Side-channel analysis of PUFs and fuzzy extractors D Merli, D Schuster, F Stumpf, G Sigl Trust and Trustworthy Computing: 4th International Conference, TRUST 2011 …, 2011 | 173 | 2011 |
Semi-invasive EM attack on FPGA RO PUFs and countermeasures D Merli, D Schuster, F Stumpf, G Sigl Proceedings of the Workshop on Embedded Systems Security, 1-9, 2011 | 141 | 2011 |
Improving the quality of ring oscillator PUFs on FPGAs D Merli, F Stumpf, C Eckert Proceedings of the 5th workshop on embedded systems security, 1-9, 2010 | 135 | 2010 |
Complementary IBS: Application specific error correction for PUFs M Hiller, D Merli, F Stumpf, G Sigl 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 1-6, 2012 | 95 | 2012 |
Localized electromagnetic analysis of RO PUFs D Merli, J Heyszl, B Heinz, D Schuster, F Stumpf, G Sigl 2013 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2013 | 83 | 2013 |
Hardware Trojans: current challenges and approaches N Jacob, D Merli, J Heyszl, G Sigl IET Computers & Digital Techniques 8 (6), 264-273, 2014 | 75 | 2014 |
Strengths and limitations of high-resolution electromagnetic field measurements for side-channel analysis J Heyszl, D Merli, B Heinz, F De Santis, G Sigl Smart Card Research and Advanced Applications: 11th International Conference …, 2013 | 57 | 2013 |
Protecting PUF error correction by codeword masking D Merli, F Stumpf, G Sigl Cryptology ePrint Archive, 2013 | 43 | 2013 |
You snooze, you lose: Measuring {PLC} cycle times under attacks M Niedermaier, JO Malchow, F Fischer, D Marzin, D Merli, V Roth, ... 12th USENIX Workshop on Offensive Technologies (WOOT 18), 2018 | 35 | 2018 |
A new security architecture for smartcards utilizing PUFs T Esbach, W Fumy, O Kulikovska, D Merli, D Schuster, F Stumpf ISSE 2012 Securing Electronic Business Processes: Highlights of the …, 2012 | 29 | 2012 |
Comprehensive analysis of software countermeasures against fault attacks N Theissing, D Merli, M Smola, F Stumpf, G Sigl 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE), 404-409, 2013 | 28 | 2013 |
LICSTER--A Low-cost ICS Security Testbed for Education and Research F Sauer, M Niedermaier, S Kießling, D Merli arXiv preprint arXiv:1910.00303, 2019 | 21 | 2019 |
Network scanning and mapping for IIoT edge node device security M Niedermaier, F Fischer, D Merli, G Sigl 2019 International Conference on Applied Electronics (AE), 1-6, 2019 | 15 | 2019 |
Efficient passive ICS device discovery and identification by MAC address correlation M Niedermaier, T Hanka, S Plaga, A von Bodisco, D Merli arXiv preprint arXiv:1904.04271, 2019 | 13 | 2019 |
A new definition and classification of physical unclonable functions R Plaga, D Merli Proceedings of the Second Workshop on Cryptography and Security in Computing …, 2015 | 11 | 2015 |
Attacking and protecting ring oscillator physical unclonable functions and code-offset fuzzy extractors D Merli Technische Universität München, 2014 | 11 | 2014 |
Cort: A communication robustness testbed for industrial control system components M Niedermaier, A von Bodisco, D Merli arXiv preprint arXiv:1904.04286, 2019 | 10 | 2019 |
Method, processor and device for checking the integrity of user data D Merli, D Schneider US Patent 11,568,088, 2023 | 8 | 2023 |
Identities for embedded systems enabled by physical unclonable functions D Merli, G Sigl, C Eckert Number Theory and Cryptography: Papers in Honor of Johannes Buchmann on the …, 2013 | 8 | 2013 |
Efficient intrusion detection on low-performance industrial iot edge node devices M Niedermaier, M Striegel, F Sauer, D Merli, G Sigl arXiv preprint arXiv:1908.03964, 2019 | 7 | 2019 |