Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

Exploring and Preventing Cryptographic Hardware Backdoors: Protecting the Internet of Things against Next-Generation Attacks

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Publications

Doppelganger Obfuscation — Exploring theDefensive and Offensive Aspects of Hardware Camouflaging (opens in new window)

Author(s): Max Hoffmann, Christof Paar
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, Page(s) 82-108, ISSN 2569-2925
Publisher: IACR Transactions on Cryptographic Hardware and Embedded Systems
DOI: 10.46586/tches.v2021.i1.82-108

Hardware Penetration Testing Knocks Your SoCs Off (opens in new window)

Author(s): Mark Fischer, Fabian Langer, Johannes Mono, Clemens Nasenberg, Nils Albartus
Published in: IEEE Design & Test, Issue 38/1, 2021, Page(s) 14-21, ISSN 2168-2356
Publisher: IEEE Computer Society
DOI: 10.1109/mdat.2020.3013730

A survey of algorithmic methods in IC reverse engineering (opens in new window)

Author(s): Leonid Azriel, Julian Speith, Nils Albartus, Ran Ginosar, Avi Mendelson, Christof Paar
Published in: Journal of Cryptographic Engineering, Issue 11/3, 2021, Page(s) 299-315, ISSN 2190-8508
Publisher: Springer Science + Business Media
DOI: 10.1007/s13389-021-00268-5

LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security (opens in new window)

Author(s): Florian Stolz, Nils Albartus, Julian Speith, Simon Klix, Clemens Nasenberg, Aiden Gula, Marc Fyrbiak, Christof Paar, Tim Güneysu, Russell Tessier
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, Page(s) 412-446, ISSN 2569-2925
Publisher: IACR
DOI: 10.46586/tches.v2021.i4.412-446

Physical Design Obfuscation of Hardware: A Comprehensive Investigation of Device and Logic-Level Techniques (opens in new window)

Author(s): Arunkumar Vijayakumar, Vinay C. Patil, Daniel E. Holcomb, Christof Paar, Sandip Kundu
Published in: IEEE Transactions on Information Forensics and Security, Issue 12/1, 2017, Page(s) 64-77, ISSN 1556-6013
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tifs.2016.2601067

Interdiction in practice—Hardware Trojan against a high-security USB flash drive (opens in new window)

Author(s): Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Amir Moradi, Christof Paar
Published in: Journal of Cryptographic Engineering, Issue 7/3, 2017, Page(s) 199-211, ISSN 2190-8508
Publisher: Springer Science + Business Media
DOI: 10.1007/s13389-016-0132-7

Hybrid Obfuscation to Protect Against Disclosure Attacks on Embedded Microprocessors (opens in new window)

Author(s): Marc Fyrbiak, Simon Rokicki, Nicolai Bissantz, Russell Tessier, Christof Paar
Published in: IEEE Transactions on Computers, Issue 67/3, 2018, Page(s) 307-321, ISSN 0018-9340
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tc.2017.2649520

HAL—The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion (opens in new window)

Author(s): Marc Fyrbiak, Sebastian Wallat, Pawel Swierczynski, Max Hoffmann, Sebastian Hoppach, Matthias Wilhelm, Tobias Weidlich, Russell Tessier, Christof Paar
Published in: IEEE Transactions on Dependable and Secure Computing, Issue 16/3, 2019, Page(s) 498-510, ISSN 1545-5971
Publisher: IEEE Computer Society
DOI: 10.1109/tdsc.2018.2812183

DANA Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering (opens in new window)

Author(s): Nils Albartus, Max Hoffmann,Sebastian Temme,Leonid Azriel,Christof Paar
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, ISSN 2569-2925
Publisher: IACR Transactions on Cryptographic Hardware and Embedded Systems
DOI: 10.13154/tches.v2020.i4.309-336

Graph Similarity and its Applications to Hardware Security (opens in new window)

Author(s): Marc Fyrbiak, Sebastian Wallat, Sascha Reinhard, Nicolai Bissantz, Christof Paar
Published in: IEEE Transactions on Computers, Issue 69/4, 2020, Page(s) 505-519, ISSN 0018-9340
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tc.2019.2953752

ARMORY : Fully Automated and Exhaustive Fault Simulation on ARM-M Binaries (opens in new window)

