Search Results - "Marc Schink"

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    Security and Trust in Open Source Security Tokens by Schink, Marc, Wagner, Alexander, Unterstein, Florian, Heyszl, Johann

    “…Using passwords for authentication has been proven vulnerable in countless security incidents. Hardware security tokens effectively prevent most…”
    Get full text
    Journal Article
  2. 2

    Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers by Florian Unterstein, Marc Schink, Thomas Schamberger, Lars Tebelmann, Manuel Ilg, Johann Heyszl

    “…The security of Internet of Things (IoT) devices relies on fundamental concepts such as cryptographically protected firmware updates. In this context attackers…”
    Get full text
    Journal Article
  3. 3

    Investigating Profiled Side-Channel Attacks Against the DES Key Schedule by Johann Heyszl, Katja Miller, Florian Unterstein, Marc Schink, Alexander Wagner, Horst Gieser, Sven Freud, Tobias Damm, Dominik Klein, Dennis Kügler

    “…Recent publications describe profiled single trace side-channel attacks (SCAs) against the DES key-schedule of a “commercially available security controller”…”
    Get full text
    Journal Article
  4. 4

    Extended version—to be, or not to be stateful: post-quantum secure boot using hash-based signatures by Wagner, Alexander, Oberhansl, Felix, Schink, Marc

    Published in Journal of cryptographic engineering (01-11-2024)
    “…While research in PQC has gained significant momentum, its adoption in real-world products is slow. This is largely due to concerns about practicability and…”
    Get full text
    Journal Article
  5. 5

    Unlock the Door to my Secrets, but don’t Forget to Glitch: A comprehensive analysis of flash erase suppression attacks by Schink, Marc, Wagner, Alexander, Oberhansl, Felix, Köckeis, Stefan, Strieder, Emanuele, Freud, Sven, Klein, Dominik

    “…In this work, we look into an attack vector known as flash erase suppression. Many microcontrollers have a feature that allows the debug interface protection…”
    Get full text
    Journal Article
  6. 6

    Unlock the Door to my Secrets, but don’t Forget to Glitch by Marc Schink, Alexander Wagner, Felix Oberhansl, Stefan Köckeis, Emanuele Strieder, Sven Freud, Dominik Klein

    “…In this work, we look into an attack vector known as flash erase suppression. Many microcontrollers have a feature that allows the debug interface protection…”
    Get full text
    Journal Article
  7. 7

    Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers by Unterstein, Florian, Schink, Marc, Schamberger, Thomas, Tebelmann, Lars, Ilg, Manuel, Heyszl, Johann

    “…The security of Internet of Things (IoT) devices relies on fundamental concepts such as cryptographically protected firmware updates. In this context attackers…”
    Get full text
    Journal Article
  8. 8

    Investigating Profiled Side-Channel Attacks Against the DES Key Schedule by Heyszl, Johann, Miller, Katja, Unterstein, Florian, Schink, Marc, Wagner, Alexander, Gieser, Horst, Freud, Sven, Damm, Tobias, Klein, Dominik, Kügler, Dennis

    “…Recent publications describe profiled single trace side-channel attacks (SCAs) against the DES key-schedule of a “commercially available security controller”…”
    Get full text
    Journal Article
  9. 9

    Taking a Look into Execute-Only Memory by Schink, Marc, Obermaier, Johannes

    Published 12-09-2019
    “…The development process of microcontroller firmware often involves multiple parties. In such a scenario, the Intellectual Property (IP) is not protected…”
    Get full text
    Journal Article
  10. 10

    One Exploit to Rule them All? On the Security of Drop-in Replacement and Counterfeit Microcontrollers by Obermaier, Johannes, Schink, Marc, Moczek, Kosma

    Published 21-08-2020
    “…With the increasing complexity of embedded systems, the firmware has become a valuable asset. At the same time, pressure for cost reductions in hardware is…”
    Get full text
    Journal Article
  11. 11

    Attacks and Countermeasures for Capacitive PUF-Based Security Enclosures by Garb, Kathrin, Schink, Marc, Hiller, Matthias, Obermaier, Johannes

    “…Protecting embedded devices from tampering is a difficult task since the attacker can perform manipulations through physical access. To provide a security…”
    Get full text
    Conference Proceeding
  12. 12

    T-ROME: A Simple and Energy Efficient Tree Routing Protocol for Low-Power Wake-up Receivers by Kumberg, Timo, Schink, Marc, Reindl, Leonhard, Schindelhauer, Christian

    Published 13-02-2017
    “…Wireless sensor networks are deployed in many monitoring applications but still suffer from short lifetimes originating from limited energy sources and…”
    Get full text
    Journal Article
  13. 13

    Indoor localization system for emergency responders with ultra low-power radio landmarks by Simon, Nikolas, Bordoy, Joan, Hoflinger, Fabian, Wendeberg, Johannes, Schink, Marc, Tannhauser, Robert, Reindl, Leonhard, Schindelhauer, Christian

    “…In this paper we present a novel indoor localization approach based on 868MHz radio landmarks and inertial sensor data as a guidance system for emergency…”
    Get full text
    Conference Proceeding