Open-Source Code

Below you can find open-source code from our group. If you use the code, please kindly cite the related publication and let us know.

Merge-Exchange Sort Based Discrete Gaussian Sampler with Fixed Memory Access Pattern

Shanquan Tian, Wen Wang, and Jakub Szefer, "Merge-Exchange Sort Based Discrete Gaussian Sampler with Fixed Memory Access Pattern", in Proceedings of the International Conference on Field-Programmable Technology (FPT), December 2019.
[ BibTeX ]  [ CODE ]

Reading Between the Dies: Cross-SLR Covert Channels on Multi-Tenant Cloud FPGAs

Ilias Giechaskiel, Kasper Rasmussen, and Jakub Szefer, "Reading Between the Dies: Cross-SLR Covert Channels on Multi-Tenant Cloud FPGAs", in Proceedings of the International Conference on Computer Design (ICCD), November 2019.
[ BibTeX ]  [ CODE

Thermal Covert Channels Leveraging Package-On-Package DRAM

Shuai Chen, Wenjie Xiong, Yehan Xu, Bing Li, and Jakub Szefer, "Thermal Covert Channels Leveraging Package-On-Package DRAM", in Proceedings of the International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), August 2019.
[ BibTeX ]  [ CODE

Secure TLBs

Shuwen Deng, Wenjie Xiong, and Jakub Szefer, "Secure TLBs", in Proceedings of the International Symposium on Computer Architecture (ISCA), June 2019.
[ PDF ]  [ BibTeX ]  [ CODE

Spying on Temperature using DRAM

Wenjie Xiong, Nikolaos Athanasios Anagnostopoulos, André Schaller, Stefan Katzenbeisser, and Jakub Szefer, "Spying on Temperature using DRAM", in Proceedings of the Design, Automation, and Test in Europe (DATE), March 2019.
[ PDF ]  [ BibTeX ]  [ CODE

XMSS and Embedded Systems - XMSS Hardware Accelerators for RISC-V

Wen Wang, Bernhard Jungk, Julian Wälde, Shuwen Deng, Naina Gupta, Jakub Szefer, and Ruben Niederhagen, "XMSS and Embedded Systems - XMSS Hardware Accelerators for RISC-V", in Cryptology ePrint Archive, Report 2018/1225, 2018.
[ ePrint ]  [ CODE

FPGA-based Niederreiter Cryptosystem using Binary Goppa Codes

Wen Wang, Jakub Szefer, and Ruben Niederhagen, "FPGA-based Niederreiter Cryptosystem using Binary Goppa Codes", in Proceedings of International Conference on Post-Quantum Cryptography (PQCrypto), April 2018.
[ PDF ]  [ BibTeX ]  [ CODE

FPGA-based Key Generator for the Niederreiter Cryptosystem using Binary Goppa Codes

Wen Wang, Jakub Szefer, and Ruben Niederhagen, "FPGA-based Key Generator for the Niederreiter Cryptosystem using Binary Goppa Codes" in Proceedings of the Conference on Cryptographic Hardware and Embedded Systems (CHES), September 2017.
[ PDF ]  [ PDF ]  [ BibTeX ]  [ CODE

Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security

André Schaller, Wenjie Xiong, Muhammad Umair Salee, Nikolaos A. Anagnostopoulos, Stefan Katzenbeisser, and Jakub Szefer, "Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security" in Proceedings of the International Symposium on Hardware Oriented Security and Trust (HOST), May 2017.
[ PDF ]  [ BibTeX ]  [ CODE

Solving Large Systems of Linear Equations over GF(2) on FPGAs

Wen Wang, Jakub Szefer, and Ruben Niederhagen, "Solving Large Systems of Linear Equations over GF(2) on FPGAs" in Proceedings of the International Conference on Reconfigurable Computing and FPGAs (ReConFig), November 2016.
[ PDF ]  [ BibTeX ]  [ CODE

Run-time Accessible DRAM PUFs in Commodity Devices

Wenjie Xiong, André Schaller, Nikolaos A. Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, and Jakub Szefer, "Run-time Accessible DRAM PUFs in Commodity Devices" in Proceedings of the Conference on Cryptographic Hardware and Embedded Systems (CHES), August 2016.
[ PDF ]  [ BibTeX ]  [ CODE

SystemWall: An Isolated Firewall using Hardware-based Memory Introspection

Sebastian Biedermann and Jakub Szefer, "SystemWall: An Isolated Firewall using Hardware-based Memory Introspection" in Proceedings of the International Security Conference (ISC), October 2014.
[ PDF ]  [ BibTeX ]  [ CODE