Security researchers at IAIK, Moritz Lipp, Daniel Gruss and Michael Schwarz, together with an international team have once again uncovered a serious security hole in computer processors. With the new security hole published under the name “Load Value Injection”, there is another method to read out sensitive data. You an find the whole article HERE.
This author has yet to write their bio.
Meanwhile lets just say that we are proud Administrator contributed a whooping 39 entries.
Entries by Administrator
IAIK might have just the right topics in your field of interest. Find out more & use the opportunity to personally speak to assistants of our institute. Come over to the Bac::Mas Thesis Fair ! >> 5th March, at 10am-1pm, Inffeldgasse 25d (foyer). New theses topics will be online by 22nd February – check them […]
The Federal Ministry of Education, Science and Research (BMBWF) annually honours the best 50 (out of 16.000!) Austrian Master’s theses with a “Würdigungspreis/Staatspreis”. This year, IAIK doctoral student Barbara Gigerl received the award for her thesis “Automated Analysis of Speculation Windows in Spectre Attacks”. The main focus of the thesis is the analysis and extension […]
On 29th December, 14 students were awarded prizes and certificates for their contributions to scientific publications in 2019. Congratulations!Upon chatting about the current hot topics in security, students were able to learn more about open bachelor theses and research areas at IAIK and got in touch with potential supervisors. We are looking forward to your […]
Our PhD student Martin Schwarzl and our master student Kurt Nistelberger won the third place at the European Cyber Security Challenge (ECSC) in Bucarest, where 20 teams participated. The participants had to solve hacking tasks in the categories Web and App security, cryptography, reverse engineering, forensics and hardware tasks. After two long days of solving […]
SGS and Graz University of Technology have joined forces to set up Cybersecurity Campus Graz. They address the current challenges in cybersecurity by means of working together in three areas: Research on analyzing system security and on fundamental new security concepts. Education for cybersecurity experts and researchers who are in such strong demand. Testing and […]