Publications


Günther, C. U., & Pietrzak, K. (2024). Deniability in Automated Contact Tracing: Impossibilities and Possibilities. In Proceedings on Privacy Enhancing Technologies, Vol. 2024, Issue 4, pp. 636–648.


Maar L., Gast S., Unterguggenberger, M.,Oberhuber, M., & Mangard, S. (2024) SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel. USENIX Security 2024.


Gast, S., Czerny, R., Juffinger, J., Rauscher F., Franza, S., & Gruss D. (2024) SnailLoad: Exploiting Remote Network Latency Measurements without JavaScript. USENIX Security 2024.


Schröder, R. L., Gast, S., & Guo, Q. (2024). Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks. USENIX Security 2024.


Juffinger, J., Neela, S. R., Heckel, M., Schwarz, L., Adamsky, F., & Gruss, D. (2024). Presshammer: Rowhammer and Rowpress without Physical Address Information. In 21st Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA ‘24 ), July 17-19, 2024, Lausanne, Switzerland.


Steinböck, M., Bleier, J., Rainer, M., Urban, T., Utz, C., & Lindorfer, M. (2024). Comparing Apples to Androids: Discovery, Retrieval, and Matching of iOS and Android Apps for Cross-Platform Analyses. IEEE/ACM 21st International Conference on Mining Software Repositories (MSR), pp. 348-360.


Gigerl, B., Pretterhofer, K., & Mangard, S. (2024). Security Aspects of Masking on FPGAs. . Proceedings of the 2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 199-210.


Auerbach, B., Günther, C.U., & Pietrzak, K. (2024). Trapdoor Memory-Hard Functions. In: Joye, M., Leander, G. (eds) Advances in Cryptology – EUROCRYPT 2024. EUROCRYPT 2024. Lecture Notes in Computer Science, vol 14653, pp 315–344. Springer, Cham.


Juffinger, J., Kalinin, S., Gruss, D., & Mueller, F. (2024). SUIT: Secure Undervolting with Instruction Traps. In Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2., pp. 1128 - 1145.


Hadipour, H., & Todo, Y. (2024). Cryptanalysis of QARMAv2. IACR Transactions on Symmetric Cryptology, 2024(1), pp. 188–213.


Gast, S., Juffinger, J., Maar, L., Royer, C., Kogler, A., & Gruss D. (2024) Remote Scheduler Contention Attacks. FC’24, Willemstad, Curaçao.


Bhati, A. S., Dufka, A., Andreeva, E., Roy, A., & Preneel, B. (2023) Skye: A Fast KDF based on Expanding PRF and its Application to Signal. Cryptology ePrint Archive, Volume 2023, p. 781.


Rauscher, F., Kogler, A., Juffinger, J., & Gruss D. (2024). IdleLeak: Exploiting Idle State Side Effects for Information Leakage Network and Distributed System Security (NDSS) Symposium, San Diego, CA, USA


Gigerl, B., Klug, F., Mangard, S., Mendel, F., & Primas, R. (2023). Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024(1), pp. 309–335.


Bartocci, E., Henzinger, T. A., Nickovic, D., & Oliveira da Costa, A. (2023). Hypernode Automata. Leibniz International Proceedings in Informatics (LIPIcs), Volume 279, pp. 21:1-21:16, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2023).


Bhati, A. S., Pohle, E., Abidin, A., Andreeva, E., & Preneel, B. (2023). Let’s Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure Computation. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, pp. 2546–2560.


Brugger, L. S., Kovács, L., Petkovic Komel, A., Rain, S., & Rawson, M. (2023). CheckMate: Automated Game-Theoretic Security Reasoning. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, pp. 1407–1421.


Schmidt, D., Tagliaro, C., Borgolte, K., & Lindorfer, M. (2023). IoTFlow: Inferring IoT Device Behavior at Scale through Static Mobile Companion App Analysis. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, pp. 681–695.


Unterguggenberger, M., Schrammel, D., Lamster, L., Nasahl, P., & Mangard, S. (2023). Cryptographically Enforced Memory Safety. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, pp. 889–903.


Landman, M., Rain, S., Kovács, L., & Futschek, G. (2023). Reshaping Unplugged Computer Science Workshops for Primary School Education. In: Pellet, JP., Parriaux, G. (eds) Informatics in Schools. Beyond Bits and Bytes: Nurturing Informatics Intelligence in Education. ISSEP 2023. Lecture Notes in Computer Science, vol 14296. Springer, Cham.


Juffinger, J., Lamster, L., Kogler, A., Eichlseder, M., Lipp, M., & Gruss D. (2023). CSI:Rowhammer – Cryptographic Security and Integrity against Rowhammer. 2023 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, pp. 1702-1718.


