[12] |
Real-World Chaos-Based Cryptography Using Synchronised Chua Chaotic Circuits
(
Emiliia Nazarenko,
Nikolaos Athanasios Anagnostopoulos
,
Stavros G. Stavrinides,
Nico Mexis,
Florian Frank,
Tolga Arul and
Stefan Katzenbeisser
),
In
IEEE International Symposium on Hardware Oriented Security and Trust (HOST 2022)
,
2022.
BIB
@article{Nazarenko2022_Techrxiv,
author = {Emiliia Nazarenko and Nikolaos Athanasios Anagnostopoulos and Stavros
G. Stavrinides and Nico Mexis and Florian Frank and Tolga Arul and
Stefan Katzenbeisser},
title = {{Real-World Chaos-Based Cryptography Using Synchronised Chua Chaotic
Circuits}},
year = {2022},
month = {9},
doi = {10.36227/techrxiv.21030466.v1},
url = {https://onlinelibrary.wiley.com/doi/pdf/10.1002/sec.1690}
}
PDF
|
[11] |
On the Sustainability of Lightweight Cryptography Based on PUFs Implemented on NAND Flash Memories Using Programming Disturbances
(
Nikolaos Athanasios Anagnostopoulos
,
Yufan Fan,
Muhammad Umair Saleem,
Nico Mexis,
Florian Frank,
Tolga Arul and
Stefan Katzenbeisser
),
In Workshop on Sustainability in Security, Security for Sustainability, co-located with the 25th Design, Automation and Test in Europe Conference & Exhibition (DATE 2022),
2022.
BIB
@article{Anagnostopoulos2022_Techrxiv,
author = {Nikolaos Athanasios Anagnostopoulos and Yufan Fan and Muhammad Umair
Saleem and Nico Mexis and Florian Frank and Tolga Arul and Stefan
Katzenbeisser},
title = {{On the Sustainability of Lightweight Cryptography Based on PUFs
Implemented on NAND Flash Memories Using Programming Disturbances}},
year = {2022},
month = {9},
doi = {10.36227/techrxiv.19529263.v2},
url = {https://onlinelibrary.wiley.com/doi/pdf/10.1002/sec.1690}
}
PDF
|
[10] |
A Lightweight Architecture for Hardware-Based Security in the Emerging Era of Systems of Systems
(
Nico Mexis,
Nikolaos Athanasios Anagnostopoulos
,
Shuai Chen,
Jan Bambach,
Tolga Arul and
Stefan Katzenbeisser
), In J. Emerg. Technol. Comput. Syst.
, Association for Computing Machinery, volume 17, 2021.
BIB
@article{Mexis2021_JETC,
author = {Nico Mexis and Nikolaos Athanasios Anagnostopoulos and Shuai Chen
and Jan Bambach and Tolga Arul and Stefan Katzenbeisser},
title = {A Lightweight Architecture for Hardware-Based Security in the Emerging
Era of Systems of Systems},
journal = {J. Emerg. Technol. Comput. Syst.},
year = {2021},
volume = {17},
number = {3},
month = {jun},
address = {New York, NY, USA},
articleno = {43},
doi = {10.1145/3458824},
issn = {1550-4832},
issue_date = {June 2021},
keywords = {System of systems, hardware and software security co-engineering,
IoT 2.0, Internet of Things},
numpages = {25},
publisher = {Association for Computing Machinery}
}
|
[9] |
Low-Cost Security for Next-Generation IoT Networks
(
Nikolaos Athanasios Anagnostopoulos
, Saad Ahmad,
Tolga Arul,
Daniel Steinmetzer,
Matthias Hollick and
Stefan Katzenbeisser
), In ACM Trans. Internet Technol.
, Association for Computing Machinery, volume 20, 2020.
BIB
@article{Anagnostopoulos2020_TOIT,
author = {Nikolaos Athanasios Anagnostopoulos and Saad Ahmad and Tolga Arul
and Daniel Steinmetzer and Matthias Hollick and Stefan Katzenbeisser},
title = {{Low-Cost Security for Next-Generation IoT Networks}},
journal = {ACM Trans. Internet Technol.},
year = {2020},
volume = {20},
number = {3},
month = {sep},
abstract = {In recent years, the ubiquitous nature of Internet-of-Things (IoT)
applications as well as the pervasive character of next-generation
communication protocols, such as the 5G technology, have become widely
evident. In this work, we identify the need for low-cost security
in current and next-generation IoT networks and address this demand
through the implementation, testing, and validation of an intrinsic
low-cost and low-overhead hardware-based security primitive within
an inherent network component. In particular, an intrinsic Physical
Unclonable Function (PUF) is implemented in the peripheral network
module of a tri-band commercial off-the-shelf router. Subsequently,
we demonstrate the robustness of this PUF to ambient temperature
variations and to limited natural aging, and examine in detail its
potential for securing the next generation of IoT networks and other
applications. Finally, the security of the proposed PUF-based schemes
is briefly assessed and discussed.},
address = {New York, NY, USA},
articleno = {30},
doi = {10.1145/3406280},
issn = {1533-5399},
issue_date = {September 2020},
keywords = {peripheral, 60 GHz, physical unclonable function (PUF), static random
access memory (SRAM), Internet of Things (IoT)},
numpages = {31},
publisher = {Association for Computing Machinery}
}
|
[8] |
ELSA: efficient long-term secure storage of large datasets (full version) *
(
Philipp Muth,
Matthias Geihs,
Tolga Arul,
Johannes Buchmann and
Stefan Katzenbeisser
), In EURASIP Journal on Information Security
, volume 2020, 2020.
BIB
@article{Muth2020,
author = {Philipp Muth and Matthias Geihs and Tolga Arul and Johannes Buchmann
and Stefan Katzenbeisser},
title = {{ELSA: efficient long-term secure storage of large datasets (full
version) *}},
journal = {EURASIP Journal on Information Security},
year = {2020},
volume = {2020},
pages = {9},
number = {1},
month = {May},
day = {27},
doi = {10.1186/s13635-020-00108-9},
issn = {2510-523X}
}
|
[7] |
Rule-based Anomaly Detection for Railway Signalling Networks
(
Markus Heinrich,
Arwed Gölz,
Tolga Arul and
Stefan Katzenbeisser
), In CoRR
, volume abs/2008.05241, 2020.
BIB
@article{Heinrich2020_arXiv,
author = {Markus Heinrich and Arwed G{\"{o}}lz and Tolga Arul and Stefan Katzenbeisser},
title = {Rule-based Anomaly Detection for Railway Signalling Networks},
journal = {CoRR},
year = {2020},
volume = {abs/2008.05241},
month = {8},
archiveprefix = {arXiv},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/journals/corr/abs-2008-05241.bib},
doi = {10.48550/ARXIV.2008.05241},
eprint = {2008.05241},
url = {https://onlinelibrary.wiley.com/doi/pdf/10.1002/sec.1690}
}
|
[6] |
Securing FlexRay-based in-vehicle networks
(
Dominik Püllen,
Nikolaos Athanasios Anagnostopoulos
,
Tolga Arul and
Stefan Katzenbeisser
), In Microprocessors and Microsystems
, volume 77, 2020.
BIB
@article{Puellen2020_Micpro,
author = {Dominik {P\"{u}llen} and Nikolaos Athanasios Anagnostopoulos and
Tolga Arul and Stefan Katzenbeisser},
title = {{Securing FlexRay-based in-vehicle networks}},
journal = {Microprocessors and Microsystems},
year = {2020},
volume = {77},
pages = {103144},
month = {9},
abstract = {In this work, we propose defense techniques against message spoofing
attacks in FlexRay networks. For this purpose, we explore how to
leverage the slot- and channel-based FlexRay communication for ensuring
the authenticity of safety-critical in-vehicle traffic. In particular,
we suggest to split authentication tags across two physical independent
channels, allowing for their concurrent transmission. This eventually
leads to a higher degree of fault-tolerance and security. We put
a special focus on the efficient management and distribution of cryptographic
keys by using reversed hash chains. They allow us to derive new and
forward-secure keys at low cost during operational runtime. Our evaluation
consists of both a discussion and a practical implementation on an
exemplary network. Assuming constrained hardware resources, we conclude
that authentication for groups of time slots is the most promising
approach in terms of timing and computational overhead.},
doi = {10.1016/j.micpro.2020.103144},
issn = {0141-9331},
keywords = {FlexRay, Security, Authentication, Key updates, Safety}
}
|
[5] |
Attacking SRAM PUFs using very-low-temperature data remanence
(
Nikolaos Athanasios Anagnostopoulos
,
Tolga Arul,
Markus Rosenstihl,
André Schaller,
Sebastian Gabmeyer and
Stefan Katzenbeisser
), In Microprocessors and Microsystems
, volume 71, 2019.
BIB
@article{Anagnostopoulos2019_MICPRO,
author = {Nikolaos Athanasios Anagnostopoulos and Tolga Arul and Markus Rosenstihl
and Andr{\'e} Schaller and Sebastian Gabmeyer and Stefan Katzenbeisser},
title = {{Attacking SRAM PUFs using very-low-temperature data remanence}},
journal = {Microprocessors and Microsystems},
year = {2019},
volume = {71},
pages = {102864},
month = {8},
doi = {10.1016/j.micpro.2019.102864},
issn = {0141-9331},
keywords = {Physical Unclonable Function (PUF), Static Random Access Memory (SRAM),
Data remanence, Data retention, Low temperature, Attack}
}
|
[4] |
Security Requirements Engineering in Safety-Critical Railway Signalling Networks
(
Markus Heinrich,
Tsvetoslava Vateva-Gurova,
Tolga Arul,
Stefan Katzenbeisser
,
Neeraj Suri,
Henk Birkholz,
Christoph Krauß,
Maria Zhdanova,
Don Kuzhiyelil,
Sergey Tverdyshev and
Christian Schlehuber
), In Security and Communication Networks
, volume 9, 2018.
BIB
@article{Heinrich2018_SACNWiley,
author = {Markus Heinrich and Tsvetoslava Vateva-Gurova and Tolga Arul and
Stefan Katzenbeisser and Neeraj Suri and Henk Birkholz and Christoph
Krau{\ss} and Maria Zhdanova and Don Kuzhiyelil and Sergey Tverdyshev
and Christian Schlehuber},
title = {{Security Requirements Engineering in Safety-Critical Railway Signalling
Networks}},
journal = {Security and Communication Networks},
year = {2018},
volume = {9},
pages = {5203-5218},
number = {18},
month = {7},
doi = {10.1155/2019/8348925},
keywords = {zero watermarking, e-healthcare, Jacobian matrix, authentication,
robustness, medical images},
url = {https://onlinelibrary.wiley.com/doi/pdf/10.1002/sec.1690}
}
|
[3] |
Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security
(
Nikolaos Athanasios Anagnostopoulos
,
Tolga Arul,
Yufan Fan,
Christian Hatzfeld,
André Schaller,
Wenjie Xiong,
Manishkumar Jain,
Muhammad Umair Saleem,
Jan Lotichius,
Sebastian Gabmeyer,
Jakub Szefer and
Stefan Katzenbeisser
), In Cryptography
, volume 2, 2018.
BIB
@article{Anagnostopoulos2018_MDPI,
author = {Nikolaos Athanasios Anagnostopoulos and Tolga Arul and Yufan Fan
and Christian Hatzfeld and Andr{\'e} Schaller and Wenjie Xiong and
Manishkumar Jain and Muhammad Umair Saleem and Jan Lotichius and
Sebastian Gabmeyer and Jakub Szefer and Stefan Katzenbeisser},
title = {Intrinsic {Run-Time} {Row} {Hammer} {PUFs}: Leveraging the Row Hammer
Effect for Run-Time Cryptography and Improved Security},
journal = {Cryptography},
year = {2018},
volume = {2},
number = {3},
month = {6},
doi = {10.3390/cryptography2030013},
issn = {2410-387X},
url = {https://onlinelibrary.wiley.com/doi/pdf/10.1002/sec.1690}
}
PDF
|
[2] |
Subscription-free Pay-TV over IPTV
(
Tolga Arul and
Abdulhadi Shoufan
), In Journal of Systems Architecture
, volume 64, 2016.
