We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
WaitWatcher and WaitGuard
Lamster L., Rauscher F., Unterguggenberger M., Mangard S.
Computer Security – ESORICS 2025
CHERI UNCHAINED: Generic Instruction and Register Control for CHERI Capabilities
Waser M., Lamster L., Schrammel D., Unterguggenberger M., Mangard S.
Availability, Reliability and Security
TME-Box: Scalable In-Process Isolation through Intel TME-MK Memory Encryption
Unterguggenberger M., Lamster L., Schrammel D., Schwarzl M., Mangard S.
Network and Distributed System Security (NDSS) Symposium 2025
Cryptographic Least Privilege Enforcement for Scalable Memory Isolation
Unterguggenberger M., Schrammel D., Maar L., Lamster L., Hadzic V., Mangard S.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2025
FatPTE - Expanding Page Table Entries for Security
Lamster L., Unterguggenberger M., Waser M., Schrammel D., Mangard S.
Proceedings of the 20th International Conference on Availability, Reliability and Security, ARES 2025
Code Encryption with Intel TME-MK for Control-Flow Enforcement
Unterguggenberger M., Lamster L., Oberhuber M., Scherer S., Mangard S.
Computer Security - ESORICS 2025 - 30th European Symposium on Research in Computer Security, 2025, Proceedings
Defects-in-Depth: Analyzing the Integration of Effective Defenses against One-Day Exploits in Android Kernels
Maar L., Draschbacher F., Lamster L., Mangard S.
Usenix Security Symposium 2024
Memory Tagging using Cryptographic Integrity on Commodity x86 CPUs
Schrammel D., Unterguggenberger M., Lamster L., Sultana S., Grewal K., LeMay M., Durham D., Mangard S.
Proceedings - 9th IEEE European Symposium on Security and Privacy, Euro S and P 2024
Voodoo: Memory Tagging, Authenticated Encryption, and Error Correction through MAGIC
Lamster L., Unterguggenberger M., Schrammel D., Mangard S.
Proceedings of the 33rd USENIX Conference on Security Symposium
Cryptographically Enforced Memory Safety
Unterguggenberger M., Schrammel D., Lamster L., Nasahl P., Mangard S.
CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security
Multi-Tag: A Hardware-Software Co-Design for Memory Safety based on Multi-Granular Memory Tagging
Unterguggenberger M., Schrammel D., Nasahl P., Schilling R., Lamster L., Mangard S.
ASIA CCS 2023 - Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security
SPEAR-V: Secure and Practical Enclave Architecture for RISC-V
Schrammel D., Waser M., Lamster L., Unterguggenberger M., Mangard S.
ASIA CCS 2023 - Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security
HashTag: Hash-based Integrity Protection for Tagged Architectures
Lamster L., Unterguggenberger M., Schrammel D., Mangard S.
Proceedings of the 32nd USENIX Security Symposium
CSI:Rowhammer – Cryptographic Security and Integrity against Rowhammer
Juffinger J., Lamster L., Kogler A., Eichlseder M., Lipp M., Gruß D.
44th IEEE Symposium on Security and Privacy
Nethammer: Inducing Rowhammer Faults through Network Requests
Lipp M., Schwarz M., Raab L., Lamster L., Aga M., Maurice C., Gruß D.
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
