02
COMSEC group receives Best Paper Award at the 1st Microarchitectural Security Conference

Stefan Gloor, former Master's student, Patrick Jattke, doctoral student, and Prof. Kaveh Razavi, head of the COMSEC (Computer Security) group, have received the Best Paper Award at the 1st Microarchitectural Security Conference last week.
Emmet Murphy won 1st place in the Machine Learning Contest for Chip Design with High-Level Synthesis

Emmet Murphy, doctoral student in the DYNAMO group headed by Prof. Lana Josipović, won the first place in the Machine Learning Contest for Chip Design with High-Level Synthesis (Prediction task), organized by AMD and UCLA.
Optica Names Prof. Juerg Leuthold the 2025 Joseph Fraunhofer Award/Robert M. Burley Prize Recipient

Optica (formerly OSA), the society dedicated to promoting the generation, application, archiving and dissemination of knowledge in the science of light, awards Prof. Juerg Leuthold the 2025 Joseph Fraunhofer Award/Robert M. Burley Prize. Prof. Leuthold, head of the Institute of Electromagnetic Fields (IEF), is honored for pioneering plasmonics based devices and in particular developing broadband modulators and detectors with highest bandwidths.
Fascination Medical Imaging: We make the invisible visible

Klaas Prüssmann is professor of Bioimaging and the head of the Institute for Biomedical Engineering (IBT). In this interview, he speaks about his mission to generate images from inside the human body and how he came to ETH Zurich rather accidentally.
Ambizione Grant for Dr. Antonio Di Maio

Dr. Antonio Di Maio has received an Ambizione grant from SNF for his research project "Efficient Distributed Intelligent Applications in Mobile-Network Dynamics (eDIAMOND)". He will start at the Computer Engineering and Networks Laboratory (TIK) on 1 September 2025.
ProTRR has been awarded "Top Picks in Hardware and Embedded Security"

ProTRR, the first principled in-DRAM mitigation against Rowhammer attacks, has been described in a paper published by Prof. Kaveh Razavi's COMSEC group. It has heavily influenced the design of follow-up work on secure mitigations in both academia and industry.