Skip to main content

DSI Publications

Other

Die Sicherheit Deutschlands wird auch im Internet verteidigt

Internationale Politik und Gesellschaft 2017 (4)
Martin Schallbruch (2017)
Subject(s)
Technology, R&D management
Volume
2017
Other

The EU now regulates Internet services. But what does that mean, exactly?

European Business Review March
Martin Schallbruch (2017)
Subject(s)
Technology, R&D management
Keyword(s)
Big data & analytics, business mobility, E-Commerce, Internet of Things
Conference Magazine

Bundeswehr: Cyber security, the German way

CyFy Journal Digital Debates 2016 3 (2016)
Subject(s)
Information technology and systems
Keyword(s)
Cyber command, cyber war, espionage, Germany, sabotage, Ursula von der Leyen
Volume
3
Conference Proceeding

A design methodology for stealthy parametric trojans and its application to bug attacks

Cryptographic Hardware and Embedded Systems – CHES 2016: 625–647
Sa­ma­neh Ghandali, Georg T. Becker, Daniel Holcomb, Christof Paar (2016)
Subject(s)
Information technology and systems
Keyword(s)
Hardware Trojans, malicious hardware, layout modifications, bug attacks
Journal Pages
625–647
Conference Proceeding

On the problems of realizing reliable and efficient ring oscillator PUFs on FPGAs

IEEE International Symposium on Hardware Oriented Security and Trust - HOST 2016
Alexander Wild, Georg T. Becker, Tim Güneysu (2016)
Subject(s)
Information technology and systems
Keyword(s)
Physical unclonable functions (PUFs), ring-oscillator, FPGA
Book Review

Krieg der Knöpfe [War of the buttons]

Internationale Politik
Subject(s)
Economics, politics and business environment
Keyword(s)
cyber security, electronic warfare
Review of: @War – The Rise of the Military-Internet Complex by Shane Harris, Digitale Diktatur. Totalüberwachung, Datenmissbrauch, Cyberkrieg by Stefan Aust and Thomas Ammann.
Journal Pages
134–138
Conference Proceeding

Biometrische Zugangskontrollen – Datenschutz, rechtliche Fragen, praktische Umsetzung [Biometrical access control - data protection, legal issues, and practical implementation]

Zeitschrift für Wett- und Glücksspielrecht 3: 5–8
Martin Schallbruch (2015)
Subject(s)
Technology, R&D management
Journal Pages
5–8
Conference Proceeding

The gap between promise and reality: On the insecurity of XOR Arbiter PUFs

Cryptographic Hardware and Embedded Systems - CHES 2015
Georg T. Becker (2015)
Subject(s)
Information technology and systems
Keyword(s)
Physical unclonable functions, machine learning, real-world attacks, XOR PUFs
Blog

Germany's cybersecurity law: Mostly harmless, but heavily contested

Council on Foreign Relations
Subject(s)
Economics, politics and business environment
Conference Proceeding

Development of a layout-level hardware obfuscation tool

IEEE Computer Society Annual Symposium on VLSI - ISVLSI 2015 (Invited Paper)
Shweta Malik, Georg T. Becker, Christof Paar, Wayne Burleson (2015)
Subject(s)
Information technology and systems
Keyword(s)
Logic gates, wires, libraries, standards, hardware, wiring, industries