We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Towards a secure SCRUM process for agile web application development
Maier P., Ma Z., Bloem R.
ARES 2017 - Proceedings of the 12th International Conference on Availability, Reliability and Security
Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory
Gruß D., Lettner J., Schuster F., Ohrimenko O., Haller I., Costa M.
2017 Proceedings of the 26th USENIX Security Symposium
Cryptographic Service Providers in Current Device Landscapes: An Inconvenient Truth
Reimair F., Feichtner J., Ziegler D., Kreuzhuber S., Zefferer T.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications
STORK: a real, heterogeneous, large-scale eID management system
Ribeiro C., Leitold H., Esposito S., Mitzman D.
International Journal of Information Security, 2017
Software-based Microarchitectural Attacks
Gruß D.
Doctoral Thesis, 2017
An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics
Conti F., Schilling R., Schiavone P., Pullini A., Rossi D., Gürkaynak F., Mühlberghuber M., Gautschi M., Loi I., Haugou G., Mangard S., Benini L.
IEEE Transactions on Circuits and Systems
Side-Channel Plaintext-Recovery Attacks on Leakage-Resilient Encryption
Unterluggauer T., Werner M., Mangard S.
Design, Automation & Test in Europe Conference - DATE 2017
Leveraging the adoption of electronic identities and electronic-signature solutions in Europe
Marsalek A., Zefferer T., Reimair F., Karabat Ã., Soykan E.
32nd Annual ACM Symposium on Applied Computing, SAC 2017
ISAP - Towards Side-Channel Secure Authenticated Encryption
Dobraunig C., Eichlseder M., Mangard S., Mendel F., Unterluggauer T.
IACR Transactions on Symmetric Cryptology, Vol. 2017(1), 2017
Reconciling d+1 Masking in Hardware and Software
Groß H., Mangard S.
CHES
Higher-Order Side-Channel Protected Implementations of KECCAK
Groß H., Schaffenrath D., Mangard S.
DSD
Multi-core Data Analytics SoC with a flexible 1.76 Gbit/s AES-XTS Cryptographic Accelerator in 65 nm CMOS
Gürkaynak F., Schilling R., Mühlberghuber M., Conti F., Mangard S., Benini L.
CS2 '17, Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems
Concealing Secrets in Embedded Processors Designs
Groß H., Jelinek M., Mangard S., Unterluggauer T., Werner M.
15th Smart Card Research and Advanced Application Conference - CARDIS 2016
Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives
Unterluggauer T., Werner M., Mangard S.
ACM Asia Conference on Computer and Communications Security - ASIACCS'17
Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption
Primas R., Peßl P., Mangard S.
Cryptographic Hardware and Embedded Systems – CHES 2017
KASLR is Dead
Gruß D., Lipp M., Schwarz M., Fellner R., Maurice C., Mangard S.
Engineering Secure Software and Systems - 9th International Symposium, ESSoS 2017, Proceedings
Practical Keystroke Timing Attacks in Sandboxed JavaScript
Lipp M., Gruß D., Schwarz M., Bidner D., Maurice C., Mangard S.
Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings
Malware guard extension
Schwarz M., Weiser S., Gruß D., Maurice C., Mangard S.
Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, 2017
An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order
Groß H., Mangard S., Korak T.
Topics in Cryptology – CT-RSA 2017
Fantastic timers and where to find them
Schwarz M., Maurice C., Gruß D., Mangard S.
Financial Cryptography and Data Security - 21st International Conference, FC 2017, Revised Selected Papers
