Folgen
Dominik Merli
Dominik Merli
Augsburg University of Applied Sciences
Bestätigte E-Mail-Adresse bei hs-augsburg.de
Titel
Zitiert von
Zitiert von
Jahr
Side-channel analysis of PUFs and fuzzy extractors
D Merli, D Schuster, F Stumpf, G Sigl
Trust and Trustworthy Computing: 4th International Conference, TRUST 2011 …, 2011
1692011
Semi-invasive EM attack on FPGA RO PUFs and countermeasures
D Merli, D Schuster, F Stumpf, G Sigl
Proceedings of the Workshop on Embedded Systems Security, 1-9, 2011
1412011
Improving the quality of ring oscillator PUFs on FPGAs
D Merli, F Stumpf, C Eckert
Proceedings of the 5th workshop on embedded systems security, 1-9, 2010
1342010
Complementary IBS: Application specific error correction for PUFs
M Hiller, D Merli, F Stumpf, G Sigl
2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 1-6, 2012
952012
Localized electromagnetic analysis of RO PUFs
D Merli, J Heyszl, B Heinz, D Schuster, F Stumpf, G Sigl
2013 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2013
832013
Hardware Trojans: current challenges and approaches
N Jacob, D Merli, J Heyszl, G Sigl
IET Computers & Digital Techniques 8 (6), 264-273, 2014
742014
Strengths and limitations of high-resolution electromagnetic field measurements for side-channel analysis
J Heyszl, D Merli, B Heinz, F De Santis, G Sigl
Smart Card Research and Advanced Applications: 11th International Conference …, 2013
572013
Protecting PUF error correction by codeword masking
D Merli, F Stumpf, G Sigl
Cryptology ePrint Archive, 2013
432013
You snooze, you lose: Measuring {PLC} cycle times under attacks
M Niedermaier, JO Malchow, F Fischer, D Marzin, D Merli, V Roth, ...
12th USENIX Workshop on Offensive Technologies (WOOT 18), 2018
342018
A new security architecture for smartcards utilizing PUFs
T Esbach, W Fumy, O Kulikovska, D Merli, D Schuster, F Stumpf
ISSE 2012 Securing Electronic Business Processes: Highlights of the …, 2012
292012
Comprehensive analysis of software countermeasures against fault attacks
N Theissing, D Merli, M Smola, F Stumpf, G Sigl
2013 Design, Automation & Test in Europe Conference & Exhibition (DATE), 404-409, 2013
282013
LICSTER--A Low-cost ICS Security Testbed for Education and Research
F Sauer, M Niedermaier, S Kießling, D Merli
arXiv preprint arXiv:1910.00303, 2019
212019
Network scanning and mapping for IIoT edge node device security
M Niedermaier, F Fischer, D Merli, G Sigl
2019 International Conference on Applied Electronics (AE), 1-6, 2019
142019
Efficient passive ICS device discovery and identification by MAC address correlation
M Niedermaier, T Hanka, S Plaga, A von Bodisco, D Merli
arXiv preprint arXiv:1904.04271, 2019
112019
A new definition and classification of physical unclonable functions
R Plaga, D Merli
Proceedings of the Second Workshop on Cryptography and Security in Computing …, 2015
112015
Attacking and protecting ring oscillator physical unclonable functions and code-offset fuzzy extractors
D Merli
Technische Universität München, 2014
112014
Cort: A communication robustness testbed for industrial control system components
M Niedermaier, A von Bodisco, D Merli
arXiv preprint arXiv:1904.04286, 2019
92019
Method, processor and device for checking the integrity of user data
D Merli, D Schneider
US Patent 11,568,088, 2023
82023
Identities for embedded systems enabled by physical unclonable functions
D Merli, G Sigl, C Eckert
Number Theory and Cryptography: Papers in Honor of Johannes Buchmann on the …, 2013
82013
Efficient intrusion detection on low-performance industrial iot edge node devices
M Niedermaier, M Striegel, F Sauer, D Merli, G Sigl
arXiv preprint arXiv:1908.03964, 2019
72019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20