Side-channel analysis of PUFs and fuzzy extractors D Merli, D Schuster, F Stumpf, G Sigl International Conference on Trust and Trustworthy Computing, 33-47, 2011 | 146 | 2011 |
Improving the quality of ring oscillator PUFs on FPGAs D Merli, F Stumpf, C Eckert Proceedings of the 5th workshop on embedded systems security, 1-9, 2010 | 99 | 2010 |
Semi-invasive EM attack on FPGA RO PUFs and countermeasures D Merli, D Schuster, F Stumpf, G Sigl Proceedings of the Workshop on Embedded Systems Security, 1-9, 2011 | 97 | 2011 |
Complementary IBS: Application specific error correction for PUFs M Hiller, D Merli, F Stumpf, G Sigl 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 1-6, 2012 | 77 | 2012 |
Localized electromagnetic analysis of RO PUFs D Merli, J Heyszl, B Heinz, D Schuster, F Stumpf, G Sigl 2013 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2013 | 57 | 2013 |
Hardware Trojans: current challenges and approaches N Jacob, D Merli, J Heyszl, G Sigl IET Computers & Digital Techniques 8 (6), 264-273, 2014 | 49 | 2014 |
Strengths and limitations of high-resolution electromagnetic field measurements for side-channel analysis J Heyszl, D Merli, B Heinz, F De Santis, G Sigl International Conference on Smart Card Research and Advanced Applications …, 2012 | 31 | 2012 |
Protecting PUF Error Correction by Codeword Masking. D Merli, F Stumpf, G Sigl IACR Cryptol. ePrint Arch. 2013, 334, 2013 | 27 | 2013 |
A new security architecture for smartcards utilizing PUFs T Esbach, W Fumy, O Kulikovska, D Merli, D Schuster, F Stumpf ISSE 2012 Securing Electronic Business Processes, 180-194, 2012 | 21 | 2012 |
Comprehensive analysis of software countermeasures against fault attacks N Theissing, D Merli, M Smola, F Stumpf, G Sigl 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE), 404-409, 2013 | 13 | 2013 |
You snooze, you lose: measuring {PLC} cycle times under attacks M Niedermaier, JO Malchow, F Fischer, D Marzin, D Merli, V Roth, ... 12th {USENIX} Workshop on Offensive Technologies ({WOOT} 18), 2018 | 11 | 2018 |
A new definition and classification of physical unclonable functions R Plaga, D Merli Proceedings of the Second Workshop on Cryptography and Security in Computing …, 2015 | 9 | 2015 |
Attacking and protecting ring oscillator physical unclonable functions and code-offset fuzzy extractors D Merli Technische Universität München, 2014 | 7 | 2014 |
Identities for embedded systems enabled by physical unclonable functions D Merli, G Sigl, C Eckert Number Theory and Cryptography, 125-138, 2013 | 7 | 2013 |
Cort: A communication robustness testbed for industrial control system components M Niedermaier, A von Bodisco, D Merli arXiv preprint arXiv:1904.04286, 2019 | 5 | 2019 |
Physical Unclonable Functions D Merli, G Sigl Datenschutz und Datensicherheit-DuD 36 (12), 876-880, 2012 | 5 | 2012 |
A secure dual-MCU architecture for robust communication of IIoT devices M Niedermaier, D Merli, G Sigl 2019 8th Mediterranean Conference on Embedded Computing (MECO), 1-5, 2019 | 4 | 2019 |
Reliability bound and channel capacity of IBS-based fuzzy embedders M Hiller, F De Santis, D Merli, G Sigl 2012 NASA/ESA Conference on Adaptive Hardware and Systems (AHS), 213-220, 2012 | 4 | 2012 |
LICSTER--A Low-cost ICS Security Testbed for Education and Research F Sauer, M Niedermaier, S Kießling, D Merli arXiv preprint arXiv:1910.00303, 2019 | 3 | 2019 |
Network scanning and mapping for IIoT edge node device security M Niedermaier, F Fischer, D Merli, G Sigl 2019 International Conference on Applied Electronics (AE), 1-6, 2019 | 3 | 2019 |