Open-Source Code

Below you can find open-source code from our group. If you use the code, please kindly cite the related publication and let us know.


Securing Reset Operations in NISQ Quantum Computers

Allen Mi, Shuwen Deng, and Jakub Szefer, "Securing Reset Operations in NISQ Quantum Computers", in Proceedings of the Conference on Computer and Communications Security (CCS), November 2022.
[ BibTeX ] [ CODE ]

Complete and Improved FPGA Implementation of Classic McEliece

Po-Jen Chen, Tung Chou, Sanjay Deshpande, Norman Lahr, Ruben Niederhagen, Jakub Szefer, and Wen Wang, "Complete and Improved FPGA Implementation of Classic McEliece", in , 2022.
[ BibTeX ] [ CODE ] (Coming soon...)

Short Paper: Device- and Locality-Specific Fingerprinting of Shared NISQ Quantum Computers

Allen Mi, Shuwen Deng, and Jakub Szefer, "Short Paper: Device- and Locality-Specific Fingerprinting of Shared NISQ Quantum Computers", in Proceedings of the Workshop on Hardware and Architectural Support for Security and Privacy (HASP), October 2021.
[ BibTeX ] [ CODE ]

Leaky Frontends: Security Vulnerabilities in Processor Frontends

Shuwen Deng, Bowen Huang, and Jakub Szefer, "Leaky Frontends: Security Vulnerabilities in Processor Frontends", in Proceedings of the International Symposium on High-Performance Computer Architecture (HPCA), April 2022.
[ BibTeX ] [ CODE ]

Modular Inverse for Integers using Fast Constant Time GCD Algorithm and its Applications

Sanjay Deshpande, Santos Pozo, Victor Mateu, Marc Manzano, Najwa Aaraj, and Jakub Szefer, "Modular Inverse for Integers using Fast Constant Time GCD Algorithm and its Applications", in Proceedings of the International Conference on Field Programmable Logic and Applications (FPL), August 2021.
[ BibTeX ] [ CODE ]

The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3

Patrick Longa, Wen Wang, and Jakub Szefer, "The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3", in Proceedings of the International Cryptology Conference (Crypto), August 2021.
[ BibTeX ] [ CODE ]

Cloud FPGA Security with RO-Based Primitives

Shanquan Tian, Andrew Krzywosz, Ilias Giechaskiel, and Jakub Szefer, "Cloud FPGA Security with RO-Based Primitives", in Proceedings of the International Conference on Field-Programmable Technology (FPT), December 2020.
[ BibTeX ] [ CODE]

Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA

Wen Wang, Shanquan Tian, Bernhard Jungk, Nina Bindel, Patrick Longa, and Jakub Szefer, "Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA", in Proceedings of the Conference on Cryptographic Hardware and Embedded Systems (CHES), September 2020.
[ BibTeX ] [ CODE ]

A Benchmark Suite for Evaluating Caches' Vulnerability to Timing Attacks

Shuwen Deng, Wenjie Xiong, and Jakub Szefer, "A Benchmark Suite for Evaluating Caches' Vulnerability to Timing Attacks", in Proceedings of the International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), March 2020.
[ BibTeX ]  [ CODE ]

Fingerprinting Cloud FPGA Infrastructures

Shanquan Tian, Wenjie Xiong, Ilias Giechaskiel, Kasper Rasmussen, and Jakub Szefer, "Fingerprinting Cloud FPGA Infrastructures", in Proceedings of the International Symposium on Field-Programmable Gate Arrays (FPGA), February 2020.
[ BibTeX ]  [ CODE ]

Leaking Information Through Cache LRU States

Wenjie Xiong, and Jakub Szefer, "Leaking Information Through Cache LRU States", in Proceedings of the International Symposium on High-Performance Computer Architecture (HPCA), February 2020.
[ BibTeX ] [ CODE ]

Merge-Exchange Sort Based Discrete Gaussian Sampler with Fixed Memory Access Pattern

Shanquan Tian, Wen Wang, and Jakub Szefer, "Merge-Exchange Sort Based Discrete Gaussian Sampler with Fixed Memory Access Pattern", in Proceedings of the International Conference on Field-Programmable Technology (FPT), December 2019.
[ BibTeX ]  [ CODE ]

