We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Layered Binary Templating
Schwarzl M., Kraft E., Gruß D.
Applied Cryptography and Network Security , 21st International Conference on Applied Cryptography and Network Security, (Lecture Notes in Computer Science ; vol. 13905)
Practical Timing Side-Channel Attacks on Memory Compression
Schwarzl M., Borrello P., Saileshwar G., Müller H., Schwarz M., Gruß D.
43th IEEE Symposium on Security and Privacay: IEEE S&P 2023, 43th IEEE Symposium on Security and Privacay, 1186-1203
Robust and Scalable Process Isolation against Spectre in the Cloud
Schwarzl M., Borrello P., Kogler A., Varda K., Schuster T., Schwarz M., Gruß D.
European Symposium on Research in Computer Security (ESORICS), 27th European Symposium on Research in Computer Security
Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX
Giner L., Kogler A., Canella C., Schwarz M., Gruß D.
31th USENIX Security Symposium (USENIX Security 22), 31st USENIX Security Symposium
Half-Double: Hammering From the Next Row Over
Kogler A., Juffinger J., Qazi S., Kim Y., Lipp M., Boichat N., Shiu E., Nissler M., Gruß D.
Proceedings of the 31st USENIX Security Symposium, 31st USENIX Security Symposium, 3807-3824
SFIP: Coarse-Grained Syscall-Flow-Integrity Protection in Modern Systems
Canella C., Dorn S., Gruß D., Schwarz M.
Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks
Naseredini A., Gast S., Schwarzl M., Bernardo P., Smajic A., Canella. C., Berger M., Gruß D.
ICISSP 2022 - Proceedings of the 8th International Conference on Information Systems Security and Privacy, 8th International Conference on Information Systems Security and Privacy, 48-59
Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks
Kogler A., Gruß D., Schwarz M.
Conference Proceedings 31st USENIX Security Symposium, 31st USENIX Security Symposium, 4147-4164
Finding and Exploiting CPU Features using MSR Templating
Kogler A., Weber D., Haubenwallner M., Lipp M., Gruß D., Schwarz M.
Proceedings - 43rd IEEE Symposium on Security and Privacy, SP 2022, 43rd IEEE Symposium on Security and Privacy, 1474-1490, (Proceedings - IEEE Symposium on Security and Privacy; vol. 2022-May)
ÆPIC Leak
Borrello P., Kogler A., Schwarzl M., Lipp M., Gruß D., Schwarz M.
Proceedings of the 31st USENIX Security Symposium, Security 2022, 31st USENIX Security Symposium, 3917-3934
Rapid Prototyping for Microarchitectural Attacks
Easdon C., Schwarz M., Schwarzl M., Gruß D.
Proceedings of the 31st USENIX Security Symposium, Security 2022, 31st USENIX Security Symposium, 3861-3877
AMD Prefetch Attacks through Power and Time
Lipp M., Gruß D., Schwarz M.
Proceedings of the 31st USENIX Security Symposium, Security 2022, 31st USENIX Security Symposium, 643-660
Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks
Naseredini A., Gast S., Schwarzl M., Bernardo P., Smajic A., Canella C., Berger M., Gruß D.
Automating Seccomp Filter Generation for Linux Applications
Canella C., Werner M., Gruß D., Schwarz M.
CCSW'21 - Proceedings of the 2021 Cloud Computing Security Workshop, ACM Cloud Computing Security Workshop 2021, 139-151
Systematic Analysis of Randomization-based Protected Cache Architectures
Purnal A., Giner L., Gruß D., Verbauwhede I.
2021 IEEE Symposium on Security and Privacy (SP), 42th IEEE Symposium on Security and Privacy, 987-1002
PLATYPUS: Software-based Power Side-Channel Attacks on x86
Lipp M., Kogler A., Oswald D., Schwarz M., Easdon C., Canella C., Gruß D.
2021 IEEE Symposium on Security and Privacy (SP), 42th IEEE Symposium on Security and Privacy, 355-371
Speculative Dereferencing: Reviving Foreshadow
Schwarzl M., Schuster T., Schwarz M., Gruß D.
Remote Memory-Deduplication Attacks
Schwarzl M., Kraft E., Lipp M., Gruß D.
Specfuscator: Evaluating Branch Removal as a Spectre Mitigation
Schwarzl M., Canella C., Gruß D., Schwarz M.
Financial Cryptography and Data Security - 25th International Conference, FC 2021, Revised Selected Papers, 25th International Conference on Financial Cryptography and Data Security, 293-310, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12674 LNCS)