Combining Optimization Objectives: New Modeling Attacks on Strong PUFs. | 5 | 0.49 | 2021 |
dPHI: An improved high-speed network-layer anonymity protocol. | 2 | 0.41 | 2020 |
A critical view on moving target defense and its analogies | 0 | 0.34 | 2020 |
Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited: Theory versus Practice | 1 | 0.37 | 2019 |
Attack Simulation for a Realistic Evaluation and Comparison of Network Security Techniques. | 0 | 0.34 | 2018 |
Bitstream Fault Injections (BiFI) - Automated Fault Attacks against SRAM-based FPGAs. | 8 | 0.49 | 2018 |
Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited: Theory vs Practice. | 1 | 0.37 | 2017 |
The Gap Between Promise And Reality: On The Insecurity Of Xor Arbiter Pufs | 39 | 1.35 | 2015 |
Security analysis of index-based syndrome coding for PUF-based key generation | 3 | 0.39 | 2015 |
Development of a Layout-Level Hardware Obfuscation Tool | 9 | 0.59 | 2015 |
On the Scaling of Machine Learning Attacks on PUFs with Application to Noise Bifurcation. | 20 | 0.81 | 2015 |
Active and Passive Side-Channel Attacks on Delay Based PUF Designs. | 0 | 0.34 | 2014 |
On the Pitfalls of using Arbiter-PUFs as Building Blocks. | 0 | 0.34 | 2014 |
Stealthy dopant-level hardware Trojans: extended version. | 15 | 0.98 | 2014 |
Stealthy dopant-level hardware trojans | 42 | 2.08 | 2013 |
Detecting Software Theft in Embedded Systems: A Side-Channel Approach | 7 | 0.52 | 2012 |
Side channels as building blocks. | 5 | 0.46 | 2012 |
Implementing hardware Trojans: Experiences from a hardware Trojan challenge | 4 | 0.47 | 2011 |
Secure location verification: a security analysis of GPS signal authentication | 0 | 0.34 | 2010 |