Options
Fraunhofer-Institut für Angewandte und Integrierte Sicherheit AISEC
Sovereignly Donating Medical Data as a Patient: A Technical Approach
Tapeout of a RISC-V crypto chip with hardware trojans: A case-study on trojan design and pre-silicon detectability
Finding the Needle in the Haystack: Metrics for Best Trace Selection in Unsupervised Side-Channel Attacks on Blinded RSA
GAIA-X and IDS
Breaking TrustZone memory isolation and secure boot through malicious hardware on a modern FPGA-SoC
A Comparative Security Analysis of the German Federal Postal Voting Process
MESH: A Memory-Efficient Safe Heap for C/C++
Mobile Contactless Fingerprint Recognition: Implementation, Performance and Usability Aspects
Does Every Second Count? Time-based Evolution of Malware Behavior in Sandboxes
Machine learning of physical unclonable functions using helper data. Revealing a pitfall in the fuzzy commitment scheme