


default search action
David F. Oswald
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c36]Mo Zhang
, Eduard Marin
, Mark Ryan
, Vassilis Kostakos
, Toby Murray
, Benjamin Tag
, David F. Oswald
:
OOBKey: Key Exchange with Implantable Medical Devices Using Out-Of-Band Channels. ARES 2024: 191:1-191:13 - [c35]Kit Murdock
, Martin Thompson
, David F. Oswald
:
FaultFinder: Lightning-fast, Multi-architectural Fault Injection Simulation. ASHES@CCS 2024: 78-88 - [c34]Fritz Alder, Lesly-Ann Daniel, David F. Oswald
, Frank Piessens, Jo Van Bulck:
Pandora: Principled Symbolic Validation of Intel SGX Enclave Runtimes. SP 2024: 4163-4181 - 2023
- [j12]Zitai Chen, David F. Oswald
:
PMFault: Faulting and Bricking Server CPUs through Management Interfaces Or: A Modern Example of Halt and Catch Fire. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(2): 1-23 (2023) - [c33]Owen Pemberton
, David F. Oswald
:
BioLeak: Exploiting Cache Timing to Recover Fingerprint Minutiae Coordinates. ASHES@CCS 2023: 61-72 - [c32]Abdulla Aldoseri
, Tom Chothia
, José Moreira
, David F. Oswald
:
Symbolic modelling of remote attestation protocols for device and app integrity on Android. AsiaCCS 2023: 218-231 - [c31]Thomas Van Strydonck, Job Noorman, Jennifer Jackson, Leonardo Alves Dias, Robin Vanderstraeten, David F. Oswald
, Frank Piessens, Dominique Devriese
:
CHERI-TrEE: Flexible enclaves on capability machines. EuroS&P 2023: 1143-1159 - [i5]Zitai Chen, David F. Oswald:
PMFault: Faulting and Bricking Server CPUs through Management Interfaces. CoRR abs/2301.05538 (2023) - 2022
- [j11]Fritz Alder
, Jo Van Bulck
, Jesse Spielman, David F. Oswald, Frank Piessens:
Faulty Point Unit: ABI Poisoning Attacks on Trusted Execution Environments. DTRAP 3(2): 13:1-13:26 (2022) - [j10]Zhuang Xu
, Owen Pemberton
, Sujoy Sinha Roy
, David F. Oswald
, Wang Yao
, Zhiming Zheng:
Magnifying Side-Channel Leakage of Lattice-Based Cryptosystems With Chosen Ciphertexts: The Case Study of Kyber. IEEE Trans. Computers 71(9): 2163-2176 (2022) - [c30]Zhuang Xu
, Owen Pemberton
, David F. Oswald
, Zhiming Zheng:
Reveal the Invisible Secret: Chosen-Ciphertext Side-Channel Attacks on NTRU. CARDIS 2022: 227-247 - [c29]Abdulla Aldoseri, David F. Oswald
, Robert Chiper:
A Tale of Four Gates - Privilege Escalation and Permission Bypasses on Android Through App Components. ESORICS (2) 2022: 233-251 - 2021
- [j9]Jan Van den Herrewegen, David F. Oswald
, Flavio D. Garcia, Qais Temeiza:
Fill your Boots: Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(1): 56-81 (2021) - [c28]Mo Zhang, Eduard Marin, David F. Oswald
, Dave Singelée:
FuzzyKey: Comparing Fuzzy Cryptographic Primitives on Resource-Constrained Devices. CARDIS 2021: 289-309 - [c27]Moritz Lipp, Andreas Kogler, David F. Oswald
, Michael Schwarz, Catherine Easdon, Claudio Canella, Daniel Gruss:
PLATYPUS: Software-based Power Side-Channel Attacks on x86. SP 2021: 355-371 - [c26]Zitai Chen, Georgios Vasilakis, Kit Murdock, Edward Dean, David F. Oswald, Flavio D. Garcia:
VoltPillager: Hardware-based fault injection attacks against Intel SGX Enclaves using the SVID voltage scaling interface. USENIX Security Symposium 2021: 699-716 - [i4]Mo Zhang, Eduard Marin, David F. Oswald, Dave Singelée:
FuzzyKey: Comparing Fuzzy Cryptographic Primitives on Resource-Constrained Devices. IACR Cryptol. ePrint Arch. 2021: 1326 (2021) - 2020
