Steffen Becker

Orcid: 0000-0001-7526-5597

Affiliations:
  • Ruhr-University Bochum, Institute for IT Security, Bochum, Germany


According to our database1, Steffen Becker authored at least 22 papers between 2018 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Decoding Complexity: Exploring Human-AI Concordance in Qualitative Coding.
CoRR, 2024

Digital Security - A Question of Perspective A Large-Scale Telephone Survey with Four At-Risk User Groups.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Explainability as a Requirement for Hardware: Introducing Explainable Hardware (XHW).
Proceedings of the 32nd IEEE International Requirements Engineering Conference, 2024

I see an IC: A Mixed-Methods Approach to Study Human Problem-Solving Processes in Hardware Reverse Engineering.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024

Patching FPGAs: The Security Implications of Bitstream Modifications.
Proceedings of the 2024 Workshop on Attacks and Solutions in Hardware Security, 2024

2023
The Anatomy of Hardware Reverse Engineering: An Exploration of Human Factors During Problem Solving.
ACM Trans. Comput. Hum. Interact., August, 2023

52 Weeks Later: Attitudes Towards COVID-19 Apps for Different Purposes Over Time.
Proc. ACM Hum. Comput. Interact., 2023

REVERSIM: A Game-Based Approach to Accessing Large Populations for Studying Human Aspects in Hardware Reverse Engineering.
CoRR, 2023

Expanding Explainability: From Explainable Artificial Intelligence to Explainable Hardware.
CoRR, 2023

A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 Countries.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

Towards Unsupervised SEM Image Segmentation for IC Layout Extraction.
Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security, 2023

2022
Human factors in hardware reverse engineering.
PhD thesis, 2022

Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations.
IACR Cryptol. ePrint Arch., 2022

Talking to the Overlooked: A Nationwide Telephone Survey with Four Groups Under-represented in Privacy and Security Studies.
CoRR, 2022

2021
Apps Against the Spread: Privacy Implications and User Acceptance of COVID-19-Related Smartphone Apps on Three Continents.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

2020
Hardware-Trojaner.
Datenschutz und Datensicherheit, 2020

An Exploratory Study of Hardware Reverse Engineering - Technical and Cognitive Processes.
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020

2019
Wie arbeiten Reverse Engineers?
Datenschutz und Datensicherheit, 2019

Promoting the Acquisition of Hardware Reverse Engineering Skills.
Proceedings of the IEEE Frontiers in Education Conference, 2019

Highway to HAL: open-sourcing the first extendable gate-level netlist reverse engineering framework.
Proceedings of the 16th ACM International Conference on Computing Frontiers, 2019

Towards cognitive obfuscation: impeding hardware reverse engineering based on psychological insights.
Proceedings of the 24th Asia and South Pacific Design Automation Conference, 2019

2018
Teaching Hardware Reverse Engineering: Educational Guidelines and Practical Insights.
Proceedings of the IEEE International Conference on Teaching, 2018


  Loading...