Skip to main content

Exploring and Preventing Cryptographic Hardware Backdoors: Protecting the Internet of Things against Next-Generation Attacks

Searching for OpenAIRE data...

Publications

An Exploratory Analysis of Microcode as a Building Block for System Defenses

Author(s): Benjamin Kollenda, Philipp Koppe, Marc Fyrbiak, Christian Kison, Christof Paar, Thorsten Holz
Published in: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS '18, 2018, Page(s) 1649-1666
DOI: 10.1145/3243734.3243861

A look at the dark side of hardware reverse engineering - a case study

Author(s): Sebastian Wallat, Marc Fyrbiak, Moritz Schlogel, Christof Paar
Published in: 2017 IEEE 2nd International Verification and Security Workshop (IVSW), 2017, Page(s) 95-100
DOI: 10.1109/ivsw.2017.8031551

SAT-based reverse engineering of gate-level schematics using fault injection and probing

Author(s): Shahrzad Keshavarz, Falk Schellenberg, Bastian Richte, Christof Paar, Daniel Holcomb
Published in: 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2018, Page(s) 215-220
DOI: 10.1109/hst.2018.8383918

Design automation for obfuscated circuits with multiple viable functions

Author(s): Shahrzad Keshavarz, Christof Paar, Daniel Holcomb
Published in: Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017, 2017, Page(s) 886-889
DOI: 10.23919/date.2017.7927112

Hardware Trojans and Other Threats against Embedded Systems

Author(s): Christof Paar
Published in: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17, 2017, Page(s) 1-1
DOI: 10.1145/3052973.3053885

Hardware reverse engineering: Overview and open challenges

Author(s): Marc Fyrbiak, Sebastian Strauss, Christian Kison, Sebastian Wallat, Malte Elson, Nikol Rummel, Christof Paar
Published in: 2017 IEEE 2nd International Verification and Security Workshop (IVSW), 2017, Page(s) 88-94
DOI: 10.1109/ivsw.2017.8031550

Reverse Engineering x86 Processor Microcode

Author(s): Philipp Koppe, Benjamin Kollenda, Marc Fyrbiak, Christian Kison, Robert Gawlik, Christof Paar, Thorsten Holz
Published in: 26th USENIX Security Symposium, Issue 2017, 2017, Page(s) 1163-1180

On the Difficulty of FSM-based Hardware Obfuscation

Author(s): Marc Fyrbiak, Sebastian Wallat, Jonathan Déchelotte, Nils Albartus, Sinan Böcker, Russell Tessier, Christof Paar
Published in: IACR Trans. Cryptogr. Hardw. Embed. Syst, Issue 3, 2018, Page(s) 293-330
DOI: 10.13154/tches.v2018.i3.293-330

Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead

Author(s): Max Hoffmann, Christof Paar
Published in: IACR Trans. Cryptogr. Hardw. Embed. Syst., Issue 2, 2018, Page(s) 277-297
DOI: 10.13154/tches.v2018.i2.277-297

Highway to HAL - open-sourcing the first extendable gate-level netlist reverse engineering framework

Author(s): Sebastian Wallat, Nils Albartus, Steffen Becker, Max Hoffmann, Maik Ender, Marc Fyrbiak, Adrian Drees, Sebastian Maaßen, Christof Paar
Published in: Proceedings of the 16th ACM International Conference on Computing Frontiers - CF '19, 2019, Page(s) 392-397
DOI: 10.1145/3310273.3323419

Insights into the mind of a trojan designer - the challenge to integrate a trojan into the bitstream

Author(s): Maik Ender, Pawel Swierczynski, Sebastian Wallat, Matthias Wilhelm, Paul Martin Knopp, Christof Paar
Published in: Proceedings of the 24th Asia and South Pacific Design Automation Conference on - ASPDAC '19, 2019, Page(s) 112-119
DOI: 10.1145/3287624.3288742

Towards cognitive obfuscation - impeding hardware reverse engineering based on psychological insights

Author(s): Carina Wiesen, Nils Albartus, Max Hoffmann, Steffen Becker, Sebastian Wallat, Marc Fyrbiak, Nikol Rummel, Christof Paar
Published in: Proceedings of the 24th Asia and South Pacific Design Automation Conference on - ASPDAC '19, 2019, Page(s) 104-111
DOI: 10.1145/3287624.3288741

Teaching Hardware Reverse Engineering: Educational Guidelines and Practical Insights

Author(s): Carina Wiesen, Steffen Becker, Marc Fyrbiak, Nils Albartus, Malte Elson, Nikol Rummel, Christof Paar
Published in: 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE), 2018, Page(s) 438-445
DOI: 10.1109/tale.2018.8615270

Physical Design Obfuscation of Hardware: A Comprehensive Investigation of Device and Logic-Level Techniques

Author(s): Arunkumar Vijayakumar, Vinay C. Patil, Daniel E. Holcomb, Christof Paar, Sandip Kundu
Published in: IEEE Transactions on Information Forensics and Security, Issue 12/1, 2017, Page(s) 64-77, ISSN 1556-6013
DOI: 10.1109/tifs.2016.2601067

Interdiction in practice—Hardware Trojan against a high-security USB flash drive

Author(s): Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Amir Moradi, Christof Paar
Published in: Journal of Cryptographic Engineering, Issue 7/3, 2017, Page(s) 199-211, ISSN 2190-8508
DOI: 10.1007/s13389-016-0132-7

Hybrid Obfuscation to Protect Against Disclosure Attacks on Embedded Microprocessors

Author(s): Marc Fyrbiak, Simon Rokicki, Nicolai Bissantz, Russell Tessier, Christof Paar
Published in: IEEE Transactions on Computers, Issue 67/3, 2018, Page(s) 307-321, ISSN 0018-9340
DOI: 10.1109/tc.2017.2649520

HAL—The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion

Author(s): Marc Fyrbiak, Sebastian Wallat, Pawel Swierczynski, Max Hoffmann, Sebastian Hoppach, Matthias Wilhelm, Tobias Weidlich, Russell Tessier, Christof Paar
Published in: IEEE Transactions on Dependable and Secure Computing, Issue 16/3, 2019, Page(s) 498-510, ISSN 1545-5971
DOI: 10.1109/tdsc.2018.2812183

The First Thorough Side-Channel Hardware Trojan

Author(s): Maik Ender, Samaneh Ghandali, Amir Moradi, Christof Paar
Published in: Advances in Cryptology – ASIACRYPT 2017, Issue 10624, 2017, Page(s) 755-780
DOI: 10.1007/978-3-319-70694-8_26

A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks

Author(s): Samaneh Ghandali, Georg T. Becker, Daniel Holcomb, Christof Paar
Published in: Cryptographic Hardware and Embedded Systems – CHES 2016, Issue 9813, 2016, Page(s) 625-647
DOI: 10.1007/978-3-662-53140-2_30