- [j8]Kit Murdock
, David F. Oswald
, Flavio D. Garcia, Jo Van Bulck
, Frank Piessens
, Daniel Gruss
:
Plundervolt: How a Little Bit of Undervolting Can Create a Lot of Trouble. IEEE Secur. Priv. 18(5): 28-37 (2020) - [j7]Lennert Wouters, Jan Van den Herrewegen, Flavio D. Garcia, David F. Oswald
, Benedikt Gierlichs, Bart Preneel:
Dismantling DST80-based Immobiliser Systems. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(2): 99-127 (2020) - [c25]Fritz Alder
, Jo Van Bulck
, David F. Oswald
, Frank Piessens:
Faulty Point Unit: ABI Poisoning Attacks on Intel SGX. ACSAC 2020: 415-427 - [c24]Kit Murdock, David F. Oswald
, Flavio D. Garcia, Jo Van Bulck
, Daniel Gruss, Frank Piessens:
Plundervolt: Software-based Fault Injection Attacks against Intel SGX. SP 2020: 1466-1482 - [i3]Zhuang Xu, Owen Pemberton, Sujoy Sinha Roy, David F. Oswald:
Magnifying Side-Channel Leakage of Lattice-Based Cryptosystems with Chosen Ciphertexts: The Case Study of Kyber. IACR Cryptol. ePrint Arch. 2020: 912 (2020)
2010 – 2019
- 2019
- [c23]Jo Van Bulck
, David F. Oswald
, Eduard Marin
, Abdulla Aldoseri, Flavio D. Garcia, Frank Piessens:
A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes. CCS 2019: 1741-1758 - 2018
- [j6]Christopher Hicks, Flavio D. Garcia
, David F. Oswald
:
Dismantling the AUT64 Automotive Cipher. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(2): 46-69 (2018) - [c22]Sebastian Vasile, David F. Oswald
, Tom Chothia:
Breaking All the Things - A Systematic Survey of Firmware Extraction Techniques for IoT Devices. CARDIS 2018: 171-185 - 2017
- [c21]Luca Reverberi, David F. Oswald
:
Breaking (and Fixing) a Widely Used Continuous Glucose Monitoring System. WOOT 2017 - 2016
- [c20]Markus Dürmuth
, David F. Oswald
, Niklas Pastewka:
Side-Channel Attacks on Fingerprint Matching Algorithms. TrustED@CCS 2016: 3-13 - [c19]David F. Oswald
:
Wireless Attacks on Automotive Remote Keyless Entry Systems. TrustED@CCS 2016: 43-44 - [c18]David Cox, David F. Oswald
:
\upmu Proxy: A Hardware Relay for Anonymous and Secure Internet Access. RFIDSec 2016: 175-187 - [c17]Erick Nascimento, Lukasz Chmielewski, David F. Oswald
, Peter Schwabe:
Attacking Embedded ECC Implementations Through cmov Side Channels. SAC 2016: 99-119 - [c16]Flavio D. Garcia, David F. Oswald
, Timo Kasper, Pierre Pavlidès:
Lock It and Still Lose It - on the (In)Security of Automotive Remote Keyless Entry Systems. USENIX Security Symposium 2016 - [i2]Erick Nascimento, Lukasz Chmielewski, David F. Oswald, Peter Schwabe:
Attacking embedded ECC implementations through cmov side channels. IACR Cryptol. ePrint Arch. 2016: 923 (2016) - 2015
- [j5]Pawel Swierczynski, Amir Moradi
, David F. Oswald
, Christof Paar:
Physical Security Evaluation of the Bitstream Encryption Mechanism of Altera Stratix II and Stratix III FPGAs. ACM Trans. Reconfigurable Technol. Syst. 7(4): 34:1-34:23 (2015) - [c15]David F. Oswald
:
Side-Channel Attacks on SHA-1-Based Product Authentication ICs. CARDIS 2015: 3-14 - [c14]Daehyun Strobel, Florian Bache, David F. Oswald, Falk Schellenberg, Christof Paar:
Scandalee: a side-channel-based disassembler using local electromagnetic emanations. DATE 2015: 139-144 - 2014
- [j4]Daehyun Strobel, David F. Oswald
, Bastian Richter, Falk Schellenberg
