We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Meltdown: Reading Kernel Memory from User Space
Lipp M., Schwarz M., Gruß D., Prescher T., Haas W., Fogh A., Horn J., Mangard S., Kocher P., Genkin D., Yarom Y., Hamburg M.
27th USENIX Security Symposium
Erfahrungen aus eIDAS Zertifizierung
Leitold H., Konrad D.
Datenschutz und Datensicherheit, Vol. 42(7), 2018
TIGHTest - Towards automating global Academic Mobility
More S.
Master's Thesis, 2018
Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features
Schwarz M., Gruß D., Lipp M., Maurice C., Schuster T., Fogh A., Mangard S.
AsiaCCS' 18, Proceedings of the 2018 on Asia Conference on Computer and Communications Security
Use-after-FreeMail
Gruß D., Schwarz M., Wübbeling M., Guggi S., Malderle T., More S., Lipp M.
ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security
Best of two worlds: Secure cloud federations meet eIDAS
Zefferer T., Ziegler D., Reiter A.
2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)
A unified masking approach
Groß H., Mangard S.
Journal of Cryptographic Engineering, 2018
Securing Conditional Branches in the Presence of Fault Attacks
Schilling R., Werner M., Mangard S.
Design, Automation & Test in Europe Conference - DATE 2018
High Speed ASIC Implementations of Leakage-Resilient Cryptography
Schilling R., Unterluggauer T., Mangard S., Gürkaynak F., Mühlberghuber M., Benini L.
Design, Automation & Test in Europe Conference - DATE 2018
A Federation of Federations: Secure Cloud Federations meet European Identity Federations
Zefferer T., Ziegler D., Reiter A.
International Journal for Information Security Research, Vol. Volume 8(Issue 1), 2018
Synthesis of distributed algorithms with parameterized threshold guards
Lazić M., Konnov I., Widder J., Bloem R.
21st International Conference on Principles of Distributed Systems, OPODIS 2017
KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks
Schwarz M., Lipp M., Gruß D., Weiser S., Maurice C., Spreitzer R., Mangard S.
Network and Distributed System Security Symposium 2018
JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks
Schwarz M., Lipp M., Gruß D.
Network and Distributed System Security Symposium 2018
Another Flip in the Wall of Rowhammer Defenses
Gruß D., Lipp M., Schwarz M., Genkin D., Juffinger J., O'Connell S., Schoechl W., Yarom Y.
39th IEEE Symposium on Security and Privacy 2018
MEAS: memory encryption and authentication secure against side-channel attacks
Unterluggauer T., Werner M., Mangard S.
Journal of Cryptographic Engineering, 2018
Formal Verification of Masked Hardware Implementations in the Presence of Glitches
Bloem R., Groß H., Iusupov R., Könighofer B., Mangard S., Winter J.
EUROCRYPT
SCAnDroid: Automated Side-Channel Analysis of Android APIs
Spreitzer R., Palfinger G., Mangard S.
WISEC '18, Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks
DATA - Differential Address Trace Analysis: Finding Address-based Side-Channels in Binaries
Weiser S., Zankl A., Spreitzer R., Miller K., Mangard S., Sigl G.
Proceedings of the 27th USENIX Security Symposium
SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography
Dobraunig C., Eichlseder M., Korak T., Mangard S., Mendel F., Primas R.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2018(3), 2018
Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures
Dobraunig C., Eichlseder M., Groß H., Mangard S., Mendel F., Primas R.
Advances in Cryptology – ASIACRYPT 2018
