We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
TME-Box: Scalable In-Process Isolation through Intel TME-MK Memory Encryption
Unterguggenberger M., Lamster L., Schrammel D., Schwarzl M., Mangard S.
Network and Distributed System Security (NDSS) Symposium 2025, Network and Distributed System Security Symposium 2025
DOPE: DOmain Protection Enforcement with PKS
Maar L., Schwarzl M., Rauscher F., Gruß D., Mangard S.
Proceedings - 39th Annual Computer Security Applications Conference, ACSAC 2023, 2023 Annual Computer Security Applications Conference, 662-676, (ACM International Conference Proceeding Series)
Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels
Kogler A., Juffinger J., Giner L., Gerlach L., Schwarzl M., Schwarz M., Gruß D., Mangard S.
32nd USENIX Security Symposium, USENIX Security 2023, 32nd USENIX Security Symposium, 7285-7302
CustomProcessingUnit: Reverse Engineering and Customization of Intel Microcode
Borrello P., Easdon C., Schwarzl M., Czerny R., Schwarz M.
IEEE Workshop on Offensive Technologies (WOOT 23), 17th IEEE Workshop on Offensive Technologies
Side-Channel Attacks on Optane Persistent Memory
Liu S., Kanniwadi S., Schwarzl M., Kogler A., Gruß D., Khan S.
Proceedings of the 32nd USENIX Security Symposium, 32nd USENIX Security Symposium
SQUIP: Exploiting the Scheduler Queue Contention Side Channel
Gast S., Juffinger J., Schwarzl M., Saileshwar G., Kogler A., Franza S., Köstl M., Gruß D.
44th IEEE Symposium on Security and Privacy , 43th IEEE Symposium on Security and Privacay
Layered Binary Templating
Schwarzl M., Kraft E., Gruß D.
Applied Cryptography and Network Security , 21st International Conference on Applied Cryptography and Network Security, (Lecture Notes in Computer Science ; vol. 13905)
Practical Timing Side-Channel Attacks on Memory Compression
Schwarzl M., Borrello P., Saileshwar G., Müller H., Schwarz M., Gruß D.
43th IEEE Symposium on Security and Privacay: IEEE S&P 2023, 43th IEEE Symposium on Security and Privacay, 1186-1203
Robust and Scalable Process Isolation against Spectre in the Cloud
Schwarzl M., Borrello P., Kogler A., Varda K., Schuster T., Schwarz M., Gruß D.
European Symposium on Research in Computer Security (ESORICS), 27th European Symposium on Research in Computer Security
Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks
Naseredini A., Gast S., Schwarzl M., Bernardo P., Smajic A., Canella. C., Berger M., Gruß D.
ICISSP 2022 - Proceedings of the 8th International Conference on Information Systems Security and Privacy, 8th International Conference on Information Systems Security and Privacy, 48-59
ÆPIC Leak
Borrello P., Kogler A., Schwarzl M., Lipp M., Gruß D., Schwarz M.
Proceedings of the 31st USENIX Security Symposium, Security 2022, 31st USENIX Security Symposium, 3917-3934
Rapid Prototyping for Microarchitectural Attacks
Easdon C., Schwarz M., Schwarzl M., Gruß D.
Proceedings of the 31st USENIX Security Symposium, Security 2022, 31st USENIX Security Symposium, 3861-3877
Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks
Naseredini A., Gast S., Schwarzl M., Bernardo P., Smajic A., Canella C., Berger M., Gruß D.
Speculative Dereferencing: Reviving Foreshadow
Schwarzl M., Schuster T., Schwarz M., Gruß D.
Remote Memory-Deduplication Attacks
Schwarzl M., Kraft E., Lipp M., Gruß D.
Specfuscator: Evaluating Branch Removal as a Spectre Mitigation
Schwarzl M., Canella C., Gruß D., Schwarz M.
Financial Cryptography and Data Security - 25th International Conference, FC 2021, Revised Selected Papers, 25th International Conference on Financial Cryptography and Data Security, 293-310, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12674 LNCS)
KASLR
Canella C., Schwarz M., Haubenwallner M., Schwarzl M., Gruß D.
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020, 15th ACM ASIA Conference on Computer and Communications Security, 481-493, (Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020)
Donky: Domain Keys – Efficient In-Process Isolation for RISC-V and x86
Schrammel D., Weiser S., Steinegger S., Schwarzl M., Schwarz M., Mangard S., Gruß D.
Proceedings of the 29th USENIX Security Symposium, 29th USENIX Security Symposium, 1677-1694, (Proceedings of the 29th USENIX Security Symposium)
NetSpectre: Read Arbitrary Memory over Network
Schwarz M., Schwarzl M., Lipp M., Masters J., Gruß D.
Computer Security - ESORICS 2019, ESORICS 2019, 279-299, (Lecture Notes in Computer Science; vol. 11735)