Name
Papers
Collaborators
GEORG T. BECKER
19
25
Citations 
PageRank 
Referers 
161
11.47
459
Referees 
References 
274
135
Search Limit
100459
Title
Citations
PageRank
Year
Combining Optimization Objectives: New Modeling Attacks on Strong PUFs.50.492021
dPHI: An improved high-speed network-layer anonymity protocol.20.412020
A critical view on moving target defense and its analogies00.342020
Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited: Theory versus Practice10.372019
Attack Simulation for a Realistic Evaluation and Comparison of Network Security Techniques.00.342018
Bitstream Fault Injections (BiFI) - Automated Fault Attacks against SRAM-based FPGAs.80.492018
Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited: Theory vs Practice.10.372017
The Gap Between Promise And Reality: On The Insecurity Of Xor Arbiter Pufs391.352015
Security analysis of index-based syndrome coding for PUF-based key generation30.392015
Development of a Layout-Level Hardware Obfuscation Tool90.592015
On the Scaling of Machine Learning Attacks on PUFs with Application to Noise Bifurcation.200.812015
Active and Passive Side-Channel Attacks on Delay Based PUF Designs.00.342014
On the Pitfalls of using Arbiter-PUFs as Building Blocks.00.342014
Stealthy dopant-level hardware Trojans: extended version.150.982014
Stealthy dopant-level hardware trojans422.082013
Detecting Software Theft in Embedded Systems: A Side-Channel Approach70.522012
Side channels as building blocks.50.462012
Implementing hardware Trojans: Experiences from a hardware Trojan challenge40.472011
Secure location verification: a security analysis of GPS signal authentication00.342010