ISEC TU GRAZ's Avatar

ISEC TU GRAZ

@isec-tugraz.bsky.social

WE ARE ISEC: The Institute of Information Security at TU Graz

223 Followers  |  15 Following  |  150 Posts  |  Joined: 18.11.2024
Posts Following

Posts by ISEC TU GRAZ (@isec-tugraz.bsky.social)

Post image Post image Post image

What a week!
Our move is completed and from now on, you can find us at Sandgasse 38a. πŸŽ‰

A big thank you to everyone who made this quick transition possible. 🫢

27.02.2026 19:01 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Continuous User Behavior Monitoring using DNS Cache Timing Attacks - NDSS Symposium

Hannes Weissteiner: Continuous User Behavior Monitoring using DNS Cache Timing Attacks
www.ndss-symposium.org/ndss-paper/c...

27.02.2026 15:41 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Eviction Notice: Reviving and Advancing Page Cache Attacks - NDSS Symposium

Sudheendra Neela: Eviction Notice: Reviving and Advancing Page Cache Attacks
www.ndss-symposium.org/ndss-paper/e...

27.02.2026 15:41 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
Memory Band-Aid: A Principled Rowhammer Defense-in-Depth - NDSS Symposium

Carina Fiedler: Memory Band-Aid: A Principled Rowhammer Defense-in-Depth
www.ndss-symposium.org/ndss-paper/m...

27.02.2026 15:41 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image Post image Post image Post image

Our PhD students, Carina Fiedler, @snee.la and @hannesweissteiner.com attended the NDSS Symposium 2026 in San Diego, California, this week to present their papers!

Check them out in the thread πŸ‘‡

27.02.2026 15:41 β€” πŸ‘ 4    πŸ” 2    πŸ’¬ 1    πŸ“Œ 0
Post image

We're waving goodbye to Inffeldgasse 16A! πŸ‘‹

Today marks our final day here, and we're really excited about the adventures waiting for us at our fabulous new place at Sandgasse 38A.

We can't wait to see all of you there after the move! πŸ₯³

20.02.2026 17:39 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Post image

πŸŽ‰ Congratulations to Martin Unterguggenberger! πŸŽ‰

He successfully defended his #PhD thesis β€œDefense-in-Depth Techniques for Memory Safety in Hardware” today. πŸŽ‰
We wish him all the best in his future endeavors!

23.01.2026 13:27 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Congratulations @snee.la ! πŸŽ‰

16.01.2026 16:38 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Find us at the @tugraz.bsky.social booth at Educatio Budapest until January 10th, to find out about our study programms in information security! ☺️

#university #informationsecurity #computerscience

09.01.2026 10:00 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image Post image Post image

Thank you for joining our Bachelor@ISEC event in October, and congratulations to all award winners! πŸ•β€οΈ

Wishing you a wonderful holiday season! We can’t wait to see you all next year for more events at our institute! πŸŽ„

23.12.2025 14:48 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

πŸŽ‰ Congratulations to Benedikt Maderbacher! πŸŽ‰

He successfully defended his #PhD thesis β€œReactive Synthesis Modulo Theories” yesterday. πŸŽ‰
We wish him all the best for an amazing future ahead!

19.12.2025 14:59 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

To enhance your experience, we're happy to announce that coincidentally a Mulled Wine Stand is happening right in front of HS i13 at the same time, so see you there!

16.12.2025 17:13 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Join us tomorrow for the InfoSec + SSD Christmas special, featuring real-world exploits, live hacking of various targets, information leaks, file formats, and a review of the year in security.

πŸ“… December 17th, 2025 | 17:30
πŸ“ Lecture Hall HS i13, Inffeldgasse 16b

16.12.2025 17:13 β€” πŸ‘ 4    πŸ” 1    πŸ’¬ 1    πŸ“Œ 0
Events – ISEC

Apart from defining these models, the talk also covers their application for the problems of reactive synthesis and probabilistic verification.

πŸ“… December 18th, 2025 | 10:00
πŸ“ ISEC meeting room (IFEG074), Inffeldgasse 16A

πŸ‘‰ www.isec.tugraz.at/events/

15.12.2025 19:42 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Join us for RΓΌdiger Ehlers’ talk on polynomial-time minimizable automata for omega-regular languages this Thursday!

His talk summarizes the main ideas of two recently introduced polynomial-time minimizable automaton models for omega-regular languages.

15.12.2025 19:42 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0


➜ Apply for the Master’s degree programs by ‼️ 15th December 2025 ‼️
www.tugraz.at/go/admission...

➜ Apply for the β€˜Cybersecurity Scholarship’
tugraz.at/go/cybersecu...

