Skip to main content

DSI Publications

DSI Industrial & Policy Recommendations Series (IPR)

Crypto-debate: Strategies for responsible behavior of law enforcement and intelligence agencies on matters of cryptography, vulnerabilities and tools

DSI Industrial & Policy Recommendations Series (IPR) 2017 (3)
Martin Schallbruch (2017)
Subject(s)
Technology, R&D management
Keyword(s)
Cryptograpy, intelligence agencies, IT security law, IT security regulation, industrial recommendations
JEL Code(s)
O30, O33, O38
In January 2017, the Digital Society Institute hosted a workshop on the “Crypto-debate: Strategies for responsible dealings with security agencies on matters of cryptography, vulnerabilities and tools.” Dr. Stefan Grosse (Federal Ministry of the Interior), Ralf Koenzen (Lancom Systems), Linus Neumann (Chaos Computer Club) and Stefan Heumann (Stiftung Neue Verantwortung) contributed to the workshop.
This issue contains German text and English translation in one file.
Volume
2017
Book

Information security of highly critical wireless networks

1st ed.,Cham: Springer International Publishing
Maurizio Martellini, Stanislav Abaimov, Sandro Gaycken, Clay Wilson (2017)
Subject(s)
Technology, R&D management
Keyword(s)
Cybersecurity, wireless networks, telecommunications, Zwave, ZigBee, WiFi, smart grid, electrical systems, high criticality wireless networks, information security, critical infrastructures, cyber norms, internet governance, cyber legislation, ICT risk management, cyber metrics, internet jurisdiction, information security threats
Volume
1st ed.,
ISBN
978-3-319-52904-2
ISBN (Online)
978-3-319-52905-9
Other

The EU now regulates Internet services. But what does that mean, exactly?

European Business Review March
Martin Schallbruch (2017)
Subject(s)
Technology, R&D management
Keyword(s)
Big data & analytics, business mobility, E-Commerce, Internet of Things
DSI Industrial & Policy Recommendations Series (IPR)

Requirements for data protection and IT security law regarding technology development

DSI Industrial & Policy Recommendations Series (IPR) 2017 (2)
Martin Schallbruch (2017)
Subject(s)
Technology, R&D management
Keyword(s)
data protection, privacy, IT security law, IT security regulation, industrial recommendations, EU General Data Protection Regulation (GDPR), cyberthreats
JEL Code(s)
O30, O33, O38
In December 2016, the Digital Society Institute hosted a workshop on requirements to create a compatibility of data protection and IT security regulation. Contributions to the workshop were given by Marit Hansen (ULD Schleswig-Holstein), Tomasz Lawicki (TeleTrusT working group “State of the Art Technology”), Steve Ritter (BSI) and Johannes Schlattmann (LVM).
The issue contains German text and English translation in one file.
Volume
2017
Book Chapter

Hardware obfuscation: Techniques and open challenges

In Foundations of hardware IP protection, edited by Lilian Bossuet, Lionel Torres, 105–123. New York, NY: Springer International Publishing.
Georg T. Becker, Marc Fyrbiak, Christian Kison (2017)
Subject(s)
Information technology and systems
Keyword(s)
Reverse-engineering, hardware obfuscation, IP-protection, camouflage gates, obfuscation, control flow obfuscation
Secondary Title
Foundations of hardware IP protection
Pages
105–123
ISBN
978-3-319-50378-3
ISBN (Online)
978-3-319-50380-6
DSI Industrial & Policy Recommendations Series (IPR)

Vulnerabilities in IT-security products

DSI Industrial & Policy Recommendations Series (IPR) 2017 (1)
Subject(s)
Technology, R&D management
Keyword(s)
IT security products, IT security, IT-sec industry, industrial recommendations, hacking
In October 2016, the Digital Society Institute hosted a workshop dedicated to the topic of vulnerabilities at large and in particular of vulnerabilities in security products. The workshop included talks from Thomas Dullien (former Google Project Zero), Matthias Luft (ERNW), Dr. Christoph Peylo (T-Labs) and a comment from Michael Kranawetter, (Head of Information Security Microsoft Germany).
Volume
2017
Journal Article

Bitstream Fault Injections (BiFI) – Automated fault attacks against SRAM-based FPGAs

IEEE Transactions on Computers PP (99): 1–13
Pawel Swierczynski, Georg T. Becker, Amir Moradi, Christof Paar (2017)
Subject(s)
Information technology and systems; Technology, R&D management
Keyword(s)
Bitstream encryption vulnerability, FPGA security, bitstream fault injection, automated key recovery, AES
Volume
PP
Journal Pages
1–13
Conference Magazine

Bundeswehr: Cyber security, the German way

CyFy Journal Digital Debates 2016 3 (2016)
Subject(s)
Information technology and systems
Keyword(s)
Cyber command, cyber war, espionage, Germany, sabotage, Ursula von der Leyen
Volume
3
Journal Article

Die EU-Richtlinie über Netz- und Informationssicherheit: Anforderungen an digitale Dienste [The EU directive on network and information security: Requirements for digital services]

Computer und Recht 2016 (10): 663–670
Martin Schallbruch (2016)
Subject(s)
Technology, R&D management
Volume
2016
Journal Pages
663–670
ISSN (Online)
2194-4172
Conference Proceeding

A design methodology for stealthy parametric trojans and its application to bug attacks

Cryptographic Hardware and Embedded Systems – CHES 2016: 625–647
Sa­ma­neh Ghandali, Georg T. Becker, Daniel Holcomb, Christof Paar (2016)
Subject(s)
Information technology and systems
Keyword(s)
Hardware Trojans, malicious hardware, layout modifications, bug attacks
Journal Pages
625–647