Max Hoffmann

Orcid: 0000-0001-9072-611X

Affiliations:
  • Ruhr-University Bochum, Germany


According to our database1, Max Hoffmann authored at least 16 papers between 2017 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
A critical view on the real-world security of logic locking.
J. Cryptogr. Eng., 2022

2021
ARMORY: Fully Automated and Exhaustive Fault Simulation on ARM-M Binaries.
IEEE Trans. Inf. Forensics Secur., 2021

Doppelganger Obfuscation - Exploring theDefensive and Offensive Aspects of Hardware Camouflaging.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

2020
Security and subvertability of modern hardware: a journey through selected layers of hardware security.
PhD thesis, 2020

DANA Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

P4TC - Provably-Secure yet Practical Privacy-Preserving Toll Collection.
Proc. Priv. Enhancing Technol., 2020

Black-Box Wallets: Fast Anonymous Two-Way Payments for Constrained Devices.
Proc. Priv. Enhancing Technol., 2020

Doppelganger Obfuscation - Exploring the Defensive and Offensive Aspects of Hardware Camouflaging.
IACR Cryptol. ePrint Arch., 2020

2019
Efficient zero-knowledge arguments in the discrete log setting, revisited.
IACR Cryptol. ePrint Arch., 2019

The End of Logic Locking? A Critical View on the Security of Logic Locking.
IACR Cryptol. ePrint Arch., 2019

Highway to HAL: open-sourcing the first extendable gate-level netlist reverse engineering framework.
Proceedings of the 16th ACM International Conference on Computing Frontiers, 2019

Towards cognitive obfuscation: impeding hardware reverse engineering based on psychological insights.
Proceedings of the 24th Asia and South Pacific Design Automation Conference, 2019

2018
Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

2017
New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs.
IACR Cryptol. ePrint Arch., 2017

HAL- The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion.
IACR Cryptol. ePrint Arch., 2017

BBA+: Improving the Security and Applicability of Privacy-Preserving Point Collection.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017


  Loading...