Publications

Let’s Take it Offline: Boosting Brute-Force Attacks on iPhone’s User Authentication through SCA

2021 - Oleksiy Lisovets, David Knichel, Thorben Moos, Amir Moradi

IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 3. [pdf]

New First-Order Secure AES Performance Records

2021 - Aein Rezaei Shahmirzadi, Dušan Božilov, Amir Moradi

IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 2, pp. 304-327. [pdf] [doi]

Re-Consolidating First-Order Masking Schemes - Nullifying Fresh Randomness

2021 - Aein Rezaei Shahmirzadi, Amir Moradi

IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 1, pp. 305-342. [pdf] [DOI]

Second-Order SCA Security with almost no Fresh Randomness

2021 - Aein Rezaei Shahmirzadi, Amir Moradi

IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 3. [pdf]

Countermeasures against Static Power Attacks – Comparing Exhaustive Logic Balancing and Other Protection Schemes in 28 nm CMOS

2021 - Thorben Moos, Amir Moradi

IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 3.

DL-LA: Deep Learning Leakage Assessment: A modern roadmap for SCA evaluations

2021 - Thorben Moos, Felix Wegener, Amir Moradi

IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 3. [pdf]

Inconsistency of Simulation and Practice in Delay-based Strong PUFs

2021 - Anita Aghaie, Amir Moradi

IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 3. [pdf] [CRP dataset]

Combining Optimization Objectives: New Machine-Learning Attacks on Strong PUFs

2021 - Johannes Tobisch, Anita Aghaie, Georg T. Becker

IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 2, pp. 357-389. [pdf] [doi]

On the Design and Misuse of Microcoded (Embedded) Processors — A Cautionary Note

2021 - Nils Albartus, Clemens Nasenberg, Florian Stolz, Marc Fyrbiak, Chris­tof Paar, Russell Tessier

[PDF]

Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model

2021 - Thilo Krachenfels, Fatemeh Ganji, Amir Moradi, Shahin Tajik, Jean-Pierre Seifert

42nd IEEE Sym­po­si­um on Se­cu­ri­ty & Pri­va­cy (Oak­land), San Francisco, USA, May 23-27, 2021. [pdf]

Apps Against the Spread: Privacy Implications and User Acceptance of COVID-19-Related Smartphone Apps on Three Continents

2021 - Christine Utz, Steffen Becker, Theodor Schnitzler, Florian Farke, Franziska Herbert, Leonie Schaewitz, Martin Degeling, Markus Dürmuth

ACM CHI Conference on Human Factors in Computing Systems 2021 [arXiv Preprint] [ACM Digital Library] [HTML Version]

Linearly Self-Equivalent APN Permutations in Small Dimension

2021 - Christof Beierle, Marcus Brinkmann, Gregor Leander

IEEE Transactions on Information Theory [DOI] [PDF]

Automated Masking of Software Implementations on Industrial Microcontrollers

2021 - Arnold Abromeit, Florian Bache, Leon A. Becker, Marc Gourjon, Tim Güneysu, Sabrina Jorn, Amir Moradi, Maximilian Orlt, Falk Schellenberg

De­sign, Au­to­ma­ti­on & Test in Eu­ro­pe Con­fe­rence & Ex­hi­bi­ti­on, DATE 2021, February 1 - 5 , 2021.

Stealthy Logic Misuse for Power Analysis Attacks in Multi-Tenant FPGAs

2021 - Dennis R. E. Gnad, Vincent Meyers, Nguyen Minh Dang, Falk Schellenberg, Amir Moradi, Mehdi B. Tahoori

De­sign, Au­to­ma­ti­on & Test in Eu­ro­pe Con­fe­rence & Ex­hi­bi­ti­on, DATE 2021, February 1 - 5 , 2021.

On the Impact of Aging on Power Analysis Attacks Targeting Power-Equalized Cryptographic Circuits

2021 - Md Toufiq Hasan Anik, Bijan Fadaeinia, Amir Moradi, Naghmeh Karimi

26th Asia and South Pacific Design Automation Conference, ASP-DAC 2021, January 18-21, 2021 [doi]

SILVER - Statistical Independence and Leakage Verification

2020 - David Knichel, Pascal Sasdrich, Amir Moradi

26th Annual International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, December 6-10, 2020. [pdf] [GitHub] [DOI]

Doppelganger Obfuscation - Exploring the Defensive and Offensive Aspects of Hardware Camouflaging

2020 - Max Hoffmann, Chris­tof Paar

IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 1, to appear.

Clock Glitch versus SIFA

2020 - Aein Rezaei Shahmirzadi, Amir Moradi

33rd IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFT 2020, ESA-ESRIN, Frascati, Italy, October 19-21, 2020. [DOI]

ARMORY: Fully Automated and Exhaustive Fault Simulation on ARM-M Binaries

2020 - Max Hoffmann, Falk Schellenberg, Chris­tof Paar

IEEE Transactions on Information Forensics and Security, vol. 16, pp. 1058-1073, 2021 [Article] [Code @ Github] [Paper Results] [DOI]

SPFA – SFA On Multiple Persistent Faults

2020 - Susanne Engels, Falk Schellenberg, Chris­tof Paar

Fault Diagnosis and Tolerance in Cryptography - FDTC 2020 [DOI]
Page: