Christof Paar

Christof Paar

Institution: Ruhr-Universität Bochum / CASA / Max Planck Institute for Security and Privacy

Research Hub(s):

Hub A: Future Cryptography
Hub B: Embedded Security



I see an IC: A Mixed-Methods Approach to Study Human Problem-Solving Processes in Hardware Reverse Engineering Anti-Tamper Radio: System-Level Tamper Detection for Computing Systems Intelligent Reflecting Surface-Assisted Wireless Key Generation for Low-Entropy Environments LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security Mirror Mirror on the Wall: Wireless Environment Reconfiguration Attacks Based on Fast Software-Controlled Surfaces On the Design and Misuse of Microcoded (Embedded) Processors — A Cautionary Note Reconfigurable Intelligent Surface for Physical Layer Key Generation: Constructive or Destructive? Towards Unsupervised SEM Image Segmentation for IC Layout Extraction How Not to Protect Your IP - An Industry-Wide Break of IEEE 1735 Implementations Analog Physical-Layer Relay Attacks with Application to Bluetooth and Phase-Based Ranging A survey of algorithmic methods in IC reverse engineering IRShield: A Countermeasure Against Adversarial Physical-Layer Wireless Sensing Keys from the Sky: A First Exploration of Physical-Layer Security Using Satellite Links The Anatomy of Hardware Reverse Engineering: An Exploration of Human Factors during Problem Solving Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations An Exploratory Study of Hardware Reverse Engineering — Technical and Cognitive Processes A Cautionary Note on Protecting Xilinx' UltraScale(+) Bitstream Encryption and Authentication Engine The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAs Side-Channel Hardware Trojan for Provably-Secure SCA-Protected Implementations DANA Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering