Publications


Gast, S., Weissteiner, H., Schröder, R.L., & Gruss, D. (2025). CounterSEVeillance: Performance-Counter Attacks on AMD SEV-SNP. Network and Distributed System Security (NDSS) Symposium 2025.


Juffinger, J., Rauscher, F., La Manna, G., & Gruss, D. (2025). Secret Spilling Drive: Leaking User Behavior through SSD Contention. Network and Distributed System Security (NDSS) Symposium 2025.


Günther, C. U., & Pietrzak, K. (2024). Deniability in Automated Contact Tracing: Impossibilities and Possibilities. In Proceedings on Privacy Enhancing Technologies, Vol. 2024, Issue 4, pp. 636–648.


Maar, L., Gast, S., Unterguggenberger, M., Oberhuber, M., & Mangard, S. (2024) SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel. In Proceedings of the 33rd USENIX Security Symposium, August 14–16, 2024, Philadelphia, PA, USA.


Gast, S., Czerny, R., Juffinger, J., Rauscher F., Franza, S., & Gruss D. (2024) SnailLoad: Exploiting Remote Network Latency Measurements without JavaScript. In Proceedings of the 33rd USENIX Security Symposium, August 14–16, 2024, Philadelphia, PA, USA.


Schröder, R. L., Gast, S., & Guo, Q. (2024). Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks. In Proceedings of the 33rd USENIX Security Symposium, August 14–16, 2024, Philadelphia, PA, USA.


Juffinger, J., Neela, S. R., Heckel, M., Schwarz, L., Adamsky, F., & Gruss, D. (2024). Presshammer: Rowhammer and Rowpress without Physical Address Information. In: Maggi, F., Egele, M., Payer, M., Carminati, M. (eds) Detection of Intrusions and Malware, and Vulnerability Assessment. DIMVA 2024. Lecture Notes in Computer Science, vol 14828. Springer, Cham.


Andreeva, E., Bhattacharyya, R., Roy, A., & Trevisani, S. (2024). On Efficient and Secure Compression Modes for Arithmetization-Oriented Hashing. In 2024 IEEE 37th Computer Security Foundations Symposium (CSF). IEEE Computer Security Foundations Symposium, IEEE, pp. 558-573, 37th IEEE Computer Security Foundations Symposium, Enschede, Netherlands, 8/07/24.


Steinböck, M., Bleier, J., Rainer, M., Urban, T., Utz, C., & Lindorfer, M. (2024). Comparing Apples to Androids: Discovery, Retrieval, and Matching of iOS and Android Apps for Cross-Platform Analyses. IEEE/ACM 21st International Conference on Mining Software Repositories (MSR), pp. 348-360.


Gigerl, B., Pretterhofer, K., & Mangard, S. (2024). Security Aspects of Masking on FPGAs. . Proceedings of the 2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 199-210.


Auerbach, B., Günther, C.U., & Pietrzak, K. (2024). Trapdoor Memory-Hard Functions. In: Joye, M., Leander, G. (eds) Advances in Cryptology – EUROCRYPT 2024. EUROCRYPT 2024. Lecture Notes in Computer Science, vol 14653, pp 315–344. Springer, Cham.


Juffinger, J., Kalinin, S., Gruss, D., & Mueller, F. (2024). SUIT: Secure Undervolting with Instruction Traps. In Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2., pp. 1128 - 1145.


Hadipour, H., & Todo, Y. (2024). Cryptanalysis of QARMAv2. IACR Transactions on Symmetric Cryptology, 2024(1), pp. 188–213.


Gast, S., Juffinger, J., Maar, L., Royer, C., Kogler, A., & Gruss D. (2024) Remote Scheduler Contention Attacks. FC’24, Willemstad, Curaçao.


Andreeva, E., Cogliati, B., Lallemand, V., Minier, M., Purnal, A., & Roy, A. (2024) Masked Iterate-Fork-Iterate: A New Design Paradigm for Tweakable Expanding Pseudorandom Function. In: Pöpper, C., Batina, L. (eds) Applied Cryptography and Network Security. ACNS 2024. Lecture Notes in Computer Science, vol 14584. Springer, Cham.


Bhati, A. S., Dufka, A., Andreeva, E., Roy, A., & Preneel, B. (2024) Skye: A Fast KDF based on Expanding PRF and its Application to Signal. In Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, pp. 1082 - 1098.


Rauscher, F., Kogler, A., Juffinger, J., & Gruss D. (2024). IdleLeak: Exploiting Idle State Side Effects for Information Leakage Network and Distributed System Security (NDSS) Symposium, San Diego, CA, USA


Gigerl, B., Klug, F., Mangard, S., Mendel, F., & Primas, R. (2023). Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024(1), pp. 309–335.


Bartocci, E., Henzinger, T. A., Nickovic, D., & Oliveira da Costa, A. (2023). Hypernode Automata. Leibniz International Proceedings in Informatics (LIPIcs), Volume 279, pp. 21:1-21:16, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2023).


Bhati, A. S., Pohle, E., Abidin, A., Andreeva, E., & Preneel, B. (2023). Let’s Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure Computation. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, pp. 2546–2560.


Brugger, L. S., Kovács, L., Petkovic Komel, A., Rain, S., & Rawson, M. (2023). CheckMate: Automated Game-Theoretic Security Reasoning. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, pp. 1407–1421.


Schmidt, D., Tagliaro, C., Borgolte, K., & Lindorfer, M. (2023). IoTFlow: Inferring IoT Device Behavior at Scale through Static Mobile Companion App Analysis. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, pp. 681–695.


