Mario Werner

According to our database1, Mario Werner authored at least 20 papers between 2010 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Automating Seccomp Filter Generation for Linux Applications.
Proceedings of the CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security Workshop, 2021

HECTOR-V: A Heterogeneous CPU Architecture for a Secure RISC-V Execution Environment.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

CrypTag: Thwarting Physical and Logical Memory Vulnerabilities using Cryptographically Colored Memory.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2019
MEAS: memory encryption and authentication secure against side-channel attacks.
J. Cryptogr. Eng., 2019

Efficient FPGA Implementations of LowMC and Picnic.
IACR Cryptol. ePrint Arch., 2019

ScatterCache: Thwarting Cache Attacks via Cache Set Randomization.
Proceedings of the 28th USENIX Security Symposium, 2019

TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Protecting RISC-V Processors against Physical Attacks.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2019

2018
Sponge-Based Control-Flow Protection for IoT Devices.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

Securing conditional branches in the presence of fault attacks.
Proceedings of the 2018 Design, Automation & Test in Europe Conference & Exhibition, 2018

Pointing in the Right Direction - Securing Memory Accesses in a Faulty World.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Transparent Memory Encryption and Authentication.
IACR Cryptol. ePrint Arch., 2017

Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives.
IACR Cryptol. ePrint Arch., 2017

SGXIO: Generic Trusted I/O Path for Intel SGX.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

2016
Side-Channel Plaintext-Recovery Attacks on Leakage-Resilient Encryption.
IACR Cryptol. ePrint Arch., 2016

Concealing Secrets in Embedded Processors Designs.
IACR Cryptol. ePrint Arch., 2016

2015
Protecting the Control Flow of Embedded Processors against Fault Attacks.
Proceedings of the Smart Card Research and Advanced Applications, 2015

2013
8/16/32 Shades of Elliptic Curve Cryptography on Embedded Processors.
Proceedings of the Progress in Cryptology - INDOCRYPT 2013, 2013

2011
Evaluating 16-Bit Processors for Elliptic Curve Cryptography.
Proceedings of the Smart Card Research and Advanced Applications, 2011

2010
Intelligentes Backup/Recovery für virtuelle Umgebungen.
Proceedings of the 40. Jahrestagung der Gesellschaft für Informatik, Service Science - Neue Perspektiven für die Informatik, INFORMATIK 2010, Leipzig, Germany, September 27, 2010


  Loading...