Computer security, Cache, Embedded system, Smart card and Side channel attack are his primary areas of study. His Computer security research is multidisciplinary, incorporating elements of Electronic circuit, Cloud computing and AND-OR-Invert. His study in Cache is interdisciplinary in nature, drawing from both Dram, Software security assurance and Central processing unit.
His work deals with themes such as Logic gate, CMOS, Encryption and AES implementations, which intersect with Embedded system. Stefan Mangard has included themes like Cryptanalysis, Cryptography and Power analysis in his Smart card study. His research integrates issues of Cycles per instruction, Electronic engineering, Three-input universal logic gate and Leakage in his study of Side channel attack.
His main research concerns Embedded system, Computer security, Side channel attack, Cryptography and Power analysis. His Embedded system research focuses on Encryption and how it connects with Authentication. His Computer security research integrates issues from Software security assurance, Cloud computing and Cache.
His Cache research is multidisciplinary, relying on both Central processing unit, Process and Instruction set. Stefan Mangard has researched Side channel attack in several fields, including Android, Computer network, Mobile device and Leakage. His research in Power analysis focuses on subjects like Smart card, which are connected to Cryptanalysis.
Stefan Mangard mainly investigates Embedded system, Computer security, Side channel attack, Encryption and Software. His Embedded system study integrates concerns from other disciplines, such as Exploit, Control flow, Compiler and Pointer. His Computer security research includes elements of Software security assurance, Cloud computing and Cache.
His biological study spans a wide range of topics, including Implementation, Android, Keystroke logging and Power analysis. His Software research incorporates themes from Wireless, Masking, Hardware security module, Randomness and Computation. His work focuses on many connections between Smart card and other disciplines, such as Information sensitivity, that overlap with his field of interest in Mobile device.
His primary areas of investigation include Computer security, Cache, Side channel attack, Exploit and Cloud computing. Stefan Mangard combines subjects such as User space and Implementation with his study of Computer security. Stefan Mangard interconnects Software, Process, Instruction set and Branch predictor in the investigation of issues within Cache.
The Side channel attack study combines topics in areas such as Speculative execution, Software security assurance, Central processing unit and Power analysis. The concepts of his Exploit study are interwoven with issues in Timing attack, Control flow, Embedded system and Keystroke logging. When carried out as part of a general Embedded system research project, his work on Hardware implementations is frequently linked to work in Masking, therefore connecting diverse disciplines of study.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Power Analysis Attacks: Revealing the Secrets of Smart Cards
Stefan Mangard;Elisabeth Oswald;Thomas Popp.
(2007)
Power Analysis Attacks: Revealing the Secrets of Smart Cards
Stefan Mangard;Elisabeth Oswald;Thomas Popp.
(2007)
Spectre Attacks: Exploiting Speculative Execution
Paul Kocher;Jann Horn;Anders Fogh;Daniel Genkin.
ieee symposium on security and privacy (2019)
Spectre Attacks: Exploiting Speculative Execution
Paul Kocher;Jann Horn;Anders Fogh;Daniel Genkin.
ieee symposium on security and privacy (2019)
Meltdown: reading kernel memory from user space
Moritz Lipp;Michael Schwarz;Daniel Gruss;Thomas Prescher.
usenix security symposium (2018)
Meltdown: reading kernel memory from user space
Moritz Lipp;Michael Schwarz;Daniel Gruss;Thomas Prescher.
usenix security symposium (2018)
Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)
Stefan Mangard;Elisabeth Oswald;Thomas Popp.
(2007)
Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)
Stefan Mangard;Elisabeth Oswald;Thomas Popp.
(2007)
Masked dual-rail pre-charge logic : DPA-resistance without routing constraints
Thomas Popp;Stefan Mangard.
Lecture Notes in Computer Science (2005)
Masked dual-rail pre-charge logic : DPA-resistance without routing constraints
Thomas Popp;Stefan Mangard.
Lecture Notes in Computer Science (2005)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
University of Klagenfurt
Université Catholique de Louvain
University of Vienna
ETH Zurich
University of Passau
Graz University of Technology
École Polytechnique Fédérale de Lausanne
University of Michigan–Ann Arbor
University of Adelaide
Duke University
Federal Reserve Bank of Atlanta
Google (United States)
University of Science and Technology Beijing
University of Science and Technology of China
University of Science and Technology of China
North Carolina State University
Indian Institute of Science
University of Maryland, Baltimore
Complutense University of Madrid
University of Amsterdam
University of South Florida
National Institutes of Health
Thomas Jefferson University
National Institutes of Health
Harvard University
University of South Florida