Author(s): Max Hoffmann, Falk Schellenberg, Christof Paar
Published in: IEEE Transactions on Information Forensics and Security, Issue 16, 2021, Page(s) 1058-1073, ISSN 1556-6013
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tifs.2020.3027143

An Exploratory Study of Hardware Reverse Engineering - Technical and Cognitive Processes

Author(s): Steffen Becker, Carina Wiesen, Nils Albartus, Nikol Rummel, Christof Paar
Published in: Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 2020
Publisher: USENIX Association

The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAs

Author(s): Maik Ender, Amir Moradi, Christof Paar
Published in: 29th USENIX Security Symposium (USENIX Security 20), 2020
Publisher: USENIX Association

Listen to Your Heart: Evaluation of the Cardiologic Ecosystem (opens in new window)

Author(s): Endres Puschner, Christoph Saatjohann, Markus Willing, Christian Dresen, Julia Köbe, Benjamin Rath, Christof Paar, Lars Eckardt, Uwe Haverkamp, Sebastian Schinzel
Published in: The 16th International Conference on Availability, Reliability and Security, 2021, Page(s) 1-10, ISBN 9781450390514
Publisher: ACM
DOI: 10.1145/3465481.3465753

Promoting the Acquisition of Hardware Reverse Engineering Skills (opens in new window)

Author(s): Carina Wiesen, Steffen Becker, Nils Albartus, Christof Paar, Nikol Rummel
Published in: 2019 IEEE Frontiers in Education Conference (FIE), 2019, Page(s) 1-9, ISBN 978-1-7281-1746-1
Publisher: IEEE
DOI: 10.1109/fie43999.2019.9028668

On the Design and Misuse of Microcoded (Embedded) Processors — A Cautionary Note

Author(s): Nils Albartus, Clemens Nasenberg, Florian Stolz, Marc Fyrbiak, Christof Paar, Russell Tessier
Published in: 30th USENIX Security Symposium (USENIX Security 21), 2021
Publisher: USENIX Association

On the Design and Misuse of Microcoded (Embedded) Processors — A Cautionary Note

Author(s): Nils Albartus, Clemens Nasenberg, Florian Stolz, Christof Paar, Russell Tessier
Published in: 30TH Usenix Security Symposium, 2021
Publisher: USENIX

An Exploratory Analysis of Microcode as a Building Block for System Defenses (opens in new window)

Author(s): Benjamin Kollenda, Philipp Koppe, Marc Fyrbiak, Christian Kison, Christof Paar, Thorsten Holz
Published in: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS '18, 2018, Page(s) 1649-1666, ISBN 9781-450356930
Publisher: ACM Press
DOI: 10.1145/3243734.3243861

A look at the dark side of hardware reverse engineering - a case study (opens in new window)

Author(s): Sebastian Wallat, Marc Fyrbiak, Moritz Schlogel, Christof Paar
Published in: 2017 IEEE 2nd International Verification and Security Workshop (IVSW), 2017, Page(s) 95-100, ISBN 978-1-5386-1708-3
Publisher: IEEE
DOI: 10.1109/ivsw.2017.8031551

SAT-based reverse engineering of gate-level schematics using fault injection and probing (opens in new window)

Author(s): Shahrzad Keshavarz, Falk Schellenberg, Bastian Richte, Christof Paar, Daniel Holcomb
Published in: 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2018, Page(s) 215-220, ISBN 978-1-5386-4731-8
Publisher: IEEE
DOI: 10.1109/hst.2018.8383918

The First Thorough Side-Channel Hardware Trojan (opens in new window)

Author(s): Maik Ender, Samaneh Ghandali, Amir Moradi, Christof Paar
Published in: Advances in Cryptology – ASIACRYPT 2017, Issue 10624, 2017, Page(s) 755-780, ISBN 978-3-319-70693-1
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-70694-8_26

Design automation for obfuscated circuits with multiple viable functions (opens in new window)

Author(s): Shahrzad Keshavarz, Christof Paar, Daniel Holcomb
Published in: Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017, 2017, Page(s) 886-889, ISBN 978-3-9815370-8-6
Publisher: IEEE
DOI: 10.23919/date.2017.7927112

Hardware Trojans and Other Threats against Embedded Systems (opens in new window)

Author(s): Christof Paar
Published in: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17, 2017, Page(s) 1-1, ISBN 9781-450349444
Publisher: ACM Press
DOI: 10.1145/3052973.3053885