08.12.2025 12:06 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image Post image

Specialise in Cybersecurity with the Master’s programs and kickstart your academic journey at TU Graz with the β€˜Cybersecurity Scholarship’ (€4,000/semester) for international students! 🌍✨

Your future starts hereβ€”apply today! πŸš€

#studyabroad #scholarship #informationtechnology #cybersecurity

08.12.2025 12:06 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

Two of our courses were awarded the Student’s List Award! πŸŽ‰

It was presented to the best courses of the summer semester 2024 and winter semester 2024/25 in our faculty’s BME and CS/SEM/ICE programs by student representatives, based on student feedback.

06.12.2025 12:19 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Accelerating Hash-Based Polynomial Commitment Schemes with Linear Prover Time | IACR Transactions on Cryptographic Hardware and Embedded Systems Zero-knowledge proofs (ZKPs) are cryptographic protocols that enable one party to prove the validity of a statement without revealing any information beyond its truth. Central building blocks in many…

πŸ“„ Accelerating Hash-Based Polynomial Commitment Schemes with Linear Prover Time: doi.org/10.46586/tch...

05.12.2025 16:35 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
ToFA: Towards Fault Analysis of GIFT and GIFT-like Ciphers Leveraging Truncated Impossible Differentials | IACR Transactions on Cryptographic Hardware and Embedded Systems In this work, we introduce ToFA, the first fault attack (FA) strategy that attempts to leverage the classically well-known idea of impossible differential cryptanalysis to mount practically…

πŸ“„ ToFA: Towards Fault Analysis of GIFT and GIFT-like Ciphers Leveraging Truncated Impossible Differentials: doi.org/10.46586/tch...

05.12.2025 16:35 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
Skyscraper: Fast Hashing on Big Primes | IACR Transactions on Cryptographic Hardware and Embedded Systems Arithmetic hash functions defined over prime fields have been actively developed and used in verifiable computation (VC) protocols. Among those, ellipticcurve- based SNARKs require large (256-bit and…

πŸ“„ Skyscraper: Fast Hashing on Big Primes: doi.org/10.46586/tch...

05.12.2025 16:35 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
REED: Chiplet-based Accelerator for Fully Homomorphic Encryption | IACR Transactions on Cryptographic Hardware and Embedded Systems Fully Homomorphic Encryption (FHE) enables privacy-preserving computation and has many applications. However, its practical implementation faces massive computation and memory overheads. To address…

πŸ“„ REED: Chiplet-based Accelerator for Fully Homomorphic Encryption: doi.org/10.46586/tch...

05.12.2025 16:35 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
Efficient and Composable Masked AES S-Box Designs Using Optimized Inverters | IACR Transactions on Cryptographic Hardware and Embedded Systems Hardware implementations of cryptographic algorithms are susceptible to power analysis attacks, allowing attackers to break the otherwise strong security guarantees. A theoretically sound…

πŸ“„ Efficient and Composable Masked AES S-Box Designs Using Optimized Inverters: doi.org/10.46586/tch...

05.12.2025 16:35 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

In September, our researchers attended the Conference on Cryptographic Hardware and Embedded Systems (#CHES2025) in Kuala Lumpur, Malaysia. While there, they reunited with their former colleagues from TU Graz. 😊

05.12.2025 16:35 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 1    πŸ“Œ 0
Post image

PhD Candidate Aikata was selected for a netidee "Call 20" stipend for her research, titled "Hardware Design for Post-Quantum Cryptography and Homomorphic Encryption." πŸŽ‰

Find out more πŸ‘‡
www.netidee.at/hardware-des...

05.12.2025 16:21 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image Post image Post image

This year, we launched the semester with our Master@ISEC event for the first time!
We extended a warm welcome to the new master's students joining our campus and shared information about the Major in Information Security.

Want to take part? Join us in Graz in 2026!
www.tugraz.at/go/admission...

05.12.2025 11:16 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Video thumbnail

Curious now?
Specialise in Cybersecurity with our Master’s programmes & kickstart your academic journey with the β€˜Cybersecurity Scholarship’ (€4,000/semester) for international students! 🌍✨

Your future starts hereβ€”apply today! πŸš€

#studyabroad #university #austria #scholarship #cybersecurity

04.12.2025 21:50 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 1    πŸ“Œ 0
Cybersecurity Scholarships - TU Graz Together with TU Graz, ATCOLD will award one scholarship to talented and motivated students in Geotechnical and Hydraulic Engineering from South America, Africa and Asia for the maximum duration of tw...

➜ Apply for the β€˜Cybersecurity Scholarship’
tugraz.at/go/cybersecu...

04.12.2025 21:50 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Overview: Admission Procedure - TU Graz

➜ Apply for the program by ‼️ 15th December 2025 ‼️
www.tugraz.at/go/admission...

04.12.2025 21:50 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

➜ To get started, choose your Master’s degree programs:

πŸ“Œ Computer Science
πŸ“Œ Software Engineering & Management
πŸ“Œ Information & Computer Engineering

04.12.2025 21:50 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0