Side-channel analysis of PUFs and fuzzy extractors D Merli, D Schuster, F Stumpf, G Sigl Trust and Trustworthy Computing: 4th International Conference, TRUST 2011 …, 2011 | 181 | 2011 |
Semi-invasive EM attack on FPGA RO PUFs and countermeasures D Merli, D Schuster, F Stumpf, G Sigl Proceedings of the Workshop on Embedded Systems Security, 1-9, 2011 | 149 | 2011 |
Improving the quality of ring oscillator PUFs on FPGAs D Merli, F Stumpf, C Eckert Proceedings of the 5th workshop on embedded systems security, 1-9, 2010 | 143 | 2010 |
Complementary IBS: Application specific error correction for PUFs M Hiller, D Merli, F Stumpf, G Sigl 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 1-6, 2012 | 100 | 2012 |
Localized electromagnetic analysis of RO PUFs D Merli, J Heyszl, B Heinz, D Schuster, F Stumpf, G Sigl 2013 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2013 | 96 | 2013 |
Hardware Trojans: current challenges and approaches N Jacob, D Merli, J Heyszl, G Sigl IET Computers & Digital Techniques 8 (6), 264-273, 2014 | 85 | 2014 |
Strengths and limitations of high-resolution electromagnetic field measurements for side-channel analysis J Heyszl, D Merli, B Heinz, F De Santis, G Sigl Smart Card Research and Advanced Applications: 11th International Conference …, 2013 | 60 | 2013 |
Protecting PUF error correction by codeword masking D Merli, F Stumpf, G Sigl Cryptology ePrint Archive, 2013 | 43 | 2013 |
You snooze, you lose: Measuring {PLC} cycle times under attacks M Niedermaier, JO Malchow, F Fischer, D Marzin, D Merli, V Roth, ... 12th USENIX Workshop on Offensive Technologies (WOOT 18), 2018 | 36 | 2018 |
Comprehensive analysis of software countermeasures against fault attacks N Theissing, D Merli, M Smola, F Stumpf, G Sigl 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE), 404-409, 2013 | 35 | 2013 |
A new security architecture for smartcards utilizing PUFs T Esbach, W Fumy, O Kulikovska, D Merli, D Schuster, F Stumpf ISSE 2012 Securing Electronic Business Processes: Highlights of the …, 2012 | 29 | 2012 |
LICSTER--A Low-cost ICS Security Testbed for Education and Research F Sauer, M Niedermaier, S Kießling, D Merli arXiv preprint arXiv:1910.00303, 2019 | 28 | 2019 |
Network scanning and mapping for IIoT edge node device security M Niedermaier, F Fischer, D Merli, G Sigl 2019 International Conference on Applied Electronics (AE), 1-6, 2019 | 16 | 2019 |
Efficient passive ICS device discovery and identification by MAC address correlation M Niedermaier, T Hanka, S Plaga, A von Bodisco, D Merli arXiv preprint arXiv:1904.04271, 2019 | 16 | 2019 |
Gamification in workforce training: Improving employees’ self-efficacy and information security and data protection behaviours P Bitrián, I Buil, S Catalán, D Merli Journal of Business Research 179, 114685, 2024 | 11 | 2024 |
A new definition and classification of physical unclonable functions R Plaga, D Merli Proceedings of the Second Workshop on Cryptography and Security in Computing …, 2015 | 11 | 2015 |
Attacking and protecting ring oscillator physical unclonable functions and code-offset fuzzy extractors D Merli Technische Universität München, 2014 | 11 | 2014 |
Impact of active scanning tools for device discovery in industrial networks T Hanka, M Niedermaier, F Fischer, S Kießling, P Knauer, D Merli Security, Privacy, and Anonymity in Computation, Communication, and Storage …, 2021 | 10 | 2021 |
Cort: A communication robustness testbed for industrial control system components M Niedermaier, A von Bodisco, D Merli arXiv preprint arXiv:1904.04286, 2019 | 10 | 2019 |
Method, processor and device for checking the integrity of user data D Merli, D Schneider US Patent 11,568,088, 2023 | 9 | 2023 |