We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Shield Synthesis for Reinforcement Learning
Könighofer B., Bloem R., Jansen N., Lorber F.
Leveraging Applications of Formal Methods, Verification and Validation, 2020 International Symposium on Leveraging Applications of Formal Methods, 290-306, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12476 LNCS)
Take A Way: Exploring the Security Implications of AMD's Cache Way Predictors
Lipp M., Hadzic V., Schwarz M., Perais A., Maurice C., Gruß D.
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020, 15th ACM ASIA Conference on Computer and Communications Security, 813–825
KASLR
Canella C., Schwarz M., Haubenwallner M., Schwarzl M., Gruß D.
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020, 15th ACM ASIA Conference on Computer and Communications Security, 481-493, (Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020)
Placement of Runtime Checks to Counteract Fault Injections
Maderbacher B., Karl A., Bloem R.
Runtime Verification - 20th International Conference, RV 2020, Proceedings, 20th International Conference on Runtime Verification, 241-258, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12399 LNCS)
Step-Wise Development of Provably Correct Actor Systems
Aichernig B., Maderbacher B.
Leveraging Applications of Formal Methods, Verification and Validation, Springer Nature Switzerland AG, 426-448, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12476 LNCS)
The Evolution of Transient-Execution Attacks
Canella C., Khasawneh K., Gruß D.
GLSVLSI 2020 - Proceedings of the 2020 Great Lakes Symposium on VLSI, 30th ACM Great Lakes Symposium on VLSI, 163-168, (Proceedings of the ACM Great Lakes Symposium on VLSI, GLSVLSI)
Evolution of Defenses against Transient-Execution Attacks
Canella C., Pudukotai Dinakarrao S., Gruß D., Khasawneh K.
GLSVLSI 2020 - Proceedings of the 2020 Great Lakes Symposium on VLSI, 30th ACM Great Lakes Symposium on VLSI, 169-174, (Proceedings of the ACM Great Lakes Symposium on VLSI, GLSVLSI)
Plundervolt
Murdock K., Oswald D., Garcia F., Van Bulck J., Piessens F., Gruß D.
IEEE Security & Privacy, Vol. 18(5), 28-37
How trusted execution environments fuel research on microarchitectural attacks
Schwarz M., Gruß D.
IEEE Security & Privacy, Vol. 18(5), 18-27
Pervasive Collaboration and Tangible Complexity in Realtime Architecture
Grass A., Parger A., Hirschberg U.
Proceedings of the 38th eCAADe Conference, 38th eCAADe Conference: Anthropologic – Architecture and Fabrication in the cognitive age … From smart to behavioral … From digital to material
Nethammer: Inducing Rowhammer Faults through Network Requests
Lipp M., Schwarz M., Raab L., Lamster L., Aga M., Maurice C., Gruß D.
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 5th IEEE European Symposium on Security and Privacy, 710-719
AndroPRINT: Analysing the Fingerprintability of the Android API
Palfinger G., Prünster B.
Proceedings of the 15th International Conference on Availability, Reliability and Security, ARES 2020, 15th International Conference on Availability, Reliability and Security, (ACM International Conference Proceeding Series)
Donky: Domain Keys – Efficient In-Process Isolation for RISC-V and x86
Schrammel D., Weiser S., Steinegger S., Schwarzl M., Schwarz M., Mangard S., Gruß D.
Proceedings of the 29th USENIX Security Symposium, 29th USENIX Security Symposium, 1677-1694, (Proceedings of the 29th USENIX Security Symposium)
Revisiting Gilbert’s known-key distinguisher
Grassi L., Rechberger C.
Designs, Codes and Cryptography, Vol. 88(7), 1401-1445
Spectre attacks
Kocher P., Horn J., Fogh A., Genkin D., Gruß D., Haas W., Hamburg M., Lipp M., Mangard S., Prescher T., Schwarz M., Yarom Y.
Communications of the ACM, Vol. 63(7), 93-101
ISAP v2.0
Dobraunig C., Eichlseder M., Mangard S., Mendel F., Mennink B., Primas R., Unterluggauer T.
IACR Transactions on Symmetric Cryptology, Vol. 2020(Special Issue 1), 390-416
Meltdown
Lipp M., Schwarz M., Gruß D., Prescher T., Haas W., Horn J., Mangard S., Kocher P., Genkin D., Yarom Y., Hamburg M., Strackx R.
Communications of the ACM, Vol. 63(6), 46-56
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection
Van Bulck J., Moghimi D., Schwarz M., Lipp M., Minkin M., Genkin D., Yarom Y., Sunar B., Gruß D., Piessens F.
Proceedings - 2020 IEEE Symposium on Security and Privacy, SP 2020, 41st IEEE Symposium on Security and Privacy, 54-72, (Proceedings - IEEE Symposium on Security and Privacy; vol. 2020-May)
On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy
Grassi L., Lüftenegger R., Rechberger C., Rotaru D., Schofnegger M.
Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings, Eurocrypt 2020, 674-704, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12106 LNCS)
Plundervolt
Murdock K., Oswald D., Garcia F., Van Bulck J., Gruß D., Piessens F.
Proceedings - 2020 IEEE Symposium on Security and Privacy, SP 2020, 41st IEEE Symposium on Security and Privacy, 1466-1482