Folgen
Stefan Mangard
Titel
Zitiert von
Zitiert von
Jahr
Power analysis attacks: Revealing the secrets of smart cards
S Mangard, E Oswald, T Popp
Springer Science & Business Media, 2008
25732008
Spectre attacks: Exploiting speculative execution
P Kocher, J Horn, A Fogh, D Genkin, D Gruss, W Haas, M Hamburg, ...
2019 IEEE Symposium on Security and Privacy (SP), 1-19, 2019
20052019
Meltdown: Reading kernel memory from user space
M Lipp, M Schwarz, D Gruss, T Prescher, W Haas, A Fogh, J Horn, ...
27th USENIX Security Symposium (USENIX Security 18), 973-990, 2018
1714*2018
Masked dual-rail pre-charge logic: DPA-resistance without routing constraints
T Popp, S Mangard
International Workshop on Cryptographic Hardware and Embedded Systems, 172-186, 2005
5242005
Flush+ Flush: a fast and stealthy cache attack
D Gruss, C Maurice, K Wagner, S Mangard
International Conference on Detection of Intrusions and Malware, and …, 2016
5082016
{ARMageddon}: Cache Attacks on Mobile Devices
M Lipp, D Gruss, R Spreitzer, C Maurice, S Mangard
25th USENIX Security Symposium (USENIX Security 16), 549-564, 2016
4402016
Successfully attacking masked AES hardware implementations
S Mangard, N Pramstaller, E Oswald
International Workshop on Cryptographic Hardware and Embedded Systems, 157-171, 2005
4352005
Cache Template Attacks: Automating Attacks on Inclusive {Last-Level} Caches
D Gruss, R Spreitzer, S Mangard
24th USENIX Security Symposium (USENIX Security 15), 897-912, 2015
4282015
Malware guard extension: Using SGX to conceal cache attacks
M Schwarz, S Weiser, D Gruss, C Maurice, S Mangard
International Conference on Detection of Intrusions and Malware, and …, 2017
4162017
A side-channel analysis resistant description of the AES S-box
E Oswald, S Mangard, N Pramstaller, V Rijmen
International workshop on fast software encryption, 413-423, 2005
4162005
Rowhammer. js: A remote software-induced fault attack in javascript
D Gruss, C Maurice, S Mangard
International conference on detection of intrusions and malware, and …, 2016
3672016
Hardware countermeasures against DPA–a statistical analysis of their effectiveness
S Mangard
Cryptographers’ Track at the RSA Conference, 222-235, 2004
3622004
{DRAMA}: Exploiting {DRAM} Addressing for {Cross-CPU} Attacks
P Pessl, D Gruss, C Maurice, M Schwarz, S Mangard
25th USENIX security symposium (USENIX security 16), 565-581, 2016
3542016
Side-channel leakage of masked CMOS gates
S Mangard, T Popp, BM Gammel
Cryptographers’ Track at the RSA Conference, 351-365, 2005
3482005
An AES smart card implementation resistant to power analysis attacks
C Herbst, E Oswald, S Mangard
International conference on applied cryptography and network security, 239-252, 2006
3472006
A highly regular and scalable AES hardware architecture
S Mangard, M Aigner, S Dominikus
IEEE Transactions on Computers 52 (4), 483-491, 2003
2792003
A simple power-analysis (SPA) attack on implementations of the AES key expansion
S Mangard
International Conference on Information Security and Cryptology, 343-358, 2002
2732002
One for all–all for one: unifying standard differential power analysis attacks
S Mangard, E Oswald, FX Standaert
IET Information Security 5 (2), 100-110, 2011
2532011
Practical second-order DPA attacks for masked smart card implementations of block ciphers
E Oswald, S Mangard, C Herbst, S Tillich
Cryptographers’ Track at the RSA Conference, 192-207, 2006
2312006
Kaslr is dead: long live kaslr
D Gruss, M Lipp, M Schwarz, R Fellner, C Maurice, S Mangard
International Symposium on Engineering Secure Software and Systems, 161-176, 2017
2242017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20