Search Results - "Marc Schink"
-
1
Security and Trust in Open Source Security Tokens
Published in IACR transactions on cryptographic hardware and embedded systems (09-07-2021)“…Using passwords for authentication has been proven vulnerable in countless security incidents. Hardware security tokens effectively prevent most…”
Get full text
Journal Article -
2
Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers
Published in IACR transactions on cryptographic hardware and embedded systems (01-08-2020)“…The security of Internet of Things (IoT) devices relies on fundamental concepts such as cryptographically protected firmware updates. In this context attackers…”
Get full text
Journal Article -
3
Investigating Profiled Side-Channel Attacks Against the DES Key Schedule
Published in IACR transactions on cryptographic hardware and embedded systems (01-06-2020)“…Recent publications describe profiled single trace side-channel attacks (SCAs) against the DES key-schedule of a “commercially available security controller”…”
Get full text
Journal Article -
4
Extended version—to be, or not to be stateful: post-quantum secure boot using hash-based signatures
Published in Journal of cryptographic engineering (01-11-2024)“…While research in PQC has gained significant momentum, its adoption in real-world products is slow. This is largely due to concerns about practicability and…”
Get full text
Journal Article -
5
Unlock the Door to my Secrets, but don’t Forget to Glitch: A comprehensive analysis of flash erase suppression attacks
Published in IACR transactions on cryptographic hardware and embedded systems (12-03-2024)“…In this work, we look into an attack vector known as flash erase suppression. Many microcontrollers have a feature that allows the debug interface protection…”
Get full text
Journal Article -
6
Unlock the Door to my Secrets, but don’t Forget to Glitch
Published in IACR transactions on cryptographic hardware and embedded systems (01-03-2024)“…In this work, we look into an attack vector known as flash erase suppression. Many microcontrollers have a feature that allows the debug interface protection…”
Get full text
Journal Article -
7
Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers
Published in IACR transactions on cryptographic hardware and embedded systems (26-08-2020)“…The security of Internet of Things (IoT) devices relies on fundamental concepts such as cryptographically protected firmware updates. In this context attackers…”
Get full text
Journal Article -
8
Investigating Profiled Side-Channel Attacks Against the DES Key Schedule
Published in IACR transactions on cryptographic hardware and embedded systems (19-06-2020)“…Recent publications describe profiled single trace side-channel attacks (SCAs) against the DES key-schedule of a “commercially available security controller”…”
Get full text
Journal Article -
9
Taking a Look into Execute-Only Memory
Published 12-09-2019“…The development process of microcontroller firmware often involves multiple parties. In such a scenario, the Intellectual Property (IP) is not protected…”
Get full text
Journal Article -
10
One Exploit to Rule them All? On the Security of Drop-in Replacement and Counterfeit Microcontrollers
Published 21-08-2020“…With the increasing complexity of embedded systems, the firmware has become a valuable asset. At the same time, pressure for cost reductions in hardware is…”
Get full text
Journal Article -
11
Attacks and Countermeasures for Capacitive PUF-Based Security Enclosures
Published in 2021 IEEE Physical Assurance and Inspection of Electronics (PAINE) (30-11-2021)“…Protecting embedded devices from tampering is a difficult task since the attacker can perform manipulations through physical access. To provide a security…”
Get full text
Conference Proceeding -
12
T-ROME: A Simple and Energy Efficient Tree Routing Protocol for Low-Power Wake-up Receivers
Published 13-02-2017“…Wireless sensor networks are deployed in many monitoring applications but still suffer from short lifetimes originating from limited energy sources and…”
Get full text
Journal Article -
13
Indoor localization system for emergency responders with ultra low-power radio landmarks
Published in 2015 IEEE International Instrumentation and Measurement Technology Conference (I2MTC) Proceedings (01-05-2015)“…In this paper we present a novel indoor localization approach based on 868MHz radio landmarks and inertial sensor data as a guidance system for emergency…”
Get full text
Conference Proceeding