< Back to previous page
Researcher
Benedikt Gierlichs
- Disciplines:Algebra, Applied mathematics in specific fields, Computer architecture and networks, Distributed computing, Information sciences, Information systems, Programming languages, Scientific computing, Theoretical computer science, Visual computing, Other information and computing sciences, Communications, Communications technology, Modelling, Multimedia processing
Affiliations
- Computer Security and Industrial Cryptography (COSIC) (Division)
Member
From1 Aug 2020 → Today - Dynamical Systems, Signal Processing and Data Analytics (STADIUS) (Division)
Member
From1 Aug 2020 → 31 Jul 2013 - ESAT - COSIC, Computer Security and Industrial Cryptography (Division)
Member
From1 Aug 2013 → 31 Jul 2020
Projects
1 - 3 of 3
- Practical security evaluations of existing and new technologiesFrom30 Aug 2023 → TodayFunding: Own budget, for example: patrimony, inscription fees, gifts
- Practical Fault Attacks on Cryptographic DevicesFrom18 May 2016 → 24 Dec 2021Funding: Own budget, for example: patrimony, inscription fees, gifts
- Modeling the information leakage of embedded cryptographic devices.From1 Oct 2011 → 30 Sep 2017Funding: FWO fellowships
Publications
1 - 10 of 57
- Energy and side-channel security evaluation of near-threshold cryptographic circuits in 28nm FD-SOI technology(2022)
Authors: Jo Vliegen, Lennert Wouters, Wim Dehaene, Benedikt Gierlichs, Nele Mentens
Pages: 258 - 262 - On the Susceptibility of Texas Instruments SimpleLink Platform Microcontrollers to Non-invasive Physical Attacks(2022)
Authors: Lennert Wouters, Benedikt Gierlichs, Bart Preneel
Pages: 143 - 163Number of pages: 21 - Provable Secure Software Masking in the Real-World(2022)
Authors: Lennert Wouters, Benedikt Gierlichs, Bart Preneel, Ingrid Verbauwhede
Pages: 215 - 235Number of pages: 21 - Practical Fault Attacks on Cryptographic Devices(2021)
Authors: Arthur Beckers, Ingrid Verbauwhede, Benedikt Gierlichs
- A Study on Output Bit Tampering of True Random Number Generators Using Time-Varying EM Waves(2021)
Authors: Benedikt Gierlichs, Ingrid Verbauwhede
Pages: 1 - 4 - My other car is your car: compromising the Tesla Model X keyless entry system(2021)
Authors: Lennert Wouters, Benedikt Gierlichs, Bart Preneel
Pages: 149 - 172 - Revisiting a Methodology for Efficient CNN Architectures in Profiling Attacks.(2020)
Authors: Lennert Wouters, Benedikt Gierlichs, Bart Preneel
Pages: 147 - 168 - Dismantling DST80-based Immobiliser Systems(2020)
Authors: Lennert Wouters, Benedikt Gierlichs, Bart Preneel
Pages: 99 - 127 - EM Information Security Threats Against RO-Based TRNGs: The Frequency Injection Attack Based on IEMI and EM Information Leakage(2019)
Authors: Arthur Beckers, Benedikt Gierlichs, Ingrid Verbauwhede
Pages: 1122 - 1128 - An In-depth and Black-Box Characterization of the Effects of Laser Pulses on ATmega328P(2019)
Authors: Arthur Beckers, Benedikt Gierlichs, Ingrid Verbauwhede
Pages: 156 - 170Number of pages: 15
Linked dataset
1 - 1 of 1