Find Research Outputs

Search concepts
Selected filters

Publication Year

  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011

Author

  • Stefan Mangard
Abstract

Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order

Groß, H., Mangard, S. & Korak, T., 24 Oct 2016, p. 3. 3 p.

Research output: Contribution to conferenceAbstractResearchpeer-review

Article

A unified masking approach

Gross, H. & Mangard, S., 1 Mar 2018, In : Journal of cryptographic engineering.

Research output: Contribution to journalArticleResearchpeer-review

Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features

Schwarz, M., Gruss, D., Lipp, M., Maurice, C., Schuster, T., Fogh, A. & Mangard, S., 3 Nov 2017, In : arXiv.org e-Print archive.

Research output: Contribution to journalArticleResearch

Dependable Internet of Things for Networked Cars

Großwindhager, B., Rupp, A., Tappler, M., Tranninger, M., Weiser, S., Aichernig, B., Boano, C. A., Horn, M., Kubin, G., Mangard, S., Steinberger, M. & Römer, K. U., Dec 2017, In : International Journal of Computing. 16, 4, p. 226-237

Research output: Contribution to journalArticleResearchpeer-review

Die physikalische Sicherheit eingebetteter Systeme

Mangard, S., 2012, In : Datenschutz und Datensicherheit. p. 867-871

Research output: Contribution to journalArticleResearch

ISAP - Towards Side-Channel Secure Authenticated Encryption

Dobraunig, C. E., Eichlseder, M., Mangard, S., Mendel, F. & Unterluggauer, T., 2017, In : IACR Transactions on Symmetric Cryptology. 2017, 1, p. 80-105

Research output: Contribution to journalArticleResearchpeer-review

Open Access

ISAP v2.0

Dobraunig, C., Eichlseder, M., Mangard, S., Mendel, F., Mennink, B., Primas, R. & Unterluggauer, T., 2020, (Accepted/In press) In : IACR Transactions on Symmetric Cryptology. 2020, Special Issue

Research output: Contribution to journalArticleResearchpeer-review

Keeping Secrets on Low-Cost Chips

Mangard, S., 2013, In : IEEE security & privacy. 11, 4, p. 75-77

Research output: Contribution to journalArticleResearchpeer-review

MEAS: memory encryption and authentication secure against side-channel attacks

Unterluggauer, T., Werner, M. & Mangard, S., 25 Jan 2018, In : Journal of cryptographic engineering. p. 1-22

Research output: Contribution to journalArticleResearchpeer-review

Open Access

Meltdown

Lipp, M., Schwarz, M., Gruss, D., Prescher, T., Haas, W., Mangard, S., Kocher, P., Genkin, D., Yarom, Y. & Hamburg, M., 3 Jan 2018, In : arXiv.org e-Print archive.

Research output: Contribution to journalArticleResearch

One for all - all for one: unifying standard differential power analysis attacks

Mangard, S., Elisabeth, O. & Standaert, F-X., 2011, In : IET information security. p. 100-110

Research output: Contribution to journalArticleResearchpeer-review

Sharing Independence Relabeling: Efficient Formal Verification of Higher-Order Masking

Bloem, R., Groß, H., Iusupov, R., Krenn, M. & Mangard, S., 2018, In : Cryptology ePrint Archive. 2018, p. 1031 1 p.

Research output: Contribution to journalArticleResearchpeer-review

SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography

Dobraunig, C. E., Eichlseder, M., Korak, T., Mangard, S., Mendel, F. & Primas, R., 2018, In : IACR Transactions on Cryptographic Hardware and Embedded Systems. 2018, 3, p. 547-572

Research output: Contribution to journalArticleResearchpeer-review

Open Access

Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices

Spreitzer, R., Moonsamy, V., Korak, T. & Mangard, S., 2018, In : IEEE Communications Surveys & Tutorials. 20, 1, p. 465-488 24 p.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File
Conference contribution

An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order

Groß, H., Mangard, S. & Korak, T., 2017, CT-RSA. Springer, Vol. 10159. p. 95-112 18 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics

Conti, F., Schilling, R., Schiavone, P. D., Pullini, A., Rossi, D., Gürkaynak, F. K., Mühlberghuber, M., Gautschi, M., Loi, I., Haugou, G., Mangard, S. & Benini, L., 17 May 2017, IEEE Transactions on Circuits and Systems.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Arithmetic Logic Units with High Error Detection Rates to Counteract Fault Attacks

Medwed, M. & Mangard, S., 2011, (Accepted/In press) Design, Automation and Test in Europe. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

ARMageddon: Last-Level Cache Attacks on Mobile Devices

Lipp, M., Gruss, D., Spreitzer, R., Maurice, C. & Mangard, S., 2016, 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, p. 549-564 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features

Schwarz, M., Gruss, D., Lipp, M., Maurice, C., Schuster, T., Fogh, A. & Mangard, S., 4 Jun 2018, AsiaCCS' 18, Proceedings of the 2018 on Asia Conference on Computer and Communications Security . New York, NY: Association of Computing Machinery, p. 587-600

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches

Gruss, D., Spreitzer, R. & Mangard, S., 2015, 24th USENIX Security Symposium, Washington, D.C., USA, August 12-14, 2015. USENIX Association, p. 897-912

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Concealing Secrets in Embedded Processors Designs

Groß, H., Jelinek, M., Mangard, S., Unterluggauer, T. & Werner, M., 2017, 15th Smart Card Research and Advanced Application Conference - CARDIS 2016. p. 89-104

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access

DATA - Differential Address Trace Analysis: Finding Address-based Side-Channels in Binaries

Weiser, S., Zankl, A., Spreitzer, R., Miller, K., Mangard, S. & Sigl, G., 2018, Proceedings of the 27th USENIX Security Symposium . USENIX Association, p. 603-620

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order

Groß, H., Mangard, S. & Korak, T., 2016, TIS@CCS. ACM SIGWEB , p. 3 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks

Peßl, P., Gruss, D., Maurice, C. L. N., Schwarz, M. & Mangard, S., 2016, Proceedings of the 25th USENIX Security Symposium. p. 565-581 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Enhancing Side-Channel Analysis of Binary-Field Multiplication with Bit Reliability

Peßl, P. & Mangard, S., 2016, Topics in Cryptology - CT-RSA 2016. .

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android

Spreitzer, R., Griesmayr, S., Korak, T. & Mangard, S., 18 Jul 2016, 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2016), Darmstadt, Germany. Association of Computing Machinery

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Exploiting the Difference of Side-Channel Leakages

Hutter, M., Kirschbaum, M., Plos, T., Schmidt, J-M. & Mangard, S., 2012, Constructive Side-Channel Analysis and Secure Design - COSADE 2012, 3rd International Workshop, Darmstadt, Germany, May 3-4, 2012, Proceedings.. Springer, Vol. 7275. p. 1-16 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption

Unterluggauer, T. & Mangard, S., 2016, Constructive Side-Channel Analysis and Secure Design - COSADE 2016. Springer International Publishing AG , p. 3-18 (LNCS; vol. 9689).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Fantastic timers and where to find them: High-resolution microarchitectural attacks in javascript

Schwarz, M., Maurice, C., Gruss, D. & Mangard, S., 1 Jan 2017, Financial Cryptography and Data Security - 21st International Conference, FC 2017, Revised Selected Papers. Springer Verlag Wien, Vol. 10322 LNCS. p. 247-267 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10322 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje

Dobraunig, C. E., Mangard, S., Mendel, F. & Primas, R., 2019, Selected Areas in Cryptography – SAC 2018. Cid, C. & Jacobson, M. J. (eds.). Springer, p. 257-277 21 p. (Lecture Notes in Computer Science; vol. 11349).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Flush+Flush: A fast and stealthy cache attack

Gruss, D., Maurice, C., Wagner, K. & Mangard, S., 2016, Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, Proceedings. Springer-Verlag Italia, Vol. 9721. p. 279-299 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9721).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Formal Verification of Masked Hardware Implementations in the Presence of Glitches

Bloem, R., Groß, H., Iusupov, R., Könighofer, B., Mangard, S. & Winter, J., 2018, EUROCRYPT . Springer, Vol. 10821. p. 321-353 33 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Higher-Order Side-Channel Protected Implementations of KECCAK

Groß, H., Schaffenrath, D. & Mangard, S., 2017, DSD. IEEE Computer Society, p. 205-212 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

High Speed ASIC Implementations of Leakage-Resilient Cryptography

Schilling, R., Unterluggauer, T., Mangard, S., Gürkaynak, F. K., Mühlberghuber, M. & Benini, L., Mar 2018, Design, Automation & Test in Europe Conference - DATE 2018. Institute of Electrical and Electronics Engineers

