Prof. Dr.-Ing. Tolga Arul

Short biography
I am currently engaged as a stand-in professor at the Chair of Digital Security at the University of Passau. In 2009, I joined the Center for Advanced Security Research Darmstadt (CASED) and in 2012 the National Research Center for Applied Cybersecurity (CRISP-DA, now ATHENE) as a research associate in the field of cyber-physical systems security. Furthermore, I worked as a research associate in the Integrated Circuits and Systems Lab and received my Ph.D. degree in computer science from the Technical University Darmstadt in 2016. From 2017, I commenced employment as a postdoctoral researcher in the Security Engineering Group at the Technical University Darmstadt, and in 2020, I assumed a postdoctoral position at the Chair of Computer Engineering at the University of Passau. From April 2023 to September 2024, I was engaged as a substitute professor at the Chair of Reliable Distributed Systems at the University of Passau.
In addition to my teaching activities at the University of Passau, the Technical University Darmstadt, the Baden-Wuerttemberg Cooperative State University and the Turkish–German University in Istanbul, I am involved in the research projects NANOSEC2, 6G-RIC, and AUTOtech.agil. Previously, I have successfully participated in the research projects UNICARagil, PUFMem, NANOSEC, Haselnuss, Cysis, and PUFFIN.

I am interested in all topics at the interface of hardware and security.
In particular:
  • physical unclonable functions
  • embedded systems security
  • critical infrastructure security
  • physical layer security
  • broadcast security

Photo of Tolga Arul

Publications

Book Chapters, Journal Articles and Proceedings

[14] Identifying and understanding the nonlinear behavior of memristive devices (, , , , , and ), In Scientific Reports, Nature Research
BIB
@Article{Yarragolla2024_ScientificReports,
  author  = {Sahitya Yarragolla and Torben Hemke and 
  Fares Jalled and Tobias Gergs and Jan Trieschmann and 
  Tolga Arul and Thomas Mussenbrock},
  journal = {Scientific Reports},
  title   = {Identifying and understanding the nonlinear behavior of memristive devices},
  year    = {2024. In Press.},
  issn    = {2045-2322}
}
[13] Achieving Error-Free Lightweight Authentication with DRAM-Based Physical Unclonable Functions (, , , , and ), In IEEE Transactions on Circuits and Systems I: Regular Papers, IEEE Press
BIB
@ARTICLE{Mexis2024_TCAS_I,
  author  = {Nico Mexis and Nikolaos Athanasios Anagnostopoulos and 
  Stefan Katzenbeisser and Elif Bilge Kavun and Sara Tehranipoor and 
  Tolga Arul},
  journal={IEEE Transactions on Circuits and Systems I: Regular Papers}, 
  title={Achieving Error-Free Lightweight Authentication With DRAM-Based 
  Physical Unclonable Functions}, 
  year={2024},
  volume={},
  number={},
  pages={1-10},
  keywords={Random access memory;Authentication;Convolutional neural networks;
  Physical unclonable function;Feature extraction;Neural networks;Training;
  Computer architecture;Bayes methods;Robustness;
  Dynamic random access memory (DRAM); physical unclonable function (PUF);
  machine learning (ML); convolutional neural network (CNN);
  Bayesian neural network (BNN); classification;authentication},
  doi={10.1109/TCSI.2024.3480852}
}
[12] CNT-PUFs: Highly Robust and Heat-Tolerant Carbon-Nanotube- Based Physical Unclonable Functions (, , , , , , , , , and ), In Nanomaterials, MDPI, volume 13,
BIB
@Article{Frank2023MDPINANO,
  author    = {Frank, Florian and B\"{o}ttger, Simon and Mexis, Nico and 
		Anagnostopoulos, Nikolaos Athanasios and Mohamed, Ali and 
		Hartmann, Martin and Kuhn, Harald and Helke, Christian and 
		Arul, Tolga and Katzenbeisser, Stefan and Hermann, Sascha},
  journal   = {Nanomaterials},
  title     = {{CNT-PUFs: Highly Robust and Heat-Tolerant Carbon-Nanotube-Based
			Physical Unclonable Functions}},
  year      = {2023},
  issn      = {2079-4991},
  month     = {11},
  number    = {22},
  volume    = {13},
  abstract  = {In this work, we explored a highly robust and unique Physical 
		Unclonable Function (PUF) based on the stochastic assembly of 
		single-walled Carbon NanoTubes (CNTs) integrated within a 
		wafer-level technology. Our work demonstrated that the proposed 
		CNT-based PUFs are exceptionally robust with an average fractional 
		intra-device Hamming distance well below 0.01 both at room 
		temperature and under varying temperatures in the range from 
		23 ∘C to 120 ∘C. We attributed the excellent heat 
		tolerance to comparatively low activation energies of less than 
		40 meV extracted from an Arrhenius plot. As the number of unstable 
		bits in the examined implementation is extremely low, our devices 
		allow for a lightweight and simple error correction, just by 
		selecting stable cells, thereby diminishing the need for complex 
		error correction. Through a significant number of tests, we 
		demonstrated the capability of novel nanomaterial devices to serve 
		as highly efficient hardware security primitives.},
  doi	= {10.3390/nano13222930}
}		
[11] Rule-based anomaly detection for railway signalling networks (, , and ), In International Journal of Critical Infrastructure Protection, Elsevier Science Inc., volume 42,
BIB
@article{Heinrich2023_IJCIP,
  author   = {Markus Heinrich and Arwed G\"{o}lz and Tolga Arul and Stefan Katzenbeisser},
  journal  = {International Journal of Critical Infrastructure Protection},
  title    = {Rule-based anomaly detection for railway signalling networks},
  year     = {2023},
  issn     = {1874-5482},
  pages    = {100603},
  volume   = {42},
  abstract = {We propose a rule-based anomaly detection system for railway 
		signalling that mitigates attacks by a Dolev-Yao attacker who is able to 
		inject control commands to perform semantic attacks by issuing licit but 
		mistimed control messages. The system as well mitigates the effects of a 
		signal box compromised by an attacker   with the same effect. We consider 
		an attacker that could cause train derailments and collisions, if our 
		countermeasure is not employed. We apply safety principles of railway 
		operation to create a distributed anomaly   detection system that inspects 
		incoming commands on the signals and points. The proposed anomaly detection 
		system detects mistimed control messages against light signals, points and 
		train detection systems that lead to derailments and collisions without 
		producing false positives, while it requires only a small amount of overhead 
		in terms of network communication and latency compared to normal train operation.},
  doi      = {10.1016/j.ijcip.2023.100603},
  keywords = {Critical infrastructure protection, Cyber-physical system, Cybersecurity, 
  Railway signalling, Rule-based anomaly detection, Safety and security co-engineering, 
		Semantic attack},
}
[10] Abusing Commodity DRAMs in IoT Devices to Remotely Spy on Temperature (, , , , , , , and ), In IEEE Transactions on Information Forensics and Security, IEEE Press, volume 18,
BIB
@1rticle{Frank2023_TIFS,
  author    = {Florian Frank and Wenjie Xiong and Nikolaos Athanasios Anagnostopoulos 
		and Andr{\'e} Schaller and Tolga Arul and Farinaz Koushanfar and 
		Stefan Katzenbeisser and Ulrich R\"{u}hrmair and Jakub Szefer},
  journal   = {IEEE Transactions on Information Forensics and Security},
  title     = {{Abusing Commodity DRAMs in IoT Devices to Remotely Spy on Temperature}},
  year      = {2023},
  issn      = {1556-6013},
  month     = {apr},
  pages     = {2991-3005},
  volume    = {18},
  doi       = {10.1109/TIFS.2023.3271252},
  numpages  = {15},
  publisher = {IEEE Press}
}

[9] A Lightweight Architecture for Hardware-Based Security in the Emerging Era of Systems of Systems (, , , , and ), In J. Emerg. Technol. Comput. Syst., Association for Computing Machinery, volume 17,
BIB
@article{Mexis2021_JETC,
 author = {Nico Mexis and Nikolaos Athanasios Anagnostopoulos and Shuai Chen
	and Jan Bambach and Tolga Arul and Stefan Katzenbeisser},
 title = {A Lightweight Architecture for Hardware-Based Security in the Emerging
	Era of Systems of Systems},
 journal = {J. Emerg. Technol. Comput. Syst.},
 year = {2021},
 volume = {17},
 number = {3},
 month = {jun},
 address = {New York, NY, USA},
 articleno = {43},
 doi = {10.1145/3458824},
 issn = {1550-4832},
 issue_date = {June 2021},
 keywords = {System of systems, hardware and software security co-engineering,
	IoT 2.0, Internet of Things},
 numpages = {25},
 publisher = {Association for Computing Machinery}
}
[8] Securing FlexRay-based in-vehicle networks (, , and ), In Microprocessors and Microsystems, volume 77,
BIB
@article{Puellen2020_Micpro,
 author = {Dominik {P\"{u}llen} and Nikolaos Athanasios Anagnostopoulos and
	Tolga Arul and Stefan Katzenbeisser},
 title = {{Securing FlexRay-based in-vehicle networks}},
 journal = {Microprocessors and Microsystems},
 year = {2020},
 volume = {77},
 pages = {103144},
 month = {9},
 abstract = {In this work, we propose defense techniques against message spoofing
	attacks in FlexRay networks. For this purpose, we explore how to
	leverage the slot- and channel-based FlexRay communication for ensuring
	the authenticity of safety-critical in-vehicle traffic. In particular,
	we suggest to split authentication tags across two physical independent
	channels, allowing for their concurrent transmission. This eventually
	leads to a higher degree of fault-tolerance and security. We put
	a special focus on the efficient management and distribution of cryptographic
	keys by using reversed hash chains. They allow us to derive new and
	forward-secure keys at low cost during operational runtime. Our evaluation
	consists of both a discussion and a practical implementation on an
	exemplary network. Assuming constrained hardware resources, we conclude
	that authentication for groups of time slots is the most promising
	approach in terms of timing and computational overhead.},
 doi = {10.1016/j.micpro.2020.103144},
 issn = {0141-9331},
 keywords = {FlexRay, Security, Authentication, Key updates, Safety}
}
[7] Low-Cost Security for Next-Generation IoT Networks , , , , and ), In ACM Trans. Internet Technol., Association for Computing Machinery, volume 20,
BIB
@article{Anagnostopoulos2020_TOIT,
 author = {Nikolaos Athanasios Anagnostopoulos and Saad Ahmad and Tolga Arul
	and Daniel Steinmetzer and Matthias Hollick and Stefan Katzenbeisser},
 title = {{Low-Cost Security for Next-Generation IoT Networks}},
 journal = {ACM Trans. Internet Technol.},
 year = {2020},
 volume = {20},
 number = {3},
 month = {sep},
 abstract = {In recent years, the ubiquitous nature of Internet-of-Things (IoT)
	applications as well as the pervasive character of next-generation
	communication protocols, such as the 5G technology, have become widely
	evident. In this work, we identify the need for low-cost security
	in current and next-generation IoT networks and address this demand
	through the implementation, testing, and validation of an intrinsic
	low-cost and low-overhead hardware-based security primitive within
	an inherent network component. In particular, an intrinsic Physical
	Unclonable Function (PUF) is implemented in the peripheral network
	module of a tri-band commercial off-the-shelf router. Subsequently,
	we demonstrate the robustness of this PUF to ambient temperature
	variations and to limited natural aging, and examine in detail its
	potential for securing the next generation of IoT networks and other
	applications. Finally, the security of the proposed PUF-based schemes
	is briefly assessed and discussed.},
 address = {New York, NY, USA},
 articleno = {30},
 doi = {10.1145/3406280},
 issn = {1533-5399},
 issue_date = {September 2020},
 keywords = {peripheral, 60 GHz, physical unclonable function (PUF), static random
	access memory (SRAM), Internet of Things (IoT)},
 numpages = {31},
 publisher = {Association for Computing Machinery}
}
[6] ELSA: efficient long-term secure storage of large datasets (full version) * (, , , and ), In EURASIP Journal on Information Security, volume 2020,
BIB
@article{Muth2020,
 author = {Philipp Muth and Matthias Geihs and Tolga Arul and Johannes Buchmann
	and Stefan Katzenbeisser},
 title = {{ELSA: efficient long-term secure storage of large datasets (full
	version) *}},
 journal = {EURASIP Journal on Information Security},
 year = {2020},
 volume = {2020},
 pages = {9},
 number = {1},
 month = {May},
 day = {27},
 doi = {10.1186/s13635-020-00108-9},
 issn = {2510-523X}
}
[5] Attacking SRAM PUFs using very-low-temperature data remanence , , , , and ), In Microprocessors and Microsystems, volume 71,
BIB
@article{Anagnostopoulos2019_MICPRO,
 author = {Nikolaos Athanasios Anagnostopoulos and Tolga Arul and Markus Rosenstihl
	and Andr{\'e} Schaller and Sebastian Gabmeyer and Stefan Katzenbeisser},
 title = {{Attacking SRAM PUFs using very-low-temperature data remanence}},
 journal = {Microprocessors and Microsystems},
 year = {2019},
 volume = {71},
 pages = {102864},
 month = {8},
 doi = {10.1016/j.micpro.2019.102864},
 issn = {0141-9331},
 keywords = {Physical Unclonable Function (PUF), Static Random Access Memory (SRAM),
	Data remanence, Data retention, Low temperature, Attack}
}
[4] Security Requirements Engineering in Safety-Critical Railway Signalling Networks (, , , , , , , , , and ), In Security and Communication Networks, volume 9,
BIB
@article{Heinrich2018_SACNWiley,
 author = {Markus Heinrich and Tsvetoslava Vateva-Gurova and Tolga Arul and
	Stefan Katzenbeisser and Neeraj Suri and Henk Birkholz and Christoph
	Krau{\ss} and Maria Zhdanova and Don Kuzhiyelil and Sergey Tverdyshev
	and Christian Schlehuber},
 title = {{Security Requirements Engineering in Safety-Critical Railway Signalling
	Networks}},
 journal = {Security and Communication Networks},
 year = {2018},
 volume = {9},
 pages = {5203-5218},
 number = {18},
 month = {7},
 doi = {10.1155/2019/8348925},
 keywords = {zero watermarking, e-healthcare, Jacobian matrix, authentication,
	robustness, medical images},
 url = {https://onlinelibrary.wiley.com/doi/pdf/10.1002/sec.1690}
}
[3] Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security , , , , , , , , , , and ), In Cryptography, volume 2,
BIB
@article{Anagnostopoulos2018_MDPI,
 author = {Nikolaos Athanasios Anagnostopoulos and Tolga Arul and Yufan Fan
	and Christian Hatzfeld and Andr{\'e} Schaller and Wenjie Xiong and
	Manishkumar Jain and Muhammad Umair Saleem and Jan Lotichius and
	Sebastian Gabmeyer and Jakub Szefer and Stefan Katzenbeisser},
 title = {Intrinsic {Run-Time} {Row} {Hammer} {PUFs}: Leveraging the Row Hammer
	Effect for Run-Time Cryptography and Improved Security},
 journal = {Cryptography},
 year = {2018},
 volume = {2},
 number = {3},
 month = {6},
 doi = {10.3390/cryptography2030013},
 issn = {2410-387X},
 url = {https://onlinelibrary.wiley.com/doi/pdf/10.1002/sec.1690}
}
PDF
[2] Subscription-free Pay-TV over IPTV ( and ), In Journal of Systems Architecture, volume 64,
BIB
@article{Arul2016_JSA,
 author = {Tolga Arul and Abdulhadi Shoufan},
 title = {Subscription-free {Pay-TV} over {IPTV}},
 journal = {Journal of Systems Architecture},
 year = {2016},
 volume = {64},
 pages = {37 - 49},
 month = {12},
 note = {{Real-Time} Signal Processing in Embedded Systems},
 doi = {10.1016/j.sysarc.2015.12.001},
 issn = {1383-7621},
 keywords = {Pay-TV, IPTV, DVB, Charging, Rekeying, Multicast}
}
[1] A Benchmarking Environment for Performance Evaluation of Tree-based Rekeying Algorithms ( and ), In Journal of Systems and Software, Elsevier Science Inc., volume 84,
BIB
@article{Shoufan2011_JSS,
 author = {Abdulhadi Shoufan and Tolga Arul},
 title = {{A Benchmarking Environment for Performance Evaluation of Tree-based
	Rekeying Algorithms}},
 journal = {Journal of Systems and Software},
 year = {2011},
 volume = {84},
 pages = {1130--1143},
 number = {7},
 month = {jul},
 acmid = {1988469},
 address = {New York, NY, USA},
 doi = {10.1016/j.jss.2011.02.006},
 issn = {0164-1212},
 issue_date = {July, 2011},
 keywords = {Benchmarking, Group rekeying algorithms, Performance evaluation, Simulation},
 numpages = {14},
 publisher = {Elsevier Science Inc.},
 url = {https://onlinelibrary.wiley.com/doi/pdf/10.1002/sec.1690}
}
PDF
Refereed Conference Papers

[38] Robust and Energy-Efficient Hardware Architectures for DIZY Stream Cipher (, , , and ), In 2024 IEEE 20th Asia Pacific Conference on Circuits and Systems (APCCAS),
BIB
@InProceedings{Schmid2024_ACPPCAS,
author    = {Martin Schmid and Tolga Arul and Elif Bilge Kavun and Francesco Regazzoni and Orhun Kara},
booktitle = {2024 IEEE 20th Asia Pacific Conference on Circuits and Systems (APCCAS)},
title     = {Robust and Energy-Efficient Hardware Architectures for DIZY Stream Cipher},
year      = {2024. In Press.},
address   = {Taipeh, Taiwan},
month     = {11},
publisher = {IEEE},
days      = {7-9}
}
[37] Testing temperature-dependent resistors as potential physical unclonable functions (, , , and ), In 2024 IEEE 9th World Forum on Internet of Things (WF-IoT),
BIB
@InProceedings{Bahoum2024_WFIOT,
author    = {El Mehdi Bahoum and Nico Mexis and Stefan Katzenbeisser and 
		Tolga Arul and Nikolaos Athanasios Anagnostopoulos},
booktitle = {2024 IEEE 9th World Forum on Internet of Things (WF-IoT)},
title     = {Testing Temperature-Dependent Resistors as Potential Physical Unclonable Functions},
year      = {2024. In Press.},
month     = {11}
}
[36] Nonlinear dynamics in memristive devices for secure neuromorphic computing (, , , , and ), In 2024 International Conference on Memristive Systems (MEMRISYS),
BIB
@InProceedings{Yarragolla2024_MEMRISYS,
author    = {Sahitya Yarragolla and Torben Hemke and Tobias Gergs and 
	Jan Trieschmann and Tolga Arul and Thomas Mussenbrock},
booktitle = {2024 International Conference on Memristive Systems (MEMRISYS)},
title     = {Nonlinear dynamics in memristive devices for secure 
	neuromorphic computing},
year      = {2024. In Press.},
month     = {11},
comment   = {In Press}
}
[35] Investigation Of Commercial Off-The-Shelf ReRAM Modules For Use As Runtime-Accessible TRNG (, , , , and ), In 2024 27th Euromicro Conference on Digital System Design (DSD) (AHSA: Special session on architectures and hardware for security applications),
BIB
@InProceedings{Arul2024_DSD,
author    = {Tolga Arul and Nico Mexis and Aleena Elsa George 
	and Florian Frank and Nikolaos Athanasios Anagnostopoulos 
	and Stefan Katzenbeisser},
booktitle = {2024 27th Euromicro Conference on Digital System 
	Design (AHSA: Special session on architectures and hardware 
	for security applications)},
title     = {{Investigation Of Commercial Off-The-Shelf ReRAM 
	Modules For Use As Runtime-Accessible TRNG}},
year      = {2024. In Press.},
doi       = {10.1109/DSD64264.2024.00014},
address   = {Paris, France},
editor    = {Smail Niar and Hamza Ouarnoughi and Amund Skavhaug},
month     = {9}
}
[34] Real-World Secure Communication based on Synchronised Lorenz Chaotic Circuits (, , , , , , and ), In 2024 13th International Conference on Modern Circuits and Systems Technologies (MOCAST),
BIB
@InProceedings{George2024_MOCAST,
author    = {George, Aleena Elsa and Gel\'{o}czi, Emiliia and 
	Mexis, Nico and Arul, Tolga and Katzenbeisser, Stefan and 
	Stavrinides, Stavros G. and Picos, Rodrigo and 
	Anagnostopoulos, Nikolaos Athanasios},
booktitle = {2024 13th International Conference on Modern Circuits 
	and Systems Technologies (MOCAST)},
title     = {Real-World Secure Communication based on Synchronised 
	Lorenz Chaotic Circuits},
year      = {2024},
month     = {8},
pages     = {1-6},
doi       = {10.1109/MOCAST61810.2024.10615733},
keywords  = {Fault tolerance;Chaotic communication;Transmitters;
	Communication systems;Circuits;Receivers;Logic gates;chaos;
	chaos-based cryptography;Lorenz circuit;real-world;
	secure communication;security;stream encryption}
}
[33] The Synchronisation is the Message: Real-World Encrypted Communication Based on Synchronised Chaotic Circuits Without Using a Dedicated Synchronisation Line , , , , , and ), In 2024 13th International Conference on Modern Circuits and Systems Technologies (MOCAST),
BIB
@InProceedings{Anagnostopoulos2024_MOCAST,
author    = {Anagnostopoulos, Nikolaos Athanasios and 
	George, Aleena Elsa and Mexis, Nico and Arul, Tolga and 
	Katzenbeisser, Stefan and Picos, Rodrigo and 
	Stavrinides, Stavros G.},
booktitle = {2024 13th International Conference on 
	Modern Circuits and Systems Technologies (MOCAST)},
title     = {The Synchronisation is the Message: Real-World 
	Encrypted Communication Based on Synchronised Chaotic 
	Circuits Without Using a Dedicated Synchronisation Line},
year      = {2024},
month     = {8},
pages     = {1-6},
doi       = {10.1109/MOCAST61810.2024.10615650},
keywords  = {Chaotic communication;Transmitters;Circuits;
	Receivers;Digital communication;Synchronization;Cryptography;
	chaos;synchronisation;chaos-based cryptography;
	nonlinear circuit;stream encryption;feedback line}
}
[32] Tailored Raspberry Pi 3B+ Software for the Implementation of Hardware Security Primitives Based on Commercial Off-the-Shelf Devices (, , , and ), In 2024 Zooming Innovation in Consumer Technologies Conference (ZINC),
BIB
@InProceedings{Mexis2024_ZINC,
author    = {Mexis, Nico and Chen, Shuai and Katzenbeisser, Stefan 
	and Arul, Tolga and Anagnostopoulos, Nikolaos Athanasios},
booktitle = {2024 Zooming Innovation in Consumer Technologies 
	Conference (ZINC)},
title     = {Tailored Raspberry Pi 3B+ Software for the Implementation 
	of Hardware Security Primitives Based on Commercial Off-the-Shelf 
	Devices},
year      = {2024},
month     = {7},
pages     = {90-95},
doi       = {10.1109/ZINC61849.2024.10579292},
keywords  = {Technological innovation;Codes;Hardware security;
	Resistive RAM;Random access memory;Physical unclonable function;
	Software;software;hardware security primitive;
	Commercial Off-The-Self (COTS);Raspberry Pi;
	hardware and software co-engineering}
}
[31] Secure Data-Binding in FPGA-based Hardware Architectures utilizing PUFs (, , , , , , , and ), In Proceedings of the 2024 ACM Asia Conference on Computer and Communications Security,
BIB
@InProceedings{Frank2024_ASIACCS,
author    = {Florian Frank and Martin Schmid and Felix Klement 
	and Purushothaman Palani and Andreas Weber and Elif Bilge Kavun 
	and Wenjie Xiong and Tolga Arul and Stefan Katzenbeisser},
booktitle = {Proceedings of the 2024 ACM Asia Conference on 
	Computer and Communications Security},
title     = {Secure Data-Binding in {FPGA}-based Hardware
Architectures utilizing {PUFs}},
year      = {2024},
address   = {New York, NY, USA},
month     = {7},
pages     = {423-435},
publisher = {Association for Computing Machinery},
series    = {ASIA CCS '24},
doi       = {10.1145/3634737.3656996},
isbn      = {9798400704826},
keywords  = {hardware security, FPGAs, physical unclonable functions, 
	privacy, broadband cellular networks},
location  = {Singapore, Singapore},
numpages  = {13}
}
[30] Studying the Effects of Prolonged Thermal Stress Aiming to Induce Artificial Aging on DRAM Retention-Based Physical Unclonable Functions , , , , , and ), In 2024 IEEE International Conference on Consumer Electronics (ICCE),
BIB
@InProceedings{Anagnostopoulos2024_ICCE,
author    = {Nikolaos Athanasios Anagnostopoulos and Nico Mexis and Yufan Fan 
	and Stephanie Senjuty Bartsch and Tanja Schaier and Stefan Katzenbeisser 
	and Tolga Arul},
booktitle = {2024 IEEE International Conference on Consumer Electronics (ICCE)},
title     = {Studying the Effects of Prolonged Thermal Stress Aiming to Induce 
	Artificial Aging on DRAM Retention-Based Physical Unclonable Functions},
year      = {2024},
month     = {1},
pages     = {1-6},
doi       = {10.1109/ICCE59016.2024.10444494},
keywords  = {Random access memory;Aging;Physical unclonable function;Time measurement;
	Thermal stresses;Stress;Stress measurement;thermal stress;DRAM retention-based PUF;
	transistor aging;silicon aging;DRAM PUF;Physical Unclonable Function (PUF);
	Physical Unique Function}
}
[29] Exploiting Optical Nonlinear Temporal Coupling for Implementing Physical Unclonable Functions (, , , , , , , and ), In 2023 IEEE 8th World Forum on Internet of Things (WF-IoT),
BIB
@InProceedings{Stavrinides2023_WFIOT,
author    = {Stavros G. Stavrinides and Lydia Bush-Espinosa 
	and Carol de Benito and Nikolaos Athanasios Anagnostopoulos 
	and Tolga Arul and Stefan Katzenbeisser and Christos Tjortjis 
	and M. Moner Al Chawa and Rodrigo Picos},
booktitle = {2023 IEEE 8th World Forum on Internet of Things (WF-IoT)},
title     = {Exploiting Optical Nonlinear Temporal Coupling for 
	Implementing Physical Unclonable Functions},
year      = {2023},
month     = {10},
pages     = {1-5},
doi       = {10.1109/WF-IoT58464.2023.10539389}
}
[28] An Evaluation of the Security and the Privacy of a Novel Single Sign-On System Based on Physical Unclonable Functions , , , , and ), In 2023 IEEE 13th International Conference on Consumer Electronics - Berlin (ICCE-Berlin),
BIB
@InProceedings{Anagnostopoulos2023_ICCEB,
author    = {Anagnostopoulos, Nikolaos Athanasios and Mexis, 
	Nico and Gel\'{o}czi, Emiliia and Kavun, Elif Bilge and 
	Katzenbeisser, Stefan and Arul, Tolga},
booktitle = {2023 IEEE 13th International Conference on 
	Consumer Electronics - Berlin (ICCE-Berlin)},
title     = {An Evaluation of the Security and the Privacy of a 
	Novel Single Sign-On System Based on Physical Unclonable 
	Functions},
year      = {2023},
month     = {9},
pages     = {76-81},
doi       = {10.1109/ICCE-Berlin58801.2023.10375684}
}
[27] Spatial Correlation in Weak Physical Unclonable Functions: A Comprehensive Overview (, , , , , , , and ), In 2023 26th Euromicro Conference on Digital System Design (DSD) (AHSA: Special session on architectures and hardware for security applications),
BIB
@InProceedings{Mexis2023_DSD,
author    = {Nico Mexis and Tolga Arul and Nikolaos Athanasios Anagnostopoulos 
	and Florian Frank and Simon B\"{o}ttger and Martin Hartmann and Sascha Hermann 
	and Elif Bilge Kavun and Stefan Katzenbeisser},
booktitle = {2023 26th Euromicro Conference on Digital System Design 
(AHSA: Special session on architectures and hardware for security applications)},
title     = {Spatial Correlation in Weak Physical Unclonable Functions: A Comprehensive Overview},
year      = {2023},
editor    = {Smail Niar and Hamza Ouarnoughi and Amund Skavhaug},
month     = {9},
pages     = {70-78},
doi       = {10.1109/DSD60849.2023.00020}
}
[26] A Method to Construct Efficient Carbon-Nanotube-Based Physical Unclonable Functions and True Random Number Generators , , , , , , , and ), In 2023 26th Euromicro Conference on Digital System Design (DSD) (AHSA: Special session on architectures and hardware for security applications),
BIB
@InProceedings{Anagnostopoulos2023_DSD,
author    = {Nikolaos Athanasios Anagnostopoulos and 
	Nico Mexis and Simon B\"{o}ttger and Martin Hartmann 
	and Ali Mohamed and Sascha Hermann and Stefan Katzenbeisser 
	and Stavros Stavrinides and Tolga Arul},
booktitle = {2023 26th Euromicro Conference on Digital System Design 
	(AHSA: Special session on architectures and hardware for security 
	applications)},
title     = {A Method to Construct Efficient Carbon-Nanotube-Based Physical 
	Unclonable Functions and True Random Number Generators},
year      = {2023},
editor    = {Smail Niar and Hamza Ouarnoughi and Amund Skavhaug},
month     = {9},
pages     = {61-69},
doi       = {10.1109/DSD60849.2023.00019}
}
[25] CNT-PUFs: Highly Robust Physical Unclonable Functions Based on Carbon Nanotubes (, , , , , , and ), In 2023 IEEE 23rd International Conference on Nanotechnology (NANO),
BIB
@InProceedings{Boettger2023_NANO,
author    = {Simon B\"{o}ttger and Florian Frank and 
	Nikolaos Athanasios Anagnostopoulos and Ali Mohamed and
	Martin Hartmann and Tolga Arul and Sascha Hermann and 
	Stefan Katzenbeisser},
booktitle = {2023 IEEE 23rd International Conference on Nanotechnology (NANO)},
title     = {{CNT-PUFs}: Highly Robust Physical Unclonable Functions Based on 
	Carbon Nanotubes},
year      = {2023},
month     = {9},
pages     = {1-6},
doi       = {10.1109/NANO58406.2023.10231160}
}
[24] Keep your Enemies closer: On the minimal Distance of Adversaries when using Channel-based Key Extraction in SISO 6G Systems (, and ), In 2023 19th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob),
BIB
@InProceedings{Klement2023_WIMOB,
author    = {Felix Klement and Tolga Arul and Stefan Katzenbeisser},
booktitle = {2023 19th International Conference on Wireless and 
	Mobile Computing, Networking and Communications (WiMob)},
title     = {Keep your Enemies closer: On the minimal Distance of 
	Adversaries when using Channel-based Key Extraction in {SISO} 
	{6G} Systems},
year      = {2023},
month     = {7},
pages     = {445-451},
doi       = {10.1109/WiMob58348.2023.10187881}
}
[23] Implementation of a Physically Unclonable Function using LEDs and LDRs (, , , , , and ), In 2023 12th International Conference on Modern Circuits and Systems Technologies (MOCAST),
BIB
@InProceedings{Hristov2023_MOCAST,
author    = {Emil Hristov and Rodrigo Picos and Carol de Benito 
	and Stavros G. Stavrinides and Tolga Arul and 
	Nikolaos A. Anagnostopoulos and Mohamad Moner Al Chawa},
booktitle = {{2023 12th International Conference on Modern Circuits 
	and Systems Technologies (MOCAST)}},
title     = {{Implementation of a Physically Unclonable Function using 
	LEDs and LDRs}},
year      = {2023},
month     = {7},
pages     = {1-4},
doi       = {10.1109/MOCAST57943.2023.10176623}
}
[22] Using Memristor Arrays as Physical Unclonable Functions (, , and ), In Computer Security – ESORICS 2022 (Atluri, Vijayalakshmi, Di Pietro, Roberto, Jensen, Christian D., Meng, Weizhi, eds.), Springer Nature Switzerland, volume 13556,
BIB
@inproceedings{Frank2022_ESORICS,
author = {Florian Frank and Tolga Arul and Nikolaos Athanasios Anagnostopoulos
	and Stefan Katzenbeisser},
title = {Using Memristor Arrays as Physical Unclonable Functions},
booktitle = {Computer Security -- ESORICS 2022},
year = {2022},
editor = {Atluri, Vijayalakshmi and Di Pietro, Roberto and Jensen, Christian
	D. and Meng, Weizhi},
volume = {13556},
pages = {250--271},
address = {Cham},
month = {9},
publisher = {Springer Nature Switzerland},
doi = {10.1007/978-3-031-17143-7_13},
isbn = {978-3-031-17143-7}
}
PDF
[21] Testing Physical Unclonable Functions Implemented on Commercial Off-the-Shelf NAND Flash Memories Using Programming Disturbances , , , , , , , , and ), In 2022 IEEE 12th International Conference on Consumer Electronics (ICCE-Berlin),
BIB
@InProceedings{Anagnostopoulos2022_ICCEB,
author    = {Anagnostopoulos, Nikolaos Athanasios and Fan, 
	Yufan and Saleem, Muhammad Umair and Mexis, Nico and 
	Gel\'{o}czi, Emiliia and Klement, Felix and Frank, 
	Florian and Schaller, Andr{\'e} and Arul, Tolga and 
	Katzenbeisser, Stefan},
booktitle = {2022 IEEE 12th International Conference on Consumer 
	Electronics (ICCE-Berlin)},
title     = {Testing Physical Unclonable Functions Implemented on 
	Commercial Off-the-Shelf NAND Flash Memories Using Programming 
	Disturbances},
year      = {2022},
month     = {9},
pages     = {1-9},
doi       = {10.1109/ICCE-Berlin56473.2022.10021310}
}
[20] A Dedicated Mixed-Signal Characterisation and Testing Framework for Novel Digital Security Circuits That Use Carbon-Nanotube-Based Physical Unclonable Functions (, , , , , and ), In 2022 11th International Conference on Modern Circuits and Systems Technologies (MOCAST),
BIB
@inproceedings{Frank2022_MOCAST,
 author = {Florian Frank and Nikolaos Athanasios Anagnostopoulos and Simon B{\"o}ttger
	and Sascha Hermann and Tolga Arul and Stavros G.Stavrinides and Stefan
	Katzenbeisser},
 title = {A Dedicated Mixed-Signal Characterisation and Testing Framework for
	Novel Digital Security Circuits That Use Carbon-Nanotube-Based Physical
	Unclonable Functions},
 booktitle = {2022 11th International Conference on Modern Circuits and Systems
	Technologies (MOCAST)},
 year = {2022},
 pages = {1-4},
 month = {7},
 doi = {10.1109/MOCAST54814.2022.9837567}
}
[19] A Design for a Secure Network of Networks Using a Hardware and Software Co-Engineering Architecture (, , , , and ), In Proceedings of the SIGCOMM '21 Poster and Demo Sessions, Association for Computing Machinery,
BIB
@inproceedings{Mexis2021_SIGCOMM,
 author = {Nico Mexis and Nikolaos Athanasios Anagnostopoulos and Shuai Chen
	and Jan Bambach and Tolga Arul and Stefan Katzenbeisser},
 title = {A Design for a Secure Network of Networks Using a Hardware and Software
	Co-Engineering Architecture},
 booktitle = {Proceedings of the SIGCOMM '21 Poster and Demo Sessions},
 year = {2021},
 series = {SIGCOMM '21},
 pages = {65-67},
 address = {New York, NY, USA},
 month = {8},
 publisher = {Association for Computing Machinery},
 abstract = {This work concerns the demonstration of a security solution for a
	network of networks, which comprises heterogeneous devices and utilises
	diverse communication protocols. The security solution used in this
	work employs an architecture presented in a previous work, which
	is based upon the concept of hardware and software security co-engineering.},
 doi = {10.1145/3472716.3472849},
 isbn = {9781450386296},
 keywords = {internet of things, network of networks, hardware and software security
	co-engineering},
 location = {Virtual Event},
 numpages = {3}
}
[18] Nano Security: From Nano-Electronics to Secure Systems (, , , , , , , , , , , , , , , , , , , , , and ), In Design, Automation and Test in Europe Conference (DATE). Design, Automation & Test in Europe (DATE-2021), February 1-5, Grenoble, France,
BIB
@inproceedings{Polian2021_Date,
 author = {Ilia Polian and Frank Altmann and Tolga Arul and Christian Boit and
	Ralf Brederlow and Lucas Davi and Rolf Drechsler and Nan Du and Thomas
	Eisenbarth and Tim G\"{u}neysu and Sascha Hermann and Matthias Hiller
	and Rainer Leupers and Farhad Merchant and Thomas Mussenbrock and
	Stefan Katzenbeisser and Akash Kumar and Wolfgang Kunz and Thomas
	Mikolajick and Vivek Pachauri and Jean-Pierre Seifert and Frank Sill
	Torres and Jens Trommer},
 title = {{Nano Security: From Nano-Electronics to Secure Systems}},
 booktitle = {Design, Automation and Test in Europe Conference (DATE). Design,
	Automation \& Test in Europe (DATE-2021), February 1-5, Grenoble,
	France},
 year = {2021},
 pages = {1334-1339},
 month = {2},
 doi = {10.23919/DATE51398.2021.9474187}
}
[17] Demo: Railway Signalling Security Testbed (, and ), In IEEE Vehicular Networking Conference, VNC 2020, New York, NY, USA, December 16-18, 2020, IEEE,
BIB
@inproceedings{Heinrich2021_VNC,
 author = {Markus Heinrich and Tolga Arul and Stefan Katzenbeisser},
 title = {{Demo: Railway Signalling Security Testbed}},
 booktitle = {{IEEE} Vehicular Networking Conference, {VNC} 2020, New York, NY,
	USA, December 16-18, 2020},
 year = {2020},
 pages = {1--2},
 month = {12},
 publisher = {{IEEE}},
 doi = {10.1109/VNC51378.2020.9318338}
}
[16] A Study of the Spatial Auto-Correlation of Memory-Based Physical Unclonable Functions (, , and ), In 2020 European Conference on Circuit Theory and Design (ECCTD),
BIB
@inproceedings{Arul2020_ECCTD,
 author = {Tolga Arul and Nikolaos Athanasios Anagnostopoulos and Sergej Rei\ss{}ig
	and Stefan Katzenbeisser},
 title = {A Study of the Spatial Auto-Correlation of Memory-Based Physical
	Unclonable Functions},
 booktitle = {2020 European Conference on Circuit Theory and Design (ECCTD)},
 year = {2020},
 pages = {1-4},
 month = {Sep.},
 abstract = {In this work, we examine the spatial auto-correlation exhibited in
	the responses of memory-based Physical Unclonable Functions (PUFs).
	In particular, we examine the responses of an SRAM PUF, a DRAM decay-based
	PUF, and a disturbance-based Flash PUF. For the evaluation, we use
	three different metrics that have already been employed in the relevant
	literature for measuring the spatial correlation of other PUF responses.
	Our results prove that the examined PUF responses exhibit little,
	if any, spatial auto-correlation. Thus, these PUFs can be considered
	as security mechanisms of high entropy, which can be utilised to
	enhance the security of the Internet of Things (IoT).},
 doi = {10.1109/ECCTD49232.2020.9218302},
 issn = {2474-9672},
 keywords = {correlation;spatial auto-correlation;Physical Unclonable Function
	(PUF);Static Random Access Memory (SRAM);Dynamic Random Access Memory
	(DRAM);Flash memory}
}
PDF
[15] Safety Meets Security: Using IEC 62443 for a Highly Automated Road Vehicle (, , and ), In Computer Safety, Reliability, and Security (Casimiro, António, Ortmeier, Frank, Bitsch, Friedemann, Ferreira, Pedro, eds.), Springer International Publishing,
BIB
@inproceedings{Puellen2020_Safecomp,
 author = {Dominik P{\"u}llen and Nikolaos Athanasios Anagnostopoulos and Tolga
	Arul and Stefan Katzenbeisser},
 title = {{Safety Meets Security: Using IEC 62443 for a Highly Automated Road
	Vehicle}},
 booktitle = {Computer Safety, Reliability, and Security},
 year = {2020},
 editor = {Casimiro, Ant{\'o}nio and Ortmeier, Frank and Bitsch, Friedemann
	and Ferreira, Pedro},
 pages = {325--340},
 address = {Cham},
 month = {7},
 publisher = {Springer International Publishing},
 abstract = {In this work, we conduct and discuss a consensus-based risk analysis
	for a novel architecture of a driverless and electric prototype vehicle.
	While well-established safety standards like ISO 26262 provide frameworks
	to systematically assess risks of hazardous operational situations,
	the automotive security field has emerged only in the last years.
	Today, SAE J3061 provides recommendations and high-level guiding
	principles of how to incorporate security into vehicle systems. ISO/SAE
	21434 is a novel automotive security standard, which, however, is
	still under development. Therefore, we treat the aforementioned architecture
	as a single Industrial Automation and Control System (IACS) and provide
	an implementation of the IEC 62443 series. We collaboratively identify
	threats in a three-round process and define a scoring scheme for
	automotive risks. As a result, we obtain a tailored bundle of compensating
	security mechanisms. Based on our work, we suggest improvements for
	future automotive security standards when it comes to the co-engineering
	of safety and security.},
 doi = {10.1007/978-3-030-54549-9_22},
 isbn = {978-3-030-54549-9}
}
[14] Predicting Railway Signalling Commands Using Neural Networks for Anomaly Detection (, , and ), In Computer Safety, Reliability, and Security (Casimiro, António, Ortmeier, Frank, Bitsch, Friedemann, Ferreira, Pedro, eds.), Springer International Publishing,
BIB
@inproceedings{Heinrich2020_Safecomp,
 author = {Markus Heinrich and Dominik Renkel and Tolga Arul and Stefan Katzenbeisser},
 title = {Predicting Railway Signalling Commands Using Neural Networks for
	Anomaly Detection},
 booktitle = {Computer Safety, Reliability, and Security},
 year = {2020},
 editor = {Casimiro, Ant{\'o}nio and Ortmeier, Frank and Bitsch, Friedemann
	and Ferreira, Pedro},
 pages = {164--178},
 address = {Cham},
 month = {7},
 publisher = {Springer International Publishing},
 abstract = {We propose a new anomaly detection system to defend against semantic
	attacks on the command and control communication in safety-critical
	railway signalling networks. To this end, we train artificial neural
	network on the communication of signal boxes connected to their signals,
	points, and train detection system. We show that it is possible to
	predict the next command with knowledge of only few previously transmitted
	datagrams. We optimize the parameters of the artificial neural network,
	determine the optimal number of previous datagrams, and show that
	our approach is viable in railway stations of various size. Using
	the artificial neural network, we construct an anomaly detection
	system to classify each observed datagram to raise an alert in case
	of deviant behaviour. We further optimize the anomaly detection's
	threshold and show that our classifier is able to operate with a
	false positive rate of 0.03 and a false negative rate of 0.04.},
 doi = {10.1007/978-3-030-54549-9_11},
 isbn = {978-3-030-54549-9}
}
[13] Using Implicit Certification to Efficiently Establish Authenticated Group Keys for In-Vehicle Networks (, , and ), In 2019 IEEE Vehicular Networking Conference (VNC),
BIB
@inproceedings{Puellen2019_VNC,
 author = {Dominik {P\"{u}llen} and Nikolaos Athanasios Anagnostopoulos and
	Tolga Arul and Stefan Katzenbeisser},
 title = {{Using Implicit Certification to Efficiently Establish Authenticated
	Group Keys for In-Vehicle Networks}},
 booktitle = {2019 IEEE Vehicular Networking Conference (VNC)},
 year = {2019},
 pages = {1-8},
 month = {12},
 doi = {10.1109/VNC48660.2019.9062785}
}
[12] Security and Safety Co-Engineering of the FlexRay Bus in Vehicular Networks (, , and ), In Proceedings of the International Conference on Omni-Layer Intelligent Systems (COINS), ACM,
BIB
@inproceedings{Puellen2019_COINS,
 author = {Dominik P\"{u}llen and Nikolaos Athanasios Anagnostopoulos and Tolga
	Arul and Stefan Katzenbeisser},
 title = {{Security and Safety Co-Engineering of the FlexRay Bus in Vehicular
	Networks}},
 booktitle = {Proceedings of the International Conference on Omni-Layer Intelligent
	Systems},
 year = {2019},
 series = {COINS '19},
 pages = {31--37},
 address = {New York, NY, USA},
 month = {5},
 publisher = {ACM},
 acmid = {3312626},
 doi = {10.1145/3312614.3312626},
 isbn = {978-1-4503-6640-3},
 keywords = {FlexRay, automotive, fault-tolerance, in-vehicle communication, reliability,
	safety, security},
 location = {Crete, Greece},
 numpages = {7}
}
[11] Privacy & Usability of IPTV Recommender Systems (, and ), In 2019 IEEE International Conference on Consumer Electronics (ICCE 2019),
BIB
@inproceedings{ArulICCE_2019,
 author = {Tolga Arul and Nikolaos Athanasios Anagnostopoulos and Stefan Katzenbeisser},
 title = {Privacy \& Usability of {IPTV} Recommender Systems},
 booktitle = {2019 IEEE International Conference on Consumer Electronics (ICCE)
	(2019 ICCE)},
 year = {2019},
 address = {Las Vegas, USA},
 month = {jan},
 abstract = {IPTV is capable of providing recommendations for upcoming TV programs
	based on consumer feedback. With the increasing popularity and performance
	of recommender systems, risks of user privacy breach emerge. Although
	several works about privacy-preserving designs of recommender systems
	exist in the literature, a detailed analysis of the current state-of-the-art
	regarding privacy as well as an investigation of the usability aspects
	of such systems, so far, have not received consideration. In this
	paper, we survey current approaches for recommender systems by studying
	their privacy and usability properties in the context of IPTV.},
 days = {11},
 doi = {10.1109/ICCE.2019.8662046},
 keywords = {recommender system; privacy; usability}
}
[10] AR-PUFs: Advanced Security Primitives for the Internet of Things and Cyber-Physical Systems , , , and ), In 2019 IEEE International Conference on Consumer Electronics (ICCE 2019),
BIB
@inproceedings{Anagnostopoulos2019_ICCE,
 author = {Nikolaos Athanasios Anagnostopoulos and Tolga Arul and Yufan Fan
	and Manish Kumar and Stefan Katzenbeisser},
 title = {{AR-PUFs:} Advanced Security Primitives for the Internet of Things
	and {Cyber-Physical} Systems},
 booktitle = {2019 IEEE International Conference on Consumer Electronics (ICCE)
	(2019 ICCE)},
 year = {2019},
 address = {Las Vegas, USA},
 month = {jan},
 abstract = {In this work, we examine very briefly a number of Advanced Reconfigurable
	Physical Unclonable Functions (AR-PUFs) that can be used to enhance
	the security of devices used for the realisation of the Internet
	of Things (IoT) and Cyber-Physical Systems (CPS). To this end, we
	also present two practical lightweight protocols that can be implemented
	using such AR-PUFs on IoT and CPS devices, in order to significantly
	enhance their security, even allowing the security of such devices
	to be restored after they have been compromised.},
 days = {11},
 doi = {10.1109/ICCE.2019.8661840},
 keywords = {reconfigurable physical unclonable function; internet of things; cyber-physical
	system}
}
[9] Poster: Hierarchical Integrity Checking in Heterogeneous Vehicular Networks (, , and ), In 2018 IEEE Vehicular Networking Conference (IEEE VNC 2018),
BIB
@inproceedings{Puellen2018_VNC,
 author = {Dominik {P{\"u}llen} and Nikolaos Athanasios Anagnostopoulos and
	Tolga Arul and Stefan Katzenbeisser},
 title = {{Poster: Hierarchical Integrity Checking in Heterogeneous Vehicular
	Networks}},
 booktitle = {2018 IEEE Vehicular Networking Conference (VNC) (IEEE VNC 2018)},
 year = {2018},
 address = {Taipei, Taiwan},
 month = {dec},
 days = {4},
 doi = {10.1109/VNC.2018.8628375}
}
[8] Security Analysis of the RaSTA Safety Protocol (, , and ), In IEEE Intelligence and Security Informatics (ISI 2018), IEEE,
BIB
@inproceedings{Heinrich2018_ISI,
 author = {Markus Heinrich and Jannik Vieten and Tolga Arul and Stefan Katzenbeisser},
 title = {{Security Analysis of the RaSTA Safety Protocol}},
 booktitle = {IEEE Intelligence and Security Informatics (ISI) 2018},
 year = {2018},
 month = {11},
 organization = {IEEE},
 publisher = {IEEE},
 doi = {10.1109/ISI.2018.8587371}
}
[7] On the Effects of Environmental Factors on the Functionality of Modern Dynamic Random Access Memory Modules , , , , , , , and ), In 7th International Conference "Micro&Nano 2018",
BIB
@inproceedings{Anagnostopoulos2018_MicroNano,
 author = {Nikolaos Athanasios Anagnostopoulos and Tolga Arul and Yufan Fan
	and Ravi Sarangdhar and Ratika Sharma and Markus Rosenstihl and Christian
	Hatzfeld and Fatemeh Tehranipoor and Stefan Katzenbeisser},
 title = {{On the Effects of Environmental Factors on the Functionality of
	Modern Dynamic Random Access Memory Modules}},
 booktitle = {7th International Conference "Micro\&Nano 2018"},
 year = {2018},
 month = {11},
 doi = {10.13140/RG.2.2.16373.83681}
}
PDF
[6] Securing IoT Devices Using Robust DRAM PUFs , , , , , , , and ), In 2018 Global Information Infrastructure and Networking Symposium (GIIS'18),
BIB
@inproceedings{Anagnostopoulos2018_GIIS,
 author = {Nikolaos Athanasios Anagnostopoulos and Tolga Arul and Yufan Fan
	and Jan Lotichius and Christian Hatzfeld and Felipe Fernandes and
	Ratika Sharma and Fatemeh Tehranipoor and Stefan Katzenbeisser},
 title = {Securing {IoT} Devices Using Robust {DRAM} {PUFs}},
 booktitle = {2018 Global Information Infrastructure and Networking Symposium (GIIS)
	(GIIS'18)},
 year = {2018},
 address = {Thessaloniki, Greece},
 month = {oct},
 abstract = {In this work, we present a novel way in which DRAM modules, which
	are found inherently in many IoT devices, can be used to enhance
	the security of such devices. We test the robustness of two DRAM-based
	security primitives, namely DRAM retention-based PUFs and Row~Hammer
	PUFs, to two external factors, i.e. ambient temperature and voltage
	variations. As both types of PUFs are proven to be highly dependent
	on temperature, we, then, present and discuss ways in which such
	PUFs can be used to implement cryptographic applications in a robust
	way, no longer being affected by temperature variations. Finally,
	we also present a proof-of-concept robust DRAM PUF-based cryptographic
	protocol that can be adapted for different security applications.
	In this way, our work demonstrates a cost-efficient, lightweight
	and practical manner in which even low-end, resource-constrained
	IoT devices can be easily protected.},
 days = {22},
 doi = {10.1109/GIIS.2018.8635789},
 keywords = {internet of things; IoT; security; DRAM PUF; DRAM retention; row hammer}
}
[5] Behavioral Workload Generation for IPTV (, and ), In 2018 IEEE 8th International Conference on Consumer Electronics - Berlin (ICCE-Berlin 2018),
BIB
@inproceedings{Arul2018_ICCE,
 author = {Tolga Arul and Nikolaos Athanasios Anagnostopoulos and Stefan Katzenbeisser},
 title = {Behavioral Workload Generation for {IPTV}},
 booktitle = {2018 IEEE 8th International Conference on Consumer Electronics -
	Berlin (ICCE-Berlin) (ICCE-Berlin 2018)},
 year = {2018},
 address = {Berlin, Germany},
 month = {sep},
 organization = {IEEE},
 days = {1},
 doi = {10.1109/ICCE-Berlin.2018.8576230}
}
[4] Low-Temperature Data Remanence Attacks Against Intrinsic SRAM PUFs and , , , and ), In 2018 Euromicro Conference on Digital System Design (DSD),
BIB
@inproceedings{Anagnostopoulos2018_DSD,
 author = {Nikolaos A. Anagnostopoulos and Tolga Arul and Markus Rosenstihl
	and Andr{\'e} Schaller and Sebastian Gabmeyer and Stefan Katzenbeisser},
 title = {{Low-Temperature Data Remanence Attacks Against Intrinsic SRAM PUFs}},
 booktitle = {2018 Euromicro Conference on Digital System Design (DSD)},
 year = {2018},
 address = {Prague, Czech Republic},
 month = {8},
 organization = {Euromicro},
 doi = {10.1109/DSD.2018.00102}
}
PDF
[3] Lightweight Anti-counterfeiting Solution for Low-End Commodity Hardware Using Inherent PUFs (, , and ), In Trust and Trustworthy Computing (Holz, Thorsten, Ioannidis, Sotiris, eds.), Springer International Publishing,
BIB
@inproceedings{Schaller2014_Springer,
 author = {Andr{\'e} Schaller and Tolga Arul and Vincent van der Leest and Stefan
	Katzenbeisser},
 title = {{Lightweight Anti-counterfeiting Solution for Low-End Commodity Hardware
	Using Inherent PUFs}},
 booktitle = {Trust and Trustworthy Computing},
 year = {2014},
 editor = {Holz, Thorsten and Ioannidis, Sotiris},
 pages = {83--100},
 address = {Cham},
 month = {6},
 publisher = {Springer International Publishing},
 abstract = {This paper presents a lightweight anti-counterfeiting solution using
	intrinsic Physically Unclonable Functions (PUFs), which are already
	embedded in most commodity hardware platforms. The presented solution
	is particularly suitable for low-end computing devices without on-board
	security features. Our anti-counterfeiting approach is based on extracting
	a unique fingerprint for individual devices exploiting inherent PUF
	characteristics from the on-chip static random-access memory (SRAM),
	which in turn allows to bind software to a particular hardware platform.
	Our solution does not require additional hardware, making it flexible
	as well as cost efficient. In a first step, we statistically analyze
	the characteristics of the intrinsic PUF instances found in two device
	types, both based on a widely used ARM Cortex-M microcontroller.
	We show that the quality of the PUF characteristics is almost ideal.
	Subsequently, we propose a security architecture to protect the platform's
	firmware by using a modified boot loader. In a proof of concept,
	we embed our solution on a state-of-the-art commodity system-on-a-chip
	platform equipped with an MCU similar to the ones previously analyzed.},
 doi = {10.1007/978-3-319-08593-7_6},
 isbn = {978-3-319-08593-7}
}
PDF
[2] A novel architecture for a secure update of cryptographic engines on trusted platform module (, , , and ), In 2011 International Conference on Field-Programmable Technology (FPT),
BIB
@inproceedings{Malipatlolla2011_FPT,
 author = {Sunil Malipatlolla and Thomas Feller and Abdulhadi Shoufan and Tolga
	Arul and Sorin. A. Huss},
 title = {A novel architecture for a secure update of cryptographic engines
	on trusted platform module},
 booktitle = {2011 International Conference on Field-Programmable Technology},
 year = {2011},
 pages = {1-6},
 month = {Dec},
 doi = {10.1109/FPT.2011.6132705},
 keywords = {cloud computing;cryptography;field programmable gate arrays;information
	technology;trusted computing;IT systems;STPM;TPM cryptographic engines;Xilinx
	Virtex-5 FPGA platform;cloud computing;cryptographic hardware engines;hard-wired
	security modules;powerful computing systems;quantum computers;security
	modules;security requirements;side channel analysis;sustainable trusted
	platform module;trusted computing;Computer architecture;Cryptography;Engines;Field
	programmable gate arrays;Heuristic algorithms;Nonvolatile memory;Cryptography;Field
	Programmable Gate Arrays;Secure Update;Trusted Platform Module;Trustworthiness}
}
PDF
[1] Multicast Rekeying: Performance Evaluation ( and ), In Design Methodologies for Secure Embedded Systems (Biedermann, Alexander, Molter, H. Gregor, eds.), Springer Berlin Heidelberg,
BIB
@inproceedings{Shoufan2010_Springer,
 author = {Abdulhadi Shoufan and Tolga Arul},
 title = {{Multicast Rekeying: Performance Evaluation}},
 booktitle = {Design Methodologies for Secure Embedded Systems},
 year = {2010},
 editor = {Biedermann, Alexander and Molter, H. Gregor},
 pages = {85--104},
 address = {Berlin, Heidelberg},
 month = {11},
 publisher = {Springer Berlin Heidelberg},
 abstract = {This paper presents a new approach for performance evaluation of rekeying
	algorithms. New system metrics related to rekeying performance are
	defined: Rekeying Quality of Service and Rekeying Access Control.
	These metrics are estimated in relation to both group size and group
	dynamics. A simultor prototype demonstrates the merit of this unified
	assessment method by means of a comprehensive case study.},
 doi = {10.1007/978-3-642-16767-6_5},
 isbn = {978-3-642-16767-6}
}
Refereed Workshop Papers

[5] Low-Temperature Attacks Against Digital Electronics: A Challenge for the Security of Superconducting Modules in High-Speed Magnetic Levitation (MagLev) Trains , , , , , , , , and ), In 2021 IEEE 14th Workshop on Low Temperature Electronics (WOLTE14),
BIB
@inproceedings{Anagnostopoulos2021_WOLTE,
 author = {Nikolaos Athanasios Anagnostopoulos and Yufan Fan and Markus Heinrich
	and Nikolay Matyunin and Dominik {P{\"u}llen} and Philipp Muth and
	Christian Hatzfeld and Markus Rosenstihl and Tolga Arul and Stefan
	Katzenbeisser},
 title = {{Low-Temperature Attacks Against Digital Electronics: A Challenge
	for the Security of Superconducting Modules in High-Speed Magnetic
	Levitation (MagLev) Trains}},
 booktitle = {2021 IEEE 14th Workshop on Low Temperature Electronics (WOLTE) (WOLTE14)
	(In Press)},
 year = {2021},
 address = {Matera, Italy},
 month = {apr},
 days = {14},
 doi = {10.1109/WOLTE49037.2021.9555437}
}
PDF
[4] MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website and Application Fingerprinting (, , , , ), In Proceedings of the 2019 Workshop on Privacy in the Electronic Society, ACM,
BIB
@inproceedings{Matyunin2019_WPES,
 author = {Nikolay Matyunin and Yujue Wang and Tolga Arul and Jakub Szefer and
	Stefan Katzenbeisser},
 title = {{MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website
	and Application Fingerprinting}},
 booktitle = {Proceedings of the 2019 Workshop on Privacy in the Electronic Society},
 year = {2019},
 series = {WPES'19},
 pages = {66--70},
 address = {New York, NY, USA},
 month = {11},
 publisher = {ACM},
 acmid = {3268963},
 doi = {10.1145/3338498.3358650},
 location = {London, UK},
 numpages = {5}
}
[3] Lightweight security solutions for IoT implementations in space , , , and ), In 2019 IEEE Topical Workshop on Internet of Space (TWIOS),
BIB
@inproceedings{Anagnostopoulos2019_TWIOS,
 author = {Nikolaos Athanasios Anagnostopoulos and Yufan Fan and Tolga Arul
	and Ravi Sarangdhar and Stefan Katzenbeisser},
 title = {{Lightweight security solutions for IoT implementations in space}},
 booktitle = {2019 IEEE Topical Workshop on Internet of Space (TWIOS)},
 year = {2019},
 pages = {1-4},
 month = {1},
 doi = {10.1109/TWIOS.2019.8771257},
 keywords = {Random access memory;Security;Temperature measurement;Temperature
	sensors;Temperature dependence;Internet of Things}
}
[2] A Reference Architecture for Integrating Safety and Security Applications on Railway Command and Control Systems (, , , , , , , , and ), In 4th International Workshop on MILS: Architecture and Assurance for Secure Systems, Zenodo,
BIB
@inproceedings{Birkholz2018_MILS,
 author = {Henk Birkholz and Christoph Krau{\ss} and Maria Zhdanova Don Kuzhiyelil
	and Tolga Arul and Markus Heinrich and Stefan Katzenbeisser and Neeraj
	Suri and Tsvetoslava Vateva-Gurova and Christian Schlehuber},
 title = {{A Reference Architecture for Integrating Safety and Security Applications
	on Railway Command and Control Systems}},
 booktitle = {4th International Workshop on MILS: Architecture and Assurance for
	Secure Systems},
 year = {2018},
 number = {4},
 address = {Luxembourg},
 month = {6},
 publisher = {Zenodo},
 doi = {10.5281/zenodo.1314095}
 }
[1] Consumer Opinions on Short-Interval Charging for Pay-TV over IPTV ( and ), In 2012 26th International Conference on Advanced Information Networking and Applications Workshops,
BIB
@inproceedings{Arul2012_WAINA,
 author = {Tolga Arul and Abdulhadi Shoufan},
 title = {{Consumer Opinions on Short-Interval Charging for Pay-TV over IPTV}},
 booktitle = {2012 26th International Conference on Advanced Information Networking
	and Applications Workshops},
 year = {2012},
 pages = {147-153},
 month = {3},
 doi = {10.1109/WAINA.2012.95},
 keywords = {IPTV;video on demand;IPTV;Internet Protocol Television;pay-TV;short-interval
	charging;video on demand;Cable TV;IPTV;Pricing;Satellite broadcasting;Satellites;Subscriptions;IPTV;charging
	model;pay-TV;survey}
}
PDF
Other Publications

[29] Exploring the Uniqueness of Pt100 and Pt1000 Temperature Sensors for Hardware Security Applications (, , , , and ), In crypto day matters 34 (Marcel Tiepelt and Michael Nüsken, eds.), Gesellschaft für Informatik e.V./FG KRYPTO,
BIB
@Misc{Neisarian2024_CT37,
author    = {Neisarian, Shekoufeh and Bahoum, El Mehdi and 
Mexis, Nico and Arul, Tolga and Katzenbeisser, Stefan and 
Anagnostopoulos, Nikolaos Athanasios},
howpublished = {crypto day matters 34},
title     = {{Exploring the Uniqueness of Pt100 and Pt1000 
Temperature Sensors for Hardware Security Applications}},
year      = {2024. In Press.},
address   = {Bonn, Germany},
editor    = {Tiepelt, Marcel AND N\"{u}sken, Michael},
month     = {9},
publisher = {Gesellschaft f{\"u}r Informatik e.V. / FG KRYPTO}
}
[28] Enhancing Data Security with Chaos-Based Cryptography: A Rössler Circuit Implementation (, , , , , , and ), In crypto day matters 34 (Marcel Tiepelt and Michael Nüsken, eds.), Gesellschaft für Informatik e.V./FG KRYPTO,
BIB
@Misc{Mexis2024_CT37,
author    = {Mexis, Nico and Bognitschar, Cathrin and 
Klinke, Julian and Anagnostopoulos, Nikolaos Athanasios and 
Chang, Joseph He and Arul, Tolga and George, Aleena Elsa and 
Katzenbeisser, Stefan},
howpublished = {crypto day matters 34},
title     = {{Enhancing Data Security with Chaos-Based Cryptography: 
A R\"{o}ssler Circuit Implementation}},
year      = {2024. In Press.},
address   = {Bonn, Germany},
editor    = {Tiepelt, Marcel AND N\"{u}sken, Michael},
month     = {9},
publisher = {Gesellschaft f{\"u}r Informatik e.V. / FG KRYPTO}
}
[27] An Analysis of the Effects of Temperature on the Performance of ReRAM-Based TRNGs (, , and ), In crypto day matters 34 (Marcel Tiepelt and Michael Nüsken, eds.), Gesellschaft für Informatik e.V./FG KRYPTO,
BIB
@InProceedings{Mexis2024_CT36,
author    = {Nico Mexis and Nikolaos Athanasios Anagnostopoulos and Tolga Arul and Stefan Katzenbeisser},
title     = {{An Analysis of the Effects of Temperature on the Performance of ReRAM-Based TRNGs}},
year      = {2024},
address   = {Bonn},
editor    = {Tiepelt, Marcel AND N\"{u}sken, Michael},
month     = {4},
publisher = {Gesellschaft f{\"u}r Informatik e.V. / FG KRYPTO},
doi       = {10.18420/cdm-2024-36-02},
journal   = {crypto day matters 34}
}
[26] An Improved Machine-Learning Model for the Identification and Classification of Memory-Based PUF Responses (, , , and ), In crypto day matters 34 (Juliane Krämer, Thomas Aulbach and Michael Nüsken, eds.), Gesellschaft für Informatik e.V./FG KRYPTO,
BIB
@InProceedings{Mexis2023_CT35,
author    = {Nico Mexis and Nikolaos Athanasios Anagnostopoulos 
	and Tolga Arul and Stefan Katzenbeisser},
title     = {{An Improved Machine-Learning Model for the 
	Identification and Classification of Memory-Based PUF Responses}},
year      = {2024},
address   = {Bonn},
editor    = {Kr\"{a}mer, Juliane AND Aulbach, Thomas AND N\"{u}sken, Michael},
month     = {4},
publisher = {Gesellschaft f{\"u}r Informatik e.V. / FG KRYPTO},
doi       = {10.18420/cdm-2023-35-03},
journal   = {crypto day matters 34}
}
[25] Neuromorphic and In-Memory Computing Based on Memristive Circuits for Predictive Maintenance and Supply-Chain Management and Security (, , , and ), In Workshop on "Nano-Security: From Nano-Electronics to Secure Systems" (co-located with the 27th Design, Automation and Test in Europe Conference & Exhibition (DATE 2024) as Workshop 03),
BIB
@Misc{Anagnostopoulos2024_Date,
author       = {Nikolaos Athanasios Anagnostopoulos and 
	Nico Mexis and Stefan Katzenbeisser and Elif Bilge Kavun 
	and Tolga Arul},
howpublished = {Workshop on "Nano-Security: From Nano-Electronics 
	to Secure Systems" (co-located with the 27th Design, 
	Automation and Test in Europe Conference \& Exhibition 
	(DATE 2024) as Workshop 03)},
month        = {4},
title        = {Neuromorphic and In-Memory Computing Based on Memristive 
	Circuits for Predictive Maintenance and Supply-Chain Management and 
	Security},
year         = {2024. Proceedings not published.},
address      = {Valencia, Spain},
comment      = {Proceedings not published. 04/2024}
}
[24] Memristors in the Context of Security and AI (, , , and ), In Workshop on "Nano-Security: From Nano-Electronics to Secure Systems" (co-located with the 27th Design, Automation and Test in Europe Conference & Exhibition (DATE 2024) as Workshop 03),
BIB
@Misc{Tekles2024_Date,
author       = {Alexander Tekles and Tolga Arul and Nico Mexis 
	and Stefan Katzenbeisser and Nikolaos Athanasios Anagnostopoulos},
howpublished = {Workshop on "Nano-Security: From Nano-Electronics to 
	Secure Systems" (co-located with the 27th Design, Automation and 
	Test in Europe Conference \& Exhibition (DATE 2024) as Workshop 03)},
month        = {4},
title        = {Memristors in the Context of Security and AI},
year         = {2024. Proceedings not published.},
address      = {Valencia, Spain},
comment      = {Proceedings not published.}
}
[23] An Analysis of the Effects of Temperature on the Performance of ReRAM-Based TRNGs (, , and ), In Workshop on "Nano-Security: From Nano-Electronics to Secure Systems" (co-located with the 27th Design, Automation and Test in Europe Conference & Exhibition (DATE 2024) as Workshop 03),
BIB
@Misc{Mexis2024_Date,
author       = {Nico Mexis and Nikolaos Athanasios Anagnostopoulos 
	and Stefan Katzenbeisser and Tolga Arul},
howpublished = {Workshop on "Nano-Security: From Nano-Electronics 
	to Secure Systems" (co-located with the 27th Design, 
	Automation and Test in Europe Conference \& Exhibition 
	(DATE 2024) as Workshop 03)},
month        = {4},
title        = {An Analysis of the Effects of Temperature on the 
	Performance of ReRAM-Based TRNGs},
year         = {2024. Proceedings not published.},
address      = {Valencia, Spain},
comment      = {Proceedings not published.},
}
[22] Nonlinear behavior of area dependent interface type resistive switching devices (, , , , , and ),
BIB
@Misc{Yarragolla2024_arxiv,
author        = {Sahitya Yarragolla and Torben Hemke and 
	Fares Jalled and Tobias Gergs and Jan Trieschmann and 
	Tolga Arul and Thomas Mussenbrock},
month         = {3},
title         = {Nonlinear behavior of area dependent interface 
	type resistive switching devices},
year          = {2024},
archiveprefix = {arXiv},
doi           = {10.48550/arXiv.2402.04848},
eprint        = {2402.04848},
primaryclass  = {cs.ET},
url           = {https://arxiv.org/abs/2402.04848},
}
[21] Neuromorphic and In-Memory Computing Based on Memristive Circuits for Predictive Maintenance and Supply-Chain Security , , , and ),
BIB
@Misc{Anagnostopoulos2023_Techrxiv,
author    = {Anagnostopoulos, Nikolaos Athanasios and 
	Mexis, Nico and Kavun, Elif and Katzenbeisser, Stefan 
	and Arul, Tolga},
month     = {7},
title     = {Neuromorphic and In-Memory Computing Based on 
	Memristive Circuits for Predictive Maintenance and 
	Supply-Chain Security},
year      = {2023},
doi       = {10.36227/techrxiv.23721990.v1},
url       = {http://dx.doi.org/10.36227/techrxiv.23721990.v1},
}
[20] CNT-PUFs: Highly Robust and Heat-Tolerant Carbon-Nanotube-Based Physical Unclonable Functions for Stable Key Generation (, , , , , , , and ),
BIB
@Misc{Boettger2023_Techrxiv,
author    = {B\'{o}ttger, Simon and Frank, Florian and 
	Anagnostopoulos, Nikolaos Athanasios and Mexis, Nico and Mohamed, Ali 
	and Hartmann, Martin and Arul, Tolga and Hermann, Sascha and 
	Katzenbeisser, Stefan},
month     = {7},
title     = {CNT-PUFs: Highly Robust and Heat-Tolerant Carbon-Nanotube-Based 
	Physical Unclonable Functions for Stable Key Generation},
year      = {2023},
doi       = {10.36227/techrxiv.23621829.v2},
url       = {http://dx.doi.org/10.36227/techrxiv.23621829.v2},
}
[19] Practical Non-Invasive Probing Attacks Against Novel Carbon-Nanotube-Based Physical Unclonable Functions , , , , , , , , and ),
BIB
@Misc{Anagnostopoulos2023_arXiv,
author        = {Nikolaos Athanasios Anagnostopoulos and Alexander Braml 
	and Nico Mexis and Florian Frank and Simon B\'{o}ttger and 
	Martin Hartmann and Sascha Hermann and Elif Bilge Kavun and 
	Stefan Katzenbeisser and Tolga Arul},
month         = {7},
title         = {Practical Non-Invasive Probing Attacks Against Novel Carbon-Nanotube-Based Physical Unclonable Functions},
year          = {2023},
archiveprefix = {arXiv},
doi           = {10.48550/arXiv.2307.01041},
eprint        = {2307.01041},
primaryclass  = {cs.CR},
url           = {https://arxiv.org/abs/2307.01041},
}
[18] Carbon-Nanotube-Based Physical Unclonable Functions and True Random Number Generators , , , , , , and ), In Workshop on "Nano-Security: From Nano-Electronics to Secure Systems" (co-located with the 26th Design, Automation and Test in Europe Conference & Exhibition (DATE 2023) as Workshop 03)
BIB
@InProceedings{Anagnostopoulos2023_Date,
author       = {Nikolaos Athanasios Anagnostopoulos and Tolga Arul 
	and Simon B\"{o}ttger and Florian Frank and Ali Mohamed and 
	Martin Hartmann and Sascha Hermann and Stefan Katzenbeisser},
booktitle    = {Workshop on "Nano-Security: From Nano-Electronics 
	to Secure Systems" (co-located with the 26th Design, Automation 
	and Test in Europe Conference \& Exhibition (DATE 2023) as 
	Workshop 03)},
title        = {Carbon-Nanotube-Based Physical Unclonable Functions 
	and True Random Number Generators},
year         = {2023},
address      = {Antwerp, Belgium},
month        = {4},
comment      = {Proceedings not published.},
howpublished = {Workshop on "Nano-Security: From Nano-Electronics to 
	Secure Systems" (co-located with the 26th Design, Automation and
	Test in Europe Conference & Exhibition (DATE 2023) as Workshop 03).
	Proceedings not published.}
}
[17] CNT-PUFs: Highly Robust Physical Unclonable Functions Based on Carbon Nanotubes (, , , , , , and ) In Workshop on "Nano-Security: From Nano-Electronics to Secure Systems" (co-located with the 26th Design, Automation and Test in Europe Conference & Exhibition (DATE 2023) as Workshop 03)
BIB
@InProceedings{Boettger2023_Date,
author       = {Simon B\"{o}ttger and Florian Frank and 
	Nikolaos Athanasios Anagnostopoulos and Ali Mohamed 
	and Martin Hartmann and Tolga Arul and Sascha Hermann 
	and Stefan Katzenbeisser},
booktitle    = {Workshop on "Nano-Security: From Nano-Electronics 
	to Secure Systems" (co-located with the 26th Design, Automation 
	and Test in Europe Conference \& Exhibition (DATE 2023) 
	as Workshop 03)},
title        = {CNT-PUFs: Highly Robust Physical Unclonable Functions Based on Carbon Nanotubes},
year         = {2023. Proceedings not published.},
address      = {Antwerp, Belgium},
month        = {4},
comment      = {Proceedings not published.},
howpublished = {Poster for the Project "NANOSEC: Tamper-Evident PUFs based on Nanostructures 
	for Secure and Robust Hardware Security Primitives" of DFG Priority Program 2253: 
	"Nano-Security: From Nano-Electronics to Secure Systems". Proceedings not published.}
}
[16] Testing the Robustness of Physical Unclonable Functions Implemented on Commercial Off-the-Shelf NAND Flash Memories Using Programming Disturbances to Temperature and Voltage Variations (, , , , , , , , and ), In 2022 IEEE 12th International Conference on Consumer Electronics - Berlin (ICCE-Berlin 2022). Presentation not published in the proceedings.
BIB
@inproceedings{Geloczi2022_ICCEBerlin,
 author = {Emiliia Gel\'{o}czi and Nikolaos Athanasios Anagnostopoulos and Nico
	Mexis and Yufan Fan and Muhammed Umair Saleem and Andr{\'e} Schaller
	and Felix Klement and Florian Frank and Tolga Arul and Stefan Katzenbeisser},
 title = {{Testing the Robustness of Physical Unclonable Functions Implemented
	on Commercial Off-the-Shelf NAND Flash Memories Using Programming
	Disturbances to Temperature and Voltage Variations}},
 booktitle = {{2022 IEEE 12th International Conference on Consumer Electronics
	(ICCE-Berlin)}},
 year = {2022},
 month = {9},
 howpublished = {presented in the 2022 IEEE 12th International Conference on Consumer
	Electronics - Berlin (ICCE-Berlin 2022)}
}
PDF
[15] Real-World Chaos-Based Cryptography Using Synchronised Chua Chaotic Circuits (, , , , , and ), In IEEE International Symposium on Hardware Oriented Security and Trust (HOST 2022). Hardware demo. Not published in the proceedings.
BIB
@InProceedings{Nazarenko2022_Techrxiv,
author = {Emiliia Nazarenko and Nikolaos Athanasios Anagnostopoulos and Stavros
	G. Stavrinides and Nico Mexis and Florian Frank and Tolga Arul and
	Stefan Katzenbeisser},
title = {{Real-World Chaos-Based Cryptography Using Synchronised Chua Chaotic
	Circuits}},
booktitle    = {2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST 2022)},	
howpublished = {Hardware demo. Not published in the proceedings.},
year = {2022},
month = {9},
series = {27-30 June 2022},
doi = {10.36227/techrxiv.21030466.v1}
 }
PDF
[14] Abusing Commodity DRAMs in IoT Devices to Remotely Spy on Temperature (, , , , , , , and ),
BIB
@misc{Frank2022_Arxiv,
 author = {Florian Frank and Wenjie Xiong and Nikolaos Athanasios Anagnostopoulos
	and Andr{\'e} Schaller and Tolga Arul and Farinaz Koushanfar and
	Stefan Katzenbeisser and Ulrich Ruhrmair and Jakub Szefer},
 title = {Abusing Commodity DRAMs in IoT Devices to Remotely Spy on Temperature},
 month = {9},
 year = {2022},
 copyright = {Creative Commons Attribution Non Commercial No Derivatives 4.0 International},
 doi = {10.48550/ARXIV.2208.02125},
 keywords = {Cryptography and Security (cs.CR), FOS: Computer and information sciences,
	FOS: Computer and information sciences},
 publisher = {arXiv}
}
PDF
[13] On the Sustainability of Lightweight Cryptography Based on PUFs Implemented on NAND Flash Memories Using Programming Disturbances , , , , , and ), In Workshop on Sustainability in Security, Security for Sustainability, co-located with the 25th Design, Automation and Test in Europe Conference & Exhibition (DATE 2022),
BIB
@Article{Anagnostopoulos2022_Techrxiv,
author  = {Nikolaos Athanasios Anagnostopoulos and Yufan Fan 
	and Muhammad Umair Saleem and Nico Mexis and Florian Frank 
	and Tolga Arul and Stefan Katzenbeisser},
title   = {{On the Sustainability of Lightweight Cryptography 
	Based on PUFs Implemented on NAND Flash Memories Using 
	Programming Disturbances}},
year    = {2022},
month   = {9},
doi     = {10.36227/techrxiv.19529263.v2}
}
PDF
[12] Secure Communication via Chaotic Cryptography (, , , , , and ), In crypto day matters 34 (Daniel Loebenberger and Michael Nüsken eds.), Gesellschaft für Informatik e.V./FG KRYPTO,
BIB
@inproceedings{Geloczi2022_CT34,
 author = {Emiliia Gel\'{o}czi and Nico Mexis and Nikolaos Athanasios Anagnostopoulos
	and Florian Frank and Tolga Arul and Stavros G. Stavrinides and Stefan
	Katzenbeisser},
 title = {{Secure Communication via Chaotic Cryptography}},
 booktitle = {crypto day matters 34},
 year = {2022},
 editor = {Loebenberger, Daniel AND N\"{u}sken, Michael},
 address = {Bonn},
 month = {6},
 publisher = {Gesellschaft f\"{u}r Informatik e.V./ FG KRYPTO},
 doi = {10.18420/cdm-2021-33-41}
}
[11] On the Sustainability of Lightweight Cryptography Based on PUFs Implemented on NAND Flash Memories Using Programming Disturbances , , , , , and ), In Workshop on "Sustainability in Security & Security for Sustainability" (co-located with the 25th Design, Automation and Test in Europe Conference & Exhibition (DATE 2022) as Workshop 09),
BIB
@Misc{Anagnostopoulos2022_Date,
author       = {Nikolaos Athanasios Anagnostopoulos and Yufan Fan and 
	Muhammad Umair Saleem and Nico Mexis and Florian Frank and Tolga Arul 
	and Stefan Katzenbeisser},
howpublished = {Workshop on "Sustainability in Security \& Security for Sustainability" 
	(co-located with the 25th Design, Automation and Test in Europe Conference \& Exhibition 
	(DATE 2022) as Workshop 09)},
month        = {3},
title        = {{On the Sustainability of Lightweight Cryptography Based on PUFs Implemented on 
	NAND Flash Memories Using Programming Disturbances}},
year         = {2022},
comment      = {\url{https://arxiv.org/abs/2204.02498} Proceedings not published. 
	Links to relevant preprint versions of this work: TechRxiv and arXiv},
doi          = {10.48550/ARXIV.2204.02498},
keywords     = {Cryptography and Security (cs.CR), FOS: Computer and information sciences, 
	FOS: Computer and information sciences}
}
PDF
[10] Development of Nanomaterial-Based Physically Unclonable Functions and Dedicated Measurement and Testing Devices (, , , , and ), Fall School on Nano-Electronics for Secure Systems (NESSY), 10-11 November 2021, Lübeck, Germany,
BIB
@misc{Boettger2021_NESSY,
 author = {Simon B\"{o}ttger and Florian Frank and Nikolaos Athanasios Anagnostopoulos
	and Tolga Arul and Stefan Katzenbeisser and Sascha Hermann},
 title = {{Development of Nanomaterial-Based Physically Unclonable Functions
	and Dedicated Measurement and Testing Devices}},
 howpublished = {Fall School on Nano-Electronics for Secure Systems (NESSY), 10-11
	November 2021, L\"{u}beck, Germany},
 month = {11},
 year = {2021},
 url = {ia.cr/2016/769}
}
[9] Fuzzy Extractors using Low-Density Parity-Check Codes (, , , and ), In crypto day matters 33 (Stefan-Lukas Gazdag, Marcel Tiepelt, Daniel Loebenberger and Michael Nüsken eds.), Gesellschaft für Informatik e.V./FG KRYPTO,
BIB
@inproceedings{Mexis2021_CT33,
 author = {Nico Mexis and Nikolaos Athanasios Anagnostopoulos and Tolga Arul
	and Florian Frank and Stefan Katzenbeisser},
 title = {Fuzzy Extractors using Low-Density Parity-Check Codes},
 booktitle = {crypto day matters 33},
 year = {2021},
 editor = {Gazdag, Stefan-Lukas AND Tiepelt, Marcel AND Loebenberger, Daniel
	AND N\"{u}sken, Michael},
 month = {09},
 publisher = {Gesellschaft f\"{u}r Informatik e.V./ FG KRYPTO},
 doi = {10.18420/cdm-2021-33-41}
}
[8] Rule-based Anomaly Detection for Railway Signalling Networks (, , and ), In CoRR , volume abs/2008.05241,
BIB
@article{Heinrich2020_arXiv,
 author = {Markus Heinrich and Arwed G{\"{o}}lz and Tolga Arul and Stefan Katzenbeisser},
 title = {Rule-based Anomaly Detection for Railway Signalling Networks},
 journal = {CoRR},
 year = {2020},
 volume = {abs/2008.05241},
 month = {8},
 archiveprefix = {arXiv},
 bibsource = {dblp computer science bibliography, https://dblp.org},
 biburl = {https://dblp.org/rec/journals/corr/abs-2008-05241.bib},
 doi = {10.48550/ARXIV.2008.05241},
 eprint = {2008.05241},
 url = {https://onlinelibrary.wiley.com/doi/pdf/10.1002/sec.1690}
}
[7] MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website and Application Fingerprinting (, , , and ),
BIB
@misc{Matyunin2019_arXiv,
 author = {Nikolay Matyunin and Yujue Wang and Tolga Arul and Jakub Szefer and
	Stefan Katzenbeisser},
 title = {{MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website
	and Application Fingerprinting}},
 month = {6},
 year = {2019},
 archiveprefix = {arXiv},
 eprint = {1906.11117},
 primaryclass = {cs.CR},
 url = {ia.cr/2016/769}
}
[6] Addressing the Effects of Temperature Variations on Intrinsic Memory-Based Physical Unclonable Functions , , , , and ), In 28th Crypto-Day,
BIB
@inproceedings{Anagnostopoulos2018_CT28,
 author = {Nikolaos Athanasios Anagnostopoulos and Tolga Arul and Yufan Fan
	and Christian Hatzfeld and Fatemeh Tehranipoor and Stefan Katzenbeisser},
 title = {{Addressing the Effects of Temperature Variations on Intrinsic Memory-Based
	Physical Unclonable Functions}},
 booktitle = {28th Crypto-Day},
 year = {2018},
 series = {GI},
 month = {8},
 doi = {10.18420/cdm-2018-28-23},
 keywords = {Primitives; P3}
}
[5] Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security , , , , , , , , , , and ), Preprints,
BIB
@misc{Anagnostopoulos2018_Preprint,
 author = {Nikolaos Athanasios Anagnostopoulos and Tolga Arul and Yufan Fan
	and Christian Hatzfeld and Andr{\'e} Schaller and Wenjie Xiong and
	Manishkumar Jain and Muhammed Umair Saleem and Jan Lotichius and
	Sebastian Gabmeyer and Jakup Szefer and Stefan Katzenbeisser},
 title = {Intrinsic {Run-Time} Row Hammer PUFs: Leveraging the Row Hammer Effect
	for Run-Time Cryptography and Improved Security},
 howpublished = {Preprints},
 month = {4},
 year = {2018},
 doi = {10.20944/preprints201804.0369.v1},
 url = {ia.cr/2016/769}
}
[4] An investigation of the effects of radiation on current key storage solutions and on Physical Unclonable Functions (PUFs) being used as key storage (, , , , , , , , , and ), In 27th Crypto-Day,
BIB
@inproceedings{Sarangdhar2017_CT27,
 author = {Ravi Sarangdhar and Yufan Fan and Nikolaos Athanasios Anagnostopoulos
	and Udo Gayer and Frank Flederer and Tobias Mikschl and Tolga Arul
	and Philipp R. John and Kirsten Hierholz and Sergio Montenegro and
	Stefan Katzenbeisser},
 title = {{An investigation of the effects of radiation on current key storage
	solutions and on Physical Unclonable Functions (PUFs) being used
	as key storage}},
 booktitle = {27th Crypto-Day},
 year = {2017},
 month = {12},
 doi = {10.13140/RG.2.2.33800.52483},
 keywords = {Primitives;P3}
}
PDF
[3] An extensive classification and analysis of attacks against Physical Unclonable Functions (PUFs) , , and ), In 27th Crypto-Day,
BIB
@inproceedings{Anagnostopoulos2017_CT27,
 author = {Nikolaos Athanasios Anagnostopoulos and Sebastian Gabmeyer and Tolga
	Arul and Stefan Katzenbeisser},
 title = {An extensive classification and analysis of attacks against {Physical
	Unclonable Functions (PUFs)}},
 booktitle = {27th Crypto-Day},
 year = {2017},
 month = {12},
 doi = {10.13140/RG.2.2.25411.91689}
}
PDF
[2] Insights into the Potential Usage of the Initial Values of DRAM Arrays of Commercial Off-the-Shelf Devices for Security Applications , , , , , , , , and ), In 26th Crypto-Day,
BIB
@inproceedings{Anagnostopoulos2017_CT26,
 author = {Nikolaos Athanasios Anagnostopoulos and Andr{\'e} Schaller and Yufan
	Fan and Wenjie Xiong and Fatemeh Tehranipoor and Tolga Arul and Sebastian
	Gabmeyer and Jakup Szefer and John A. Chandy and Stefan Katzenbeisser},
 title = {{Insights into the Potential Usage of the Initial Values of DRAM
	Arrays of Commercial Off-the-Shelf Devices for Security Applications}},
 booktitle = {26th Crypto-Day},
 year = {2017},
 month = {6},
 doi = {10.13140/RG.2.2.21396.50569},
 keywords = {Primitives;P3}
}
PDF
[1] Low-temperature data remanence attacks against intrinsic SRAM PUFs , , , , and ), Cryptology ePrint Archive, Report 2016/769,
BIB
@misc{Anagnostopoulos2016_Eprint,
 author = {Nikolaos Athanasios Anagnostopoulos and Stefan Katzenbeisser and
	Markus Rosenstihl and Andr{\'e} Schaller and Sebastian Gabmeyer and
	Tolga Arul},
 title = {Low-temperature data remanence attacks against intrinsic SRAM PUFs},
 howpublished = {Cryptology ePrint Archive, Report 2016/769},
 month = {8},
 year = {2016},
 url = {ia.cr/2016/769}
}
Theses
[2] Channel Switching-Triggered Charging for Pay-TV over IPTV
(),
PhD thesis, Technische Universität Darmstadt,
BIB
@phdthesis{Arul2017_Diss,
 author = {Tolga Arul},
 title = {{Channel Switching-Triggered Charging for Pay-TV over IPTV}},
 school = {Technische Universit{\"a}t Darmstadt},
 year = {2017},
 month = {9},
 abstract = {IPTV as an alternative transmission path for broadcast is gaining
	in importance increasingly. Promoted by the continuous expansion
	of broadband networks and IP convergence, IPTV is an enabler for
	several service-based developments such as time-, device-, and place-shifted
	viewing. In this regard, IPTV is attractive for multiple service
	operators as it can be used both as an instrument of customer retention
	and an additional source of revenue.
	
	Despite these technical advantages we observe, that the technical
	potential of IPTV has not been fully re?ected by any pay-TV charging
	model for broadcast content so far. In particular, a consumer-oriented
	charging model can act as an advantage for pioneering service operators
	who offer novel content and technologies in highly competitive markets.
	
	In this work, we develop a novel short-interval charging model for
	linear pay-TV over IPTV called channel switching-triggered charging.
	For the design, implementation, and evaluation of this model we consider
	requirements of pay-TV consumers and service operators. In particular,
	a special emphasis is placed on the aspects of acceptance. This charging
	model is based on the conventional channel switching actions of users
	and is realized by employing multicast encryption schemes. After
	implementing the proposed model we present a case study. We prove
	that our contribution provides additional benefits for the consumer
	and the service provider while maintaining an equivalent level of
	service quality compared to Free-TV.},
 url = {http://tuprints.ulb.tu-darmstadt.de/6680/}
}
[1] Multicast-Rekeying für kundenorientiertes IPTV : Marktanalyse - Prototyp - Performance-Evaluierung
( and ),
Master's thesis, Technische Universität Darmstadt,
BIB
@mastersthesis{Arul2009_Diploma,
 author = {Tolga Arul and Peter M{\"u}ller},
 title = {{Multicast-Rekeying f{\"u}r kundenorientiertes IPTV : Marktanalyse
	- Prototyp - Performance-Evaluierung}},
 school = {Technische Universit{\"a}t Darmstadt},
 year = {2009},
 type = {Diploma Thesis},
 month = {July},
 url = {https://hds.hebis.de/ulbda/Record/HEB322907470}
}
Datasets
[1] NIST test results for the paper "Towards a Practical Runtime-Accessible True Random Number Generator
Based on Commercial Off-The-Shelf Resistive Random Access Memory Modules"

( and and ),
IEEE Dataport,
BIB
@Data{Arul2024_ReRAM_TRNG,
  author    = {Arul, Tolga and Mexis, Nico and Anagnostopoulos, Nikolaos Athanasios},
  doi       = {10.21227/ztas-p887},
  month     = {9},
  publisher = {IEEE Dataport},
  title     = {NIST test results for the paper "Towards a Practical 
  Runtime-Accessible True Random Number Generator Based on Commercial 
  Off-The-Shelf Resistive Random Access Memory Modules"},
  year      = {2024},
}
		

Service

08/2024 PC member, Reviewer: 8th ACM Workshop on Attacks and Solutions in Hardware Security, ASHES 2024,
18 October 2023, CCS '24: 2024 ACM SIGSAC Conference on Computer and Communications Security,
Salt Lake City, UT, USA, Association for Computing Machinery (ACM)
08/2024 Reviewer: Elsevier Microprocessors and Microsystems, Volume 109, ISSN: 0141-9331
01/2024 PC member, Reviewer: 15th International Workshop on Constructive Side-Channel & Analysis and Secure Design,
COSADE 2024, Gardanne, France, 9–10 April 2024, Lecture Notes in Computer Science, ISBN: 978-3-031-57542-6
12/2023 Reviewer: International Journal of Information Security, Volume 23, Issue 1, ISSN: 1615-5262
12/2023 Reviewer: 57th IEEE International Symposium on Circuits and Systems, ISCAS 2024,
19-22 May 2024, Singapore, Institute of Electrical and Electronics Engineers (IEEE), ISBN: 979-8-3503-3099-1
09/2023 PC member, Reviewer: 7th ACM Workshop on Attacks and Solutions in Hardware Security, ASHES 2023,
30 November 2023, CCS '23: 2023 ACM SIGSAC Conference on Computer and Communications Security,
Copenhagen, Denmark, Association for Computing Machinery (ACM), ISBN: 979-8-4007-0262-4
07/2023 Co-chair: Workshop on State-of-the-Art Nanoelectronics in the Framework of Security and Artificial Intelligence, NanoSecAI, 25. July 2023, Berlin, Proceedings of the International Conference on Omni-Layer Intelligent Systems, COINS 2023, Institute of Electrical and Electronics Engineers (IEEE), ISBN: 979-8-3503-4647-3
01/2023 PC member, Reviewer: 14th International Workshop on Constructive Side-Channel Analysis and Secure Design,
COSADE 2023, Munich, 3–4 April 2023, Lecture Notes in Computer Science, Volume 13979, Number 1,
ISBN: 978-3-031-29496-9
01/2023 Reviewer: Journal of Cryptographic Engineering, Volume 13, Issue 1, ISSN: 2190-8516
12/2022 Reviewer: IEEE Consumer Electronics Magazine, Volume 12, Number 1, ISSN: 2162-2256
08/2022 PC member, Reviewer: 6th ACM Workshop on Attacks and Solutions in Hardware Security, ASHES 2022,
7 November 2022, CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security,
Los Angeles, CA, USA, Association for Computing Machinery (ACM), ISBN: 978-1-4503-9884-8
08/2022 Reviewer: Journal of Cryptographic Engineering, Volume 12, issue 3, ISSN: 2190-8508
03/2022 Reviewer: Elsevier Computer Communications, Volume 194, ISSN: 0140-3664
12/2021 Reviewer: 2022 IEEE International Symposium on Circuits and Systems, ISCAS 2022, 28 May-1 June 2022,
Austin, USA, Institute of Electrical and Electronics Engineers (IEEE)
10/2021 Reviewer: Journal of Cryptographic Engineering, Volume 11, Issue 4, ISSN: 2190-8508
08/2021 Reviewer: 2022 Design, Automation & Test in Europe Conference & Exhibition, DATE 2022, 14-23 March 2022,
Antwerp, Belgium, Institute of Electrical and Electronics Engineers (IEEE), ISBN: 978-1-6654-9637-7
08/2021 PC member, Reviewer: 5th ACM Workshop on Attacks and Solutions in Hardware Security, ASHES 2021,
19 November 2021, CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event,
Republic of Korea, Association for Computing Machinery (ACM), ISBN: 978-1-4503-8662-3
01/2021 Reviewer: 42nd IEEE Symposium on Security & Privacy, SP 2021, 24-27 May 2021,
Virtual Conference, USA, Institute of Electrical and Electronics Engineers (IEEE), ISBN: 978-1-7281-8935-2
08/2020 PC member, Reviewer: 4th ACM Workshop on Attacks and Solutions in Hardware Security, ASHES 2020,
13 November 2020, CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security,
Virtual Event, USA, Association for Computing Machinery (ACM), ISBN: 978-1-4503-8090-4
08/2020 Reviewer: Elsevier Computer Networks, Volume 178, ISSN: 1389-1286
07/2020 Reviewer: Nature Electronics, Volume 4, Issue 5, ISSN: 2520-1131
05/2020 Reviewer: MDPI Electronics, Volume 9, Issue 5, ISSN: 2079-9292
04/2019 Organization Team: 10th International Workshop on Constructive Side-Channe Analysis and Secure Design,
COSADE 2019, Darmstadt, 3–5 April, Lecture Notes in Computer Science, Volume 11421, Springer,
ISBN: 978-3-030-16349-5
04/2019 Reviewer: 30th International Workshop on Combinatorial Algorithms, IWOCA 2019, Pisa, 23-25 July,
Lecture Notes in Computer Science, volume 11638, Springer, ISBN: 978-3-030-25004-1
08/2018 Reviewer: Elsevier Computers & Security, Volume 78, ISSN: 0167-4048
08/2017 Reviewer: Elsevier Computers & Security, Volume 71, ISSN: 0167-4048

Teaching

10/2024 - 04/2025 Lecture: Hardware-oriented Security
Interim professorship at University of Passau. Teaching of lectures, supervision of assignments, development, conducting and correction of final exam, assignment of grades, conducting of post-exam review.
Lab course: Advanced Security Engineering Lab
Organization of lab course, development and implementation of a placement procedure, development of lab topics at University of Passau.
04/2024 - 10/2024 Lecture: Computer Architecture
Interim professorship at University of Passau. Teaching of lectures, supervision of assignments, development, conducting and correction of final exam, assignment of grades, conducting of post-exam review.
Lab course: Advanced Security Engineering Lab
Organization of lab course, development and implementation of a placement procedure, development of lab topics at University of Passau.
10/2023 - 04/2024 Lecture: Hardware-oriented Security
Interim professorship at University of Passau. Teaching of lectures, supervision of assignments, development, conducting and correction of final exam, assignment of grades, conducting of post-exam review.
Lab course: Advanced Security Engineering Lab
Organization of lab course, development and implementation of a placement procedure, development of lab topics at University of Passau.
04/2023 - 10/2023 Lecture: Computer Networks
Interim professorship at University of Passau. Teaching of lectures, supervision of assignments, development, conducting and correction of final exam, assignment of grades, conducting of post-exam review.
Lab course: Advanced Security Engineering Lab
Organization of lab course, development and implementation of a placement procedure, development of lab topics at University of Passau.
10/2022 - 04/2023 Lab course: Advanced Security Engineering Lab
Teaching assistant for organization of lab course, development and implementation of a placement procedure, development of lab topics at University of Passau.
Seminar: Master Seminar Security Engineering
Teaching assistant for development of research topics, supervision, review and grading of student papers and presentations at University of Passau.
04/2022 - 10/2022 Lab course: Advanced Security Engineering Lab
Teaching assistant for organization of lab course, development and implementation of a placement procedure, development of lab topics at University of Passau.
10/2021 - 04/2022 Lecture: IT Security
Course lecturer at Turkish-German University in Istanbul/Turkey. Acceptance of official teaching assignment ("Lehrauftrag") based on the flying faculty programme in cooperation with the German Research Foundation (DFG) and the German Academic Exchange Service (DAAD). Design of course structure and contents, teaching of lectures and exercises, design and supervision of exercises, development, conducting and correction of final exam, assignment of grades.
Lab course: Advanced Security Engineering Lab
Teaching assistant for organization of lab course, development and implementation of a placement procedure, development of lab topics at University of Passau.
04/2021 - 10/2021 Lecture: Computer Architecture
Course lecturer at University of Passau. Acceptance of official teaching assignment ("Lehrauftrag"). Design of course structure and contents, teaching of lectures, design and supervision of assignments, development, conducting and correction of final exam, assignment of grades, conducting of post-exam review.
Lab course: Advanced Security Engineering Lab
Teaching assistant for organization of lab course, development and implementation of a placement procedure, development of lab topics at University of Passau.
10/2020 - 04/2021 Lecture: IT Security
Course lecturer at Turkish-German University in Istanbul/Turkey. Acceptance of official teaching assignment ("Lehrauftrag") based on the flying faculty programme in cooperation with the German Research Foundation (DFG) and the German Academic Exchange Service (DAAD). Design of course structure and contents, teaching of lectures and exercises, design and supervision of exercises, development, conducting and correction of final exam, assignment of grades.
Lab course: Advanced Security Engineering Lab
Teaching assistant for organization of lab course, development and implementation of a placement procedure at University of Passau.
Seminar: Master Seminar Security Engineering
Teaching assistant for development of research topics, supervision, review and grading of student papers and presentations at University of Passau.
04/2020 - 10/2020 Lab course: Advanced Security Engineering Lab
Teaching assistant for organization of lab course, development and implementation of a placement procedure at University of Passau.
Seminar: Master Seminar Security Engineering
Teaching assistant for development of research topics, supervision, review and grading of student papers and presentations at University of Passau.
10/2019 - 04/2020 Lecture: Hardware-oriented Security
Course lecturer at Technical University of Darmstadt. Acceptance of official teaching assignment ("Lehrauftrag"). Design of course structure and contents, teaching of lectures, design and supervision of assignments, development, conducting and correction of final exam as well as assignment of grades, conducting of post-exam review.
Lecture: Distributed Systems
Course lecturer at Turkish-German University in Istanbul/Turkey. Acceptance of official teaching assignment ("Lehrauftrag") based on the flying faculty programme in cooperation with the German Research Foundation (DFG) and the German Academic Exchange Service (DAAD). Design of course structure and contents, teaching of lectures, design and supervision of assignments, development of final exam and assignment of grades.
Lecture: IT Security
Course lecturer at Turkish-German University in Istanbul/Turkey. Acceptance of official teaching assignment ("Lehrauftrag") based on the flying faculty programme in cooperation with the German Research Foundation (DFG) and the German Academic Exchange Service (DAAD). Design of course structure and contents, teaching of lectures, design and supervision of assignments, development of final exam and assignment of grades.
Lab course: Security Engineering Lab
Teaching assistant for organization of lab course, development and implementation of a placement procedure at Technical University of Darmstadt. Development of lab topic, supervision of lab groups, assessment and grading of assignments.
04/2019 - 10/2019 Lecture: Distributed Systems
Course lecturer at the Baden-Wuerttemberg Cooperative State University in Mannheim. Acceptance of official teaching assignment ("Lehrauftrag"). Design of course structure and contents, teaching of lectures, design and supervision of assignments, development, conducting and correction of final exam and assignment of grades, conducting of post-exam review.
Lecture: Computer Architecture
Teaching assistant for selected courses at University of Passau. Course lecturer for selected lectures, participation in the design of exercises and assignments.
10/2018 - 04/2019 Lab course: Bachelor-Praktikum
Teaching assistant for organization of lab course, development and implementation of a placement procedure at Technical University of Darmstadt.
Seminar: Privacy Enhancing Technologies
Teaching assistant for development of research topics, supervision, review and grading of student papers and presentations at Technical University of Darmstadt.
04/2018 - 10/2018 Lab course: Project Practicum
Teaching assistant for organization of lab course, development and implementation of a placement procedure at Technical University of Darmstadt.
Seminar: Privacy by Design
Teaching assistant for development of research topics, supervision, review and grading of student papers and presentations at Technical University of Darmstadt.
10/2017 - 04/2018 Lecture: Critical Infrastructure Protection
Teaching assistant for drafting, correcting and grading of exam at Technical University of Darmstadt.
Lab course: Bachelor-Praktikum
Teaching assistant for organization of lab course, development and implementation of a placement procedure. Development of lab topic, supervision of lab groups, assessment and grading of assignments at Technical University of Darmstadt.
Seminar: Privacy Enhancing Technologies
Teaching assistant for development of research topics, supervision, review and grading of student papers and presentations at Technical University of Darmstadt.
04/2017 - 10/2017 Lecture: Formal Principles of Computer Science III
Teaching assistant for correcting and grading of final exam at Technical University of Darmstadt.
Seminar: Privacy by Design
Teaching assistant for development of research topics, supervision, review and grading of student papers and presentations at Technical University of Darmstadt.
04/2012 - 10/2012 Lecture: Modelling of Heterogenous Systems
Teaching assistant for grading assignments and drafting, correcting as well as grading the exam at Technical University of Darmstadt.
10/2009 - 04/2010 Lecture: Reconfigurable Processors
Teaching assistant for grading assignments and drafting, correcting as well as grading the exam at Technical University of Darmstadt.

Supervised Theses


PhD theses
ongoing Physical Unclonable Functions on Emerging Non-Volatile Commercial-off-the-Shelf Memories
Florian Frank (co-supervised with Prof. Stefan Katzenbeisser)
Master theses
ongoing Evaluation and Refinement of a Physical Unclonable Function (PUF)
Implemented on a Flash Memory Under Nominal Conditions and Aging Stress
Abin Babu (co-supervised with Dr. Nikolaos Athanasios Anagnostopoulos)
ongoing Testing LM35 Temperature Sensors as Physical Unclonable Functions
Selma Brimah (co-supervised with Dr. Nikolaos Athanasios Anagnostopoulos)
ongoing Authentication of Ternary PUFs Using Random Forest Machine Learning
Ali Harb (co-supervised with Dr. Nikolaos Athanasios Anagnostopoulos)
11/2024 Enhancing and Securing Smart Vehicles Charging:
A Refined Proof-of-Concept Implementation Using IoTeX Technology
Abdelwahed Rebhi (co-supervised with Dr. Nikolaos Athanasios Anagnostopoulos)
11/2023 Extension of an automation Framework to test Physical Unclonable Functions
Abderezzak El Khayari (co-supervised with Florian Frank)
05/2023 Extracting physical unclonable function behaviour from non-volatile memories
under different environmental conditions: An example of FRAM and MRAM
Rihab Ziani (co-supervised with Florian Frank)
02/2023 Security Analysis of IoT Systems in Railways
Ali Fathi (co-supervised with Prof. Stefan Katzenbeisser)
10/2022 Investigation of Commercial-Off-the-Shelf Ferroelectric RAM and
Resistive RAM for their use as Physical Unclonable Functions
Basma Dakech
07/2022 Channel-based key extraction for 6G
Shoya Takebuchi
04/2022 Back-End and Management Services for a Channel Switching-Triggered Charging System
Marcelo Cajamarca Bermeo
02/2022 Implementation of a PUF Measurement and Characterization Framework
Zakaria Takki Chebihi
02/2022 Implementation and Investigation of a Real-World Stream
Encryption Mechanism Based on Synchronised Chua Chaotic Circuits
Emiliia Nazarenko (co-supervised with Nikolaos A. Anagnostopoulos)
11/2021 PUF Implementations on Resistive and Magnetoresistive Random Access Memory
Yuki Okumura
08/2014 Design und Implementierung einer plattformunabhängigen software-basierten IPTV Set-Top-Box
Stefan Pöschel
10/2012 A Novel Set-Top-Box Architecture Providing Dynamically Reconfigurable Security Components
Leonardo Solis-Vasquez, ERASMUS - Politecnico di Torino (co-supervised with Thomas Feller)
Diploma theses
11/2013 Hardware-based Measures against Packet Loss in Streaming Applications
Konrad Stahlschmidt
Bachelor theses
06/2019 Authenticated Train Localization based on Track Ballast Imagery
Fatma Çağı
05/2019 IMS Integration of a Channel Switching-Triggered Charging System
Tobias Wies
03/2012 Implementierung einer IPTV Set-Top-Box mit Hilfe eines FPGA-Entwicklungsboards
Björn Alexander Flubacher
01/2012 MPEG2-TS MUX / DEMUX mit Sicherheitsfunktionen für DVB-IPTV
Patrick Neugebauer
Other
09/2013 Extensions on an FPGA-based Multiplexer Design
Goutham Samala
11/2011 Dynamic routing setup for multicast traffic
Sarmad Javed
08/2011 System on a chip set-top box for IPTV
Zuhaib Ahmed Chohan
05/2011 Traffic shaping, quality of service and resilience for IPTV traffic transport in multicast
Evgeny Bubnov

Projects

Ongoing
NANOSEC2
Nanomaterial-based platform electronics for PUF circuits with extended entropy sources
sponsor DFG
period 3y
funding €600k
DFG Logo In this project we investigate the potential of advanced NanoMaterial (NM) circuits manufactured in a modular platform technology to serve as Physical Unclonable Functions (PUFs) with enhanced properties. We will implement various entropy sources making use of the fact that NM-based FETs can be significantly manipulated by their environment and interface. [continue]
This determines the FET characteristic and in case of charge traps hysteretic switching behavior. We will pursue nanocavities in the Carbon-NanoTube Field-Effect Transistor (CNT-FET) structures to induce discrete modification of the gate architecture in order to further increase the entropy of the CNT-PUF. This enables quaternary PUFs with four distinct types of PUF cells, namely conducting, semiconducting, altered semiconducting, and non-conducting cells.

We will also investigate configurable CNT-FET circuits to provide an even higher level of entropy, by tuning the hysteresis characteristics. Furthermore, we will examine cell selective erasability of the manufactured Circuit-PUFs, disallowing an attacker from accessing the inherent PUF secret in a low-cost manner. Building upon our previous works on non-invasive attacks against CNT-based PUFs, we will also test the resilience of the constructed CNT-PUFs against side-channel and fault-injection attacks.
6G Research and Innovation Cluster (6G-RIC)
Research and innovation network for sixth-generation mobile communications
sponsor BMBF
period 4y
funding €50m
Logo of 6G-RIC project In a digital economy and society, communication systems are the central nervous system. In order to be able to shape the digital future, it is crucial for Germany to be able to act with technological sovereignty. [continue]
An important prerequisite for digital and technological sovereignty is to help define and appropriately implement the complex standardisation and security requirements for core components and critical systems in future communication networks. The discussions on the development of the 5G network have emphasised the high relevance of key technologies in the field of mobile communications. In order to act with sovereignty, it is important that Germany and Europe play a decisive role in shaping technological development and not just utilise technology. When shaping the technological foundations of 6G, it is crucial that Germany plays a strong role in order to be at the forefront of the international research that is already underway. It is particularly important to strengthen networking and cooperation between all relevant players.

The ‘6G Research and Innovation Cluster - 6G-RIC’ project aims to develop mobile radio systems that use open interfaces across all technology boundaries. The systems are intended to provide essential building blocks for the future 6G standard. In addition to maximum network performance, important design criteria include security, cost efficiency and, above all, energy efficiency. The research team is pursuing a holistic approach that is based on new metrics for energy consumption and encompasses all relevant hardware and software components - including energy-efficient algorithms for artificial intelligence (AI). In addition, concepts for computing resources distributed across the network are to be developed that enable data to be transferred to users or between machines over short distances and thus processed more quickly. Components for transmitters and receivers are being researched, for example to make sub-terahertz frequency bands usable for mobile communications for the first time. Research is also being carried out into how basic functionalities of the radio access network can be implemented with software on virtualised platforms. AI approaches are being used to realise a self-learning 6G network that also recognises misconfigurations and anomalies. In addition to the actual technology development, the development of a powerful test infrastructure is at the centre of the planned work.

The broad range of partners in the 6G-RIC project will create an open ecosystem for innovation and venture culture that will help shape the dynamic, data-driven telecommunications and services markets of the future. The test infrastructure created in the project will make it possible to test the new technology components under realistic and open conditions in order to accelerate the direct transfer of knowledge and technology. The intended modularisation, virtualisation and openness of the 6G technologies to be developed will also make it possible for small and medium-sized companies to actively participate in the telecommunications market and develop disruptive innovations. The project is thus making a significant contribution to strengthening Germany's technological and digital sovereignty.
AUTOtech.agil
Architecture and technologies for orchestrating automotive agility
sponsor BMBF
period 3y
funding €24.12m
Logo of autotech.agil project Digitalisation enables vehicles to be automated and networked, opening up new options in mobility. This development will be accompanied by a rapidly growing volume of data in the vehicle, which must be processed in near real time. [continue]
The high demands on computing power, flexibility and efficiency require new approaches in microelectronics as well as in computing and software architecture. In order to achieve these goals, the strategic projects of the ‘MANNHEIM’ funding guideline as part of the ‘Future Fund for the Automotive Industry’ will research high-performance computing platforms, innovative vehicle architectures and future-proof software development processes and methods.

The aim of AUTOtech.agil is to work closely with companies and universities to develop an open software and electrics/electronics architecture as well as associated tools for the mobility system of the future. These should not only be usable in driverless vehicles, but also in highly assisted vehicles or other mobility concepts such as delivery robots or intelligent e-bikes. A particular focus is therefore on standardising interfaces and being able to reuse, update and expand individual functional modules with the aim of sustainability. The results of the UNICARagil project funded by the German Federal Ministry of Education and Research will be used as the foundation for this project.

The safety-qualified service-orientated software architecture and other technologies researched in the project allow companies and researchers to develop safe functions more quickly. The aim is to create an open development platform that enables, among other things, learning networked traffic intelligence for the future of mobility. Shorter innovation cycles and continuous updates in the product life cycle will create an important building block for future mobility systems.


Completed
UNICARagil
Disruptive Modular Architecture for Agile Automated Vehicle Concepts
sponsor BMBF
period 4y
funding €27m
Logo of UnicarAgil project Autonomous electric vehicles will play a key role in overcoming the challenges arising from the increasing demand for mobility and ongoing urbanisation. They create the basis for sustainable and intelligent road traffic, innovative mobility and transport concepts as well as improvements in road safety and quality of life in urban areas. [continue]
The UNICARagil project is developing fully driverless electric vehicles based on the latest results of research into automated and connected driving and electromobility. The basis for this is a modular and scalable vehicle concept consisting of a payload and drive unit. It can be flexibly adapted to a wide range of applications in logistics and passenger transport, which can be developed in particular by driverless, emission-free vehicles.

The core element of the research and development work is the functional vehicle architecture, which is networked with the cloud, the road infrastructure and a sensor drone. Other focal points are the development of generic sensor modules for environment detection, a flexibly expandable and updatable software and hardware architecture as well as highly dynamic wheel hub drives that enable completely new forms of movement in road traffic. The project will conclude with a demonstration in four different applications on test fields in Germany.

The project offers the opportunity for a wide range of innovations in components and systems for autonomous electric cars and in the implementation of automated driving functions. UNICARagil is thus making a substantial contribution to increasing Germany's innovative strength in autonomous electric driving. In addition, interdisciplinary research, development and teaching at several scientific locations in Germany are systematically interlinked and strengthened within the project.
PUFMem
Intrinsic Physical Unclonable Functions from Emerging Non-Volatile Memories
sponsor DFG
period 3y
funding €330k
DFG Logo Recent developments have led to the proliferation of resource constrained devices that undertake increasingly extensive and decisive tasks. Based on physical process variations during semiconductor manufacturing, memory-based physical unclonable functions (PUFs) provide lightweight, cost-efficient, and flexible hardware-based security primitives to protect these devices. [continue]
Concurrently with these trends, the integration density of circuits is approaching the so-called scaling limit, where structures become so small that the saved information are hard to retrieve and that consequently brings novel non-volatile memory (NVM) types to the scene. In this project, we investigate the realization of intrinsic PUFs on commercially available NVMs in the form of magnetoresistive (MRAM), resistive (ReRAM) and ferroelectric (FRAM) random access memory. For MRAM, a relatively high number of approaches to implement extrinsic PUFs showcased on custom memory cells exists in related literature. Hence to obtain new findings, we will initially refine existing methods to realize intrinsic PUF instances on off-the-shelf MRAM. Methods for realizing PUFs on ReRAM, so far, are covered to a lesser extent in related works. Therefore at first, we will perform experiments on custom-tailored ReRAM memory cells.

In this way, we are able to vary different physical properties of memory cells and can directly test their impact on PUF behavior. In the next step, we will use previously gained insights and transfer successful strategies to off-the-shelf ReRAM modules. Finally, we will focus on FRAMs, for which no generally known works about operational PUF instances have been publicized. Therefore, we will use the experience gained over the course of the project to find suitable ways to excite characteristic behavior on FRAM. All obtained PUF instances will be systematically characterized according to established quality metrics.

As PUFs from conventional memories are susceptible to varying temperature and supply voltage as well as magnetic fields and radiation, different environmental conditions for the characterization of PUF instances on NVMs will be created. In the next step, we will quantify the results and apply advanced techniques such as protocols, error correcting codes, stochastic models etc. to improve PUF quality and resilience to influences from the environment. In particular when used as random access memory in present-day computers, credentials and results of cryptographic operations are directly accessible on NVMs due to their inherent storage properties. We plan to overcome this drawback by employing self-encryption, where the same NVM is used for 2 different purposes: as a memory to store data and as a PUF for retrieving the key to encrypt this data.
NANOSEC
Tamper-Evident PUFs based on Nanostructures for Secure and Robust HW Security Primitives
sponsor DFG
period 3y
funding €250k
DFG Logo In recent years, pronounced trends like the Internet of Things or 5G has led to more and more connected and digitalized cyber-physical systems. This results in an increased demand on embedded dedicated hardware security. [continue]
Hence, unclonable, unpredictable and tamper-evident hardware security primitives, such as Physical Unclonable Functions (PUFs), became more and more important, since any software-only security solution can easily be defeated in case an attacker has full access to the device.

In this tandem-project, we will investigate the suitability of nanomaterial-based devices such as Carbon Nanotube based field-effect transistors (CNT-FETs) for hardware security primitives featuring high entropy and robustness along with inherent tamper-evidence capabilities. Going beyond state of the art, we investigate important security characteristics like error correction, reliability, and tamper-evidence mechanisms of CNT-based PUFs. These investigations will induce novel insights regarding the applicability of such PUFs for forthcoming system integration technologies and in the emerging field of flexible/wearable electronics. We will cover technological developments for CNT-based PUFs and investigate different device designs which internalize multibit functionality as well as tamper-evidence. The realized PUFs will be subjected to an in-depth analysis exposing suitable error correction models to enable the extraction of stable PUF responses.
Haselnuss
Security for Next-Generation Railway Control and Safety
sponsor BMBF
period 3y
funding €3m
Logo of Haselnuss project Digitalisation increases the risk of cyber attacks on the railway infrastructure. In the BMBF project HASELNUSS, a research network is developing a hardware-based security platform adapted to the special requirements of the Deutsche Bahn. [continue]
Information technology (IT) is increasingly being used to introduce new functionalities and to increase process efficiency in railway facilities. As a result of the digitalisation of the railway infrastructure and the linking up of control and security technology, however, the risk of cyber attacks is also increasing. Since the railway systems are also part of the critical infrastructures in Germany, they are correspondingly strictly regulated by IT security law. This digital transformation of the railway leads to new requirements for IT-based systems in the railway sector and requires new IT security solutions.

The aim of the HASELNUSS research project is to develop a hardware-based security platform for control and security technology that is adapted to the special requirements of the railways and provides the necessary IT security functions without influencing functional security. The platform offers measures to ensure system integrity and forms the basis for secure networking of the railway infrastructure.

The HASELNUSS architecture is based on a hardware security module of the latest generation, the "Trusted Platform Module (TPM) 2.0", which serves as a security anchor, and the microkernel-based operating system PikeOS, which allows a secure coexistence of critical and non-critical applications and is easy to verify. On this basis, services for secure patch and update management, health monitoring, anomaly and attack detection are implemented. The developed security platform will then be implemented in demonstrators and practically tested in the DB Netz AG test centre and in the Darmstadt railway operations field.

The Fraunhofer Institute for Secure Information Technology in Darmstadt coordinates the project. A team from the University of Passau under the direction of Prof. Dr. Stefan Katzenbeisser, Chair of Computer Engineering, is involved in the project. The Federal Ministry of Education and Research (BMBF) is funding the project over a period of 3 years.
CYSIS
Cyberyscurity for Critical Infrastructures
sponsor DB
sponsor TUD
period 3y
Logo of Cysis project The CYSIS working group was established by Deutsche Bahn AG and TU Darmstadt within the framework of the Innovation Alliance and the existing DB RailLab on 25 January 2016. The purpose of the group is to discuss the cybersecurity challenges faced by the increasing digitalisation of the railway sector. [continue]
CYSIS forms a basis for an intensive exchange of information between industry and academia in the railway sector, in order to benefit from each other's knowledge. Effective defense mechanisms and countermeasures are investigated with the assistance of partners from academia. CYSIS regularly publishes whitepapers and technical guidelines. CYSIS consists of the following subgroups:
  • Resilient Architectures: The group discussed resilient architecturesfor railway signalling. A whitepaper has been published. It presents requirements for signalling systems in order to be prepared against cyberattacks.
  • Business Continuity Management: The operators of signalling systems need to be prepared for dealing with attacks. Concepts are developed to maintain a minimum of train operation even under attack.
  • Security for Safety: Train operation needs to be security aware. To build security in future interlocking systems, design decisions have to be made now. The decisions cover the system architecture, the lifecycle, the operation and the homologation process. The subgroup created a whitepaper and a short version was published in Signal + Draht 5/2018 in English and German.
  • ETCS and Security: Security aspects of the European Train Control System (ETCS) are investigated. It is currently the only signalling system in Germany that utilizes wireless information transmission, which has a significantly larger attack surface.
  • Holistic Security: Typically, security is regarded separately in railway signalling, rolling stock, and fixed installations. For a strong security concept, a holistic approach is required that includes the consideration of all three parts together.
  • Internet of Railway Things: The group discusses essential security aspects of railway IoT by means of two realistic use cases. The security includes security requirements, attack vectors, threats, countermeasures, security architectures, and more.
PUFFIN
Physically Unclonable Functions found in Standard PC Components
sponsor EC-FP7
period 3y
funding €1.3m
Logo of Puffin project Physically Unclonable Functions (PUFs) are used to uniquely identify electronic components and to protect valuable objects against counterfeiting. They allow creating a root of trust in a hardware system through generating device-unique “fingerprints” and deriving secret keys from the underlying physical properties of the silicon. [continue]
Today they are typically found in specially designed hardware components and result from the silicon properties of individual transistors. They exist in many forms, among which are the so-called SRAM PUFs. The Physically unclonable functions found in standard PC components (PUFFIN) project intends to study and show the existence of SRAM PUFs and other types of PUFs in standard PCs, laptops, mobile phones and consumer electronics. This has not been attempted so far. The mere existence of physical properties that depend on a component and are reproducible is only the first step to guarantee appropriate robustness, reliability and randomness properties for use as secret keys or trust anchors in mass-market applications.

Contact

You can follow my work through the following platforms
(Please note that linked external websites may process personal data and
all product names, logos, and brands are the property of their respective owners and
their use does not imply endorsement) :



For professional inquiries, please use the following email address:
[forename][dot][surname][at]uni[dash]passau[dot]de.

Prof. Dr.-Ing. Tolga Arul
Chair of Digital Security
Faculty of Computer Science and Mathematics
University of Passau
Room ITZ 116
Innstraße 43
94032 Passau

phone : +49(0)851 509 3044
web : https://tiny.cc/TolgaArul