Skip to main content
European Commission logo
English English
CORDIS - EU research results
CORDIS
CORDIS Web 30th anniversary CORDIS Web 30th anniversary

Securing Software against Physical Attacks

Publications

Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs

Author(s): Barbara Gigerl, Vedad Hadzic, Robert Primas, Stefan Mangard, Roderick Bloem
Published in: Proceedings of the 30th USENIX Security Symposium, 2021
Publisher: USENIX Association

The Evolution of Transient-Execution Attacks

Author(s): Claudio Canella, Khaled N. Khasawneh, Daniel Gruss
Published in: Proceedings of the 2020 on Great Lakes Symposium on VLSI, 2020, Page(s) 163-168, ISBN 9781450379441
Publisher: ACM
DOI: 10.1145/3386263.3407583

A Fast and Compact RISC-V Accelerator for Ascon and Friends

Author(s): Stefan Steinegger*, Robert Primas
Published in: Smart Card Research and Advanced Applications - 19th International Conference, CARDIS 2020, Revised Selected Papers, Issue 19th International Conference, CARDIS 2020, Revised Selected Papers, 2020, Page(s) 53-67, ISBN 978-3-030-68486-0
Publisher: Springer
DOI: 10.1007/978-3-030-68487-7_4

NetSpectre: Read Arbitrary Memory over Network

Author(s): Michael Schwarz, Martin Schwarzl, Moritz Lipp, Jon Masters, Daniel Gruss
Published in: Computer Security – ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part I, Issue 11735, 2019, Page(s) 279-299, ISBN 978-3-030-29958-3
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-29959-0_14

ZombieLoad: Cross-Privilege-Boundary Data Sampling

Author(s): Michael Schwarz, Moritz Lipp, Daniel Moghimi, Jo Van Bulck, Julian Stecklina, Thomas Prescher, Daniel Gruss
Published in: CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, Issue Proceedings of the 2019 ACM SIGSAC, 2019, Page(s) 753-768
Publisher: ACM/IEEE

HECTOR-V: A Heterogeneous CPU Architecture for a Secure RISC-V Execution Environment

Author(s): Pascal Nasahl, Robert Schilling, Mario Werner, Stefan Mangard
Published in: ACM ASIACCS 2021, 2021
Publisher: ACM ASIACCS 2021

KASLR: Break It, Fix It, Repeat

Author(s): Claudio Canella, Michael Schwarz, Martin Haubenwallner, Martin Schwarzl, Daniel Gruss
Published in: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, 2020, Page(s) 481-493, ISBN 9781450367509
Publisher: ACM
DOI: 10.1145/3320269.3384747

SecWalk: Protecting Page Table Walks Against Fault Attacks

Author(s): Robert Schilling, Pascal Nasahl, Stefan Weiglhofer, Stefan Mangard
Published in: 2021 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2022
Publisher: IEEE

Systematic Analysis of Randomization-based Protected Cache Architectures

Author(s): Antoon Purnal, Lukas Giner, Daniel Gruß, Ingrid Verbauwhede
Published in: 42th IEEE Symposium on Security and Privacy, 2021
Publisher: IEEE SP 2021

SERVAS! Secure Enclaves via RISC-V Authenticryption Shield

Author(s): Stefan Steinegger*, David Schrammel, Samuel Weiser, Pascal Nasahl, Stefan Mangard
Published in: 26th European Symposium on Research in Computer Security, Issue Proceedings, Part II, 2021, Page(s) 370-391, ISBN 978-3-030-88427-7
Publisher: Springer
DOI: 10.1007/978-3-030-88428-4_19

Jenny: Securing Syscalls for PKU-based Memory Isolation Systems

Author(s): David Schrammel*, Samuel Weiser, Richard Sadek, Stefan Mangard
Published in: Proceedings of the 31st USENIX Security Symposium, 2022
Publisher: USENIX Association

ConTExT: A Generic Approach for Mitigating Spectre

Author(s): Michael Schwarz, Moritz Lipp, Claudio Alberto Canella, Robert Schilling, Florian Kargl, Daniel Gruß
Published in: Network and Distributed System Security Symposium 2020, 2020
Publisher: Network and Distributed System Security Symposium 2020

