Остановите войну!
for scientists:
default search action
Steffen Becker 0003
Person information
- affiliation: Ruhr-University Bochum, Institute for IT Security, Bochum, Germany
Other persons with the same name
- Steffen Becker 0001 — University of Stuttgart, Germany (and 2 more)
- Steffen Becker 0002 — TU Ilmenau, Germany
- Steffen Becker 0004 — University of Tasmania, Hobart, Australia
- Steffen Becker 0005 — Nanoplus Nanosystems and Technologies GmbH, Gerbrunn, Germany (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2022
- [b1]Steffen Becker:
Human factors in hardware reverse engineering. Ruhr University Bochum, Germany, 2022
Journal Articles
- 2023
- [j4]Marvin Kowalewski, Christine Utz, Martin Degeling, Theodor Schnitzler, Franziska Herbert, Leonie Schaewitz, Florian M. Farke, Steffen Becker, Markus Dürmuth:
52 Weeks Later: Attitudes Towards COVID-19 Apps for Different Purposes Over Time. Proc. ACM Hum. Comput. Interact. 7(CSCW2): 1-45 (2023) - [j3]Carina Wiesen, Steffen Becker, René Walendy, Christof Paar, Nikol Rummel:
The Anatomy of Hardware Reverse Engineering: An Exploration of Human Factors During Problem Solving. ACM Trans. Comput. Hum. Interact. 30(4): 62:1-62:44 (2023) - 2020
- [j2]Julian Speith, Steffen Becker, Maik Ender, Endres Puschner, Christof Paar:
Hardware-Trojaner. Datenschutz und Datensicherheit 44(7): 446-450 (2020) - 2019
- [j1]Steffen Becker, Carina Wiesen, Christof Paar, Nikol Rummel:
Wie arbeiten Reverse Engineers? Datenschutz und Datensicherheit 43(11): 686-690 (2019)
Conference and Workshop Papers
- 2024
- [c10]René Walendy, Markus Weber, Jingjie Li, Steffen Becker, Carina Wiesen, Malte Elson, Younghyun Kim, Kassem Fawaz, Nikol Rummel, Christof Paar:
I see an IC: A Mixed-Methods Approach to Study Human Problem-Solving Processes in Hardware Reverse Engineering. CHI 2024: 831:1-831:20 - 2023
- [c9]Nils Rothaug, Simon Klix, Nicole Auth, Sinan Böcker, Endres Puschner, Steffen Becker, Christof Paar:
Towards Unsupervised SEM Image Segmentation for IC Layout Extraction. ASHES@CCS 2023: 123-128 - [c8]Franziska Herbert, Steffen Becker, Leonie Schaewitz, Jonas Hielscher, Marvin Kowalewski, M. Angela Sasse, Yasemin Acar, Markus Dürmuth:
A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 Countries. CHI 2023: 582:1-582:23 - [c7]Endres Puschner, Thorben Moos, Steffen Becker, Christian Kison, Amir Moradi, Christof Paar:
Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations. SP 2023: 56-74 - 2021
- [c6]Christine Utz, Steffen Becker, Theodor Schnitzler, Florian M. Farke, Franziska Herbert, Leonie Schaewitz, Martin Degeling, Markus Dürmuth:
Apps Against the Spread: Privacy Implications and User Acceptance of COVID-19-Related Smartphone Apps on Three Continents. CHI 2021: 70:1-70:22 - 2020
- [c5]Steffen Becker, Carina Wiesen, Nils Albartus, Nikol Rummel, Christof Paar:
An Exploratory Study of Hardware Reverse Engineering - Technical and Cognitive Processes. SOUPS @ USENIX Security Symposium 2020: 285-300 - 2019
- [c4]Carina Wiesen, Nils Albartus, Max Hoffmann, Steffen Becker, Sebastian Wallat, Marc Fyrbiak, Nikol Rummel, Christof Paar:
Towards cognitive obfuscation: impeding hardware reverse engineering based on psychological insights. ASP-DAC 2019: 104-111 - [c3]Sebastian Wallat, Nils Albartus, Steffen Becker, Max Hoffmann, Maik Ender, Marc Fyrbiak, Adrian Drees, Sebastian Maaßen, Christof Paar:
Highway to HAL: open-sourcing the first extendable gate-level netlist reverse engineering framework. CF 2019: 392-397 - [c2]Carina Wiesen, Steffen Becker, Nils Albartus, Christof Paar, Nikol Rummel:
Promoting the Acquisition of Hardware Reverse Engineering Skills. FIE 2019: 1-9 - 2018
