Georg Tobias Becker
Georg Tobias Becker
Digital Society Institute Berlin (DSI)
Verified email at ruhr-uni-bochum.de - Homepage
TitleCited byYear
Stealthy dopant-level hardware trojans
GT Becker, F Regazzoni, C Paar, WP Burleson
International Workshop on Cryptographic Hardware and Embedded Systems, 197-214, 2013
2032013
Test vector leakage assessment (TVLA) methodology in practice
G Becker, J Cooper, E DeMulder, G Goodwill, J Jaffe, G Kenworthy, ...
International Cryptographic Module Conference 1001, 13, 2013
982013
The gap between promise and reality: On the insecurity of XOR arbiter PUFs
GT Becker
International Workshop on Cryptographic Hardware and Embedded Systems, 535-555, 2015
972015
Side-channel based watermarks for integrated circuits
GT Becker, M Kasper, A Moradi, C Paar
2010 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2010
502010
On the Pitfalls of using Arbiter PUFs as Building Blocks
GT Becker
Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on, 2015
432015
Active and Passive Side-Channel Attacks on Delay Based PUF Designs.
GT Becker, R Kumar
IACR Cryptology ePrint Archive 2014, 287, 2014
412014
On the Sca­ling of Ma­chi­ne Le­arning At­tacks on PUFs with Ap­p­li­ca­ti­on to Noise Bi­fur­ca­ti­on
J Tobisch, GT Becker
11th Work­shop on RFID Se­cu­ri­ty (RFIDSec 2015), 2015
33*2015
Stealthy dopant-level hardware trojans: extended version
GT Becker, F Regazzoni, C Paar, WP Burleson
Journal of Cryptographic Engineering 4 (1), 19-31, 2014
322014
Development of a layout-level hardware obfuscation tool
S Malik, GT Becker, C Paar, WP Burleson
2015 IEEE computer society annual symposium on VLSI, 204-209, 2015
232015
Bitstream Fault Injections (BiFI)–Automated Fault Attacks against SRAM-based FPGAs
P Swierczynski, GT Becker, A Moradi, C Paar
IEEE Transactions on Computers 99, 1-1, 2017
212017
Implementing hardware trojans: Experiences from a hardware trojan challenge
GT Becker, A Lakshminarasimhan, L Lin, S Srivathsa, VB Suresh, ...
2011 IEEE 29th International Conference on Computer Design (ICCD), 301-304, 2011
202011
Efficient authentication mechanisms for navigation systems–a radio-navigation case study
GT Becker, S Lo, D De Lorenzo, D Qiu, C Paar, P Enge
Proceedings of the ION GNSS Meeting, 2009
202009
Detecting software theft in embedded systems: A side-channel approach
GT Becker, D Strobel, C Paar, W Burleson
IEEE Transactions on Information Forensics and Security 7 (4), 1144-1154, 2012
192012
A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks
S Ghandali, GT Becker, D Holcomb, C Paar
Conference on Cryptographic Hardware and Embedded Systems (CHES), 2016
172016
Side channels as building blocks
M Kasper, A Moradi, GT Becker, O Mischke, T Güneysu, C Paar, ...
Journal of Cryptographic Engineering 2 (3), 143-159, 2012
172012
Se­cu­ri­ty Ana­ly­sis of In­dex-Ba­sed Syn­dro­me Co­ding for PUF-Ba­sed Key Ge­ne­ra­ti­on
GT Becker, A Wild, T Gü­ney­su
IEEE In­ter­na­tio­nal Sym­po­si­um on Hard­ware Ori­en­ted Se­cu­ri­ty and Trust (HOST 2015), 2015
152015
Side-channel watermarks for embedded software
GT Becker, W Burleson, C Paar
2011 IEEE 9th International New Circuits and systems conference, 478-481, 2011
112011
Side-channel based watermarks for ip protection
GT Becker, M Kasper, A Moradi, C Paar
International Workshop on Constructive Side-Channel Analysis and Secure Design, 2010
102010
Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited: Theory vs Practice
GT Becker
IEEE Transactions on Dependable and Secure Computing, 2017
72017
On the Problems of Realizing Reliable and Efficient Ring Oscillator PUFs on FPGAs
A Wild, GT Becker, T Güneysu
IEEE In­ter­na­tio­nal Sym­po­si­um on Hard­ware Ori­en­ted Se­cu­ri­ty and Trust (HOST 2016), 2016
72016
The system can't perform the operation now. Try again later.
Articles 1–20