TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 9.

Schaller, André and Xiong, Wenjie and Anagnostopoulos, Nikolaos Athanasios and Saleem, Umair and Gabmeyer, Sebastian and Skoric, Boris and Katzenbeisser, Stefan and Szefer, Jakub (2018):
Decay-Based DRAM PUFs in Commodity Devices.
In: IEEE Transactions on Dependable and Secure Computing (TDSC), [Article]

Anagnostopoulos, Nikolaos Athanasios and Arul, Tolga and Fan, Yufan and Hatzfeld, Christian and Schaller, André and Xiong, Wenjie and Jain, Manishkumar and Saleem, Umair and Lotichius, Jan and Gabmeyer, Sebastian and Szefer, Jakub and Katzenbeisser, Stefan (2018):
Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security.
In: Cryptography, MDPI, 2, (3), ISSN 2410-387X,
DOI: 10.3390/cryptography2030013,
[Online-Edition: http://www.mdpi.com/2410-387X/2/3/13/htm],
[Article]

Matyunin, Nikolay and Szefer, Jakub and Katzenbeisser, Stefan (2018):
Zero-permission acoustic cross-device tracking.
In: 2018 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2018, Washington, DC, USA, April 30 - May 4, 2018, DOI: 10.1109/HST.2018.8383887,
[Online-Edition: https://doi.org/10.1109/HST.2018.8383887],
[Conference or Workshop Item]

Anagnostopoulos, Nikolaos Athanasios and Schaller, André and Fan, Yufan and Xiong, Wenjie and Tehranipoor, Fatemeh and Arul, Tolga and Gabmeyer, Sebastian and Szefer, Jakub and Chandy, John A. and Katzenbeisser, Stefan (2017):
Insights into the Potential Usage of the Initial Values of DRAM Arrays of Commercial Off-the-Shelf Devices for Security Applications.
In: 26th Crypto-Day, [Conference or Workshop Item]

Schaller, André and Xiong, Wenjie and Anagnostopoulos, Nikolaos Athanasios and Saleem, Umair and Gabmeyer, Sebastian and Katzenbeisser, Stefan and Szefer, Jakub (2017):
Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security.
In: 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), Institute of Electrical and Electronics Engineers (IEEE), McLean, VA, USA, [Conference or Workshop Item]

Schaller, André and Xiong, Wenjie and Gabmeyer, Sebastian and Anagnostopoulos, Nikolaos Athanasios and Saleem, Umair and Katzenbeisser, Stefan and Szefer, Jakub
Gierlichs, Benedikt and Poschmann, Axel (eds.) (2016):
Run-time Accessible DRAM PUFs in Commodity Devices.
In: Cryptographic Hardware and Embedded Systems (CHES 2016), Springer, Santa Barbara, California, USA, In: Lecture Notes in Computer Science (LNCS), 9813, ISBN 978-3-662-53140-2,
DOI: 10.1007/978-3-662-53140-2_21,
[Conference or Workshop Item]

Matyunin, Nikolay and Szefer, Jakub and Biedermann, Sebastian and Katzenbeisser, Stefan (2016):
Covert channels using mobile device's magnetic field sensors.
In: 21st Asia and South Pacific Design Automation Conference, ASP-DAC 2016, Macao, Macao, January 25-28, 2016, DOI: 10.1109/ASPDAC.2016.7428065,
[Online-Edition: https://doi.org/10.1109/ASPDAC.2016.7428065],
[Conference or Workshop Item]

Biedermann, Sebastian and Katzenbeisser, Stefan and Szefer, Jakub (2015):
Hard Drive Side-Channel Attacks using Smartphone Magnetic Field Sensors.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015, pp. 5-13, [Article]

Biedermann, Sebastian and Katzenbeisser, Stefan and Szefer, Jakub (2014):
Hot-Hardening: Getting More Out of Your Security Settings.
In: Proceedings of the 30th Annual Computer Security Applications Conference, ACM, New Orleans, Louisiana, USA, In: ACSAC '14, ISBN 978-1-4503-3005-3,
DOI: 10.1145/2664243.2664246,
[Conference or Workshop Item]

This list was generated on Tue Jun 25 00:23:27 2019 CEST.