We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
A Systematic Evaluation of Novel and Existing Cache Side Channels
Rauscher F., Fiedler C., Kogler A., Gruß D.
Network and Distributed System Security Symposium (NDSS) 2025
An Analysis of HMB-based SSD Rowhammer
Juffinger J.
Proceeding of the 1st Microarchitecture Security Conference (uASC '25)
An Adaptive, Provable Correct Simplex Architecture
Maderbacher B., Schupp S., Bartocci E., Bloem R., Nickovic D., Könighofer B.
International Journal on Software Tools for Technology Transfer, 2025
TME-Box: Scalable In-Process Isolation through Intel TME-MK Memory Encryption
Unterguggenberger M., Lamster L., Schrammel D., Schwarzl M., Mangard S.
Network and Distributed System Security (NDSS) Symposium 2025
Power-Related Side-Channel Attacks using the Android Sensor Framework
Oberhuber M., Unterguggenberger M., Maar L., Kogler A., Mangard S.
Network and Distributed System Security (NDSS) Symposium 2025
On Loopy Belief Propagation for SASCAs: An Analysis and Empirical Study of the Inference Problem
Nagpal R., Cassiers G., Knoll C., Pernkopf F., Primas R., Mangard S.
IACR Communications in Crypology, Vol. 1(4), 2025
ChoiceJacking: Compromising Mobile Devices through Malicious Chargers like a Decade ago
Draschbacher F., Maar L., Oberhuber M., Mangard S.
Proceedings of the 34th USENIX Security Symposium
Cryptographic Least Privilege Enforcement for Scalable Memory Isolation
Unterguggenberger M., Schrammel D., Maar L., Lamster L., Hadzic V., Mangard S.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2025
FAULTLESS: Flexible and Transparent Fault Protection for Superscalar RISC-V Processors
Waser M., Schrammel D., Schilling R., Mangard S.
22nd International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2025
FatPTE - Expanding Page Table Entries for Security
Lamster L., Unterguggenberger M., Waser M., Schrammel D., Mangard S.
Proceedings of the 20th International Conference on Availability, Reliability and Security, ARES 2025
Code Encryption with Intel TME-MK for Control-Flow Enforcement
Unterguggenberger M., Lamster L., Oberhuber M., Scherer S., Mangard S.
Computer Security - ESORICS 2025 - 30th European Symposium on Research in Computer Security, 2025, Proceedings
Tools at the Frontiers of Quantitative Verification
Andriushchenko R., Bork A., Budde C., Češka M., Grover K., Hahn E., Hartmanns A., Israelsen B., Jansen N., Jeppson J., Junges S., Köhl M., Könighofer B., Křetínský J., Meggendorfer T., Parker D., Pranger S., Quatmann T., Ruijters E., Taylor L., Volk M., Weininger M., Zhang Z.
TOOLympics Challenge 2023 - Updates, Results, Successes of the Formal-Methods Competitions
Explainably Safe Reinforcement Learning
Rieder S., Pranger S., Chakraborty D., Křetínský J., Könighofer B.
39th Conference on Neural Information Processing Systems (NeurIPS 2025)
Meltdown
Gruß D.
Encyclopedia of Cryptography, Security and Privacy, Third Edition, Springer, Cham, 1516-1520, 2025
Lanes Are Not Enough: Enhancing Trajectory Prediction in Intralogistics Through Detailed Environmental Context
Prutsch A., Wess M., Possegger H.
Proceedings of the International Conference on Intelligent Robots and Systems (IROS)
Input Uncertainty Attribution by Uncertainty Propagation
Kantz B., Steger S., Staudinger C., Feilmayr C., Wachlmayr J., Haberl A., Schuster S., Pernkopf F.
ICASSP
Towards LLM-enhanced Compiler Optimization
Garber D., Burgstaller T., Lubos S., Ratschiller P., Felfernig A.
Proceedings of the 27th International Workshop on Configuration (ConfWS 2025)
Synthesis of Controllers for Continuous Blackbox Systems
Maderbacher B., Windisch F., Larrauri Borroto L., Bloem R.
Verification, Model Checking, and Abstract Interpretation - 26th International Conference, VMCAI 2025, Proceedings
Minimize the Randomness in Rasta-Like Designs: How Far Can We Go?
Schmid F., Rechberger C., Grassi L., Liu F., Walch R., Wang Q.
Selected Areas in Cryptography – SAC 2024 - 31st International Conference, 2024, Revised Selected Papers
SoK: Computational and Distributed Differential Privacy for MPC
Meisingseth F., Rechberger C.
Proceedings on Privacy Enhancing Technologies
