Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Albartus, Nils"'
Autor:
Klix, Simon, Albartus, Nils, Speith, Julian, Staat, Paul, Verstege, Alice, Wilde, Annika, Lammers, Daniel, Langheinrich, Jörn, Kison, Christian, Sester-Wehle, Sebastian, Holcomb, Daniel, Paar, Christof
Intellectual Property (IP) theft is a cause of major financial and reputational damage, reportedly in the range of hundreds of billions of dollars annually in the U.S. alone. Field Programmable Gate Arrays (FPGAs) are particularly exposed to IP theft
Externí odkaz:
http://arxiv.org/abs/2312.06195
Understanding the internals of Integrated Circuits (ICs), referred to as Hardware Reverse Engineering (HRE), is of interest to both legitimate and malicious parties. HRE is a complex process in which semi-automated steps are interwoven with human sen
Externí odkaz:
http://arxiv.org/abs/2105.14943
Autor:
Wallat, Sebastian, Albartus, Nils, Becker, Steffen, Hoffmann, Max, Ender, Maik, Fyrbiak, Marc, Drees, Adrian, Maaßen, Sebastian, Paar, Christof
Publikováno v:
Proceedings of Malicious Software and Hardware in Internet of Things (MAL-IOT 2019). ACM, NewYork, NY, USA, Article 4, 6 pages
Since hardware oftentimes serves as the root of trust in our modern interconnected world, malicious hardware manipulations constitute a ubiquitous threat in the context of the Internet of Things (IoT). Hardware reverse engineering is a prevalent tech
Externí odkaz:
http://arxiv.org/abs/1910.00350
Towards Cognitive Obfuscation: Impeding Hardware Reverse Engineering Based on Psychological Insights
Autor:
Wiesen, Carina, Albartus, Nils, Hoffmann, Max, Becker, Steffen, Wallat, Sebastian, Fyrbiak, Marc, Rummel, Nikol, Paar, Christof
Publikováno v:
ASPDAC 2019 Proceedings of the 24th Asia and South Pacific Design Automation Conference Pages 104-111
In contrast to software reverse engineering, there are hardly any tools available that support hardware reversing. Therefore, the reversing process is conducted by human analysts combining several complex semi-automated steps. However, countermeasure
Externí odkaz:
http://arxiv.org/abs/1910.00323
Autor:
Wiesen, Carina, Becker, Steffen, Fyrbiak, Marc, Albartus, Nils, Elson, Malte, Rummel, Nikol, Paar, Christof
Publikováno v:
2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE)
Since underlying hardware components form the basis of trust in virtually any computing system, security failures in hardware pose a devastating threat to our daily lives. Hardware reverse engineering is commonly employed by security engineers in ord
Externí odkaz:
http://arxiv.org/abs/1910.00312
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Fyrbiak, Marc, Wallat, Sebastian, Déchelotte, Jonathan, Albartus, Nils, Böcker, Sinan, Tessier, Russell, Paar, Christof
Publikováno v:
IACR Trans. Cryptogr. Hardw. Embed. Syst
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2018, Iss 3 (2018)
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2018, Iss 3 (2018)
In today’s Integrated Circuit (IC) production chains, a designer’s valuable Intellectual Property (IP) is transparent to diverse stakeholders and thus inevitably prone to piracy. To protect against this threat, numerous defenses based on the obfu
Autor:
Wallat, Sebastian, Albartus, Nils, Becker, Steffen, Hoffmann, Max, Ender, Maik, Fyrbiak, Marc, Drees, Adrian, Maaßen, Sebastian, Paar, Christof
Publikováno v:
Proceedings of the 16th ACM International Conference on Computing Frontiers
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=sygma_______::bfbb4880c7f3268ce707faccdbd70fa3