Project Details
Description
SPyCoDe aims at creating the technological foundations for the design of complex, multi-layer systems with provable S&P guarantees. This goal is highly interdisciplinary, integrating computer-aided verification, system security, and cryptography, and touching on further fields, like networks, game theory, and blockchains.
| Status | Active |
|---|---|
| Effective start/end date | 1/01/23 → 31/12/26 |
Fingerprint
Explore the research topics touched on by this project. These labels are generated based on the underlying awards/grants. Together they form a unique fingerprint.
-
Continuous User Behavior Monitoring using DNS Cache Timing Attacks
Weissteiner, H., Czerny, R., Franza, S., Gast, S., Ullrich, J. & Gruss, D., 23 Feb 2026, NDSS 2026.Research output: Chapter in Book/Report/Conference proceeding › Conference paper › peer-review
Open AccessFile -
Efficient SPA Countermeasures using Redundant Number Representation with Application to ML-KEM
Nagpal, R., Hadzic, V., Primas, R. & Mangard, S., 2026, Selected Areas in Cryptography - SAC 2025 - 32nd International Conference, Revised Selected Papers. Boura, C., Mashatan, A. & Miri, A. (eds.). Springer, Cham, p. 753-780 28 p. (Lecture Notes in Computer Science; vol. 16207 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference paper › peer-review
-
Eviction Notice: Reviving and Advancing Page Cache Attacks
Neela, S. R., Juffinger, J., Maar, L. & Gruss, D., 2026, (Accepted/In press) Network and Distributed System Security (NDSS) Symposium. San Diego, CA, USA, 17 p.Research output: Chapter in Book/Report/Conference proceeding › Conference paper › peer-review
Open AccessFile
Activities
-
Continuous User Behavior Monitoring using DNS Cache Timing Attacks
Weissteiner, H. (Speaker)
26 Feb 2026Activity: Talk or presentation › Talk at conference or symposium › Science to science
-
Memory Band-Aid: A Principled Rowhammer Defense-in-Depth
Fiedler, C. (Speaker)
15 Dec 2025Activity: Talk or presentation › Talk at workshop, seminar or course › Science to science
-
Derandomizing the Location of Security-Critical Kernel Objects in the Linux Kernel
Maar, L. (Speaker) & Giner, L. (Speaker)
6 Aug 2025Activity: Talk or presentation › Talk at conference or symposium › Science to science