Nikolaos Athanasios Anagnostopoulos

ORCID: 0000-0003-0243-8594
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Advanced Memory and Neural Computing
  • Integrated Circuits and Semiconductor Failure Analysis
  • Neuroscience and Neural Engineering
  • Security and Verification in Computing
  • Advanced Malware Detection Techniques
  • Chaos control and synchronization
  • Electrostatic Discharge in Electronics
  • Chaos-based Image/Signal Encryption
  • Cryptographic Implementations and Security
  • Advanced Authentication Protocols Security
  • Adversarial Robustness in Machine Learning
  • Vehicular Ad Hoc Networks (VANETs)
  • Cellular Automata and Applications
  • IoT Networks and Protocols
  • Cell Image Analysis Techniques
  • User Authentication and Security Systems
  • Radiation Effects in Electronics
  • Bluetooth and Wireless Communication Technologies
  • Internet Traffic Analysis and Secure E-voting
  • Wireless Body Area Networks
  • Neural dynamics and brain function
  • Intellectual Property and Patents
  • Ferroelectric and Negative Capacitance Devices
  • Innovation Policy and R&D

University of Passau
2019-2025

Technical University of Darmstadt
2016-2022

Merck (Germany)
2022

Laboratoire d'Informatique de Paris-Nord
2022

Hesse (Germany)
2018

Physically Unclonable Functions (PUFs) have become an important and promising hardware primitive for device fingerprinting, identification, or key storage. Intrinsic PUFs leverage components already found in existing devices, unlike extrinsic silicon PUFs, which are based on customized circuits that involve modification of hardware. In this work, we present a new type memory-based intrinsic PUF, leverages the Rowhammer effect DRAM modules - PUF. Our PUF makes use bit flips, occur cells due...

10.1109/hst.2017.7951729 preprint EN 2017-05-01

A Physically Unclonable Function (PUF) is a unique and stable physical characteristic of piece hardware, which emerges due to variations in the hardware fabrication processes. Prior works have demonstrated that PUFs are promising cryptographic primitive can enable secure key storage, hardware-based device authentication identification. So far, most PUF constructions required an addition new or FPGA implementation for their operation. Recently, intrinsic PUFs, be found commodity devices, been...

10.1109/tdsc.2018.2822298 article EN IEEE Transactions on Dependable and Secure Computing 2018-04-06

Counterfeit copycat devices have become one of the most important problems in IoT ecosystem. The number manufactured has grown exponentially through last years. In order to be competitive terms production cost, they usually need assemble by using ready components built other manufacturers. This scheme results a high risk that produced do not function properly due malfunctioning components. can either related component manufacturers trying minimize costs or even malicious practices for...

10.1145/3312614.3312650 article EN 2019-04-08

In the Internet of Things (IoT), Low-Power Wide-Area Networks (LPWANs) are designed to provide low energy consumption while maintaining a long communications’ range for End Devices (EDs). LoRa is communication protocol that can cover wide with consumption. To evaluate efficiency Network (LoRaWAN), three criteria be considered, namely, Packet Delivery Rate (PDR), Energy Consumption (EC), and coverage area. A set transmission parameters have configured establish link. These affect data rate,...

10.3390/s23042363 article EN cc-by Sensors 2023-02-20

Recent developments have increased the demand for adequate security solutions, based on primitives that cannot be easily manipulated or altered, such as hardware-based primitives. Security Dynamic Random Access Memory (DRAM) can provide cost-efficient and practical especially resource-constrained devices, hardware used in Internet of Things (IoT), DRAMs are an intrinsic part most contemporary computer systems. In this work, we present a comprehensive overview literature regarding DRAM-based...

10.3390/cryptography2020007 article EN cc-by Cryptography 2018-03-28

In this work, we present the first systematic study of data remanence effects on an intrinsic Static Random Access Memory Physical Unclonable Function (SRAM PUF) implemented a commercial off-the-shelf (COTS) device in temperature range between –110 degrees Celsius and –40 Celsius. Based our experimental results, propose new type attack against SRAM PUFs, which takes advantage exhibited due to low temperatures. We demonstrate that is highly resistant memory erasure techniques can be used...

10.1109/dsd.2018.00102 article EN 2018-08-01

In this work, we explore a highly robust and unique Physical Unclonable Function (PUF) based on the stochastic assembly of single-walled Carbon NanoTubes (CNTs) integrated by cost-efficient printing approach 200mm silicon wafers. PUFs are hardware security primitives that leverage small physical variations to generate device fingerprints hard simulate or clone. Our work demonstrates exceptionally CNT-based exhibiting uniform distribution 53.8% 0s 46.2% 1s with an average fractional...

10.1109/nano58406.2023.10231160 article EN 2023-07-02

In the last years, researchers have exposed vulnerabilities on modern road vehicles that may severe safety implications. Specifically, most popular in-vehicle communication protocol CAN is prone to spoofing attacks. As a consequence, various security frameworks been published, in order both authenticate and encrypt data vehicular buses. However, key management has often neglected. Cryptographic keys are frequently hard coded, their authenticity not verified updates possible at all....

