David F. Oswald
Orcid: 0000-0001-8524-5282
According to our database1,
David F. Oswald
authored at least 51 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 2024 Workshop on Attacks and Solutions in Hardware Security, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
PMFault: Faulting and Bricking Server CPUs through Management Interfaces Or: A Modern Example of Halt and Catch Fire.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
Symbolic modelling of remote attestation protocols for device and app integrity on Android.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security, 2023
2022
Magnifying Side-Channel Leakage of Lattice-Based Cryptosystems With Chosen Ciphertexts: The Case Study of Kyber.
IEEE Trans. Computers, 2022
DTRAP, 2022
A Tale of Four Gates - Privilege Escalation and Permission Bypasses on Android Through App Components.
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the Smart Card Research and Advanced Applications, 2022
2021
Fill your Boots: Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
IACR Cryptol. ePrint Arch., 2021
VoltPillager: Hardware-based fault injection attacks against Intel SGX Enclaves using the SVID voltage scaling interface.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
2020
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
IEEE Secur. Priv., 2020
Magnifying Side-Channel Leakage of Lattice-Based Cryptosystems with Chosen Ciphertexts: The Case Study of Kyber.
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018
Breaking All the Things - A Systematic Survey of Firmware Extraction Techniques for IoT Devices.
Proceedings of the Smart Card Research and Advanced Applications, 2018
2017
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Lock It and Still Lose It - on the (In)Security of Automotive Remote Keyless Entry Systems.
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the Radio Frequency Identification and IoT Security, 2016
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, 2016
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, 2016
2015
Physical Security Evaluation of the Bitstream Encryption Mechanism of Altera Stratix II and Stratix III FPGAs.
ACM Trans. Reconfigurable Technol. Syst., 2015
Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, 2015
Proceedings of the Smart Card Research and Advanced Applications, 2015
2014
Cryptographic Algorithms on the GA144 Asynchronous Multi-Core Processor - Implementation and Side-Channel Analysis.
J. Signal Process. Syst., 2014
Proc. IEEE, 2014
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014
2013
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System - Full Version.
IACR Cryptol. ePrint Arch., 2013
When Reverse-Engineering Meets Side-Channel Analysis - Digital Lockpicking in Practice.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013
Rights Management with NFC Smartphones and Electronic ID Cards: A Proof of Concept for Modern Car Sharing.
Proceedings of the Radio Frequency Identification, 2013
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013
Side-channel attacks on the bitstream encryption mechanism of Altera Stratix II: facilitating black-box analysis using software reverse-engineering.
Proceedings of the 2013 ACM/SIGDA International Symposium on Field Programmable Gate Arrays, 2013
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
2012
Proceedings of the Smart Card Research and Advanced Applications, 2012
2011
Wireless security threats: Eavesdropping and detecting of active RFIDs and remote controls in the wild.
Proceedings of the 19th International Conference on Software, 2011
Proceedings of the RFID. Security and Privacy - 7th International Workshop, 2011
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011
2010
A Versatile Framework for Implementation Attacks on Cryptographic RFIDs and Embedded Devices.
Trans. Comput. Sci., 2010
Proceedings of the Progress in Cryptology, 2010
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010
2009
EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment.
Proceedings of the Information Security Applications, 10th International Workshop, 2009