Leakage Resilient Value Comparison With Application to Message Authentication

Author(s): Christoph Erwin Dobraunig, Bart Mennink
Published in: Advances in Cryptology – EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings, 2021, ISBN 978-3-030-77886-6
Publisher: Springer

Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX

Author(s): Lukas Giner, Andreas Kogler, Claudio Alberto Canella, Michael Schwarz, Daniel Gruss
Published in: 31th USENIX Security Symposium (USENIX Security 22), 2021
Publisher: USENIX '22

Fantastic timers and where to find them: High-resolution microarchitectural attacks in javascript

Author(s): Michael Schwarz*, Clémentine Maurice, Daniel Gruss, Stefan Mangard
Published in: Financial Cryptography and Data Security - 21st International Conference FC 2017, Revised Selected Papers, Issue 10322 LNCS, 2017, Page(s) 247-267, ISBN 978-3-319-70972-7
Publisher: Springer Wien
DOI: 10.1007/978-3-319-70972-7_13

CrypTag: Thwarting Physical and Logical Memory Vulnerabilities using Cryptographically Colored Memory

Author(s): Pascal Nasahl, Robert Schilling, Mario Werner, Jan Hoogerbrugge, Marcel Medwed, Stefan Mangard
Published in: ACM ASIACCS 202, 2021
Publisher: ACM ASIACCS 202

FIPAC: Thwarting Fault- and Software-Induced Control-Flow Attacks with ARM Pointer Authentication

Author(s): Schilling, Robert; Nasahl, Pascal; Mangard, Stefan
Published in: 13th International Workshop on Constructive Side-Channel Analysis and Secure Design - COSADE 2022, Issue in press, 2022
Publisher: Springer

PLATYPUS: Software-based Power Side-Channel Attacks on x86

Author(s): Moritz Lipp, Andreas Kogler, David Oswald, Michael Schwarz, Catherine Easdon, Claudio Canella, Daniel Gruss
Published in: 2021 IEEE Symposium on Security and Privacy (SP), 2021
Publisher: IEEE
DOI: 10.1109/sp40001.2021.00063

An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC

Author(s): Maria Eichlseder and Lorenzo Grassi and Reinhard Lüftenegger and Morten Øygarden and Christian Rechberger and Markus Schofnegger and Qingju Wang
Published in: IACR-ASIACRYPT-2020, 2020, Page(s) 477-506, ISBN 978-3-030-64836-7
Publisher: Springer
DOI: 10.1007/978-3-030-64837-4_16

Evolution of Defenses against Transient-Execution Attacks

Author(s): Claudio Canella, Sai Manoj Pudukotai Dinakarrao, Daniel Gruss, Khaled N. Khasawneh
Published in: Proceedings of the 2020 on Great Lakes Symposium on VLSI, 2020, Page(s) 169-174, ISBN 9781450379441
Publisher: ACM
DOI: 10.1145/3386263.3407584

Protecting Indirect Branches against Fault Attacks using ARM Pointer Authentication

Author(s): Pascal Nasahl*, Robert Schilling, Stefan Mangard
Published in: 2021 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2021
Publisher: IEEE
DOI: 10.1109/host49136.2021.9702268

Automating Seccomp Filter Generation for Linux Applications

Author(s): Claudio Canella, Mario Werner, Daniel Gruss, Michael Schwarz
Published in: ACM Cloud Computing Security Workshop 2021, 2020, Page(s) 139-151
Publisher: cs.CR
DOI: 10.1145/3474123.3486762

Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields

Author(s): Christoph Erwin Dobraunig, Lorenzo Grassi, Anna Guinet , Daniël Kuijsters
Published in: Eurocrypt 2021, 2021
Publisher: IACR

Concealing Secrets in Embedded Processors Designs

Author(s): Hannes Gross, Manuel Jelinek, Stefan Mangard, Thomas Unterluggauer, Mario Werner
Published in: CARDIS 2016, 2017, Page(s) 89-104
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-54669-8_6

