C.R. Wedig Reinbrecht
24 records found
1
Authored
Revealing the Secrets of Spiking Neural Networks
The Case of Izhikevich Neuron
GRINCH
A Cache Attack against GIFT Lightweight Cipher
Multi-bit blinding
A countermeasure for RSA against side channel attacks
Asymmetric algorithms such as RSA are considered secure from an algorithmic point of view, yet their implementations are typically vulnerable as they are used by attackers to comprise the secret key. Many countermeasures have been proposed to thwart these attacks. However, the ...
LightRoAD
Lightweight Rowhammer Attack Detector
S-NET
A Confusion Based Countermeasure Against Power Attacks for SBOX
Side channel attacks are recognized as one of the most powerful attacks due to their ability to extract secret key information by analyzing the unintended leakage generated during operation. This makes them highly attractive for attackers. The current countermeasures focus on ...
In the recent years, cache based side-channel attacks have become a serious threat for computers. To face this issue, researches have been looking at verifying the security policies. However, these approaches are limited to manual security verification and they typically work ...
Guard-NoC
A protection against side-channel attacks for MPSoCs
Multi-Processor System-on-Chips (MPSoCs) are popular computational platforms for a wide variety of applications due to their energy efficiency and flexibility. Like many other platforms they are vulnerable to Side Channel Attacks (SCAs). In particular, Logical SCAs (LSCAs) are ...
LiD-CAT
A Lightweight Detector for Cache ATtacks
Cache attacks are one of the most wide-spread and dangerous threats to embedded computing systems' security. A promising approach to detect such attacks at runtime is to monitor the System-on-Chip (SoC) behavior. However, designing a secure SoC capable of detecting such attack ...
G-PUF
An Intrinsic PUF Based on GPU Error Signatures
Physically Unclonable Functions (PUFs) are security primitives that provide trustworthy hardware for key-generation and device authentication. Among them, in contrast to dedicated PUFs, intrinsic PUFs are created from existing hardware components that exploit their variability ...
Increasingly complex and powerful Systems-on-Chips (SoCs), connected through a 5G network, form the basis of the Internet-of-Things (IoT). These technologies will drive the digitalization in all domains, e.g. industry automation, automotive, avionics, and healthcare. A major r ...