Kogler, A., Juffinger, J., Giner, L., Gerlach, L., Schwarzl, M., Schwarz, M., Gruss D., & Mangard, S. (2023). Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels . Proceedings of the 32nd USENIX Security Symposium, pp. 7285-7302.


Brugger, L. S., Kovács, L., Petkovic Komel, A., Rain, S., & Rawson, M. (2023). CheckMate: Automated Game-Theoretic Security Reasoning. In CCS ’23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, pp. 1407–1421. Association for Computing Machinery.


Moosbrugger, M., Müllner, J., & Kovács, L. (2024). Automated Sensitivity Analysis for Probabilistic Loops. In: Herber, P., Wijs, A. (eds) Integrated Formal Methods. iFM 2023. Lecture Notes in Computer Science, vol 14300. Springer, Cham.


Landman, M., Rain, S., Kovács, L., & Futschek, G. (2023). Reshaping Unplugged Computer Science Workshops for Primary School Education. In: Pellet, JP., Parriaux, G. (eds) Informatics in Schools. Beyond Bits and Bytes: Nurturing Informatics Intelligence in Education. ISSEP 2023. Lecture Notes in Computer Science, vol 14296. Springer, Cham.


Eisenhofer, C., Alassaf, R., Rawson, M., & Kovács, L. (2023). Non-Classical Logics in Satisfiability Modulo Theories. In: Ramanayake, R., Urban, J. (eds) Automated Reasoning with Analytic Tableaux and Related Methods. TABLEAUX 2023. Lecture Notes in Computer Science, vol 14278. Springer, Cham.


Scaffino, G., Aumayr, L., Avarikioti, G., & Maffei, M. (2023). Glimpse: On-Demand PoW Light Client with Constant-Size Storage for DeFi. In Proceedings of the 32nd USENIX Security Symposium, pp. 733–750.


Gigerl, B., Primas, R., & Mangard, S. (2023). Secure Context Switching of Masked Software Implementations. Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, pp. 980 - 992.


Bhayat, A., Korovin, K., Kovács, L., & Schoisswohl, J. (2023). Refining Unification with Abstraction. In R. Piskac & A. Voronkov (Eds.), Proceedings of 24th International Conference on Logic for Programming, Artificial Intelligence and Reasoning (pp. 36–47). EasyChair EPiC.


Hader, T., Kaufmann, D., & Kovacs, L. (2023). SMT Solving over Finite Field Arithmetic. In R. Piscac & A. Voronkov (Eds.), Proceedings of 24th International Conference on Logic for Programming, Artificial Intelligence and Reasoning, pp. 238–256.


Coutelier, R., Kovács, L., Rawson, M., & Rath, J. (2023). SAT-Based Subsumption Resolution. In: Pientka, B., Tinelli, C. (eds) Automated Deduction – CADE 29. CADE 2023. Lecture Notes in Computer Science(), vol 14132. Springer, Cham.


Bhayat, A., Schoisswohl, J., & Rawson, M. (2023). Superposition with Delayed Unification. In: Pientka, B., Tinelli, C. (eds) Automated Deduction – CADE 29. CADE 2023. Lecture Notes in Computer Science(), vol 14132. Springer, Cham.


Korovin, K., Kovács, L., Reger, G., Schoisswohl, J., & Voronkov, A. (2023). ALASCA: Reasoning in Quantified Linear Arithmetic. In: Sankaranarayanan, S., Sharygina, N. (eds) Tools and Algorithms for the Construction and Analysis of Systems. TACAS 2023. Lecture Notes in Computer Science, vol 13993. Springer, Cham.


Stefo, C., Xiang, Z., & Kokoris-Kogias, L. (2024). Executing and Proving Over Dirty Ledgers. In: Baldimtsi, F., Cachin, C. (eds) Financial Cryptography and Data Security. FC 2023. Lecture Notes in Computer Science, vol 13950. Springer, Cham.


Cohen, S., Goren, G., Kokoris-Kogias, L., Sonnino, A., & Spiegelman, A. (2024). Proof of Availability and Retrieval in a Modular Blockchain Architecture. In: Baldimtsi, F., Cachin, C. (eds) Financial Cryptography and Data Security. FC 2023. Lecture Notes in Computer Science, vol 13951. Springer, Cham.


Hadipour, H., Nageler, M., & Eichlseder, M. (2022). Throwing Boomerangs into Feistel Structures: Application to CLEFIA, WARP, LBlock, LBlock-s and TWINE. IACR Transactions on Symmetric Cryptology, 2022(3), p. 271–302.