We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
When Good Kernel Defenses Go Bad: Reliable and Stable Kernel Exploits via Defense-Amplified TLB Side-Channel Leaks
Maar L., Giner L., Gruß D., Mangard S.
Proceedings of the 34rd USENIX Security Symposium, 34th USENIX Security Symposium, (Proceedings of the 34rd USENIX Security Symposium)
KernelSnitch: Side-Channel Attacks on Kernel Data Structures
Maar L., Juffinger J., Steinbauer T., Gruß D., Mangard S.
Network and Distributed System Security Symposium (NDSS) 2025, Network and Distributed System Security Symposium 2025
FAULTLESS: Flexible and Transparent Fault Protection for Superscalar RISC-V Processors
Waser M., Schrammel D., Schilling R., Mangard S.
22nd International Conference on Detection of Intrusions and Malware, and Vulnerability Assess, DIMVA 2025, 22nd International Conference on Detection of Intrusions and Malware, and Vulnerability Assess, DIMVA 2025
TME-Box: Scalable In-Process Isolation through Intel TME-MK Memory Encryption
Unterguggenberger M., Lamster L., Schrammel D., Schwarzl M., Mangard S.
Network and Distributed System Security (NDSS) Symposium 2025, Network and Distributed System Security Symposium 2025
Power-Related Side-Channel Attacks using the Android Sensor Framework
Oberhuber M., Unterguggenberger M., Maar L., Kogler A., Mangard S.
Network and Distributed System Security Symposium (NDSS) 2025, Network and Distributed System Security Symposium 2025
On Loopy Belief Propagation for SASCAs: An Analysis and Empirical Study of the Inference Problem
Nagpal R., Cassiers G., Knoll C., Pernkopf F., Primas R., Mangard S.
IACR Communications in Crypology, Vol. 1(4)
ChoiceJacking: Compromising Mobile Devices through Malicious Chargers like a Decade ago
Draschbacher F., Maar L., Oberhuber M., Mangard S.
Usenix Security Symposium 2025, 34th USENIX Security Symposium
Cryptographic Least Privilege Enforcement for Scalable Memory Isolation
Unterguggenberger M., Schrammel D., Maar L., Lamster L., Hadzic V., Mangard S.
IEEE International Symposium on Hardware Oriented Security and Trust (HOST), IEEE International Symposium on Hardware Oriented Security and Trust 2025: HOST 2025
Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults
Tollec S., Hadzic V., Nasahl P., Asavoae M., Bloem R., Couroussé D., Heydemann K., Jan M., Mangard S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(4), 179-204
Exact Soft Analytical Side-Channel Attacks using Tractable Circuits
Wedenig T., Nagpal R., Cassiers G., Mangard S., Peharz R.
Proceedings of Machine Learning Research, Vol. 235, 52472-52483
Defects-in-Depth: Analyzing the Integration of Effective Defenses against One-Day Exploits in Android Kernels
Maar L., Draschbacher F., Lamster L., Mangard S.
Usenix Security Symposium 2024, 33rd USENIX Security Symposium: USENIX Security 2024
SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel
Maar L., Gast S., Unterguggenberger M., Oberhuber M., Mangard S.
Proceedings of the 33rd USENIX Security Symposium, 33rd USENIX Security Symposium: USENIX Security 2024, 4051-4068, (Proceedings of the 33rd USENIX Security Symposium)
COMPRESS: Generate Small and Fast Masked Pipelined Circuits
Cassiers G., Gigerl B., Mangard S., Momin C., Nagpal R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(3), 500-529
Beyond the Edges of Kernel Control-Flow Hijacking Protection with HEK-CFI
Maar L., Nasahl P., Mangard S.
ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 19th ACM ASIA Conference on Computer and Communications Security, 1214-1230, (ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security)
Security Aspects of Masking on FPGAs
Gigerl B., Pretterhofer K., Mangard S.
Proceedings of the 2024 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2024, 2024 IEEE International Symposium on Hardware Oriented Security and Trust, 199-210
Memory Tagging using Cryptographic Integrity on Commodity x86 CPUs
Schrammel D., Unterguggenberger M., Lamster L., Sultana S., Grewal K., LeMay M., Durham D., Mangard S.
Proceedings - 9th IEEE European Symposium on Security and Privacy, Euro S and P 2024, 9th IEEE European Symposium on Security and Privacy, 311-326
Voodoo: Memory Tagging, Authenticated Encryption, and Error Correction through MAGIC
Lamster L., Unterguggenberger M., Schrammel D., Mangard S.
Proceedings of the 33rd USENIX Conference on Security Symposium, 33rd USENIX Security Symposium: USENIX Security 2024, 7159 - 7176
Quantile: Quantifying Information Leakage
Hadzic V., Cassiers G., Primas R., Mangard S., Bloem R.
DOPE: DOmain Protection Enforcement with PKS
Maar L., Schwarzl M., Rauscher F., Gruß D., Mangard S.
Proceedings - 39th Annual Computer Security Applications Conference, ACSAC 2023, 2023 Annual Computer Security Applications Conference, 662-676, (ACM International Conference Proceeding Series)
Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency
Gigerl B., Klug F., Mangard S., Mendel F., Primas R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024(1), 309-335