Follow
Dominik Merli
Dominik Merli
Augsburg University of Applied Sciences
Verified email at hs-augsburg.de
Title
Cited by
Cited by
Year
Side-channel analysis of PUFs and fuzzy extractors
D Merli, D Schuster, F Stumpf, G Sigl
Trust and Trustworthy Computing: 4th International Conference, TRUST 2011 …, 2011
1812011
Semi-invasive EM attack on FPGA RO PUFs and countermeasures
D Merli, D Schuster, F Stumpf, G Sigl
Proceedings of the Workshop on Embedded Systems Security, 1-9, 2011
1492011
Improving the quality of ring oscillator PUFs on FPGAs
D Merli, F Stumpf, C Eckert
Proceedings of the 5th workshop on embedded systems security, 1-9, 2010
1432010
Complementary IBS: Application specific error correction for PUFs
M Hiller, D Merli, F Stumpf, G Sigl
2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 1-6, 2012
1002012
Localized electromagnetic analysis of RO PUFs
D Merli, J Heyszl, B Heinz, D Schuster, F Stumpf, G Sigl
2013 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2013
962013
Hardware Trojans: current challenges and approaches
N Jacob, D Merli, J Heyszl, G Sigl
IET Computers & Digital Techniques 8 (6), 264-273, 2014
852014
Strengths and limitations of high-resolution electromagnetic field measurements for side-channel analysis
J Heyszl, D Merli, B Heinz, F De Santis, G Sigl
Smart Card Research and Advanced Applications: 11th International Conference …, 2013
602013
Protecting PUF error correction by codeword masking
D Merli, F Stumpf, G Sigl
Cryptology ePrint Archive, 2013
432013
You snooze, you lose: Measuring {PLC} cycle times under attacks
M Niedermaier, JO Malchow, F Fischer, D Marzin, D Merli, V Roth, ...
12th USENIX Workshop on Offensive Technologies (WOOT 18), 2018
362018
Comprehensive analysis of software countermeasures against fault attacks
N Theissing, D Merli, M Smola, F Stumpf, G Sigl
2013 Design, Automation & Test in Europe Conference & Exhibition (DATE), 404-409, 2013
352013
A new security architecture for smartcards utilizing PUFs
T Esbach, W Fumy, O Kulikovska, D Merli, D Schuster, F Stumpf
ISSE 2012 Securing Electronic Business Processes: Highlights of the …, 2012
292012
LICSTER--A Low-cost ICS Security Testbed for Education and Research
F Sauer, M Niedermaier, S Kießling, D Merli
arXiv preprint arXiv:1910.00303, 2019
282019
Network scanning and mapping for IIoT edge node device security
M Niedermaier, F Fischer, D Merli, G Sigl
2019 International Conference on Applied Electronics (AE), 1-6, 2019
162019
Efficient passive ICS device discovery and identification by MAC address correlation
M Niedermaier, T Hanka, S Plaga, A von Bodisco, D Merli
arXiv preprint arXiv:1904.04271, 2019
162019
Gamification in workforce training: Improving employees’ self-efficacy and information security and data protection behaviours
P Bitrián, I Buil, S Catalán, D Merli
Journal of Business Research 179, 114685, 2024
112024
A new definition and classification of physical unclonable functions
R Plaga, D Merli
Proceedings of the Second Workshop on Cryptography and Security in Computing …, 2015
112015
Attacking and protecting ring oscillator physical unclonable functions and code-offset fuzzy extractors
D Merli
Technische Universität München, 2014
112014
Impact of active scanning tools for device discovery in industrial networks
T Hanka, M Niedermaier, F Fischer, S Kießling, P Knauer, D Merli
Security, Privacy, and Anonymity in Computation, Communication, and Storage …, 2021
102021
Cort: A communication robustness testbed for industrial control system components
M Niedermaier, A von Bodisco, D Merli
arXiv preprint arXiv:1904.04286, 2019
102019
Method, processor and device for checking the integrity of user data
D Merli, D Schneider
US Patent 11,568,088, 2023
92023
The system can't perform the operation now. Try again later.
Articles 1–20