BIB
@article{Arul2016_JSA,
author = {Tolga Arul and Abdulhadi Shoufan},
title = {Subscription-free {Pay-TV} over {IPTV}},
journal = {Journal of Systems Architecture},
year = {2016},
volume = {64},
pages = {37 - 49},
month = {12},
note = {{Real-Time} Signal Processing in Embedded Systems},
doi = {10.1016/j.sysarc.2015.12.001},
issn = {1383-7621},
keywords = {Pay-TV, IPTV, DVB, Charging, Rekeying, Multicast}
}
|
[1] |
A Benchmarking Environment for Performance Evaluation of Tree-based Rekeying Algorithms
(
Abdulhadi Shoufan and
Tolga Arul
), In Journal of Systems and Software
, Elsevier Science Inc., volume 84, 2011.
BIB
@article{Shoufan2011_JSS,
author = {Abdulhadi Shoufan and Tolga Arul},
title = {{A Benchmarking Environment for Performance Evaluation of Tree-based
Rekeying Algorithms}},
journal = {Journal of Systems and Software},
year = {2011},
volume = {84},
pages = {1130--1143},
number = {7},
month = {jul},
acmid = {1988469},
address = {New York, NY, USA},
doi = {10.1016/j.jss.2011.02.006},
issn = {0164-1212},
issue_date = {July, 2011},
keywords = {Benchmarking, Group rekeying algorithms, Performance evaluation, Simulation},
numpages = {14},
publisher = {Elsevier Science Inc.},
url = {https://onlinelibrary.wiley.com/doi/pdf/10.1002/sec.1690}
}
PDF
|
[28] |
A Dedicated Mixed-Signal Characterisation and Testing Framework for Novel Digital Security Circuits That Use Carbon-Nanotube-Based Physical Unclonable Functions
(
Florian Frank,
Nikolaos Athanasios Anagnostopoulos
,
Simon Böttger,
Sascha Hermann,
Tolga Arul,
Stavros G.Stavrinides and
Stefan Katzenbeisser
), In 2022 11th International Conference on Modern Circuits and Systems Technologies (MOCAST)
, 2022.
BIB
@inproceedings{Frank2022_MOCAST,
author = {Florian Frank and Nikolaos Athanasios Anagnostopoulos and Simon B{\"o}ttger
and Sascha Hermann and Tolga Arul and Stavros G.Stavrinides and Stefan
Katzenbeisser},
title = {A Dedicated Mixed-Signal Characterisation and Testing Framework for
Novel Digital Security Circuits That Use Carbon-Nanotube-Based Physical
Unclonable Functions},
booktitle = {2022 11th International Conference on Modern Circuits and Systems
Technologies (MOCAST)},
year = {2022},
pages = {1-4},
month = {7},
doi = {10.1109/MOCAST54814.2022.9837567}
}
|
[27] |
Using Memristor Arrays as Physical Unclonable Functions
(
Florian Frank,
Tolga Arul,
Nikolaos Athanasios Anagnostopoulos
and
Stefan Katzenbeisser
), In Computer Security – ESORICS 2022 (Atluri, Vijayalakshmi, Di Pietro, Roberto, Jensen, Christian D., Meng, Weizhi, eds.), Springer Nature Switzerland, volume 13556, 2022.
BIB
@inproceedings{Frank2022_ESORICS,
author = {Florian Frank and Tolga Arul and Nikolaos Athanasios Anagnostopoulos
and Stefan Katzenbeisser},
title = {Using Memristor Arrays as Physical Unclonable Functions},
booktitle = {Computer Security -- ESORICS 2022},
year = {2022},
editor = {Atluri, Vijayalakshmi and Di Pietro, Roberto and Jensen, Christian
D. and Meng, Weizhi},
volume = {13556},
pages = {250--271},
address = {Cham},
month = {9},
publisher = {Springer Nature Switzerland},
doi = {10.1007/978-3-031-17143-7_13},
isbn = {978-3-031-17143-7}
}
PDF
|
[26] |
Secure Communication via Chaotic Cryptography
(
Emiliia Gelóczi,
Nico Mexis,
Nikolaos Athanasios Anagnostopoulos
,
Florian Frank,
Tolga Arul,
Stavros G. Stavrinides and
Stefan Katzenbeisser
), In crypto day matters 34 (Loebenberger, Daniel, Nüsken, Michael, eds.), Gesellschaft für Informatik e.V./ FG KRYPTO, 2022.
BIB
@inproceedings{Geloczi2022_CT34,
author = {Emiliia Gel\'{o}czi and Nico Mexis and Nikolaos Athanasios Anagnostopoulos
and Florian Frank and Tolga Arul and Stavros G. Stavrinides and Stefan
Katzenbeisser},
title = {{Secure Communication via Chaotic Cryptography}},
booktitle = {crypto day matters 34},
year = {2022},
editor = {Loebenberger, Daniel AND N\"{u}sken, Michael},
address = {Bonn},
month = {6},
publisher = {Gesellschaft f\"{u}r Informatik e.V./ FG KRYPTO},
doi = {10.18420/cdm-2021-33-41}
}
|
[25] |
Testing the Robustness of Physical Unclonable Functions Implemented on Commercial Off-the-Shelf NAND Flash Memories Using Programming Disturbances to Temperature and Voltage Variations (
Emiliia Gelóczi,
Nikolaos Athanasios Anagnostopoulos
,
Nico Mexis,
Yufan Fan,
Muhammed Umair Saleem,
André Schaller,
Felix Klement,
Florian Frank,
Tolga Arul and
Stefan Katzenbeisser
), In 2022 IEEE 12th International Conference on Consumer Electronics (ICCE-Berlin)
, 2022.
BIB
@inproceedings{Geloczi2022_ICCEBerlin,
author = {Emiliia Gel\'{o}czi and Nikolaos Athanasios Anagnostopoulos and Nico
Mexis and Yufan Fan and Muhammed Umair Saleem and Andr{\'e} Schaller
and Felix Klement and Florian Frank and Tolga Arul and Stefan Katzenbeisser},
title = {{Testing the Robustness of Physical Unclonable Functions Implemented
on Commercial Off-the-Shelf NAND Flash Memories Using Programming
Disturbances to Temperature and Voltage Variations}},
booktitle = {{2022 IEEE 12th International Conference on Consumer Electronics
(ICCE-Berlin)}},
year = {2022},
month = {9},
howpublished = {presented in the 2022 IEEE 12th International Conference on Consumer
Electronics - Berlin (ICCE-Berlin 2022)}
}
PDF
|
[24] |
Nano Security: From Nano-Electronics to Secure Systems
(
Ilia Polian,
Frank Altmann,
Tolga Arul,
Christian Boit,
Ralf Brederlow,
Lucas Davi,
Rolf Drechsler,
Nan Du,
Thomas Eisenbarth,
Tim Güneysu,
Sascha Hermann,
Matthias Hiller,
Rainer Leupers,
Farhad Merchant,
Thomas Mussenbrock,
Stefan Katzenbeisser
,
Akash Kumar,
Wolfgang Kunz,
Thomas Mikolajick,
Vivek Pachauri,
Jean-Pierre Seifert,
Frank Sill Torres and
Jens Trommer
), In Design, Automation and Test in Europe Conference (DATE). Design, Automation & Test in Europe (DATE-2021), February 1-5, Grenoble, France
, 2021.
BIB
@inproceedings{Polian2021_Date,
author = {Ilia Polian and Frank Altmann and Tolga Arul and Christian Boit and
Ralf Brederlow and Lucas Davi and Rolf Drechsler and Nan Du and Thomas
Eisenbarth and Tim G\"{u}neysu and Sascha Hermann and Matthias Hiller
and Rainer Leupers and Farhad Merchant and Thomas Mussenbrock and
Stefan Katzenbeisser and Akash Kumar and Wolfgang Kunz and Thomas
Mikolajick and Vivek Pachauri and Jean-Pierre Seifert and Frank Sill
Torres and Jens Trommer},
title = {{Nano Security: From Nano-Electronics to Secure Systems}},
booktitle = {Design, Automation and Test in Europe Conference (DATE). Design,
Automation \& Test in Europe (DATE-2021), February 1-5, Grenoble,
France},
year = {2021},
pages = {1334-1339},
month = {2},
doi = {10.23919/DATE51398.2021.9474187}
}
|
[23] |
A Design for a Secure Network of Networks Using a Hardware and Software Co-Engineering Architecture
(
Nico Mexis,
Nikolaos Athanasios Anagnostopoulos
,
Shuai Chen,
Jan Bambach,
Tolga Arul and
Stefan Katzenbeisser
), In Proceedings of the SIGCOMM '21 Poster and Demo Sessions
, Association for Computing Machinery, 2021.
BIB
@inproceedings{Mexis2021_SIGCOMM,
author = {Nico Mexis and Nikolaos Athanasios Anagnostopoulos and Shuai Chen
and Jan Bambach and Tolga Arul and Stefan Katzenbeisser},
title = {A Design for a Secure Network of Networks Using a Hardware and Software
Co-Engineering Architecture},
booktitle = {Proceedings of the SIGCOMM '21 Poster and Demo Sessions},
year = {2021},
series = {SIGCOMM '21},
pages = {65-67},
address = {New York, NY, USA},
month = {8},
publisher = {Association for Computing Machinery},
abstract = {This work concerns the demonstration of a security solution for a
network of networks, which comprises heterogeneous devices and utilises
diverse communication protocols. The security solution used in this
work employs an architecture presented in a previous work, which
is based upon the concept of hardware and software security co-engineering.},
doi = {10.1145/3472716.3472849},
isbn = {9781450386296},
keywords = {internet of things, network of networks, hardware and software security
co-engineering},
location = {Virtual Event},
numpages = {3}
}
|
[22] |
Fuzzy Extractors using Low-Density Parity-Check Codes
(
Nico Mexis,
Nikolaos Athanasios Anagnostopoulos
,
Tolga Arul,
Florian Frank and
Stefan Katzenbeisser
), In crypto day matters 33 (Gazdag, Stefan-Lukas, Tiepelt, Marcel, Loebenberger, Daniel, Nüsken, Michael, eds.), Gesellschaft für Informatik e.V./ FG KRYPTO, 2021.
BIB
@inproceedings{Mexis2021_CT33,
author = {Nico Mexis and Nikolaos Athanasios Anagnostopoulos and Tolga Arul
and Florian Frank and Stefan Katzenbeisser},
title = {Fuzzy Extractors using Low-Density Parity-Check Codes},
booktitle = {crypto day matters 33},
year = {2021},
editor = {Gazdag, Stefan-Lukas AND Tiepelt, Marcel AND Loebenberger, Daniel
AND N\"{u}sken, Michael},
month = {09},
publisher = {Gesellschaft f\"{u}r Informatik e.V./ FG KRYPTO},
doi = {10.18420/cdm-2021-33-41}
}
|
[21] |
A Study of the Spatial Auto-Correlation of Memory-Based Physical Unclonable Functions
(
Tolga Arul,
Nikolaos Athanasios Anagnostopoulos
Sergej Reißig and
Stefan Katzenbeisser
), In 2020 European Conference on Circuit Theory and Design (ECCTD)
, 2020.
BIB
@inproceedings{Arul2020_ECCTD,
author = {Tolga Arul and Nikolaos Athanasios Anagnostopoulos and Sergej Rei\ss{}ig
and Stefan Katzenbeisser},
title = {A Study of the Spatial Auto-Correlation of Memory-Based Physical
Unclonable Functions},
booktitle = {2020 European Conference on Circuit Theory and Design (ECCTD)},
year = {2020},
pages = {1-4},
month = {Sep.},
abstract = {In this work, we examine the spatial auto-correlation exhibited in
the responses of memory-based Physical Unclonable Functions (PUFs).
In particular, we examine the responses of an SRAM PUF, a DRAM decay-based
PUF, and a disturbance-based Flash PUF. For the evaluation, we use
three different metrics that have already been employed in the relevant
literature for measuring the spatial correlation of other PUF responses.
Our results prove that the examined PUF responses exhibit little,
if any, spatial auto-correlation. Thus, these PUFs can be considered
as security mechanisms of high entropy, which can be utilised to
enhance the security of the Internet of Things (IoT).},
doi = {10.1109/ECCTD49232.2020.9218302},
issn = {2474-9672},
keywords = {correlation;spatial auto-correlation;Physical Unclonable Function
(PUF);Static Random Access Memory (SRAM);Dynamic Random Access Memory
(DRAM);Flash memory}
}
PDF
|
[20] |
Demo: Railway Signalling Security Testbed
(
Markus Heinrich,
Tolga Arul and
Stefan Katzenbeisser
), In IEEE Vehicular Networking Conference, VNC 2020, New York, NY, USA, December 16-18, 2020
, IEEE, 2020.
BIB
@inproceedings{Heinrich2021_VNC,
author = {Markus Heinrich and Tolga Arul and Stefan Katzenbeisser},
title = {{Demo: Railway Signalling Security Testbed}},
booktitle = {{IEEE} Vehicular Networking Conference, {VNC} 2020, New York, NY,
USA, December 16-18, 2020},
year = {2020},
pages = {1--2},
month = {12},
publisher = {{IEEE}},
doi = {10.1109/VNC51378.2020.9318338}
}
|
[19] |
Predicting Railway Signalling Commands Using Neural Networks for Anomaly Detection
(
Markus Heinrich,
Dominik Renkel,
Tolga Arul and
Stefan Katzenbeisser
), In Computer Safety, Reliability, and Security (Casimiro, António, Ortmeier, Frank, Bitsch, Friedemann, Ferreira, Pedro, eds.), Springer International Publishing, 2020.
BIB
@inproceedings{Heinrich2020_Safecomp,
author = {Markus Heinrich and Dominik Renkel and Tolga Arul and Stefan Katzenbeisser},
title = {Predicting Railway Signalling Commands Using Neural Networks for
Anomaly Detection},
booktitle = {Computer Safety, Reliability, and Security},
year = {2020},
editor = {Casimiro, Ant{\'o}nio and Ortmeier, Frank and Bitsch, Friedemann
and Ferreira, Pedro},
pages = {164--178},
address = {Cham},
month = {7},
publisher = {Springer International Publishing},
abstract = {We propose a new anomaly detection system to defend against semantic
attacks on the command and control communication in safety-critical
railway signalling networks. To this end, we train artificial neural
network on the communication of signal boxes connected to their signals,
points, and train detection system. We show that it is possible to
predict the next command with knowledge of only few previously transmitted
datagrams. We optimize the parameters of the artificial neural network,
determine the optimal number of previous datagrams, and show that
our approach is viable in railway stations of various size. Using
the artificial neural network, we construct an anomaly detection
system to classify each observed datagram to raise an alert in case
of deviant behaviour. We further optimize the anomaly detection's
threshold and show that our classifier is able to operate with a
false positive rate of 0.03 and a false negative rate of 0.04.},
doi = {10.1007/978-3-030-54549-9_11},
isbn = {978-3-030-54549-9}
}
|
[18] |
Safety Meets Security: Using IEC 62443 for a Highly Automated Road Vehicle
(
Dominik Püllen,
Nikolaos Athanasios Anagnostopoulos
,
Tolga Arul and
Stefan Katzenbeisser
), In Computer Safety, Reliability, and Security (Casimiro, António, Ortmeier, Frank, Bitsch, Friedemann, Ferreira, Pedro, eds.), Springer International Publishing, 2020.
BIB
@inproceedings{Puellen2020_Safecomp,
author = {Dominik P{\"u}llen and Nikolaos Athanasios Anagnostopoulos and Tolga
Arul and Stefan Katzenbeisser},
title = {{Safety Meets Security: Using IEC 62443 for a Highly Automated Road
Vehicle}},
booktitle = {Computer Safety, Reliability, and Security},
year = {2020},
editor = {Casimiro, Ant{\'o}nio and Ortmeier, Frank and Bitsch, Friedemann
and Ferreira, Pedro},
pages = {325--340},
address = {Cham},
month = {7},
publisher = {Springer International Publishing},
abstract = {In this work, we conduct and discuss a consensus-based risk analysis
for a novel architecture of a driverless and electric prototype vehicle.
While well-established safety standards like ISO 26262 provide frameworks
to systematically assess risks of hazardous operational situations,
the automotive security field has emerged only in the last years.
Today, SAE J3061 provides recommendations and high-level guiding
principles of how to incorporate security into vehicle systems. ISO/SAE
21434 is a novel automotive security standard, which, however, is
still under development. Therefore, we treat the aforementioned architecture
as a single Industrial Automation and Control System (IACS) and provide
an implementation of the IEC 62443 series. We collaboratively identify
threats in a three-round process and define a scoring scheme for
automotive risks. As a result, we obtain a tailored bundle of compensating
security mechanisms. Based on our work, we suggest improvements for
future automotive security standards when it comes to the co-engineering
of safety and security.},
doi = {10.1007/978-3-030-54549-9_22},
isbn = {978-3-030-54549-9}
}
|
[17] |
Privacy & Usability of IPTV Recommender Systems
(
Tolga Arul,
Nikolaos Athanasios Anagnostopoulos
and
Stefan Katzenbeisser
), In 2019 IEEE International Conference on Consumer Electronics (ICCE) (2019 ICCE)
, 2019.
BIB
@inproceedings{ArulICCE_2019,
author = {Tolga Arul and Nikolaos Athanasios Anagnostopoulos and Stefan Katzenbeisser},
title = {Privacy \& Usability of {IPTV} Recommender Systems},
booktitle = {2019 IEEE International Conference on Consumer Electronics (ICCE)
(2019 ICCE)},
year = {2019},
address = {Las Vegas, USA},
month = {jan},
abstract = {IPTV is capable of providing recommendations for upcoming TV programs
based on consumer feedback. With the increasing popularity and performance
of recommender systems, risks of user privacy breach emerge. Although
several works about privacy-preserving designs of recommender systems
exist in the literature, a detailed analysis of the current state-of-the-art
regarding privacy as well as an investigation of the usability aspects
of such systems, so far, have not received consideration. In this
paper, we survey current approaches for recommender systems by studying
their privacy and usability properties in the context of IPTV.},
days = {11},
doi = {10.1109/ICCE.2019.8662046},
keywords = {recommender system; privacy; usability}
}
|
[16] |
AR-PUFs: Advanced Security Primitives for the Internet of Things and Cyber-Physical Systems
(
Nikolaos Athanasios Anagnostopoulos
,
Tolga Arul,
Yufan Fan,
Manish Kumar and
Stefan Katzenbeisser
), In 2019 IEEE International Conference on Consumer Electronics (ICCE) (2019 ICCE)
, 2019.
