Follow
Steffen Becker
Steffen Becker
Research Center for Trustworthy Data Science and Security, RUB, MPI-SP
Verified email at rub.de - Homepage
Title
Cited by
Cited by
Year
Apps against the spread: Privacy implications and user acceptance of COVID-19-related smartphone apps on three continents
C Utz, S Becker, T Schnitzler, FM Farke, F Herbert, L Schaewitz, ...
Proceedings of the 2021 chi conference on human factors in computing systems …, 2021
912021
Highway to HAL: open-sourcing the first extendable gate-level netlist reverse engineering framework
S Wallat, N Albartus, S Becker, M Hoffmann, M Ender, M Fyrbiak, A Drees, ...
Proceedings of the 16th ACM International Conference on Computing Frontiers …, 2019
352019
Teaching hardware reverse engineering: educational guidelines and practical insights
C Wiesen, S Becker, M Fyrbiak, N Albartus, M Elson, N Rummel, C Paar
2018 IEEE International Conference on Teaching, Assessment, and Learning for …, 2018
292018
A world full of privacy and security (mis)conceptions? Findings of a representative survey in 12 countries
F Herbert, S Becker, L Schaewitz, J Hielscher, M Kowalewski, A Sasse, ...
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems …, 2023
282023
An exploratory study of hardware reverse engineering—technical and cognitive processes
S Becker, C Wiesen, N Albartus, N Rummel, C Paar
Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 285-300, 2020
202020
Red team vs. blue team: a real-world hardware Trojan detection case study across four modern CMOS technology generations
E Puschner, T Moos, S Becker, C Kison, A Moradi, C Paar
2023 IEEE Symposium on Security and Privacy (SP), 56-74, 2023
192023
Towards cognitive obfuscation: impeding hardware reverse engineering based on psychological insights
C Wiesen, N Albartus, M Hoffmann, S Becker, S Wallat, M Fyrbiak, ...
Proceedings of the 24th Asia and South Pacific Design Automation Conference …, 2019
162019
Digital Security—A Question of Perspective A Large-Scale Telephone Survey with Four At-Risk User Groups
F Herbert, S Becker, A Buckmann, M Kowalewski, J Hielscher, Y Acar, ...
2024 IEEE Symposium on Security and Privacy (SP), 697-716, 2024
102024
Promoting the acquisition of hardware reverse engineering skills
C Wiesen, S Becker, N Albartus, C Paar, N Rummel
2019 IEEE Frontiers in Education Conference (FIE), 1-9, 2019
92019
Akzeptanz von Corona-Apps in Deutschland vor der Einführung der Corona-Warn-App
S Becker, M Degeling, M Dürmuth, FM Farke, L Schaewitz, T Schnitzler, ...
Ruhr-Universität Bochum, 2020
72020
Towards Unsupervised SEM Image Segmentation for IC Layout Extraction
N Rothaug, S Klix, N Auth, S Böcker, E Puschner, S Becker, C Paar
Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware …, 2023
52023
Explainability as a Requirement for Hardware: Introducing Explainable Hardware (XHW)
T Speith, J Speith, S Becker, Y Zou, A Biega, C Paar
2024 IEEE 32nd International Requirements Engineering Conference (RE), 354-362, 2024
4*2024
The anatomy of hardware reverse engineering: An exploration of human factors during problem solving
C Wiesen, S Becker, R Walendy, C Paar, N Rummel
ACM Transactions on Computer-Human Interaction 30 (4), 1-44, 2023
42023
52 Weeks Later: Attitudes Towards COVID-19 Apps for Different Purposes Over Time
M Kowalewski, C Utz, M Degeling, T Schnitzler, F Herbert, L Schaewitz, ...
Proceedings of the ACM on Human-Computer Interaction 7 (CSCW2), 1-45, 2023
32023
Wie arbeiten Reverse Engineers? Interdisziplinäre Forschung zum Verständnis technischer und kognitiver Prozesse beim Hardware-Reverse-Engineering
S Becker, C Wiesen, C Paar, N Rummel
Datenschutz und Datensicherheit-DuD 43, 686-690, 2019
32019
Die Nutzung von Smartphone-Apps zur Eindämmung von COVID-19 in Deutschland
M Degeling, C Utz, FM Farke, F Herbert, L Schaewitz, M Kowalewski, ...
Krämer, Dennis/Haltaufderheide, Joschka/Vollmann, Jochen (Hg.): Technologien …, 2022
22022
Hardware-Trojaner: Die unsichtbare Gefahr
J Speith, S Becker, M Ender, E Puschner, C Paar
Datenschutz und Datensicherheit-DuD 44 (7), 446-450, 2020
22020
Decoding Complexity: Exploring Human-AI Concordance in Qualitative Coding
E Kirsten, A Buckmann, A Mhaidli, S Becker
arXiv preprint arXiv:2403.06607, 2024
12024
ReverSim: A Game-Based Approach to Accessing Large Populations for Studying Human Aspects in Hardware Reverse Engineering
S Becker, C Wiesen, R Walendy, N Rummel, C Paar
arXiv preprint arXiv:2309.05740, 2023
12023
Hardware Trojan
S Becker, C Paar
Encyclopedia of Cryptography, Security and Privacy, 1-3, 2023
12023
The system can't perform the operation now. Try again later.
Articles 1–20