Dr. Georg T. Becker

  • Ehemalige/r Mitarbeiter/in - Lehrstuhl Embedded Security
Becker, Georg T.

Adresse

Fa­kul­tät für Elek­tro­tech­nik und In­for­ma­ti­ons­tech­nik
Uni­ver­si­täts­str. 150
44780 Bochum

E-Mail:
Georg.Becker@ruhr-uni-bochum.de PGP Schlüssel

Lebenslauf

  • Since 01/2014: Post-doctoral researcher at the Embedded Security Group at the Ruhr-University Bochum
  • 01/2010 - 12/2013: PhD Student at in the VLSI Systems and Circuit Group at the University of Massachusetts, Amherst. PhD thesis: "Intentional and Unintentional Side-Channels in Embedded Systems"
  • 08/2013 - 10/2103: Intern in the DPA team at Cryptography Research (CRI)
  • 08/2009 - 12/2009: Researcher at the Embedded Security Group at the Ruhr-University Bochum
  • 01/2009 - 06/2009: Visiting researcher in the GPS Laboratory at Stanford University
  • 2007 - 2009: Master of Science in IT-Security at the Ruhr-University of Bochum
  • 2003 - 2007: Bachelor of Science in Applied Computer Science at the Ruhr-University of Bochum

Forschung

I am working on various topics in the area of hardware security. So far mainly on following topics:

  • Hardware Trojans
  • Side-channel Analysis
  • IP-Protection (Hardware and Software watermark, Hardware Obfuscation)
  • Physical Unclonable Functions (PUFs)
  • Secure Location Verification

Projekte

Teaching:

  • Tough the graduate level course "ECE 697AB Security Engineering" in Sprin 2013 at the University of Massachusetts
  • Teaching assistant for "Embedded Microcontrollers" at the Ruhr-University of Bochum in Spring 2008

Activities:

  • Co-Organizer of the 1st Workshop of Malicious Software and Hardware in Internet of Things in Como in May 2016 (Mal-IoT 2016); Program committee member of ACM Computer Frontiers 2016
  • Reviewer for (journals): IEEE Transactions on Information Forensics & Security (TIFS), IEEE Transactions on Very Large Scale Integration Systems (VLSI), IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), Journal of the ACM, ACM Transactions on Information and System Security (TISSEC), ACM Computing Surveys, Journal of Cryptographic Engineering (JCEN), ...
  • Reviewer for (conferences): CRYPTO, EUROCRYPT, ASIACRYPT, CHES, HOST, DATE, FSE, COSADE, ISCAS, ReConFig, ...

Veröffentlichungen

2018
Bitstream Fault Injections (BiFI) - Automated Fault Attacks against SRAM-based FPGAs

Pawel Swierczynski, Georg T. Becker, Amir Moradi, Chris­tof Paar - IEEE Transactions on Computers, vol. 67, no. 3, pp. 348-360, 2018.

2017
Hardware Obfuscation: Techniques and Open Challenges

Georg T. Becker, Marc Fyrbiak, Christian Kison - Foundations of Hardware IP Protection, Springer International Publishing, 105—123, 2017

2016
A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks

Samaneh Ghandali, Georg T. Becker, Daniel Holcomb, Chris­tof Paar - Cryptographic Hardware and Embedded Systems, CHES 2016, Santa Barbara, CA, August 17 - 19, 2016

On the Problems of Realizing Reliable and Efficient Ring Oscillator PUFs on FPGAs

Alexander Wild, Georg T. Becker, Tim Güneysu - IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2016, McLean, VA, USA, May 3-5, 2016

2015
The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs

Georg T. Becker - Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2015, Saint-Ma­lo, Fran­ce, Sep­tem­ber 13 - 16, 2015

Development of a Layout-Level Hardware Obfuscation Tool

Shweta Malik, Georg T. Becker, Chris­tof Paar, Wayne P. Burleson - IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2015 (Invited Paper), Montpellier, France, July 2015

On the Scaling of Machine Learning Attacks on PUFs with Application to Noise Bifurcation

Johannes Tobisch, Georg T. Becker - 11th Workshop on RFID Security (RFIDSec 2015), New York, USA, June 23-24, 2015

On the Pitfalls of using Arbiter-PUFs as Building Blocks

Georg T. Becker - IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, TCAD, 34 (8):1-13, August 2015

Security Analysis of Index-Based Syndrome Coding for PUF-Based Key Generation

Georg T. Becker, Alexander Wild, Tim Güneysu - IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, McLean, VA, USA, May 5-7, 2015

2014
Stealthy dopant-level hardware Trojans: extended version

Georg T. Becker, Francesco Regazzoni, Chris­tof Paar, Wayne P. Burleson - Journal of Cryptographic Engineering 4.1 (2014): 19-31

2013
Stealthy Dopant-Level Hardware Trojans

Georg T. Becker, Francesco Regazzoni, Chris­tof Paar, Wayne P. Burleson - Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2013, Santa Bar­ba­ra, Ca­li­for­nia, USA, Au­gust 20 - 23, 2013 Extended version in Journal of Cryptographic Engineering, Springer, 2014

2012
Side Channels as Building Blocks

Markus Kasper, Amir Moradi, Georg T. Becker, Oliver Mischke, Tim Güneysu, Chris­tof Paar, Wayne Burleson - Journal of Cryptographic Engineering, Volume 2, Number 3, pages 143-159, 2012, Springer.

Detecting Software Theft in Embedded Systems: A Side-Channel Approach

Georg T. Becker, Daehyun Strobel, Chris­tof Paar, Wayne Burleson - IEEE Transactions on Information Forensics and Security, , vol.7, no.4, pp.1144,1154, Aug. 2012

2011
Implementing Hardware Trojans: Experiences from a Hardware Trojan Challenge

Georg T. Becker, Ashwin Lakshminarasimhan, Lang Lin, Sudheendra Srivathsa, Vikram B. Suresh, Wayne Burelson - 29th IEEE International Conference on Computer Design (Invited Paper), ICCD 2011, Amherst, USA, October 2011

Side-channel Watermarks for Embedded Software

Georg T. Becker, Wayne Burleson, Chris­tof Paar - 9th IEEE NEWCAS Conference (Invited Paper), NEWCAS 2011, Bordeaux, France, June 2011

2010
Side-channel based watermarks for IP Protection

Georg T. Becker, Markus Kasper, Amir Moradi, Chris­tof Paar - COSADE 2010 - First International Workshop on Constructive Side-Channel Analysis and Secure Design

Secure Location Verification - A Security Analysis of GPS Signal Authentication

Georg T. Becker, Sherman C. Lo, David S. De Lorenzo, Per K. Enge, Chris­tof Paar - DBSec 2010, Rome, Italy, June 21-23, 2010, to be published in Springer LNCS.

Side-channel based watermarks for integrated circuits

Georg T. Becker, Markus Kasper, Amir Moradi, Chris­tof Paar - IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2010), AnaheimCA , USA, 13-14 June 2010.

2009
Efficient Authentication Mechanisms for Navigation Systems – a Radio-Navigation Case Study

Georg T. Becker, Sherman C. Lo, David S. De Lorenzo, Di Qiu, Chris­tof Paar, Per Enge - Proceedings of the 22nd International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS 2009) pp. 901 - 912, September 22-25 2009, Savannah, GA.