- Cryptographic Implementations and Security
- Physical Unclonable Functions (PUFs) and Hardware Security
- Security and Verification in Computing
- Gaze Tracking and Assistive Technology
- IoT and Edge/Fog Computing
- Advanced Optical Sensing Technologies
- Advanced Malware Detection Techniques
- Vehicular Ad Hoc Networks (VANETs)
- Advanced Authentication Protocols Security
- Energy Efficient Wireless Sensor Networks
- Chaos-based Image/Signal Encryption
- Coding theory and cryptography
Fraunhofer Institute for Applied and Integrated Security
2013-2019
Ruhr University Bochum
2008
This paper presents an implementation of trusted boot for embedded systems. While in PCs the computing hardware functionality is spread over CPU, memory controller hub (MCH), IO (ICH) and Trusted Platform Module (TPM), systems it desirable to integrate whole one system on chip. Our a two-processor design with LEON3 open source soft cores (SPARC V8 instruction set), coupled AHB interface. One processors acts as application processor, other `secure' coprocessor. The processor synthesized ROM...
Modern FPGA System-on-Chips (SoCs) combine high performance application processors with reconfigurable hardware. This allows to enhance complex software systems hardware accelerators. Unfortunately, even when state-of-the-art security mechanisms are implemented, this combination creates new threats. Attacks on the now possible through as these cores share resources processor and may contain unwanted functionality. In paper, we discuss protection offered in conventional SoCs how they can be...
Systems with mixed and independent levels of security safety become more important in the future. In German funded Bundesministerium fur Bildung und Forschung (BMBF) research project ARAMiS (Automotive, Railway Avionic Multicore Systems) different industry scientific partners concerned on using multi-core processor for critical use-cases. This paper describes motivation use-cases behind actives mobility domains. Also two detailed descriptions a comparison implementation Multiple Independent...
Wireless Sensor Networks (WSNs) often lack interfaces for remote debugging. Thus, fault diagnosis and troubleshooting are conducted at the deployment site. Currently, WSN operators dedicated tools that aid them in this process. Therefore, we introduce EyeSec, a tool monitoring maintenance field. An Augmented Reality Device (AR Device) identifies sensor nodes using optical markers. Portable Sniffer Units capture network traffic extract information. With those data, AR topology data flows...
Wireless Sensor Networks (WSNs) often lack interfaces for remote debugging. Thus, fault diagnosis and troubleshooting are conducted at the deployment site. Currently, WSN operators dedicated tools that aid them in this process. Therefore, we introduce EyeSec, a tool monitoring maintenance field. An Augmented Reality Device (AR Device) identifies sensor nodes using optical markers. Portable Sniffer Units capture network traffic extract information. With those data, AR topology data flows...