Zobrazeno 1 - 10
of 36
pro vyhledávání: '"Fyrbiak, Marc"'
Fuzzing is a well-established technique in the software domain to uncover bugs and vulnerabilities. Yet, applications of fuzzing for security vulnerabilities in hardware systems are scarce, as principal reasons are requirements for design information
Externí odkaz:
http://arxiv.org/abs/2402.09845
Autor:
Speith, Julian, Schweins, Florian, Ender, Maik, Fyrbiak, Marc, May, Alexander, Paar, Christof
Modern hardware systems are composed of a variety of third-party Intellectual Property (IP) cores to implement their overall functionality. Since hardware design is a globalized process involving various (untrusted) stakeholders, a secure management
Externí odkaz:
http://arxiv.org/abs/2112.04838
Autor:
Kollenda, Benjamin, Koppe, Philipp, Fyrbiak, Marc, Kison, Christian, Paar, Christof, Holz, Thorsten
Microcode is an abstraction layer used by modern x86 processors that interprets user-visible CISC instructions to hardware-internal RISC instructions. The capability to update x86 microcode enables a vendor to modify CPU behavior in-field, and thus p
Externí odkaz:
http://arxiv.org/abs/2007.03549
Publikováno v:
2017 IEEE 2nd International Verification and Security Workshop (IVSW)
A massive threat to the modern and complex IC production chain is the use of untrusted off-shore foundries which are able to infringe valuable hardware design IP or to inject hardware Trojans causing severe loss of safety and security. Similarly, mar
Externí odkaz:
http://arxiv.org/abs/1910.01519
Autor:
Fyrbiak, Marc, Strauß, Sebastian, Kison, Christian, Wallat, Sebastian, Elson, Malte, Rummel, Nikol, Paar, Christof
Publikováno v:
2017 IEEE 2nd International Verification and Security Workshop (IVSW)
Hardware reverse engineering is a universal tool for both legitimate and illegitimate purposes. On the one hand, it supports confirmation of IP infringement and detection of circuit malicious manipulations, on the other hand it provides adversaries w
Externí odkaz:
http://arxiv.org/abs/1910.01518
Autor:
Koppe, Philipp, Kollenda, Benjamin, Fyrbiak, Marc, Kison, Christian, Gawlik, Robert, Paar, Christof, Holz, Thorsten
Publikováno v:
SEC 2017 Proceedings of the 26th USENIX Conference on Security Symposium Pages 1163-1180
Microcode is an abstraction layer on top of the physical components of a CPU and present in most general-purpose CPUs today. In addition to facilitate complex and vast instruction sets, it also provides an update mechanism that allows CPUs to be patc
Externí odkaz:
http://arxiv.org/abs/1910.00948
Publikováno v:
J Cryptogr Eng (2017) 7: 199
As part of the revelations about the NSA activities, the notion of interdiction has become known to the public: the interception of deliveries to manipulate hardware in a way that backdoors are introduced. Manipulations can occur on the firmware or a
Externí odkaz:
http://arxiv.org/abs/1910.00947
Autor:
Wallat, Sebastian, Albartus, Nils, Becker, Steffen, Hoffmann, Max, Ender, Maik, Fyrbiak, Marc, Drees, Adrian, Maaßen, Sebastian, Paar, Christof
Publikováno v:
Proceedings of Malicious Software and Hardware in Internet of Things (MAL-IOT 2019). ACM, NewYork, NY, USA, Article 4, 6 pages
Since hardware oftentimes serves as the root of trust in our modern interconnected world, malicious hardware manipulations constitute a ubiquitous threat in the context of the Internet of Things (IoT). Hardware reverse engineering is a prevalent tech
Externí odkaz:
http://arxiv.org/abs/1910.00350
Towards Cognitive Obfuscation: Impeding Hardware Reverse Engineering Based on Psychological Insights
Autor:
Wiesen, Carina, Albartus, Nils, Hoffmann, Max, Becker, Steffen, Wallat, Sebastian, Fyrbiak, Marc, Rummel, Nikol, Paar, Christof
Publikováno v:
ASPDAC 2019 Proceedings of the 24th Asia and South Pacific Design Automation Conference Pages 104-111
In contrast to software reverse engineering, there are hardly any tools available that support hardware reversing. Therefore, the reversing process is conducted by human analysts combining several complex semi-automated steps. However, countermeasure
Externí odkaz:
http://arxiv.org/abs/1910.00323
Autor:
Wiesen, Carina, Becker, Steffen, Fyrbiak, Marc, Albartus, Nils, Elson, Malte, Rummel, Nikol, Paar, Christof
Publikováno v:
2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE)
Since underlying hardware components form the basis of trust in virtually any computing system, security failures in hardware pose a devastating threat to our daily lives. Hardware reverse engineering is commonly employed by security engineers in ord
Externí odkaz:
http://arxiv.org/abs/1910.00312