We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Not So Secure TSC
Juffinger J., Neela S., Gruß D.
Applied Cryptography and Network Security, 23rd International Conference on Applied Cryptography and Network Security
KernelSnitch: Side-Channel Attacks on Kernel Data Structures
Maar L., Juffinger J., Steinbauer T., Gruß D., Mangard S.
Network and Distributed System Security Symposium (NDSS) 2025, Network and Distributed System Security Symposium 2025
Secret Spilling Drive: Leaking User Behavior through SSD Contention
Juffinger J., Rauscher F., La Manna G., Gruß D.
Network and Distributed System Security (NDSS) Symposium 2025, Network and Distributed System Security Symposium 2025
An Analysis of HMB-based SSD Rowhammer
Juffinger J.
Proceeding of the 1st Microarchitecture Security Conference (uASC '25), Microarchitecture Security Conference
SnailLoad: Exploiting Remote Network Latency Measurements without JavaScript
Gast S., Czerny R., Juffinger J., Rauscher F., Franza S., Gruß D.
Proceedings of the 33rd USENIX Security Symposium, 33rd USENIX Security Symposium: USENIX Security 2024, 2315-2332
SUIT: Secure Undervolting with Instruction Traps
Juffinger J., Kalinin S., Gruß D., Mueller F.
ASPLOS 2024: Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 1, ACM International Conference on Architectural Support for Programming Languages and Operating Systems
Remote Scheduler Contention Attacks
Gast S., Juffinger J., Maar L., Royer C., Kogler A., Gruß D.
Financial Cryptography and Data Security - 28th International Conference, FC 2024, Revised Selected Papers, Financial Cryptography and Data Security 2024, 365-383, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics))
IdleLeak: Exploiting Idle State Side Effects for Information Leakage
Rauscher F., Kogler A., Juffinger J., Gruß D.
Network and Distributed System Security Symposium (NDSS) 2024, Network and Distributed System Security Symposium 2024
Presshammer: Rowhammer and Rowpress without Physical Address Information
Juffinger J., Neela S., Heckel M., Schwarz L., Adamsky F., Gruß D.
Detection of Intrusions and Malware, and Vulnerability Assessment - 21st International Conference, DIMVA 2024, Proceedings, 21st Conference on Detection of Intrusions and Malware & Vulnerability Assessment, 460–479, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14828 LNCS)
Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels
Kogler A., Juffinger J., Giner L., Gerlach L., Schwarzl M., Schwarz M., Gruß D., Mangard S.
32nd USENIX Security Symposium, USENIX Security 2023, 32nd USENIX Security Symposium, 7285-7302
PT-Guard: Integrity-Protected Page Tables to Defend Against Breakthrough Rowhammer Attacks
Saxena A., Saileshwar G., Juffinger J., Kogler A., Gruß D., Qureshi M.
Proceedings - 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2023, 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 95-108
CSI:Rowhammer – Cryptographic Security and Integrity against Rowhammer
Juffinger J., Lamster L., Kogler A., Eichlseder M., Lipp M., Gruß D.
44th IEEE Symposium on Security and Privacy , 43th IEEE Symposium on Security and Privacay
SQUIP: Exploiting the Scheduler Queue Contention Side Channel
Gast S., Juffinger J., Schwarzl M., Saileshwar G., Kogler A., Franza S., Köstl M., Gruß D.
44th IEEE Symposium on Security and Privacy , 43th IEEE Symposium on Security and Privacay
Half-Double: Hammering From the Next Row Over
Kogler A., Juffinger J., Qazi S., Kim Y., Lipp M., Boichat N., Shiu E., Nissler M., Gruß D.
Proceedings of the 31st USENIX Security Symposium, 31st USENIX Security Symposium, 3807-3824
Another Flip in the Wall of Rowhammer Defenses
Gruß D., Lipp M., Schwarz M., Genkin D., Juffinger J., O'Connell S., Schoechl W., Yarom Y.
39th IEEE Symposium on Security and Privacy 2018