Publications


Robin Leander Schröder, Stefan Gast, Qian Guo. Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks. USENIX Security 2024. https://www.stefangast.eu/papers/divide_and_surrender.pdf


Magdalena Steinböck, Jakob Bleier, Mikka Rainer, Tobias Urban, Christine Utz, and Martina Lindorfer. Comparing Apples to Androids: Discovery, Retrieval, and Matching of iOS and Android Apps for Cross-Platform Analyses. In 21st International Conference on Mining Software Repositories (MSR ’24), April 15–16, 2024, Lisbon, Portugal. ACM, New York, NY, USA, 13 pages. https://doi.org/10.1145/3643991.3644896


Barbara Gigerl, Kevin Pretterhofer, Stefan Mangard: Security Aspects of Masking on FPGAs . In: Proceedings of the 2024 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2024.


Benedikt Auerbach, Christoph U. Günther, Krzysztof Pietrzak: Trapdoor Memory-Hard Functions. In: Joye, M., Leander, G. (eds) Advances in Cryptology – EUROCRYPT 2024. EUROCRYPT 2024. Lecture Notes in Computer Science, vol 14653. Springer, Cham. https://doi.org/10.1007/978-3-031-58734-4_11 .


Juffinger, J., Kalinin, S., Gruss, D., Mueller, F.: “SUIT: Secure Undervolting with Instruction Traps”. In Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 1. Association of Computing Machinery. ASPLOS'24, San Diego, CA, USA, April 27 - May 1, 2024.


Hadipour Hosein, Todo Yosuke: “Cryptanalysis of QARMAv2. IACR Transactions on Symmetric Cryptology” . IACR Transactions on Symmetric Cryptology, 2024(1), 188–213.


Stefan Gast, Jonas Juffinger, Lukas Maar, Christoph Royer, Andreas Kogler, and Daniel Gruss: “Remote Scheduler Contention Attacks”. FC’24, Willemstad, Curaçao, March 4-8, 2024.


Amit Singh Bhati, Antonin Dufka, Elena Andreeva, Arnab Roy, and Bart Preneel: “Skye: A Fast KDF based on Expanding PRF and its Application to Signal”. ACM ASIACCS 2024, Singapore, July 1 - 5, 2024.


Fabian Rauscher, Andreas Kogler, Jonas Juffinger, and Daniel Gruss: “IdleLeak: Exploiting Idle State Side Effects for Information Leakage” NDSS'24, San Diego, CA, USA, February 26 - March 1, 2024.


Barbara Gigerl, Franz Klug, Stefan Mangard, Florian Mendel and Robert Primas: “Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency” . IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024(1), 309–335.


Ezio Bartocci, Thomas A. Henzinger, Dejan Nickovic, and Ana Oliveira da Costa: “Hypernode Automata”. In 34th International Conference on Concurrency Theory (CONCUR 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 279, pp. 21:1-21:16, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2023).


Amit Singh Bhati, Erik Pohle, Aysajan Abidin, Elena Andreeva, and Bart Preneel: “Let’s Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure Computation”. . Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, November 2023. Pages 2546–2560.


Lea Salome Brugger, Laura Kovacs, Anja Petkovic Komel, Sophie Rain, and Rawson, Michael: “CheckMate: Automated Game-Theoretic Security Reasoning”. . Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, November 2023. Pages 1407–1421. doi: 10.1145/3576915.3623183


David Schmidt, Carlotta Tagliaro, Kevin Borgolte, and Martina Lindorfer: “IoTFlow: Inferring IoT Device Behavior at Scale through Static Mobile Companion App Analysis”. . Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, November 2023. Pages 681–695. doi: 10.1145/3576915.3623211


Martin Unterguggenberger, David Schrammel, Lukas Lamster, Pascal Nasahl, and Stefan Mangard: “Cryptographically Enforced Memory Safety”. . Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, November 2023. Pages 889–903. https://doi.org/10.1145/3576915.3623138


Martina Landman, Sophie Rain, Laura Kovács, and Gerald Futschek: “Reshaping Unplugged Computer Science Workshops for Primary School Education”. . In: Pellet, JP., Parriaux, G. (eds) Informatics in Schools. Beyond Bits and Bytes: Nurturing Informatics Intelligence in Education. ISSEP 2023. Lecture Notes in Computer Science, vol 14296. Springer, Cham. https://doi.org/10.1007/978-3-031-44900-0_11


