On the difficulty of FSM-based hardware obfuscation M Fyrbiak, S Wallat, J Déchelotte, N Albartus, S Böcker, R Tessier, C Paar IACR Transactions on Cryptographic Hardware and Embedded Systems, 293-330, 2018 | 78 | 2018 |
Dana-universal dataflow analysis for gate-level netlist reverse engineering N Albartus, M Hoffmann, S Temme, L Azriel, C Paar Cryptology ePrint Archive, 2020 | 51 | 2020 |
A survey of algorithmic methods in IC reverse engineering L Azriel, J Speith, N Albartus, R Ginosar, A Mendelson, C Paar Journal of Cryptographic Engineering 11 (3), 299-315, 2021 | 34 | 2021 |
Highway to HAL: open-sourcing the first extendable gate-level netlist reverse engineering framework S Wallat, N Albartus, S Becker, M Hoffmann, M Ender, M Fyrbiak, A Drees, ... Proceedings of the 16th ACM International Conference on Computing Frontiers …, 2019 | 33 | 2019 |
Teaching hardware reverse engineering: educational guidelines and practical insights C Wiesen, S Becker, M Fyrbiak, N Albartus, M Elson, N Rummel, C Paar 2018 IEEE International Conference on Teaching, Assessment, and Learning for …, 2018 | 28 | 2018 |
An exploratory study of hardware reverse engineering—technical and cognitive processes S Becker, C Wiesen, N Albartus, N Rummel, C Paar Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 285-300, 2020 | 20 | 2020 |
Towards cognitive obfuscation: impeding hardware reverse engineering based on psychological insights C Wiesen, N Albartus, M Hoffmann, S Becker, S Wallat, M Fyrbiak, ... Proceedings of the 24th Asia and South Pacific Design Automation Conference …, 2019 | 16 | 2019 |
Promoting the Acquisition of Hardware Reverse Engineering Skills C Wiesen, S Becker, N Albartus, C Paar, N Rummel | 9 | 2019 |
Hardware penetration testing knocks your SoCs off M Fischer, F Langer, J Mono, C Nasenberg, N Albartus IEEE Design & Test 38 (1), 14-21, 2020 | 7 | 2020 |
LifeLine for FPGA protection: Obfuscated cryptography for real-world security F Stolz, N Albartus, J Speith, S Klix, C Nasenberg, A Gula, M Fyrbiak, ... Cryptology ePrint Archive, 2021 | 6 | 2021 |
On the design and misuse of microcoded (embedded) processors—A cautionary note N Albartus, C Nasenberg, F Stolz, M Fyrbiak, C Paar, R Tessier 30th USENIX Security Symposium (USENIX Security 21), 267-284, 2021 | 6 | 2021 |
On the Malicious Potential of Xilinx’Internal Configuration Access Port (ICAP) N Albartus, M Ender, JN Möller, M Fyrbiak, C Paar, R Tessier 2023 International Conference on Field Programmable Technology (ICFPT), 1-1, 2023 | 1 | 2023 |
Highway to HAL S Wallat, N Albartus, S Becker, M Hoffmann, M Ender, M Fyrbiak, A Drees, ... ACM, 2019 | 1 | 2019 |
On the Malicious Potential of Xilinx’s Internal Configuration Access Port (ICAP) N Albartus*, M Ender*, JN Möller*, M Fyrbiak, C Paar, R Tessier ACM Transactions on Reconfigurable Technology and Systems 17 (2), 1-28, 2024 | | 2024 |
Stealing Maggie's Secrets--On the Challenges of IP Theft Through FPGA Reverse Engineering S Klix, N Albartus, J Speith, P Staat, A Verstege, A Wilde, D Lammers, ... arXiv preprint arXiv:2312.06195, 2023 | | 2023 |