Marc Fyrbiak

Orcid: 0000-0002-4266-7108

According to our database1, Marc Fyrbiak authored at least 25 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
JustSTART: How to Find an RSA Authentication Bypass on Xilinx UltraScale(+) with Fuzzing.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

2023
Recommendation for a holistic secure embedded ISA extension.
IACR Cryptol. ePrint Arch., 2023

On the Malicious Potential of Xilinx' Internal Configuration Access Port (ICAP).
Proceedings of the International Conference on Field Programmable Technology, 2023

2022
How Not to Protect Your IP - An Industry-Wide Break of IEEE 1735 Implementations.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2021
LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

On the Design and Misuse of Microcoded (Embedded) Processors - A Cautionary Note.
IACR Cryptol. ePrint Arch., 2021

2020
Graph Similarity and its Applications to Hardware Security.
IEEE Trans. Computers, 2020

2019
Constructive and destructive reverse engineering aspects of digital systems.
PhD thesis, 2019

Security Implications of Intentional Capacitive Crosstalk.
IEEE Trans. Inf. Forensics Secur., 2019

Highway to HAL: open-sourcing the first extendable gate-level netlist reverse engineering framework.
Proceedings of the 16th ACM International Conference on Computing Frontiers, 2019

Towards cognitive obfuscation: impeding hardware reverse engineering based on psychological insights.
Proceedings of the 24th Asia and South Pacific Design Automation Conference, 2019

2018
On the Difficulty of FSM-based Hardware Obfuscation.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Hybrid Obfuscation to Protect Against Disclosure Attacks on Embedded Microprocessors.
IEEE Trans. Computers, 2018

Teaching Hardware Reverse Engineering: Educational Guidelines and Practical Insights.
Proceedings of the IEEE International Conference on Teaching, 2018

An Exploratory Analysis of Microcode as a Building Block for System Defenses.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Interdiction in practice - Hardware Trojan against a high-security USB flash drive.
J. Cryptogr. Eng., 2017

HAL- The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion.
IACR Cryptol. ePrint Arch., 2017

Reverse Engineering x86 Processor Microcode.
Proceedings of the 26th USENIX Security Symposium, 2017

A look at the dark side of hardware reverse engineering - a case study.
Proceedings of the IEEE 2nd International Verification and Security Workshop, 2017

Hardware reverse engineering: Overview and open challenges.
Proceedings of the IEEE 2nd International Verification and Security Workshop, 2017

2015
FPGA Trojans Through Detecting and Weakening of Cryptographic Primitives.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2015

Protecting against Cryptographic Trojans in FPGAs.
Proceedings of the 23rd IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2015

2013
IP-core protection for a non-volatile Self-reconfiguring SoC environment.
Proceedings of the 21st IEEE/IFIP International Conference on VLSI and System-on-Chip, 2013

Construction of Software-Based Digital Physical Clone Resistant Functions.
Proceedings of the Fourth International Conference on Emerging Security Technologies, 2013

Combined HW-SW adaptive clone-resistant functions as physical security anchors.
Proceedings of the 2013 NASA/ESA Conference on Adaptive Hardware and Systems, 2013


  Loading...