David F. Oswald

Orcid: 0000-0001-8524-5282

According to our database1, David F. Oswald authored at least 47 papers between 2009 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
PMFault: Faulting and Bricking Server CPUs through Management Interfaces Or: A Modern Example of Halt and Catch Fire.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

PMFault: Faulting and Bricking Server CPUs through Management Interfaces.
CoRR, 2023

CHERI-TrEE: Flexible enclaves on capability machines.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

Symbolic modelling of remote attestation protocols for device and app integrity on Android.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

BioLeak: Exploiting Cache Timing to Recover Fingerprint Minutiae Coordinates.
Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security, 2023

2022
Magnifying Side-Channel Leakage of Lattice-Based Cryptosystems With Chosen Ciphertexts: The Case Study of Kyber.
IEEE Trans. Computers, 2022

A Tale of Four Gates - Privilege Escalation and Permission Bypasses on Android Through App Components.
Proceedings of the Computer Security - ESORICS 2022, 2022

Reveal the Invisible Secret: Chosen-Ciphertext Side-Channel Attacks on NTRU.
Proceedings of the Smart Card Research and Advanced Applications, 2022

2021
Fill your Boots: Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

FuzzyKey: Comparing Fuzzy Cryptographic Primitives on Resource-Constrained Devices.
IACR Cryptol. ePrint Arch., 2021

VoltPillager: Hardware-based fault injection attacks against Intel SGX Enclaves using the SVID voltage scaling interface.
Proceedings of the 30th USENIX Security Symposium, 2021

PLATYPUS: Software-based Power Side-Channel Attacks on x86.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

2020
Dismantling DST80-based Immobiliser Systems.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Plundervolt: How a Little Bit of Undervolting Can Create a Lot of Trouble.
IEEE Secur. Priv., 2020

Magnifying Side-Channel Leakage of Lattice-Based Cryptosystems with Chosen Ciphertexts: The Case Study of Kyber.
IACR Cryptol. ePrint Arch., 2020

Plundervolt: Software-based Fault Injection Attacks against Intel SGX.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Faulty Point Unit: ABI Poisoning Attacks on Intel SGX.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Dismantling the AUT64 Automotive Cipher.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Breaking All the Things - A Systematic Survey of Firmware Extraction Techniques for IoT Devices.
Proceedings of the Smart Card Research and Advanced Applications, 2018

2017
Breaking (and Fixing) a Widely Used Continuous Glucose Monitoring System.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

2016
Attacking embedded ECC implementations through cmov side channels.
IACR Cryptol. ePrint Arch., 2016

Lock It and Still Lose It - on the (In)Security of Automotive Remote Keyless Entry Systems.
Proceedings of the 25th USENIX Security Symposium, 2016

\upmu Proxy: A Hardware Relay for Anonymous and Secure Internet Access.
Proceedings of the Radio Frequency Identification and IoT Security, 2016

Wireless Attacks on Automotive Remote Keyless Entry Systems.
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, 2016

Side-Channel Attacks on Fingerprint Matching Algorithms.
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, 2016

2015
Physical Security Evaluation of the Bitstream Encryption Mechanism of Altera Stratix II and Stratix III FPGAs.
ACM Trans. Reconfigurable Technol. Syst., 2015

Scandalee: a side-channel-based disassembler using local electromagnetic emanations.
Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, 2015

Side-Channel Attacks on SHA-1-Based Product Authentication ICs.
Proceedings of the Smart Card Research and Advanced Applications, 2015

2014
Cryptographic Algorithms on the GA144 Asynchronous Multi-Core Processor - Implementation and Side-Channel Analysis.
J. Signal Process. Syst., 2014

Microcontrollers as (In)Security Devices for Pervasive Computing Applications.
Proc. IEEE, 2014

Sweet Dreams and Nightmares: Security in the Internet of Things.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014

2013
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System - Full Version.
IACR Cryptol. ePrint Arch., 2013

When Reverse-Engineering Meets Side-Channel Analysis - Digital Lockpicking in Practice.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

Rights Management with NFC Smartphones and Electronic ID Cards: A Proof of Concept for Modern Car Sharing.
Proceedings of the Radio Frequency Identification, 2013

Side-Channel Attacks on the Yubikey 2 One-Time Password Generator.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

Side-channel attacks on the bitstream encryption mechanism of Altera Stratix II: facilitating black-box analysis using software reverse-engineering.
Proceedings of the 2013 ACM/SIGDA International Symposium on Field Programmable Gate Arrays, 2013

Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

2012
Improving Side-Channel Analysis with Optimal Linear Transforms.
Proceedings of the Smart Card Research and Advanced Applications, 2012

2011
Seitenkanalanalyse kontaktloser SmartCards.
Datenschutz und Datensicherheit, 2011

Wireless security threats: Eavesdropping and detecting of active RFIDs and remote controls in the wild.
Proceedings of the 19th International Conference on Software, 2011

Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation.
Proceedings of the RFID. Security and Privacy - 7th International Workshop, 2011

Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates in the Real World.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

2010
A Versatile Framework for Implementation Attacks on Cryptographic RFIDs and Embedded Devices.
Trans. Comput. Sci., 2010

Combined Implementation Attack Resistant Exponentiation.
Proceedings of the Progress in Cryptology, 2010

Chameleon: A Versatile Emulator for Contactless Smartcards.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

2009
EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment.
Proceedings of the Information Security Applications, 10th International Workshop, 2009


  Loading...