TrustLite: A security architecture for tiny embedded devices P Koeberl, S Schulz, AR Sadeghi, V Varadharajan Proceedings of the Ninth European Conference on Computer Systems, 1-14, 2014 | 469 | 2014 |
TyTAN: Tiny trust anchor for tiny devices F Brasser, B El Mahjoub, AR Sadeghi, C Wachsmann, P Koeberl Proceedings of the 52nd annual design automation conference, 1-6, 2015 | 343 | 2015 |
HAFIX: Hardware-assisted flow integrity extension L Davi, M Hanreich, D Paul, AR Sadeghi, P Koeberl, D Sullivan, O Arias, ... Proceedings of the 52nd Annual Design Automation Conference, 1-6, 2015 | 231 | 2015 |
Hardware-assisted fine-grained control-flow integrity: Towards efficient protection of embedded systems against software exploitation L Davi, P Koeberl, AR Sadeghi Proceedings of the 51st Annual Design Automation Conference, 1-6, 2014 | 180 | 2014 |
Experimental evaluation of physically unclonable functions in 65 nm CMOS R Maes, V Rozic, I Verbauwhede, P Koeberl, E Van der Sluis, ... 2012 Proceedings of the ESSCIRC (ESSCIRC), 486-489, 2012 | 177 | 2012 |
Lo-fat: Low-overhead control flow attestation in hardware G Dessouky, S Zeitouni, T Nyman, A Paverd, L Davi, P Koeberl, N Asokan, ... Proceedings of the 54th Annual Design Automation Conference 2017, 1-6, 2017 | 168 | 2017 |
Memristor PUFs: a new generation of memory-based physically unclonable functions P Koeberl, Ü Kocabaş, AR Sadeghi 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE), 428-431, 2013 | 154 | 2013 |
Device authentication using a physically unclonable functions based key generation system P Koeberl, J Li US Patent 8,938,792, 2015 | 123 | 2015 |
Entropy loss in PUF-based key generation schemes: The repetition code pitfall P Koeberl, J Li, A Rajan, W Wu 2014 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2014 | 90 | 2014 |
Remanence decay side-channel: The PUF case S Zeitouni, Y Oren, C Wachsmann, P Koeberl, AR Sadeghi IEEE Transactions on Information Forensics and Security 11 (6), 1106-1116, 2015 | 76 | 2015 |
Logically reconfigurable PUFs: Memory-based secure key storage I Eichhorn, P Koeberl, V van der Leest Proceedings of the sixth ACM workshop on Scalable trusted computing, 59-64, 2011 | 63 | 2011 |
13fJ/bit probing-resilient 250K PUF array with soft darkbit masking for 1.94% bit-error in 22nm tri-gate CMOS S Satpathy, S Mathew, J Li, P Koeberl, M Anders, H Kaul, G Chen, ... ESSCIRC 2014-40th European Solid State Circuits Conference (ESSCIRC), 239-242, 2014 | 39 | 2014 |
Evaluation of a PUF Device Authentication Scheme on a Discrete 0.13 um SRAM P Koeberl, J Li, R Maes, A Rajan, C Vishik, M Wójcik International Conference on Trusted Systems, 271-288, 2011 | 34 | 2011 |
Time to rethink: Trust brokerage using trusted execution environments P Koeberl, V Phegade, A Rajan, T Schneider, S Schulz, M Zhdanova International Conference on Trust and Trustworthy Computing, 181-190, 2015 | 25 | 2015 |
A practical device authentication scheme using SRAM PUFs P Koeberl, J Li, A Rajan, C Vishik, W Wu International Conference on Trust and Trustworthy Computing, 63-77, 2011 | 17 | 2011 |
Threat agents: A necessary component of threat analysis T Casey, P Koeberl, C Vishik Proceedings of the sixth annual workshop on cyber security and information …, 2010 | 17 | 2010 |
A spatial majority voting technique to reduce error rate of physically unclonable functions P Koeberl, J Li, W Wu International Conference on Trusted Systems, 36-52, 2013 | 14 | 2013 |
Multi-tenant FPGA security: Challenges and opportunities P Koeberl Proceedings of the 2020 ACM/SIGDA International Symposium on Field …, 2020 | 9 | 2020 |
A practical device authentication scheme using SRAM PUFs P Koeberl, J Li, R Maes, A Rajan, C Vishik, M Wójcik, W Wu Journal of Cryptographic Engineering 2, 255-269, 2012 | 9 | 2012 |
Defining threat agents: Towards a more complete threat analysis T Casey, P Koeberl, C Vishik ISSE 2010 Securing Electronic Business Processes: Highlights of the …, 2011 | 4 | 2011 |