Publications

A Versatile Framework for Implementation Attacks on Cryptographic and Embedded Devices

2010 - Timo Kasper, David Oswald, Chris­tof Paar

Lecture Notes in Computer Science, 2010 [web] [bib] [pdf]

DSPs, BRAMs, and a Pinch of Logic: Extended Recipes for AES on FPGAs

2010 - S. Drimer, Tim Güneysu, Chris­tof Paar

ACM Transactions on Reconfigurable Technology and Systems (TRETS), Vol. 3. 2010.

Pulsed corona plasma source characterization for film deposition on the inner surface of tubes

2010 - Ramasamy Pothiraja, Nikita Bibinov, Peter Awakowicz

JOURNAL OF PHYSICS D-APPLIED PHYSICS, Volume: 43, Issue: 49, Article Number: 495201, DOI: 10.1088/0022-3727/43/49/495201, Published: DEC 15 2010

Using Data Contention in Dual-Ported Memories for Security Applications

2010 - Tim Güneysu

Journal of Signal Processing Systems, Springer, 2010, Online-first DOI: 10.1007/s11265-010-0560-z [pdf]

A Measuring Method for High Precision Optical Angle Detection with no Interference of Ambient Light

2010 - Jürgen Oehm, Christian Koch, Andreas Gornik

17th International Conference on Electronics, Circuits and Systems - ICECS 2010 [IEEE Xplore]

TruWalletM: Secure Web Authentication on Mobile Platforms

2010 - Sven Bugiel, Alexandra Dmitrienko, Kari Kostiainen, Ahmad-Reza Sadeghi, Marcel Winandy

Trusted Systems, Second International Conference, INTRUST 2010, LNCS 6802/2011, Springer, 2011. [Bibtex] [PDF]

A low-cost Current Sensor with a novel modulated interface

2010 - Abdoulkarim Bouabana, Constantinos Sourkounis

IEEE International Conference on Electronics, Circuits, and Systems, ICECS 2010, 12-15 De­cember 2010, Athens, Greece

Compact diode laser based system for continuous wave and quasi time domain THz spectroscopy

2010 - Carsten Brenner, Martin R. Hofmann , M. Scheller, M. K. Shakfa, M. Koch, I. Camara Mayorga, A. Klehr, G. Erbert, G. Tränkle

Opt. Lett. Vol. 35, Iss. 23, pp. 3859-3861

Breaking e-Banking CAPTCHAs

2010 - Ahmad-Reza Sadeghi, Shujun Li, Syed Amier Haider Shah, Muhammad Asad Usman Khan, Syed Ali Khayam, Roland Schmitz

Accepted to 26th Annual Computer Security Applications Conference (ACSAC 2010), to be held in Austin, Texas, USA, December 6-10, 2010 [ACSAC Website]

Keeping Data Secret under Full Compromise using Porter Devices

2010 - Christina Pöpper, David Basin, Srdjan Capkun, Cas Cremers

In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2010
Page: