Showing 1 - 13 results of 13 for search 'Giechaskiel, I', query time: 0.04s
Refine Results
-
1
An evaluation of the effects of broken cryptographic primitives on Bitcoin by Giechaskiel, I
Published 2015Working paper -
2
Eavesdropping on and emulating MIFARE Ultralight and Classic cards using software-defined radio by Giechaskiel, I
Published 2015Working paper -
3
Leaky hardware: modeling and exploiting imperfections in embedded devices by Giechaskiel, I
Published 2019Thesis -
4
Taxonomy and challenges of out-of-band signal injection attacks and defenses by Giechaskiel, I, Rasmussen, KB
Published 2019Journal article -
5
Reading between the dies: cross-SLR covert channels on multi-tenant cloud FPGAs by Giechaskiel, I, Rasmussen, K, Szefer, J
Published 2019Conference item -
6
When the crypto in cryptocurrencies breaks: Bitcoin security under broken primitives by Giechaskiel, I, Cremers, C, Rasmussen, K
Published 2018Journal article -
7
Measuring long wire leakage with ring oscillators in cloud FPGAs by Giechaskiel, I, Rasmussen, K, Szefer, J
Published 2019Conference item -
8
Leaky wires: information leakage and covert communication between FPGA long wires by Giechaskiel, I, Rasmussen, K, Eguro, K
Published 2018Conference item -
9
CAPSULe: Cross-FPGA covert-channel attacks through power supply unit leakage by Giechaskiel, I, Rasmussen, KB, Szefer, J
Published 2020Conference item -
10
Leakier wires: exploiting FPGA long wires for covert- and side-channel attacks by Giechaskiel, I, Eguro, K, Rasmussen, KB
Published 2019Journal article -
11
On bitcoin security in the presence of broken cryptographic primitives by Giechaskiel, I, Cremers, C, Rasmussen, K
Published 2016Conference item -
12
A framework for evaluating security in the presence of signal injection attacks by Giechaskiel, I, Zhang, Y, Rasmussen, K
Published 2019Conference item -
13
Fingerprinting cloud FPGA infrastructures by Tian, S, Xiong, W, Giechaskiel, I, Rasmussen, KB, Szefer, J
Published 2020Conference item