Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Wiesen, Carina"'
Autor:
Walendy, René, Weber, Markus, Li, Jingjie, Becker, Steffen, Wiesen, Carina, Elson, Malte, Kim, Younghyun, Fawaz, Kassem, Rummel, Nikol, Paar, Christof
Trust in digital systems depends on secure hardware, often assured through Hardware Reverse Engineering (HRE). This work develops methods for investigating human problem-solving processes in HRE, an underexplored yet critical aspect. Since reverse en
Externí odkaz:
http://arxiv.org/abs/2402.15452
Hardware Reverse Engineering (HRE) is a technique for analyzing Integrated Circuits (ICs). Experts employ HRE for security-critical tasks, such as detecting Trojans or intellectual property violations. They rely not only on their experience and custo
Externí odkaz:
http://arxiv.org/abs/2309.05740
Understanding the internals of Integrated Circuits (ICs), referred to as Hardware Reverse Engineering (HRE), is of interest to both legitimate and malicious parties. HRE is a complex process in which semi-automated steps are interwoven with human sen
Externí odkaz:
http://arxiv.org/abs/2105.14943
This full research paper focuses on skill acquisition in Hardware Reverse Engineering (HRE) - an important field of cyber security. HRE is a prevalent technique routinely employed by security engineers (i) to detect malicious hardware manipulations,
Externí odkaz:
http://arxiv.org/abs/2105.13725
Towards Cognitive Obfuscation: Impeding Hardware Reverse Engineering Based on Psychological Insights
Autor:
Wiesen, Carina, Albartus, Nils, Hoffmann, Max, Becker, Steffen, Wallat, Sebastian, Fyrbiak, Marc, Rummel, Nikol, Paar, Christof
Publikováno v:
ASPDAC 2019 Proceedings of the 24th Asia and South Pacific Design Automation Conference Pages 104-111
In contrast to software reverse engineering, there are hardly any tools available that support hardware reversing. Therefore, the reversing process is conducted by human analysts combining several complex semi-automated steps. However, countermeasure
Externí odkaz:
http://arxiv.org/abs/1910.00323
Autor:
Wiesen, Carina, Becker, Steffen, Fyrbiak, Marc, Albartus, Nils, Elson, Malte, Rummel, Nikol, Paar, Christof
Publikováno v:
2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE)
Since underlying hardware components form the basis of trust in virtually any computing system, security failures in hardware pose a devastating threat to our daily lives. Hardware reverse engineering is commonly employed by security engineers in ord
Externí odkaz:
http://arxiv.org/abs/1910.00312
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Mikrochips sind die Grundlage unserer digitalen Gesellschaft, realisieren sicherheitskritische Funktionen und sind daher attraktive Ziele für bösartige Manipulationen. Eine spezifische Methode, um die inneren Strukturen und Funktionalitäten von Mi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______3579::4b7f08f66d570028cca32f516ea9350d
https://hss-opus.ub.ruhr-uni-bochum.de/opus4/files/8490/diss.pdf
https://hss-opus.ub.ruhr-uni-bochum.de/opus4/files/8490/diss.pdf
Autor:
Wiesen, Carina Yasmin
Mikrochips sind die Grundlage unserer digitalen Gesellschaft, realisieren sicherheitskritische Funktionen und sind daher attraktive Ziele f��r b��sartige Manipulationen. Eine spezifische Methode, um die inneren Strukturen und Funktionalit�
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::af4c4b9559baf5b2d49588e6bc68f0f9
Publikováno v:
Datenschutz und Datensicherheit - DuD; Nov2019, Vol. 43 Issue 11, p686-690, 5p