We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Higher-Order Side-Channel Protected Implementations of KECCAK
Groß H., Schaffenrath D., Mangard S.
DSD, IEEE Computer Society, 205-212
Multi-core Data Analytics SoC with a flexible 1.76 Gbit/s AES-XTS Cryptographic Accelerator in 65 nm CMOS
Gürkaynak F., Schilling R., Mühlberghuber M., Conti F., Mangard S., Benini L.
CS2 '17, Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems , CS2 Cryptography and Security in Computing Systems, 19-24
Concealing Secrets in Embedded Processors Designs
Groß H., Jelinek M., Mangard S., Unterluggauer T., Werner M.
15th Smart Card Research and Advanced Application Conference - CARDIS 2016, 15th Smart Card Research and Advanced Application Conference , 89-104, (Lecture Notes in Computer Science; vol. 10146)
Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives
Unterluggauer T., Werner M., Mangard S.
ACM Asia Conference on Computer and Communications Security - ASIACCS'17, 2017 ACM Asia Conference on Computer and Communications Security, 690-702
Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption
Primas R., Peßl P., Mangard S.
Cryptographic Hardware and Embedded Systems – CHES 2017, Springer, 513-533, (Lecture Notes in Computer Science; vol. 10529)
KASLR is Dead
Gruß D., Lipp M., Schwarz M., Fellner R., Maurice C., Mangard S.
Engineering Secure Software and Systems - 9th International Symposium, ESSoS 2017, Proceedings, 9th International Symposium on Engineering Secure Software and Systems, ESSoS 2017, 161-176, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10379 LNCS)
Practical Keystroke Timing Attacks in Sandboxed JavaScript
Lipp M., Gruß D., Schwarz M., Bidner D., Maurice C., Mangard S.
Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings, 22nd European Symposium on Research in Computer Security, ESORICS 2017, 191-209, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10493 LNCS)
Malware guard extension
Schwarz M., Weiser S., Gruß D., Maurice C., Mangard S.
Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, 2017, 14th International Conference on Detection of Intrusions and Malware, and Vulnerability Assess, DIMVA 2017, 3-24, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10327 LNCS)
An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order
Groß H., Mangard S., Korak T.
Topics in Cryptology – CT-RSA 2017, Topics in Cryptology - The Cryptographer's Track at the RSA Conference 2017, 95-112, (Lecture Notes in Computer Science; vol. 10159)
Fantastic timers and where to find them
Schwarz M., Maurice C., Gruß D., Mangard S.
Financial Cryptography and Data Security - 21st International Conference, FC 2017, Revised Selected Papers, 21st International Conference on Financial Cryptography and Data Security, 247-267, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10322 LNCS)
Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order
Groß H., Mangard S., Korak T.
ACM Workshop on Theory of Implementation Security, 3
Prefetch Side-Channel Attacks
Gruß D., Maurice C., Fogh A., Lipp M., Mangard S.
CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 23rd ACM Conference on Computer and Communications Security, 368-379
Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android
Spreitzer R., Griesmayr S., Korak T., Mangard S.
9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2016), Darmstadt, Germany, ACM Conference on Security and Privacy in Wireless and Mobile Networks
Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript
Gruß D., Maurice C., Mangard S.
Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), Springer, (DIMVA)
Protecting the Control Flow of Embedded Processors against Fault Attacks
Werner M., Wenger E., Mangard S.
Smart Card Research and Advanced Applications, International Conference on Smart Card Research and Advanced Applications
Enhancing Side-Channel Analysis of Binary-Field Multiplication with Bit Reliability
Peßl P., Mangard S.
Topics in Cryptology - CT-RSA 2016, Cryptographers´ Track at the RSA Conference
Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption
Unterluggauer T., Mangard S.
Constructive Side-Channel Analysis and Secure Design - COSADE 2016, International Workshop on Constructive Side-Channel Analysis and Secure Design, 3-18, (LNCS; vol. 9689)
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks
Peßl P., Gruß D., Maurice C., Schwarz M., Mangard S.
Proceedings of the 25th USENIX Security Symposium, 565-581
Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order
Groß H., Mangard S., Korak T.
TIS@CCS, ACM SIGWEB , 3
Flush+Flush
Gruß D., Maurice C., Wagner K., Mangard S.
Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, Proceedings, 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, 279-299, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9721)