Hardware reverse engineering: Overview and open challenges (opens in new window)

Author(s): Marc Fyrbiak, Sebastian Strauss, Christian Kison, Sebastian Wallat, Malte Elson, Nikol Rummel, Christof Paar
Published in: 2017 IEEE 2nd International Verification and Security Workshop (IVSW), 2017, Page(s) 88-94, ISBN 978-1-5386-1708-3
Publisher: IEEE
DOI: 10.1109/ivsw.2017.8031550

Reverse Engineering x86 Processor Microcode

Author(s): Philipp Koppe, Benjamin Kollenda, Marc Fyrbiak, Christian Kison, Robert Gawlik, Christof Paar, Thorsten Holz
Published in: 26th USENIX Security Symposium, Issue 2017, 2017, Page(s) 1163-1180
Publisher: USENIX Association

On the Difficulty of FSM-based Hardware Obfuscation (opens in new window)

Author(s): Marc Fyrbiak, Sebastian Wallat, Jonathan Déchelotte, Nils Albartus, Sinan Böcker, Russell Tessier, Christof Paar
Published in: IACR Trans. Cryptogr. Hardw. Embed. Syst, Issue 3, 2018, Page(s) 293-330
Publisher: IACR
DOI: 10.13154/tches.v2018.i3.293-330

Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead (opens in new window)

Author(s): Max Hoffmann, Christof Paar
Published in: IACR Trans. Cryptogr. Hardw. Embed. Syst., Issue 2, 2018, Page(s) 277-297
Publisher: IACR
DOI: 10.13154/tches.v2018.i2.277-297

Highway to HAL - open-sourcing the first extendable gate-level netlist reverse engineering framework (opens in new window)

Author(s): Sebastian Wallat, Nils Albartus, Steffen Becker, Max Hoffmann, Maik Ender, Marc Fyrbiak, Adrian Drees, Sebastian Maaßen, Christof Paar
Published in: Proceedings of the 16th ACM International Conference on Computing Frontiers - CF '19, 2019, Page(s) 392-397, ISBN 9781450366854
Publisher: ACM Press
DOI: 10.1145/3310273.3323419

Insights into the mind of a trojan designer - the challenge to integrate a trojan into the bitstream (opens in new window)

Author(s): Maik Ender, Pawel Swierczynski, Sebastian Wallat, Matthias Wilhelm, Paul Martin Knopp, Christof Paar
Published in: Proceedings of the 24th Asia and South Pacific Design Automation Conference on - ASPDAC '19, 2019, Page(s) 112-119, ISBN 9781-450360074
Publisher: ACM Press
DOI: 10.1145/3287624.3288742

Towards cognitive obfuscation - impeding hardware reverse engineering based on psychological insights (opens in new window)

Author(s): Carina Wiesen, Nils Albartus, Max Hoffmann, Steffen Becker, Sebastian Wallat, Marc Fyrbiak, Nikol Rummel, Christof Paar
Published in: Proceedings of the 24th Asia and South Pacific Design Automation Conference on - ASPDAC '19, 2019, Page(s) 104-111, ISBN 9781-450360074
Publisher: ACM Press
DOI: 10.1145/3287624.3288741

Teaching Hardware Reverse Engineering: Educational Guidelines and Practical Insights (opens in new window)

Author(s): Carina Wiesen, Steffen Becker, Marc Fyrbiak, Nils Albartus, Malte Elson, Nikol Rummel, Christof Paar
Published in: 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE), 2018, Page(s) 438-445, ISBN 978-1-5386-6522-0
Publisher: IEEE
DOI: 10.1109/tale.2018.8615270

SPFA: SFA on Multiple Persistent Faults (opens in new window)

Author(s): Susanne Engels, Falk Schellenberg, Christof Paar
Published in: 2020 Workshop on Fault Detection and Tolerance in Cryptography (FDTC), 2020, Page(s) 49-56, ISBN 978-1-7281-9562-9
Publisher: IEEE
DOI: 10.1109/fdtc51366.2020.00014

A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks (opens in new window)

Author(s): Samaneh Ghandali, Georg T. Becker, Daniel Holcomb, Christof Paar
Published in: Cryptographic Hardware and Embedded Systems – CHES 2016, Issue 9813, 2016, Page(s) 625-647, ISBN 978-3-662-53139-6
Publisher: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-53140-2_30

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0