default search action
Patrick Koeberl
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c18]Patrick Koeberl:
Multi-tenant FPGA Security: Challenges and Opportunities. FPGA 2020: 23
2010 – 2019
- 2017
- [c17]Ghada Dessouky, Shaza Zeitouni, Thomas Nyman, Andrew Paverd, Lucas Davi, Patrick Koeberl, N. Asokan, Ahmad-Reza Sadeghi:
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware. DAC 2017: 24:1-24:6 - [i1]Ghada Dessouky, Shaza Zeitouni, Thomas Nyman, Andrew Paverd, Lucas Davi, Patrick Koeberl, N. Asokan, Ahmad-Reza Sadeghi:
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware. CoRR abs/1706.03754 (2017) - 2016
- [j2]Shaza Zeitouni, Yossef Oren, Christian Wachsmann, Patrick Koeberl, Ahmad-Reza Sadeghi:
Remanence Decay Side-Channel: The PUF Case. IEEE Trans. Inf. Forensics Secur. 11(6): 1106-1116 (2016) - 2015
- [c16]Ferdinand Brasser, Brahim El Mahjoub, Ahmad-Reza Sadeghi, Christian Wachsmann, Patrick Koeberl:
TyTAN: tiny trust anchor for tiny devices. DAC 2015: 34:1-34:6 - [c15]Lucas Davi, Matthias Hanreich, Debayan Paul, Ahmad-Reza Sadeghi, Patrick Koeberl, Dean Sullivan, Orlando Arias, Yier Jin:
HAFIX: hardware-assisted flow integrity extension. DAC 2015: 74:1-74:6 - [c14]Patrick Koeberl, Vinay Phegade, Anand Rajan, Thomas Schneider, Steffen Schulz, Maria Zhdanova:
Time to Rethink: Trust Brokerage Using Trusted Execution Environments. TRUST 2015: 181-190 - 2014
- [c13]Lucas Davi, Patrick Koeberl, Ahmad-Reza Sadeghi:
Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation. DAC 2014: 133:1-133:6 - [c12]Sudhir Satpathy, Sanu Mathew, Jiangtao Li, Patrick Koeberl, Mark A. Anders, Himanshu Kaul, Gregory K. Chen, Amit Agarwal, Steven Hsu, Ram Krishnamurthy:
13fJ/bit probing-resilient 250K PUF array with soft darkbit masking for 1.94% bit-error in 22nm tri-gate CMOS. ESSCIRC 2014: 239-242 - [c11]Patrick Koeberl, Steffen Schulz, Ahmad-Reza Sadeghi, Vijay Varadharajan:
TrustLite: a security architecture for tiny embedded devices. EuroSys 2014: 10:1-10:14 - [c10]Patrick Koeberl, Jiangtao Li, Anand Rajan, Wei Wu:
Entropy loss in PUF-based key generation schemes: The repetition code pitfall. HOST 2014: 44-49 - 2013
- [c9]Patrick Koeberl, Ünal Koçabas, Ahmad-Reza Sadeghi:
Memristor PUFs: a new generation of memory-based physically unclonable functions. DATE 2013: 428-431 - [c8]Patrick Koeberl, Jiangtao Li, Wei Wu:
A Spatial Majority Voting Technique to Reduce Error Rate of Physically Unclonable Functions. INTRUST 2013: 36-52 - 2012
- [j1]Patrick Koeberl, Jiangtao Li, Roel Maes, Anand Rajan, Claire Vishik, Marcin Wójcik, Wei Wu:
A practical device authentication scheme using SRAM PUFs. J. Cryptogr. Eng. 2(4): 255-269 (2012) - [c7]Roel Maes, Vladimir Rozic, Ingrid Verbauwhede, Patrick Koeberl, Erik van der Sluis, Vincent van der Leest:
Experimental evaluation of Physically Unclonable Functions in 65 nm CMOS. ESSCIRC 2012: 486-489 - 2011
- [c6]Ilze Eichhorn, Patrick Koeberl, Vincent van der Leest:
Logically reconfigurable PUFs: memory-based secure key storage. STC@CCS 2011: 59-64 - [c5]Patrick Koeberl, Jiangtao Li, Roel Maes, Anand Rajan, Claire Vishik, Marcin Wójcik:
Evaluation of a PUF Device Authentication Scheme on a Discrete 0.13um SRAM. INTRUST 2011: 271-288 - [c4]Patrick Koeberl, Jiangtao Li, Anand Rajan, Claire Vishik, Wei Wu:
A Practical Device Authentication Scheme Using SRAM PUFs. TRUST 2011: 63-77 - 2010
- [c3]Timothy Casey, Patrick Koeberl, Claire Vishik:
Threat agents: a necessary component of threat analysis. CSIIRW 2010: 56 - [c2]Timothy Casey, Patrick Koeberl, Claire Vishik:
Defining Threat Agents: Towards a More Complete Threat Analysis. ISSE 2010: 214-225 - [c1]Patrick Koeberl, Jiangtao Li, Anand Rajan, Claire Vishik:
Silicon PUFs in Practice. ISSE 2010: 300-311
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint