Skip to main content
European Commission logo
English English
CORDIS - EU research results
CORDIS
CORDIS Web 30th anniversary CORDIS Web 30th anniversary

Exploring and Preventing Cryptographic Hardware Backdoors: Protecting the Internet of Things against Next-Generation Attacks

Publications

Doppelganger Obfuscation — Exploring theDefensive and Offensive Aspects of Hardware Camouflaging

Author(s): Max Hoffmann, Christof Paar
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, Page(s) 82-108, ISSN 2569-2925
Publisher: IACR Transactions on Cryptographic Hardware and Embedded Systems
DOI: 10.46586/tches.v2021.i1.82-108

Hardware Penetration Testing Knocks Your SoCs Off

Author(s): Mark Fischer, Fabian Langer, Johannes Mono, Clemens Nasenberg, Nils Albartus
Published in: IEEE Design & Test, Issue 38/1, 2021, Page(s) 14-21, ISSN 2168-2356
Publisher: IEEE Computer Society
DOI: 10.1109/mdat.2020.3013730

A survey of algorithmic methods in IC reverse engineering

Author(s): Leonid Azriel, Julian Speith, Nils Albartus, Ran Ginosar, Avi Mendelson, Christof Paar
Published in: Journal of Cryptographic Engineering, Issue 11/3, 2021, Page(s) 299-315, ISSN 2190-8508
Publisher: Springer Science + Business Media
DOI: 10.1007/s13389-021-00268-5

LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security

Author(s): Florian Stolz, Nils Albartus, Julian Speith, Simon Klix, Clemens Nasenberg, Aiden Gula, Marc Fyrbiak, Christof Paar, Tim Güneysu, Russell Tessier
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, Page(s) 412-446, ISSN 2569-2925
Publisher: IACR
DOI: 10.46586/tches.v2021.i4.412-446

Physical Design Obfuscation of Hardware: A Comprehensive Investigation of Device and Logic-Level Techniques

Author(s): Arunkumar Vijayakumar, Vinay C. Patil, Daniel E. Holcomb, Christof Paar, Sandip Kundu
Published in: IEEE Transactions on Information Forensics and Security, Issue 12/1, 2017, Page(s) 64-77, ISSN 1556-6013
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tifs.2016.2601067

Interdiction in practice—Hardware Trojan against a high-security USB flash drive

Author(s): Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Amir Moradi, Christof Paar
Published in: Journal of Cryptographic Engineering, Issue 7/3, 2017, Page(s) 199-211, ISSN 2190-8508
Publisher: Springer Science + Business Media
DOI: 10.1007/s13389-016-0132-7

Hybrid Obfuscation to Protect Against Disclosure Attacks on Embedded Microprocessors

Author(s): Marc Fyrbiak, Simon Rokicki, Nicolai Bissantz, Russell Tessier, Christof Paar
Published in: IEEE Transactions on Computers, Issue 67/3, 2018, Page(s) 307-321, ISSN 0018-9340
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tc.2017.2649520

HAL—The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion

Author(s): Marc Fyrbiak, Sebastian Wallat, Pawel Swierczynski, Max Hoffmann, Sebastian Hoppach, Matthias Wilhelm, Tobias Weidlich, Russell Tessier, Christof Paar
Published in: IEEE Transactions on Dependable and Secure Computing, Issue 16/3, 2019, Page(s) 498-510, ISSN 1545-5971
Publisher: IEEE Computer Society
DOI: 10.1109/tdsc.2018.2812183

DANA Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering

Author(s): Nils Albartus, Max Hoffmann,Sebastian Temme,Leonid Azriel,Christof Paar
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, ISSN 2569-2925
Publisher: IACR Transactions on Cryptographic Hardware and Embedded Systems
DOI: 10.13154/tches.v2020.i4.309-336

Graph Similarity and its Applications to Hardware Security

Author(s): Marc Fyrbiak, Sebastian Wallat, Sascha Reinhard, Nicolai Bissantz, Christof Paar
Published in: IEEE Transactions on Computers, Issue 69/4, 2020, Page(s) 505-519, ISSN 0018-9340
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tc.2019.2953752

