Dominik Merli

Orcid: 0000-0003-2310-5895

According to our database1, Dominik Merli authored at least 34 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Safe and Secure? On the Timing Analysability of Cryptographic Implementations.
Proceedings of the 30th IEEE Real-Time and Embedded Technology and Applications Symposium, 2024

Attacking Automation Systems via the PLC Backplane Bus.
Proceedings of the 20th IEEE International Conference on Automation Science and Engineering, 2024

Automating Side-Channel Testing for Embedded Systems: A Continuous Integration Approach.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

Accuracy Evaluation of SBOM Tools for Web Applications and System-Level Software.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
FISMOS - An FPGA Implementation of a Security Module as Open Source.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Testbed for Functional Safety-Relevant Wireless Communication Based on IO-Link Wireless and 5G.
CoRR, 2022

On the Security of IO-Link Wireless Communication in the Safety Domain.
Proceedings of the 27th IEEE International Conference on Emerging Technologies and Factory Automation, 2022

2021
A Secure Network Scanner Architecture for Asset Management in Strongly Segmented ICS Networks.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021


Salt&Pepper: Spice up Security Behavior with Cognitive Triggers.
Proceedings of the EICC '21: European Interdisciplinary Cybersecurity Conference, 2021

2020
Impact of Active Scanning Tools for Device Discovery in Industrial Networks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

Analysis of Industrial Device Architectures for Real-Time Operations Under Denial of Service Attacks.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

2019
Network Scanning and Mapping for IIoT Edge Node Device Security.
CoRR, 2019

LICSTER - A Low-cost ICS Security Testbed for Education and Research.
CoRR, 2019

Efficient Intrusion Detection on Low-Performance Industrial IoT Edge Node Devices.
CoRR, 2019

CoRT: A Communication Robustness Testbed for Industrial Control System Components.
CoRR, 2019

Efficient Passive ICS Device Discovery and Identification by MAC Address Correlation.
CoRR, 2019

A Secure Dual-MCU Architecture for Robust Communication of IIoT Devices.
Proceedings of the 8th Mediterranean Conference on Embedded Computing, 2019

2018
You Snooze, You Lose: Measuring PLC Cycle Times under Attacks.
Proceedings of the 12th USENIX Workshop on Offensive Technologies, 2018

2015
A new Definition and Classification of Physical Unclonable Functions.
Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, 2015

2014
Hardware Trojans: current challenges and approaches.
IET Comput. Digit. Tech., 2014

2013
Attacking and protecting ring oscillator physical unclonable functions and code-offset fuzzy extractors.
PhD thesis, 2013

Protecting PUF Error Correction by Codeword Masking.
IACR Cryptol. ePrint Arch., 2013

Localized electromagnetic analysis of RO PUFs.
Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, 2013

Comprehensive analysis of software countermeasures against fault attacks.
Proceedings of the Design, Automation and Test in Europe, 2013

Physical unclonable functions: devices for cryptostorage.
Proceedings of the TrustED'13, 2013

Identities for Embedded Systems Enabled by Physical Unclonable Functions.
Proceedings of the Number Theory and Cryptography, 2013

2012
Physical Unclonable Functions.
Datenschutz und Datensicherheit, 2012

A New Security Architecture for Smartcards Utilizing PUFs.
Proceedings of the ISSE 2012, 2012

Complementary IBS: Application specific error correction for PUFs.
Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 2012

Strengths and Limitations of High-Resolution Electromagnetic Field Measurements for Side-Channel Analysis.
Proceedings of the Smart Card Research and Advanced Applications, 2012

Reliability bound and channel capacity of IBS-based fuzzy embedders.
Proceedings of the 2012 NASA/ESA Conference on Adaptive Hardware and Systems, 2012

2011
Side-Channel Analysis of PUFs and Fuzzy Extractors.
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011

2010
Improving the quality of ring oscillator PUFs on FPGAs.
Proceedings of the 5th Workshop on Embedded Systems Security, 2010


  Loading...