10.1109/vnc48660.2019.9062785 article EN 2019-12-01

A Physical Unclonable Function (PUF) exploits de-vice manufacturing variations to extract a number of unique responses, each which corresponds specific challenge, and use them for secret generation as well authentication. However, these responses are often excessively noisy In this study, in order avoid using complicated costly Error Correction Code (ECC) the context fuzzy extractor, we propose Machine Learning (ML)-based classification technique that works accurately even presence corrupted...

10.1109/host54066.2022.9839919 article EN 2022-06-27

In this work, we present a novel way in which DRAM modules, are found inherently many IoT devices, can be used to enhance the security of such devices. We test robustness two DRAM-based primitives, namely retention-based PUFs and Row Hammer PUFs, external factors, i.e., ambient temperature voltage variations. As both types proven highly dependent on temperature, we, then, discuss ways implement cryptographic applications robust way, no longer being affected by Finally, also proof-of-concept...

10.1109/giis.2018.8635789 article EN 2018-10-01

In recent years, the ubiquitous nature of Internet-of-Things (IoT) applications as well pervasive character next-generation communication protocols, such 5G technology, have become widely evident. this work, we identify need for low-cost security in current and IoT networks address demand through implementation, testing, validation an intrinsic low-overhead hardware-based primitive within inherent network component. particular, Physical Unclonable Function (PUF) is implemented peripheral...

10.1145/3406280 article EN ACM Transactions on Internet Technology 2020-08-31

Recently, researchers have demonstrated how the lack of security features in road vehicles may allow adversaries to take over partial or even full control. Specifically, in-vehicle communication protocols are prone attacks, because no mechanisms been developed for them. For a long time, they optimized only towards safety, order guarantee high degree reliability, robustness and real-time behavior. In this work, we focus on FlexRay, an automotive protocol whose core properties strong...

10.1145/3312614.3312626 article EN 2019-04-08

Today's ubiquitous IoT devices make spying on, and collecting data from, unsuspecting users possible. This paper shows a new attack where DRAM modules, widely used in devices, can be abused to measure the temperature vicinity of device order spy on user's behavior. Specifically, dependency decay is as proxy for behavior device. The performed remotely by only changing software an device, without requiring hardware changes, with resolution reaching 0.5°C. Potential defenses are presented this well.

10.23919/date.2019.8714882 article EN Design, Automation & Test in Europe Conference & Exhibition (DATE), 2015 2019-03-01

Physical Unclonable Functions (PUFs) based on the retention times of cells a Dynamic Random Access Memory (DRAM) can be utilised for implementation cost-efficient and lightweight cryptographic protocols. However, as recent work has demonstrated, needed in order to generate their responses may prohibit widespread usage. To address this issue, Row Hammer PUF been proposed by Schaller et al., which leverages row hammer effect DRAM modules reduce and, therefore, significantly speed up generation...

10.3390/cryptography2030013 article EN cc-by Cryptography 2018-06-30

In recent years, a new generation of the Internet Things (IoT 2.0) is emerging, based on artificial intelligence, blockchain technology, machine learning, and constant consolidation pre-existing systems subsystems into larger systems. this work, we construct examine proof-of-concept prototype such system systems, which consists heterogeneous commercial off-the-shelf components, utilises diverse communication protocols. We recognise inherent need for lightweight security in context, address...

10.1145/3458824 article EN ACM Journal on Emerging Technologies in Computing Systems 2021-06-30

The ubiquity and pervasiveness of modern Internet Things (IoT) devices opens up vast possibilities for novel applications, but simultaneously also allows spying on, collecting data from, unsuspecting users to a previously unseen extent. This paper details new attack form in this vein, which the decay properties widespread, off-the-shelf DRAM modules are exploited accurately spy on temperature vicinity DRAM-carrying device. Among others, enables adversaries remotely purely digitally personal...

10.1109/tifs.2023.3271252 article EN IEEE Transactions on Information Forensics and Security 2023-01-01

This work studies the effects of thermal stress on Dynamic Random-Access Memory (DRAM) retention-based Physical Unclonable Functions (PUFs) based Commercial Off-The-Shelf (COTS) Single-Board Computer (SBC) modules. Our results show that prolonged stress, in general, leads to a decrease entropy responses this PUF (as number bit flips is reduced) and loss its reliability taken before after has been applied do not adequately match each other). Nevertheless, we note as time passes stop applying...

10.1109/icce59016.2024.10444494 article EN 2023 IEEE International Conference on Consumer Electronics (ICCE) 2024-01-06

Authentication is the act of proving that an integrated circuit (IC) not counterfeit. One application a physical unclonable function (PUF) to authenticate identity chip using raw bits memory. However, several previous works present machine learning-based modeling attacks on PUFs. To alleviate this issue, we propose novel authentication scheme involving unique DRAM power-up values deep convolutional neural network (CNN). This methodology eliminates need for PUFs and can technology accurately...

10.1109/mce.2020.3002528 article EN IEEE Consumer Electronics Magazine 2020-06-15

The long-range and low energy consumption re-quirements in Internet of Things (IoT) applications have led to a new wireless communication technology known as Low Power Wide Area Network (LPWANs). In recent years, the Long Range (LoRa) protocol has gained lot attention one most promising technologies LPWAN. Choosing right combination transmission parameters is major challenge LoRa networks. LoRa, an Adaptive Data Rate (ADR) mechanism executed configure each End Device's (ED) trans-mission...

10.1109/wimob55322.2022.9941614 article EN 2022-10-10
Coming Soon ...