Dr.-Ing. André Schaller
Security Engineering Group
Computer Science Department
Technische Universität Darmstadt & CYSEC

Email: schaller(-at-)



Journal Articles  

  • Decay-Based DRAM PUFs in Commodity Devices with Wenjie Xiong, Nikolaos A. Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, B. Škorić, Stefan Katzenbeisser and Jakub Szefer
    IEEE Transactions on Dependable and Secure Computing (TDSC)
  • Eliminating Leakage in Reverse Fuzzy Extractors with T. Stanko, B. Škorić and S. Katzenbeisser
    IEEE Transactions on Information Forensics & Security (TIFS)
  • Physical Unclonable Functions with S. Katzenbeisser
    Datenschutz und Datensicherheit - DuD, SP Gabler Verlag, 2012, 36, 881-885



  • Tracking Private Browsing Sessions using CPU-based Covert Channels with Nikolay Matyunin, Nikolaos Athanasios Anagnostopoulos, Spyros Boukoros, Markus Heinrich, Maksim Kolinichenko and Stefan Katzenbeisser.
    to appear in ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), June 2018, Stockholm, Sweden.
  • Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors with Steffen Schulz, Florian Kohnhäuser and Stefan Katzenbeisser.
    European Symposium on Research in Computer Security (ESORICS), September 2017, Oslo, Norway
  • Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security with Wenjie Xiong, Muhammad Umair Saleem, Nikolaos A. Anagnostopoulos, Stefan Katzenbeisser and Jakub Szefer
    International Symposium on Hardware Oriented Security and Trust (HOST), May 2017, McLean, USA

  • Run-time Accessible DRAM PUFs in Commodity Devices with Wenjie Xiong, Nikolaos A. Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser and Jakub Szefer
    Conference on Cryptographic Hardware and Embedded Systems (CHES), August 2016, Santa Barbara, USA
  • PUF-based Software Protection for low-end Embedded Devices with F. Kohnhäuser and S. Katzenbeisser
    Trust and Trustworthy Computing (TRUST), August 2015, Heraklion, Crete
  • Lightweight Anti-counterfeiting Solution for Low-End Commodity Hardware Using Inherent PUFs with T. Arul, V. van der Leest and S. Katzenbeisser
    Trust and Trustworthy Computing (TRUST), July 2014, Heraklion, Crete
    [Official] [Springer]
  • On the Systematic Drift of Physically Unclonable Functions Due to Aging with B. Škorić and S. Katzenbeisser
    International Workshop on Trustworthy Embedded Devices (TrustED), October 2015, Denver, USA
  • Secure PRNG Seeding on Commercial Off-the-Shelf Microcontrollers with A. van Herrewege, V. van der Leest, S. Katzenbeisser and I. Verbauwhede
    International Workshop on Trustworthy Embedded Devices (TrustED), November 2013, Berlin, Germany
  • Physically Unclonable Functions found in Standard Components of Commercial Devices with  V. van der Leest
    1st Workshop on Trustworthy Manufacturing and Utilization of Secure Devices (TRUDEVICE), May 2013, Avignon, France
Non-peer reviewed
  • Low-temperature data remanence attacks against intrinsic SRAM PUFs with Nikolaos Athanasios Anagnostopoulos, Stefan Katzenbeisser, Markus Rosenstihl, Sebastian Gabmeyer and Tolga Arul
    [Cryptology ePrint Archive: Report 2016/769]
  • Insights into the Potential Usage of the Initial Values of DRAM Arrays of Commercial Off-the-Shelf Devices for Security Applications with Nikolaos Athanasios Anagnostopoulos, Yufan Fan. Wenjie Xiong, Fatemeh Tehranipoor, Tolga Arul, Sebastian Gabmeyer, Jakub Szefer, John A. Chandy and Stefan Katzenbeisser
Posters & Demos
  • DEMO: Inherent PUFs and Secure PRNGs on Commercial Off-the-Shelf Microcontrollers with A. van Herrewege, S. Katzenbeisser and I. Verbauwhede
    20th ACM Conference on Computer and Communications Security (CCS), November 2013, Berlin, Germany
Associated Projects

The Physically unclonable functions found in standard PC components (PUFFIN) project intends to study and show the existence of SRAM PUFs and other types of PUFs in standard PCs, laptops, mobile phones and consumer electronics. This has not been attempted so far. The mere existence of physical properties that depend on a component and are reproducible is only the first step to guarantee appropriate robustness, reliability and randomness properties for use as secret keys or trust anchors in mass-market applications.

  • SFB Crossing:

The goal of the CROSSING project is to provide cryptography-based security solutions enabling trust in new and next generation computing environments. The solutions will meet the efficiency and security requirements of the new environments and will have sound implementations. They will be easy to use for developers, administrators, and end users of IT, even if they are not cryptography experts.

  • EU FP7 CyberRoad: 

CyberROAD is a research project funded by the European Commission under the Seventh Framework Programme. The project is aimed to identify current and future issues in the fight against cyber-crime and cyber-terrorism in order to draw a strategic roadmap for cyber security research. A detailed snapshot of the technological, social, economic, political, and legal scenario on which cyber crime and cyber terrorism do develop will be first provided. Then, cyber-crime and cyber-terrorism will be analyzed in order to indentify research gaps and priorities.

Supervised Thesis
  • Sebastian Schurig: Public-Key Kryptographie mit Hilfe von SRAM PUFs (Bachelor Thesis)
  • Sven Lohrmann: Secure production parameter exchange for additive manufacturing (Bachelor Thesis in collaboration with the department of computer integrated design)
  • Marius Hansen: Smartphone Identification Based on Camera Sensor Noise Used for Authentication (Master Thesis)
  • Florian Kohnhäuser: Tamper-resistant software using Physically Unclonable Functions (Master Thesis)
  • Osama Amin: Implementation and Evaluation of Physical Unclonable Functions on FPGAs (Master Thesis in collaboration with Robert Bosch GmbH)
  • Muhammad Raees Lateef: Design, Implementation and Evaluation of a Lightweight Attestation Scheme for Embedded Systems (Master Thesis in collaboration with SEEMOO and Intel)
  • Seminar Physically Unclonable Functions und deren Anwendungen (SS2013)
  • Seminar Privacy by Design (WS2014/15)
  • Seminar Sichere Kritsche Infrastrukturen (SS15)
  • Seminar Privacy-Enhancing Technologies (SS15)
  • Seminar Privacy by Design (WS2015/16)

zum Seitenanfangzum Seitenanfang

A A A | Drucken Print | Impressum Impressum | Kontakt Contact | Last edited: 4 months ago