Software Protection using Dynamic PUFs

Wenjie Xiong, André Schaller, Stefan Katzenbeisser, and Jakub Szefer, "Software Protection using Dynamic PUFs", in IEEE Transactions On Information Forensics And Security (TIFS), November 2019.
[ BibTeX ]  [ CODE ]

Reading Between the Dies: Cross-SLR Covert Channels on Multi-Tenant Cloud FPGAs

Ilias Giechaskiel, Kasper Rasmussen, and Jakub Szefer, "Reading Between the Dies: Cross-SLR Covert Channels on Multi-Tenant Cloud FPGAs", in Proceedings of the International Conference on Computer Design (ICCD), November 2019.
[ BibTeX ]  [ CODE

XMSS and Embedded Systems - XMSS Hardware Accelerators for RISC-V

Wen Wang, Bernhard Jungk, Julian Wälde, Shuwen Deng, Naina Gupta, Jakub Szefer, and Ruben Niederhagen, "XMSS and Embedded Systems - XMSS Hardware Accelerators for RISC-V", in Proceedings of the Selected Areas in Cryptography (SAC), August 2019.
[ BibTeX ]  [ CODE

Thermal Covert Channels Leveraging Package-On-Package DRAM

Shuai Chen, Wenjie Xiong, Yehan Xu, Bing Li, and Jakub Szefer, "Thermal Covert Channels Leveraging Package-On-Package DRAM", in Proceedings of the International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), August 2019.
[ BibTeX ]  [ CODE

Secure TLBs

Shuwen Deng, Wenjie Xiong, and Jakub Szefer, "Secure TLBs", in Proceedings of the International Symposium on Computer Architecture (ISCA), June 2019.
[ BibTeX ]  [ CODE

Spying on Temperature using DRAM

Wenjie Xiong, Nikolaos Athanasios Anagnostopoulos, André Schaller, Stefan Katzenbeisser, and Jakub Szefer, "Spying on Temperature using DRAM", in Proceedings of the Design, Automation, and Test in Europe (DATE), March 2019.
[ BibTeX ]  [ CODE

Temporal Thermal Covert Channels in Cloud FPGAs

Shanquan Tian, and Jakub Szefer, "Temporal Thermal Covert Channels in Cloud FPGAs", in Proceedings of the International Symposium on Field-Programmable Gate Arrays (FPGA), February 2019.
[ BibTeX ]  [ CODE

FPGA-based Niederreiter Cryptosystem using Binary Goppa Codes

Wen Wang, Jakub Szefer, and Ruben Niederhagen, "FPGA-based Niederreiter Cryptosystem using Binary Goppa Codes", in Proceedings of International Conference on Post-Quantum Cryptography (PQCrypto), April 2018.
[ BibTeX ]  [ CODE

FPGA-based Key Generator for the Niederreiter Cryptosystem using Binary Goppa Codes

Wen Wang, Jakub Szefer, and Ruben Niederhagen, "FPGA-based Key Generator for the Niederreiter Cryptosystem using Binary Goppa Codes" in Proceedings of the Conference on Cryptographic Hardware and Embedded Systems (CHES), September 2017.
[ BibTeX ]  [ CODE

Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security

André Schaller, Wenjie Xiong, Muhammad Umair Salee, Nikolaos A. Anagnostopoulos, Stefan Katzenbeisser, and Jakub Szefer, "Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security" in Proceedings of the International Symposium on Hardware Oriented Security and Trust (HOST), May 2017.
[ BibTeX ]  [ CODE

Solving Large Systems of Linear Equations over GF(2) on FPGAs

Wen Wang, Jakub Szefer, and Ruben Niederhagen, "Solving Large Systems of Linear Equations over GF(2) on FPGAs" in Proceedings of the International Conference on Reconfigurable Computing and FPGAs (ReConFig), November 2016.
[ BibTeX ]  [ CODE

Run-time Accessible DRAM PUFs in Commodity Devices

Wenjie Xiong, André Schaller, Nikolaos A. Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, and Jakub Szefer, "Run-time Accessible DRAM PUFs in Commodity Devices" in Proceedings of the Conference on Cryptographic Hardware and Embedded Systems (CHES), August 2016.
[ BibTeX ]  [ CODE

SystemWall: An Isolated Firewall using Hardware-based Memory Introspection

Sebastian Biedermann and Jakub Szefer, "SystemWall: An Isolated Firewall using Hardware-based Memory Introspection" in Proceedings of the International Security Conference (ISC), October 2014.
[ BibTeX ]  [ CODE