- [c1]Carina Wiesen, Steffen Becker, Marc Fyrbiak, Nils Albartus, Malte Elson, Nikol Rummel, Christof Paar:
Teaching Hardware Reverse Engineering: Educational Guidelines and Practical Insights. TALE 2018: 438-445
Informal and Other Publications
- 2024
- [i14]René Walendy, Markus Weber, Jingjie Li, Steffen Becker, Carina Wiesen, Malte Elson, Younghyun Kim, Kassem Fawaz, Nikol Rummel, Christof Paar:
I see an IC: A Mixed-Methods Approach to Study Human Problem-Solving Processes in Hardware Reverse Engineering. CoRR abs/2402.15452 (2024) - [i13]Elisabeth Kirsten, Annalina Buckmann, Abraham Mhaidli, Steffen Becker:
Decoding Complexity: Exploring Human-AI Concordance in Qualitative Coding. CoRR abs/2403.06607 (2024) - 2023
- [i12]Timo Speith, Julian Speith, Steffen Becker, Yixin Zou, Asia Biega, Christof Paar:
Expanding Explainability: From Explainable Artificial Intelligence to Explainable Hardware. CoRR abs/2302.14661 (2023) - [i11]Marvin Kowalewski, Christine Utz, Martin Degeling, Theodor Schnitzler, Franziska Herbert, Leonie Schaewitz, Florian M. Farke, Steffen Becker, Markus Dürmuth:
52 Weeks Later: Attitudes Towards COVID-19 Apps for Different Purposes Over Time. CoRR abs/2307.06214 (2023) - [i10]Steffen Becker, Carina Wiesen, René Walendy, Nikol Rummel, Christof Paar:
REVERSIM: A Game-Based Approach to Accessing Large Populations for Studying Human Aspects in Hardware Reverse Engineering. CoRR abs/2309.05740 (2023) - 2022
- [i9]Franziska Herbert, Steffen Becker, Leonie Schaewitz, Jonas Hielscher, Marvin Kowalewski, M. Angela Sasse, Yasemin Acar, Markus Dürmuth:
A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 Countries. CoRR abs/2212.10382 (2022) - [i8]Franziska Herbert, Steffen Becker, Annalina Buckmann, Marvin Kowalewski, Jonas Hielscher, Leonie Schaewitz, Jennifer Friedauer, Yasemin Acar, Markus Dürmuth, M. Angela Sasse:
Talking to the Overlooked: A Nationwide Telephone Survey with Four Groups Under-represented in Privacy and Security Studies. CoRR abs/2212.12964 (2022) - [i7]Endres Puschner, Thorben Moos, Steffen Becker, Christian Kison, Amir Moradi, Christof Paar:
Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations. IACR Cryptol. ePrint Arch. 2022: 1720 (2022) - 2021
- [i6]Carina Wiesen, Steffen Becker, Nils Albartus, Christof Paar, Nikol Rummel:
Promoting the Acquisition of Hardware Reverse Engineering Skills. CoRR abs/2105.13725 (2021) - [i5]Steffen Becker, Carina Wiesen, Nils Albartus, Nikol Rummel, Christof Paar:
An Exploratory Study of Hardware Reverse Engineering Technical and Cognitive Processes. CoRR abs/2105.14943 (2021) - 2020
- [i4]Christine Utz, Steffen Becker, Theodor Schnitzler, Florian M. Farke, Franziska Herbert, Leonie Schaewitz, Martin Degeling, Markus Dürmuth:
Apps Against the Spread: Privacy Implications and User Acceptance of COVID-19-Related Smartphone Apps on Three Continents. CoRR abs/2010.14245 (2020) - 2019
- [i3]Carina Wiesen, Steffen Becker, Marc Fyrbiak, Nils Albartus, Malte Elson, Nikol Rummel, Christof Paar:
Teaching Hardware Reverse Engineering: Educational Guidelines and Practical Insights. CoRR abs/1910.00312 (2019) - [i2]Carina Wiesen, Nils Albartus, Max Hoffmann, Steffen Becker, Sebastian Wallat, Marc Fyrbiak, Nikol Rummel, Christof Paar:
Towards Cognitive Obfuscation: Impeding Hardware Reverse Engineering Based on Psychological Insights. CoRR abs/1910.00323 (2019) - [i1]Sebastian Wallat, Nils Albartus, Steffen Becker, Max Hoffmann, Maik Ender, Marc Fyrbiak, Adrian Drees, Sebastian Maaßen, Christof Paar:
Highway to HAL: Open-Sourcing the First Extendable Gate-Level Netlist Reverse Engineering Framework. CoRR abs/1910.00350 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-19 23:40 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint