Side-channel analysis of PUFs and fuzzy extractors D Merli, D Schuster, F Stumpf, G Sigl Trust and Trustworthy Computing: 4th International Conference, TRUST 2011 …, 2011 | 181 | 2011 |
A cache timing attack on AES in virtualization environments M Weiß, B Heinz, F Stumpf Financial Cryptography and Data Security: 16th International Conference, FC …, 2012 | 149 | 2012 |
Semi-invasive EM attack on FPGA RO PUFs and countermeasures D Merli, D Schuster, F Stumpf, G Sigl Proceedings of the Workshop on Embedded Systems Security, 1-9, 2011 | 149 | 2011 |
A robust integrity reporting protocol for remote attestation F Stumpf, O Tafreschi, P Röder, C Eckert Proceedings of the Workshop on Advances in Trusted Computing (WATC), 65, 2006 | 148 | 2006 |
Improving the quality of ring oscillator PUFs on FPGAs D Merli, F Stumpf, C Eckert Proceedings of the 5th workshop on embedded systems security, 1-9, 2010 | 143 | 2010 |
Localized electromagnetic analysis of cryptographic implementations J Heyszl, S Mangard, B Heinz, F Stumpf, G Sigl Topics in Cryptology–CT-RSA 2012: The Cryptographers’ Track at the RSA …, 2012 | 131 | 2012 |
Complementary IBS: Application specific error correction for PUFs M Hiller, D Merli, F Stumpf, G Sigl 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 1-6, 2012 | 100 | 2012 |
Localized electromagnetic analysis of RO PUFs D Merli, J Heyszl, B Heinz, D Schuster, F Stumpf, G Sigl 2013 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2013 | 96 | 2013 |
Enhancing trusted platform modules with hardware-based virtualization techniques F Stumpf, C Eckert 2008 Second International Conference on Emerging Security Information …, 2008 | 82 | 2008 |
Detecting node compromise in hybrid wireless sensor networks using attestation techniques C Krauß, F Stumpf, C Eckert Security and Privacy in Ad-hoc and Sensor Networks: 4th European Workshop …, 2007 | 82 | 2007 |
An approach to a trustworthy system architecture using virtualization F Stumpf, M Benz, M Hermanowski, C Eckert Autonomic and Trusted Computing: 4th International Conference, ATC 2007 …, 2007 | 78 | 2007 |
Improving the scalability of platform attestation F Stumpf, A Fuchs, S Katzenbeisser, C Eckert Proceedings of the 3rd ACM workshop on Scalable trusted computing, 1-10, 2008 | 71 | 2008 |
Method and update gateway for updating an embedded control unit F Stumpf, J Holle US Patent 10,244,394, 2019 | 48 | 2019 |
Protecting PUF error correction by codeword masking D Merli, F Stumpf, G Sigl Cryptology ePrint Archive, 2013 | 43 | 2013 |
Improving mobile device security with operating system-level virtualization S Wessel, M Huber, F Stumpf, C Eckert Computers & Security 52, 207-220, 2015 | 39 | 2015 |
Comprehensive analysis of software countermeasures against fault attacks N Theissing, D Merli, M Smola, F Stumpf, G Sigl 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE), 404-409, 2013 | 35 | 2013 |
A new security architecture for smartcards utilizing PUFs T Esbach, W Fumy, O Kulikovska, D Merli, D Schuster, F Stumpf ISSE 2012 Securing Electronic Business Processes: Highlights of the …, 2012 | 29 | 2012 |
Trust, security and privacy in vanets a multilayered security architecture for c2c-communication F Stumpf, L Fischer, C Eckert VDI BERICHTE 2016, 55, 2007 | 20 | 2007 |
PAL-privacy augmented LTE: A privacy-preserving scheme for vehicular LTE communication D Angermeier, A Kiening, F Stumpf Proceeding of the tenth ACM international workshop on Vehicular inter …, 2013 | 18 | 2013 |
A security architecture for multipurpose ECUs in vehicles F Stumpf, C Meves, B Weyl, M Wolf 25th Joint VDI/VW Automotive Security Conference. Ingolstadt, Germany, 2009 | 17 | 2009 |