We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
ARMageddon: Last-Level Cache Attacks on Mobile Devices
Lipp M., Gruß D., Spreitzer R., Maurice C., Mangard S.
25th USENIX Security Symposium (USENIX Security 16), USENIX Association, 549-564
Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches
Gruß D., Spreitzer R., Mangard S.
24th USENIX Security Symposium, Washington, D.C., USA, August 12-14, 2015, 24th USENIX Security Symposium, 897-912
Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security
Dobraunig C., Koeune F., Mangard S., Mendel F., Standaert F.
CARDIS, International Conference on Smart Card Research and Advanced Applications, 225-241, (LNCS; vol. 9514)
Practical memory deduplication attacks in sandboxed javascript
Gruß D., Bidner D., Mangard S.
Computer Security – ESORICS 2015 - 20th European Symposium on Research in Computer Security, Proceedings, 20th European Symposium on Research in Computer Security, ESORICS 2015, 108-122, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9326)
On the Security of Fresh Re-Keying to Counteract Side-Channel and Fault Attacks
Dobraunig C., Eichlseder M., Mangard S., Mendel F.
Smart Card Research and Advanced Applications - CARDIS 2014, 2014 International Conference on Smart Card Research and Advanced Applications, 233-244, ( Lecture Notes in Computer Science; vol. 8968)
Keeping Secrets on Low-Cost Chips
Mangard S.
IEEE Security & Privacy, Vol. 11(4), 75-77
On the Relationship between Correlation Power Analysis and the Stochastic Approach: An ASIC Designer Perspective
De Santis F., Kasper M., Mangard S., Sigl G., Stein O., Stöttinger M.
International Conference on Cryptology in India, 215-226
Die physikalische Sicherheit eingebetteter Systeme
Mangard S.
Datenschutz und Datensicherheit, Vol. 36, 867-871
Exploiting the Difference of Side-Channel Leakages
Hutter M., Kirschbaum M., Plos T., Schmidt J., Mangard S.
Constructive Side-Channel Analysis and Secure Design - COSADE 2012, 3rd International Workshop, Darmstadt, Germany, May 3-4, 2012, Proceedings., International Workshop on Constructive Side-Channel Analysis and Secure Design, 1-16, (Lecture Notes in Computer Science)
Localized Electromagnetic Analysis of Cryptographic Implementations
Heyszl J., Mangard S., Heinz B., Stumpf F., Sigl G.
Cryptographers´ Track at the RSA Conference, 231-244
One for all - all for one: unifying standard differential power analysis attacks
Mangard S., Elisabeth O., Standaert F.
IET Information Security, 100-110
Arithmetic Logic Units with High Error Detection Rates to Counteract Fault Attacks
Medwed M., Mangard S.
Design, Automation and Test in Europe, Design, Automation and Test in Europe Conference and Exhibition
On the Duality of Probing and Fault Attacks
Gammel B., Mangard S.
Journal of Electronic Testing , Vol. 26(4), 483-493
The World Is Not Enough: Another Look on Second-Order DPA
Standaert F., Veyrat-Charvillon N., Oswald E., Gierlichs B., Medwed M., Kasper M., Mangard S.
International Conference on the Theory and Application of Cryptology and Information Security, 112-129
Practical Attacks on Masked Hardware
Popp T., Kirschbaum M., Mangard S.
Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, Cryptographers´ Track at the RSA Conference, 211-225, (Lecture Notes in Computer Science)
Power Analysis Attacks - Revealing the Secrets of Smart Cards
Mangard S., Oswald M., Popp T.
, Springer
Power Analysis Attacks and Countermeasures
Popp T., Mangard S., Oswald M.
IEEE design & test of computers, Vol. 24(6), 535-543
Protecting AES Software Implementations on 32-bit Processors against Power Analysis
Tillich S., Herbst C., Mangard S.
Applied Cryptography and Network Security, 5th International Conference on Applied Cryptography and Network Security, 141-157, (Lecture Notes in Computer Science; vol. 4521)
Power and EM Attacks on Passive 13.56 MHz RFID Devices
Hutter M., Mangard S., Feldhofer M.
Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings, 9th International Workshop Cryptographic Hardware and Embedded Systems , 320-330, (Lecture Notes in Computer Science (LNCS))
Template Attacks on Masking - Resistance Is Futile
Oswald E., Mangard S.
Cryptographers´ Track at the RSA Conference, 243-256