Jonas Juffinger, Lukas Lamster, Andreas Kogler, Maria Eichlseder, Moritz Lipp, Daniel Gruss: “CSI:Rowhammer – Cryptographic Security and Integrity against Rowhammer”. In 2023 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 2023 pp. 1702-1718. doi: 10.1109/SP46215.2023.10179390


Andreas Kogler, Jonas Juffinger, Lukas Giner, Lukas Gerlach, Martin Schwarzl, Michael Schwarz, Daniel Gruss and Stefan Mangard: “Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels” . Proceedings of the 32nd USENIX Security Symposium. August 9–11, 2023. Anaheim, CA, USA.


Lea Brugger, Laura Kovacs, Anja Komel, Sophie Rain, and Michael Rawson: “CheckMate: Automated Game-Theoretic Security Reasoning”. ACM Conference on Computer and Communications Security , 2023.


Marcel Moosbrugger, Julian Muellner, and Laura Kovacs: “Automated Sensitivity Analysis for Probabilistic Loops” . International Conference on integrated Formal Methods , 2023.


Martina Landman, Sophie Rain, Gerald Futschek, and Laura Kovacs: “Reshaping Unplugged Computer Science Workshops for Primary School Education”. International Conference on Informatics in Schools , 2023.


Clemens Eisenhofer, Ruba Alaassaf, Michael Rawson, and Laura Kovacs: “Non-Classical Logics in Satisfiability Modulo Theories”. International Conference on Automated Reasoning with Analytic Tableaux and Related Methods , 2023.


Giulia Scaffino, Lukas Aumayr, Zeta Avarikioti, Matteo Maffei: “Glimpse: On-Demand PoW Light Client with Constant-Size Storage for DeFi” . USENIX Security Symposium, August 9–11, 2023.


Barbara Gigerl, Robert Primas, Stefan Mangard: “Secure Context Switching of Masked Software Implementations” . ASIA CCS ’23: ACM ASIA Conference on Computer and Communications Security, July 10-14, 2023.


Ahmed Bhayat, Konstantin Korovin, Laura Kovács, and Johannes Schoisswohl: “Refining Unification with Abstraction” . Proceedings of the 24th International Conference on Logic for Programming, Artificial Intelligence and Reasoning (LPAR), June 4-9, 2023.


Thomas Hader, Daniela Kaufmann, and Laura Kovacs: “SMT Solving over Finite Field Arithmetic” . Proceedings of the 24th International Conference on Logic for Programming, Artificial Intelligence and Reasoning (LPAR), June 4-9, 2023.


Robin Coutelier, Laura Kovacs, Michael Rawson and Jakob Rath: “SAT-Based Subsumption Resolution.” Proceedings of the 29th International Conference on Automated Deduction (CADE), July 1-4, 2023.


Ahmed Bhayat, Michael Rawson and Johannes Schoisswohl: “Superposition with Delayed Unification.” Proceedings of the 29th International Conference on Automated Deduction (CADE), July 1-4, 2023.


Konstantin Korovin, Laura Kovács, Giles Reger, Johannes Schoisswohl, and Andrei Voronkov: “ALASCA: Reasoning in Quantified Linear Arithmetic”, due to appear in Volume 13993 of the Lecture Notes in Computer Science series, Proceedings of the 29th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), Paris, France, April 2023.


Christos Stefo, Zhuolun Xiang, Lefteris Kokoris-Kogias: “Executing and Proving over Dirty Ledgers” ; accepted as talk for: 27th International Conference Financial Cryptography and Data Security 2023.


Shir Cohen, Guy Goren, Lefteris Kokoris-Kogias, Alberto Sonnino, Alexander Spiegelman: “Proof of Availability & Retrieval in a Modular Blockchain Architecture” ; accepted as talk for: 27th International Conference Financial Cryptography and Data Security 2023.


Hosein Hadipour, Marcel Nageler, Maria Eichlseder: “Throwing Boomerangs into Feistel Structures: Application to CLEFIA, WARP, LBlock, LBlock-s and TWINE” . IACR Transactions on Symmetric Cryptology, Vol. 2022/3, p. 271-302.