Dominik Merli

According to our database1, Dominik Merli authored at least 27 papers between 2010 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
A Secure Network Scanner Architecture for Asset Management in Strongly Segmented ICS Networks.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021


Salt&Pepper: Spice up Security Behavior with Cognitive Triggers.
Proceedings of the EICC '21: European Interdisciplinary Cybersecurity Conference, 2021

2020
Impact of Active Scanning Tools for Device Discovery in Industrial Networks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

Analysis of Industrial Device Architectures for Real-Time Operations Under Denial of Service Attacks.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

2019
Network Scanning and Mapping for IIoT Edge Node Device Security.
CoRR, 2019

LICSTER - A Low-cost ICS Security Testbed for Education and Research.
CoRR, 2019

Efficient Intrusion Detection on Low-Performance Industrial IoT Edge Node Devices.
CoRR, 2019

CoRT: A Communication Robustness Testbed for Industrial Control System Components.
CoRR, 2019

Efficient Passive ICS Device Discovery and Identification by MAC Address Correlation.
CoRR, 2019

A Secure Dual-MCU Architecture for Robust Communication of IIoT Devices.
Proceedings of the 8th Mediterranean Conference on Embedded Computing, 2019

2018
You Snooze, You Lose: Measuring PLC Cycle Times under Attacks.
Proceedings of the 12th USENIX Workshop on Offensive Technologies, 2018

2015
A new Definition and Classification of Physical Unclonable Functions.
Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, 2015

2014
Hardware Trojans: current challenges and approaches.
IET Comput. Digit. Tech., 2014

2013
Attacking and protecting ring oscillator physical unclonable functions and code-offset fuzzy extractors.
PhD thesis, 2013

Protecting PUF Error Correction by Codeword Masking.
IACR Cryptol. ePrint Arch., 2013

Localized electromagnetic analysis of RO PUFs.
Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, 2013

Comprehensive analysis of software countermeasures against fault attacks.
Proceedings of the Design, Automation and Test in Europe, 2013

Physical unclonable functions: devices for cryptostorage.
Proceedings of the TrustED'13, 2013

Identities for Embedded Systems Enabled by Physical Unclonable Functions.
Proceedings of the Number Theory and Cryptography, 2013

2012
Physical Unclonable Functions.
Datenschutz und Datensicherheit, 2012

A New Security Architecture for Smartcards Utilizing PUFs.
Proceedings of the ISSE 2012, 2012

Complementary IBS: Application specific error correction for PUFs.
Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 2012

Strengths and Limitations of High-Resolution Electromagnetic Field Measurements for Side-Channel Analysis.
Proceedings of the Smart Card Research and Advanced Applications, 2012

Reliability bound and channel capacity of IBS-based fuzzy embedders.
Proceedings of the 2012 NASA/ESA Conference on Adaptive Hardware and Systems, 2012

2011
Side-Channel Analysis of PUFs and Fuzzy Extractors.
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011

2010
Improving the quality of ring oscillator PUFs on FPGAs.
Proceedings of the 5th Workshop on Embedded Systems Security, 2010


  Loading...