We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Power Contracts: Provably Complete Power Leakage Models for Processors
Bloem R., Gigerl B., Gourjon M., Hadzic V., Mangard S., Primas R.
CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
SFP: Providing System Call Flow Protection against Software and Fault Attacks
Schilling R., Nasahl P., Unterguggenberger M., Mangard S.
HASP 2022 - Hardware and Architectural Support for Security and Privacy
SYNFI: Pre-Silicon Fault Analysis of an Open-Source Secure Element
Nasahl P., Osorio M., Vogel P., Schaffner M., Trippel T., Rizzo D., Mangard S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022(4), 2022
Riding the Waves Towards Generic Single-Cycle Masking in Hardware
Nagpal R., Gigerl B., Primas R., Mangard S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022(4), 2022
FIPAC: Thwarting Fault- and Software-Induced Control-Flow Attacks with ARM Pointer Authentication
Schilling R., Nasahl P., Mangard S.
COSADE: Constructive Side-Channel Analysis and Secure Design
Jenny: Securing Syscalls for PKU-based Memory Isolation Systems
Schrammel D., Weiser S., Sadek R., Mangard S.
Proceedings of the 31st USENIX Security Symposium
SERVAS! Secure Enclaves via RISC-V Authenticryption Shield
Steinegger S., Schrammel D., Weiser S., Nasahl P., Mangard S.
Computer Security – ESORICS 2021
HECTOR-V: A Heterogeneous CPU Architecture for a Secure RISC-V Execution Environment
Nasahl P., Schilling R., Werner M., Mangard S.
ASIA CCS '21: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security
CrypTag: Thwarting Physical and Logical Memory Vulnerabilities using Cryptographically Colored Memory
Nasahl P., Schilling R., Werner M., Hoogerbrugge J., Medwed M., Mangard S.
ASIA CCS '21: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security
Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs
Gigerl B., Hadzic V., Primas R., Mangard S., Bloem R.
Proceedings of the 30th USENIX Security Symposium
Protecting Indirect Branches against Fault Attacks using ARM Pointer Authentication
Nasahl P., Schilling R., Mangard S.
Proceedings of the 2021 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2021
SecWalk: Protecting Page Table Walks Against Fault Attacks
Schilling R., Nasahl P., Weiglhofer S., Mangard S.
Proceedings of the 2021 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2021
Secure and Efficient Software Masking on Superscalar Pipelined Processors
Gigerl B., Primas R., Mangard S.
Advances in Cryptology - ASIACRYPT 2021
Malware Guard Extension: abusing Intel SGX to conceal cache attacks
Schwarz M., Weiser S., Gruß D., Maurice C., Mangard S.
Cybersecurity, Vol. 3(1), 2020
Donky: Domain Keys – Efficient In-Process Isolation for RISC-V and x86
Schrammel D., Weiser S., Steinegger S., Schwarzl M., Schwarz M., Mangard S., Gruß D.
Proceedings of the 29th USENIX Security Symposium
Spectre attacks
Kocher P., Horn J., Fogh A., Genkin D., Gruß D., Haas W., Hamburg M., Lipp M., Mangard S., Prescher T., Schwarz M., Yarom Y.
Communications of the ACM, Vol. 63(7), 2020
ISAP v2.0
Dobraunig C., Eichlseder M., Mangard S., Mendel F., Mennink B., Primas R., Unterluggauer T.
IACR Transactions on Symmetric Cryptology, Vol. 2020(Special Issue 1), 2020
Meltdown
Lipp M., Schwarz M., Gruß D., Prescher T., Haas W., Horn J., Mangard S., Kocher P., Genkin D., Yarom Y., Hamburg M., Strackx R.
Communications of the ACM, Vol. 63(6), 2020
ScatterCache: Thwarting Cache Attacks via Cache Set Randomization
Werner M., Unterluggauer T., Giner L., Schwarz M., Gruß D., Mangard S.
28th USENIX Security Symposium (USENIX Security 19)
Spectre Attacks: Exploiting Speculative Execution
Kocher P., Horn J., Fogh A., Genkin D., Gruß D., Haas W., Hamburg M., Lipp M., Mangard S., Prescher T., Schwarz M., Yarom Y.
40th IEEE Symposium on Security and Privacy
