Source Themes
Hardware Extensions and Compiler Support for Protection Against Fault Attacks
Software is ubiquitous in all applications of modern lives. The correct execution of software is essential for the functionality and …
Robert Schilling
PDF
Cite
Slides
Multi-Tag: A Hardware-Software Co-Design for Memory Safety based on Multi-Granular Memory Tagging
Memory safety vulnerabilities are a severe threat to modern computer systems allowing adversaries to leak or modify security-critical …
Martin Unterguggenberger
,
David Schrammel
,
Pascal Nasahl
,
Robert Schilling
,
Lukas Lamster
,
Stefan Mangard
PDF
Cite
DOI
SCFI: State Machine Control-Flow Hardening Against Fault Attacks
Fault injection (FI) is a powerful attack methodology allowing an adversary to entirely break the security of a target device. As …
Pascal Nasahl
,
Martin Unterguggenberger
,
Rishub Nagpal
,
Robert Schilling
,
David Schrammel
,
Stefan Mangard
PDF
Cite
DOI
SFP: Providing System Call Flow Protection against Software and Fault Attacks
With the improvements in computing technologies, edge devices in the Internet-of-Things or the automotive area have become more …
Robert Schilling
,
Pascal Nasahl
,
Martin Unterguggenberger
,
Stefan Mangard
PDF
Cite
DOI
FIPAC: Thwarting Fault- and Software-Induced Control-Flow Attacks with ARM Pointer Authentication
With improvements in computing technology, more and more applications in the Internet-of-Things, mobile devices, or automotive area …
Robert Schilling
,
Pascal Nasahl
,
Stefan Mangard
PDF
Cite
DOI
Protecting Indirect Branches Against Fault Attacks Using ARM Pointer Authentication
With the growing number of embedded devices deployed in safety- and privacy-sensitive applications, such as in the automotive area or …
Pascal Nasahl
,
Robert Schilling
,
Stefan Mangard
PDF
Cite
DOI
SecWalk: Protecting Page Table Walks Against Fault Attacks
The correct execution of a memory load and store is essential for the flawless execution of a program. However, as soon as devices are …
Robert Schilling
,
Pascal Nasahl
,
Stefan Weiglhofer
,
Stefan Mangard
PDF
Cite
DOI
CrypTag: Thwarting Physical and Logical Memory Vulnerabilities using Cryptographically Colored Memory
Memory vulnerabilities are a major threat to many computing systems. To effectively thwart spatial and temporal memory vulnerabilities, …
Pascal Nasahl
,
Robert Schilling
,
Mario Werner
,
Jan Hoogerbrugge
,
Marcel Medwed
,
Stefan Mangard
PDF
Cite
Slides
DOI
HECTOR-V: A Heterogeneous CPU Architecture for a Secure RISC-V
To ensure secure and trustworthy execution of applications in potentially insecure environments, vendors frequently embed trusted …
Pascal Nasahl
,
Robert Schilling
,
Mario Werner
,
Stefan Mangard
PDF
Cite
DOI
ConTExT: A Generic Approach for Mitigating Spectre
Out-of-order execution and speculative execution are among the biggest contributors to performance and efficiency of modern processors. …
Michael Schwarz
,
Moritz Lipp
,
Claudio Canella
,
Robert Schilling
,
Florian Kargl
,
Daniel Gruss
PDF
Cite
DOI
»
Cite
×