Search Results for author: Stefan Mangard

Found 3 papers, 3 papers with code

Meltdown

2 code implementations3 Jan 2018 Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg

The security of computer systems fundamentally relies on memory isolation, e. g., kernel address ranges are marked as non-accessible and are protected from user access.

Cryptography and Security

An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics

4 code implementations18 Dec 2016 Francesco Conti, Robert Schilling, Pasquale Davide Schiavone, Antonio Pullini, Davide Rossi, Frank Kagan Gürkaynak, Michael Muehlberghuber, Michael Gautschi, Igor Loi, Germain Haugou, Stefan Mangard, Luca Benini

Near-sensor data analytics is a promising direction for IoT endpoints, as it minimizes energy spent on communication and reduces network load - but it also poses security concerns, as valuable data is stored or sent over the network at various stages of the analytics pipeline.

EEG Face Detection +1

Flush+Flush: A Fast and Stealthy Cache Attack

2 code implementations14 Nov 2015 Daniel Gruss, Clémentine Maurice, Klaus Wagner, Stefan Mangard

The Flush+Flush attack runs in a higher frequency and thus is faster than any existing cache attack.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.