BIB
@inproceedings{Anagnostopoulos2019_ICCE,
author = {Nikolaos Athanasios Anagnostopoulos and Tolga Arul and Yufan Fan
and Manish Kumar and Stefan Katzenbeisser},
title = {{AR-PUFs:} Advanced Security Primitives for the Internet of Things
and {Cyber-Physical} Systems},
booktitle = {2019 IEEE International Conference on Consumer Electronics (ICCE)
(2019 ICCE)},
year = {2019},
address = {Las Vegas, USA},
month = {jan},
abstract = {In this work, we examine very briefly a number of Advanced Reconfigurable
Physical Unclonable Functions (AR-PUFs) that can be used to enhance
the security of devices used for the realisation of the Internet
of Things (IoT) and Cyber-Physical Systems (CPS). To this end, we
also present two practical lightweight protocols that can be implemented
using such AR-PUFs on IoT and CPS devices, in order to significantly
enhance their security, even allowing the security of such devices
to be restored after they have been compromised.},
days = {11},
doi = {10.1109/ICCE.2019.8661840},
keywords = {reconfigurable physical unclonable function; internet of things; cyber-physical
system}
}
|
[15] |
Using Implicit Certification to Efficiently Establish Authenticated Group Keys for In-Vehicle Networks
(
Dominik Püllen,
Nikolaos Athanasios Anagnostopoulos
,
Tolga Arul and
Stefan Katzenbeisser
), In 2019 IEEE Vehicular Networking Conference (VNC)
, 2019.
BIB
@inproceedings{Puellen2019_VNC,
author = {Dominik {P\"{u}llen} and Nikolaos Athanasios Anagnostopoulos and
Tolga Arul and Stefan Katzenbeisser},
title = {{Using Implicit Certification to Efficiently Establish Authenticated
Group Keys for In-Vehicle Networks}},
booktitle = {2019 IEEE Vehicular Networking Conference (VNC)},
year = {2019},
pages = {1-8},
month = {12},
doi = {10.1109/VNC48660.2019.9062785}
}
|
[14] |
Security and Safety Co-Engineering of the FlexRay Bus in Vehicular Networks
(
Dominik Püllen,
Nikolaos Athanasios Anagnostopoulos
,
Tolga Arul and
Stefan Katzenbeisser
), In Proceedings of the International Conference on Omni-Layer Intelligent Systems
, ACM, 2019.
BIB
@inproceedings{Puellen2019_COINS,
author = {Dominik P\"{u}llen and Nikolaos Athanasios Anagnostopoulos and Tolga
Arul and Stefan Katzenbeisser},
title = {{Security and Safety Co-Engineering of the FlexRay Bus in Vehicular
Networks}},
booktitle = {Proceedings of the International Conference on Omni-Layer Intelligent
Systems},
year = {2019},
series = {COINS '19},
pages = {31--37},
address = {New York, NY, USA},
month = {5},
publisher = {ACM},
acmid = {3312626},
doi = {10.1145/3312614.3312626},
isbn = {978-1-4503-6640-3},
keywords = {FlexRay, automotive, fault-tolerance, in-vehicle communication, reliability,
safety, security},
location = {Crete, Greece},
numpages = {7}
}
|
[13] |
Poster: Hierarchical Integrity Checking in Heterogeneous Vehicular Networks
(
Dominik Püllen,
Nikolaos Athanasios Anagnostopoulos
,
Tolga Arul and
Stefan Katzenbeisser
), In 2018 IEEE Vehicular Networking Conference (VNC) (IEEE VNC 2018)
, 2018.
BIB
@inproceedings{Puellen2018_VNC,
author = {Dominik {P{\"u}llen} and Nikolaos Athanasios Anagnostopoulos and
Tolga Arul and Stefan Katzenbeisser},
title = {{Poster: Hierarchical Integrity Checking in Heterogeneous Vehicular
Networks}},
booktitle = {2018 IEEE Vehicular Networking Conference (VNC) (IEEE VNC 2018)},
year = {2018},
address = {Taipei, Taiwan},
month = {dec},
days = {4},
doi = {10.1109/VNC.2018.8628375}
}
|
[12] |
Securing IoT Devices Using Robust DRAM PUFs
(
Nikolaos Athanasios Anagnostopoulos
,
Tolga Arul,
Yufan Fan ,
Jan Lotichius,
Christian Hatzfeld,
Felipe Fernandes,
Ratika Sharma,
Fatemeh Tehranipoor and
Stefan Katzenbeisser
), In 2018 Global Information Infrastructure and Networking Symposium (GIIS) (GIIS'18)
, 2018.
BIB
@inproceedings{Anagnostopoulos2018_GIIS,
author = {Nikolaos Athanasios Anagnostopoulos and Tolga Arul and Yufan Fan
and Jan Lotichius and Christian Hatzfeld and Felipe Fernandes and
Ratika Sharma and Fatemeh Tehranipoor and Stefan Katzenbeisser},
title = {Securing {IoT} Devices Using Robust {DRAM} {PUFs}},
booktitle = {2018 Global Information Infrastructure and Networking Symposium (GIIS)
(GIIS'18)},
year = {2018},
address = {Thessaloniki, Greece},
month = {oct},
abstract = {In this work, we present a novel way in which DRAM modules, which
are found inherently in many IoT devices, can be used to enhance
the security of such devices. We test the robustness of two DRAM-based
security primitives, namely DRAM retention-based PUFs and Row~Hammer
PUFs, to two external factors, i.e. ambient temperature and voltage
variations. As both types of PUFs are proven to be highly dependent
on temperature, we, then, present and discuss ways in which such
PUFs can be used to implement cryptographic applications in a robust
way, no longer being affected by temperature variations. Finally,
we also present a proof-of-concept robust DRAM PUF-based cryptographic
protocol that can be adapted for different security applications.
In this way, our work demonstrates a cost-efficient, lightweight
and practical manner in which even low-end, resource-constrained
IoT devices can be easily protected.},
days = {22},
doi = {10.1109/GIIS.2018.8635789},
keywords = {internet of things; IoT; security; DRAM PUF; DRAM retention; row hammer}
}
|
[11] |
Behavioral Workload Generation for IPTV
(
Tolga Arul,
Nikolaos Athanasios Anagnostopoulos
and
Stefan Katzenbeisser
), In 2018 IEEE 8th International Conference on Consumer Electronics - Berlin (ICCE-Berlin) (ICCE-Berlin 2018)
, 2018.
BIB
@inproceedings{Arul2018_ICCE,
author = {Tolga Arul and Nikolaos Athanasios Anagnostopoulos and Stefan Katzenbeisser},
title = {Behavioral Workload Generation for {IPTV}},
booktitle = {2018 IEEE 8th International Conference on Consumer Electronics -
Berlin (ICCE-Berlin) (ICCE-Berlin 2018)},
year = {2018},
address = {Berlin, Germany},
month = {sep},
organization = {IEEE},
days = {1},
doi = {10.1109/ICCE-Berlin.2018.8576230}
}
|
[10] |
Security Analysis of the RaSTA Safety Protocol
(
Markus Heinrich,
Jannik Vieten,
Tolga Arul and
Stefan Katzenbeisser
), In IEEE Intelligence and Security Informatics (ISI) 2018
, IEEE, 2018.
BIB
@inproceedings{Heinrich2018_ISI,
author = {Markus Heinrich and Jannik Vieten and Tolga Arul and Stefan Katzenbeisser},
title = {{Security Analysis of the RaSTA Safety Protocol}},
booktitle = {IEEE Intelligence and Security Informatics (ISI) 2018},
year = {2018},
month = {11},
organization = {IEEE},
publisher = {IEEE},
doi = {10.1109/ISI.2018.8587371}
}
|
[9] |
Low-Temperature Data Remanence Attacks Against Intrinsic SRAM PUFs
(
Nikolaos A. Anagnostopoulos,
Tolga Arul,
Markus Rosenstihl,
André Schaller,
Sebastian Gabmeyer and
Stefan Katzenbeisser
), In 2018 Euromicro Conference on Digital System Design (DSD)
, 2018.
BIB
@inproceedings{Anagnostopoulos2018_DSD,
author = {Nikolaos A. Anagnostopoulos and Tolga Arul and Markus Rosenstihl
and Andr{\'e} Schaller and Sebastian Gabmeyer and Stefan Katzenbeisser},
title = {{Low-Temperature Data Remanence Attacks Against Intrinsic SRAM PUFs}},
booktitle = {2018 Euromicro Conference on Digital System Design (DSD)},
year = {2018},
address = {Prague, Czech Republic},
month = {8},
organization = {Euromicro},
doi = {10.1109/DSD.2018.00102}
}
PDF
|
[8] |
On the Effects of Environmental Factors on the Functionality of Modern Dynamic Random Access Memory Modules
(
Nikolaos Athanasios Anagnostopoulos
,
Tolga Arul,
Yufan Fan,
Ravi Sarangdhar,
Ratika Sharma,
Markus Rosenstihl,
Christian Hatzfeld,
Fatemeh Tehranipoor and
Stefan Katzenbeisser
), In 7th International Conference "Micro&Nano 2018"
, 2018.
BIB
@inproceedings{Anagnostopoulos2018_MicroNano,
author = {Nikolaos Athanasios Anagnostopoulos and Tolga Arul and Yufan Fan
and Ravi Sarangdhar and Ratika Sharma and Markus Rosenstihl and Christian
Hatzfeld and Fatemeh Tehranipoor and Stefan Katzenbeisser},
title = {{On the Effects of Environmental Factors on the Functionality of
Modern Dynamic Random Access Memory Modules}},
booktitle = {7th International Conference "Micro\&Nano 2018"},
year = {2018},
month = {11},
doi = {10.13140/RG.2.2.16373.83681}
}
PDF
|
[7] |
Addressing the Effects of Temperature Variations on Intrinsic Memory-Based Physical Unclonable Functions
(
Nikolaos Athanasios Anagnostopoulos
,
Tolga Arul,
Yufan Fan,
Christian Hatzfeld,
Fatemeh Tehranipoor and
Stefan Katzenbeisser
), In 28th Crypto-Day
, 2018.
BIB
@inproceedings{Anagnostopoulos2018_CT28,
author = {Nikolaos Athanasios Anagnostopoulos and Tolga Arul and Yufan Fan
and Christian Hatzfeld and Fatemeh Tehranipoor and Stefan Katzenbeisser},
title = {{Addressing the Effects of Temperature Variations on Intrinsic Memory-Based
Physical Unclonable Functions}},
booktitle = {28th Crypto-Day},
year = {2018},
series = {GI},
month = {8},
doi = {10.18420/cdm-2018-28-23},
keywords = {Primitives; P3}
}
|
[6] |
Insights into the Potential Usage of the Initial Values of DRAM Arrays of Commercial Off-the-Shelf Devices for Security Applications
(
Nikolaos Athanasios Anagnostopoulos
,
André Schaller,
Yufan Fan,
Wenjie Xiong,
Fatemeh Tehranipoor,
Tolga Arul,
Sebastian Gabmeyer,
Jakup Szefer,
John A. Chandy and
Stefan Katzenbeisser
), In 26th Crypto-Day
, 2017.
BIB
@inproceedings{Anagnostopoulos2017_CT26,
author = {Nikolaos Athanasios Anagnostopoulos and Andr{\'e} Schaller and Yufan
Fan and Wenjie Xiong and Fatemeh Tehranipoor and Tolga Arul and Sebastian
Gabmeyer and Jakup Szefer and John A. Chandy and Stefan Katzenbeisser},
title = {{Insights into the Potential Usage of the Initial Values of DRAM
Arrays of Commercial Off-the-Shelf Devices for Security Applications}},
booktitle = {26th Crypto-Day},
year = {2017},
month = {6},
doi = {10.13140/RG.2.2.21396.50569},
keywords = {Primitives;P3}
}
PDF
|
[5] |
An extensive classification and analysis of attacks against Physical Unclonable Functions (PUFs)
(
Nikolaos Athanasios Anagnostopoulos
,
Sebastian Gabmeyer,
Tolga Arul and
Stefan Katzenbeisser
), In 27th Crypto-Day
, 2017.
