Publications

Let’s Take it Offline: Boosting Brute-Force Attacks on iPhone’s User Authentication through SCA

2021 - Oleksiy Lisovets, David Knichel, Thorben Moos, Amir Moradi

IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 3. [pdf]

New First-Order Secure AES Performance Records

2021 - Aein Rezaei Shahmirzadi, Dušan Božilov, Amir Moradi

IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 2, pp. 304-327. [pdf] [doi]

Re-Consolidating First-Order Masking Schemes - Nullifying Fresh Randomness

2021 - Aein Rezaei Shahmirzadi, Amir Moradi

IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 1, pp. 305-342. [pdf] [DOI]

Second-Order SCA Security with almost no Fresh Randomness

2021 - Aein Rezaei Shahmirzadi, Amir Moradi

IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 3. [pdf]

Countermeasures against Static Power Attacks – Comparing Exhaustive Logic Balancing and Other Protection Schemes in 28 nm CMOS

2021 - Thorben Moos, Amir Moradi

IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 3.

DL-LA: Deep Learning Leakage Assessment: A modern roadmap for SCA evaluations

2021 - Thorben Moos, Felix Wegener, Amir Moradi

IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 3. [pdf]

Inconsistency of Simulation and Practice in Delay-based Strong PUFs

2021 - Anita Aghaie, Amir Moradi

IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 3. [pdf]

Combining Optimization Objectives: New Machine-Learning Attacks on Strong PUFs

2021 - Johannes Tobisch, Anita Aghaie, Georg T. Becker

IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 2, pp. 357-389. [pdf] [doi]

On the Design and Misuse of Microcoded (Embedded) Processors — A Cautionary Note

2021 - Nils Albartus, Clemens Nasenberg, Florian Stolz, Marc Fyrbiak, Chris­tof Paar, Russell Tessier

[PDF]

Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model

2021 - Thilo Krachenfels, Fatemeh Ganji, Amir Moradi, Shahin Tajik, Jean-Pierre Seifert

42nd IEEE Sym­po­si­um on Se­cu­ri­ty & Pri­va­cy (Oak­land), San Francisco, USA, May 23-27, 2021. [pdf]

Apps Against the Spread: Privacy Implications and User Acceptance of COVID-19-Related Smartphone Apps on Three Continents

2021 - Christine Utz, Steffen Becker, Theodor Schnitzler, Florian Farke, Franziska Herbert, Leonie Schaewitz, Martin Degeling, Markus Dürmuth

ACM CHI Conference on Human Factors in Computing Systems 2021 [arXiv Preprint] [ACM Digital Library] [HTML Version]

Linearly Self-Equivalent APN Permutations in Small Dimension

2021 - Christof Beierle, Marcus Brinkmann, Gregor Leander

IEEE Transactions on Information Theory [DOI] [PDF]

Automated Masking of Software Implementations on Industrial Microcontrollers

2021 - Arnold Abromeit, Florian Bache, Leon A. Becker, Marc Gourjon, Tim Güneysu, Sabrina Jorn, Amir Moradi, Maximilian Orlt, Falk Schellenberg

De­sign, Au­to­ma­ti­on & Test in Eu­ro­pe Con­fe­rence & Ex­hi­bi­ti­on, DATE 2021, February 1 - 5 , 2021.

Stealthy Logic Misuse for Power Analysis Attacks in Multi-Tenant FPGAs

2021 - Dennis R. E. Gnad, Vincent Meyers, Nguyen Minh Dang, Falk Schellenberg, Amir Moradi, Mehdi B. Tahoori

De­sign, Au­to­ma­ti­on & Test in Eu­ro­pe Con­fe­rence & Ex­hi­bi­ti­on, DATE 2021, February 1 - 5 , 2021.

On the Impact of Aging on Power Analysis Attacks Targeting Power-Equalized Cryptographic Circuits

2021 - Md Toufiq Hasan Anik, Bijan Fadaeinia, Amir Moradi, Naghmeh Karimi

26th Asia and South Pacific Design Automation Conference, ASP-DAC 2021, January 18-21, 2021 [doi]

SILVER - Statistical Independence and Leakage Verification

2020 - David Knichel, Pascal Sasdrich, Amir Moradi

26th Annual International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, December 6-10, 2020. [pdf] [GitHub] [DOI]

Doppelganger Obfuscation - Exploring the Defensive and Offensive Aspects of Hardware Camouflaging

2020 - Max Hoffmann, Chris­tof Paar

IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 1, to appear.

