We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje
Dobraunig C., Mangard S., Mendel F., Primas R.
Selected Areas in Cryptography – SAC 2018, Springer, 257-277, (Lecture Notes in Computer Science; vol. 11349)
Small faults grow up - Verification of error masking robustness in arithmetically encoded programs
Karl A., Schilling R., Bloem R., Mangard S.
Verification, Model Checking, and Abstract Interpretation - 20th International Conference, VMCAI 2019, Proceedings, 2019 International Conference on Verification, Model Checking, and Abstract Interpretation , 183-204, (Lecture Notes in Computer Science; vol. 11388)
Protecting RISC-V Processors against Physical Attacks
Werner M., Schilling R., Unterluggauer T., Mangard S.
Design, Automation & Test in Europe Conference - DATE 2019, 2019 Design, Automation & Test in Europe Conference & Exhibition, 1136-1141
Meltdown: Reading Kernel Memory from User Space
Lipp M., Schwarz M., Gruß D., Prescher T., Haas W., Fogh A., Horn J., Mangard S., Kocher P., Genkin D., Yarom Y., Hamburg M.
27th USENIX Security Symposium, 27th USENIX Security Symposium, 973-990
Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features
Schwarz M., Gruß D., Lipp M., Maurice C., Schuster T., Fogh A., Mangard S.
AsiaCCS' 18, Proceedings of the 2018 on Asia Conference on Computer and Communications Security , 13th ACM ASIA Conference on Information, Computer and Communications Security, 587-600
A unified masking approach
Groß H., Mangard S.
Journal of Cryptographic Engineering
Securing Conditional Branches in the Presence of Fault Attacks
Schilling R., Werner M., Mangard S.
Design, Automation & Test in Europe Conference - DATE 2018, Design, Automation & Test in Europe Conference 2018
High Speed ASIC Implementations of Leakage-Resilient Cryptography
Schilling R., Unterluggauer T., Mangard S., Gürkaynak F., Mühlberghuber M., Benini L.
Design, Automation & Test in Europe Conference - DATE 2018, IEEE
KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks
Schwarz M., Lipp M., Gruß D., Weiser S., Maurice C., Spreitzer R., Mangard S.
Network and Distributed System Security Symposium 2018, Network and Distributed System Security Symposium 2018, 15
MEAS: memory encryption and authentication secure against side-channel attacks
Unterluggauer T., Werner M., Mangard S.
Journal of Cryptographic Engineering, 1-22
Formal Verification of Masked Hardware Implementations in the Presence of Glitches
Bloem R., Groß H., Iusupov R., Könighofer B., Mangard S., Winter J.
EUROCRYPT , Springer, 321-353, (Lecture Notes in Computer Science)
SCAnDroid: Automated Side-Channel Analysis of Android APIs
Spreitzer R., Palfinger G., Mangard S.
WISEC '18, Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 224-235
DATA - Differential Address Trace Analysis: Finding Address-based Side-Channels in Binaries
Weiser S., Zankl A., Spreitzer R., Miller K., Mangard S., Sigl G.
Proceedings of the 27th USENIX Security Symposium , 27th USENIX Security Symposium, 603-620
SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography
Dobraunig C., Eichlseder M., Korak T., Mangard S., Mendel F., Primas R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2018(3), 547-572
Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures
Dobraunig C., Eichlseder M., Groß H., Mangard S., Mendel F., Primas R.
Advances in Cryptology – ASIACRYPT 2018, 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, 315-342, (Lecture Notes in Computer Science; vol. 11273)
Pointing in the Right Direction - Securing Memory Accesses in a Faulty World
Schilling R., Werner M., Nasahl P., Mangard S.
Annual Computer Security Applications Conference, 2018 Annual Computer Security Applications Conference
Leakage Bounds for Gaussian Side Channels
Unterluggauer T., Korak T., Mangard S., Schilling R., Benini L., Gürkaynak F., Muehlberghuber M.
16th Smart Card Research and Advanced Application Conference - CARDIS 2017, International Conference on Smart Card Research and Advanced Applications
ProcHarvester: Fully Automated Analysis of Procfs Side-Channel Leaks on Android
Spreitzer R., Kirchengast F., Gruß D., Mangard S.
ASIACCS '18 - Proceedings of the 2018 on Asia Conference on Computer and Communications Security , 749-763
Sponge-Based Control-Flow Protection for IoT Devices
Werner M., Unterluggauer T., Schaffenrath D., Mangard S.
2018 IEEE European Symposium on Security and Privacy, 2018 IEEE European Symposium on Security and Privacy
Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices
Spreitzer R., Moonsamy V., Korak T., Mangard S.
IEEE Communications Surveys & Tutorials, Vol. 20(1), 465-488