Stefan Mangard

Univ.-Prof. Dipl.-Ing. Dr.techn.

19952020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2016

Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order

Groß, H., Mangard, S. & Korak, T., 24 Oct 2016, p. 3. 3 p.

Research output: Contribution to conferenceAbstractResearchpeer-review

DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks

Peßl, P., Gruss, D., Maurice, C. L. N., Schwarz, M. & Mangard, S., 2016, Proceedings of the 25th USENIX Security Symposium. p. 565-581 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Enhancing Side-Channel Analysis of Binary-Field Multiplication with Bit Reliability

Peßl, P. & Mangard, S., 2016, Topics in Cryptology - CT-RSA 2016. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android

Spreitzer, R., Griesmayr, S., Korak, T. & Mangard, S., 18 Jul 2016, 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2016), Darmstadt, Germany. Association of Computing Machinery

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption

Unterluggauer, T. & Mangard, S., 2016, Constructive Side-Channel Analysis and Secure Design - COSADE 2016. Springer International Publishing AG , p. 3-18 (LNCS; vol. 9689).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Flush+Flush: A fast and stealthy cache attack

Gruss, D., Maurice, C., Wagner, K. & Mangard, S., 2016, Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, Proceedings. Springer-Verlag Italia, Vol. 9721. p. 279-299 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9721).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Prefetch Side-Channel Attacks: Bypassing SMAP and kernel ASLR

Gruss, D., Maurice, C., Fogh, A., Lipp, M. & Mangard, S., 24 Oct 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association of Computing Machinery, Vol. 24-28-October-2016. p. 368-379 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Protecting the Control Flow of Embedded Processors against Fault Attacks

Werner, M., Wenger, E. & Mangard, S., Mar 2016, Smart Card Research and Advanced Applications: 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers. Homma, N. & Medwed, M. (eds.). Springer, Vol. 9514.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript

Gruss, D., Maurice, C. & Mangard, S., 1 Jul 2016, Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). Springer Vieweg, (DIMVA).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Secure I/O with Intel SGX

Weiser, S., 2016

Research output: ThesisMaster's ThesisResearch

Open Access
File
2015

Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches

Gruss, D., Spreitzer, R. & Mangard, S., 2015, 24th USENIX Security Symposium, Washington, D.C., USA, August 12-14, 2015. USENIX Association, p. 897-912

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Practical memory deduplication attacks in sandboxed javascript

Gruss, D., Bidner, D. & Mangard, S., 1 Jan 2015, Computer Security – ESORICS 2015 - 20th European Symposium on Research in Computer Security, Proceedings. Springer Verlag Wien, Vol. 9326. p. 108-122 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9326).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security

Dobraunig, C. E., Koeune, F., Mangard, S., Mendel, F. & Standaert, F-X., 2015, CARDIS. Springer, p. 225-241 (LNCS; vol. 9514).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2014

Control-Flow Integrity: Compiler Assisted Signature Monitoring

Werner, M., 2014

Research output: ThesisMaster's ThesisResearch

Open Access
File

On the Security of Fresh Re-Keying to Counteract Side-Channel and Fault Attacks

Dobraunig, C. E., Eichlseder, M., Mangard, S. & Mendel, F., 2014, Smart Card Research and Advanced Applications. Springer, Vol. 8968. p. 233-244 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File
2013

Keeping Secrets on Low-Cost Chips

Mangard, S., 2013, In : IEEE security & privacy. 11, 4, p. 75-77

Research output: Contribution to journalArticleResearchpeer-review

On the Relationship between Correlation Power Analysis and the Stochastic Approach: An ASIC Designer Perspective

De Santis, F., Kasper, M., Mangard, S., Sigl, G., Stein, O. & Stöttinger, M., 2013, International Conference on Cryptology in India. ., p. 215-226

