-V Processors
Waser M., Schrammel D., Schilling R., Mangard S.
22nd International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2025, 22nd International Conference on Detection of Intrusions and Malware, and Vulnerability Assess, DIMVA 2025
CHERI UNCHAINED: Generic Instruction and Register Control for CHERI Capabilities
Waser M., Lamster L., Schrammel D., Unterguggenberger M., Mangard S.
Proceedings of the 20th International Conference on Availability, Reliability and Security, ARES 2025, 20th International Conference on Availability, Reliability and Security, ARES 2025
FatPTE - Expanding Page Table Entries for Security
Lamster L., Unterguggenberger M., Waser M., Schrammel D., Mangard S.
Proceedings of the 20th International Conference on Availability, Reliability and Security, ARES 2025, 20th International Conference on Availability, Reliability and Security, ARES 2025
WaitWatcher & WaitGuard: Detecting Flush-Based Cache Side-Channels through Spurious Wakeups
Lamster L., Rauscher F., Unterguggenberger M., Mangard S.
European Symposium on Research in Computer Security 2025, 30th European Symposium on Research in Computer Security, ESORICS 2025
Code Encryption with Intel TME-MK for Control-Flow Enforcement
Unterguggenberger M., Lamster L., Oberhuber M., Scherer S., Mangard S.
30th European Symposium on Research in Computer Security (ESORICS) 2025, 30th European Symposium on Research in Computer Security, ESORICS 2025
Tools at the Frontiers of Quantitative Verification
Andriushchenko R., Bork A., Budde C., Češka M., Grover K., Hahn E., Hartmanns A., Israelsen B., Jansen N., Jeppson J., Junges S., Köhl M., Könighofer B., Křetínský J., Meggendorfer T., Parker D., Pranger S., Quatmann T., Ruijters E., Taylor L., Volk M., Weininger M., Zhang Z.
TOOLympics Challenge 2023 - Updates, Results, Successes of the Formal-Methods Competitions, 30th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, 90–146, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14550 LNCS)
Shields for Safe Reinforcement Learning
Könighofer B., Bloem R., Jansen N., Junges S., Pranger S.
Communications of the ACM
Learning to Predict Mixed-Traffic Trajectories in Urban Scenarios from Little Training Data with Refined Environment Modeling
Prutsch A., Possegger H.
Proceedings of the IEEE Intelligent Vehicles Symposium (IV)
Lanes Are Not Enough: Enhancing Trajectory Prediction in Intralogistics Through Detailed Environmental Context
Prutsch A., Wess M., Possegger H.
Proceedings of the International Conference on Intelligent Robots and Systems (IROS), IEEE/RSJ International Conference on Intelligent Robots and Systems, IROS 2025
Leveraging Foundation Models for Labeling Custom Object Masks in LiDAR Point Cloud Sequences
Prutsch A., Schustereder M., Possegger H.
Proceedings of the European Conference on Mobile Robots (ECMR), 12th European Conference on Mobile Robots, ECMR 2025
Input Uncertainty Attribution by Uncertainty Propagation
Kantz B., Steger S., Staudinger C., Feilmayr C., Wachlmayr J., Haberl A., Schuster S., Pernkopf F.
ICASSP
Synthesis of Controllers for Continuous Blackbox Systems
Maderbacher B., Windisch F., Larrauri Borroto L., Bloem R.
Verification, Model Checking, and Abstract Interpretation - 26th International Conference, VMCAI 2025, Proceedings, 26th International Conference on Verification, Model Checking, and Abstract Interpretation, VMCAI 2025, 137–159, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 15530 LNCS)