Skip to main content

Showing 1–12 of 12 results for author: Ender, M

.
  1. Patching FPGAs: The Security Implications of Bitstream Modifications

    Authors: Endres Puschner, Maik Ender, Steffen Becker, Christof Paar

    Abstract: Field Programmable Gate Arrays (FPGAs) are known for their reprogrammability that allows for post-manufacture circuitry changes. Nowadays, they are integral to a variety of systems including high-security applications such as aerospace and military systems. However, this reprogrammability also introduces significant security challenges, as bitstream manipulation can directly alter hardware circuit… ▽ More

    Submitted 17 November, 2024; originally announced November 2024.

  2. arXiv:2402.09845  [pdf, other

    cs.CR

    JustSTART: How to Find an RSA Authentication Bypass on Xilinx UltraScale(+) with Fuzzing

    Authors: Maik Ender, Felix Hahn, Marc Fyrbiak, Amir Moradi, Christof Paar

    Abstract: Fuzzing is a well-established technique in the software domain to uncover bugs and vulnerabilities. Yet, applications of fuzzing for security vulnerabilities in hardware systems are scarce, as principal reasons are requirements for design information access (HDL source code). Moreover, observation of internal hardware state during runtime is typically an ineffective information source, as its docu… ▽ More

    Submitted 15 February, 2024; originally announced February 2024.

  3. arXiv:2212.11532  [pdf, other

    cond-mat.other

    Hybrid Magnonic-Oscillator System

    Authors: A. Hamadeh, D. Breitbach, M. Ender, A. Koujok, M. Mohseni, F. Kohl, J. Maskill, M. Bechberger, P. Pirro

    Abstract: We propose a hybrid magnonic-oscillator system based on the combination of a spin transfer auto-oscillator and a magnonic waveguide to open new perspectives for spin-wave based circuits. The system is composed of a spin transfer oscillator based on a vortex state which is dipolarly coupled to a nanoscale spin-wave waveguide with longitudinal magnetization. In its auto-oscillating regime, the oscil… ▽ More

    Submitted 22 December, 2022; originally announced December 2022.

    Journal ref: Journal of Applied Physics 132, 183904 (2022)

  4. arXiv:2201.04033  [pdf, other

    cond-mat.other

    Parametric Excitation and Instabilities of Spin Waves driven by Surface Acoustic Waves

    Authors: Moritz Geilen, Roman Verba, Alexandra Nicoloiu, Daniele Narducci, Adrian Dinescu, Milan Ender, Morteza Mohseni, Florin Ciubotaru, Mathias Weiler, Alexandru Müller, Burkard Hillebrands, Christoph Adelmann, Philipp Pirro

    Abstract: The parametric excitation of spin waves by coherent surface acoustic waves is demonstrated experimentally in metallic magnetic thin film structures. The involved magnon modes are analyzed with micro-focused Brillouin light scattering spectroscopy and complementary micromagnetic simulations combined with analytical modelling are used to determine the origin of the spin-wave instabilities. Depending… ▽ More

    Submitted 16 August, 2022; v1 submitted 11 January, 2022; originally announced January 2022.

    Comments: This project has received funding from the European Union's Horizon 2020 research and innovation program under grant agreement No. 801055 "Spin Wave Computing for Ultimately-Scaled Hybrid Low-Power Electronics" - CHIRON

  5. How Not to Protect Your IP -- An Industry-Wide Break of IEEE 1735 Implementations

    Authors: Julian Speith, Florian Schweins, Maik Ender, Marc Fyrbiak, Alexander May, Christof Paar

    Abstract: Modern hardware systems are composed of a variety of third-party Intellectual Property (IP) cores to implement their overall functionality. Since hardware design is a globalized process involving various (untrusted) stakeholders, a secure management of the valuable IP between authors and users is inevitable to protect them from unauthorized access and modification. To this end, the widely adopted… ▽ More

    Submitted 9 December, 2021; originally announced December 2021.

  6. arXiv:2106.14705  [pdf, other

    cond-mat.other cond-mat.mes-hall

    Fully Resonant Magneto-elastic Spin-wave Excitation by Surface Acoustic Waves under Conservation of Energy and Linear Momentum

    Authors: Moritz Geilen, Alexandra Nicoloiu, Daniele Narducci, Morteza Mohseni, Moritz Bechberger, Milan Ender, Florin Ciubotaru, Alexandru Müller, Burkard Hillebrands, Christoph Adelmann, Philipp Pirro

    Abstract: We report on the resonant excitation of spin waves in micro-structured magnetic thin films by surface acoustic waves (SAWs). The spin waves as well as the acoustic waves are studied by micro-focused Brillouin light scattering spectroscopy. Besides the excitation of the ferromagnetic resonance, a process which does not fulfill momentum conservation, also the excitation of finite-wavelength spin wav… ▽ More

    Submitted 11 January, 2022; v1 submitted 28 June, 2021; originally announced June 2021.

    Comments: This project has received funding from the European Union's Horizon 2020 research and innovation program under grant agreement No. 801055 "Spin Wave Computing for Ultimately-Scaled Hybrid Low-Power Electronics" - CHIRON

  7. arXiv:2105.13756  [pdf, other

    cs.CR

    The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAs

    Authors: Maik Ender, Amir Moradi, Christof Paar

    Abstract: The security of FPGAs is a crucial topic, as any vulnerability within the hardware can have severe consequences, if they are used in a secure design. Since FPGA designs are encoded in a bitstream, securing the bitstream is of the utmost importance. Adversaries have many motivations to recover and manipulate the bitstream, including design cloning, IP theft, manipulation of the design, or design su… ▽ More

    Submitted 28 May, 2021; originally announced May 2021.

  8. arXiv:2103.03898  [pdf

    cs.HC

    Reducing cybersickness in 360-degree virtual reality

    Authors: Iqra Arshad, Paulo De Mello, Martin Ender, Jason D. McEwen, Elisa R. Ferré

    Abstract: Despite the technological advancements in Virtual Reality (VR), users are constantly combating feelings of nausea and disorientation, the so called cybersickness. Cybersickness symptoms cause severe discomfort and hinder the immersive VR experience. Here we investigated cybersickness in 360-degree head-mounted display VR. In traditional 360-degree VR experiences, translational movement in the real… ▽ More

    Submitted 17 November, 2021; v1 submitted 5 March, 2021; originally announced March 2021.

    Comments: 27 pages, 1 figure; Software available at https://www.kagenova.com/products/copernic360/

  9. Insights into the Mind of a Trojan Designer: The Challenge to Integrate a Trojan into the Bitstream

    Authors: Maik Ender, Pawel Swierczynski, Sebastian Wallat, Matthias Wilhelm, Paul Martin Knopp, Christof Paar

    Abstract: The threat of inserting hardware Trojans during the design, production, or in-field poses a danger for integrated circuits in real-world applications. A particular critical case of hardware Trojans is the malicious manipulation of third-party FPGA configurations. In addition to attack vectors during the design process, FPGAs can be infiltrated in a non-invasive manner after shipment through altera… ▽ More

    Submitted 1 October, 2019; originally announced October 2019.

    Journal ref: ASPDAC 2019 Proceedings of the 24th Asia and South Pacific Design Automation Conference Pages 112-119

  10. Highway to HAL: Open-Sourcing the First Extendable Gate-Level Netlist Reverse Engineering Framework

    Authors: Sebastian Wallat, Nils Albartus, Steffen Becker, Max Hoffmann, Maik Ender, Marc Fyrbiak, Adrian Drees, Sebastian Maaßen, Christof Paar

    Abstract: Since hardware oftentimes serves as the root of trust in our modern interconnected world, malicious hardware manipulations constitute a ubiquitous threat in the context of the Internet of Things (IoT). Hardware reverse engineering is a prevalent technique to detect such manipulations. Over the last years, an active research community has significantly advanced the field of hardware reverse engin… ▽ More

    Submitted 1 October, 2019; originally announced October 2019.

    Journal ref: Proceedings of Malicious Software and Hardware in Internet of Things (MAL-IOT 2019). ACM, NewYork, NY, USA, Article 4, 6 pages

  11. arXiv:1510.07864  [pdf, other

    cs.CR

    Dignité - DIGital Network Information & Traces Extraction

    Authors: Thomas Marcel Ender, Patrick Vananti

    Abstract: Web-based criminality like counterfeiting uses web applications which are hosted on web servers. Those servers contain a lot of information which can be used to identify the owner and other connected persons like hosters, shipping partners, money mules and more. These pieces of information reveal insights on the owner or provider of a fraud website, thus we can call them traces. These traces can t… ▽ More

    Submitted 27 October, 2015; originally announced October 2015.

  12. arXiv:1303.7068  [pdf, ps, other

    astro-ph.HE astro-ph.IM

    Thunderstorm Observations by Air-Shower Radio Antenna Arrays

    Authors: W. D. Apel, J. C. Arteaga, L. Bähren, K. Bekk, M. Bertaina, P. L. Biermann, J. Blümer, H. Bozdog, I. M. Brancus, P. Buchholz, S. Buitink, E. Cantoni, A. Chiavassa, K. Daumiller, V. de Souza, P. Doll, M. Ender, R. Engel, H. Falcke, M. Finger, D. Fuhrmann, H. Gemmeke, C. Grupen, A. Haungs, D. Heck , et al. (35 additional authors not shown)

    Abstract: Relativistic, charged particles present in extensive air showers lead to a coherent emission of radio pulses which are measured to identify the shower initiating high-energy cosmic rays. Especially during thunderstorms, there are additional strong electric fields in the atmosphere, which can lead to further multiplication and acceleration of the charged particles and thus have influence on the for… ▽ More

    Submitted 28 March, 2013; originally announced March 2013.

    Journal ref: Advances in Space Research, Volume 48, Issue 7, 1 October 2011, Pages 1295-1303, ISSN 0273-1177, 10.1016/j.asr.2011.06.003. (http://www.sciencedirect.com/science/article/pii/S0273117711004297)