March 2025
·
2 Reads
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
March 2025
·
2 Reads
March 2025
·
6 Reads
Many computing systems need to be protected against physical attacks using active tamper detection based on sensors. One technical solution is to employ an ATR (Anti-Tamper Radio) approach, analyzing the radio wave propagation effects within a protected device to detect unauthorized physical alterations. However, ATR systems face key challenges in terms of susceptibility to signal manipulation attacks, limited reliability due to environmental noise, and regulatory constraints from wide bandwidth usage. In this work, we propose and experimentally evaluate an ATR system complemented by an RIS to dynamically reconfigure the wireless propagation environment. We show that this approach can enhance resistance against signal manipulation attacks, reduce bandwidth requirements from several~GHz down to as low as 20 MHz, and improve robustness to environmental disturbances such as internal fan movements. Our work demonstrates that RIS integration can strengthen the ATR performance to enhance security, sensitivity, and robustness, recognizing the potential of smart radio environments for ATR-based tamper detection
February 2025
·
10 Reads
Microchips are fundamental components of modern electronic devices, yet they remain opaque to the users who rely on them daily. This opacity, compounded by the complexity of global supply chains and the concealment of proprietary information, raises significant security, trust, and accountability issues. We investigate end users' understanding of microchips, exploring their perceptions of the societal implications and information needs regarding these essential technologies. Through an online survey with 250 participants, we found that while our participants were aware of some microchip applications, they lacked awareness of the broader security, societal, and economic implications. While our participants unanimously desired more information on microchips, their specific information needs were shaped by various factors such as the microchip's application environment and one's affinity for technology interaction. Our findings underscore the necessity for improving end users' awareness and understanding of microchips, and we provide possible directions to pursue this end.
February 2025
·
3 Reads
January 2025
·
1 Read
January 2025
·
5 Reads
January 2025
·
5 Reads
December 2024
·
24 Reads
Today's information society relies on cryptography to achieve security goals such as confidentiality, integrity, authentication, and non-repudiation for digital communications. Here, public-key cryptosystems play a pivotal role to share encryption keys and create digital signatures. However, quantum computers threaten the security of traditional public-key cryptosystems as they can tame computational problems underlying the schemes, i.e., discrete logarithm and integer factorization. The prospective arrival of capable-enough quantum computers already threatens today's secret communication in terms of their long-term secrecy when stored to be later decrypted. Therefore, researchers strive to develop and deploy alternative schemes. In this work, evaluate a key exchange protocol based on combining public-key schemes with physical-layer security, anticipating the prospect of quantum attacks. If powerful quantum attackers cannot immediately obtain private keys, legitimate parties have a window of short-term secrecy to perform a physical-layer jamming key exchange (JKE) to establish a long-term shared secret. Thereby, the protocol constraints the computation time available to the attacker to break the employed public-key cryptography. In this paper, we outline the protocol, discuss its security, and point out challenges to be resolved.
December 2024
·
10 Reads
·
2 Citations
December 2024
·
1 Read
... The understanding can also be affected by the individual's domain expertise in the decision-making task [83] as well as the explanation's modality (e. g., textual, visual, or interactive) [65]. Speith et al. [73] connect explainability to hardware in the context of requirements engineering, with a particular focus on microchips. Among their future research directions, they explicitly propose to explore end-users' mental models of microchips. ...
June 2024
... RSA exploits the difficulty of factorizing bi-prime numbers. According to Paar and Pelzl [2], RSA and in general asymmetric algorithms are not meant to replace symmetric algorithms because they are computationally costly. RSA is mainly used for secure key exchange between end nodes and often used together with symmetric algorithms such as AES, where the symmetric algorithm does the actual data encryption and decryption. ...
May 2024
... The private key is only held by special parties, while the public key is distributed to all parties. Elliptic Curve Cryptography (ECC) based on the algebraic structure of elliptical curve on a finite area [8]. ...
May 2024
... The foundation of PQC dates back to the mid-1990s when Peter Shor introduced an algorithm capable of factoring large integers and computing discrete logarithms in polynomial time on a quantum computer (Paar et al., 2024;Obioha-Val et al., 2025b). Lior (2024) argues that this discovery indicated the eventual obsolescence of widely used public-key cryptographic schemes such as RSA and Elliptic Curve Cryptography (ECC) once large-scale quantum computers become viable. ...
May 2024
... However, the steps themselves only require quite rudimentary mathematics. For those readers interested in the mathematics, there are resources available (Easttom, 2022;Kota, et al., 2022;Paar, Pelzl, & Güneysu, 2024). Encryption and decryption, once keys have been generated and a public key is published, are actually quite simple: ...
January 2024
... However, as eye gaze data are often challenging to interpret on their own, researchers commonly supplement eye-tracking data with methods such as Retrospective Think Aloud [56]. These methods often require manual and labor-intensive segmentation and labeling of the data, which can be especially daunting for large or complex datasets [153]. While automating such processes shows promise, they still lack in precision and contextual understanding [102,149]. ...
May 2024
... Other works consider the RIS to facilitate eavesdropping, e.g., Chen et al. [9], Chen and Ghasempour [8], and Shaikhanov et al. [54]. Finally, Li et al. [33] have shown RISbased jamming of wireless key generation. c) Jamming Attacks: An early study on the threat of jamming in wireless communication networks is the work of Xu et al. [72], covering several attack strategies, including constant random signal jamming, deceptive jamming based on packets with valid encoding, time-pulsed jamming, and reactive jamming. ...
January 2024
IEEE Transactions on Information Forensics and Security
... Compared to our previous workshop version of this paper [10], we extend our work as follows. In Section 2.4, we (1) propose improvements to our approach that greatly enhance training stability, albeit achieving high performance only in a specific configuration. ...
November 2023
... However, compared to Application-Specific Integrated Circuits (ASICs), the reconfigurability of the FPGA fabric via bitstreams introduces additional security threats. Though effective protection for bitstream authenticity, integrity, and confidentiality exist in theory, their implementations often have flaws that can leak information through side-channel attacks as well as flaws in the implementation itself [1,13,14,17,22,30,32,39,42]. ...
November 2023
ACM Transactions on Reconfigurable Technology and Systems
... Virtual Proofs of Reality. One particularly interesting application that could be realized using RISs are physical challenge-response protocols as proposed by Rührmair et al. [23] and Tobisch et al. [26], allowing remote authentication and integrity verification based on querying channel measurements corresponding to random RIS configurations. Future work should investigate whether such a system meets the requirement of hard-to-predict channel responses. ...
October 2023