Publications


Aumayr, L., Avarikioti, Z., Salem, I., Schmid, S., & Yeo, M. (2025). X-Transfer: Enabling and Optimizing Cross-PCN Transactions. . In Financial Cryptography and Data Security 2025.


Neiheiser, R., & Kokoris-Kogias, E. (2025). Anthemius: Efficient & Modular Block Assembly for Concurrent Execution. . In Financial Cryptography and Data Security 2025.


Schmidt, D., Ponticello, A., Steinböck, M., Krombholz, K., & Lindorfer, M. (2025). Analyzing the iOS Local Network Permission from a Technical and User Perspective. IEEE Symposium on Security and Privacy (S&P). DOI: 10.1109/SP61157.2025.00045.


Rath, J., Eisenhofer, C., Kaufmann, D., Bjørner, N., & Kovács L. (2025). PolySAT: Word-level Bit-vector Reasoning in Z3. In International Conference on Verified Software: Theories, Tools, and Experiments (VSTTE), 2024.


Scaffino, G., Aumayr, L., Bastankhah, M., Avarikioti, Z., & Maffei M. (2025). Alba: The Dawn of Scalable Bridges for Blockchains. In The 32nd edition of the Network and Distributed System Security Symposium (NDSS). https://dx.doi.org/10.14722/ndss.2025.241286 .


Gast, S., Weissteiner, H., Schröder, R.L., & Gruss, D. (2025). CounterSEVeillance: Performance-Counter Attacks on AMD SEV-SNP. Network and Distributed System Security (NDSS) Symposium 2025. https://dx.doi.org/10.14722/ndss.2025.241038 .


Maar, L., Juffinger, J., Steinbauer, T., Gruss, D., Mangard, S. (2025). KernelSnitch: Side-Channel Attacks on Kernel Data Structures. Network and Distributed System Security (NDSS) Symposium 2025. https://dx.doi.org/10.14722/ndss.2025.240223 .


Juffinger, J., Rauscher, F., La Manna, G., & Gruss, D. (2025). Secret Spilling Drive: Leaking User Behavior through SSD Contention. Network and Distributed System Security (NDSS) Symposium 2025. https://dx.doi.org/10.14722/ndss.2025.230208 .


Juffinger, J. (2025). An Analysis of HMB-based SSD Rowhammer. In Microarchitecture Security Conference.


Gast, S., Juffinger, J., Maar, L., Royer, C., Kogler, A., & Gruss D. (2025) Remote Scheduler Contention Attacks. In: Clark, J., Shi, E. (eds) Financial Cryptography and Data Security. FC 2024. Lecture Notes in Computer Science, vol 14744. Springer, Cham.


Holzbauer, F., Maier, M., Ullrich, J. (2024). Destination Reachable: What ICMPv6 Error Messages Reveal About Their Sources. . In Proceedings of the 2024 ACM on Internet Measurement Conference, pp. 280–294.


Chowdhury, A., Roy, A., Brunetta, C., & Oswald, E. (2024). Leakage Certification Made Simple. In: Reyzin, L., Stebila, D. (eds) Advances in Cryptology – CRYPTO 2024. CRYPTO 2024. Lecture Notes in Computer Science, vol 14925. Springer, Cham.


Rain, S., Brugger, L. S., Petković Komel, A., Kovács, L., & Rawson, M. (2024). Scaling CheckMate for Game-Theoretic Security. In N. Bjorner, M. Heule, & A. Voronkov (Eds.), Proceedings of 25th Conference on Logic for Programming, Artificial Intelligence and Reasoning (pp. 222–231).


Hajdu, M., Kovács, L., & Rawson, M. (2024). Rewriting and Inductive Reasoning. In N. Bjørner, M. Heule, & A. Voronkov (Eds.), Proceedings of 25th Conference on Logic for Programming, Artificial Intelligence and Reasoning (pp. 278–294).


Georgiou, P., Hajdu, M., & Kovacs, L. (2024). Saturating Sorting without Sorts. In N. Bjørner, M. Heule, & A. Voronkov (Eds.), Proceedings of 25th Conference on Logic for Programming, Artificial Intelligence and Reasoning (pp. 88–105).


Juffinger, J., Neela, S. R., Heckel, M., Schwarz, L., Adamsky, F., & Gruss, D. (2024). Presshammer: Rowhammer and Rowpress without Physical Address Information. In: Maggi, F., Egele, M., Payer, M., Carminati, M. (eds) Detection of Intrusions and Malware, and Vulnerability Assessment. DIMVA 2024. Lecture Notes in Computer Science, vol 14828. Springer, Cham.


Aumayr, L., Avarikioti, Z., Maffei, M., & Mazumdar, S. (2024). Securing Lightning Channels against Rational Miners. In The 31st ACM Conference on Computer and Communications Security (CCS 2024) (pp. nn-nn). ACM, New York, NY, USA.


Günther, C. U., & Pietrzak, K. (2024). Deniability in Automated Contact Tracing: Impossibilities and Possibilities. In Proceedings on Privacy Enhancing Technologies, Vol. 2024, Issue 4, pp. 636–648.


Andreeva, E., Bhattacharyya, R., Roy, A., & Trevisani, S. (2024). On Efficient and Secure Compression Modes for Arithmetization-Oriented Hashing. In 2024 IEEE 37th Computer Security Foundations Symposium (CSF). IEEE Computer Security Foundations Symposium, IEEE, pp. 558-573, 37th IEEE Computer Security Foundations Symposium, Enschede, Netherlands, 8/07/24.


Gigerl, B., Pretterhofer, K., & Mangard, S. (2024). Security Aspects of Masking on FPGAs. . Proceedings of the 2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 199-210.


Juffinger, J., Kalinin, S., Gruss, D., & Mueller, F. (2024). SUIT: Secure Undervolting with Instruction Traps. In Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2., pp. 1128 - 1145.


Auerbach, B., Günther, C.U., & Pietrzak, K. (2024). Trapdoor Memory-Hard Functions. In: Joye, M., Leander, G. (eds) Advances in Cryptology – EUROCRYPT 2024. EUROCRYPT 2024. Lecture Notes in Computer Science, vol 14653, pp 315–344. Springer, Cham.


Hadipour, H., & Todo, Y. (2024). Cryptanalysis of QARMAv2. IACR Transactions on Symmetric Cryptology, 2024(1), pp. 188–213.


Bhati, A. S., Dufka, A., Andreeva, E., Roy, A., & Preneel, B. (2024) Skye: A Fast KDF based on Expanding PRF and its Application to Signal. In Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, pp. 1082 - 1098.


Andreeva, E., Cogliati, B., Lallemand, V., Minier, M., Purnal, A., & Roy, A. (2024) Masked Iterate-Fork-Iterate: A New Design Paradigm for Tweakable Expanding Pseudorandom Function. In: Pöpper, C., Batina, L. (eds) Applied Cryptography and Network Security. ACNS 2024. Lecture Notes in Computer Science, vol 14584. Springer, Cham.


Moosbrugger, M., Müllner, J., & Kovács, L. (2024). Automated Sensitivity Analysis for Probabilistic Loops. In: Herber, P., Wijs, A. (eds) Integrated Formal Methods. iFM 2023. Lecture Notes in Computer Science, vol 14300. Springer, Cham.


Chakraborty, D., Hadipour, H., Nguyen, P. H., & Eichlseder, M. (2024). Finding Complete Impossible Differential Attacks on AndRX Ciphers and Efficient Distinguishers for ARX Designs. In: IACR Transactions on Symmetric Cryptology, 2024(3), 84-176.


Hadipour, H., Derbez, P., Eichlseder, M. (2024). Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT. In: Reyzin, L., Stebila, D. (eds) Advances in Cryptology – CRYPTO 2024. CRYPTO 2024. Lecture Notes in Computer Science, vol 14923. Springer, Cham.


Hadipour, H., Gerhalter, S., Sadeghi, S., & Eichlseder, M. (2024). Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRESENT and QARMAv2. In: IACR Transactions on Symmetric Cryptology, 2024(1), 234-325.


Haring, J., Hadži´c, V., & Bloem R, (2024). Closing the Gap: Leakage Contracts for Processors with Transitions and Glitches. IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Issue 4, Pages 110 - 132.


Schröder, R. L., Gast, S., & Guo, Q. (2024). Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks. In Proceedings of the 33rd USENIX Security Symposium, August 14–16, 2024, Philadelphia, PA, USA.


Gast, S., Czerny, R., Juffinger, J., Rauscher F., Franza, S., & Gruss D. (2024) SnailLoad: Exploiting Remote Network Latency Measurements without JavaScript. In Proceedings of the 33rd USENIX Security Symposium, August 14–16, 2024, Philadelphia, PA, USA.


