Georg's personal homepage


Georg T. Becker, PhD
Senior Researcher
Digital Society Institute
ESMT Berlin
Email: georg dot becker at esmt dot org






Hello! Welcome to my personal homepage which I will try to keep more or less updated... It is basically a copy of my former RUB homepage which is not being updated any more since I moved to Berlin to join the Digital Society Institute (DSI) as a Senior Researcher at the end of 2016 (you can find my DSI homepage here).
 

My research focus is IT security and so far I have mainly worked on hardware security with topics such as hardware Trojans, side-channel analysis and Physical Unclonable Functions (PUFs). But as part of my industry funded project at the DSI I have now started to also look into network security and in particular moving target defense techniques.

Please find below my CV in a bullet-like fashion.

If you have questions/comments/concerns regarding any of my papers or work, please feel free to simply contact me! It is always nice to hear that someone actually reads this stuff :)

Vita

Research

I am working on various topics in the area of IT-Security and in particular hardware security. So far mainly on following topics:

  • New topic: Moving Target Defence (MTD) techniques for network security
  • Physical Unclonable Functions (PUFs)
  • Hardware Trojans
  • Side-channel Analysis
  • IP-Protection (Hardware and Software watermark, Hardware Obfuscation)
  • Secure Location Verification

Activities:

  • Co-Organizer of the Workshop of Malicious Software and Hardware in Internet of Things  (Mal-IoT 2016, Mal-IoT 2017, Mal-IoT 2018); Program committee member at DAC 2017, DAC 2018, ACM Computer Frontiers 2016, COSADE 2019
  • Reviewer for (selected journals): IEEE Transactions on Information Forensics & Security (TIFS), IEEE Transactions on Very Large Scale Integration Systems (TVLSI), IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), Journal of the ACM, ACM Transactions on Information and System Security (TISSEC), ACM Computing Surveys, Journal of Cryptographic Engineering (JCEN), ...
  • Reviewer for (selected conferences): CRYPTO, EUROCRYPT, ASIACRYPT, CHES, HOST, DATE, FSE, COSADE, ISCAS, RFIDSec, ReConFig, ...

Teaching:

  • Taught the graduate level course ECE 697AB Security Engineering in Spring 2013 at the University of Massachusetts
  • Responsible for part of the lab-sessions of the courses "Software Implementation of Cryptographic Schemes" and "Implementation of Cryptographic Schemes II" at the Ruhr-University of Bochum in 2014-2016
  • Teaching assistant for "Embedded Microcontrollers" at the Ruhr-University of Bochum in Spring 2008

Publications (peer-reviewed)

Alexander Bajic, Georg T. Becker, "Attack simulation for a realistic evaluation and comparison of network security techniques", Nordic Conference on Secure IT Systems', NordSec 2018,  Oslo, Norway, November 28-30 2018, [Best Paper Award]  PDF

Georg T. Becker, "Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited: Theory vs Practice", IEEE Transactions on Dependable and Secure Computing (TSDC), to appear, accepted October 2017 (early access PDF

Alexander Wild, Georg T. Becker, Tim Güneysu, "A Fair and Comprehensive Large-Scale Analysis of Oscillation-Based PUFs for FPGAs" International Conference on Field Programmable Logic and Applications, FPL 2017, Ghent, Belgium, September 4-8, 2017   PDF,  the code and data is available for download here

Pawel Swierczynski, Georg T. Becker, Amir Moradi, Christof Paar, "Bitstream Fault Injections (BiFI) – Automated Fault Attacks against SRAM-based FPGAs", IEEE Transactions on Computers (TC), to appear 2017 (early access PDF

Samaneh Ghandali, Georg T. Becker, Daniel Holcomb, Christof Paar, "A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks", Cryptographic Hardware and Embedded Systems, CHES 2016, Santa Barbara, CA, August 17 - 19, 2016 PDF

Alexander Wild, Georg T. Becker, Tim Güneysu, "On the Problems of Realizing Reliable and Efficient Ring Oscillator PUFs on FPGAs", IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2016, McLean, VA, USA, May 3-5, 2016 PDF

Georg T. Becker, "The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs", Cryptographic Hardware and Embedded Systems, CHES 2015, SaintMalo, France, September 13 - 16, 2015 PDF

Shweta Malik, Georg T. Becker, Christof Paar, Wayne P. Burleson, "Development of a Layout-Level Hardware Obfuscation Tool", IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2015 (Invited Paper), Montpellier, France, July 2015 PDF

Johannes Tobisch, Georg T. Becker, "On the Scaling of Machine Learning Attacks on PUFs with Application to Noise Bifurcation", 11th Workshop on RFID Security (RFIDSec 2015), New York, USA, June 23-24, 2015 PDF

Georg T. Becker, "On the Pitfalls of using Arbiter-PUFs as Building Blocks", IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, TCAD, 34 (8):1-13, August 2015 PDF

Georg T. Becker, Alexander Wild, Tim Güneysu, "Security Analysis of Index-Based Syndrome Coding for PUF-Based Key Generation", IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, McLean, VA, USA, May 5-7, 2015 PDF

Georg T. Becker, Francesco Regazzoni, Christof Paar, Wayne P. Burleson, "Stealthy dopant-level hardware Trojans: extended version", Journal of Cryptographic Engineering (JCEN), 4.1 (2014): 19-31 PDF

Georg T. Becker, Francesco Regazzoni, Christof Paar, Wayne P. Burleson, "Stealthy Dopant-Level Hardware Trojans", Workshop on Cryptographic Hardware and Embedded Systems, CHES 2013, Santa Barbara, California, USA, August 20 - 23, 2013 PDF

Markus Kasper, Amir Moradi, Georg T. Becker, Oliver Mischke, Tim Güneysu, Christof Paar, Wayne Burleson, "Side Channels as Building Blocks", Journal of Cryptographic Engineering (JCEN), Volume 2, Number 3, pages 143-159,, 2012, Springer. PDF

Georg T. Becker, Daehyun Strobel, Christof Paar, Wayne Burleson, "Detecting Software Theft in Embedded Systems: A Side-Channel Approach", IEEE Transactions on Information Forensics and Security (TIFS), vol.7, no.4, pp.1144,1154, Aug. 2012 PDF

Georg T. Becker, Ashwin Lakshminarasimhan, Lang Lin, Sudheendra Srivathsa, Vikram B. Suresh, Wayne Burelson, "Implementing Hardware Trojans: Experiences from a Hardware Trojan Challenge", 29th IEEE International Conference on Computer Design (Invited Paper), ICCD 2011, Amherst, USA, October 2011 PDF

Georg T. Becker, Wayne Burleson, Christof Paar, "Side-channel Watermarks for Embedded Software", 9th IEEE NEWCAS Conference (Invited Paper), NEWCAS 2011, Bordeaux, France, June 2011 PDF

Georg T. Becker, Markus Kasper, Amir Moradi, Christof Paar, "Side-channel based watermarks for IP Protection", First International Workshop on Constructive Side-Channel Analysis and Secure Design COSADE 2010 (Extended Abstract), 2010

Georg T. Becker, Sherman C. Lo, David S. De Lorenzo, Per K. Enge, Christof Paar, "Secure Location Verification - A Security Analysis of GPS Signal Authentication", DBSec 2010, Rome, Italy, June 21-23, 2010,  PDF

Georg T. Becker, Markus Kasper, Amir Moradi, Christof Paar, "Side-channel based watermarks for integrated circuits", IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2010), AnaheimCA , USA, 13-14 June 2010. PDF

Georg T. Becker, Sherman C. Lo, David S. De Lorenzo, Di Qiu, Christof Paar, Per Enge, "Efficient Authentication Mechanisms for Navigation Systems – a Radio-Navigation Case Study", Proceedings of the 22nd International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS 2009) pp. 901 - 912, September 22-25 2009, Savannah, GA. PDF

Selected non peer-reviewed publications

Georg T. Becker, Marc Fyrbiak, Christian Kison "Hardware Obfuscation: Techniques and Open Challenges", Book Chapter, Foundations of Hardware IP Protection, Springer International Publishing, 105-123, 2017, Link, PDF

Christine Utz, Johannes Tobisch, Georg T. Becker,"Extended Abstract: Analysis of 1000 Arbiter PUF based RFID Tags ", Conference on Trustworthy Manufacturing and Utilization of Secure Devices (TRUDEVICE 2016), Barcelona, November, 2016, PDF

Georg T. Becker, Raghavan Kumar "Active and Passive Side-Channel Attacks on Delay Based PUF Designs", IACR Cryptology ePrint Archive 2014, 287. PDF

Untergeordnete Seiten (1): data