Unterguggenberger, M., Schrammel, D., Lamster, L., Nasahl, P., & Mangard, S. (2023). Cryptographically Enforced Memory Safety. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, pp. 889–903.


Landman, M., Rain, S., Kovács, L., & Futschek, G. (2023). Reshaping Unplugged Computer Science Workshops for Primary School Education. In: Pellet, JP., Parriaux, G. (eds) Informatics in Schools. Beyond Bits and Bytes: Nurturing Informatics Intelligence in Education. ISSEP 2023. Lecture Notes in Computer Science, vol 14296. Springer, Cham.


Juffinger, J., Lamster, L., Kogler, A., Eichlseder, M., Lipp, M., & Gruss D. (2023). CSI:Rowhammer – Cryptographic Security and Integrity against Rowhammer. 2023 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, pp. 1702-1718.


Kogler, A., Juffinger, J., Giner, L., Gerlach, L., Schwarzl, M., Schwarz, M., Gruss D., & Mangard, S. (2023). Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels . Proceedings of the 32nd USENIX Security Symposium, pp. 7285-7302.


Brugger, L. S., Kovács, L., Petkovic Komel, A., Rain, S., & Rawson, M. (2023). CheckMate: Automated Game-Theoretic Security Reasoning. In CCS ’23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, pp. 1407–1421. Association for Computing Machinery.


Moosbrugger, M., Müllner, J., & Kovács, L. (2024). Automated Sensitivity Analysis for Probabilistic Loops. In: Herber, P., Wijs, A. (eds) Integrated Formal Methods. iFM 2023. Lecture Notes in Computer Science, vol 14300. Springer, Cham.


Landman, M., Rain, S., Kovács, L., & Futschek, G. (2023). Reshaping Unplugged Computer Science Workshops for Primary School Education. In: Pellet, JP., Parriaux, G. (eds) Informatics in Schools. Beyond Bits and Bytes: Nurturing Informatics Intelligence in Education. ISSEP 2023. Lecture Notes in Computer Science, vol 14296. Springer, Cham.


Eisenhofer, C., Alassaf, R., Rawson, M., & Kovács, L. (2023). Non-Classical Logics in Satisfiability Modulo Theories. In: Ramanayake, R., Urban, J. (eds) Automated Reasoning with Analytic Tableaux and Related Methods. TABLEAUX 2023. Lecture Notes in Computer Science, vol 14278. Springer, Cham.


Scaffino, G., Aumayr, L., Avarikioti, G., & Maffei, M. (2023). Glimpse: On-Demand PoW Light Client with Constant-Size Storage for DeFi. In Proceedings of the 32nd USENIX Security Symposium, pp. 733–750.


Gigerl, B., Primas, R., & Mangard, S. (2023). Secure Context Switching of Masked Software Implementations. Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, pp. 980 - 992.


Bhayat, A., Korovin, K., Kovács, L., & Schoisswohl, J. (2023). Refining Unification with Abstraction. In R. Piskac & A. Voronkov (Eds.), Proceedings of 24th International Conference on Logic for Programming, Artificial Intelligence and Reasoning (pp. 36–47). EasyChair EPiC.


Hader, T., Kaufmann, D., & Kovacs, L. (2023). SMT Solving over Finite Field Arithmetic. In R. Piscac & A. Voronkov (Eds.), Proceedings of 24th International Conference on Logic for Programming, Artificial Intelligence and Reasoning, pp. 238–256.


Coutelier, R., Kovács, L., Rawson, M., & Rath, J. (2023). SAT-Based Subsumption Resolution. In: Pientka, B., Tinelli, C. (eds) Automated Deduction – CADE 29. CADE 2023. Lecture Notes in Computer Science(), vol 14132. Springer, Cham.


Bhayat, A., Schoisswohl, J., & Rawson, M. (2023). Superposition with Delayed Unification. In: Pientka, B., Tinelli, C. (eds) Automated Deduction – CADE 29. CADE 2023. Lecture Notes in Computer Science(), vol 14132. Springer, Cham.


Korovin, K., Kovács, L., Reger, G., Schoisswohl, J., & Voronkov, A. (2023). ALASCA: Reasoning in Quantified Linear Arithmetic. In: Sankaranarayanan, S., Sharygina, N. (eds) Tools and Algorithms for the Construction and Analysis of Systems. TACAS 2023. Lecture Notes in Computer Science, vol 13993. Springer, Cham.


Stefo, C., Xiang, Z., & Kokoris-Kogias, L. (2024). Executing and Proving Over Dirty Ledgers. In: Baldimtsi, F., Cachin, C. (eds) Financial Cryptography and Data Security. FC 2023. Lecture Notes in Computer Science, vol 13950. Springer, Cham.


Cohen, S., Goren, G., Kokoris-Kogias, L., Sonnino, A., & Spiegelman, A. (2024). Proof of Availability and Retrieval in a Modular Blockchain Architecture. In: Baldimtsi, F., Cachin, C. (eds) Financial Cryptography and Data Security. FC 2023. Lecture Notes in Computer Science, vol 13951. Springer, Cham.


Hadipour, H., Nageler, M., & Eichlseder, M. (2022). Throwing Boomerangs into Feistel Structures: Application to CLEFIA, WARP, LBlock, LBlock-s and TWINE. IACR Transactions on Symmetric Cryptology, 2022(3), p. 271–302.