We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
When Good Kernel Defenses Go Bad: Reliable and Stable Kernel Exploits via Defense-Amplified TLB Side-Channel Leaks
Maar L., Giner L., Gruß D., Mangard S.
Proceedings of the 34rd USENIX Security Symposium, 34th USENIX Security Symposium, (Proceedings of the 34rd USENIX Security Symposium)
KernelSnitch: Side-Channel Attacks on Kernel Data Structures
Maar L., Juffinger J., Steinbauer T., Gruß D., Mangard S.
Network and Distributed System Security Symposium (NDSS) 2025, Network and Distributed System Security Symposium 2025
Power-Related Side-Channel Attacks using the Android Sensor Framework
Oberhuber M., Unterguggenberger M., Maar L., Kogler A., Mangard S.
Network and Distributed System Security Symposium (NDSS) 2025, Network and Distributed System Security Symposium 2025
ChoiceJacking: Compromising Mobile Devices through Malicious Chargers like a Decade ago
Draschbacher F., Maar L., Oberhuber M., Mangard S.
Usenix Security Symposium 2025, 34th USENIX Security Symposium
Cryptographic Least Privilege Enforcement for Scalable Memory Isolation
Unterguggenberger M., Schrammel D., Maar L., Lamster L., Hadzic V., Mangard S.
IEEE International Symposium on Hardware Oriented Security and Trust (HOST), IEEE International Symposium on Hardware Oriented Security and Trust 2025: HOST 2025
Manifest Problems: Analyzing Code Transparency for Android Application Bundles
Draschbacher F., Maar L.
Annual Computer Security Applications Conference, Annual Computer Security Applications Conference
Defects-in-Depth: Analyzing the Integration of Effective Defenses against One-Day Exploits in Android Kernels
Maar L., Draschbacher F., Lamster L., Mangard S.
Usenix Security Symposium 2024, 33rd USENIX Security Symposium: USENIX Security 2024
SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel
Maar L., Gast S., Unterguggenberger M., Oberhuber M., Mangard S.
Proceedings of the 33rd USENIX Security Symposium, 33rd USENIX Security Symposium: USENIX Security 2024, 4051-4068, (Proceedings of the 33rd USENIX Security Symposium)
Beyond the Edges of Kernel Control-Flow Hijacking Protection with HEK-CFI
Maar L., Nasahl P., Mangard S.
ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 19th ACM ASIA Conference on Computer and Communications Security, 1214-1230, (ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security)
Remote Scheduler Contention Attacks
Gast S., Juffinger J., Maar L., Royer C., Kogler A., Gruß D.
Financial Cryptography and Data Security - 28th International Conference, FC 2024, Revised Selected Papers, Financial Cryptography and Data Security 2024, 365-383, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics))
DOPE: DOmain Protection Enforcement with PKS
Maar L., Schwarzl M., Rauscher F., Gruß D., Mangard S.
Proceedings - 39th Annual Computer Security Applications Conference, ACSAC 2023, 2023 Annual Computer Security Applications Conference, 662-676, (ACM International Conference Proceeding Series)