Options
Fraunhofer-Institut für Angewandte und Integrierte Sicherheit AISEC
Sovereignly Donating Medical Data as a Patient: A Technical Approach
Does Every Second Count? Time-based Evolution of Malware Behavior in Sandboxes
Tapeout of a RISC-V crypto chip with hardware trojans: A case-study on trojan design and pre-silicon detectability
DA3G: Detecting Adversarial Attacks by Analysing Gradients
Breaking TrustZone memory isolation and secure boot through malicious hardware on a modern FPGA-SoC
A Comparative Security Analysis of the German Federal Postal Voting Process
Machine learning of physical unclonable functions using helper data. Revealing a pitfall in the fuzzy commitment scheme
Mobile Contactless Fingerprint Recognition: Implementation, Performance and Usability Aspects
Decentralized Identities for Self-sovereign End-users (DISSENS)
MESH: A Memory-Efficient Safe Heap for C/C++