Zobrazeno 1 - 10
of 23
pro vyhledávání: '"Georg T. Becker"'
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2021, Iss 2 (2021)
Strong Physical Unclonable Functions (PUFs), as a promising security primitive, are supposed to be a lightweight alternative to classical cryptography for purposes such as device authentication. Most of the proposed candidates, however, have been pla
Externí odkaz:
https://doaj.org/article/5911a0e22d1a44cab78640c4fc058140
Autor:
Georg T. Becker, Alexander Bajic
Publikováno v:
International Journal of Information Security. 21:253-278
With numbers of exploitable vulnerabilities and attacks on networks constantly increasing, it is important to employ defensive techniques to protect one’s systems. A wide range of defenses are available and new paradigms such as Moving Target Defen
Autor:
Georg T. Becker, Alexander Bajic
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2020, Iss 3, Pp 304-326 (2020)
The Internet infrastructure has not been built with security or privacy in mind. As a result, an adversary who has control over a single Autonomous System can set-up mass surveillance systems to gather meta data by passively collecting the headers of
Autor:
Georg T. Becker
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 16:783-795
Fuzzy extractors have been proposed in 2004 by Dodis et al. as a secure way to generate cryptographic keys from noisy sources. In recent years, fuzzy extractors have become an important building block in hardware security due to their use in secure k
Autor:
Alexander Bajic, Georg T. Becker
Publikováno v:
CF
In the last decade the Moving Target Defense (MTD) has gained popularity as a new cyber security defense paradigm. Moving Target Defense (MTD) intends to change the (presumable) information asymmetry between attacker and defender in favor of the defe
Autor:
Johannes Tobisch, Tudor A. A. Soroceanu, Benjamin Zengin, Nils Wisiol, Georg T. Becker, Marian Margraf
Publikováno v:
Smart Card Research and Advanced Applications ISBN: 9783030420673
CARDIS
CARDIS
Physical Unclonable Functions (PUFs) and, in particular, strong PUFs such as the XOR Arbiter PUF have gained much research interest as an authentication mechanism for embedded systems. One of the biggest problems of strong PUFs is their vulnerability
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::59d2ec9a91a347337da8c4650a98edc0
https://doi.org/10.1007/978-3-030-42068-0_3
https://doi.org/10.1007/978-3-030-42068-0_3
Publikováno v:
IEEE Transactions on Computers. 67:348-360
This contribution is concerned with the question whether an adversary can automatically manipulate an unknown FPGA bitstream realizing a cryptographic primitive such that the underlying secret key is revealed. In general, if an attacker has full know
Autor:
Georg T. Becker, Alexander Bajic
Publikováno v:
Secure IT Systems ISBN: 9783030036379
NordSec
NordSec
New network security techniques and strategies, such as Moving Target Defense (MTD), with promising narratives and concepts emerge on a regular basis. From a practical point of view, some of the most essential questions in judging a new defense techn
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bee519794b6e2418d510211fdbc81f2d
https://doi.org/10.1007/978-3-030-03638-6_15
https://doi.org/10.1007/978-3-030-03638-6_15
Autor:
Georg T. Becker
Publikováno v:
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 34:1295-1307
Physical unclonable functions (PUFs) have emerged as a promising solution for securing resource-constrained embedded devices such as RFID tokens. PUFs use the inherent physical differences of every chip to either securely authenticate the chip or gen
Publikováno v:
FPL
Physical Unclonable Functions (PUFs) have gained a lot of research attention in recent years resulting in many different PUF proposals. Several of these proposals were aimed specifically at FPGA implementations. However, often these PUFs are evaluate