Skip to main content

DSI Publications

Conference Proceeding

On the scaling of machine learning attacks on PUFs with application to noise bifurcation

11th Workshop on RFID Security (RFIDSec 2015): 17–31
Jo­han­nes Tobisch, Georg T. Becker (2015)
Subject(s)
Information technology and systems
Keyword(s)
Physical unclonable function, machine learning attacks, arbiter PUF, noise-bifurcation
Journal Pages
17–31
Conference Proceeding

Security analysis of index-based syndrome coding for PUF-based key generation

IEEE International Symposium on Hardware Oriented Security and Trust - HOST 2015
Georg T. Becker, Alexander Wild, Tim Güneysu (2015)
Subject(s)
Information technology and systems
Book Review

Amerika abwickeln [Unwinding America]

Internationale Politik
Subject(s)
Economics, politics and business environment
Keyword(s)
American decline, US politics
Review of: The Unwinding: An Inner History of the New America by George Packer, The Myth of America’s Decline - Economics, and a Half Century of False Prophecies by Josef Joffe, and Amerikas Kriege by Alexander Emmerich and Philipp Gassert.
Journal Pages
138–141
Other

The Democracy delusion: Why multistakeholderism in Internet governance is wrong and dangerous

IP - Internationale Politik
Subject(s)
Economics, politics and business environment
Conference Proceeding

Germany after PRISM: A superpower for the information society?

Observer Research Foundation: 22–24
Journal Pages
22–24
Book Review

Die Illusion vom „sauberen Krieg“ [The illusion of "clean" war]

Internationale Politik
Subject(s)
Economics, politics and business environment
Keyword(s)
electronic warfare, revolution in military affairs, cyber security
Review of: Confront and Conceal. Obama’s Secret Wars and Surprising Use of American Power by David E. Sanger, Dirty Wars: The World Is A Battlefield by Jeremy Scahill, and The Way of the Knife: The CIA, a Secret Army, and a War at the Ends of the Earth by Mark Mazzetti.
Journal Pages
134–137
Working Paper

Resetting the system: Why high security computing should be a policy priority

EastWest Institute Discussion Paper No. 1/2014
Sandro Gaycken, Greg Austin (2014)
Subject(s)
Economics, politics and business environment
Pages
24
Conference Proceeding

Cybercrime: Bedrohung, Intervention, Abwehr

Subject(s)
Economics, politics and business environment
Conference Proceeding

Stealthy dopant-level hardware Trojans

Cryptographic Hardware and Embedded Systems - CHES 2013: 197–214
Georg T. Becker, Fran­ces­co Regazzoni, Chris­tof Paar, Wayne P Burleson (2013)
Subject(s)
Information technology and systems
Keyword(s)
Hardware Trojans, malicious hardware, layout modifications, Trojan side-channel
Journal Pages
197–214
Other

Stuxnet and PRISM: Symptoms of a policy failure

IP - Internationale Politik
Subject(s)
Economics, politics and business environment