ARMORY : Fully Automated and Exhaustive Fault Simulation on ARM-M Binaries

Author(s): Max Hoffmann, Falk Schellenberg, Christof Paar
Published in: IEEE Transactions on Information Forensics and Security, Issue 16, 2021, Page(s) 1058-1073, ISSN 1556-6013
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tifs.2020.3027143

An Exploratory Study of Hardware Reverse Engineering - Technical and Cognitive Processes

Author(s): Steffen Becker, Carina Wiesen, Nils Albartus, Nikol Rummel, Christof Paar
Published in: Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 2020
Publisher: USENIX Association

The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAs

Author(s): Maik Ender, Amir Moradi, Christof Paar
Published in: 29th USENIX Security Symposium (USENIX Security 20), 2020
Publisher: USENIX Association

Listen to Your Heart: Evaluation of the Cardiologic Ecosystem

Author(s): Endres Puschner, Christoph Saatjohann, Markus Willing, Christian Dresen, Julia Köbe, Benjamin Rath, Christof Paar, Lars Eckardt, Uwe Haverkamp, Sebastian Schinzel
Published in: The 16th International Conference on Availability, Reliability and Security, 2021, Page(s) 1-10, ISBN 9781450390514
Publisher: ACM
DOI: 10.1145/3465481.3465753

Promoting the Acquisition of Hardware Reverse Engineering Skills

Author(s): Carina Wiesen, Steffen Becker, Nils Albartus, Christof Paar, Nikol Rummel
Published in: 2019 IEEE Frontiers in Education Conference (FIE), 2019, Page(s) 1-9, ISBN 978-1-7281-1746-1
Publisher: IEEE
DOI: 10.1109/fie43999.2019.9028668

On the Design and Misuse of Microcoded (Embedded) Processors — A Cautionary Note

Author(s): Nils Albartus, Clemens Nasenberg, Florian Stolz, Marc Fyrbiak, Christof Paar, Russell Tessier
Published in: 30th USENIX Security Symposium (USENIX Security 21), 2021
Publisher: USENIX Association

On the Design and Misuse of Microcoded (Embedded) Processors — A Cautionary Note

Author(s): Nils Albartus, Clemens Nasenberg, Florian Stolz, Christof Paar, Russell Tessier
Published in: 30TH Usenix Security Symposium, 2021
Publisher: USENIX

An Exploratory Analysis of Microcode as a Building Block for System Defenses

Author(s): Benjamin Kollenda, Philipp Koppe, Marc Fyrbiak, Christian Kison, Christof Paar, Thorsten Holz
Published in: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS '18, 2018, Page(s) 1649-1666, ISBN 9781-450356930
Publisher: ACM Press
DOI: 10.1145/3243734.3243861

A look at the dark side of hardware reverse engineering - a case study

Author(s): Sebastian Wallat, Marc Fyrbiak, Moritz Schlogel, Christof Paar
Published in: 2017 IEEE 2nd International Verification and Security Workshop (IVSW), 2017, Page(s) 95-100, ISBN 978-1-5386-1708-3
Publisher: IEEE
DOI: 10.1109/ivsw.2017.8031551

SAT-based reverse engineering of gate-level schematics using fault injection and probing

Author(s): Shahrzad Keshavarz, Falk Schellenberg, Bastian Richte, Christof Paar, Daniel Holcomb
Published in: 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2018, Page(s) 215-220, ISBN 978-1-5386-4731-8
Publisher: IEEE
DOI: 10.1109/hst.2018.8383918

The First Thorough Side-Channel Hardware Trojan

Author(s): Maik Ender, Samaneh Ghandali, Amir Moradi, Christof Paar
Published in: Advances in Cryptology – ASIACRYPT 2017, Issue 10624, 2017, Page(s) 755-780, ISBN 978-3-319-70693-1
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-70694-8_26

Design automation for obfuscated circuits with multiple viable functions

Author(s): Shahrzad Keshavarz, Christof Paar, Daniel Holcomb
Published in: Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017, 2017, Page(s) 886-889, ISBN 978-3-9815370-8-6
Publisher: IEEE
DOI: 10.23919/date.2017.7927112

Hardware Trojans and Other Threats against Embedded Systems

Author(s): Christof Paar
Published in: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17, 2017, Page(s) 1-1, ISBN 9781-450349444
Publisher: ACM Press
DOI: 10.1145/3052973.3053885

Hardware reverse engineering: Overview and open challenges

Author(s): Marc Fyrbiak, Sebastian Strauss, Christian Kison, Sebastian Wallat, Malte Elson, Nikol Rummel, Christof Paar
Published in: 2017 IEEE 2nd International Verification and Security Workshop (IVSW), 2017, Page(s) 88-94, ISBN 978-1-5386-1708-3
Publisher: IEEE
DOI: 10.1109/ivsw.2017.8031550

Reverse Engineering x86 Processor Microcode

Author(s): Philipp Koppe, Benjamin Kollenda, Marc Fyrbiak, Christian Kison, Robert Gawlik, Christof Paar, Thorsten Holz
Published in: 26th USENIX Security Symposium, Issue 2017, 2017, Page(s) 1163-1180
Publisher: USENIX Association

On the Difficulty of FSM-based Hardware Obfuscation

Author(s): Marc Fyrbiak, Sebastian Wallat, Jonathan Déchelotte, Nils Albartus, Sinan Böcker, Russell Tessier, Christof Paar
Published in: IACR Trans. Cryptogr. Hardw. Embed. Syst, Issue 3, 2018, Page(s) 293-330
Publisher: IACR
DOI: 10.13154/tches.v2018.i3.293-330

Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead

Author(s): Max Hoffmann, Christof Paar
Published in: IACR Trans. Cryptogr. Hardw. Embed. Syst., Issue 2, 2018, Page(s) 277-297
Publisher: IACR
DOI: 10.13154/tches.v2018.i2.277-297

Highway to HAL - open-sourcing the first extendable gate-level netlist reverse engineering framework

Author(s): Sebastian Wallat, Nils Albartus, Steffen Becker, Max Hoffmann, Maik Ender, Marc Fyrbiak, Adrian Drees, Sebastian Maaßen, Christof Paar
Published in: Proceedings of the 16th ACM International Conference on Computing Frontiers - CF '19, 2019, Page(s) 392-397, ISBN 9781-450366854
Publisher: ACM Press
DOI: 10.1145/3310273.3323419

Insights into the mind of a trojan designer - the challenge to integrate a trojan into the bitstream

Author(s): Maik Ender, Pawel Swierczynski, Sebastian Wallat, Matthias Wilhelm, Paul Martin Knopp, Christof Paar
Published in: Proceedings of the 24th Asia and South Pacific Design Automation Conference on - ASPDAC '19, 2019, Page(s) 112-119, ISBN 9781-450360074
Publisher: ACM Press
DOI: 10.1145/3287624.3288742

Towards cognitive obfuscation - impeding hardware reverse engineering based on psychological insights

Author(s): Carina Wiesen, Nils Albartus, Max Hoffmann, Steffen Becker, Sebastian Wallat, Marc Fyrbiak, Nikol Rummel, Christof Paar
Published in: Proceedings of the 24th Asia and South Pacific Design Automation Conference on - ASPDAC '19, 2019, Page(s) 104-111, ISBN 9781-450360074
Publisher: ACM Press
DOI: 10.1145/3287624.3288741

Teaching Hardware Reverse Engineering: Educational Guidelines and Practical Insights

Author(s): Carina Wiesen, Steffen Becker, Marc Fyrbiak, Nils Albartus, Malte Elson, Nikol Rummel, Christof Paar
Published in: 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE), 2018, Page(s) 438-445, ISBN 978-1-5386-6522-0
Publisher: IEEE
DOI: 10.1109/tale.2018.8615270

SPFA: SFA on Multiple Persistent Faults

Author(s): Susanne Engels, Falk Schellenberg, Christof Paar
Published in: 2020 Workshop on Fault Detection and Tolerance in Cryptography (FDTC), 2020, Page(s) 49-56, ISBN 978-1-7281-9562-9
Publisher: IEEE
DOI: 10.1109/fdtc51366.2020.00014

A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks

Author(s): Samaneh Ghandali, Georg T. Becker, Daniel Holcomb, Christof Paar
Published in: Cryptographic Hardware and Embedded Systems – CHES 2016, Issue 9813, 2016, Page(s) 625-647, ISBN 978-3-662-53139-6
Publisher: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-53140-2_30

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available