Clock Glitch versus SIFA

2020 - Aein Rezaei Shahmirzadi, Amir Moradi

33rd IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFT 2020, ESA-ESRIN, Frascati, Italy, October 19-21, 2020. [DOI]

ARMORY: Fully Automated and Exhaustive Fault Simulation on ARM-M Binaries

2020 - Max Hoffmann, Falk Schellenberg, Chris­tof Paar

IEEE Transactions on Information Forensics and Security, vol. 16, pp. 1058-1073, 2021 [Article] [Code @ Github] [Paper Results] [DOI]

SPFA – SFA On Multiple Persistent Faults

2020 - Susanne Engels, Falk Schellenberg, Chris­tof Paar

Fault Diagnosis and Tolerance in Cryptography - FDTC 2020 [DOI]

PRINCEv2 - More Security for (Almost) No Overhead

2020 - Dusan Bozilov, Maria Eichlseder, Miroslav Knezevic‬, Baptiste Lambin, Gregor Leander, Thorben Moos, Ventzislav Nikov, Shahram Rasoolzadeh, Yosuke Todo, Friedrich Wiemer

Selected Areas in Cryptography (SAC) 2020. [pdf]

DANA - Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering

2020 - Nils Albartus, Max Hoffmann, Sebastian Temme, Leonid Azriel, Chris­tof Paar

IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2020, No. 3, pp 309-336, 2020. (presentation at virtual CHES 2020) [PDF] [DOI]

Confocal Laser Scanning Holographic Microscopy of buried structures

2020 - Lena Schnitzler, Krisztian Neutsch, Falk Schellenberg, Martin R. Hofmann , Nils C. Gerhardt

Applied Optics, 2021, 60(4), A8-A14. doi: 10.1364/AO.403687

Concurrent Error Detection Revisited – Hardware Protection against Fault and Side-Channel Attacks

2020 - Jan Richter-Brockmann, Pascal Sasdrich, Florian Bache, Tim Güneysu

The 15th International Conference on Availability, Reliability and Security (ARES 2020), August 25 - August 28, 2020, University College Dublin, Dublin, Ireland [pdf]

The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAs

2020 - Maik Ender, Amir Moradi, Chris­tof Paar

29th USENIX Security Symposium (USENIX Security 20), Boston, MA, USA, August 12-14, 2020. **Distinguished Paper Award** [pdf]

An Exploratory Study of Hardware Reverse Engineering — Technical and Cognitive Processes

2020 - Steffen Becker, Carina Wiesen, Nils Albartus, Nikol Rummel, Chris­tof Paar

Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), Conference Paper [PDF]

Hardware Penetration Testing Knocks Your SoCs Off

2020 - Mark Fischer, Fabian Langer, Johannes Mono, Clemens Nasenberg, Nils Albartus

IEEE Design & Test [PDF] [DOI]

Impeccable Circuits II

2020 - Aein Rezaei Shahmirzadi, Shahram Rasoolzadeh, Amir Moradi

57th Annual Design Automation Conference 2020, DAC 2020, San Francisco, CA, USA, July 19-23, 2020. [pdf] [DOI]

Black-Box Wallets: Fast Anonymous Two-Way Payments for Constrained Devices

2020 - Max Hoffmann, Michael Klooß, Markus Raiber, Andy Rupp

Proceedings on Privacy Enhancing Technologies, PETS 2020 [pdf]

P4TC - Provably-Secure yet Practical Privacy-Preserving Toll Collection

2020 - Valerie Fetzer, Max Hoffmann, Matthias Nagel, Andy Rupp, Rebecca Schwerdt

Proceedings on Privacy Enhancing Technologies, PETS 2020 [pdf]

Unrolled Cryptography on Silicon - A Physical Security Analysis

2020 - Thorben Moos

IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2020, No. 4, pp. 416–442. [pdf] [doi]

Lightweight Ciphers on a 65 nm ASIC - A Comparative Study on Energy Consumption

2020 - Bastian Richter, Amir Moradi

IEEE Computer Society Annual Symposium on VLSI (ISVLSI) 2020, Limassol, CYPRUS, July 6-8, 2020. [pdf] [doi]

Akzeptanz von Corona-Apps in Deutschland vor der Einführung der Corona-Warn-App

2020 - Steffen Becker, Martin Degeling, Markus Dürmuth, Florian Farke, Leonie Schaewitz, Theodor Schnitzler, Christine Utz

Vorabveröffentlichung (Preprint), Juni 2020 [PDF (Deutsch)]

The Risk of Outsourcing: Hidden SCA Trojans in Third-Party IP-Cores Threaten Cryptographic ICs

