Christopher Huth

Orcid: 0000-0002-1473-1221

According to our database1, Christopher Huth authored at least 19 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Fuzzing Embedded Systems using Debug Interfaces.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

2022
Embedded fuzzing: a review of challenges, tools, and solutions.
Cybersecur., 2022

2020
On the feasibility of deriving cryptographic keys from MEMS sensors.
J. Cryptogr. Eng., 2020

EASI: Edge-Based Sender Identification on Resource-Constrained Platforms for Automotive Networks.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

2019
On the Robustness of Signal Characteristic-Based Sender Identification.
CoRR, 2019

Methodology Design for Dynamic Test Method Generation via Existing Module Tests.
Proceedings of the 30. Krypto-Tag, Berlin, Germany, March 28-29, 2019, 2019

2018
Physical-layer security architectures for the internet of things.
PhD thesis, 2018

Scission: Signal Characteristic-Based Sender Identification and Intrusion Detection in Automotive Networks.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Securing Systems With Indispensable Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the Internet of Things.
IEEE Access, 2017

LWE-based lossless computational fuzzy extractor for the Internet of Things.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017

On the Fingerprinting of Electronic Control Units Using Physical Characteristics in Controller Area Networks.
Proceedings of the 47. Jahrestagung der Gesellschaft für Informatik, 2017

2016
MEMS-based Gyroscopes as Physical Unclonable Functions.
IACR Cryptol. ePrint Arch., 2016

Securing Systems with Scarce Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the IoT.
IACR Cryptol. ePrint Arch., 2016

Information reconciliation schemes in physical-layer security: A survey.
Comput. Networks, 2016

Secure software update and IP protection for untrusted devices in the Internet of Things via physically unclonable functions.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016

MEMS Gyroscopes as Physical Unclonable Functions.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

On the Energy Cost of Channel Based Key Agreement.
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, 2016

2015
Securing systems on the Internet of Things via physical properties of devices and communications.
Proceedings of the Annual IEEE Systems Conference, 2015


  Loading...