Search Results - "Stefan Mangard"

Refine Results
  1. 1

    Malware Guard Extension: abusing Intel SGX to conceal cache attacks by Schwarz, Michael, Weiser, Samuel, Gruss, Daniel, Maurice, Clémentine, Mangard, Stefan

    Published in Cybersecurity (Singapore) (19-01-2020)
    “…In modern computer systems, user processes are isolated from each other by the operating system and the hardware. Additionally, in a cloud scenario it is…”
    Get full text
    Journal Article
  2. 2

    Compress: Generate Small and Fast Masked Pipelined Circuits by Cassiers, Gaëtan, Gigerl, Barbara, Mangard, Stefan, Momin, Charles, Nagpal, Rishub

    “…Masking is an effective countermeasure against side-channel attacks. It replaces every logic gate in a computation by a gadget that performs the operation over…”
    Get full text
    Journal Article
  3. 3

    Isap v2.0 by Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Bart Mennink, Robert Primas, Thomas Unterluggauer

    Published in IACR Transactions on Symmetric Cryptology (22-06-2020)
    “…We specify Isap v2.0, a lightweight permutation-based authenticated encryption algorithm that is designed to ease protection against side-channel and fault…”
    Get full text
    Journal Article
  4. 4

    SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography by Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Stefan Mangard, Florian Mendel, Robert Primas

    “…Since the seminal work of Boneh et al., the threat of fault attacks has been widely known and techniques for fault attacks and countermeasures have been…”
    Get full text
    Journal Article
  5. 5

    Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency by Gigerl, Barbara, Klug, Franz, Mangard, Stefan, Mendel, Florian, Primas, Robert

    “…Cryptographic devices in hostile environments can be vulnerable to physical attacks such as power analysis. Masking is a popular countermeasure against such…”
    Get full text
    Journal Article
  6. 6

    MEAS: memory encryption and authentication secure against side-channel attacks by Unterluggauer, Thomas, Werner, Mario, Mangard, Stefan

    Published in Journal of cryptographic engineering (01-06-2019)
    “…Memory encryption is used in many devices to protect memory content from attackers with physical access to a device. However, many current memory encryption…”
    Get full text
    Journal Article
  7. 7

    Riding the Waves Towards Generic Single-Cycle Masking in Hardware by Nagpal, Rishub, Gigerl, Barbara, Primas, Robert, Mangard, Stefan

    “…Research on the design of masked cryptographic hardware circuits in the past has mostly focused on reducing area and randomness requirements. However, many…”
    Get full text
    Journal Article
  8. 8

    SYNFI: Pre-Silicon Fault Analysis of an Open-Source Secure Element by Nasahl, Pascal, Osorio, Miguel, Vogel, Pirmin, Schaffner, Michael, Trippel, Timothy, Rizzo, Dominic, Mangard, Stefan

    “…Fault attacks are active, physical attacks that an adversary can leverage to alter the control-flow of embedded devices to gain access to sensitive information…”
    Get full text
    Journal Article
  9. 9

    Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults by Tollec, Simon, Hadži´c, Vedad, Nasahl, Pascal, Asavoae, Mihail, Bloem, Roderick, Couroussé, Damien, Heydemann, Karine, Jan, Mathieu, Mangard, Stefan

    “…Fault injection attacks are a serious threat to system security, enabling attackers to bypass protection mechanisms or access sensitive information. To…”
    Get full text
    Journal Article
  10. 10

    SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography by Dobraunig, Christoph, Eichlseder, Maria, Korak, Thomas, Mangard, Stefan, Mendel, Florian, Primas, Robert

    “…Since the seminal work of Boneh et al., the threat of fault attacks has been widely known and techniques for fault attacks and countermeasures have been…”
    Get full text
    Journal Article
  11. 11

    ISAP – Towards Side-Channel Secure Authenticated Encryption by Dobraunig, Christoph, Eichlseder, Maria, Mangard, Stefan, Mendel, Florian, Unterluggauer, Thomas

    Published in IACR Transactions on Symmetric Cryptology (08-03-2017)
    “…Side-channel attacks and in particular differential power analysis (DPA) attacks pose a serious threat to cryptographic implementations. One approach to…”
    Get full text
    Journal Article
  12. 12

    Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices by Spreitzer, Raphael, Moonsamy, Veelasha, Korak, Thomas, Mangard, Stefan

    “…Side-channel attacks on mobile devices have gained increasing attention since their introduction in 2007. While traditional side-channel attacks, such as power…”
    Get full text
    Journal Article
  13. 13

    A unified masking approach by Gross, Hannes, Mangard, Stefan

    “…The continually growing number of security-related autonomous devices requires efficient mechanisms to counteract low-cost side-channel analysis (SCA) attacks…”
    Get full text
    Journal Article
  14. 14

    Spectre Attacks: Exploiting Speculative Execution by Kocher, Paul, Horn, Jann, Fogh, Anders, Genkin, Daniel, Gruss, Daniel, Haas, Werner, Hamburg, Mike, Lipp, Moritz, Mangard, Stefan, Prescher, Thomas, Schwarz, Michael, Yarom, Yuval

    “…Modern processors use branch prediction and speculative execution to maximize performance. For example, if the destination of a branch depends on a memory…”
    Get full text
    Conference Proceeding
  15. 15
  16. 16

    Riding the Waves Towards Generic Single-Cycle Masking in Hardware by Rishub Nagpal, Barbara Gigerl, Robert Primas, Stefan Mangard

    “…Research on the design of masked cryptographic hardware circuits in the past has mostly focused on reducing area and randomness requirements. However, many…”
    Get full text
    Journal Article
  17. 17

    Scatter and Split Securely: Defeating Cache Contention and Occupancy Attacks by Giner, Lukas, Steinegger, Stefan, Purnal, Antoon, Eichlseder, Maria, Unterluggauer, Thomas, Mangard, Stefan, Gruss, Daniel

    “…In this paper, we propose SassCache, a secure skewed associative cache with keyed index mapping. For this purpose, we design a new two-layered, low-latency…”
    Get full text
    Conference Proceeding
  18. 18

    Securing conditional branches in the presence of fault attacks by Schilling, Robert, Werner, Mario, Mangard, Stefan

    “…In typical software, many comparisons and subsequent branch operations are highly critical in terms of security. Examples include password checks, signature…”
    Get full text
    Conference Proceeding
  19. 19

    Protecting RISC-V Processors against Physical Attacks by Werner, Mario, Schilling, Robert, Unterluggauer, Thomas, Mangard, Stefan

    “…RISC-V is an emerging instruction-set architecture suitable for a wide variety of applications, which ranges from simple microcontrollers to high-performance…”
    Get full text
    Conference Proceeding
  20. 20

    SCFI: State Machine Control-Flow Hardening Against Fault Attacks by Nasahl, Pascal, Unterguggenberger, Martin, Nagpal, Rishub, Schilling, Robert, Schrammel, David, Mangard, Stefan

    “…Fault injection (FI) is a powerful attack methodology allowing an adversary to entirely break the security of a target device. As finite-state machines (FSMs)…”
    Get full text
    Conference Proceeding