Maar, L., Gast, S., Unterguggenberger, M., Oberhuber, M., & Mangard, S. (2024) SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel. In Proceedings of the 33rd USENIX Security Symposium, August 14–16, 2024, Philadelphia, PA, USA.


Rauscher, F., Kogler, A., Juffinger, J., & Gruss D. (2024). IdleLeak: Exploiting Idle State Side Effects for Information Leakage Network and Distributed System Security (NDSS) Symposium, San Diego, CA, USA


Steinböck, M., Bleier, J., Rainer, M., Urban, T., Utz, C., & Lindorfer, M. (2024). Comparing Apples to Androids: Discovery, Retrieval, and Matching of iOS and Android Apps for Cross-Platform Analyses. IEEE/ACM 21st International Conference on Mining Software Repositories (MSR), pp. 348-360.


Hajdu, M., Kovács, L., Rawson, M., & Voronkov, A. (2024). Reducibility Constraints in Superposition. In: Benzmüller, C., Heule, M.J., Schmidt, R.A. (eds) Automated Reasoning. IJCAR 2024. Lecture Notes in Computer Science, vol 14739. Springer, Cham.


Coutelier, R., Rath, J., Rawson, M., Biere A, & Kovács L. (2024). SAT solving for variants of first-order subsumption. Form Methods Syst Des (2024).


Kovács, L., Hozzová, P., Hajdu, M., & Voronkov, A. (2024). Induction in Saturation. In: Benzmüller, C., Heule, M.J., Schmidt, R.A. (eds) Automated Reasoning. IJCAR 2024. Lecture Notes in Computer Science, vol 14739. Springer, Cham.


Cohen, S., Goren, G., Kokoris-Kogias, L., Sonnino, A., & Spiegelman, A. (2024). Proof of Availability and Retrieval in a Modular Blockchain Architecture. In: Baldimtsi, F., Cachin, C. (eds) Financial Cryptography and Data Security. FC 2023. Lecture Notes in Computer Science, vol 13951. Springer, Cham.


Stefo, C., Xiang, Z., & Kokoris-Kogias, L. (2024). Executing and Proving Over Dirty Ledgers. In: Baldimtsi, F., Cachin, C. (eds) Financial Cryptography and Data Security. FC 2023. Lecture Notes in Computer Science, vol 13950. Springer, Cham.


Coutelier, R., Fleury, M., & Kovács, L. (2024) Lazy Reimplication in Chronological Backtracking. In 27th International Conference on Theory and Applications of Satisfiability Testing (SAT 2024). Leibniz International Proceedings in Informatics (LIPIcs), Volume 305, pp. 9:1-9:19, Schloss Dagstuhl – Leibniz-Zentrum für Informatik


Schoisswohl, J., Kovács, L., & Korovin, K. (2024). VIRAS: Conflict-Driven Quantifier Elimination for Integer-Real Arithmetic. In N. Bjørner, M. Heule, & A. Voronkov (Eds.), Proceedings of 25th Conference on Logic for Programming, Artificial Intelligence and Reasoning (pp. 147–164).


Hozzová, P., Amrollahi, D., Hajdu, M., Kovács, L., Voronkov, A., Wagner, E.M. (2024). Synthesis of Recursive Programs in Saturation. In: Benzmüller, C., Heule, M.J., Schmidt, R.A. (eds) Automated Reasoning. IJCAR 2024. Lecture Notes in Computer Science, vol 14739. Springer, Cham.


Bhati, A. S., Pohle, E., Abidin, A., Andreeva, E., & Preneel, B. (2023). Let’s Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure Computation. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, pp. 2546–2560.


Gigerl, B., Klug, F., Mangard, S., Mendel, F., & Primas, R. (2023). Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024(1), pp. 309–335.


Unterguggenberger, M., Schrammel, D., Lamster, L., Nasahl, P., & Mangard, S. (2023). Cryptographically Enforced Memory Safety. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, pp. 889–903.


Brugger, L. S., Kovács, L., Petkovic Komel, A., Rain, S., & Rawson, M. (2023). CheckMate: Automated Game-Theoretic Security Reasoning. In: CCS ’23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, pp. 1407–1421. Association for Computing Machinery.


Hadipour, H., Sadeghi, S., Eichlseder, M. (2023). Finding the Impossible: Automated Search for Full Impossible-Differential, Zero-Correlation, and Integral Attacks. In: Hazay, C., Stam, M. (eds) Advances in Cryptology – EUROCRYPT 2023. EUROCRYPT 2023. Lecture Notes in Computer Science, vol 14007. Springer, Cham.