, Christof Paar:
Microcontrollers as (In)Security Devices for Pervasive Computing Applications. Proc. IEEE 102(8): 1157-1173 (2014) - [j3]Tobias Schneider, Ingo von Maurich, Tim Güneysu
, David F. Oswald
:
Cryptographic Algorithms on the GA144 Asynchronous Multi-Core Processor - Implementation and Side-Channel Analysis. J. Signal Process. Syst. 77(1-2): 151-167 (2014) - [c13]Timo Kasper, David F. Oswald
, Christof Paar:
Sweet Dreams and Nightmares: Security in the Internet of Things. WISTP 2014: 1-9 - 2013
- [c12]Daehyun Strobel, Benedikt Driessen, Timo Kasper, Gregor Leander
, David F. Oswald
, Falk Schellenberg, Christof Paar:
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System. CRYPTO (1) 2013: 147-164 - [c11]Amir Moradi
, David F. Oswald
, Christof Paar, Pawel Swierczynski:
Side-channel attacks on the bitstream encryption mechanism of Altera Stratix II: facilitating black-box analysis using software reverse-engineering. FPGA 2013: 91-100 - [c10]David F. Oswald
, Bastian Richter, Christof Paar:
Side-Channel Attacks on the Yubikey 2 One-Time Password Generator. RAID 2013: 204-222 - [c9]Timo Kasper, Alexander Kühn, David F. Oswald
, Christian T. Zenger
, Christof Paar:
Rights Management with NFC Smartphones and Electronic ID Cards: A Proof of Concept for Modern Car Sharing. RFIDSec 2013: 34-53 - [c8]David F. Oswald
, Daehyun Strobel, Falk Schellenberg
, Timo Kasper, Christof Paar:
When Reverse-Engineering Meets Side-Channel Analysis - Digital Lockpicking in Practice. Selected Areas in Cryptography 2013: 571-588 - [i1]Daehyun Strobel, Benedikt Driessen, Timo Kasper, Gregor Leander, David F. Oswald, Falk Schellenberg, Christof Paar:
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System - Full Version. IACR Cryptol. ePrint Arch. 2013: 598 (2013) - 2012
- [c7]David F. Oswald
, Christof Paar:
Improving Side-Channel Analysis with Optimal Linear Transforms. CARDIS 2012: 219-233 - 2011
- [j2]Timo Kasper, David F. Oswald, Christof Paar:
Seitenkanalanalyse kontaktloser SmartCards. Datenschutz und Datensicherheit 35(11): 786-790 (2011) - [c6]David F. Oswald
, Christof Paar:
Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates in the Real World. CHES 2011: 207-222 - [c5]Timo Kasper, David F. Oswald
, Christof Paar:
Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation. RFIDSec 2011: 61-77 - [c4]Timo Kasper, David F. Oswald, Christof Paar:
Wireless security threats: Eavesdropping and detecting of active RFIDs and remote controls in the wild. SoftCOM 2011: 1-6 - 2010
- [j1]Timo Kasper, David F. Oswald
, Christof Paar:
A Versatile Framework for Implementation Attacks on Cryptographic RFIDs and Embedded Devices. Trans. Comput. Sci. 10: 100-130 (2010) - [c3]Timo Kasper, Ingo von Maurich, David F. Oswald
, Christof Paar:
Chameleon: A Versatile Emulator for Contactless Smartcards. ICISC 2010: 189-206 - [c2]Jörn-Marc Schmidt, Michael Tunstall
, Roberto Maria Avanzi, Ilya Kizhvatov, Timo Kasper, David F. Oswald
:
Combined Implementation Attack Resistant Exponentiation. LATINCRYPT 2010: 305-322
2000 – 2009
- 2009
- [c1]Timo Kasper, David F. Oswald
, Christof Paar:
EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment. WISA 2009: 79-93
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:19 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint