Skip to main content

DSI Publications

Conference Proceeding

Cyber security awareness and norm-development: Practical issues for engaging critical private actors

MIT
Subject(s)
Economics, politics and business environment
Conference Proceeding

Zero day governance: A(n inexpensive) solution to the cyber-security problem

University of Toronto
Sandro Gaycken, Felix Lindner (2012)
Subject(s)
Economics, politics and business environment
Conference Proceeding

Implementing hardware Trojans: Experiences from a hardware trojan challenge

29th IEEE International Conference on Computer Design (ICCD) 2011 (Invited Paper)
Georg T. Becker, Ashwin Lak­sh­mi­nara­sim­han, Lang Lin, Sud­he­en­dra Sri­vath­sa, Vik­ram B Su­resh, Wayne Bu­rel­son (2011)
Subject(s)
Information technology and systems
Keyword(s)
Trojan horses, hardware, delay, logic gates, correlation, encryption, field programmable gate arrays
Conference Proceeding

Side-channel watermarks for embedded software

IEEE 9th International - New Circuits and Systems Conference (NEWCAS)
Georg T. Becker, Wayne Burleson, Chris­tof Paar (2011)
Subject(s)
Information technology and systems
Keyword(s)
Watermarking, software, power demand, generators, correlation, robustness, microcontrollers
Comment

The necessity of (some) certainty: A critical remark concerning Matthew Sklerov's concept of “active defense”

Journal of Military and Strategic Studies 12 (2): 1–6
Subject(s)
Economics, politics and business environment
Volume
12
Journal Pages
1–6
ISSN (Online)
1488-559X
Conference Proceeding

Secure location verification: A security analysis of GPS signal authentication

Data and Applications Security and Privacy XXIV. DBSec 2010: 366–373
Georg T. Becker, Sher­man C Lo, David S De Lo­ren­zo, Per K Enge, Christof Paar (2010)
Subject(s)
Information technology and systems
Keyword(s)
Location verification, GPS, signal authentication, location based access control, geosecurity
Journal Pages
366–373
Conference Proceeding

Side-channel based watermarks for integrated circuits

IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)
Georg T. Becker, Mar­kus Kas­per, Amir Mo­ra­di, Chris­tof Paar (2010)
Subject(s)
Information technology and systems
Keyword(s)
Watermarking, protection, integrated circuit synthesis, hardware design languages, counting circuits, security, digital integrated circuits, integrated circuit reliability, integrated circuit noise, floors
Book Review

Gewissensbisse: Ethische Probleme der Informatik. Biometrie – Datenschutz – geistiges Eigentum

Review of Gewissensbisse: Ethische Probleme der Informatik. Biometrie – Datenschutz – geistiges Eigentum, by Debora Weber-Wulff, Christina Class, Wolfgang Coy, Constanze Kurz, David Zellhöfer, Hildesheim: Zeitschrift für Didaktik der Informatik
Subject(s)
Economics, politics and business environment
Secondary Title
Gewissensbisse: Ethische Probleme der Informatik. Biometrie – Datenschutz – geistiges Eigentum
Journal Pages
4–8
Conference Proceeding

Efficient authentication mechanisms for navigation systems – a radio-navigation case study

22nd International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS 2009): 901–912
Georg T. Becker, Sher­man C Lo, David S De Lorenzo, Di Qiu, Chris­tof Paar, Per Enge (2009)
Subject(s)
Information technology and systems
Keyword(s)
Location verification, signal authentication, hash-chains
Journal Pages
901–912
Conference Proceeding

Gegenüberwachungstechnik: Die Zugänglichkeit von Überwachungstechnologie als ethische Pflicht des Technikers.

Subject(s)
Economics, politics and business environment