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

KASLR is Dead: Long Live KASLR

Gruss, D., Lipp, M., Schwarz, M., Fellner, R., Maurice, C. & Mangard, S., 2017, Engineering Secure Software and Systems - 9th International Symposium, ESSoS 2017, Proceedings. Springer-Verlag Italia, Vol. 10379 LNCS. p. 161-176 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10379 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks

Schwarz, M., Lipp, M., Gruss, D., Weiser, S., Maurice, C. L. N., Spreitzer, R. & Mangard, S., 18 Feb 2018, Network and Distributed System Security Symposium 2018. p. 15

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Leakage Bounds for Gaussian Side Channels

Unterluggauer, T., Korak, T., Mangard, S., Schilling, R., Benini, L., Gürkaynak, F. K. & Muehlberghuber, M., 2018, 16th Smart Card Research and Advanced Application Conference - CARDIS 2017. Springer

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access

Localized Electromagnetic Analysis of Cryptographic Implementations

Heyszl, J., Mangard, S., Heinz, B., Stumpf, F. & Sigl, G., 2012, Cryptographers´ Track at the RSA Conference. ., p. 231-244

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Malware guard extension: Using SGX to conceal cache attacks

Schwarz, M., Weiser, S., Gruss, D., Maurice, C. & Mangard, S., 2017, Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, 2017. Springer-Verlag Italia, Vol. 10327 LNCS. p. 3-24 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10327 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Meltdown: Reading Kernel Memory from User Space

Lipp, M., Schwarz, M., Gruss, D., Prescher, T., Haas, W., Fogh, A., Horn, J., Mangard, S., Kocher, P., Genkin, D., Yarom, Y. & Hamburg, M., 15 Aug 2018, 27th USENIX Security Symposium. p. 973-990 19 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Multi-core Data Analytics SoC with a flexible 1.76 Gbit/s AES-XTS Cryptographic Accelerator in 65 nm CMOS

Gürkaynak, F. K., Schilling, R., Mühlberghuber, M., Conti, F., Mangard, S. & Benini, L., 2017, CS2 '17, Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems . p. 19-24

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

On the Relationship between Correlation Power Analysis and the Stochastic Approach: An ASIC Designer Perspective

De Santis, F., Kasper, M., Mangard, S., Sigl, G., Stein, O. & Stöttinger, M., 2013, International Conference on Cryptology in India. ., p. 215-226

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

On the Security of Fresh Re-Keying to Counteract Side-Channel and Fault Attacks

Dobraunig, C. E., Eichlseder, M., Mangard, S. & Mendel, F., 2014, Smart Card Research and Advanced Applications. Springer, Vol. 8968. p. 233-244 (LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Pointing in the Right Direction - Securing Memory Accesses in a Faulty World

Schilling, R., Werner, M., Nasahl, P. & Mangard, S., 2018, Annual Computer Security Applications Conference. 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Practical Keystroke Timing Attacks in Sandboxed JavaScript

Lipp, M., Gruss, D., Schwarz, M., Bidner, D., Maurice, C. & Mangard, S., 2017, Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings. Springer-Verlag Italia, Vol. 10493 LNCS. p. 191-209 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10493 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Practical memory deduplication attacks in sandboxed javascript

Gruss, D., Bidner, D. & Mangard, S., 1 Jan 2015, Computer Security – ESORICS 2015 - 20th European Symposium on Research in Computer Security, Proceedings. Springer Verlag Wien, Vol. 9326. p. 108-122 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9326).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Prefetch Side-Channel Attacks: Bypassing SMAP and kernel ASLR

Gruss, D., Maurice, C., Fogh, A., Lipp, M. & Mangard, S., 24 Oct 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association of Computing Machinery, Vol. 24-28-October-2016. p. 368-379 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

ProcHarvester: Fully Automated Analysis of Procfs Side-Channel Leaks on Android

Spreitzer, R., Kirchengast, F., Gruss, D. & Mangard, S., 2018, ASIACCS '18 - Proceedings of the 2018 on Asia Conference on Computer and Communications Security . p. 749-763

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File

Protecting RISC-V Processors against Physical Attacks

Werner, M., Schilling, R., Unterluggauer, T. & Mangard, S., 2019, Design, Automation & Test in Europe Conference - DATE 2019. p. 1136-1141 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

File

Protecting the Control Flow of Embedded Processors against Fault Attacks

Werner, M., Wenger, E. & Mangard, S., Mar 2016, Smart Card Research and Advanced Applications: 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers. Homma, N. & Medwed, M. (eds.). Springer, Vol. 9514.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Open Access
File