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2012

Die physikalische Sicherheit eingebetteter Systeme

Mangard, S., 2012, In : Datenschutz und Datensicherheit. p. 867-871

Research output: Contribution to journalArticleResearch

Exploiting the Difference of Side-Channel Leakages

Hutter, M., Kirschbaum, M., Plos, T., Schmidt, J-M. & Mangard, S., 2012, Constructive Side-Channel Analysis and Secure Design - COSADE 2012, 3rd International Workshop, Darmstadt, Germany, May 3-4, 2012, Proceedings.. Springer, Vol. 7275. p. 1-16 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Localized Electromagnetic Analysis of Cryptographic Implementations

Heyszl, J., Mangard, S., Heinz, B., Stumpf, F. & Sigl, G., 2012, Cryptographers´ Track at the RSA Conference. ., p. 231-244

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2011

Arithmetic Logic Units with High Error Detection Rates to Counteract Fault Attacks

Medwed, M. & Mangard, S., 2011, (Accepted/In press) Design, Automation and Test in Europe. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

One for all - all for one: unifying standard differential power analysis attacks

Mangard, S., Elisabeth, O. & Standaert, F-X., 2011, In : IET information security. p. 100-110

Research output: Contribution to journalArticleResearchpeer-review

2010

On the Duality of Probing and Fault Attacks

Gammel, B. M. & Mangard, S., 2010, In : Journal of electronic testing. 26, 4, p. 483-493

Research output: Contribution to journalArticleResearchpeer-review

The World Is Not Enough: Another Look on Second-Order DPA

Standaert, F-X., Veyrat-Charvillon, N., Oswald, E., Gierlichs, B., Medwed, M., Kasper, M. & Mangard, S., 2010, International Conference on the Theory and Application of Cryptology and Information Security. ., p. 112-129

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2009

Practical Attacks on Masked Hardware

Popp, T., Kirschbaum, M. & Mangard, S., 2009, Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009. Fischlin, M. (ed.). Springer, Vol. 5473. p. 211-225 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2007

Evaluation of the Masked Logic Style MDPL on a Prototype Chip

Popp, T., Kirschbaum, M., Zefferer, T. & Mangard, S., 2007, Cryptographic Hardware and Embedded Systems - CHES 2007. Paillier, P. & Verbauwhede, I. (eds.). Berlin: Springer, Vol. 4727. p. 81-94 (Lecture Notes in Computer Science (LNCS)).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Forschungsbericht Side Channel Analysen

Aigner, M. J., Leitold, H., Mangard, S., Zefferer, T., Oswald, E. & Posch, R., 2007, .

Research output: Book/ReportCommissioned reportResearch

Power Analysis Attacks and Countermeasures

Popp, T., Mangard, S. & Oswald, M. E., 2007, In : IEEE design & test of computers. 24, 6, p. 535-543

Research output: Contribution to journalArticleResearchpeer-review

Power Analysis Attacks - Revealing the Secrets of Smart Cards

Mangard, S., Oswald, M. E. & Popp, T., 2007, 1 ed. New York, NY: Springer.

Research output: Book/ReportBookResearch

Power and EM Attacks on Passive 13.56 MHz RFID Devices

Hutter, M., Mangard, S. & Feldhofer, M., 2007, Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings. Paillier, P. & Verbauwhede, I. (eds.). Berlin / Heidelberg: Springer, Vol. 4727. p. 320-330 (Lecture Notes in Computer Science (LNCS)).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Protecting AES Software Implementations on 32-bit Processors against Power Analysis

Tillich, S., Herbst, C. & Mangard, S., 2007, Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 2007, Proceedings. Berlin: Springer Verlag, Vol. 4521. p. 141-157 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Template Attacks on Masking - Resistance Is Futile

Oswald, E. & Mangard, S., 2007, Cryptographers´ Track at the RSA Conference. ., p. 243-256

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2006

An AES Smart Card Implementation resitant to Power Analysis Attacks

Herbst, C., Oswald, M. E. & Mangard, S., 2006, Applied cryptography and Network security. Berlin Heidelberg: Springer, Vol. 3989. p. 239-252 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Implementation Aspects of the DPA-Resistant Logic Style MDPL