High speed ASIC implementations of leakage-resilient cryptography

Author(s): Robert Schilling, Thomas Unterluggauer, Stefan Mangard, Frank K. Gurkaynak, Michael Muehlberghuber, Luca Benini
Published in: 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2018, Page(s) 1259-1264, ISBN 978-3-9819263-0-9
Publisher: IEEE
DOI: 10.23919/DATE.2018.8342208

Another Flip in the Wall of Rowhammer Defenses

Author(s): Daniel Gruss, Moritz Lipp, Michael Schwarz, Daniel Genkin, Jonas Juffinger, Sioli O'Connell, Wolfgang Schoechl, Yuval Yarom
Published in: 39th IEEE Symposium on Security and Privacy 2018, 2017
Publisher: IEEE

An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order

Author(s): Hannes Gross, Stefan Mangard, Thomas Korak
Published in: CT-RSA, 2017, Page(s) 95-112, ISBN 978-3-319-52153-4
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-52153-4_6

Formal Verification of Masked Hardware Implementations in the Presence of Glitches

Author(s): Roderick Bloem, Hannes Gross, Rinat Iusupov, Bettina Könighofer, Stefan Mangard, Johannes Winter
Published in: Eurocrypt 2018, 2018, Page(s) 321-353
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-78375-8_11

KASLR is Dead

Author(s): Daniel Gruss, Moritz Lipp, Michael Schwarz, Richard Fellner, Clémentine Maurice, Stefan Mangard
Published in: ESSoS'17, 2017, Page(s) 161-176
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-62105-0_11

JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks

Author(s): Michael Schwarz Moritz Lipp Daniel Gruss
Published in: NDSS 2018, 2018
Publisher: NDSS

Higher-Order Side-Channel Protected Implementations of KECCAK

Author(s): Hannes Gross, David Schaffenrath, Stefan Mangard
Published in: 2017 Euromicro Conference on Digital System Design (DSD), 2017, Page(s) 205-212, ISBN 978-1-5386-2146-2
Publisher: IEEE
DOI: 10.1109/DSD.2017.21

Multi-core data analytics SoC with a flexible 1.76 Gbit/s AES-XTS cryptographic accelerator in 65 nm CMOS

Author(s): Frank K. Gürkaynak, Robert Schilling, Michael Muehlberghuber, Francesco Conti, Stefan Mangard, Luca Benini
Published in: Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems - CS2 '17, 2017, Page(s) 19-24, ISBN 9781-450348690
Publisher: ACM Press
DOI: 10.1145/3031836.3031840

ProcHarvester: Fully Automated Analysis of Procfs Side-Channel Leaks on Android

Author(s): Spreitzer, R., Kirchengast, F., Gruss, D., Mangard, S.
Published in: AsiaCCS 2018, 2018
Publisher: ACM

Malware guard extension

Author(s): Michael Schwarz, Samuel Weiser, Daniel Gruss, Clémentine Maurice, Stefan Mangard
Published in: DIMVA'17, 2017, Page(s) 3-24
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-60876-1_1

Leakage Bounds for Gaussian Side Channels

Author(s): Thomas Unterluggauer, Thomas Korak, Stefan Mangard, Robert Schilling, Luca Benini, Frank K. Gürkaynak, Michael Muehlberghuber
Published in: CARDIS 2018, 2018
Publisher: Springer Inernational Verlag

SCAnDroid: Automated Side-Channel Analysis of Android APIs

Author(s): Spreitzer, R., Palfinger, G., Mangard, S.
Published in: WISEC 2018, 2018
Publisher: ACM

Securing conditional branches in the presence of fault attacks

Author(s): Robert Schilling, Mario Werner, Stefan Mangard
Published in: 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2018, Page(s) 1586-1591, ISBN 978-3-9819263-0-9
Publisher: IEEE
DOI: 10.23919/DATE.2018.8342268

Reconciling d+1 Masking in Hardware and Software

Author(s): Groß, H., Mangard, S.
Published in: CHES 2017, 2017
Publisher: Springer

Side-channel plaintext-recovery attacks on leakage-resilient encryption

Author(s): Thomas Unterluggauer, Mario Werner, Stefan Mangard
Published in: Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017, 2017, Page(s) 1318-1323, ISBN 978-3-9815370-8-6
Publisher: IEEE
DOI: 10.23919/DATE.2017.7927197

