We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
SnailLoad: Exploiting Remote Network Latency Measurements without JavaScript
Gast S., Czerny R., Juffinger J., Rauscher F., Franza S., Gruß D.
Proceedings of the 33rd USENIX Security Symposium, 33rd USENIX Security Symposium: USENIX Security 2024, 2315-2332
SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel
Maar L., Gast S., Unterguggenberger M., Oberhuber M., Mangard S.
Proceedings of the 33rd USENIX Security Symposium, 33rd USENIX Security Symposium: USENIX Security 2024, 4051-4068, (Proceedings of the 33rd USENIX Security Symposium)
Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks
Schröder R., Gast S., Guo Q.
Proceedings of the 33rd USENIX Security Symposium, 33rd USENIX Security Symposium: USENIX Security 2024, 6669-6686
Service Provider Accreditation: Enabling and Enforcing Privacy-by-Design in Credential-based Authentication Systems
More S., Heher J., Fasllija E., Mathie M.
ARES 2024 - 19th International Conference on Availability, Reliability and Security, Proceedings, 19th International Conference on Availability, Reliability and Security, (ACM International Conference Proceeding Series)
COMPRESS: Generate Small and Fast Masked Pipelined Circuits
Cassiers G., Gigerl B., Mangard S., Momin C., Nagpal R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(3), 500-529
Abstraction-Based Decision Making for Statistical Properties
Cano Cordoba F., Henzinger T., Könighofer B., Kueffner K., Mallik K.
9th International Conference on Formal Structures for Computation and Deduction, FSCD 2024, 9th International Conference on Formal Structures for Computation and Deduction, 2:1–2:17, (Leibniz International Proceedings in Informatics, LIPIcs; vol. 299)
Generic and Automated Drive-by GPU Cache Attacks from the Browser
Giner L., Czerny R., Gruber C., Rauscher F., Kogler A., De Almeida Braga D., Gruß D.
ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 19th ACM ASIA Conference on Computer and Communications Security, 128-140, (ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security)
Beyond the Edges of Kernel Control-Flow Hijacking Protection with HEK-CFI
Maar L., Nasahl P., Mangard S.
ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 19th ACM ASIA Conference on Computer and Communications Security, 1214-1230, (ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security)
OPRFs from Isogenies
Heimberger L., Hennerbichler T., Meisingseth F., Ramacher S., Rechberger C.
ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 19th ACM ASIA Conference on Computer and Communications Security, 575-588
Proteus: A Pipelined NTT Architecture Generator
Hirner F., Mert A., Sinha Roy S.
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol. 32(7), 1228 - 1238
Stitching FPGA Fabrics with FABulous and OpenLane 2
Moser L., Kissich M., Scheipel T., Baunach M.
Proceedings of the 21st ACM International Conference on Computing Frontiers 2024 Workshops and Special Sessions, CF 2024 Companion, 21st ACM International Conference on Computing Frontiers Workshops and Special Sessions, 71-74, (Proceedings of the 21st ACM International Conference on Computing Frontiers 2024 Workshops and Special Sessions, CF 2024 Companion)
Backdooring Post-Quantum Cryptography: Kleptographic Attacks on Lattice-based KEMs
Ravi P., Bhasin S., Chattopadhyay A., Aikata A., Sinha Roy S.
GLSVLSI 2024 - Proceedings of the Great Lakes Symposium on VLSI 2024, 34th Great Lakes Symposium on VLSI, 216 - 221
Security Aspects of Masking on FPGAs
Gigerl B., Pretterhofer K., Mangard S.
Proceedings of the 2024 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2024, 2024 IEEE International Symposium on Hardware Oriented Security and Trust, 199-210
Community-driven design
Grass A.
International Journal of Architectural Computing, Vol. 22(2), 257-272
SUIT: Secure Undervolting with Instruction Traps
Juffinger J., Kalinin S., Gruß D., Mueller F.
ASPLOS 2024: Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 1, ACM International Conference on Architectural Support for Programming Languages and Operating Systems
Lifecycle Management of IoT Devices Via Digital Identities Management and Distributed Ledgers Solutions
Loupos K., Vavilis S., Niavis H., Michalopoulos F., Dafloukas K., Skarmeta A., García J., Palomares A., Song H., Dautov R., Mancilla R., Costantino F., Van Landuyt D., Michiels S., More S., Xenakis C., Krilakis K.
Embedded World Conference 2024, Embedded World 2024
Towards Private Deep Learning-Based Side-Channel Analysis using Homomorphic Encryption
Schmid F., Rechberger C., Mukherjee S., Stöttinger M., Picek S., De Santis F.
Constructive Side-Channel Analysis and Secure Design , 15th International Workshop on Constructive Side-Channel Analysis and Secure Design
'Put the Car on the Stand': SMT-based Oracles for Investigating Decisions
Judson S., Elacqua M., Cano Cordoba F., Antonopoulos T., Könighofer B., Shapiro S., Piskac R.
CSLAW 2024 - Proceedings of the 3rd Symposium on Computer Science and Law, 2024 Computer Science and Law Symposium, 73-85
Remote Scheduler Contention Attacks
Gast S., Juffinger J., Maar L., Royer C., Kogler A., Gruß D.
Financial Cryptography and Data Security - 28th International Conference, FC 2024, Revised Selected Papers, Financial Cryptography and Data Security 2024, 365-383, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics))
IdleLeak: Exploiting Idle State Side Effects for Information Leakage
Rauscher F., Kogler A., Juffinger J., Gruß D.
Network and Distributed System Security Symposium (NDSS) 2024, Network and Distributed System Security Symposium 2024