Search For:

Displaying 1-13 out of 13 total
KeeLoq and Side-Channel Analysis-Evolution of an Attack
Found in: Fault Diagnosis and Tolerance in Cryptography, Workshop on
By Christof Paar, Thomas Eisenbarth, Markus Kasper, Timo Kasper, Amir Moradi
Issue Date:September 2009
pp. 65-69
Last year we were able to break KeeLoq, which is a 64 bit block cipher that is popular for remote keyless entry (RKE) systems. KeeLoq RKEs are widely used for access control purposes such as garage openers or car door systems. Even though the attack seems ...
 
Can Knowledge Regarding the Presence of Countermeasures Against Fault Attacks Simplify Power Attacks on Cryptographic Devices?
Found in: Defect and Fault-Tolerance in VLSI Systems, IEEE International Symposium on
By Francesco Regazzoni, Thomas Eisenbarth, Luca Breveglieri, Paolo Ienne, Israel Koren
Issue Date:October 2008
pp. 202-210
implementing cryptographic algorithms. Powerful ways for gaining information about the secret key as well as various countermeasures against such attacks have been recently developed. Although it iswell known that such attacks can exploit information leake...
 
A Survey of Lightweight-Cryptography Implementations
Found in: IEEE Design and Test of Computers
By Thomas Eisenbarth, Sandeep Kumar, Christof Paar, Axel Poschmann, Leif Uhsadel
Issue Date:November 2007
pp. 522-533
The upcoming pervasive computing age will lead to an increased demand for security for applications ranging from RFIDs and smart cards to mobile devices. Lightweight cryptography is a key tool for building strong security solutions for pervasive devices. D...
 
Power Attacks Resistance of Cryptographic S-boxes with added Error Detection Circuits
Found in: Defect and Fault-Tolerance in VLSI Systems, IEEE International Symposium on
By Francesco Regazzoni, Thomas Eisenbarth, Johann Großschädl, Luca Breveglieri, Paolo Ienne, Israel Koren, Christof Paar
Issue Date:September 2007
pp. 508-516
Many side-channel attacks on implementations of cryptographic algorithms have been developed in recent years demonstrating the ease of extracting the secret key. In response, various schemes to protect cryptographic devices against such attacks have been d...
 
Establishing Chain of Trust in Reconfigurable Hardware
Found in: Field-Programmable Custom Computing Machines, Annual IEEE Symposium on
By Thomas Eisenbarth, Tim Guneysu, Christof Paar, Ahmad-Reza Sadeghi, Marko Wolf, Russell Tessier
Issue Date:April 2007
pp. 289-290
Facing ubiquitous threats like computer viruses, trojans and theft of intellectual property, Trusted Computing (TC) is an emerging technology towards building trustworthy computing platforms. A recent initiative by the Trusted Computing Group (TCG) specifi...
   
Addendum to
Found in: IEEE Transactions on Software Engineering
By Dragan Bojic, Thomas Eisenbarth, Rainer Koschke, Daniel Simon, Dusan Velasevic
Issue Date:January 2004
pp. 140
<p><b>Abstract</b>—In this supplement to the paper
 
Locating Features in Source Code
Found in: IEEE Transactions on Software Engineering
By Thomas Eisenbarth, Rainer Koschke, Daniel Simon
Issue Date:March 2003
pp. 210-224
<p><b>Abstract</b>—Understanding the implementation of a certain feature of a system requires identification of the computational units of the system that contribute to this feature. In many cases, the mapping of features to the source co...
 
Aiding Program Comprehension by Static and Dynamic Feature Analysis
Found in: Software Maintenance, IEEE International Conference on
By Thomas Eisenbarth, Rainer Koschke, Daniel Simon
Issue Date:November 2001
pp. 602
Understanding a system's implementation without prior knowledge is a hard task for reengineers in general. However, some degree of automatic aid is possible. In this paper, we present a technique building a mapping between the system's externally visible b...
 
Derivation of Feature Component Maps by means of Concept Analysis
Found in: Software Maintenance and Reengineering, European Conference on
By Thomas Eisenbarth, Rainer Koschke, Daniel Simon
Issue Date:March 2001
pp. 176
Feature component maps describe which components are needed to implement a particular feature and are used early in processes to develop a product line based on existing assets. This paper describes a new technique to derive the feature component map and a...
 
Data Exchange in Bauhaus
Found in: Reverse Engineering, Working Conference on
By Jörg Czeranski, Thomas Eisenbarth, Holger M. Kienle, Rainer Koschke, Erhard Plödereder, Daniel Simon, Yan Zhang, Jean-François Girard, Martin Würthner
Issue Date:November 2000
pp. 293
In the context of the Bauhaus project, reengineering environments to support program understanding of legacy code are being developed. Bauhaus defines two formats to represent information that has been extracted from source code. One of these formats, RG, ...
 
Analyzing xfig Using the Bauhaus Tool
Found in: Reverse Engineering, Working Conference on
By Jörg Czeranski, Thomas Eisenbarth, Holger Kienle, Rainer Koschke, Daniel Simon
Issue Date:November 2000
pp. 197
We used the Bauhaus tool, which helps program understanding and architecture recovery, to analyze the xfig program. xfig's architecture was recovered and all of the (hypothetical) maintenance tasks described in the Developer Handbook were performed.
 
Feature-Driven Program Understanding Using Concept Analysis of Execution Traces
Found in: International Conference on Program Comprehension
By Thomas Eisenbarth, Rainer Koschke, Daniel Simon
Issue Date:May 2001
pp. 0300
Abstract: The first task of a programmer who wants to understand how a certain feature is implemented is to localize the implementation of the feature in the code. If the implementations of a set of related features are to be understood, a programmer is in...
 
A Framework for Experimental Evaluation of Clustering Techniques
Found in: International Conference on Program Comprehension
By Rainer Koschke, Thomas Eisenbarth
Issue Date:June 2000
pp. 201
Experimental evaluation of clustering techniques for component recovery is necessary in order to analyze their strengths and weaknesses in comparison to other techniques. For comparable evaluations of automatic clustering techniques, a common reference cor...
 
 1