Juffinger, J., Lamster, L., Kogler, A., Eichlseder, M., Lipp, M., & Gruss D. (2023). CSI:Rowhammer – Cryptographic Security and Integrity against Rowhammer. 2023 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, pp. 1702-1718.


Kogler, A., Juffinger, J., Giner, L., Gerlach, L., Schwarzl, M., Schwarz, M., Gruss D., & Mangard, S. (2023). Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels . Proceedings of the 32nd USENIX Security Symposium, pp. 7285-7302.


Bartocci, E., Henzinger, T. A., Nickovic, D., & Oliveira da Costa, A. (2023). Hypernode Automata. Leibniz International Proceedings in Informatics (LIPIcs), Volume 279, pp. 21:1-21:16, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2023).


Bhayat, A., Korovin, K., Kovács, L., & Schoisswohl, J. (2023). Refining Unification with Abstraction. In R. Piskac & A. Voronkov (Eds.), Proceedings of 24th International Conference on Logic for Programming, Artificial Intelligence and Reasoning (pp. 36–47). EasyChair EPiC.


Hader, T., Kaufmann, D., & Kovacs, L. (2023). SMT Solving over Finite Field Arithmetic. In R. Piscac & A. Voronkov (Eds.), Proceedings of 24th International Conference on Logic for Programming, Artificial Intelligence and Reasoning, pp. 238–256.


Korovin, K., Kovács, L., Reger, G., Schoisswohl, J., & Voronkov, A. (2023). ALASCA: Reasoning in Quantified Linear Arithmetic. In: Sankaranarayanan, S., Sharygina, N. (eds) Tools and Algorithms for the Construction and Analysis of Systems. TACAS 2023. Lecture Notes in Computer Science, vol 13993. Springer, Cham.


Bhayat, A., Schoisswohl, J., & Rawson, M. (2023). Superposition with Delayed Unification. In: Pientka, B., Tinelli, C. (eds) Automated Deduction – CADE 29. CADE 2023. Lecture Notes in Computer Science(), vol 14132. Springer, Cham.


Gigerl, B., Primas, R., & Mangard, S. (2023). Secure Context Switching of Masked Software Implementations. Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, pp. 980 - 992.


Scaffino, G., Aumayr, L., Avarikioti, G., & Maffei, M. (2023). Glimpse: On-Demand PoW Light Client with Constant-Size Storage for DeFi. In Proceedings of the 32nd USENIX Security Symposium, pp. 733–750.


Bjørner, N., Eisenhofer, C., & Kovács, L. (2023). Satisfiability Modulo Custom Theories in Z3. In: Dragoi, C., Emmi, M., Wang, J. (eds) Verification, Model Checking, and Abstract Interpretation. VMCAI 2023. Lecture Notes in Computer Science, vol 13881. Springer, Cham.


Coutelier, R., Kovács, L., Rawson, M., & Rath, J. (2023). SAT-Based Subsumption Resolution. In: Pientka, B., Tinelli, C. (eds) Automated Deduction – CADE 29. CADE 2023. Lecture Notes in Computer Science, vol 14132. Springer, Cham.


Eisenhofer, C., Alassaf, R., Rawson, M., & Kovács, L. (2023). Non-Classical Logics in Satisfiability Modulo Theories. In: Ramanayake, R., Urban, J. (eds) Automated Reasoning with Analytic Tableaux and Related Methods. TABLEAUX 2023. Lecture Notes in Computer Science, vol 14278. Springer, Cham.


Eisenhofer C., Kovács L., & Rawson M.. (2023). Embedding the Connection Calculus in Satisfiability Modulo Theories. In: Proceedings of the 1st International Workshop on Automated Reasoning with Connection Calculi (AReCCa 2023) affiliated with the 32nd International Conference on Automated Reasoning with Analytic Tableaux and Related Methods (TABLEAUX 2023), pp. 54-63.


Landman, M., Rain, S., Kovács, L., & Futschek, G. (2023). Reshaping Unplugged Computer Science Workshops for Primary School Education. In: Pellet, JP., Parriaux, G. (eds) Informatics in Schools. Beyond Bits and Bytes: Nurturing Informatics Intelligence in Education. ISSEP 2023. Lecture Notes in Computer Science, vol 14296. Springer, Cham.