Thilo Krachenfels

Orcid: 0000-0002-8569-2020

According to our database1, Thilo Krachenfels authored at least 16 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Trojan awakener: detecting dormant malicious hardware using laser logic state imaging (extended version).
J. Cryptogr. Eng., November, 2023

Laser-based logic state analysis in hardware security: threats and opportunities.
PhD thesis, 2023

Modulation to the Rescue: Identifying Sub-Circuitry in the Transistor Morass for Targeted Analysis.
CoRR, 2023

LAT-UP: Exposing Layout-Level Analog Hardware Trojans Using Contactless Optical Probing.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2023

Modulation to the Rescue: Identifying Sub-Circuitry in the Transistor Morass for Targeted Analysis.
Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security, 2023

2022
EM-Fault It Yourself: Building a Replicable EMFI Setup for Desktop and Server Hardware.
CoRR, 2022

Toward Optical Probing Resistant Circuits: A Comparison of Logic Styles and Circuit Design Techniques.
Proceedings of the 27th Asia and South Pacific Design Automation Conference, 2022

2021
Special Session: Physical Attacks through the Chip Backside: Threats, Challenges, and Opportunities.
Proceedings of the 39th IEEE VLSI Test Symposium, 2021

Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks.
Proceedings of the 30th USENIX Security Symposium, 2021

Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

The Forgotten Threat of Voltage Glitching: A Case Study on Nvidia Tegra X2 SoCs.
Proceedings of the 18th Workshop on Fault Detection and Tolerance in Cryptography, 2021

Trojan Awakener: Detecting Dormant Malicious Hardware Using Laser Logic State Imaging.
Proceedings of the ASHES@CCS 2021: Proceedings of the 5th Workshop on Attacks and Solutions in Hardware Security, 2021

One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Evaluation of Low-Cost Thermal Laser Stimulation for Data Extraction and Key Readout.
J. Hardw. Syst. Secur., 2020

2018
Key Extraction Using Thermal Laser Stimulation A Case Study on Xilinx Ultrascale FPGAs.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

2015
Near field communication interface for a packet-based serial data transmission using a dual interface EEPROM.
Proceedings of the 20th IEEE Conference on Emerging Technologies & Factory Automation, 2015


  Loading...