Ruhr-Uni-Bochum
Christof Paar

Christof Paar

Institution: Ruhr-Universität Bochum / CASA / Max Planck Institute for Security and Privacy

Research Hub(s):

Hub A: Kryptographie der Zukunft
Hub B: Eingebettete Sicherheit

E-Mail: Christof.Paar@csp.mpg.de

Publikationen:

Spatial-Domain Wireless Jamming with Reconfigurable Intelligent Surfaces How Not to Protect Your IP - An Industry-Wide Break of IEEE 1735 Implementations Analog Physical-Layer Relay Attacks with Application to Bluetooth and Phase-Based Ranging Reconfigurable Intelligent Surface for Physical Layer Key Generation: Constructive or Destructive? Anti-Tamper Radio: System-Level Tamper Detection for Computing Systems Intelligent Reflecting Surface-Assisted Wireless Key Generation for Low-Entropy Environments Towards Unsupervised SEM Image Segmentation for IC Layout Extraction Stealing Maggie's Secrets – On the Challenges of IP Theft Through FPGA Reverse Engineering Explainability as a Requirement for Hardware: Introducing Explainable Hardware (XHW) HAWKEYE – Recovering Symmetric Cryptography From Hardware Circuits I see an IC: A Mixed-Methods Approach to Study Human Problem-Solving Processes in Hardware Reverse Engineering LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security Mirror Mirror on the Wall: Wireless Environment Reconfiguration Attacks Based on Fast Software-Controlled Surfaces The Anatomy of Hardware Reverse Engineering: An Exploration of Human Factors during Problem Solving Keys from the Sky: A First Exploration of Physical-Layer Security Using Satellite Links IRShield: A Countermeasure Against Adversarial Physical-Layer Wireless Sensing DANA Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering Side-Channel Hardware Trojan for Provably-Secure SCA-Protected Implementations The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAs Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations On the Design and Misuse of Microcoded (Embedded) Processors — A Cautionary Note A survey of algorithmic methods in IC reverse engineering An Exploratory Study of Hardware Reverse Engineering — Technical and Cognitive Processes A Cautionary Note on Protecting Xilinx' UltraScale(+) Bitstream Encryption and Authentication Engine