Publications

Publications of the Priority Program Nano Security

Publications

  1. 2020

    1. 26. Security Promises and Vulnerabilities in Emerging Reconfigurable Nanotechnology-Based Circuits. Shubham Rai; Satwik Patnaik; Ansh Rupani; Johann Knechtel; Ozgur Sinanoglu and Akash Kumar. IEEE Transactions on Emerging Topics in Computing (2020), pp. 1–1. DOI: https://doi.org/10.1109/TETC.2020.3039375
    2. 25. A Study of the Spatial Auto-Correlation of Memory-Based Physical Unclonable Functions. Tolga Arul; Nikolaos Athanasios Anagnostopoulos; Sergej Reißig and Stefan Katzenbeisser. In 2020 European Conference on Circuit Theory and Design (ECCTD), 2020, pp. 1–4. DOI: https://doi.org/10.1109/ECCTD49232.2020.9218302
    3. 24. A Formal Approach for Detecting Vulnerabilities to Transient Execution Attacks in Out-of-Order Processors. M. R. Fadiheh; J. Müller; R. Brinkmann; S. Mitra; D. Stoffel and W. Kunz. In 2020 57th ACM/IEEE Design Automation Conference (DAC), 2020, pp. 1–6. DOI: https://doi.org/10.1109/DAC18072.2020.9218572
  2. 2021

    1. 23. A Formal Approach to  Confidentiality Verification in SoCs at the Register Transfer Level. Johannes Müller; Mohammad R. Fadiheh; Anna Duque Anton; Thomas Eisenbarth; Dominik Stoffel and Wolfgang Kunz. In To appear in Proceedings of the 58th IEEE/ACM Design Automation Conference (DAC’21), San Francisco CA, USA, 2021.
    2. 22. BasicBlocker: ISA Redesign to Make Spectre-Immune CPUs Faster. Jan Philipp Thoma; Jakob Feldtkeller; Markus Krausz; Tim Güneysu and Daniel J. Bernstein. In Proceedings of 24th International Symposium on Research in Attacks, Intrusions and  Defenses (RAID 2021), San Sebastian, Spain, 2021. DOI: https://doi.org/10.1145/3471621.3471857
    3. 21. Automatic Extraction of Secrets from the Transistor Jungle Using Laser-Assisted Side-Channel Attacks. Thilo Krachenfels; Tuba Kiyan; Shahin Tajik and Jean-Pierre Seifert. In 30th USENIX Security Symposium (USENIX Security 21), 2021.
    4. 20. A Lightweight Architecture for Hardware-Based Security in the Emerging Era of Systems of Systems. Nico Mexis; Nikolaos Athanasios Anagnostopoulos; Shuai Chen; Jan Bambach; Tolga Arul and Stefan Katzenbeisser. J. Emerg. Technol. Comput. Syst. 17, 3 (June 2021). DOI: https://doi.org/10.1145/3458824
    5. 19. Special Session: Physical Attacks through the Chip Backside: Threats, Challenges, and Opportunities. Elham Amini; Kai Bartels; Christian Boit; Marius Eggert; Norbert Herfurth; Tuba Kiyan; Thilo Krachenfels; Jean-Pierre Seifert and Shahin Tajik. In 2021 IEEE 39th VLSI Test Symposium (VTS), 2021, pp. 1--12. DOI: https://doi.org/10.1109/VTS50974.2021.9441006
    6. 18. Nano Security: From Nano-Electronics to Secure Systems. Ilia Polian; Frank Altmann; Tolga Arul; Christian Boit; Ralf Brederlow; Lucas Davi; Rolf Drechsler; Nan Du; Thomas Eisenbarth; Tim Güneysu; Sascha Hermann; Matthias Hiller; Rainer Leupers; Farhad Merchant; Thomas Mussenbrock; Stefan Katzenbeisser; Akash Kumar; Wolfgang Kunz; Thomas Mikolajick; Vivek Pachauri; Jean-Pierre Seifert; Frank Sill Torres and Jens Trommer. In Proceedings of the Conference on Design, Automation &  Test in Europe (DATE’21), Virtual Event, 2021.
    7. 17. HERA: Hotpatching of Embedded Real-time Applications. Christian Niesler; Sebastian Surminski and Lucas Davi. In Proceedings of the Network and Distributed System Security Symposium (NDSS) 2021, 2021. DOI: https://doi.org/10.14722/ndss.2021.24159
    8. 16. Vertical IP Protection of the Next-Generation Devices: Quo Vadis? Shubham Rai; Siddharth Garg; Christian Pilato; Vladimir Herdt; Elmira Moussavi; Dominik Sisejkovic; Ramesh Karri; Rolf Drechsler; Farhad Merchant and Akash Kumar. In 2021 Design, Automation  Test in Europe Conference Exhibition (DATE), 2021, pp. 1905–1914. DOI: https://doi.org/10.23919/DATE51398.2021.9474132
    9. 15. Exploring Physical Synthesis for Circuits based on Emerging Reconfigurable Nanotechnologies. Andreas Krinke; Shubham Rai; Akash Kumar and Jens Lienig. In 2021 IEEE/ACM International Conference On Computer Aided Design (ICCAD), 2021, pp. 1–9. DOI: https://doi.org/10.1109/ICCAD51958.2021.9643439
    10. 14. A Design for a Secure Network of Networks Using a Hardware and Software Co-Engineering Architecture. Nico Mexis; Nikolaos Athanasios Anagnostopoulos; Shuai Chen; Jan Bambach; Tolga Arul and Stefan Katzenbeisser. In Proceedings of the SIGCOMM ’21 Poster and Demo Sessions. Association for Computing Machinery, New York, NY, USA, 2021, pp. 65–67.
    11. 13. Low-power emerging memristive designs towards secure hardware systems for applications in internet of things. Nan Du; Heidemarie Schmidt and Ilia Polian. Nano Materials Science (2021). DOI: https://doi.org/10.1016/j.nanoms.2021.01.001
    12. 12. RealSWATT: Remote Software-Based Attestation for Embedded Devices under Realtime Constraints. Sebastian Surminski; Christian Niesler; Ferdinand Brasser; Lucas Davi and Ahmad-Reza Sadeghi. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, 2021, pp. 2890–2905. DOI: https://doi.org/10.1145/3460120.3484788
    13. 11. Low-Temperature Attacks Against Digital Electronics: A Challenge for the Security of Superconducting Modules in High-Speed Magnetic Levitation (MagLev) Trains. Nikolaos Athanasios Anagnostopoulos; Yufan Fan; Markus Heinrich; Nikolay Matyunin; Dominik Püllen; Philipp Muth; Christian Hatzfeld; Markus Rosenstihl; Tolga Arul and Stefan Katzenbeisser. In 2021 IEEE 14th Workshop on Low Temperature Electronics (WOLTE), 2021, pp. 1–4. DOI: https://doi.org/10.1109/WOLTE49037.2021.9555437
    14. 10. Metastability with Emerging Reconfigurable Transistors: Exploiting Ambipolarity for Throughput. Abhiroop Bhattacharjee; Shubham Rai; Ansh Rupani; Michael Raitza and Akash Kumar. In 2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC), 2021, pp. 1–6. DOI: https://doi.org/10.1109/VLSI-SoC53125.2021.9607015
    15. 9. Preserving Self-Duality During Logic Synthesis for Emerging Reconfigurable Nanotechnologies. Shubham Rai; Heinz Riener; Giovanni De Micheli and Akash Kumar. In 2021 Design, Automation  Test in Europe Conference Exhibition (DATE), 2021, pp. 354–359. DOI: https://doi.org/10.23919/DATE51398.2021.9474112
  3. 2022

    1. 8. DELTA: DEsigning a steaLthy trigger mechanism for analog hardware Trojans and its detection Analysis,. Nishant Gupta; Mohil Desai; Mark Wijtvliet; Shubham Rai and Akash Kumar. In 2022 59th ACM/IEEE Design Automation Conference (DAC) (to appear), 2022, pp. 1–6.
    2. 7. On the Sustainability of Lightweight Cryptography Based on PUFs Implemented on NAND Flash Memories Using Programming Disturbances. Nikolaos Athanasios Anagnostopoulos; Yufan Fan; Muhammad Umair Saleem; Nico Mexis; Florian Frank; Tolga Arul and Stefan Katzenbeisser. (April 2022). DOI: https://doi.org/10.36227/techrxiv.19529263.v1
    3. 6. Toward Optical Probing Resistant Circuits: A Comparison of Logic Styles and Circuit Design Techniques. Sajjad Parvin; Thilo Krachenfels; Shahin Tajik; Jean-Pierre Seifert; Frank Sill Torres and Rolf Drechsler. In To appear in Proceedings of the 27th Asia and South Pacific Design Automation Conference  (ASP-DAC’22), 2022.
    4. 5. pHGen: A pH-Based Key Generation Mechanism Using ISFETs. Elmira Moussavi; Dominik Sisejkovic; Fabian Brings; Daniyar Kizatov; Animesh Singh; Xuan Thang Vu; Sven Ingebrandt; Rainer Leupers; Vivek Pachauri and Farhad Merchant. In Proceedings of the 2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2022.
    5. 4. Stochastic behavior of an interface-based memristive device. Sahitya Yarragolla; Torben Hemke; Jan Trieschmann; Finn Zahari; Hermann Kohlstedt and Thomas Mussenbrock. Journal of Applied Physics 131, 13 (2022), pp. 134304. DOI: https://doi.org/10.1063/5.0084085
    6. 3. Towards a Formally Verified Hardware Root-of-Trust for Data-Oblivious Computing. L. Deutschmann; J. Müller; M. R. Fadiheh; D. Stoffel and W. Kunz. In to appear in Procceedings of IEEE/ACM Design Automation Conference (DAC), 2022, 2022.
    7. 2. An Exhaustive Approach to Detecting Transient Execution Side Channels in RTL Designs of Processors. Mohammad Rahmani Fadiheh; Alex Wezel; Johannes Muller; Jorg Bormann; Sayak Ray; Jason M. Fung; Subhasish Mitra; Dominik Stoffel and Wolfgang Kunz. IEEE Transactions on Computers (2022), pp. 1–1. DOI: https://doi.org/10.1109/TC.2022.3152666
    8. 1. On the Sustainability of Lightweight Cryptography Based on PUFs Implemented on NAND Flash Memories Using Programming Disturbances. Nikolaos Athanasios Anagnostopoulos; Yufan Fan; Muhammad Umair Saleem; Nico Mexis; Florian Frank; Tolga Arul and Stefan Katzenbeisser. 2022.2022. DOI: https://doi.org/10.48550/ARXIV.2204.02498
To the top of the page