Single Trace Attack Against RSA Key Generation in Intel SGX SSL

Author(s): Weiser, S., Spreitzer, R., Bodner, L.
Published in: AsiaCCS 2018, 2018
Publisher: ACM

Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives

Author(s): Thomas Unterluggauer, Mario Werner, Stefan Mangard
Published in: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17, 2017, Page(s) 690-702, ISBN 9781-450349444
Publisher: ACM Press
DOI: 10.1145/3052973.3052985

Transparent memory encryption and authentication

Author(s): Mario Werner, Thomas Unterluggauer, Robert Schilling, David Schaffenrath, Stefan Mangard
Published in: 2017 27th International Conference on Field Programmable Logic and Applications (FPL), 2017, Page(s) 1-6, ISBN 978-9-0903-0428-1
Publisher: IEEE
DOI: 10.23919/FPL.2017.8056797

KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks.

Author(s): Michael Schwarz, Moritz Lipp, Daniel Gruss, Samuel Weiser, Clémentine Maurice, Raphael Spreitzer, Stefan Mangard
Published in: NDSS Symposium 2018, 2018
Publisher: NDSS Symposium 2018
DOI: 10.14722/ndss.2018.23002

Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features

Author(s): Michael Schwarz, Daniel Gruss, Moritz Lipp, Clémentine Maurice, Thomas Schuster, Anders Fogh, Stefan Mangard
Published in: Proceedings of the 2018 on Asia Conference on Computer and Communications Security - ASIACCS '18, 2018, Page(s) 587-600, ISBN 9781-450355766
Publisher: ACM Press
DOI: 10.1145/3196494.3196508

Meltdown

Author(s): Lipp, Moritz; Schwarz, Michael; Gruss, Daniel; Prescher, Thomas; Haas, Werner; Mangard, Stefan; Kocher, Paul; Genkin, Daniel; Yarom, Yuval; Hamburg, Mike
Published in: 27th USENIX Security Symposium, Issue 2, 2018
Publisher: USENIX Security Symposium 2018:

Sponge-Based Control-Flow Protection for IoT Devices

Author(s): Mario Werner, Thomas Unterluggauer, David Schaffenrath, Stefan Mangard
Published in: 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 2018, Page(s) 214-226, ISBN 978-1-5386-4228-3
Publisher: IEEE
DOI: 10.1109/eurosp.2018.00023

Pointing in the Right Direction - Securing Memory Accesses in a Faulty World

Author(s): Schilling, Robert; Werner, Mario; Nasahl, Pascal; Mangard, Stefan
Published in: ACSAC 2018, Issue 2, 2018
Publisher: ACSAC 2018

Small Faults Grow Up - Verification of Error Masking Robustness in Arithmetically Encoded Programs

Author(s): Anja F. Karl, Robert Schilling, Roderick Bloem, Stefan Mangard
Published in: Verification, Model Checking, and Abstract Interpretation - 20th International Conference, VMCAI 2019, Cascais, Portugal, January 13–15, 2019, Proceedings, Issue 11388, 2019, Page(s) 183-204, ISBN 978-3-030-11244-8
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-11245-5_9

Spectre Attacks: Exploiting Speculative Execution

Author(s): Kocher, Paul; Genkin, Daniel; Gruss, Daniel; Haas, Werner; Hamburg, Mike; Lipp, Moritz; Mangard, Stefan; Prescher, Thomas; Schwarz, Michael; Yarom, Yuval
Published in: 2019 IEEE Symposium on Security and Privacy (SP), 2019
Publisher: arxiv
DOI: 10.1109/sp.2019.00002

Fault Attacks on Nonce-Based Authenticated Encryption: Application to Keyak and Ketje

Author(s): Christoph Dobraunig, Stefan Mangard, Florian Mendel, Robert Primas
Published in: Selected Areas in Cryptography – SAC 2018 - 25th International Conference, Calgary, AB, Canada, August 15–17, 2018, Revised Selected Papers, Issue 11349, 2019, Page(s) 257-277, ISBN 978-3-030-10969-1
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-10970-7_12

Generic Low-Latency Masking in Hardware

Author(s): Gross, H., Iusupov, R., & Bloem, R.
Published in: CHES 2018, 2018
Publisher: IACR - Ches 2018
DOI: 10.13154/tches.v2018.i2.1-21

JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits

Author(s): Michael Schwarz, Florian Lackner, Daniel Gruss
Published in: NDSS 2019, 2019
Publisher: Internet Society - NDSS

Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures

Author(s): Christoph Dobraunig, Maria Eichlseder, Hannes Gross, Stefan Mangard, Florian Mendel, Robert Primas
Published in: ASIACRYPT 2018, 2018
Publisher: Springer

SGXJail: Defeating Enclave Malware via Confinement

Author(s): Samuel Weiser, Luca Mayr, Michael Schwarz, Daniel Gruss
Published in: 22nd International Symposium on Research in Attacks, Intrusions and Defenses ({RAID} 2019), 2019, ISBN 978-1-939133-07-6
Publisher: USENIX Association

Protecting RISC-V Processors against Physical Attacks

Author(s): Mario Werner, Robert Schilling, Thomas Unterluggauer, Stefan Mangard
Published in: 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2019, Page(s) 1136-1141, ISBN 978-3-9819263-2-3
Publisher: IEEE
DOI: 10.23919/date.2019.8714811

A Systematic Evaluation of Transient Execution Attacks and Defenses

Author(s): Claudio Canella, Jo Van Bulck, Michael Schwarz , Moritz Lipp , Benjamin von Berg , Philipp Ortner , Frank Piessens , Dmitry Evtyushkin, Daniel Gruss
Published in: USENIX Security 2019, 2019
Publisher: USENIX Association

ScatterCache: Thwarting Cache Attacks via Cache Set Randomization

Author(s): Mario Werner, Thomas Unterluggauer, Lukas Giner, Michael Schwarz, Daniel Gruss, and Stefan Mangard
Published in: USENIX Security 2019, 2019
Publisher: USENIX Association

Practical Enclave Malware with Intel SGX

Author(s): Michael Schwarz, Samuel Weiser, Daniel Gruss
Published in: Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19–20, 2019, Proceedings, Issue 11543, 2019, Page(s) 177-196, ISBN 978-3-030-22037-2
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-22038-9_9

Medusa: Microarchitectural data leakage via automated attack synthesis

Author(s): Daniel Moghimi, Moritz Lipp, Berk Sunar, Michael Schwarz
Published in: 29th USENIX Security Symposium, Issue Proceedings of the 29th USENIX Security Symposium, 2020, Page(s) 1427-1444, ISBN 9781939133175
Publisher: USENIX Association

Specfuscator: Evaluating Branch Removal as a Spectre Mitigation

Author(s): Martin Schwarzl, Claudio Alberto Canella, Daniel Gruss, Michael Schwarz
Published in: Financial Cryptography and Data Security 2021 - Virtual conference, 2021
Publisher: IFCA

Nethammer: Inducing Rowhammer Faults through Network Requests

Author(s): Moritz Lipp, Michael Schwarz, Lukas Raab, Lukas Lamster, Misiker Tadesse Aga, Clementine Maurice, Daniel Gruss
Published in: 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2020, Page(s) 710-719, ISBN 978-1-7281-8597-2
Publisher: IEEE
DOI: 10.1109/eurospw51379.2020.00102

Donky: Domain Keys – Efficient In-Process Isolation for RISC-V and x86

Author(s): David Schrammel, Samuel Weiser, Stefan Steinegger, Martin Schwarzl, Michael Schwarz, Stefan Mangard, Daniel Gruß
Published in: Proceedings of the 29th USENIX Security Symposium 2020, 2020, Page(s) 1677-1694
Publisher: 29th USENIX Security Symposium

Take A Way: Exploring the Security Implications of AMD's Cache Way Predictors

Author(s): Moritz Lipp, Vedad Hažić, Michael Schwarz, Arthur Perais, Clémentine Maurice, Daniel Gruss
Published in: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, 2020, Page(s) 813-825, ISBN 9781450367509
Publisher: ACM
DOI: 10.1145/3320269.3384746