BIB
@inproceedings{Anagnostopoulos2017_CT27,
author = {Nikolaos Athanasios Anagnostopoulos and Sebastian Gabmeyer and Tolga
Arul and Stefan Katzenbeisser},
title = {An extensive classification and analysis of attacks against {Physical
Unclonable Functions (PUFs)}},
booktitle = {27th Crypto-Day},
year = {2017},
month = {12},
doi = {10.13140/RG.2.2.25411.91689}
}
PDF
|
[4] |
An investigation of the effects of radiation on current key storage solutions and on Physical Unclonable Functions (PUFs) being used as key storage
(
Ravi Sarangdhar,
Yufan Fan,
Nikolaos Athanasios Anagnostopoulos
,
Udo Gayer,
Frank Flederer,
Tobias Mikschl,
Tolga Arul,
Philipp R. John,
Kirsten Hierholz,
Sergio Montenegro and
Stefan Katzenbeisser
), In 27th Crypto-Day
, 2017.
BIB
@inproceedings{Sarangdhar2017_CT27_1,
author = {Ravi Sarangdhar and Yufan Fan and Nikolaos Athanasios Anagnostopoulos
and Udo Gayer and Frank Flederer and Tobias Mikschl and Tolga Arul
and Philipp R. John and Kirsten Hierholz and Sergio Montenegro and
Stefan Katzenbeisser},
title = {{An investigation of the effects of radiation on current key storage
solutions and on Physical Unclonable Functions (PUFs) being used
as key storage}},
booktitle = {27th Crypto-Day},
year = {2017},
month = {12},
doi = {10.13140/RG.2.2.33800.52483},
keywords = {Primitives;P3}
}
PDF
|
[3] |
Lightweight Anti-counterfeiting Solution for Low-End Commodity Hardware Using Inherent PUFs
(
André Schaller,
Tolga Arul,
Vincent van der Leest and
Stefan Katzenbeisser
), In Trust and Trustworthy Computing (Holz, Thorsten, Ioannidis, Sotiris, eds.), Springer International Publishing, 2014.
BIB
@inproceedings{Schaller2014_Springer,
author = {Andr{\'e} Schaller and Tolga Arul and Vincent van der Leest and Stefan
Katzenbeisser},
title = {{Lightweight Anti-counterfeiting Solution for Low-End Commodity Hardware
Using Inherent PUFs}},
booktitle = {Trust and Trustworthy Computing},
year = {2014},
editor = {Holz, Thorsten and Ioannidis, Sotiris},
pages = {83--100},
address = {Cham},
month = {6},
publisher = {Springer International Publishing},
abstract = {This paper presents a lightweight anti-counterfeiting solution using
intrinsic Physically Unclonable Functions (PUFs), which are already
embedded in most commodity hardware platforms. The presented solution
is particularly suitable for low-end computing devices without on-board
security features. Our anti-counterfeiting approach is based on extracting
a unique fingerprint for individual devices exploiting inherent PUF
characteristics from the on-chip static random-access memory (SRAM),
which in turn allows to bind software to a particular hardware platform.
Our solution does not require additional hardware, making it flexible
as well as cost efficient. In a first step, we statistically analyze
the characteristics of the intrinsic PUF instances found in two device
types, both based on a widely used ARM Cortex-M microcontroller.
We show that the quality of the PUF characteristics is almost ideal.
Subsequently, we propose a security architecture to protect the platform's
firmware by using a modified boot loader. In a proof of concept,
we embed our solution on a state-of-the-art commodity system-on-a-chip
platform equipped with an MCU similar to the ones previously analyzed.},
doi = {10.1007/978-3-319-08593-7_6},
isbn = {978-3-319-08593-7}
}
PDF
|
[2] |
A novel architecture for a secure update of cryptographic engines on trusted platform module
(
Sunil Malipatlolla,
Thomas Feller,
Abdulhadi Shoufan,
Tolga Arul and
Sorin. A. Huss
), In 2011 International Conference on Field-Programmable Technology
, 2011.
BIB
@inproceedings{Malipatlolla2011_FPT,
author = {Sunil Malipatlolla and Thomas Feller and Abdulhadi Shoufan and Tolga
Arul and Sorin. A. Huss},
title = {A novel architecture for a secure update of cryptographic engines
on trusted platform module},
booktitle = {2011 International Conference on Field-Programmable Technology},
year = {2011},
pages = {1-6},
month = {Dec},
doi = {10.1109/FPT.2011.6132705},
keywords = {cloud computing;cryptography;field programmable gate arrays;information
technology;trusted computing;IT systems;STPM;TPM cryptographic engines;Xilinx
Virtex-5 FPGA platform;cloud computing;cryptographic hardware engines;hard-wired
security modules;powerful computing systems;quantum computers;security
modules;security requirements;side channel analysis;sustainable trusted
platform module;trusted computing;Computer architecture;Cryptography;Engines;Field
programmable gate arrays;Heuristic algorithms;Nonvolatile memory;Cryptography;Field
Programmable Gate Arrays;Secure Update;Trusted Platform Module;Trustworthiness}
}
PDF
|
[1] |
Multicast Rekeying: Performance Evaluation
(
Abdulhadi Shoufan and
Tolga Arul
), In Design Methodologies for Secure Embedded Systems (Biedermann, Alexander, Molter, H. Gregor, eds.), Springer Berlin Heidelberg, 2010.
BIB
@inproceedings{Shoufan2010_Springer,
author = {Abdulhadi Shoufan and Tolga Arul},
title = {{Multicast Rekeying: Performance Evaluation}},
booktitle = {Design Methodologies for Secure Embedded Systems},
year = {2010},
editor = {Biedermann, Alexander and Molter, H. Gregor},
pages = {85--104},
address = {Berlin, Heidelberg},
month = {11},
publisher = {Springer Berlin Heidelberg},
abstract = {This paper presents a new approach for performance evaluation of rekeying
algorithms. New system metrics related to rekeying performance are
defined: Rekeying Quality of Service and Rekeying Access Control.
These metrics are estimated in relation to both group size and group
dynamics. A simultor prototype demonstrates the merit of this unified
assessment method by means of a comprehensive case study.},
doi = {10.1007/978-3-642-16767-6_5},
isbn = {978-3-642-16767-6}
}
|