2020 - David Knichel, Thorben Moos, Amir Moradi

25th IEEE European Test Symposium, Tallin, Estonia, May 25-29, 2020 [pdf] [doi]

Electromagnetic Enclosure PUF for Tamper Proofing Commodity Hardware and other Applications

2020 - Johannes Tobisch, Christian Zenger, Chris­tof Paar

TRUDEVICE 2020: 9th Workshop on Trustworthy Manufacturing and Utilization of Secure Devices, Grenoble, France, March 13, 2020 [pdf]

On the Precise Phase Recovery for Physical-Layer Authentication in Dynamic Channels

2020 - Hendrik Vogt, Chu Li, Aydin Sezgin, Christian Zenger

2019 IEEE International Workshop on Information Forensics and Security (WIFS), 9-12 Dec. 2019, Delft, Netherlands [pdf]

Template attacks on nano-scale CMOS devices

2020 - Bastian Richter, Amir Moradi

Journal of Cryptographic Engineering, Volume 10, pages 275–285, 2020. [DOI] [pdf]

Cryptographic Fault Diagnosis using VerFI

2020 - Victor Arribas, Felix Wegener, Amir Moradi, Svetla Nikova

IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2020, San Jose, USA, May 4-7, 2020. [pdf] [GitHub (ver 1)] [GitHub (ver 2 Beta)] [DOI]

Side-Channel Hardware Trojan for Provably-Secure SCA-Protected Implementations

2020 - Samaneh Ghandali, Thorben Moos, Amir Moradi, Chris­tof Paar

IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Volume 28, Issue 6, 2020. [pdf] [doi]

TI-PUF: Toward Side-Channel Resistant Physical Unclonable Functions

2020 - Anita Aghaie, Amir Moradi

IEEE Transactions on Information Forensics and Security, Volume 15, Pages 3470 - 3481, 2020. [pdf] [doi]

3-Phase Adiabatic Logic and its Sound SCA Evaluation

2020 - Bijan Fadaeinia, Amir Moradi

IEEE Transactions on Emerging Topics in Computing, 2020. [DOI]

Spin Me Right Round Rotational Symmetry for FPGA-Specific AES: Extended Version

2020 - Felix Wegener, Lauren De Meyer, Amir Moradi

Journal of Cryptology volume 33, pages 1114–1155, 2020. [DOI]

Remote Electrical-level Security Threats to Multi-Tenant FPGAs

2020 - Dennis R.E. Gnad, Falk Schellenberg, Jonas Krautter, Amir Moradi, Mehdi B. Tahoori

IEEE Design & Test, Volume 37, Issue 2, April 2020. [DOI]

Low-Latency Hardware Masking with Application to AES

2020 - Pascal Sasdrich, Begül Bilgin, Michael Hutter, Mark E. Marson

IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), Volume 2020, Issue 2 [pdf]

Graph Similarity and Its Applications to Hardware Security

2019 - Marc Fyrbiak, Sebastian Wallat, Sascha Reinhard, Nicolai Bissantz, Chris­tof Paar

IEEE Transactions on Computers [DOI] [pdf]

A Comparison of χ²-Test and Mutual Information as Distinguisher for Side-Channel Analysis

2019 - Bastian Richter, David Knichel, Amir Moradi

18th Smart Card Re­se­arch and Ad­van­ced Ap­p­li­ca­ti­on Con­fe­rence, CAR­DIS 2019, Prague, Czech Republic, No­vem­ber 11-13, 2019. [pdf]

Efficient Zero-Knowledge Arguments in the Discrete Log Setting, Revisited

2019 - Max Hoffmann, Michael Klooß, Andy Rupp

ACM Conference on Computer and Communications Security, CCS 2019 [pdf]

Active Fences against Voltage-based Side Channels in Multi-Tenant FPGAs

2019 - Jonas Krautter, Dennis Gnad, Falk Schellenberg, Amir Moradi, Mehdi B. Tahoori

International Conference On Computer Aided Design, ICCAD 2019, Westminster, Colorado, USA, November 4-7, 2019. [pdf]

Automated Probe Repositioning for On-Die EM Measurements

2019 - Bastian Richter, Alexander Wild, Amir Moradi

International Conference On Computer Aided Design, ICCAD 2019, Westminster, Colorado, USA, November 4-7, 2019. [pdf]

Impeccable Circuits

2019 - Anita Aghaie, Amir Moradi, Shahram Rasoolzadeh, Aein Rezaei Shahmirzadi, Falk Schellenberg, Tobias Schneider

IEEE Transactions on Computers, 2019. [DOI] [pdf] [HDL code]
Page: