Stefan Mangard

Univ.-Prof. Dipl.-Ing. Dr.techn.

19952020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Abstract

Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order

Groß, H., Mangard, S. & Korak, T., 24 Oct 2016, p. 3. 3 p.

Research output: Contribution to conferenceAbstractResearchpeer-review

Article

A Highly Regular and Scalable AES Hardware Architecture

Mangard, S., Aigner, M. & Dominikus, S., 2003, In : IEEE transactions on computers. 52, 4, p. 483-491

Research output: Contribution to journalArticleResearchpeer-review

A unified masking approach

Gross, H. & Mangard, S., 1 Mar 2018, In : Journal of cryptographic engineering.

Research output: Contribution to journalArticleResearchpeer-review

Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features

Schwarz, M., Gruss, D., Lipp, M., Maurice, C., Schuster, T., Fogh, A. & Mangard, S., 3 Nov 2017, In : arXiv.org e-Print archive.

Research output: Contribution to journalArticleResearch

Dependable Internet of Things for Networked Cars

Großwindhager, B., Rupp, A., Tappler, M., Tranninger, M., Weiser, S., Aichernig, B., Boano, C. A., Horn, M., Kubin, G., Mangard, S., Steinberger, M. & Römer, K. U., Dec 2017, In : International Journal of Computing. 16, 4, p. 226-237

Research output: Contribution to journalArticleResearchpeer-review

Die physikalische Sicherheit eingebetteter Systeme

Mangard, S., 2012, In : Datenschutz und Datensicherheit. p. 867-871

Research output: Contribution to journalArticleResearch

ISAP - Towards Side-Channel Secure Authenticated Encryption

Dobraunig, C. E., Eichlseder, M., Mangard, S., Mendel, F. & Unterluggauer, T., 2017, In : IACR Transactions on Symmetric Cryptology. 2017, 1, p. 80-105

Research output: Contribution to journalArticleResearchpeer-review

Open Access

ISAP v2.0

Dobraunig, C., Eichlseder, M., Mangard, S., Mendel, F., Mennink, B., Primas, R. & Unterluggauer, T., Jun 2020, In : IACR Transactions on Symmetric Cryptology. 2020, Special Issue 1, p. 390-416

Research output: Contribution to journalArticleResearchpeer-review

Open Access

Keeping Secrets on Low-Cost Chips

Mangard, S., 2013, In : IEEE security & privacy. 11, 4, p. 75-77

Research output: Contribution to journalArticleResearchpeer-review

Malware Guard Extension: abusing Intel SGX to conceal cache attacks

Schwarz, M., Weiser, S., Gruß, D., Maurice, C. L. N. & Mangard, S., 2020, In : Cybersecurity. 3, 20 p., 2.

Research output: Contribution to journalArticleResearchpeer-review

Open Access

MEAS: memory encryption and authentication secure against side-channel attacks

Unterluggauer, T., Werner, M. & Mangard, S., 25 Jan 2018, In : Journal of cryptographic engineering. p. 1-22

Research output: Contribution to journalArticleResearchpeer-review

Open Access

Meltdown

Lipp, M., Schwarz, M., Gruss, D., Prescher, T., Haas, W., Mangard, S., Kocher, P., Genkin, D., Yarom, Y. & Hamburg, M., 3 Jan 2018, In : arXiv.org e-Print archive.

Research output: Contribution to journalArticleResearch

One for all - all for one: unifying standard differential power analysis attacks

Mangard, S., Elisabeth, O. & Standaert, F-X., 2011, In : IET information security. p. 100-110

Research output: Contribution to journalArticleResearchpeer-review

On the Duality of Probing and Fault Attacks

Gammel, B. M. & Mangard, S., 2010, In : Journal of electronic testing. 26, 4, p. 483-493

Research output: Contribution to journalArticleResearchpeer-review

Power Analysis Attacks and Countermeasures

Popp, T., Mangard, S. & Oswald, M. E., 2007, In : IEEE design & test of computers. 24, 6, p. 535-543

Research output: Contribution to journalArticleResearchpeer-review

Sharing Independence Relabeling: Efficient Formal Verification of Higher-Order Masking

Bloem, R., Groß, H., Iusupov, R., Krenn, M. & Mangard, S., 2018, In : Cryptology ePrint Archive. 2018, p. 1031 1 p.

Research output: Contribution to journalArticleResearchpeer-review

SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography

Dobraunig, C. E., Eichlseder, M., Korak, T., Mangard, S., Mendel, F. & Primas, R., 2018, In : IACR Transactions on Cryptographic Hardware and Embedded Systems. 2018, 3, p. 547-572

Research output: Contribution to journalArticleResearchpeer-review

Open Access

Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices

Spreitzer, R., Moonsamy, V., Korak, T. & Mangard, S., 2018, In : IEEE Communications Surveys & Tutorials. 20, 1, p. 465-488 24 p.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File
Book

Power Analysis Attacks - Revealing the Secrets of Smart Cards

Mangard, S., Oswald, M. E. & Popp, T., 2007, 1 ed. New York, NY: Springer.

Research output: Book/ReportBookResearch

Chapter

Donky: Domain Keys – Efficient In-Process Isolation for RISC-V and x86

Schrammel, D., Weiser, S., Steinegger, S., Schwarzl, M., Schwarz, M., Mangard, S. & Gruß, D., 2020, (Accepted/In press) Proceedings of the 29th USENIX Security Symposium. USENIX Association

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Open Access
Commissioned report

Forschungsbericht Side Channel Analysen

Aigner, M. J., Leitold, H., Mangard, S., Zefferer, T., Oswald, E. & Posch, R., 2007, .

Research output: Book/ReportCommissioned reportResearch

USB-Crypt: D4 Crypto Cores Development - Final report

Aigner, M., Wolkerstorfer, J., Dominikus, S., Mangard, S., Herbst, C. & Pramstaller, N., 2003, .

Research output: Book/ReportCommissioned reportResearch

Conference contribution

A Masked AES ASIC Implementation

Pramstaller, N., Oswald, M. E., Mangard, S., Gürkaynak, F. K. & Häne, S., 2004, Proceedings of Austrochip 2004. Villach: ., p. 77-81

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

An AES Smart Card Implementation resitant to Power Analysis Attacks

Herbst, C., Oswald, M. E. & Mangard, S., 2006, Applied cryptography and Network security. Berlin Heidelberg: Springer, Vol. 3989. p. 239-252 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order

Groß, H., Mangard, S. & Korak, T., 2017, CT-RSA. Springer, Vol. 10159. p. 95-112 18 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

A New Approach to DNS Security (DNSSEC)

Mangard, S. & Giuseppe, A., 2001, Proceedings of the Eighth ACM Conference on Computer and Communications Security (CCS-8). New York, NY, USA: Association of Computing Machinery, p. 86-95

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics

Conti, F., Schilling, R., Schiavone, P. D., Pullini, A., Rossi, D., Gürkaynak, F. K., Mühlberghuber, M., Gautschi, M., Loi, I., Haugou, G., Mangard, S. & Benini, L., 17 May 2017, IEEE Transactions on Circuits and Systems.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Arithmetic Logic Units with High Error Detection Rates to Counteract Fault Attacks

Medwed, M. & Mangard, S., 2011, (Accepted/In press) Design, Automation and Test in Europe. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

ARMageddon: Last-Level Cache Attacks on Mobile Devices

Lipp, M., Gruss, D., Spreitzer, R., Maurice, C. & Mangard, S., 2016, 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, p. 549-564 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

A Side-Channel Analysis Resistant Description of the AES S-box

Oswald, M. E., Mangard, S., Pramstaller, N. & Rijmen, V., 2005, Fast Software Encryption. Berlin [u.a.]: Springer, Vol. 3557. p. 413-423 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion

Mangard, S., 2003, Information Security and Cryptology - ICISC 2002: 5th International Conference, Seoul, Korea, November 28-29, 2002. Revised Papers. Lee, P. J. & Lim, C. H. (eds.). Heidelberg: Springer Verlag, Vol. 2587. p. 343-358 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features

Schwarz, M., Gruss, D., Lipp, M., Maurice, C., Schuster, T., Fogh, A. & Mangard, S., 4 Jun 2018, AsiaCCS' 18, Proceedings of the 2018 on Asia Conference on Computer and Communications Security . New York, NY: Association of Computing Machinery, p. 587-600

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches

Gruss, D., Spreitzer, R. & Mangard, S., 2015, 24th USENIX Security Symposium, Washington, D.C., USA, August 12-14, 2015. USENIX Association, p. 897-912

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Concealing Secrets in Embedded Processors Designs

Groß, H., Jelinek, M., Mangard, S., Unterluggauer, T. & Werner, M., 2017, 15th Smart Card Research and Advanced Application Conference - CARDIS 2016. p. 89-104

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access

DATA - Differential Address Trace Analysis: Finding Address-based Side-Channels in Binaries

Weiser, S., Zankl, A., Spreitzer, R., Miller, K., Mangard, S. & Sigl, G., 2018, Proceedings of the 27th USENIX Security Symposium . USENIX Association, p. 603-620

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order

Groß, H., Mangard, S. & Korak, T., 2016, TIS@CCS. ACM SIGWEB , p. 3 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks

Peßl, P., Gruss, D., Maurice, C. L. N., Schwarz, M. & Mangard, S., 2016, Proceedings of the 25th USENIX Security Symposium. p. 565-581 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Efficient AES Implementations on ASICs and FPGAs

Pramstaller, N., Mangard, S., Dominikus, S. & Wolkerstorfer, J., 2005, Proceedings of Fourth Conference on the Advanced Encryption Standard AES4. Springer, Vol. 3373. p. 98-112 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Enhancing Side-Channel Analysis of Binary-Field Multiplication with Bit Reliability

Peßl, P. & Mangard, S., 2016, Topics in Cryptology - CT-RSA 2016. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Evaluation of the Masked Logic Style MDPL on a Prototype Chip

Popp, T., Kirschbaum, M., Zefferer, T. & Mangard, S., 2007, Cryptographic Hardware and Embedded Systems - CHES 2007. Paillier, P. & Verbauwhede, I. (eds.). Berlin: Springer, Vol. 4727. p. 81-94 (Lecture Notes in Computer Science (LNCS)).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android

Spreitzer, R., Griesmayr, S., Korak, T. & Mangard, S., 18 Jul 2016, 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2016), Darmstadt, Germany. Association of Computing Machinery

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Exploiting Radiated Emissions - EM Attacks on Cryptographic ICs

Mangard, S., 2003, Proceedings of Austrochip 2003. ., p. 13-16

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Exploiting the Difference of Side-Channel Leakages

Hutter, M., Kirschbaum, M., Plos, T., Schmidt, J-M. & Mangard, S., 2012, Constructive Side-Channel Analysis and Secure Design - COSADE 2012, 3rd International Workshop, Darmstadt, Germany, May 3-4, 2012, Proceedings.. Springer, Vol. 7275. p. 1-16 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption

Unterluggauer, T. & Mangard, S., 2016, Constructive Side-Channel Analysis and Secure Design - COSADE 2016. Springer International Publishing AG , p. 3-18 (LNCS; vol. 9689).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Fantastic timers and where to find them: High-resolution microarchitectural attacks in javascript

Schwarz, M., Maurice, C., Gruss, D. & Mangard, S., 1 Jan 2017, Financial Cryptography and Data Security - 21st International Conference, FC 2017, Revised Selected Papers. Springer Verlag Wien, Vol. 10322 LNCS. p. 247-267 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10322 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje

Dobraunig, C. E., Mangard, S., Mendel, F. & Primas, R., 2019, Selected Areas in Cryptography – SAC 2018. Cid, C. & Jacobson, M. J. (eds.). Springer, p. 257-277 21 p. (Lecture Notes in Computer Science; vol. 11349).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Flush+Flush: A fast and stealthy cache attack

Gruss, D., Maurice, C., Wagner, K. & Mangard, S., 2016, Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, Proceedings. Springer-Verlag Italia, Vol. 9721. p. 279-299 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9721).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Formal Verification of Masked Hardware Implementations in the Presence of Glitches

Bloem, R., Groß, H., Iusupov, R., Könighofer, B., Mangard, S. & Winter, J., 2018, EUROCRYPT . Springer, Vol. 10821. p. 321-353 33 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Hardware Countermeasures Against DPA – A Statistical Analysis of Their Effectiveness

Mangard, S., 2004, Topics in Cryptology - CT-RSA 2004. Springer, Vol. 2964. p. 222-235 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Higher-Order Side-Channel Protected Implementations of KECCAK

Groß, H., Schaffenrath, D. & Mangard, S., 2017, DSD. IEEE Computer Society, p. 205-212 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File