Out of Oddity – New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems

Author(s): Tim Beyne, Anne Canteaut, Itai Dinur, Maria Eichlseder, Gregor Leander, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Yu Sasaki, Yosuke Todo, Friedrich Wiemer
Published in: Advances in Cryptology – CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part III, Issue 12172, 2020, Page(s) 299-328, ISBN 978-3-030-56876-4
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-56877-1_11

DATA - Differential Address Trace Analysis: Finding Address-based Side-Channels in Binaries

Author(s): Samuel Weiser, Andreas Zankl, Raphael Spreitzer, Katja Miller, Stefan Mangard, Georg Sigl
Published in: Proceedings of the 27th USENIX Security Symposium, 2018, Page(s) 603-620, ISBN 978-1-931971-46-1
Publisher: USENIX Association

LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection

Author(s): Jo Van Bulck, Daniel Moghimi, Michael Schwarz, Moritz Lipp, Marina Minkin, Daniel Genkin, Yuval Yarom, Berk Sunar, Daniel Gruß, Frank Piessens
Published in: 2020 IEEE Symposium on Security and Privacy (SP), 2020
Publisher: IEEE

An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics

Author(s): Francesco Conti; Robert Schilling; Pasquale Davide Schiavone; Antonio Pullini; Davide Rossi; Frank K. Gurkaynak; Michael Muehlberghuber; Michael Gautschi; Igor Loi; Germain Haugou; Stefan Mangard; Luca Benini
Published in: IEEE Transactions on Circuits and Systems I: Regular Papers, Issue 23, 2017, ISSN 1549-8328
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tcsi.2017.2698019

Plundervolt: How a Little Bit of Undervolting Can Create a Lot of Trouble

Author(s): Kit Murdock, David Oswald, Flavio D. Garcia, Jo Van Bulck, Frank Piessens, Daniel Gruss
Published in: IEEE Security & Privacy, Issue 18/5, 2020, Page(s) 28-37, ISSN 1540-7993
Publisher: IEEE Computer Society
DOI: 10.1109/msec.2020.2990495

ISAP v2.0

Author(s): Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Bart Mennink, Robert Primas, Thomas Unterluggauer
Published in: IACR Transactions on Symmetric Cryptology, Issue 2020, 2020, Page(s) 390-416, ISSN 2519-173X
Publisher: Ruhr-Universitat Bochum
DOI: 10.13154/tosc.v2020.iS1.390-416

ISAP – Towards Side-Channel Secure Authenticated Encryption

Author(s): Dobraunig, Christoph; Eichlseder, Maria; Mangard, Stefan; Mendel, Florian; Unterluggauer, Thomas
Published in: IACR Transactions on Symmetric Cryptology, Issue 1, 2017, ISSN 2519-173X
Publisher: IACR
DOI: 10.13154/tosc.v2017.i1.80-105

Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices

Author(s): Raphael Spreitzer, Veelasha Moonsamy, Thomas Korak, Stefan Mangard
Published in: IEEE Communications Surveys & Tutorials, Issue 20/1, 2018, Page(s) 465-488, ISSN 1553-877X
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/COMST.2017.2779824

MEAS: memory encryption and authentication secure against side-channel attacks

Author(s): Thomas Unterluggauer, Mario Werner, Stefan Mangard
Published in: Journal of Cryptographic Engineering, 2018, ISSN 2190-8508
Publisher: Springer Science + Business Media
DOI: 10.1007/s13389-018-0180-2

A unified masking approach

Author(s): Hannes Gross, Stefan Mangard
Published in: Journal of Cryptographic Engineering, 2018, ISSN 2190-8508
Publisher: Springer Science + Business Media
DOI: 10.1007/s13389-018-0184-y

SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography

Author(s): Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Stefan Mangard, Florian Mendel, Robert Primas
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018(3), 2018, ISSN 2569-2925
Publisher: Ruhr University Bochum

Tightness of the Suffix Keyed Sponge Bound

Author(s): Christoph Dobraunig, Bart Mennink
Published in: IACR Transactions on Symmetric Cryptology, 2020, Page(s) 195-212, ISSN 2519-173X
Publisher: Ruhr-Universitat Bochum
DOI: 10.46586/tosc.v2020.i4.195-212

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available