Author of the publication

JustSTART: How to Find an RSA Authentication Bypass on Xilinx UltraScale(+) with Fuzzing.

, , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024 (2): 426-450 (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Insights into the mind of a trojan designer: the challenge to integrate a trojan into the bitstream., , , , , and . ASP-DAC, page 112-119. ACM, (2019)Reverse Engineering x86 Processor Microcode., , , , , , and . CoRR, (2019)Expanding Explainability: From Explainable Artificial Intelligence to Explainable Hardware., , , , , and . CoRR, (2023)I see an IC: A Mixed-Methods Approach to Study Human Problem-Solving Processes in Hardware Reverse Engineering., , , , , , , , , and . CoRR, (2024)A critical view on the real-world security of logic locking., , and . J. Cryptogr. Eng., 12 (3): 229-244 (2022)Reconfigurable Intelligent Surface for Physical Layer Key Generation: Constructive or Destructive?, , , , , , and . CoRR, (2021)Mirror, Mirror on the Wall: Wireless Environment Reconfiguration Attacks Based on Fast Software-Controlled Surfaces., , , , and . AsiaCCS, page 208-221. ACM, (2022)Analog Physical-Layer Relay Attacks with Application to Bluetooth and Phase-Based Ranging., , , , and . WISEC, page 60-72. ACM, (2022)Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations., , , , , and . SP, page 56-74. IEEE, (2023)IRShield: A Countermeasure Against Adversarial Physical-Layer Wireless Sensing., , , , , , , and . SP, page 1705-1721. IEEE, (2022)