We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
SnailLoad: Exploiting Remote Network Latency Measurements without JavaScript
Gast S., Czerny R., Juffinger J., Rauscher F., Franza S., Gruß D.
Proceedings of the 33rd USENIX Security Symposium
SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel
Maar L., Gast S., Unterguggenberger M., Oberhuber M., Mangard S.
Proceedings of the 33rd USENIX Security Symposium
Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks
Schröder R., Gast S., Guo Q.
Proceedings of the 33rd USENIX Security Symposium
Service Provider Accreditation: Enabling and Enforcing Privacy-by-Design in Credential-based Authentication Systems
More S., Heher J., Fasllija E., Mathie M.
ARES 2024 - 19th International Conference on Availability, Reliability and Security, Proceedings
COMPRESS: Generate Small and Fast Masked Pipelined Circuits
Cassiers G., Gigerl B., Mangard S., Momin C., Nagpal R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(3), 2024
Abstraction-Based Decision Making for Statistical Properties
Cano F., Henzinger T., Könighofer B., Kueffner K., Mallik K.
9th International Conference on Formal Structures for Computation and Deduction, FSCD 2024
Generic and Automated Drive-by GPU Cache Attacks from the Browser
Giner L., Czerny R., Gruber C., Rauscher F., Kogler A., De Almeida Braga D., Gruß D.
ACM AsiaCCS
Beyond the Edges of Kernel Control-Flow Hijacking Protection with HEK-CFI
Maar L., Nasahl P., Mangard S.
ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security
OPRFs from Isogenies
Heimberger L., Hennerbichler T., Meisingseth F., Ramacher S., Rechberger C.
ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security
Proteus: A Pipelined NTT Architecture Generator
Hirner F., Mert A., Sinha Roy S.
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol. 32(7), 2024
REPQC: Reverse Engineering and Backdooring Hardware Accelerators for Post-quantum Cryptography
Pagliarini S., Aikata A., Imran M., Sinha Roy S.
ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security
Backdooring Post-Quantum Cryptography: Kleptographic Attacks on Lattice-based KEMs
Ravi P., Bhasin S., Chattopadhyay A., Aikata A., Sinha Roy S.
GLSVLSI 2024 - Proceedings of the Great Lakes Symposium on VLSI 2024
Security Aspects of Masking on FPGAs
Gigerl B., Pretterhofer K., Mangard S.
Proceedings of the 2024 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2024
Learning and Repair of Deep Reinforcement Learning Policies from Fuzz-Testing Data
Tappler M., Pferscher A., Aichernig B., Könighofer B.
ICSE 2024 - Proceedings of the 46th IEEE/ACM International Conference on Software Engineering
SUIT: Secure Undervolting with Instruction Traps
Juffinger J., Kalinin S., Gruß D., Mueller F.
ASPLOS 2024: Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 1
Lifecycle Management of IoT Devices Via Digital Identities Management and Distributed Ledgers Solutions
Loupos K., Vavilis S., Niavis H., Michalopoulos F., Dafloukas K., Skarmeta A., García J., Palomares A., Song H., Dautov R., Mancilla R., Costantino F., Van Landuyt D., Michiels S., More S., Xenakis C., Krilakis K.
Embedded World Conference 2024
Towards Private Deep Learning-Based Side-Channel Analysis using Homomorphic Encryption
Schmid F., Rechberger C., Mukherjee S., Stöttinger M., Picek S., De Santis F.
Constructive Side-Channel Analysis and Secure Design
'Put the Car on the Stand': SMT-based Oracles for Investigating Decisions
Judson S., Elacqua M., Cano F., Antonopoulos T., Könighofer B., Shapiro S., Piskac R.
CSLAW 2024 - Proceedings of the 3rd Symposium on Computer Science and Law
Remote Scheduler Contention Attacks
Gast S., Juffinger J., Maar L., Royer C., Kogler A., Gruß D.
Financial Cryptography and Data Security - 28th International Conference, FC 2024, Revised Selected Papers
IdleLeak: Exploiting Idle State Side Effects for Information Leakage
Rauscher F., Kogler A., Juffinger J., Gruß D.
Network and Distributed System Security Symposium (NDSS) 2024
