Dominik Merli
Dominik Merli
Augsburg University of Applied Sciences
Verified email at
Cited by
Cited by
Side-channel analysis of PUFs and fuzzy extractors
D Merli, D Schuster, F Stumpf, G Sigl
International Conference on Trust and Trustworthy Computing, 33-47, 2011
Improving the quality of ring oscillator PUFs on FPGAs
D Merli, F Stumpf, C Eckert
Proceedings of the 5th workshop on embedded systems security, 1-9, 2010
Semi-invasive EM attack on FPGA RO PUFs and countermeasures
D Merli, D Schuster, F Stumpf, G Sigl
Proceedings of the Workshop on Embedded Systems Security, 1-9, 2011
Complementary IBS: Application specific error correction for PUFs
M Hiller, D Merli, F Stumpf, G Sigl
2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 1-6, 2012
Localized electromagnetic analysis of RO PUFs
D Merli, J Heyszl, B Heinz, D Schuster, F Stumpf, G Sigl
2013 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2013
Hardware Trojans: current challenges and approaches
N Jacob, D Merli, J Heyszl, G Sigl
IET Computers & Digital Techniques 8 (6), 264-273, 2014
Strengths and limitations of high-resolution electromagnetic field measurements for side-channel analysis
J Heyszl, D Merli, B Heinz, F De Santis, G Sigl
International Conference on Smart Card Research and Advanced Applications …, 2012
Protecting PUF Error Correction by Codeword Masking.
D Merli, F Stumpf, G Sigl
IACR Cryptol. ePrint Arch. 2013, 334, 2013
A new security architecture for smartcards utilizing PUFs
T Esbach, W Fumy, O Kulikovska, D Merli, D Schuster, F Stumpf
ISSE 2012 Securing Electronic Business Processes, 180-194, 2012
Comprehensive analysis of software countermeasures against fault attacks
N Theissing, D Merli, M Smola, F Stumpf, G Sigl
2013 Design, Automation & Test in Europe Conference & Exhibition (DATE), 404-409, 2013
You snooze, you lose: measuring {PLC} cycle times under attacks
M Niedermaier, JO Malchow, F Fischer, D Marzin, D Merli, V Roth, ...
12th {USENIX} Workshop on Offensive Technologies ({WOOT} 18), 2018
A new definition and classification of physical unclonable functions
R Plaga, D Merli
Proceedings of the Second Workshop on Cryptography and Security in Computing …, 2015
Attacking and protecting ring oscillator physical unclonable functions and code-offset fuzzy extractors
D Merli
Technische Universität München, 2014
Identities for embedded systems enabled by physical unclonable functions
D Merli, G Sigl, C Eckert
Number Theory and Cryptography, 125-138, 2013
Cort: A communication robustness testbed for industrial control system components
M Niedermaier, A von Bodisco, D Merli
arXiv preprint arXiv:1904.04286, 2019
Physical Unclonable Functions
D Merli, G Sigl
Datenschutz und Datensicherheit-DuD 36 (12), 876-880, 2012
A secure dual-MCU architecture for robust communication of IIoT devices
M Niedermaier, D Merli, G Sigl
2019 8th Mediterranean Conference on Embedded Computing (MECO), 1-5, 2019
Reliability bound and channel capacity of IBS-based fuzzy embedders
M Hiller, F De Santis, D Merli, G Sigl
2012 NASA/ESA Conference on Adaptive Hardware and Systems (AHS), 213-220, 2012
LICSTER--A Low-cost ICS Security Testbed for Education and Research
F Sauer, M Niedermaier, S Kießling, D Merli
arXiv preprint arXiv:1910.00303, 2019
Network scanning and mapping for IIoT edge node device security
M Niedermaier, F Fischer, D Merli, G Sigl
2019 International Conference on Applied Electronics (AE), 1-6, 2019
The system can't perform the operation now. Try again later.
Articles 1–20