Popp, T. & Mangard, S., 2006, IEEE International Symposium on Circuits and Systems. ., p. 2913-2916

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Pinpointing the Side-Channel Leakage of Masked CMOS Implementations

Mangard, S. & Schramm, K., 2006, Cryptographic Hardware and Embedded Systems - CHES 2006. Berlin Heidelberg: Springer, Vol. 4249. p. 76-90 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers

Oswald, M. E., Mangard, S., Herbst, C. & Tillich, S., 2006, Topics in Cryptology - CT-RSA 2006. Pointcheval, D. (ed.). Springer, Vol. 3860. p. 192-207 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Side Channel Analysis Resistant Design Flow

Aigner, M. J., Popp, T., Mangard, S., Trifiletti, A., Menicocci, R., Olivieri, M. & Scotti, G., 2006, IEEE International Symposium on Circuits and Systems. ., p. 2209-2212

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

2005

A Side-Channel Analysis Resistant Description of the AES S-box

Oswald, M. E., Mangard, S., Pramstaller, N. & Rijmen, V., 2005, Fast Software Encryption. Berlin [u.a.]: Springer, Vol. 3557. p. 413-423 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Efficient AES Implementations on ASICs and FPGAs

Pramstaller, N., Mangard, S., Dominikus, S. & Wolkerstorfer, J., 2005, Proceedings of Fourth Conference on the Advanced Encryption Standard AES4. Springer, Vol. 3373. p. 98-112 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Masked Dual-Rail Pre-Charge Logic: DPA-Resistance without Routing Constraints

Popp, T. & Mangard, S., 2005, Cryptographic Hardware and Embedded Systems - CHES 2005. Berlin: Springer, Vol. 3659. p. 172-186 (Lecture Notes in Computer Science (LNCS)).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

SCARD D2.3 DPA Proof Logic Styles - Technical Report

Popp, T., Mangard, S. & Aigner, M. J., 2005, .

Research output: Book/ReportOther reportResearch

SCARD D2.4 Final Report Logic & Cell Library Development

Aigner, M. J., Popp, T. & Mangard, S., 2005, .

Research output: Book/ReportOther reportResearch

SCARD D6.1 Final Report Modeling & Simulation of SCA Effects

Trifiletti, A., Popp, T., Aigner, M. J., Mangard, S. & Batina, L., 2005, .

Research output: Book/ReportOther reportResearch

SCARD D7.1 Specification SCARD Chip

Roth, M., Tillich, S., Aigner, M. J., Popp, T. & Mangard, S., 2005, .

Research output: Book/ReportOther reportResearch

Side-Channel Leakage of Masked CMOS Gates

Mangard, S., Popp, T. & Gammel, B. M., 2005, Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings. Menezes, A. J. (ed.). Berlin: Springer, Vol. 3376. p. 351-365 (Lecture Notes in Computer Science (LNCS)).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Successfully Attacking Masked AES Hardware Implementations

Mangard, S., Pramstaller, N. & Oswald, M. E., 2005, Cryptographic Hardware and Embedded Systems - CHES 2005. Berlin: Springer, Vol. 3659. p. 157-171 (Lecture Notes in Computer Science (LNCS)).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Verfahren und Schaltung zur Durchführung von Rechenoperationen

Popp, T., Mangard, S. & Aigner, M. J., 26 Jul 2005, (Submitted)

Research output: PatentResearch

2004

A Masked AES ASIC Implementation

Pramstaller, N., Oswald, M. E., Mangard, S., Gürkaynak, F. K. & Häne, S., 2004, Proceedings of Austrochip 2004. Villach: ., p. 77-81

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Hardware Countermeasures Against DPA – A Statistical Analysis of Their Effectiveness

Mangard, S., 2004, Topics in Cryptology - CT-RSA 2004. Springer, Vol. 2964. p. 222-235 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

SCARD D1.2 Requirement Specification Report

Aigner, M. J., Mangard, S. & Popp, T., 2004, .

Research output: Book/ReportOther reportResearch